Data ONTAP 7-Mode Administration. StudentGuide PDF
Data ONTAP 7-Mode Administration. StudentGuide PDF
Data ONTAP 7-Mode Administration. StudentGuide PDF
Administration
NETAPP UNIVERSITY
ATTENTION
The information contained in this guide is intended for training use only. This guide contains information
and activities that, while beneficial for the purposes of training in a closed, non-production environment,
can result in downtime or other severe consequences and therefore are not intended as a reference guide. This guide is not a technical
reference and should not, under any circumstances, be used in production environments. To obtain reference materials, please refer to
the NetApp product documentation located at http://now.netapp.com/ for product information.
COPYRIGHT
2011 NetApp, Inc. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice.
No part of this book covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or mechanical, including
photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written permission of the copyright owner.
NetApp reserves the right to change any products described herein at any time and without notice.
NetApp assumes no responsibility or liability arising from the use of products or materials described
herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product or
materials does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of NetApp.
The product described in this manual may be protected by one or more U.S. patents, foreign patents,
or pending applications.
TRADEMARK INFORMATION
NetApp, the NetApp logo, Go Further, Faster, Data ONTAP, Appliance Watch, ASUP, AutoSupport, Bolt Design, Center-to-Edge,
ComplianceClock, ComplianceJournal, ContentDirector, Cryptainer, Data Motion, DataFabric, DataFort, Decru, Decru DataFort, Evolution
of Storage, Exec-Vault, FAServer, FilerView, FlexCache, FlexClone, FlexShare, FlexVol, FPolicy, Get Successful, gFiler, LockVault,
Manage ONTAP, MultiStore, NearStore, NetApp Availability Assurance, NetApp IT As A Service, NetApp ProTech Expert, NetCache,
NOW, NOW (NetApp on the Web), ONTAPI, Raid-DP, Replicator-X, SANscreen, SecureAdmin, SecureShare, Shadow Tape, Simulate
ONTAP, SmartClone, SnapCache, SnapCopy, SnapDrive, SnapLock, SnapManager, SnapMirror, SnapMover, SnapRestore, Snapshot,
SnapStore, SnapSuite, SnapValidator, SnapVault, Spinnaker Networks, Spinnaker Networks logo, SpinCluster, SpinFlex, SpinFS,
SpinHA, SpinMove, SpinServer, SpinStor, StoreVault, SyncMirror, Tech OnTap, Topio, vFiler, VFM, VFM (Virtual File Manager), WAFL,
and Web Filer are either trademarks, registered trademarks, or service marks of NetApp, Inc. in the United States and/or other countries.
Not all common law marks used by NetApp are listed on this page. Failure of a common law mark to appear on this page does not mean
that NetApp does not use the mark nor does it mean that the product is not actively marketed or is not significant within its relevant
market.
Apple and QuickTime are either trademarks or registered trademarks of Apple Computer, Inc. in the United States and/or other countries.
Microsoft and Windows Media are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other
countries.
RealAudio, RealNetworks, RealPlayer, RealSystem, RealText, RealVideo, RealMedia, RealProxy, and SureStream are either trademarks
or registered trademarks of RealNetworks, Inc. in the United States and/or other countries.
All other brands or products are either trademarks or registered trademarks of their respective holders and should be treated as such.
NetApp is a licensee of the CompactFlash and CF Logo trademarks.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
TABLE OF CONTENTS
WELCOME......................................................................................................................................................... 1
MODULE 1: NETAPP STORAGE ENVIRONMENT ...................................................................................... 1-1
MODULE 2: BASIC ADMINISTRATION ....................................................................................................... 2-1
MODULE 3: PHYSICAL STORAGE ............................................................................................................. 3-1
MODULE 4: LOGICAL STORAGE ............................................................................................................... 4-1
MODULE 5: WAFL SIMPLIFIED ................................................................................................................... 5-1
MODULE 6: ADMINISTRATION SECURITY ................................................................................................ 6-1
MODULE 7: NETWORKING ......................................................................................................................... 7-1
MODULE 8: NFS ........................................................................................................................................... 8-1
MODULE 9: CIFS .......................................................................................................................................... 9-1
MODULE 10: NAS MANAGEMENT ........................................................................................................... 10-1
MODULE 11: SAN ....................................................................................................................................... 11-1
MODULE 12: SNAPSHOT COPIES ............................................................................................................ 12-1
MODULE 13: SPACE MANAGEMENT ....................................................................................................... 13-1
MODULE 14: HIGH AVAILABILITY ........................................................................................................... 14-1
MODULE 15: VIRTUALIZATION SOLUTIONS .......................................................................................... 15-1
MODULE 16: BACKUP AND RECOVERY METHODS .............................................................................. 16-1
MODULE 17: DATA COLLECTION TOOLS .............................................................................................. 17-1
MODULE 18: DATA ONTAP UPGRADES ................................................................................................. 18-1
MODULE 19: FINAL WORDS ...................................................................................................................... 19-1
APPENDIX A: WAFL INTERNALS .............................................................................................................. A-1
APPENDIX B: SHELLS ................................................................................................................................ B-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Data ONTAP
7-Mode
Administration
Part Number: STRSW-ILT-D7ADM
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Safety
Alarm signal
Evacuation route
Assembly area
Electrical safety
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Course Objectives
By the end of this course, you should be able to:
Identify the components that are included within a
NetApp storage environment
Upgrade and administer the Data ONTAP operating
system
Configure physical and logical storage
Configure client protocols
Explain how to manage virtualization solutions
Create, manage, and use Snapshot copies
Explain and manage space consumption using Data
ONTAP
List back up and recover data methods available
2011 NetApp, Inc. All rights reserved.
COURSE OBJECTIVES
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Day 2
Logical Storage
WAFL Simplified
Administrative Security
Networking
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Day 4
Snapshot Copies
Space Management
High Availability Solutions
Virtualization Solutions
Day 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NetApp University
http://www.netapp.com/us/services/university/
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Font Styles
Convention
Italic Font
Type of Information
Book titles.
Words or characters that require special attention.
Variable names or placeholders for information that
must be supplied, for example:
An ifstat command looks like this:
ifstat -z -a <interface>
The name of the interface for which you want
to view statistics is interface.
Monospaced font
FONT STYLES
10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NetApp Storage
Environment
Module 1
Data ONTAP 7-Mode Administration
1-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Identify the key features and functions of
NetApp storage systems
Describe the advantages that a NetApp
storage system provides
Distinguish between network-attached storage
(NAS) and storage area network (SAN)
topologies
Describe NetApp unified storage architecture
Access the NetApp Support site to obtain
software and hardware documentation
2011 NetApp, Inc. All rights reserved.
MODULE OBJECTIVES
1-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
CIFS
CLI
Command-line interface
Data ONTAP
FC
Fibre Channel
GID
Group ID
HBA
HA
NAS
Network-attached storage
NFS
NIS
RLM
SAN
SD
Security descriptor
SID
Secure ID
SP
Service processor
Storage controller
Storage system
UID
User ID
VTL
1-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
1-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage Industry
Data storagean industry worth US $27 billion
Centralized storage
Reduced IT costs
Increased flexibility
Maximum efficiency of processes and services
Security
Data in motion
Cloud storage
STORAGE INDUSTRY
As IT departments throughout the world attempt to reduce costs and increase flexibility, the storage industry
is expanding rapidly. Established trends continue, and new trends arise
1-5
Data lifecycle: controlling data through its various stages of life, meeting the needs of each stage in the
cycle
Virtualization: consolidating servers and hosting multiple machines on one physical platform
Storage efficiency: using techniques, such as thin provisioning and deduplication, that maximize storage
resources
Security: securing data (an ever-increasing problem for many IT departments)
Data in motion: moving data to the optimal storage storage location
Cloud storage: providing or using storage as a service
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
1-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
1-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FAS3270
A
B
FAS2050
FAS6200 series
FAS3200 series
FAS2000 series
1-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Max
Capacity
Replaces
New
Models*
64-Bit
Max
Aggregate
Capacity
Limit*
FAS2020
68 TB
FAS2040
272 TB
30 TB
FAS2050
104 TB
FAS3210
420 TB
50 TB
FAS3140
840 TB
FAS3240
1200 TB
50 TB
FAS3160
1344 TB
FAS3270
1920 TB
70 TB
FAS3170
1680 TB
FAS6210
2400 TB
70 TB
FAS6040
1680 TB
FAS6240
3840 TB
100 TB
FAS6080
2352 TB
FAS6280
5760 TB
100 TB
1-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0a
e0b
e0c
e0d
e0e
0a
e0f
0b
LINK
LINK
LINK LINK
0c
0d
LINK LINK
LINK
LINK
e0a
e0b
e0c
e0d
e0e
0a
e0f
0b
LINK
LINK
LINK LINK
0c
0d
LINK LINK
LINK
LINK
e0a
e0b
e0c
e0d
e0e
0a
e0f
0b
LINK
LINK
LINK LINK
0c
LINK LINK
0d
LINK
LINK
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
0d
LINK LINK
LINK
LINK
13
14
15
10
16
10
Yes
Yes
No
6240
No
No
Yes
6280
No
No
Yes
1 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FAS6280
FAS3270
V6200 series
V3200 series
11
1 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
MK4
FC
Power
Fault
Loop A
Loop B
System
Shelf ID
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
ATA
DS14Mark 2AT
DS14
MK2
AT
Power
Fault
Module A
Module B
System
Shelf ID
SAS
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
450GB
DS4243
10
11
12
13
14
15
16
17
18
19
20
21
22
23
DS2246
DS4243
DS2246
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
600GB
12
1 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
1 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
1 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Intelligent caching
Persistent storage
Administration-free approach is
desired
Example workloads
Example workload
Technical applications
2011 NetApp, Inc. All rights reserved.
15
1 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
1 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
7-Mode
ClusterMode
Data
ONTAP
GX
17
1 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
7-Mode
Cluster-Mode
Cluster-
Mode
Simple transition from
Data ONTAP GX
Scale-out technology that
enables a pool of storage
controllers to manage the
storage cluster
One NAS namespace shared
across the cluster
Storage Pool
Storage Pool
18
1 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Conversion
Nondisruptive Upgrade
Conversion
(NDU) or Data in Place
Data
ONTAP 8.0.x
7-Mode
Conversion
Data
ONTAP GX
Data in Place
Data
ONTAP 8.0.x
Cluster-Mode
19
1 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Data ONTAP-v
Configures Data ONTAP as a virtual machine (VM)
Runs in VMware vSphere 4.1 with a Fujitsu
PRIMERGY BX400 blade server
Infrastructure Blade
Server Blade
Vendor
VM
CF Card
NVRAM
VM Services
WAFL
RAID 0
SAS SCSI
NFS
CIFS
SCSI
Target
vmdk
vmdk
vmdk
VMFS
iSCSI
Initiator
Server Blade
ESX
ESX
Vswitch
VMFS
iSCSI
Initiator
iSCSI
Initiator
Network Stack
WAN
Vswitch
Storage Blade
Storage Blade
Storage Blade
RAID 5
Network Backplane
Virtual machine storage provisioned and managed by Data ONTAP
vmdk
vmdk
vmdk
vmdk
parity
Async Mirror
Target
NFS Client
CIFS Client
20
DATA ONTAP-V
The Data ONTAP operating system in a virtual machine (Data ONTAP-v) delivers the Data ONTAP storage
stack, data management, and caching features within a virtual machine. Currently, Data ONTAP-v is based
upon Data ONTAP 8.0.1 7-Mode. The virtual machine is on physical servers that use direct-attached storage
or are part of an external storage system. The Data ONTAP-v product is included within the virtual storage
appliance category.
Data ONTAP-v (in a virtual environment) and Data ONTAP (in a physical environment) provide the same
capabilities. The capabilities of Data ONTAP-v can be configured for multiple usage scenarios. When used
with the Fujitsu BX400, Data ONTAP-v enables storage stack management of local Fujitsu disks and
provides IP-based (CIFS, iSCSI, and NFS) data access for home directories, e-mail, and business applications
for small-sized and medium-sized firms.
NetApp offers Data ONTAP-v to Fujitsu as an OEM product. Data ONTAP-v will be incorporated into the
Fujitsu SX960 storage blade for the PRIMERGY BX400 blade server. As of January 2011, the Data
ONTAP-v system embedded with the SX960 storage blade is sold exclusively by Fujitsu and its worldwide
authorized resellers.
1 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
1 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
Storage suite
Server suite
Application suite
Operations Manager
Protection Manager
Provisioning Manager
File Storage Resource Manager
SnapDrive for UNIX
SnapDrive for Windows
22
1 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NAS
Protocols
HTTP REST
Protocol
Namespace
Metadata
tagging and search
Policy API
NAS
I/O
Native
Object
Access
NetApp StorageGRID
Object-Based Storage Solution
Policydriven
automanagement
23
1 - 23
Is a proven tool for managing petabyte-scale, globally distributed repositories of images, video, and
records for enterprises and service providers.
Provides tremendous scalability by eliminating the typical constraints of mapping data into predefined
data containers as blocks and files. It supports billions of files or objects and multiple petabytes of
capacity in one global namespace.
Enables intelligent data management and secure content retention. It optimizes data placement, metadata
management, and efficiency through a global policy engine with built-in security that manages how data
is stored, placed, protected, and retrieved. Technologies such as digital fingerprints and encryption protect
the content from corruption and tampering.
Helps provide data availability any time, anywhere, to facilitate nonstop operations. Because the solution
is designed to allow flexible deployment configurations, it can meet the varying needs of global, multisite
organizations.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage
Architectures
STORAGE ARCHITECTURES
1 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
NFS
Corporate
LAN
iSCSI
CIFS
FCoE
FC
NAS
(file-level
access)
SAN
(block-level
access)
NetApp FAS
25
1 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NFS
CIFS
FTP
HTTP
WebDAV
SAN
FC
iSCSI
FCoE
NFS
CIFS
iSCSI
FCoE
LAN (Ethernet)
FC
Data
ONTAP
FC Network
2011 NetApp, Inc. All rights reserved.
26
1 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network
Protocols
Clients
WAFL
Physical
Memory
RAID
Storage
NVRAM
Disk
Array
27
1 - 27
Network interface: The point of interconnection between a user terminal and the network. The network
layer delivers data to RAM through the simple kernel and through some libraries.
Protocol stack: Enables the processing of the data that is placed into RAM by the network layer.
Processing is based on protocols (CIFS, NFS, FC, iSCSI, FTP, or HTTP).
WAFL (Write Anywhere File Layout): An intelligent file system that actively optimizes write
performance by identifying the most effective way to lay out data.
RAID Layer: Provides RAID 4 and RAID-DP protection by taking the data that is processed by the
WAFL file system. The RAID layer creates stripes that are used to calculate parity. The RAID layer also
protects data by performing RAID scrubs and assists in the reconstruction of failed disks.
Storage: Manages data transfer to and from disks. The storage layer is responsible for writing to the
disks. According to the data that is delivered by the WAFL file system and RAID, it optimizes the write
process to the disks.
Nonvolatile RAM (NVRAM): Logs all transactions that change the state of the file system. Because
writes are processed in system RAM, NVRAM provides battery-backed protection against data loss only
in emergency situations. After an improper shutdown, NVRAM is read only.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Clients
D-Blade
Network
M-Host
Client Protocol
Access
Protocols
WAFL
Physical
Memory
RAID
Storage
NVRAM
FreeBSD
Disk
Array
28
1 - 28
Network interface
Protocol stack
WAFL file system
RAID layer
Storage
NVRAM
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Support Options
SUPPORT OPTIONS
1 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
30
1 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
31
1 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Deduplication
Snapshot technology
RAID-DP technology
FlexClone technology
Thin provisioning
32
1 - 32
How much storage you are using and what storage efficiency features are enabled
How much storage savings you are realizingcompared to traditional storage
What additional storage savings you can realize by enabling more storage efficiency components
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
Identify the key features and functions of
NetApp storage systems
Describe the advantages of a NetApp storage
system
Distinguish between NAS and SAN topologies
Describe NetApp Unified Storage Architecture
Access the NetApp Support site to obtain
software and hardware documentation
MODULE SUMMARY
1 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
Exercise
Module 1: NetApp Storage
Environment
Estimated Time: 15 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
1 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
1 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
35
Basic
Administration
Module 2
Data ONTAP 7-Mode Administration
BASIC ADMINISTRATION
2-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Connect remotely to a FAS system by using
the console and a remote host
Access NetApp System Manager to
administer a storage system
Execute commands by using the console, a
remote host, and NetApp System Manager
Use commands to analyze a FAS system
Configure and manage the NetApp
AutoSupport support tool for a FAS system
2011 NetApp, Inc. All rights reserved.
MODULE OBJECTIVES
2-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Administrative
Interfaces
ADMINISTRATIVE INTERFACES
2-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
2-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Command-Line
Interface
COMMAND-LINE INTERFACE
2-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Command-Line Interface
CLI is accessed through the console or through Ethernet:
system> Wed Apr
7 20:53:01 ...
system>
Maximum of 2 sessions:
1 from console
1 from Ethernet (SSH or telnet)
Connection closed.
COMMAND-LINE INTERFACE
To enable two sessions, use the following command:
system> options telnet.distinct.enable on
NOTE: If two sessions are not created, administrators must share the one session.
2-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Serial Port
3
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
13
14
15
10
16
2-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
13
14
15
10
16
2-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FAS2050
LNK
0a
0b
e0a
e0b
e0a
e0b
LNK
A
B
FAS2050
LNK
0a
0b
LNK
2-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Management
LAN
RLM
or SP
e0P
e0M
e0a
e0b
10
2 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
recommended:
RSH
Telnet
11
2 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Secure Shell
Secure shell (SSH):
Allows for secure administrative access to the storage system
Requires no license; set on by default in Data ONTAP 8.0.x
Is supported by the Data ONTAP 7.3.x and Data ONTAP 8.0.x
operating systems
12
SECURE SHELL
Although the Data ONTAP 7.3.x and Data ONTAP 8.0.x operating systems support SSH 1.x, the use of SSH
1.x is not recommended because SSH 1.x contains known vulnerabilities.
2 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
Self-signed certificate: A certificate that is generated by the Data ONTAP operating system. Self-signed
certificates can be used as is, but they are less secure than certificate-authority-signed certificates because
the browser has no way of verifying the signer of the certificate. This means that the system could be
spoofed by an unauthorized server.
Certificate-authority-signed certificate: A certificate-authority-signed certificate is a self-signed
certificate that is sent to a certificate authority to be signed. The advantage of a certificate-authoritysigned certificate is that it verifies to the browser that the system is the system to which the client
intended to connect.
The Data ONTAP 8.0 operating system comes with SSL enabled by default. However, if you upgrade,
NetApp strongly recommends that you configure the protocol.
2 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To enable SSL:
2 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
Ctrl-A
Ctrl-K
Ctrl-H
Ctrl-U
Delete a word
Ctrl-W
Ctrl-R
15
2 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Command-Line Privileges
The CLI has two modes:
Administrative
priv set or priv set admin
Represented by system>
Advanced
priv set advanced
Represented by system*>
16
COMMAND-LINE PRIVILEGES
The Data ONTAP operating system provides two sets of commands that are based on privilege level:
administrative and advanced. Use the priv command to set the privilege level.
The administrative level provides access to commands that are sufficient for managing your storage system.
The advanced level provides access to these same administrative commands, plus additional troubleshooting
commands.
Advanced-level commands should only be used with the guidance of NetApp technical support. When you
use advanced-level commands, the following warning is displayed:
Warning: These advanced commands are potentially dangerous; use them only when directed to do so by
NetApp personnel.
2 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
fpolicy
fsecurity
ftp
halt
help
hostname
httpstat
ide_savecore
ifconfig
ifgrp
ifstat
igroup
ipsec
ipspace
iscsi
key_manager
keymgr
license
lock
logger
logout
lun
man
maxfiles
mt
nfsstat
nis
options
orouted
partner
passwd
ping
ping6
pktt
portset
priority
priv
qtree
quota
radius
rdate
rdfile
reallocate
reboot
restore
rlm
route
routed
rshstat
sasadmin
smtape
snap
snaplock
snapmirror
snapvault
snmp
software
source
sp
stats
storage
sysconfig
sysstat
timezone
traceroute
traceroute6
ups
uptime
useradmin
version
vfiler
vlan
vmservices
vol
vscan
17
2 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
hostname
httpstat
ic
ide_savecore
ifconfig
ifgrp
ifinfo
ifstat
igroup
incpy_cmd
inodepath
ipsec
ipspace
iscsi
java
key_manager
keymgr
led_off
led_off_all
led_on
led_on_all
led_on_off
led_reset_all
led_test
led_test_one
nv8
ontapi
options
orouted
panic
partner
passwd
perf
ping
ping6
pktt
portset
priority
priv
ps
qtree
quota
radius
rc_loop
rc_loop_check
rdate
rdfile
reallocate
reboot
registry
showfh
showfh4
sis
sldiag
sm_mon
sm_mon_old
sm_not
smb_hist
smtape
snap
snaplock
snapmirror
snapvault
snmp
software
source
sp
statit
stats
storage
stty
sysconfig
syslog
sysstat
systemshell
18
2 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Graphical
User Interfaces
2 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
2 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
Requires:
NetApp
System
Manager 1.1
Supports:
The Data ONTAP 7.2.3 and later operating systems
Current storage systems
2011 NetApp, Inc. All rights reserved.
21
2 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
2 - 22
Seamless Windows integration: Integrates seamlessly into your management environment through the
MMC.
Discovery and setup of storage systems: Enables you to quickly discover a storage system or a highavailability (HA) configuration on a network subnet. You can easily set up a new system and configure it
for storage.
iSCSI and FC: Manages iSCSI and FC protocol services for exporting data to host systems.
SAN provisioning: Provides a workflow for LUN provisioning, as well as simple aggregate and
FlexVol creation.
Network-attached storage (NAS) provisioning: Provides a unified workflow for CIFS and NFS
provisioning, as well as management of shares and exports.
Management of storage systems: Provides ongoing management of your storage system or HA
configuration.
Streamlined HA configuration management: Provides combined setup for HA configuration of
NetApp systems, logical grouping and management of such a configuration in the console or navigation
tree, and common configuration changes for both systems in an HA configuration.
Systray (Windows notification area): Provides real-time monitoring and notification of key healthrelated events for a NetApp system.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Discovery requires
DHCP.
2 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
24
2 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
2 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
2 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
2 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
2 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
2 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
Select a storage
system to
view details.
2011 NetApp, Inc. All rights reserved.
2 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
Configure SSH
and SSL.
2 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
31
2 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
2 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
Operations Manager
Discovers, monitors, and manages NetApp storage
Provides maximum availability, reduces TCO, and
ensures business policy compliance
34
OPERATIONS MANAGER
NetApp Operations Manager delivers comprehensive monitoring and management for NetApp enterprise
storage and content caching environments. From a central point of control, Operations Manager provides
alerts, reports, and configuration tools to keep your storage infrastructure in line with your business
requirements, for maximum availability and reduced TCO.
Operations Manager is a simple, centralized administration tool that enables comprehensive management of
enterprise storage and content delivery infrastructures. No other single management application provides the
same level of NetApp monitoring and management for NetApp FAS systems storage. The detailed
performance and health monitoring of Operation Manager gives administrators proactive information to help
resolve potential problems before they occur and troubleshoot problems faster if they do occur.
2 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Alternative GUIs
MMC and its snap-ins
Computer Management
Server Manager (in Windows Server 2008 and later)
35
ALTERNATIVE GUIS
Microsoft Windows Server 2000 and later, and client operating systems such as Microsoft Windows XP and
later, have a management console called Computer Management that can connect to a storage system.
Alternatively, MMCs can be used to administrate a storage system remotely.
2 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Configuring
Your System
2 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
36
2 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
CLI Commands
System options:
system> options [feature.option_name] [value]
Example:
Aggregate options:
system> aggr options aggrname [option_name] [value]
Volume options:
system> vol options volname [option_name] [value]
38
CLI COMMANDS
The options command implementation is unique in the Data ONTAP operating system. If you enter just
the command, the system displays all of the visible options and their values. If you enter the options
command along with a feature name (such as cifs or raid), the system displays all of the visible options
settings for that feature. Taking this a step further, if you enter the options command along with any
characters, the system parses the string and displays all of the visible options that match what you entered.
2 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Registry Files
Registry files contain many persistent configurations.
File
Usage
/etc/registry
Current registry
/etc/registry.lastgood
/etc/registry.bck
First-level backup
/etc/registry.default
Default registry
39
REGISTRY FILES
Persistent configuration information and other data is stored in a registry database.
There are several backups of the registry database that are used automatically if the original registry becomes
unusable. The /etc/registry.lastgood database is a copy of the registry as it existed after the last successful
boot.
The /etc/registry is edited by the Data ONTAP operating system and should not be edited manually.
Configuration commands, such as the network interface configuration (ifconfig), must remain in the
/etc/rc file.
2 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
2 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Example:
system> date 201004020728
sets the date for April 2, 2010, at 7:28 a.m.
2 - 41
-u: sets the date and time to Greenwich Mean Time instead of the local tim
CC: the first two digits of the current year
yy: the second two digits of the current year
mm: the current month (If the month is omitted, the default is the current month.)
dd: the current day (If the day is omitted, the default is the current day.)
hh: the current hour, using a 24-hour clock
mm: the current minute
ss: the current second. If the seconds are omitted, the default is 0
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
41
2 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
42
To configure
date, time, and
time zone
2 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
43
CLI: Syslog
A syslogd daemon performs message logging.
The /etc/syslog.conf configuration file on the storage
system's root volume determines how system
messages are logged.
Messages can be sent to:
The console
A file
A remote system
44
CLI: SYSLOG
The syslog contains information and error messages that the storage system displays on the console and logs
in the /etc/messages file.
To specify the types of messages that the storage system logs, use the Syslog Configuration page in NetApp
System Manager to edit the /etc/syslog.conf file. This file specifies which types of messages are logged by the
syslogd daemon. (A daemon is a process that runs in the background, rather than under the direct control of a
user.)
2 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
45
A pathname (beginning with a leading slash): Selected messages are appended to the specified log file.
A hostname (preceded by @): Selected messages are forwarded to the syslogd daemon on the named
host.
/dev/console: Selected messages are written to the console.
For more information about /etc/syslog.conf settings, see the System Administration Guide.
2 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To view the
Syslog
2 - 46
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
46
AutoSupport
AUTOSUPPORT
2 - 47
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
47
AutoSupport Tool
The AutoSupport tool:
E-Mail Server
48
AUTOSUPPORT TOOL
The AutoSupport support tool is a call-home feature that is included in the Data ONTAP operating system
software for all NetApp systems. This integrated and efficient monitoring and reporting tool constantly
monitors the health of your system.
The AutoSupport tool allows storage systems to send messages to the NetApp technical support team and to
other designated addressees when specific events occur. The AutoSupport message contains useful
information for technical support to identify and solve problems quickly and proactively.
You can also subscribe to the abbreviated version of urgent AutoSupport messages through alphanumeric
pages, or you can customize the type of message alerts that you want to receive.
The AutoSupport Message Matrices list all of the current AutoSupport messages in order of software version.
The AutoSupport tool allows the system to send messages directly to system administrators and NetApp
technical support, which has a dedicated team that continually enhances AutoSupport analysis tools.
To continuously monitor your systems status and health, the AutoSupport support tool:
2 - 48
Is automatically triggered by the kernel once a week to send information to the e-mail addresses that are
specified in the autosupport.to option before the message file is backed up. In addition, the
options command can be used to invoke the AutoSupport mechanism to send this information.
Sends a message in response to events that require corrective action from the system administrator or
NetApp technical support.
Sends a message when the system reboots.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
BATTERY_LOW
Disk failure
DISK_FAIL!!!
OVER_TEMPERATURE_SHUTDOWN!!!
REBOOT
SHELF_FAULT
WEEKLY_LOG
Unsuccessful HA takeover
HA giveback occurred
49
2 - 49
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Read-only
2 - 50
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
50
51
2 - 51
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
9. Enable AutoSupport:
2 - 52
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
52
2 - 53
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
53
To configure
AutoSupport
2 - 54
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
54
AutoSupport Configuration
AUTOSUPPORT CONFIGURATION
2 - 55
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
55
Module Summary
In this module, you should have learned to:
Connect remotely to a FAS system, using the
console and a remote host
Access NetApp System Manager to administer
a storage system
Execute commands by using the console, a
remote host, and NetApp System Manager
Use commands to analyze a FAS system
Configure and manage the NetApp
AutoSupport support tool for a FAS system
2011 NetApp, Inc. All rights reserved.
MODULE SUMMARY
2 - 56
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
56
Exercise
Module 2: Basic Administration
Estimated Time: 60 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
2 - 57
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
2 - 58
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
58
Physical Storage
Module 3
Data ONTAP 7-Mode Administration
PHYSICAL STORAGE
3-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Describe Data ONTAP RAID technology
Identify a disk in a disk shelf based on its ID
Execute commands to determine a disk ID
Identify a hot-spare disk in a FAS system
Describe the effects of using multiple disk
types
Create a 32-bit and a 64-bit aggregate
Execute aggregate commands in the Data
ONTAP operating system
Calculate usable disk space
2011 NetApp, Inc. All rights reserved.
MODULE OBJECTIVES
3-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage
The Data ONTAP operating system provides
data storage for clients:
A volume (or a smaller increment within
vol1
a volume) makes storage available to
clients through protocols.
Volumes are contained in an aggregate.
aggr1
Aggregates are not visible to clients.
STORAGE
3-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage Architecture
STORAGE ARCHITECTURE
3-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
aggr0
online
aggr1
online
Status
Options
raid4, trad
32-bit
raid_dp, aggr root
32-bit
raid_dp, aggr
64-bit
3-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
aggr1
plex0
rg0
rg1
system> sysconfig -r
...
Plex /aggr1/plex0 (online, normal, active, pool0)
RAID group /aggr1/plex0/rg0 (normal)
...
RAID group /aggr1/plex0/rg1 (normal)
...
Disks belong to
pool0 unless part
of SyncMirror.
3-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
aggr1
RAID types:
RAID 4
RAID-DP technology
(a RAID 6 implementation)
plex0
rg0
rg1
system> sysconfig -r
...
RAID group /aggr1/plex0/rg0 (normal)
RAID Disk Device HA SHELF BAY CHAN Pool...
--------- ------ ------------- ---- ---parity
0a.24
0a
1
8
FC:A
0...
data
0a.25
0a
1
9
FC:A
0...
2011 NetApp, Inc. All rights reserved.
3-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk types:
Parity
aggr1
plex0
Composed of
4-KB blocks
Data
rg0
rg1
system> sysconfig -r
...
RAID group /aggr1/plex0/rg0 (normal)
RAID Disk Device HA SHELF BAY CHAN Pool...
--------- ------ ------------- ---- ---parity
0a.24
0a
1
8
FC:A
0...
data
0a.25
0a
1
9
FC:A
0...
2011 NetApp, Inc. All rights reserved.
3-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disks
DISKS
3-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disks
All data is stored on disks.
To understand how physical media is
managed in your storage system, you need to
be familiar with:
Disk types
Disk qualification
Disk ownership
Spare disks
DISKS
3 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
Disk Qualification
NetApp allows only qualified disks to be used
with the Data ONTAP operating system.
Qualification
Ensures quality and reliability
Is enforced by /etc/qual_devices
Caution!
Modifying the disk qualification
requirement file can cause your
storage system to halt.
11
DISK QUALIFICATION
NetApp storage systems only support disks that are qualified by NetApp. Disks must be purchased from
NetApp or an approved reseller.
Unqualified Disks
The Data ONTAP operating system automatically detects unqualified disks. If you attempt to use an
unqualified disk, the Data ONTAP operating system responds by issuing a delay forced shutdown warning,
giving you 72 hours to remove and replace the unqualified disk before a forced system shutdown occurs in
Data ONTAP 7.2.1 through 7.2.3. In Data ONTAP 7.2.4 and later, you will receive a console warning.
In addition, when the Data ONTAP operating system detects an unqualified disk, it takes the following
actions:
Provides notification through syslog entries, console messages, and the AutoSupport support tool
Generates an automatic error message and delayed forced shutdown if the /etc/qual_devices file is
modified
Marks unsupported drives as unqualified
Disk Qualification
If you install a new disk drive into your disk shelf and the storage system responds with an unqualified disk
error message, you must remove the disk and replace it with a qualified disk.
To correct an unqualified disk error and avoid a forced shutdown, complete the following steps:
1. Remove any disk drives that were not provided by NetApp or an authorized NetApp vendor or reseller.
2. To update your list of qualified disks, download and install the most recent /etc/qual_devices file from
http://now.netapp.com/NOW/download/tools/diskqual/.
3. If the unqualified disk error message persists after you install an up-to-date /etc/qual_devices file, try
reinstalling the /etc/qual_devices file.
4. If the reinstallation fails, remove the unqualified disk and contact NetApp technical support.
3 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FC-AL
SAS
DS14mk4
(ESH2 or
ESH4)
DS4243
DS14mk2AT
DS2246
12
3 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FC-AL Architecture
FC and ATA disks connect
through an FC-AL (Fibre
Channel Arbitrated Loop)
architecture with ESH
(electronically switched
hub) technology
Uses FC and ATA disks
types
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
ESH
DS14
MK4
FC
Power
Fault
Loop A
Loop B
System
Shelf ID
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
450F
FC-AL ARCHITECTURE
3 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
Device
-----0a.16
0a.17
0a.18
HA
-0a
0a
0a
RPM
---10000
10000
10000
Used (MB/blks)...
-------------34000/69632000...
34000/69632000...
34000/69632000...
Device ID = host_adapter.disk_id
14
3 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
0a
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
0d
LINK LINK
LINK
LINK
13
14
15
10
16
15
3 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
MK4
FC
Power
Fault
Loop A
Loop B
System
Shelf ID
450F
450F
450F
450F
13 12 11 10
450F
450F
450F
450F
450F
450F
450F
450F
450F
Shelf ID
450F
Bay Number
Shelf ID
Bay Number
Disk ID
130
2916
130
4532
130
6148
130
7764
130
9380
130
10996
130
125112
16
3 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
28 27 25 26 23 22 21 20 16 19 18 17 24
28 BYP 26 25 24 23 22 21 20 19 18 17 XXX
15
44 43 41 42 39 38 37 36 32 35 34 33 40
44 43 42 41 40 39 38 37 36 35 34 33 32
17
3 - 17
BYP (Drive Bypass) events are situations which cause the ESH to bypass a drive port thus making it
inaccessible by the host and isolating the drive from the loop. See this FAQ for more information:
https://kb.netapp.com/support/index?page=content&id=3012395
XXX are slots that do not have any disks.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SAS Architecture
Serial Attached SCSI (SAS)
provides the affordability of
SATA with the reliability of FC
SAS uses expanders
Expanders are switches
Maintain point-to-point
connections with disks
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
Expander
18
SAS ARCHITECTURE
NetApp uses the term "stack" to refer to a collection of correctly wired and interconnected SAS shelves and
adapters. The following guidelines apply:
3 - 18
Up to 10 shelves are supported per stack, except in the FAS2040 and FAS2050, which support up to 4
shelves per stack.
The DS4243 and DS2246 cannot be mixed in the same stack. They can be mixed in the same system by
connecting them to different SAS ports. If you connect them to different ports on the same adapter, the
adapter will automatically use the correct link speed for each stack.
When using the DS4243, SAS and SATA drives can be mixed in the same stack but not in the same shelf.
You should not mix 15k and 10k RPM SAS drives in the same aggregate. While it is possible, this will
very likely limit the performance youll see from the faster drives.
NetApp extensively qualifies SAS cables for use with our SAS shelf family. SAS cables are a highperformance and critical component of the SAS architecture. Only official NetApp SAS cables are
supported for use in SAS data path connections.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Device
-----0a.00.18
0a.00.19
0a.00.20
HA
-0a
0a
0a
SHELF
----00
00
00
BAY
--18
19
20
RPM...
---15000...
15000...
15000...
Device ID = host_adapter.shelf_id.bay_id
19
3 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Device
-----0a.00.18
0a.00.19
0a.00.20
HA SHELF BAY...
-- ----- --0a
00
18...
0a
00
19...
0a
00
20...
3
0a
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
Shelf ID
of 00
Bay 0
Bay 1
Bay 20
Bay 2
LINK LINK
0c
LINK LINK
0d
LINK
LINK
Bay 3
Bay 23
3 - 20
0b
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
ACP
(Ethernet)
Data Paths
(SAS)
21
3 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk Ownership
Disks are assigned to one system controller.
Disk ownership is either:
Hardware-based: determined by the slot
position of the host bus adapter (HBA) and shelf
module port
Software-based: determined by the storage
system administrator
Storage Systems
FAS6200 series
FAS6000 series
FAS3200 series
FAS3100 series
FAS3000 series
FAS2000 series
X
X
X
X
X
X
22
DISK OWNERSHIP
Disk ownership can be hardware-based or software-based.
Hardware-Based Ownership
In hardware-based disk ownership, disk ownership and pool membership are determined by the slot position
of the host bus adapter (HBA) or onboard port and the shelf module port where the HBA is connected.
NOTE: Only the FAS3020 and FAS3050 support hardware-based ownership. The FAS3040 and FAS3070
support only software-based ownership.
Software-Based Ownership
In software-based disk ownership, disk ownership and pool membership are determined by the storage system
administrator. The Data ONTAP operating system might also set disk ownership and pool membership
automatically, depending on the initial configuration. Slot position and shelf module port do not affect disk
ownership.
The Data ONTAP 8.0 operating system supports only software-based ownership.
3 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
3 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
Hardware-Based Ownership
Determined by two conditions:
1.
2.
Channel A
4Gb 2Gb
1Gb ELP
X2
X2
ES H 4
1Gb
2Gb
4Gb
SHELF
ID
A
B
ESH4
4Gb 2Gb
1Gb ELP
Channel B
24
HARDWARE-BASED OWNERSHIP
The Data ONTAP 7.3.x operating system supports hardware-based ownership on some hardware platforms.
The Data ONTAP 8.0.x operating system does not support hardware-based ownership on any hardware
platform.
3 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Software-Based Ownership
Ownership is determined by the system administrator:
To verify current ownership:
system> disk show -v
DISK
OWNER
--------- --------------0b.43
Not Owned
...
0b.29
system (84165672)
...
POOL
----NONE
SERIAL NUMBER
------------41229013
Pool0
41229011
POOL
----NONE
SERIAL NUMBER
------------41229013
SOFTWARE-BASED OWNERSHIP
3 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
To unassign disks:
3 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
3 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
Disk Selection
When creating an aggregate, the Data ONTAP
operating system selects disks:
With the same speed
That match the speed of existing disks
28
DISK SELECTION
If disks with different speeds are present on a NetApp system (for example, 10,000 RPM and 15,000 RPM
disks), the Data ONTAP operating system attempts to avoid mixing them in one aggregate or traditional
volume.
By default, the Data ONTAP operating system selects disks:
With the same speed when creating an aggregate or traditional volume in response to the following
commands:
aggr create
vol create
That match the speed of existing disks in an aggregate or traditional volume that requires expansion or
mirroring in response to the following commands:
aggr add
aggr mirror
vol add
vol mirror
If you use the -d option to specify a list of disks for commands that add disks, the operation fails if disk
speeds differ from each other or differ from the speed of disks already included in the aggregate or traditional
volume. The commands for which the -d option fails in this case are aggr create, aggr add,
aggr mirror, vol create, vol add, and vol mirror. For example, if you enter
aggr create vol4 -d 9b.25 9b.26 9b.27, and two of the disks are different speeds, the
operation fails.
3 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
3 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Spare Disks
Spare disks are used to:
Increase aggregate capacity
Replace failed disks
30
SPARE DISKS
You can add spare disks to an aggregate to increase its capacity. If the spare is larger than the other data disks,
it becomes the parity disk. However, it does not use the excess capacity unless another disk of similar size is
added. The second largest additional disk has full use of additional capacity.
Replacing Failed Disks with Spares
If a disk fails, a spare disk is automatically used to replace the failed disk. If the spare that is used is larger
than the failed disk that is being replaced, the excess capacity of the larger disk is not used.
Zeroing Used Disks
After you assign ownership to a disk, you can add that disk to an aggregate on the storage system that owns it,
or leave it as a spare disk on that storage system. If the disk has been used previously in another aggregate,
you should use the disk zero spares command to zero the disk to reduce delays when the disk is used.
3 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Select Disks to
reveal a list of
disks.
3 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
31
Disk Protection
and Validation
3 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
3 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
RAID Groups
RAID groups are a collection of data disks and
parity disks.
RAID groups provide protection through parity.
The Data ONTAP operating system organizes
disks into RAID groups.
The Data ONTAP operating system supports:
RAID 4
RAID-DP technology
34
RAID GROUPS
To understand how to manage disks and volumes, it is important to first understand the concept of RAID.
A RAID group includes several disks that are linked together in a storage system. Although there are various
implementations of RAID, the Data ONTAP operating system supports only RAID 4 and RAID-DP
technology.
In the Data ONTAP operating system, each RAID 4 group consists of one parity disk and one or more data
disks. The storage system assigns the role of parity disk to the largest disk in the RAID group.
When a data disk fails, the storage system identifies the data on the failed disk and rebuilds a hot-spare disk
with that data.
NOTE: If a parity disk fails, it can be rebuilt from data on the data disks.
3 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
RAID 4 Technology
RAID 4 protects against data loss that results
from a single-disk failure in a RAID group.
A RAID 4 group requires a minimum of two
disks:
One parity disk
One data disk
Data
Data
Data
Data
Data
Data
Data
Parity
35
RAID 4 TECHNOLOGY
RAID 4 protects against data loss due to a single-disk failure within a RAID group.
Each RAID 4 group contains the following:
One parity disk (assigned to the largest disk in the RAID group)
One or more data disks
Using RAID 4, if one disk block goes bad, the parity disk in that disk's RAID group is used to recalculate the
data in the failed block, and then the block is mapped to a new location on the disk. If an entire disk fails, the
parity disk prevents any data from being lost. When the failed disk is replaced, the parity disk is used to
automatically recalculate its contents. This is sometimes referred to as row parity.
3 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
RAID-DP Technology
RAID-DP technology protects against data loss
that results from double-disk failures in a RAID
group.
A RAID-DP group requires a minimum of three
disks:
One parity disk
One double-parity disk
One data disk
Data
Data
Data
Data
Data
Data
Parity
DoubleParity
36
RAID-DP TECHNOLOGY
RAID-DP technology protects against data loss due to a double-disk failure within a RAID group.
Each RAID-DP group contains the following:
One data disk
One parity disk
One double-parity disk
RAID-DP technology employs the traditional RAID 4 horizontal row parity. However, in RAID-DP
technology, a diagonal parity stripe is calculated and committed to the disks when the row parity is written.
For more information about RAID-DP processes, see Technical Report 3298, found at
http://www.netapp.com/library/tr/3298.pdf.
3 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Minimum
Group Size
Maximum
Group Size
Default
Group Size
16
14
28
16
Minimum
Group Size
Maximum
Group Size
Default
Group Size
14
RAID 4
NetApp
Platform
37
3 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Growing Aggregates
Take care with how you grow your aggregates.
Existing
rg0
Data
Data
Data
Data
Data
Data
Data
Parity
Data
Data
Data
Data
Data
Data
Data
Parity
Data
Parity
Existing
rg1
GROWING AGGREGATES
3 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
38
Data Validation
NetApp uses various methods to validate data:
RAID-level checksums
Media scrub process
RAID scrub process
39
DATA VALIDATION
NOTE: NetApp deduplication depends on block checksum (BCS). Deduplication is not available with zone
checksum.
3 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Mathematical
Sector
Sector
3 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
4-byte
checksums
for 4096
bytes stored
within a cluster
1
520 Bytes
64 bytes
41
3 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Wasted space
Checksums for
the previous
4096 bytes are
stored within the
ninth sector.
1
512 Bytes
64 bytes
42
3 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
43
3 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
A RAID scrub:
Is enabled by default
Can be scheduled or disabled
NOTE: Disabling is not
recommended.
Uses RAID checksums
Reads a block and then verifies
the data
On finding a discrepancy between
the RAID checksum and the data
read, re-creates the data from
parity and writes it back to the
block
Reads every block in an
aggregate to ensure that data has
not become stale, even if users
havent accessed the data
44
CAUSE
3 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
RAID Scrubs
Automatic RAID scrub:
By default, a scrub begins at 1:00 a.m. each Sunday.
An administrator can change the schedule and specify the
duration.
45
RAID SCRUBS
Prior to Data ONTAP 7.0, to manually scrub disks use the disk scrub start command.
3 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
3 - 46
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
46
Disk Sanitization
A way to protect sensitive datato make recovery of the
data impossible
The process of physically obliterating data by overwriting
disks with three successive byte patterns or with random
data
Administrators can specify the byte patterns or use the Data
ONTAP default pattern.
47
DISK SANITIZATION
Disk sanitization is the process of physically obliterating data by overwriting disks with specified byte
patterns or with random data so that recovery of the original data is impossible. Use the disk sanitize
command to ensure that no one can recover the data on the disks.
The disk sanitize command uses three successive default or user-specified byte overwrite patterns for
up to seven cycles per operation. Depending on the disk capacity, the patterns, and the number of cycles, the
process can require several hours. Sanitization runs in the background. You can start, stop, and display the
status of the sanitization process.
3 - 47
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
48
3 - 48
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Degraded Mode
Degraded mode occurs when a disk fails in a RAID group
During degraded mode:
Data is still available
Performance is less than optimal
Data must be recalculated from parity until the failed disk is
replaced.
CPU usage increases to calculate from parity.
The failed disk (or disks for RAID-DP) will be rebuilt on a spare
drive (if available)
49
DEGRADED MODE
If one disk in a RAID group fail, the system operates in degraded mode. In degraded mode, the system does
not operate optimally, but no data is lost. Within a RAID 4 group, if a second disk fails, data is lost; within a
RAID-DP group, if a third disk fails, data is lost. The following AutoSupport message will be broadcast:
[monitor.brokenDisk.notice:notice].
If the maximum number of disks have failed in a RAID group (two for RAID-DP, one for RAID 4) and there
are no suitable spare disks available for reconstruction, the storage system automatically shuts down in the
period of time specified by the raid.timeout option. The default timeout value is 24 hours. See this FAQ
for more information: https://kb.netapp.com/support/index?page=content&id=2013508.
Therefore, you should replace failed disks and used hot-spare disks as soon as possible. You can use the
options raid.timeout command to modify the timeout internal. However, keep in mind that, as the
timeout interval increases, the risk of subsequent disk failures also increases.
3 - 49
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
3 - 50
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
50
750 GB
1 TB
750 GB
750 GB
750 GB
750 GB
NOTE: When a larger disk replaces a smaller disk, disk resizing occurs.
51
3 - 51
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk Replacement
To replace a data disk with a spare disk:
system> disk replace start device_id
spare_device_id
system> disk replace start 0a.21 0a.23
Parity
Disk
0a.20
0a.21
0a.22
0a.23
Data
Disk
Target
Disk
Data
Disk
Spare
Disk
DISK REPLACEMENT
3 - 52
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
52
Aggregates
AGGREGATES
3 - 53
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
53
Aggregates
Aggregates logically contain flexible volumes
(FlexVol volumes).
NetApp recommends that aggregates be 32-bit or
64-bit.
An aggregate name must:
Begin with a letter or the underscore character (_)
Contain only letters, digits, and underscore
characters
Contain no more than 255 characters
54
AGGREGATES
To support the differing security, backup, performance, and data-sharing requirements of users, physical data
storage resources on your storage system can be grouped into one or more aggregates. Aggregates provide
storage for the volume or volumes they contain.
Each aggregate has its own RAID configuration, plex structure, and set of assigned disks. When you create an
aggregate without an associated traditional volume, you can use it to hold one or more FlexVol volumes
(logical file systems that share the physical storage resources, RAID configuration, and plex structure of the
aggregate container). When you create an aggregate with a traditional volume tightly bound, the aggregate
can contain only that volume.
A single storage system supports up to 100 aggregates (including traditional volumes).
Aggregate Names
Aggregate names must follow the naming conventions shown here. The same rules apply to volume names.
3 - 54
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Adding an Aggregate
Use one of two methods:
To create an aggregate:
system> aggr create aggr1 3
Minimum options
shown
ADDING AN AGGREGATE
3 - 55
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
55
or
system> aggr create aggr 24
2011 NetApp, Inc. All rights reserved.
3 - 56
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
56
32-bit
Maximize performance
when no more than 16 TB
of space is needed.
64-bit
Achieve high performance
and the ability to exceed
the 16-TB limitation.
3 - 57
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
57
To rename an aggregate:
To destroy an aggregate:
3 - 58
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
58
3 - 59
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
59
3 - 60
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
60
3 - 61
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
61
Select Aggregates
to administrate
aggregates.
Select Create to
create an
aggregate.
3 - 62
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
62
3 - 63
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
63
3 - 64
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
64
3 - 65
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
65
Space Allocation
SPACE ALLOCATION
3 - 66
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
66
Data
Data
Data
Parity Double-Parity
3 - 67
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
RAID-DP
is the
default.
67
Data
...
1 TB
Data
...
1 TB
Data
...
1 TB
Data
...
1 TB
Data
...
1 TB
20 MB
3 - 68
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
68
...
977 GB 1 TB
But wait! The Data ONTAP operating system reports more space taken away.
2011 NetApp, Inc. All rights reserved.
3 - 69
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
69
Data
Data
Data 0
Data
...
847 GB 1 TB
847 GB is the.right-size
..
allocation for a 1-TB ATA disk.
847 GB 1 TB
...
847 GB 1 TB
...
847 GB
1 TB
1 TB
70
DISK SIZE
RIGHT-SIZED
CAPACITY
AVAILABLE BLOCKS
FC
300 GB
272 GB
557,056,000
450 GB
418 GB
856,064,000
600 GB
560 GB
1,146,880,000
500 GB
423 GB
866,531,584
750 GB
635 GB
1,301,618,176
1 TB
847 GB
1,735,794,176
450 GB
418 GB
856,064,000
600 GB
560 GB
1,146,880,000
100 GB
84 GB
173,208,064
ATA or SATA
SAS
SSD
3 - 70
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Data
Data
Data
Parity Double-Parity
Data
Data
Data
3 - 71
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
71
Data
...
10% WAFL Reserve
847 GB 1 TB
Data
...
847 GB 1 TB
Data
...
847 GB 1 TB
3 - 72
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
72
Total space WAFL reserve Snap reserve Usable space BSR NVLOG A-SIS Smtape
2483GB
248GB
0GB
2234GB
0GB
0GB
0GB
This aggregate contains no volume
Aggregate
Total space
Snap reserve
WAFL reserve
Allocated
0GB
0GB
248GB
Avail
2234GB
0GB
248GB
3 - 73
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
73
Module Summary
In this module, you should have learned to:
Describe Data ONTAP RAID technology
Identify a disk in a disk shelf based on its ID
Execute commands to determine a disk ID
Identify a hot-spare disk in a FAS system
Describe the effects of using multiple disk types
Create a 32-bit and a 64-bit aggregate
Execute aggregate commands in the Data ONTAP
operating system
Calculate usable disk space
MODULE SUMMARY
3 - 74
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
74
Exercise
Module 3: Physical Storage
Estimated Time: 60 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
3 - 75
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
3 - 76
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
76
Logical Storage
Module 4
Data ONTAP 7-Mode Administration
LOGICAL STORAGE
4-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Explain the concepts related to volume in the
Data ONTAP operating system
Define and create a flexible volume
Execute vol commands
MODULE OBJECTIVES
4-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Volumes
VOLUMES
4-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Volumes
Volumes represent logical storage.
The Data ONTAP operating system allows up to 500
volumes per storage system.
Volumes are accessible through supported
protocols, such as CIFS, NFS, or iSCSI.
Data ONTAP 7.3 operating system and later versions
support the following types of volumes:
Flexible volumes, also known as FlexVol volumes
Traditional volumes (deprecated)
Additional product-specific volumes, such as
SnapLock volumes and FlexClone volumes
NOTE: The SnapLock product is only available on some
of Data ONTAP releases
2011 NetApp, Inc. All rights reserved.
VOLUMES
Volumes are file systems that hold user data that is accessible by means of one or more of the access
protocols that the Data ONTAP operating system supports, including NFS, CIFS, HTTP, Web-based
Distributed Authoring and Versioning (WebDAV), FTP, Fibre Channel (FC), Fibre Channel over Ethernet
(FCoE), and iSCSI. You can create one or more Snapshot copies of the data in a volume so that multiple,
space-efficient, point-in-time images of the data can be maintained for backup and error recovery.
The Data ONTAP operating system limits a storage system to only 100 aggregates, but within those
aggregates you can create up to 500 traditional and flexible volumes. For FAS2040 and FAS3050 systems,
the limit is 200 volumes per storage system.
4-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
4-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Root Volumes
/vol
Root volume
Directory (configuration information)
ROOT VOLUMES
The storage system contains a root volume that was created when the system was initially set up. The default
root volume name is /vol/vol0.
Storage systems on which the Data ONTAP 7.0 operating system or later was preinstalled have a FlexVol
volume for a root volume. Systems that run earlier versions of the Data ONTAP operating system have a
traditional root volume.
Each storage system has only one root volume, but the designated root volume can be changed. The root
volume is used to start up the storage system. It is the only volume with root attributes, which means that its
/etc directory is used for configuration information.
4-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Volumes Access
/vol
Root volume
Directory (configuration information)
Volume
Directory
VOLUMES ACCESS
Volume path names begin with /vol. For example:
If the name of a volume is /vol0, the volume path is /vol/vol0.
If the name of a directory in a volume of shared users is cheryl, the volume path is /vol/users/cheryl.
NOTE: There is no directory called /vol. Rather, /vol is a special virtual root path under which the storage
appliance mounts directories. You cannot mount /vol to view all of the volumes on the storage system; you
must mount each volume separately.
4-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Flexible Volumes
FLEXIBLE VOLUMES
4-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Flexible Volumes
Flexible volumes allow you to manage the
logical layer of the file system independently of
the physical layer of storage.
Multiple flexible volumes can exist within a
single aggregate.
aggr1
FlexVol 1
FlexVol 2
FLEXIBLE VOLUMES
A flexible volume (also called a FlexVol volume) is a volume that is loosely coupled to its container
aggregate. Because the volume is managed separately from the aggregate, you can create small FlexVol
volumes (20 MB or larger), and then increase or decrease the size of FlexVol volumes in increments as small
as 4 KB.
Advantages of flexible volumes:
You can increase and decrease a flexible volume while online, allowing you to:
4-9
Can be as small as 20 MB
Are limited to aggregate capacity (if guaranteed)
Can be as large as the volume capacity that is supported for your storage system (not guaranteed)
Resize without disruption
Size in any increment (as small as 4 KB)
Size quickly
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vol1
FlexVol 2
FlexVol 3
Create FlexVol 1
vol2
vol3
Create FlexVol 2
Aggregate
RG1
RG2
RG3
aggr1
Populate volumes.
4 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
Space utilization:
Vol 1
Vol 2
Free
Vol 3
Vol 4
4 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
12
4 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
4 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Select Volumes
to reveal a list
of volumes.
4 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
Removed Snapshot
reserve default
2011 NetApp, Inc. All rights reserved.
4 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
4 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
4 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
Volume Administration
To resize a volume:
system> vol size volname [[+|-]<size>[k|m|g|t]]
Command
Result
To offline a volume:
system> vol offline volname
To online a volume:
system> vol online volname
To destroy a volume:
system> vol offline volname
system> vol destroy volname
VOLUME ADMINISTRATION
4 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
To delete the
selected volume
4 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
4 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
Verify your
request.
4 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
The newly
resized volume
4 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Qtrees
QTREES
4 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
Qtrees
A qtree is:
A logically defined file system within a volume
A special subdirectory at the root of a volume
Viewed as a directory by clients
24
QTREES
You might consider creating a qtree for the following reasons:
You can easily create qtrees for managing and partitioning data within a volume.
You can create a qtree to assign user-based or workgroup-based usage quotas (soft or hard) and limit the
amount of storage space that a specific user or group of users can consume on the qtree to which they
have access.
Creating Qtrees
When you want to group files without creating a volume, you can create qtrees instead. When you create
qtrees, you can group files using any combination of the following criteria:
Security style
Oplocks setting
Quota limit
Qtree Limitations
The primary limitation of qtrees is that a maximum of 4,995 qtrees are allowed per volume on a storage
system.
NOTE: When you enter a df command with a qtree path name on a UNIX client, the command displays
the smaller client file system limit or the storage system disk space, making the qtree look fuller than it
actually is.
4 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
4 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Select Qtrees
to reveal a list
of qtrees and
volumes.
4 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
The newly
created qtree
is displayed.
To delete a
qtree, select it,
and then click
Delete.
4 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
Module Summary
In this module, you should have learned to:
Explain the concepts related to volume in the
Data ONTAP operating system
Define and create a flexible volume
Execute vol commands
MODULE SUMMARY
4 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
Exercise
Module 4: Logical Storage
Estimated Time: 40 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
4 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
4 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
WAFL Simplified
Module 5
Data ONTAP 7-Mode Administration
WAFL SIMPLIFIED
5-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Describe how data is written to and read from
a WAFL (Write Anywhere File Layout) file
system on a volume
Explain the WAFL file system concepts,
including consistency points (CPs), RAID
management, and storage levels
Describe how RAID is used to protect disk data
Explain how the WAFL file system processes
write and read requests
2011 NetApp, Inc. All rights reserved.
MODULE OBJECTIVES
5-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network
Protocols
Clients
WAFL
Physical
Memory
RAID
Storage
NVRAM
Disk
Array
5-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Clients
D-Blade
Network
Protocols
M-Host
Client Protocol
Access
WAFL
Physical
Memory
RAID
Storage
NVRAM
FreeBSD
5-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk
Array
Write Requests
WRITE REQUESTS
5-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Write Requests
The Data ONTAP operating system receives write
requests through multiple protocols:
CIFS
NFS
Fibre Channel (FC)
iSCSI
HTTP
Web-based Distributed Authoring and Versioning
(WebDAV)
WRITE REQUESTS
5-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network
Stack
RS-232
SAN
Service
HBA
NFS
Service
NIC
CIFS
Service
SAN Host
UNIX
Client
Protocols
Memory Buffer /
Cache
WAFL
NVLOG
NVLOG
NVLOG
NVLOG
NVLOG
N
V
R
A
M
NVRAM Full
RAID
Windows
Client
Storage
5-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Consistency Point
A CP is a completely self-consistent image of a file
system.
A CP is equivalent to capturing the structure of a file
system at a moment in time.
When a CP occurs, designated data is written to a disk
and a new root inode is determined.
A CP occurs for multiple reasons, including but not
limited to the following:
Half of the NVRAM card is full
10 seconds elapse
A Snapshot copy is created (discussed in Module 12)
The system is halted
2011 NetApp, Inc. All rights reserved.
CONSISTENCY POINT
A consistency point (CP) is a completely self-consistent image of the entire file system and is not actually
accomplished until the data has been written to disk and a new root inode is determined.
Although CPs occur for many reasons, a few of the major reasons are:
5-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
5-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network
Stack
RS-232
SAN
Service
HBA
NFS
Service
NIC
CIFS
Service
SAN Host
UNIX
Client
Protocols
NVLOG
NVLOG
NVLOG
NVLOG
NVLOG
Memory Buffer /
Cache
N
V
R
A
M
NVRAM Full
WAFL
RAID
Windows
Client
Storage
10
5 - 10
Allows the Data ONTAP operating system to convert multiple small file writes into one sequential disk
write.
Distributes data across all disks in a large array, meaning no overloaded disks or hotspots (disks that
might be utilized more than other disks in an array).
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
5 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network
Stack
RS-232
SAN
Service
HBA
NFS
Service
NIC
CIFS
Service
SAN Host
UNIX
Client
Protocols
NVLOG
NVLOG
NVLOG
NVLOG
NVLOG
Memory Buffer /
Cache
N
V
R
A
M
NVRAM Full
WAFL
RAID
4k
Windows
Client
Checksum
computed
Storage
12
5 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
5 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
Network
Stack
RS-232
SAN
Service
HBA
NFS
Service
NIC
CIFS
Service
SAN Host
UNIX
Client
Protocols
NVLOG
NVLOG
NVLOG
NVLOG
NVLOG
Memory Buffer /
Cache
N
V
R
A
M
NVRAM Full
WAFL
RAID
Windows
Client
Storage
14
5 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NVRAM
The Data ONTAP operating system writes from
system memory:
NVRAM is never read during normal write
operations.
NVRAM is backed up with a battery.
15
NVRAM
NVRAM is best viewed as a log. This log stores a subset of incoming file actions.
When a request comes in, two things happen:
The request gets logged to NVRAM. NVRAM is not read during normal processing. It is simply a log of
requests for action (including any data necessary, such as the contents of a write request).
The request is acted upon. The storage system's main memory is used for processing requests. Buffers are
read from the network and from the disk and processed according to the directions that came in as CIFS
or NFS requests. NVRAM holds the instructions that are necessary if the same actions need to be
repeated.
If the storage system does not crash, the NVRAM eventually is cleared without ever being read back. If the
storage system crashes, the data from NVRAM is processed as if the storage system were receiving those
same requests over the wire again. The same response is made by the storage system for the request in
NVRAM, just as if it had come in through the network again.
5 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Read Requests
READ REQUESTS
5 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
Read Requests
Every time a read request is received, the
WAFL file system does one of two things:
Reads the data from the system memory, also
known as the cache
Reads the data from the disks
17
READ REQUESTS
The Data ONTAP operating system includes several built-in, read-ahead algorithms. These algorithms are
based on patterns of usage, which helps ensure that the read-ahead cache is used efficiently.
Five Steps in a Read
1.
2.
3.
4.
5.
The network layer receives an incoming read request (read requests are not logged to NVRAM).
If the requested data is located in cache, it is returned immediately to the requesting client.
If the requested data is not located in cache, the WAFL file system initiates a read request from the disk.
Requested blocks and intelligently chosen read-ahead data are sent to cache.
The requested data is sent to the requesting client.
5 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network
Stack
Console
SAN
Service
HBA
NFS
Service
NIC
CIFS
Service
SAN Host
UNIX
Client
Protocols
N
V
R
A
M
Memory Buffer /
Cache
WAFL
RAID
Windows
Client
Storage
18
5 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network
Stack
RS-232
SAN
Service
HBA
NFS
Service
NIC
CIFS
Service
SAN Host
UNIX
Client
Protocols
N
V
R
A
M
Memory Buffer /
Cache
WAFL
RAID
Windows
Client
Storage
19
5 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
Describe how data is written to and read from
a WAFL file system on a volume
Explain the WAFL file system concepts,
including CPs, RAID management, and
storage levels
Describe how RAID is used to protect disk data
Explain how the WAFL file system processes
write and read requests
MODULE SUMMARY
5 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
Exercise
Module 5: WAFL Simplified
Estimated Time: 15 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
5 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
5 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Administration
Security
Module 6
Data ONTAP 7-Mode Administration
ADMINISTRATION SECURITY
6-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Restrict administrative access
Restrict console and NetApp System
Manager access
Configure a client machine as an
administration host to manage a storage
system
MODULE OBJECTIVES
6-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
6-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Secure Configuration
SECURE CONFIGURATION
6-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
options
options
options
options
ssh.enable on
ssh2.enable on
ssh.passwd_auth.enable on
ssh.pubkey_auth.enable on
NOTE: These steps were performed during
the discussion of configuring a storage
system with NetApp System Manager and
the command-line interface (CLI).
6-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
options
options
options
options
options
options
rsh.enable off
telnet.enable off
ftpd.enable off
httpd.enable off
httpd.admin.enable off
ssh1.enable off
options
options
options
options
security.passwd.rules.everyone on
security.passwd.rules.history 6
security.passwd.minimum 8
security.passwd.minimum.digit 1
Set password options in compliance with
corporate security policies.
6-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
6-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Administrative Users
Initially, there is only one administrative account:
root.
Multiple administrative accounts are allowed,
managed by role-based access control (RBAC).
Login information is tracked in the syslog
(/etc/messages) file, including:
User name
Time of access
Node name or address
ADMINISTRATIVE USERS
To manage a storage system, you can use the default system administration account, or root. You can also use
the useradmin command to create additional administrator user accounts.
Administrator accounts are beneficial because:
You can give administrators and groups of administrators differing levels of administrative access to your
storage systems.
You can limit an individual administrator's access to specific storage systems by giving the individual an
administration account on only those systems.
Having different administrator accounts allows you to display information about who is performing
commands on a storage system, and what commands they are using.
The auditlog file keeps a record of all administrator operations that are performed on a storage system and
the administrator who performed each operation, as well as any operations that failed due to insufficient
capabilities.
You can assign each administrator to one or more groups whose assigned roles (sets of capabilities)
determine what operations they are authorized to carry out on the storage system.
If a storage system that is running CIFS is a member of a domain or a Windows workgroup, domainuser
accounts that are authenticated on the Windows domain can use any available method to access the
storage system.
The Audit Log
An audit log is a record of commands that are executed at the console through a Telnet shell, SSH, or by
using the rsh command. All commands that are executed in a source-file script are also recorded in the audit
log. Audit log data is stored in the /etc/log directory, in the auditlog file. HTTP administration operations,
such as those resulting from the use of NetApp System Manager, are also logged. You can use the
auditlog.max_file_size option to specify the maximum size of the auditlog file. By default, the Data
ONTAP operating system is configured to save an audit log.
6-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Groups
Roles
Capabilities
6-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Capabilities
Capabilities are predefined privileges that
allow users to execute commands or take
other specified actions.
A role is a set of capabilities.
The following capabilities are predefined:
Login
CLI
Security
API
10
CAPABILITIES
A capability is a privilege that is granted to a role to execute commands or take other specified actions.
The Data ONTAP operating system uses four types of capabilities:
Login rights: These capabilities begin with login- and are used to control which access methods an
administrator is permitted to use for managing the system.
CLI rights: These capabilities begin with cli- and are used to control which commands an
administrator can use in the Data ONTAP command-line interface (CLI).
Security rights: These capabilities begin with security- and are used to control an administrators
ability to use advanced commands or change passwords for other users.
API rights: These capabilities begin with api- and are used to control which API commands can be
used. API commands are usually executed by programs, not administrators. However, you might want to
restrict a specific program to certain APIs by creating a special user account for it, or you might want to
have a program authenticate as the administrator who is using the program and then limit the program by
that administrators roles.
See the System Administration guide for the appropriate Data ONTAP operating system version.
6 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Roles
A role is a defined set of capabilities.
The Data ONTAP operating system includes
several predefined roles.
Administrators can create additional roles or
modify existing roles.
Admin Role
Login capability
Security capability
CLI capability
API capability
2011 NetApp, Inc. All rights reserved.
11
ROLES
A role is a collection of capabilities or rights to execute certain functions. Usually, a role is created to assign a
task or tasks to a particular group of users.
6 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
6 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Groups
A group is:
A collection of users
Associated with one or more roles
Admin Role
13
GROUPS
A group is a collection of users or domain users. It is important to remember that the groups that are defined
in the Data ONTAP operating system are separate from other groups, such as groups that are defined in the
Microsoft Active Directory server or a Network Information System (NIS) environment. This is true even
if the groups that are defined in the Microsoft Active Directory and the groups that are defined in the Data
ONTAP operating system have the same name.
When you create new users or domain users, the Data ONTAP operating system requires that you specify a
group. Therefore, you should create appropriate groups before you define users or domain users.
6 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Predefined Groups
Administrators: grants all CLI, API, login, and security
capabilities
Power Users: grants the ability to invoke cifs, nfs,
and useradmin CLI commands, manage cifs and
nfs API calls, and log in using Telnet, HTTP, RSH,
and SSH sessions
Compliance Administrators: compliance role
Backup Operators: none role
Replicators: none role
Users: grants the ability to make snmp-get and
snmp-get-next API calls
Guests: none role
2011 NetApp, Inc. All rights reserved.
14
PREDEFINED GROUPS
To create or modify a group, start by giving the group capabilities that are associated with one or more
predefined or customized roles.
6 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
6 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
Users
A user is:
An individual account that may or may not have
capabilities defined for the storage system
Part of a group
NOTE: For security purposes, each user should have a unique
login account.
Group
Admin Role
USERS
6 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
6 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
18
6 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Group
Admin Role
6 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
NOTE:
20
security.passwd.firstlogin.enable
{on|off}
DESCRIPTION
Specifies whether new users and users who log in for the first
time after another user has changed his or her password must
change the password when they log in. The default value for
this option is off.
NOTE: If you enable this option, you must ensure that all
groups have login-telnet and cli-passwd capabilities. Users in
groups that do not have these capabilities cannot log in to the
storage system.
security.passwd.lockout.numtries num
security.passwd.rules.
enable {on|off}
security.passwd.rules.
everyone {on|off}
6 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
DESCRIPTION
security.passwd.rules.
history num
security.passwd.rules.
maximum max_num
security.passwd.rules.
minimum min_num
security.passwd.rules.
minimum.alphabetic min_num
security.passwd.rules.
minimum.digit min_num
security.passwd.rules.
minimum.symbol min_num
6 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Select
6 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
6 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
To configure
users
6 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
User Management
USER MANAGEMENT
6 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
User Properties
USER PROPERTIES
6 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
To configure
groups
Select the
predefined role.
6 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
Group Management
The newly
created group
GROUP MANAGEMENT
6 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
Group Properties
GROUP PROPERTIES
6 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
Communicate Securely
COMMUNICATE SECURELY
6 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
6 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
Administration Host
The setup command requests the name and IP
address of the administration host.
This is typically a UNIX or Linux host that has
access to mount the root volume from the storage
system.
When mounted, user root on the administration host
has root access to the root volume.
31
ADMINISTRATION HOST
The term administration host is used to describe an NFS client machine that has the ability to view and
modify configuration files that are stored in the /etc directory of the storage systems root volume.
When you designate a workstation as an administration host, the storage system's root file system (/vol/vol0
by default) is accessible by NFS mounting if NFS is licensed.
You can designate additional administration hosts after setup by modifying the storage system's NFS exports
and CIFS shares.
The Administration host can set using the setup command or the hidden admin.host option.
Administration Host Privileges
The storage system grants root permissions to the administration host after the setup procedure is complete.
This table describes administration host privileges.
IF THE
ADMINISTRATION
HOST IS ...
An NFS client
A CIFS client
6 - 32
Mount the storage system root directory and edit configuration files from
the administration host.
Use an RSH connection to enter Data ONTAP commands.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Restricting Access
To improve security, you can configure the
storage system to allow logins only from
trusted hosts. Configure this option by using:
The CLI command:
system> options trusted.hosts [hostname|*|-]
32
RESTRICTING ACCESS
When you restrict access by using the options trusted.hosts command:
6 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Configure Security
immediately to ensure
a proper security
connection.
2011 NetApp, Inc. All rights reserved.
6 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
Security Settings
SECURITY SETTINGS
6 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
6 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
35
Physical Access
Physical access concerns:
Guard access to your storage systems. The root
password can be reset. (discussed in Module 18)
PHYSICAL ACCESS
6 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
36
Module Summary
In this module, you should have learned to:
Restrict administrative access
Restrict console and NetApp System Manager
access
Configure a client machine as an
administration host to manage a storage
system
MODULE SUMMARY
6 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
Exercise
Module 6: Administration Security
Estimated Time: 30 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
6 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
6 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
39
Networking
Module 7
Data ONTAP 7-Mode Administration
NETWORKING
7-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Identify the configuration of network settings and
components in the Data ONTAP operating system
Explain and configure name resolution services
Configure routing tables in the Data ONTAP operating
system
Define and create interface groups
Discuss the operation of virtual LANs (VLANs) and
how to route them
MODULE OBJECTIVES
7-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Interface Configuration
INTERFACE CONFIGURATION
7-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Interface Configuration
The setup command performs the initial
network interface configuration.
After initial setup, you can create and modify
the interface configuration using:
Command-line interface (CLI) with the
ifconfig command
NetApp System Manager
INTERFACE CONFIGURATION
From the CLI, the ifconfig command displays and configures network interfaces for a storage system.
These are ifconfig command examples:
Bring up an interface:
ifconfig interface up
The /etc/rc file configures the interface settings during boot. To edit this configuration on the storage system,
you can use the wrfile command from NetApp System Manager or from an administration host that uses
CIFS or NFS.
Example: Using the ifconfig command in the /etc/rc file:
ifconfig interface 10.10.10.XX netmask 255.255.252.0 up
7-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Network Types
Letter
Ethernet
Port Number
Letter
7-5
Virtual interface
Virtual LAN (VLAN)
Virtual hosting (VH)
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Slot
Port
Interface Name
Ethernet
0 (onboard)
e0a
Ethernet
0 (onboard)
e0b
Ethernet
e3a
Ethernet
e3b
Ethernet
e3c
Ethernet
e3d
7-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
7-7
IP address: Standard format is used for IP addresses (for example, 192.168.23.10). IP addresses are
mapped to host names in the /etc/hosts file.
Netmask and broadcast address: Standard format is used for netmask and broadcast addresses (for
example, 255.255.255.0 for netmask, and 192.168.1.255 for broadcast address).
Media type and speed: These media types can be configured:
[ mediatype { tp | tpfd | 100tx | 100txfd | 1000fx | auto }]
MTU: Use a smaller interface maximum transmission unit (MTU) value if a bridge or router on the
attached network cannot break large packets into fragments.
Flow control for the GbE II controller: The original GbE controller supports only full duplex, not flow
control. The GbE Controller II negotiates flow control with an attached device that supports
autonegotiation. However, if autonegotiation fails on either device, the flow control setting that was
entered using the ifconfig command is used. These flow control settings can be configured:
[ flowcontrol { none | receive | send | full } ]
Up or down state: The state of any interface can be configured up or down.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
7-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
7-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
7 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
7 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
Interface Groups
Interface groups enable trunking of one or
more Ethernet interfaces (IEEE 802.3ad link
aggregation).
Types:
Single-mode
Multimode 1-Gb Copper
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK LINK
0d
LINK
10-Gb Optical
Interfaces
Interface Group
Interface Group
1
0c
LINK LINK
LINK
Interfaces
0b
LINK
LINK
12
INTERFACE GROUPS
The Data ONTAP operating system connects with networks through physical interfaces (links). The Data
ONTAP operating system has supported IEEE 802.3ad link aggregation for many years. This standard
enables multiple network interfaces to be combined into one virtual interface group. After it is created, this
group is indistinguishable from a physical network interface. In the Data ONTAP 7.3 operating system,
virtual interfaces were referred to as vifs. In the Data ONTAP 8.0 operating system and later, interface
aggregation groups are referred to as interface groups.
7 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
x
0
Active Path
0b
0c
LINK LINK
0d
LINK
LINK
Interface Group
5
Standby Path
13
7 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Types:
e0a
e0b
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
Fault tolerance
Active Path
Higher throughput
Single points of failure
eliminated
0b
0c
LINK LINK
0d
LINK
LINK
Static: multi
Dynamic: lacp
Advantages:
e0c
Interface Group
5
Active Path
14
7 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Load Balancing
Load balancing is supported for multimode interface groups only:
IP-based (default)
Port-based
Round-robin (not recommended)
MAC-based
e0a
e0b
e0c
e0d
10.10.10.1
10.10.10.2
10.10.10.3
10.10.10.4
10.10.10.5
10.10.10.6
10.10.10.7
10.10.10.8
10.10.10.9
10.10.10.10
10.10.10.11
10.10.10.12
10.10.10.13
10.10.10.14
10.10.10.15
10.10.10.16
15
LOAD BALANCING
Load balancing ensures that all the interfaces in a multimode vif or interface group are equally utilized for
outbound traffic. Load balancing, which is supported for multimode trunks only, relies on an even distribution
of hosts. Three methods of load balancing use the IP-based default:
IP-based: The outgoing interface is selected on the basis of the storage system and clients IP address.
Port-based: The outgoing interface is selected using a fast hashing algorithm on the source and
destination IP addresses, along with the transport layer port number.
Round-robin: All of the interfaces are selected on a rotating basis.
NOTE: The round-robin method provides true load balancing, but it can cause out-of-order packet delivery
and retransmissions due to overruns.
Another method of load balancing, MAC-based, selects the outgoing interfaces on the basis of the storage
system and clients Media Access Control (MAC) address.
Both IP-based and MAC-based address methods use a formula to determine which interface to use for
outgoing frames. The formula uses the exclusive operator (XOR) value of the last four bits of the source
destination addresses to determine which interface to return data on.
7 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
7 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
7 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
LINK LINK
0c
0d
LINK
LINK
18
7 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
interfaces
7 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
7 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
7 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
Name Resolution
NAME RESOLUTION
7 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Host-Name Resolution
A storage system must be able to resolve host
names to valid IP addresses.
Host-name resolution is commonly
used in:
HOST-NAME RESOLUTION
7 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
In host-name resolution:
24
7 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Configuration by /etc/hosts
The /etc/hosts file provides local IP and name
resolution.
To modify /etc/hosts, use:
The rdfile and wrfile commands in CLI
Any client machine where the /etc directory
is visible, such as an administration host
NetApp System Manager
25
CONFIGURATION BY /ETC/HOSTS
Because the /etc/hosts file is checked first and changes in it take effect immediately, it is important to keep
this file current. You can edit the file using a standard editing program. When using a standard editing
program, be sure to include a blank line at the end. The /etc/hosts format is:
IP address
hostname
alias(es)
The /etc/hosts file is generated automatically during the storage system setup procedure as part of the data
installation process. It is populated at that time with IP addresses and host names.
NOTE:
7 - 25
The default IP address for the storage system is listed in the /etc/hosts file.
Installed cards without IP addresses are included in the /etc/hosts file, but they are commented out.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
network files
7 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
7 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
DNS Configuration
The DNS provides a centralized mechanism
for host-name resolution in Windows and
UNIX environments.
To configure the DNS:
NetApp System Manager
In the CLI, use:
setup command
options dns
dns command
28
DNS CONFIGURATION
DNS matches domain names to IP addresses and enables you to centrally maintain host information so that
you do not have to update the /etc/hosts file every time you add a new host to the network. This is particularly
helpful if you have several storage systems on your network. You can configure DNS by using options and
commands.
To make the configuration commands permanent, enter them in the /etc/rc file. The /etc/rc file is generated
automatically during the setup procedure, as part of the Data ONTAP installation process. If you choose to set
up DNS at that time, the file is populated with DNS configuration information.
Use the information command dns info to display the status of the DNS resolver, a list of DNS servers,
the state of each DNS server, the default domain that is configured on the storage system, and a list of other
domains that are used with unqualified names for name lookup.
EXAMPLE
RESULT
options dns.enable on
Enables DNS
7 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
DNS
7 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
7 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
NIS
NIS provides:
31
NIS
The NIS client service provides information about security-related parameters on a network, such as hosts,
user passwords, user groups, and netgroups.
NIS enables you to centrally maintain host information, so you don't have to update the /etc/hosts file on
every storage system on your network.
Although the storage system can be an NIS client and can query NIS servers for host information, it cannot be
an NIS server. You can use the options nis.slave.enable command to configure the storage system, an
NIS client, as an NIS slave. The storage system then downloads NIS maps from the NIS master servers that
are defined in nis.servers.
The storage system NIS slave checks the master servers every 45 minutes. Downloaded maps are stored under
/etc/yp/<NIS_domain>/. If you want to use NIS as the primary method for host resolution, specify it above the
other methods that are listed in the /etc/nsswitch.conf file.
7 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
NIS
7 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
7 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
Route Resolution
ROUTE RESOLUTION
7 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
Route Information
A route defines the path to a network or host.
To display the current routing table in CLI, use
netstat -r.
system> netstat -r
Routing tables
Internet:
Destination
Gateway
default
66.166.149.161
66.166.149.160/2 link#1
66.166.149.161
0:20:6f:10:25:7a
Flags
UGS
UC
Refs
14
0
UHL
35
ROUTE INFORMATION
A storage system does not function as a router for other network hosts, even if it has multiple network
interfaces. However, the storage system does route its own packets.
To display the defaults and explicit routes that your storage system uses to route its own packets, use the
netstat -r command to view the current routing table. The netstat command displays network-related
data structures.
The route command enables you to manually manipulate the network routing table for a specific host or
network that is specified by destination.
To add or delete a specific host or network route in the routing table, use route.
COMMAND
RESULT
7 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
36
7 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
7 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Virtual LANs
VIRTUAL LANS
7 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
38
VLANs
Group and divide:
VLANs provide:
Floor 1
VLAN 60
VLAN 70
VLAN 80
70
80
60
70
Floor 2
80
39
VLANS
A virtual LAN (VLAN) is a switched network that is logically segmented by function, project team, or
applications. End stations can be grouped by department, by project, or by security level. End stations can be
geographically dispersed and still be part of the broadcast domain in a switched network.
Advantages of VLANs
7 - 39
Ease of administration: VLANs enable a logical grouping of users who are physically dispersed.
Moving to a new location does not interrupt membership in a VLAN. Similarly, changing job functions
does not require moving the end station because it can be reconfigured into a different VLAN.
Confinement of broadcast domains: VLANs reduce the need for routers on the network to contain
broadcast traffic. Packet flooding is limited to the switch ports on the VLAN.
Reduction of network traffic: Because the broadcast domains are confined to the VLAN, traffic on the
network is significantly reduced.
Enforcement of security: End stations on one VLAN cannot communicate with end stations on another
VLAN unless a router is connected between them.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
VLAN Commands
Use these commands for VLANs:
system>
system>
system>
system>
system>
vlan
vlan
vlan
vlan
vlan
40
VLAN COMMANDS
You can create a VLAN by using the vlan create command in the CLI or in the FilerView browserbased administration tool. After you create the trunk, you can configure the VLAN like any other regular
network interface by using the ifconfig command.
EXAMPLE
RESULT
vlan create g on e4 2 3 4
vlan delete q e8 2
vlan add e8 3
vlan stat e4 10
7 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
41
7 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
interfaces
7 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
42
Module Summary
In this module, you should have learned to:
Identify the configuration of network settings and
components in the Data ONTAP operating system
Explain and configure name resolution services
Configure routing tables in the Data ONTAP operating
system
Define and create interface groups
Discuss the operation of VLANs and how to route them
MODULE SUMMARY
7 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
43
Exercise
Module 7: Networking
Estimated Time: 45 minutes
EXERCISE
Please refer to your Exercise Guide for more instruction.
7 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
7 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
45
NFS
Module 8
Data ONTAP 7-Mode Administration
NFS
8-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Explain NFS implementation in the Data
ONTAP operating system
License NFS on a storage system
Explain the purpose and format of /etc/exports
List and define the export specification options
Describe the use of the exportfs command
Mount an export on a UNIX host
MODULE OBJECTIVES
8-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NFS Overview
NFS OVERVIEW
8-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NFS Overview
NFS enables network file systems (clients) to
share files and directories that are stored and
administered centrally from a storage system.
These platforms usually support NFS:
NFS OVERVIEW
NFS, a protocol that was originally developed by Sun Microsystems in 1984, enables users on a client
computer to access files over a network as easily as if the network devices were attached to its local disks.
NFS, like many other protocols, builds on the Open Network Computing Remote Procedure Call (ONC RPC)
system. The NFS protocol is specified in RFC 1094, RC 1813, and RFC 3530.
8-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vol0
flexvol1
data_files
etc
eng_files
home
misc_files
Network Connection
Client1
Client2
8-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Setting Up and
Configuring NFS
8-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Setting up NFS
Configure NFS using either:
CLI
NetApp System Manager
SETTING UP NFS
8-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
8-8
nfs.v3.enable
nfs.v4.enable
nfs.tcp.enable
nfs.udp.xfersize
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
licenses
8-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Exports Added
8 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
Exporting Resources
EXPORTING RESOURCES
8 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
Exporting Resources
To make resources available to remote clients,
the resource must be exported.
To export a resource persistently:
Edit the /etc/exports file with a new entry.
Execute the exportfs -p command.
12
EXPORTING RESOURCES
To export resources, use one of these methods:
For persistence across reboots, specify the resources to export in the /etc/exports file, and then execute the
exportfs -a command to make the changes effective immediately.
For temporary access, use the exportfs command to export resources that are not specified in the
/etc/exports file, or to export resources that are specified in the file but with different access permissions.
8 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
/vol/vol0/pubs -rw=host1:host2,root=host1
/vol/vol1 -rw=host2
/vol/vol0/home
13
8 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
/etc/exports
a.
/vol/vol1 -rw=host2
b.
/vol/vol0 -rw=adminhost,root=adminhost
c.
/vol/vol0/home -rw=host1:host2
d.
/vol/vol0 -ro=host2
e.
/vol/vol1 -rw=host1,ro=host3
f.
/vol/vol1 rw=host1,root=host3
g.
/vol/vol0/home rw=host1,ro=host2
h.
/vol/vol0 ro=adminhost2,root=adminhost2
8 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
Exporting
EXPORTING
8 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
exportfs
system>
system>
rdfile /etc/exports
system>
system>
exportfs a
exportfs
/vol/flexvol/qtree -sec=sys,rw=10.254.232.12
/vol/vol0/home -sec=sys,rw,root=10.254.232.12,nosuid
16
-sec=sys,ro,rw=sun,root=sun,nosuid
/vol/vol0/home
-sec=sys,rw,root=sun,nosuid
/vol/flexvol1
-sec=sys,rw,root=sun,nosuid
8 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Temporary Exports
Use the exportfs command to create
in-memory exports:
system> exportfs -i -o
Example:
system> exportfs -i -o ro=host1 /vol/vol0/home
17
TEMPORARY EXPORTS
OPTION
DESCRIPTION
Root Access
The root option specifies that the root on the client has root permissions for the
resource when it is mounted from the storage system.
Read-Write
Access
The rw option gives read-write access to specific hosts. If no host is specified, all
hosts have read-write access.
Read-Only
Access
The ro option gives read-only access to specific hosts. If no host is specified, all
hosts have read-only access.
Anonymous User
The anon option determines the UID of the root user on the client.
ID
8 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
8 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
exports
8 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
8 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
8 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
Export Properties
EXPORT PROPERTIES
8 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Export Summary
EXPORT SUMMARY
8 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
8 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
Export Settings
anon applies
only to root users
anon=0
(root access allowed)
anon=65535
(deny access to root users)
anon=65534 (root
EXPORT SETTINGS
8 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
Mounting
MOUNTING
8 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
(1)
(3)
27
8 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
8 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
Module Summary
In this module, you should have learned to:
Explain NFS implementation in the Data
ONTAP operating system
License NFS on a storage system
Explain the purpose and format of /etc/exports
List and define the export specification options
Describe the use of the exportfs command
Mount an export on a UNIX host
MODULE SUMMARY
8 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
Exercise
Module 8: NFS
Estimated Time: 45 minutes
EXERCISE
Please refer to your Exercise Guide for more instruction.
8 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
8 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
31
CIFS
Module 9
Data ONTAP 7-Mode Administration
CIFS
9-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Describe the CIFS environment
Configure the storage system to participate in
the CIFS environment
Share a resource on the storage system
Map a drive from a client to the shared
resource on the storage system
MODULE OBJECTIVES
9-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
CIFS Overview
CIFS OVERVIEW
9-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
CIFS Definition
CIFS is a Microsoft network file-sharing protocol that
evolved from the Server Message Block (SMB) protocol.
In a CIFS environment, any application that processes
network I/O can access and manipulate files and folders
(directories) on remote servers.
CIFS can be either SMB 1.0 or SMB 2.0
Data ONTAP Version
SMB 1.0
CIFS DEFINITION
CIFS is a Microsoft network file-sharing protocol that evolved from the Server Message Block (SMB)
protocol.
When using CIFS, any application that processes network I/O can access and manipulate files and folders
(directories) on remote servers in a manner that is similar to the way in which the application accesses and
manipulates files and folders on the local system.
9-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
User Authentication
In a CIFS environment, the storage system
authenticates users in one of four ways:
Active Directory authentication
Microsoft Windows NT 4.0 domain
authentication
Windows workgroup authentication
Authentication for non-Windows workgroups
USER AUTHENTICATION
For information about methods of authenticating users other than Active Directory, see the Data ONTAP
CIFS Administration course.
9-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Clients
Member Server
Domain Controller
Machine
Accounts
Directory
Machine name
Joining a domain
2011 NetApp, Inc. All rights reserved.
9-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Clients
Member Server
Domain Controller/
Browser Server
DNS/WINS
Machine name
9-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
User Authentication
User authentication on a storage system in a domain:
Domain users are created on domain controller.
User session authentication occurs at the domain controller.
Authenticated users must be authorized to access a share
and resources.
Member Server
Clients
Domain
Controller
Machine name
Client-B authenticated
Authenticates Client-B user
USER AUTHENTICATION
Domain users that have already been added to the domain controller can browse the storage system for
available shares and then request access to the storage system and its shares and to the resources in a share.
User session authentication with a user name and password is performed centrally on the domain controller;
this establishes a user session with the storage system.
Users must be authorized to access a share and the resources in a share. Data access on a storage system
requires a network login to the storage system. A user can administer a storage system through the network
(for example, through a Telnet session) using a local account on the storage system; however, a user cannot
log in locally to a storage system to access data.
In this example, Client-Bs user requests user session authentication with the member server (storage system).
The member server requests the domain controller to authenticate Client-Bs user. The domain controller
authenticates Client-Bs user, and a session is established with Client-Bs user and the member server (storage
system).
9-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Setting Up and
Configuring CIFS
9-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
9 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
9 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
9 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
To configure
CIFS
9 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
9 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
9 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
9 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
9 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
CIFS Shares
CIFS SHARES
9 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
Microsoft Tools
Microsoft
Management
Console
Command Line
Graphical Tools
NetApp System
Manager
19
9 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Add shares:
Change shares:
Delete shares:
system> cifs shares -delete <share_name>
20
9 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
HOME
C$
pub
Mount Point
Description
--------------------/etc
Remote Administration
BUILTIN\Administrators / Full Control
/vol/vol0/home
Default Share
everyone / Full Control
/
Remote Administration
BUILTIN\Administrators / Full Control
/vol/vol0/pub
new pub
everyone / Full Control
Mount Point
Description
--------------------/etc
Remote Administration
BUILTIN\Administrators / Full Control
/vol/vol0/home
Default Share
everyone / Full Control
/
Remote Administration
BUILTIN\Administrators / Full Control
9 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
Microsoft Tools
Microsoft
Management
Console
Command Line
Graphical Tools
NetApp System
Manager
22
RESULT
9 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
WHAT IT DOES
-g
Specifies that the user is the name of the UNIX group. Use this option when
you have a UNIX group and a UNIX user, or a Windows NT user or group
with the same name.
user
Specifies that the user or group for the ACL entry can be a Windows NT user
or group (if the storage system uses NT domain authentication), or can be the
special group everyone.
group
Specifies the user or group for the ACL entry. Can be a Windows NT user or
group (if the storage system uses NT domain authentication), or can be the
special group everyone.
rights
-delete
Removes the ACL entry for the named user on the share.
9 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Mount Point
----------/vol/vol1/eng
EDSVCS\engineering
Description
----------Eng Share
/ Full Control
Mount Point
Description
--------------------/vol/vol1/eng
Eng Share
EDSVCS\jbrown / Read
EDSVCS\engineering / Full Control
eng jbrown
Mount Point
----------/vol/vol1/eng
EDSVCS\engineering
Description
----------Eng Share
/ Full Control
9 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
Client Access
CLIENT ACCESS
9 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
\\10.254.134.35\C$...
26
9 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
9 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Terminating Sessions
cifs terminate Host1
Host1
Host2
cifs terminate
Host3
Host4
28
TERMINATING SESSIONS
The cifs terminate command stops the CIFS service. If a single host is named, all CIFS sessions that
were opened by that host are terminated. If a host is not specified, all CIFS sessions are terminated, and the
CIFS service is shut down.
If you run the cifs terminate command without specifying a time until shutdown, and there are users
with open files, you are prompted to enter the number of minutes to delay before terminating. If the CIFS
service is terminated immediately on a host that has one or more files open, users are unable to save changes.
You can use the -t option to warn of an impending service shutdown. If you execute cifs terminate from rsh,
you must supply the -t option.
EXAMPLE
RESULT
cifs terminate -t 10
gloriaswan
cifs terminate -t 0
cifs restart
9 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
9 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
CIFS Sessions
CIFS SESSIONS
9 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
31
A summary of session information, including storage system information and the number of open shares
and files that were opened by each connected user
NOTE: The number of open shares that are shown in the session information includes the hidden IPC$
share.
Share and file information about one connected user or all connected users, including names of shares
opened by a specific connected user or all connected users
Access levels of opened files
Security information about a specific connected user or all connected users, including the UNIX UID and
a list of UNIX groups and Windows groups to which the user belongs.
9 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
RESULT
cifs sessions
cifs sessions s
9 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
9 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
Workgroup
Active Directory
Windows NT 4.0 domain
Non-Windows workgroup
Advanced configuration
Collecting CIFS statistics
CIFS performance tuning
Troubleshooting CIFS
9 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
Module Summary
In this module, you should have learned to:
Describe the CIFS environment
Configure the storage system to participate in
the CIFS environment
Share a resource on the storage system
Map a drive from a client to the shared
resource on the storage system
MODULE SUMMARY
9 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
35
Exercise
Module 9: CIFS
Estimated Time: 45 minutes
EXERCISE
Please refer to your Exercise Guide for more instruction.
9 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
9 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
NAS Management
Module 10
Data ONTAP 7-Mode Administration
NAS MANAGEMENT
10 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
List some security methods for protecting data
Explain and configure a security style setting
for a volume and a qtree
Describe methods of tracking and restricting
storage usage
Explain, create, and manage quotas
Explain and configure the Data ONTAP
FPolicy file-screening policy
MODULE OBJECTIVES
10 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NAS Management
After you configure network-attached storage
(NAS) protocols, additional steps are needed
to ensure that you get the full use of NAS
technologies.
This module examines:
Securing data
Tracking and restricting storage usage
NAS MANAGEMENT
10 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Securing Data
SECURING DATA
10 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Multiprotocol
Volumes and qtrees can have either:
New Technology File System (NTFS) security
style access control list (ACL) permissions
UNIX-style permissions
MULTIPROTOCOL
Qtrees can have one of these three security styles:
NTFS:
UNIX: UNIX files and directories, like UNIX systems, have UNIX permissions.
Mixed:
10 - 7
Both NTFS and UNIX security are allowed. A file or directory can have either Windows NT permissions or
UNIX permissions.
The default file security style is the style that was most recently used to set permissions on that file.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Windows Host
Windows
User ID
NTFS
UNIX
User
UNIX
Unix
10 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Domain
Authenticated
Windows
authenticated
Unauthenticated
Windows
Domain
Controller
Authentication
Authenticate by
/etc/registry
Windows Workgroup
Authentication
Windows
authenticated
Unauthenticated
Storage System
10 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
If not
verified
off
Check
wafl.default_unix_user
If mapping exists,
try mapped user
If no mapping,
try Windows user
If mapped to
Invalid user
User accepted
10
10 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Try
Guest account configured
guest
options cifs.guest_account Yes
user
Verify
UNIX user by
/etc/passwd,
NIS, or LDAP
Guest user
accepted
No
Unauthenticated
or invalid user
rejected
Guest user
rejected
11
10 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
UNIX Host
UNIX
User
Unix
Windows
User ID
NTFS
UNIX
12
10 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
# cd /mnt/home
# ls
UID
and GID
Resolves UID to
UNIX user name by
/etc/passwd,
NIS, or LDAP
Storage System
UID to UNIX user
name failed
NOTE: UNIX UID (and GID) were assigned at user login, when the
user name and password were authenticated.
2011 NetApp, Inc. All rights reserved.
13
10 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Check
wafl.default_nt_user
If mapping exists,
try mapped user
If no mapping,
try UNIX user
If mapped to
Invalid user
User accepted
14
10 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
UID to UNIX
user name
failed or invalid
user
Invalid
user
rejected
15
10 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Security Styles
Security Styles
Hosts That Can
Change Security
Permissions
CIFS Client
Access
Determined by
NFS Client
Access
Determined by
UNIX
NFS clients
UNIX
permissions
(Windows user
names mapped
to UNIX account)
UNIX
permissions
Mixed
Security Style
NTFS
CIFS clients
Windows NTFS
ACLs
Windows NTFS
ACLs
(UNIX user
names mapped
to Windows
account)
16
SECURITY STYLES
A CIFS user can access the file without disrupting UNIX permissions by using one of these techniques:
For the versions of the Data ONTAP operating system earlier than version 7.2, the CIFS user must have
the SecureShare multiprotocol file-locking system, an add-on from the NetApp Support site.
For the Data ONTAP 7.2 operating system and later, the CIFS user can manage security directly with
cifs.preserve_unix_security.
For more information, see the CIFS Administration on Data ONTAP course.
10 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
2 root
root
4096
cifs_tree1
10 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
18
10 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Tracking and
Restricting
Storage Usage
10 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
Monitor trends
Charge back department usage
Effectively manage storage
Restrict user usage
10 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
Purpose of Quotas
Quotas are necessary to:
Limit the amount of disk space that can be used
Track disk space usage
Warn of excessive usage
Quota targets:
Users
Groups
Qtrees
21
PURPOSE OF QUOTAS
Quotas are important tools for managing the use of disk space on your storage system. A quota is a limit that
is set to control or monitor the number of files or the amount of disk space that an individual or group can
consume. Quotas enable you to manage and track the use of disk space by clients on your system.
A quota is used to:
Limit the amount of disk space or the number of files that can be used
Track the amount of disk space or the number of files that are used, without imposing a limit
Warn users when disk space or file usage is high
10 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Create a quota
10 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Quota Type
23
QUOTA TYPE
The quota limit type can be a:
User: Indicated by a UNIX or Windows ID
Group: Indicated by UNIX GIDs
Qtree: Represented by the qtree path name
User quotas, group quotas, and qtree quotas are stored in the /etc/quotas file. You can edit this file at any time.
In both NFS and CIFS environments, quotas are based on a Windows account name, UNIX ID, or GID.
The CIFS system administrator must maintain:
The /etc/passwd file for CIFS users to obtain UIDs (if those users are going to create UNIX files)
The /etc/group file for CIFS users to obtain GIDs or use an NIS server to implement CIFS quotas
Qtree quotas do not require UIDs or GIDs. If you only implement qtree quotas, you do not have to maintain
the /etc/passwd and /etc/group files (or NIS services).
10 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Quota Limits
24
QUOTA LIMITS
Disk Column
The Disk Space Hard Limit field specifies the maximum disk space that is allocated to the quota target. This
hard limit cannot be exceeded. If the limit is reached, messages are sent to the user and console, and SNMP
traps are generated.
Files Column
The Files Hard Limit field specifies the maximum number of files that the quota target can use. To track
usage of the number of files without imposing a quota, enter a blank or a dash (-) in this field. You can omit
abbreviations (uppercase or lowercase) and you can enter an absolute value, such as 15000. NOTE: The value
for the Files Hard Limit field must be on the same line in your quotas file as the value for the disk field;
otherwise, the Files field is ignored.
Threshold Column
The Threshold field specifies the limit at which write requests trigger messages to the console. If the threshold
is exceeded, the write still succeeds, but a warning is logged to the console. The Threshold field uses the same
format as the Disk field. Do not leave this field blank. The value that follows Files is always assigned to the
Threshold field. If you do not want to specify a threshold limit, enter a dash (-) here.
Soft Disk Column
The Disk Space Soft Limit field specifies the disk space that can be used before a warning is issued. If this
limit is exceeded, a message is logged to the console, and an SNMP trap is generated. When the soft disk
limit returns to normal, another syslog message and SNMP trap is generated. The Disk Space Soft Limit field
has the same format as the Disk Space Hard Limit field. If you do not want to specify a soft limit, enter a dash
(-) or leave this field blank. NOTE: The Disk Space Soft Limit value must be on the same line as the value
for the Disk Space Hard Limit field; otherwise, the soft disk limit is ignored. The sdisk limit is the NFS
equivalent of a CIFS threshold.
10 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Quota Summary
QUOTA SUMMARY
Changes to the /etc/quotas file are not persistent until you click Commit.
10 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
To enable
or disable
quota per
volume
Resize quotas
if quota definitions
have changed or
system> quota resize
26
10 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Quota Messages
Disk quota exceeded results from requests
that cause a user or group to exceed an
applicable quota.
Out of disk space results from requests that
cause the number of blocks or files in a qtree
to exceed the qtree limit.
Root or Windows administrator account:
Group quotas do not apply
Tree quotas do apply
27
QUOTA MESSAGES
Quotas are set to warn you that limits are being approached, enabling you to act before users are affected.
For all quota types, the Data ONTAP operating system sends console messages when the quota is exceeded
and when it returns to normal. SNMP traps for quota events are also initiated. Additional messages are sent to
the client when hard quota limits are exceeded.
NOTE: Threshold quotas in CIFS are the same as soft quotas in NFS.
Quota Error Messages
When receiving a write request, the Data ONTAP operating system checks to see if the file to be written is in
a qtree. If the write would exceed the tree quota, this error message is sent to the console:
tid tree_ID: tree quota exceeded on volume vol_name
If the qtree is not full but the write would cause either the user or group quota to be exceeded, the Data
ONTAP operating system logs one of these errors:
uid user_ID: disk quota exceeded on volume vol_name
gid group_ID: disk quota exceeded on volume vol_name
Error Messages Received by Clients
When hard quota limits are violated, the Data ONTAP operating system returns an out-of-disk-space error to
the NFS write request or a disk-full error to the CIFS write request.
10 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Dont forget
to resize the
volumes quotas
10 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
Quota Rules
New users or groups that are created after the default
quota is in effect have the default value.
Users or groups that do not have a specific quota
defined have the default value.
Configurable rules (/etc/quotas fields) are:
# Target
Type
Disk
Files
Thold
Sdisk
Sfiles
*
/vol/home/usr/x1
21
/vol/eng/proj
Writers
acme\cheng
[email protected]
Rtaylor
S-1-5-32-544
user@/vol/vol2
user
Group
tree
group@/vol/techpub
user@/vol/vol2
user
user@/vol/vol2
user@/vol/vol2
50M
50M
750M
100M
75M
200M
200M
200M
15K
10K
75K
75K
75K
-
45M
45M
700M
90M
70M
150M
150M
150M
10K
9000
-
29
QUOTA RULES
Target Column
The Target column identifies what the quota is applied against. In this example, there are multiple equivalent
ways in which you can specify the target. These entries provide target UIDs (for users) or GIDs (for groups)
of the local storage system. The ID numbers must not be 0. The system checks quotas every time it receives a
write request, so it is important to use a target that wont change over time, unless you account for the change
in the quotas file.
NOTE: Do not use the backslash (\) or an at sign (@) in UNIX quota targets. The Data ONTAP operating
system interprets these characters as part of Windows names.
Type Column
You can create a quota based upon the following types: user, user@volume_path, user@tree_path, group,
group@volume_path, group@tree_path, or a tree (short for qtree).
Default Quotas
You can create a default quota (*) for users, groups, or qtrees. A default quota applies to quota targets that are
not explicitly referenced in the /etc/quotas file.
Overriding Default Quotas
If you do not want the Data ONTAP operating system to apply a default quota to a particular target, you can
create an entry in the /etc/quotas file for that target so that the explicit quota overrides the default quota.
10 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Quota Report
system> quota report
Type
ID
Volume
Tree...
----- ---- -------- -----tree
1
NASvol
tree1...
K-Bytes
Files
...Used
Limit Used Limit Quota Specifier
--------- ------- ----- ------ --------------... 14612
12288
24
2 /vol/NASvol/tree1
30
QUOTA REPORT
The quota report command prints the current file and space consumption for each user, group, and qtree.
Using a path argument, it displays information about all quotas that apply to the files in the path. Space
consumption and disk limits are rounded up and reported in multiples of 4 K.
In the example above, the quota report command is used with the u option. For targets with multiple
IDs, this report shows the first ID on the first line of each report entry. Other IDs are shown on separate lines
with one ID per line. Each ID is followed by its original quota specifier, if any. The default is to display one
ID per target.
These options are available with the quota report command:
The -s option shows soft and hard limit values for each user, group, and qtree.
The -u option shows the first ID on first line of each report entry for targets with multiple IDs. Other IDs
are shown on separate lines with one ID per line. Each ID is followed by its original quota specifier, if
any. The default is to display one ID per target.
The -x option shows all IDs (separated by commas) on first line of each report entry for targets with
multiple IDs. The report also shows threshold column. Columns are tab delineated.
The -t option prints the threshold of the quota entry. If omitted, the warning threshold is not included.
10 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Quota Information
Beginning with the Data ONTAP 7.3 operating
system, the AutoSupport support tool message
contains this quota information:
A collection of quota statistics, including a set of
new counters that collect quota statistics
The quota configuration file (/etc/quotas)
The user mapping file (/etc/usermap.cfg)
31
QUOTA INFORMATION
Starting with Data ONTAP 7.3 operating system, the message that is generated by the Data ONTAP operating
systems AutoSupport support tool now includes quota information, which enables NetApp to improve its
response to quota-related support questions. Before the release of the Data ONTAP 7.3 operating system, if
you had a quota-related support question, it was necessary for you to gather the appropriate information and
send it to NetApp technical support, which sometimes created a delay of several days. With the inclusion of
quota information in the latest version of the AutoSupport support tool message, this information is
automatically sent to NetApp technical support. Quota information in AutoSupport also enables NetApp to
store quota statistics that are useful for analysis.
Quota information is included in AutoSupport message as an attachment. The attachment name appears in the
format YYYYMMDDHHMM.N.quotas.gz. For privacy protection, the contents of the quota files are
encrypted.
The AutoSupport attachment contains three types of quota information:
10 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Qtree Statistics
To display the number of NFS and CIFS operations
resulting from user access to files in a qtree:
system> qtree stats
...
Volume
-------NASvol
Tree
-------nas_tree1
NFS ops
------0
CIFS ops
----802
32
QTREE STATISTICS
To help you determine what qtrees are incurring the most traffic, the qtree stats command enables you
to display statistics about user accesses to files in the qtrees on your system. This information can identify
traffic patterns to help with qtree-based load balancing.
The storage system maintains counters for each qtree in each of the storage systems volumes. These counters
are not persistent.
To reset the qtree counters, use the -z option.
The values that are displayed by the qtree stats command correspond to the operations on the qtrees that
have occurred since most recent occurrence of one of these actions:
System is booted
Volume containing the qtree is brought online
Counters are explicitly reset using the qtree stats -z command
10 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
10 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Triggering Operations
Operations that can trigger a file policy:
create
open
write
rename
delete
close
create_dir
getattr
link
lookup
read
rename_dir
setattr
symlink
TRIGGERING OPERATIONS
10 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
Ethernet
Client
10 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
35
HSM Server
(FPolicy
Server)
Primary
Storage System
my.docx
Clients
my.docx
Stub or
sparse file
Complete
file
Secondary
Storage System
36
10 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Clients
Primary
Storage System
Secondary
Storage System
37
10 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
38
39
10 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
List some security methods for protecting data
Explain and configure a security style setting
for a volume and a qtree
Describe methods of tracking and restricting
storage usage
Explain, create, and manage quotas
Explain and configure the Data ONTAP
FPolicy file-screening policy
MODULE SUMMARY
10 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
Exercise
Module 10: NAS Management
Estimated Time: 60 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
10 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
42
SAN
Module 11
Data ONTAP 7-Mode Administration
SAN
11 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Explain the purpose of a SAN
Identify supported SAN configurations
Distinguish between Fibre Channel (FC), Fibre
Channel over Ethernet (FCoE), and iSCSI protocols
Define a LUN and explain LUN attributes
Use the lun setup command and NetApp System
Manager to create iSCSI-attached LUNs
Access and manage a LUN from a Windows host
Define SnapDrive data management software and its
features
MODULE OBJECTIVES
11 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SAN Overview
SAN OVERVIEW
11 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Unified Storage
NFS
Corporate
LAN
iSCSI
CIFS
FCoE
FC
NAS
SAN
NetApp FAS
UNIFIED STORAGE
SAN is a block-based storage system that makes data available over the network, using Fibre Channel (FC),
Fibre Channel over Ethernet (FCoE), and iSCSI protocols.
Network-attached storage (NAS) is a file-based storage system that makes data available over the network,
using NFS and CIFS protocols.
The NetApp SAN and Unified Storage Architecture provides an outstanding level of investment protection
and flexibility. The FAS system at the bottom of this image implies one box. However, the actual storage
environment includes small and large FAS systems.
11 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SAN Protocols
FC
Encapsulated SCSI
FC Network
Ethernet
Encapsulated SCSI
TCP/IP Network
SAN PROTOCOLS
Network access to LUNs on a NetApp storage system can be through either an FC network or a TCP/IP-based
network. Both of these protocols carry encapsulated SCSI commands as the data transport mechanism.
11 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SAN Components
SAN COMPONENTS
11 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Initiator
Host
Target
SAN Services
WAFL
Controller
LUN
11 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SAN Types
A SAN can be implemented using either:
FC
Referred to as FC SAN
Uses FC protocol to communicate
Physical Data FC Frame
SCSI
SCSI
SCSI
SAN TYPES
LUNs on a NetApp storage system can be accessed through either an FC SAN fabric, using the FC protocol,
or an Ethernet network, using the FCoE or iSCSI protocol. In all cases, the transport portals (FC, FCoE, or
iSCSI) carry encapsulated SCSI commands as the data transport mechanism.
11 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Ports
Application
File System
TCP/IP Driver iSCSI Driver
SCSI Driver
FC Driver
Initiator
Ethernet Port
FC Driver
Target
IP
SAN
LUN
FC
SAN
9
PORTS
Data is communicated over ports. In an Ethernet SAN, the data is communicated by means of Ethernet ports.
In an FC SAN, the data is communicated over FC ports.
11 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Initiator
SCSI Driver
21:00:00:2b:34:26:a6:56
20:00:00:2b:34:26:a6:56
50:0a:09:80:86:f7:c7:86
SAN Services
WAFL
Target
IP
SAN
LUN
FC
SAN
10
11 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Initiator
SCSI Driver
iqn.1999-04.com.a:system
Portals
Node Name
iqn.1998-02.com.netapp:ss1
SAN Services
WAFL
Target
IP
SAN
LUN
FC
SAN
11
11 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Initiator
SCSI Driver
Directly Connected
Connected by a Switch
SAN Services
WAFL
Target
IP
SAN
LUN
11 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FC
SAN
12
Set Up a SAN
SET UP A SAN
11 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
Set Up a SAN
To set up a SAN:
1. License the appropriate SAN protocol on the
storage system.
2. Create a volume or qtree where the LUN will
reside.
3. Verify that the SAN protocol service is on.
4. Configure the host initiator.
5. Create the LUN and igroup, and then
associate the igroup to the LUN.
14
SET UP A SAN
To configure a SAN, you must ensure that these requirements are implemented:
1.
2.
3.
4.
5.
6.
7.
11 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Review Questions
How do you license the appropriate SAN
protocol on the storage system?
How do you create a volume or qtree for a
LUN?
REVIEW QUESTIONS
11 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
Managing FC or iSCSI
After licensing, the FC or iSCSI service can be
activated.
To manage the FC or iSCSI protocols, use the
command-line interface (CLI):
FC
system> fcp [subcommand]
iSCSI
system> iscsi [subcommand]
MANAGING FC OR ISCSI
11 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
To configure
licenses
2011 NetApp, Inc. All rights reserved.
11 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
Storage systems
node name
To configure
iSCSI
11 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
20
11 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Click here to
configure
Add storage
systems IP address
11 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
Storage system
is discovered
Click here to
connect
Click here to
accept the
connect method
11 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
23
11 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Creating LUNs
Create LUNs using one of the following
methods:
The CLI:
lun create
lun setup
24
CREATING LUNS
You can create a LUN by using one of the following methods:
This command only creates a LUN. When using this command, you must complete the following additional
configuration steps:
Use the lun setup command on the storage system. This command is a wizard that walks you through
creating and mapping the LUN and igroup.
Use NetApp System Manager on a client host.
Use SnapDrive data management software on a client host.
11 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
11 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
11 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
11 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
11 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
11 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
11 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
31
11 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
To configure
LUNs
11 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
Recommended workflow
creates a FlexVol
container if possible
(1X + autogrow, autodelete)
2011 NetApp, Inc. All rights reserved.
11 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
11 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
35
11 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
36
11 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
11 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
38
11 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
39
11 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
Accessing a LUN
ACCESSING A LUN
11 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
41
Select Disk
Management
11 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
The LUN
appears
The LUN
is offline
Right-click
and select
Initialize.
2011 NetApp, Inc. All rights reserved.
11 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
45
11 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
46
11 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SAN Management
SAN MANAGEMENT
11 - 46
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
47
SAN Management
NetApp provides a number of SAN
management techniques to simplify block
storage administration.
This module focuses on:
SnapDrive data management software
NetApp DataMotion for Volumes data migration
software
NAS and SAN traffic over the same connection
with NetApp Unified Connect
SAN MANAGEMENT
11 - 47
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
48
SnapDrive
SnapDrive software can create a LUN on the
storage system and automatically attach it to
the client host.
SnapDrive software, which ensures consistent
LUN Snapshot copies, is available:
On the Support site to manage a LUN from a
supported Client
For the Windows, Oracle Solaris, Linux,
IBM AIX, and HP-UX platforms
NOTE: If SnapDrive software is used to create a LUN, you must use
SnapDrive to manage that LUN. Do not use the CLI to delete, rename, or
otherwise manage a LUN that was created by SnapDrive.
2011 NetApp, Inc. All rights reserved.
49
SNAPDRIVE
SnapDrive is server management software for Windows 2000 Server, Windows Server 2003, and Windows
Server 2008 systems. SnapDrive provides virtual-disk and Snapshot management on the client side. Use
SnapDrive to create FC or iSCSI LUNs on a Windows host.
SnapDrive includes three main components:
1. Windows 2000 service
2. Microsoft Management Console (MMC) plug-in
3. CLI
SnapDrive includes the same features of the lun setup command on the storage system, but can also add
LUNs to the Windows host and integrate the use of LUNs into other NetApp applications, such as
SnapManager management software.
11 - 48
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
2. Cutover Phase
aggr1
aggr2
LUN
50
NetApp DataMotion
for Volumes
Protocols supported
NFS, iSCSI
Moves data
8.0.1+
Management
CLI only
vFiler support
11 - 49
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Pause move:
system> vol move pause src_vol
Resume move:
system> vol move resume src_vol
Abort move:
system> vol move abort src_vol
51
11 - 50
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Unified Connect
In the Data ONTAP 8.0.1 7-Mode operating system, NetApp introduces
Unified Connect:
Host
Bus
Adapter
Converged
Network
Adapter
L1
L2 MGMTO
MGMT1
CONSOLE
10 11
12
13
14 15
16
17
10 19
20
N5K-M1008
PS2
PS1
SLOT2
10-Gb Connections
PROPERLY SHUT DOWN SYSTEM BEFORE OPENING CHASSIS.
PCI 1
PCI 3
PCI 2
LNK
0a
0b
e0a
e0b
RLM
LNK
PCI 4
e0c
e0d
LNK
0c
0d
LNK
52
UNIFIED CONNECT
In data the ONTAP 8.0.1 7-Mode operating system, NetApp is pleased to introduce Unified Connect, which
supports both FCoE and IP-based traffic over the same 10-Gb connection. Unified Connect enables standard
Fibre Channel (FC) host bus adapter (HBA) traffic from the host initiator to be mapped to the unified target
adapter (UTA) on the storage. Unified Connect supports complete end-to-end connection between a
converged network adapter (CNA) and the UTA. For more information, please see the NetApp Unified
Connect Technical Overview and Implementation Web-based course.
11 - 51
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
53
11 - 52
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
Explain the purpose of a SAN
Identify supported SAN configurations
Distinguish between FC, FCoE, and iSCSI protocols
Define a LUN and explain LUN attributes
Use the lun setup command and NetApp System
Manager to create iSCSI-attached LUNs
Access and manage a LUN from a Windows host
Define SnapDrive data management software and its
features
MODULE SUMMARY
11 - 53
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
54
Exercise
Module 11: SAN
Estimated Time: 45 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
11 - 54
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11 - 55
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
56
Snapshot Copies
Module 12
Data ONTAP 7-Mode Administration
SNAPSHOT COPIES
12 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Describe the function of Snapshot copies
Explain the benefits of Snapshot copies
Identify and execute Snapshot commands
Create and delete Snapshot copies
Configure and modify Snapshot options
Explain the importance of the .snapshot directory
Describe how Snapshot technology allocates disk
space for volumes and aggregates
Schedule Snapshot copies
Configure and manage the Snapshot copy reserve
MODULE OBJECTIVES
12 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Overview
OVERVIEW
12 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Snapshot Technology
A Snapshot copy is a read-only image of the active file
system at a point in time.
The benefits of Snapshot technology are:
Nearly instantaneous application data backups
Fast recovery of data lost due to:
Accidental data deletion
Accidental data corruption
SNAPSHOT TECHNOLOGY
Snapshot technology is a key element in the implementation of the WAFL (Write Anywhere File Layout)
file system:
A Snapshot copy is a read-only, space-efficient, point-in-time image of data in a volume or aggregate.
A Snapshot copy is only a picture of the file system, and it does not contain any data file content.
Snapshot copies are used for backup and error recovery.
The Data ONTAP operating system automatically creates and deletes Snapshot copies of data in volumes to
support commands that are related to Snapshot technology.
12 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk Blocks
Active Data
Snapshot
File or LUN X
File or LUN X
12 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Changing Data
Disk Blocks
Active Data
Snapshot
File or LUN X
File or LUN X
New
Data
CHANGING DATA
Snapshot copies begin to use space when data is deleted or modified. The WAFL file system writes the new
data to a new block (C) on the disk and changes the root structure for the active file system to point to the
new block.
Meanwhile, the Snapshot copy still references the original block C. Any time that a Snapshot copy references
a data block, the block remains unavailable for other uses, which means that Snapshot copies start to consume
disk space only when the file system changes after a Snapshot copy is created.
12 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Inodes
An inode is a 192-byte data structure that is
used to represent file system objects, such as
files and directories.
An inode describes a files attributes, including
this information:
INODES
WAFL inodes are similar to Berkeley FFS (Fast File System) inodes. Veritas and Microsoft file systems
are based on the Berkeley FFS, which forces writes to preallocated locations. The primary difference is in the
way that the WAFL file system writes contiguous data and metadata blocks to the next available block instead
of to predefined locations.
The most important metadata file is the root inode, which contains the inodes that describe all of the other
files in the file system. The root inode has a fixed disk location.
12 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Managing Inodes
If there are no inodes available, the system
cannot write files or take Snapshot copies.
To verify the number of inodes:
system> df -i
MANAGING INODES
For file sizes between 64 GB and 8 TB, the single-indirect blocks in Level 3 inodes become double-indirect
blocks. These double-indirect blocks reference 1024 single-indirect blocks, which then reference up to 1024
4-KB data blocks.
df -i
The df -i command displays the number of inodes in a volume. For more information about this command,
see the manual pages (using the man command).
maxfiles
The maxfiles command increases the number of inodes that are designated in a volume. For more
information about this command, see the manual pages.
12 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Creating Snapshot
Copies
12 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
Volumes
The volume default for Snapshot copy reserve is 20% of the
volume.
Administrators can restore the entire volume or one or more
files.
11
12 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Aggregate Space
Flexible Volumes
Active File
System
80%
Snap Reserve
20%
12 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
13
12 - 13
RESULT
Creates a Snapshot copy called test in the
engineering volume.
Lists all available Snapshot copies in the
engineering volume.
Deletes the Snapshot copy test in the
engineering volume.
Deletes all Snapshot copies in vol2.
Renames the Snapshot copy from nightly.0 to
firstnight.0 in the engineering volume.
Changes the Snapshot copy reserve to 25% on
vol2.
Sets the automatic schedule on vol2 to save
these weekly Snapshot copies: 0 weekly, 2
nightly, and 6 hourly at 8 a.m., 12 p.m., 4 p.m.,
and 8 p.m.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
12 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
Be certain that
LUN snapshot copies
are consistent.
12 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
Scheduling Snapshot
Copies
12 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
Retains:
Two most recent nightly
Six most recent hourly
18
12 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Snapshot Schedule
To print the current schedule for all volumes:
system> snap sched
Example:
system> snap sched vol2 0 2 6@8,12,16,20
19
SNAPSHOT SCHEDULE
The snap sched command sets a schedule to automatically create Snapshot copies and specifies how many
of each type are stored. When the limit is reached, the oldest Snapshot copy for each interval is deleted and
replaced by a new Snapshot copy.
This example shows a default schedule, which specifies that Snapshot copies will be made at 8:00, 12:00,
16:00, and 20:00 (24-hour time), and that the two most recent daily Snapshot copies and the six most recent
hourly Snapshot copies will be kept.
Snapshot copies are like a picture of a volume. The only difference between a weekly Snapshot copy and a
nightly or hourly copy is the time at which the Snapshot copy is created and any data that has changed
between the Snapshot copies.
12 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
volumes
12 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
12 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
12 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Restoring Snapshot
Copies
12 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
Recovering Data
When you recover data, you have two options:
Copy the data from a Snapshot copy.
Use SnapRestore data recovery software.
RECOVERING DATA
Using Snapshot Copies to Recover Data
To recover data, you can:
Restore a file from a Snapshot copy
Use SnapRestore data recovery software (license required)
To restore a file from a Snapshot copy:
1. Locate the Snapshot copy that contains the correct version of the file.
2. Restore the file from the .snapshot directory.
12 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
25
Make the .snapshot directory invisible to clients and turn off access to the .snapshot directory. Setting the
nosnapdir option to on disables access to the Snapshot directory that is present at client mountpoints
and at the root of CIFS directories, and makes the Snapshot directories invisible. (NFS uses .snapshot for
directories, and CIFS uses ~snapshot.) By default, the nosnapdir option is off (directories are visible).
To make the ~snapshot directory visible to CIFS clients:
1.
2.
NOTE: You must also ensure that Show Hidden Files and Folders is enabled on your Windows system.
1.
12 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
mnt
etc
usr
var
system
vol0
.snapshot Directory
home
.snapshot Directory
nightly.0
Directory
nightly.1
Directory
nightly.0
Directory
nightly.1
Directory
Files on vol0
Files on vol0
(as of previous (as of nightmidnight)
before-last)
26
12 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
other
other
other
other
other
other
other
other
other
other
12288
12288
12288
12288
12288
12288
12288
12288
12288
12288
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
Jan
29
29
29
29
29
29
29
29
29
29
16:19
16:19
16:19
16:19
16:19
16:19
16:19
16:19
16:19
16:19
hourly.0
hourly.1
hourly.2
hourly.3
hourly.4
hourly.5
nightly.0
nightly.1
weekly.1
weekly.2
27
12 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
12 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
In this example,
/etc/rc was changed
and then a
Snapshot copy
of vol0 was made.
2011 NetApp, Inc. All rights reserved.
12 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
SNAP1
MYFILE
MYFILE
30
12 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SNAP1
MYFILE
MYFILE
31
12 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SNAP1
MYFILE
MYFILE
12 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
SNAP1
MYFILE
MYFILE
12 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
SNAP1
MYFILE/MYFILE2
MYFILE
12 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
35
The Data ONTAP operating system displays a warning message and prompts you to confirm your decision to
revert the file. Press Y to confirm that you want to revert the file. If you do not want to proceed, enter Ctrl-C
or N for no.
If the file already exists in the active file system, it will be overwritten by the version in the Snapshot copy.
12 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
36
12 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FlexClone Technology
FLEXCLONE TECHNOLOGY
12 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
38
12 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FlexVol Volume
Parent
Snapshot
copy of
Parent
Clone
Modifications of the
original volume are
separate from
modification of the
cloned volume.
Result: Independent
volume copies are
efficiently stored.
39
FlexClone volumes are a point-in-time, writable copy of the parent volume. Changes made to the parent
volume after the FlexClone volume is created are not reflected in the FlexClone volume.
You can only clone FlexVol volumes. To create a copy of a traditional volume, you must use the
vol copy command, which creates a distinct copy with its own storage.
FlexClone volumes are fully functional volumes that are managed, as with the parent volume, by using
the vol command. Likewise, FlexClone volumes can be cloned.
FlexClone volumes always exist in the same aggregate as parent volumes.
FlexClone volumes and parent volumes share the same disk space for common data. This means that
creating a FlexClone volume is instantaneous and requires no additional disk space (until changes are
made to the clone or parent).
A FlexClone volume is created with the same space guarantee as the parent.
You can sever the connection between the parent and the clone. This is called splitting the FlexClone
volume. Splitting removes all restrictions on the parent volume and causes the FlexClone to use its own
storage.
IMPORTANT: Splitting a FlexClone volume from its parent volume deletes all existing Snapshot copies of
the FlexClone volume and disables the creation of new Snapshot copies while the splitting operation is in
progress.
Quotas that are applied to a parent volume are not automatically applied to the clone.
When a FlexClone volume is created, existing LUNs in the parent volume are also present in the
FlexClone volume, but these LUNs are unmapped and offline.
12 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
12 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
41
12 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
42
Splitting Volumes
Volume 1
Snapshot Copy
of Volume 1
Cloned
Volume
43
SPLITTING VOLUMES
Splitting a FlexClone volume from its parent removes any space optimizations that are currently employed by
the FlexClone volume. After the split, both the FlexClone volume and the parent volume require the full
space allocation that is specified by their space guarantees. After the split, the FlexClone volume becomes a
normal FlexVol volume.
When splitting clones, consider these important facts:
When you split a FlexClone volume from its parent, all existing Snapshot copies of the FlexClone volume
are deleted.
During the split operation, no new Snapshot copies of the FlexClone volume can be created.
Because the clone-splitting operation is a copy operation that could take some time to complete, the Data
ONTAP operating system provides the vol clone split stop and vol clone split status
commands to stop clone-splitting or to check the status of a clone-splitting operation.
The clone-splitting operation is executed in the background and does not interfere with data access to
either the parent or the clone volume.
If you take the FlexClone volume offline while clone-splitting is in progress, the operation is suspended.
When you bring the FlexClone volume back online, the splitting operation resumes.
After a FlexClone volume and its parent volume have been split, they cannot be rejoined.
12 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
44
12 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Space Usage
SPACE USAGE
12 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
45
12 - 46
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
46
date
-----------Apr 20 12:00
Apr 20 10:00
Apr 20 08:00
%total
date
name
-------hourly.0
hourly.1
hourly.2
name
Scheduled Snapshot
copies are
automatically
renumbered as new
copies are made, so
that the most recent
copy is always 0.
This numbering
scheme ensures
that the file with the
highest number
is always the oldest.
47
%used: Shows the relationship between accumulated Snapshot copies and the total disk space that is
consumed by the active file system. Values in parentheses show the contribution of this individual
Snapshot copy.
%total: Shows the relationship between accumulated Snapshot copies and the total disk space that is
consumed by the volume. Values in parentheses show the contribution of this individual Snapshot copy.
date: Shows the date and time that the Snapshot copy was made. Time is indicated on the 24-hour clock
and, in this example, reflects the hours that are set in the automatic Snapshot copy schedule.
name: Lists the names of each of the saved Snapshot copies. Scheduled Snapshot copies are
automatically renumbered as new ones are created, so that the most recent copy is always 0. This
numbering scheme ensures that the file with the highest number (in this case, hourly.2) is always the
oldest Snapshot copy.
Examples: snap list
The examples that follow demonstrate how the %used values in the snap list command output relate to
the size of Snapshot copies, and how to determine which Snapshot copies to delete to reclaim the most space.
12 - 47
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
48
12 - 48
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Options
commitment
trigger
target_free_space
delete_order
defer_delete
prefix
Value
try, disrupt
volume, snap_reserve, space_reserve
1-100
oldest_first, newest_first
scheduled, user_created, prefix, none
<string>
12 - 49
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
49
disrupt
Deletes snapshot copies that are locked by applications that
move data (such as the SnapMirror application), dump data, and
restore data (mirror and dumps are aborted).
12 - 50
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
50
snap_reserve
The Snapshot copy reserve is full
space_reserve
The space that is reserved is nearly full (useful for
volumes with fractional_reserve < 100)
12 - 51
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
51
Using target_free_space
A snap autodelete stops when the free
space in the trigger criteria reaches a userspecified percentage.
This percentage is controlled by the value of
target_free_space.
The default percentage is 20%.
USING TARGET_FREE_SPACE
12 - 52
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
52
newest_first
Delete newest Snapshot copies first.
12 - 53
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
53
user_created
Delete the administrator-created Snapshot copies last.
prefix
Delete the Snapshot copies with names that match the prefix
string last.
12 - 54
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
54
12 - 55
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
55
Module Summary
In this module, you should have learned to:
Describe the function of Snapshot copies
Explain the benefits of Snapshot copies
Identify and execute Snapshot commands
Create and delete Snapshot copies
Configure and modify Snapshot options
Explain the importance of the .snapshot directory
Describe how Snapshot technology allocates disk
space for volumes and aggregates
Schedule Snapshot copies
Configure and manage the Snapshot copy reserve
MODULE SUMMARY
12 - 56
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
56
Exercise
Module 12: Snapshot Copies
Estimated Time: 60 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
12 - 57
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12 - 58
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
58
Space Management
Module 13
Data ONTAP 7-Mode Administration
SPACE MANAGEMENT
13 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
List storage efficiency techniques available within
the Data ONTAP operating system
State factors that impact space consumption in the
Data ONTAP operating system
Describe how and when a volume consumes
space from its containing aggregate
Explain how to guarantee writes for a file
Discuss how the Data ONTAP operating system
can provide more space to a full volume
State deduplication and compression techniques
available in the Data ONTAP operating system
2011 NetApp, Inc. All rights reserved.
MODULE OBJECTIVES
13 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Factors
FACTORS
13 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage
Costs
RAID-DP Technology
Thin Provisioning
Snapshot Technology
Capacity Requirements
13 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Space Reservations
Within a volume, whether it uses full provisioning or thin
provisioning, all files, whether a LUN or a NAS file, can:
Have space reservations (default for LUNs)
Requires reserving space within the volume so that the entire
file can be overwritten, even if blocks are retained by a
Snapshot copy
Writes to the file succeed
Requires simpler management
See the SAN Fundamentals on Data ONTAP Webbased course for more information on LUN reservations
2011 NetApp, Inc. All rights reserved.
SPACE RESERVATIONS
13 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Volume Space
Guarantee
13 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Space Guarantees
Space guarantee is an attribute of a volume that is reserved in (or
set aside from) the containing aggregate.
Space guarantee parameters:
volume (default): Reserves the FlexVol volumes total size within its
containing aggregate and allows for space-reserved or nonspacereserved files.
File (not recommended): Enables the creation of a spaceguaranteed file total size within its containing nonspace-reserved
FlexVol volume.
none: Does not reserve any space for the FlexVol volume within its
containing aggregate, and allows for only nonspace-guaranteed files
SPACE GUARANTEES
13 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
To configure
volumes
13 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
aggr1
df -Ag aggr1
Active
File
System
(AFS)
Total
Used
Avail
AFS (95%)
85
85
SSR (5%)
Snapshot
Reserve
(SSR)
Icon
Description
aggr1
36-GB disk
13 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
aggr1
df g vol1
Total
Used
Avail
AFS (80%)
24
24
SSR (20%)
Total
Used
Avail
AFS (95%)
85
30
54
SSR (5%)
df Ag aggr1
Icon
Description
aggr1
36-GB disk
Default is volume
space guarantee
13 - 11
vol1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
aggr1
df -g vol2
Total
Used
Avail
AFS (80%)
24
24
SSR (20%)
Total
Used
Avail
AFS (95%)
85
30
54
SSR (5%)
df Ag aggr1
Icon
Description
aggr1
36-GB disk
vol2
With a space
guarantee of none
13 - 12
vol1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
aggr1
df -g vol2
Total
Used
Avail
AFS (80%)
24
24
SSR (20%)
Total
Used
Avail
AFS (95%)
85
54
30
SSR (5%)
df Ag aggr1
Icon
Description
aggr1
36-GB disk
vol2
With a space
guarantee of none
13 - 13
vol1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
13 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
File Types
Within volumes, files can be either:
Normal: The size of the file represents the
amount of data within the file.
foo
Physical data
FILE TYPES
13 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
aggr1
df g vol3
vol3
Total
Used
Avail
AFS (80%)
24
24
SSR (20%)
Total
Used
Avail
AFS (95%)
85
54
30
SSR (5%)
df Ag aggr1
Icon
Description
aggr1
36-GB disk
vol2
With file
space guarantee
13 - 16
vol1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
aggr1
df g vol3
foo
vol3
Total
Used
Avail
AFS (80%)
24
10
14
SSR (20%)
Total
Used
Avail
AFS (95%)
85
64
20
SSR (5%)
df -Ag aggr1
Icon
Description
aggr1
36-GB disk
vol2
With file
space guarantee
13 - 17
vol1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
aggr1
df g vol3
foo
Total
Used
Avail
AFS (80%)
24
10
14
SSR (20%)
Total
Used
Avail
AFS (95%)
85
74
10
SSR (5%)
df Ag aggr1
Icon
Description
aggr1
36-GB disk
vol3
foo2
vol2
With file
space guarantee
13 - 18
vol1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
13 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
13 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
Options
commitment
trigger
target_free_space
delete_order
defer_delete
prefix
Value
try, disrupt
volume, snap_reserve, space_reserve
1-100
oldest_first, newest_first
scheduled, user_created, prefix, none
<string>
13 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
Volume Autosize
You might want to grow the volume.
The vol autosize command determines if a
volume should grow when it is nearly full.
Set at volume level
Possible values:
On
Increment size (default 5% of original size)
Maximum size (default 120% of original size)
Off
system> vol autosize vol [-m size[k|m|g|t]]
[-i size[k|m|g|t]] [on|off|reset]
VOLUME AUTOSIZE
13 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Administrators Choice
Administrators can choose which procedure to
employ first:
snapshot auto delete
vol autosize
Use the volume option:
try_first
Possible values:
snap_delete
volume_grow (default)
Example:
vol options vol try_first snap_delete
2011 NetApp, Inc. All rights reserved.
ADMINISTRATORS CHOICE
13 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
Deduplication
DEDUPLICATION
13 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
Storage
Costs
RAID-DP
Thin Provisioning
Snapshot Technology
Deduplication
Capacity Requirements
13 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
Deduplication
NetApp deduplication:
20:1 or greater for backup
Integrated with the Data
ONTAP operating system:
NetApp Deduplication
General-purpose volume
deduplication
Identifies and removes
redundant data blocks
Application agnostic:
Before
After
Primary storage
Backup data
Archival data
Service: Runs as a
background process and is
transparent to any client
26
DEDUPLICATION
Deduplication can be thought of as the process of unduplicating data. The term deduplication was first
coined by database administrators many years ago as a way of describing the process of removing duplicate
records after two databases had been merged.
In the context of disk storage, deduplication refers to any algorithm that searches for duplicate data objects
(for example, blocks, chunks, files) and discards those duplicates. When duplicate data is detected, it is not
retained, but instead a data pointer is modified so that the storage system references an exact copy of the
data object that is already stored on disk. This deduplication feature works well with datasets that have a lot of
duplicated date (for example, full backups).
When NetApp deduplication is configured, it runs as a background process that is transparent to any client
that accesses data from a storage system. This feature allows a reduction of storage costs by reducing the
actual amount of data that is stored over time. For example, if a 100-GB full backup is made on the first night,
and then a 5-GB change in the data occurs during the next day, the second nightly backup only needs to store
the 5 GB of changed data. This amounts to a 95% spatial reduction on the second backup. A full backup can
yield more than a 90% spatial reduction with incremental backups averaging about 30% of the time. With
nonbackup scenarios, such as with virtual machine images, gains of up to 40% space savings can be realized.
To estimate your own savings, please visit the NetApp deduplication calculator at
http://www.dedupecalc.com.
13 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Deduplication in Action
presentation.ppt
= Identical blocks
Original file
20 blocks
presentation.ppt
Identical file
20 blocks
presentation.ppt
Edited file
10 blocks added
2011 NetApp, Inc. All rights reserved.
27
DEDUPLICATION IN ACTION
In this example, one user creates a PowerPoint presentation (presentation.ppt) that is 20 blocks in size. This
presentation is then copied to another location by another user. Finally, a third user copies the presentation to
a third location and edits the file, adding 10 blocks.
When these files are stored on a storage system with deduplication configured, the original presentation file is
saved, but the second copy (because it is identical to the original) merely references the original files location
on the storage system. The third location of the presentation file is not completely duplicated. Because the
third user edited the file, the edits are saved to the storage system, but all unedited blocks are referenced back
to the original file.
With NetApp deduplication, 30 blocks are used to store a total of 70 blocks worth of data. This is a 58%
space savings.
13 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Gatherer File
Gathering
qsort
qsort
...
qsort
Merge Sort
Sorting
Fingerprint
File
28
13 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Sort by Inode
Update Inode
Duplicate
Entry File
qsort
qsort
...
Block Ref
Count File
qsort
Merge Sort
Fingerprint
File
29
13 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Change
Log File
Change
Log File
Fingerprint
File
30
13 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Change
Log File
qsort
qsort
...
Change
Log File
qsort
Merge Sort
Fingerprint
File
31
13 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Byte-by-byte comparison
Count file update
Update inode
Change
Log File
Change
Log File
Sort by Inode
Update Inode
Duplicate
Entry File
qsort
qsort
...
Block Ref
Count File
qsort
Merge Sort
Fingerprint
File
32
13 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Change
Log File
Change
Log File
Fingerprint
File
SIS Check
33
13 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Block Write
Gather
Byte-by-byte comparison
Count file update
Update inode
Change
Log File
Gatherer File
Change
Log File
Sort by Inode
Update Inode
Gathering
Duplicate
Entry File
qsort
qsort
...
qsort
Block Ref
Count File
Deduplicating
Merge Sort
Sorting
Fingerprint
File
SIS Check
Checking
34
13 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Configuration Overview
License it:
system> license add license
Turn it on:
system> sis on vol
For maintenance:
system> sis status [-l] vol
system> sis check
35
CONFIGURATION OVERVIEW
To configure NetApp deduplication, you must first license it on the storage system. Use the license add
command to perform this task. Next, you must use the sis on command to turn it on for the volume that
you want to deduplicate.
If data already exists on the storage system volume that you want to deduplicate, run the sis start -s
command on the volume. This command scans the file system to collect fingerprints of each data block and
sorts the fingerprints to identify duplicate blocks. Each fingerprint entry maps a fingerprint value to the
location of a disk block: [fingerprint value, block location]. This data structure enables you to query blocks
based on block contents.
You can use the sis config command to configure the system to run the deduplication process at a
particular time. The storage administrator can then run the sis start command to process fingerprints that
are present in the change log (because they were recorded when data was written to disk). During this step,
new duplicate blocks are eliminated, and a list of new fingerprints is added to the database. You can perform
this step manually by running the sis start command, or the step can be triggered automatically by a
scheduled deduplication process.
The storage administrator can view sis status to verify the status of the deduplication operation and use
df -s to view the amount of space savings.
NOTE: When files are removed, the fingerprints are not automatically purged. Stale fingerprints are purged
after a certain threshold is reached, or when a sis check command is run explicitly on the volume.
13 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Configuring Deduplication
system> sis on /vol/vol1
SIS for "/vol/vol1" is enabled.
Already existing data could be processed by running
"sis start -s /vol/vol1".
36
CONFIGURING DEDUPLICATION
Here is an example of turning on deduplication on a volume named vol1.
Next, the storage administrator scans the volume to identify current space savings and adds the existing datas
fingerprint records to the fingerprint database by using the sis start -s command.
13 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Verifying Deduplication
system> sis status /vol/vol1
Path
/vol/vol1
Enabled
State
Active
Status
12 GB
Progress
Scanned
State
Enabled
Status
Idle
Progress
Idle for 00:01:26
system> df -s /vol/vol1
Filesystem
/vol/vol1
used
20568268
saved
3768732
%saved
15%
37
VERIFYING DEDUPLICATION
Here, the storage administrator uses the sis status command to confirm the initialization scan progress
that was started with the sis start -s command. When the system is idle, the amount of time that the
process has been idle appears in response to the sis status command. Finally, a storage administrator can
verify the amount of savings by using the df -s command.
13 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Sorting
Deduplicating
Checking
Path
State
/vol/vol1
Enabled
Path
State
/vol/vol1
Enabled
Status Progress
Active
25 MB Scanned
Status Progress
Active
25 MB Searched
Path
State
/vol/vol1
Enabled
Status Progress
Path
State
/vol/vol1
Enabled
Active
30 MB Verified
Enabled
Active
10% Merged
Active
40 MB (20%) done
Status Progress
OR
/vol/vol1
38
13 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Scheduling Deduplication
Default schedule:
system> sis on /vol/vol1
system> sis status
/vol/vol1
sun-sat@0
To configure a schedule:
system>
system>
system>
system>
sis
sis
sis
sis
config
config
config
config
-s
-s
s
s
- /vol/vol1
23@sun-fri /vol/vol1
auto /vol/vol1
sat@6 /vol/vol1
Verify:
system> vol status
Volume
State
Status
Options
Vol0
online
raid_dp, flex root
Vol1
online
raid_dp, flex sis
39
SCHEDULING DEDUPLICATION
By default, deduplication occurs at midnight every day. You can configure the schedule by using the
sis config command.
You can specify the schedule (-s) parameter in one of four ways:
1. Specify "-" to specify that there should be no scheduled deduplication operation on the flexible volume.
2. List the hours, and enter the @ sign separator, followed by the day list.
3. Specify auto to indicate that deduplication should run on the flexible volume whenever there are 20%
new fingerprints in the change log.
4. List the days, and enter the @ sign separator, followed by the hours list.
13 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Deduplication
license is added
13 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
System
Memory
2040
3040
3050
3070
3140
3160
3170
3210
3240
3270
6030
6040
6070
6080
6210
6240
6280
4GB
4GB
4GB
8GB
4GB
8GB
16GB
5GB
8GB
20GB
16GB
16GB
32GB
32GB
24GB
48GB
96GB
Data ONTAP
Data ONTAP Data ONTAP Data ONTAP
Data ONTAP 8.0.0
Data ONTAP 8.0.0
8.0.0
8.0.1
8.0.1
8.0.1
Max Flex Vol Size
Max Dense Total
Max Dense
Max Flex Vol Max Dense Vol Max Dense
(TB)
Data (TB)
Vol Size (TB)
Size (TB)
Size (TB)
Total Data (TB)
30
35
35
50
50
50
100
3
4
3
16
4
16
16
19
20
19
32
20
32
32
80
80
100
100
16
16
16
16
32
32
32
32
30
35
35
50
50
50
100
50
50
70
80
80
100
100
100
100
100
16
16
16
16
16
16
16
16
16
16
16
16
16
16
16
16
16
32
32
32
32
32
32
32
32
32
32
32
32
32
32
32
32
32
41
R200
2020
2050
3020
3050
3040
3140
3210
3070
3160
3240
3170
6030
6040
3270
6070
6080
13 - 41
6GB
1GB
2GB
2GB
3GB
4GB
4GB
5GB
8GB
8GB
8GB
16GB
16GB
16GB
20GB
32GB
32GB
16
7
16
16
16
16
16
4
0.5
1
1
2
3
3
20
16.5
17
17
18
19
19
16
16
6
6
22
22
16
16
16
10
10
10
26
26
26
16
16
16
16
32
32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
4
1
2
2
3
4
4
4
16
16
16
16
16
16
16
16
16
20
17
18
18
19
20
20
20
32
32
32
32
32
32
32
32
32
Compression
COMPRESSION
13 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
42
Storage
Costs
RAID-DP Technology
Thin Provisioning
Snapshot Technology
Deduplication
Data Compression
Capacity Requirements
13 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
43
Compression Only
Dedupe Only
Dedupe + Compression
70%
Storage Savings
60%
50%
40%
30%
20%
10%
0%
Use Cases
13 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Compression Requirements
Compression requires:
Data ONTAP 8.0.1 7-Mode operating system or later
Formal NetApp approval with written agreement
(Policy Variance Request or PVR)
Implementation:
Add a free compression and deduplication license
Enable compression for each FlexVol volume
FlexVol volumes in 64-bit aggregates only
16 TB maximum size
COMPRESSION REQUIREMENTS
13 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
45
RAID-DP Technology
Thin Provisioning
Snapshot Technology
Deduplication
Compression
Thin Replication
Virtual Copies
The Effect of
NetApp Storage Efficiency
Capacity Requirements
46
13 - 46
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
List storage efficiency techniques available within the
Data ONTAP operating system
State factors that impact space consumption in the
Data ONTAP operating system
Describe how and when a volume consumes space
from its containing aggregate
Explain how to guarantee writes for a file
Discuss how the Data ONTAP operating system can
provide more space to a full volume
State deduplication and compression techniques
available in the Data ONTAP operating system
2011 NetApp, Inc. All rights reserved.
MODULE SUMMARY
13 - 47
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
47
Exercise
Module 13: Space Management
Estimated Time: 45 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
13 - 48
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13 - 49
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
49
High Availability
Module 14
Data ONTAP 7-Mode Administration
HIGH AVAILABILITY
14 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Describe high-availability (HA) solutions
Discuss how high availability increases the
reliability of storage
Define HA controller configuration
Describe the three modes of HA operation with
an HA pair
Analyze how high availability affects client
protocols during failover and giveback
operations
MODULE OBJECTIVES
14 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
HA Spectrum
High availability is the process of providing
solutions that increase storage
resiliency.
Loss
of a
Building
Loss
of a
Loss Shelf
of a
Cable
Loss
of a
Site
Loss
of a
Controller
NetApp solutions
help you overcome all of these
business continuity problems.
HA SPECTRUM
14 - 3
Loss
of a
Region
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Loss of a Cable
Use shelf multipathing to protect against loss of
a cable.
Loss
of a
Building
Loss
of a
Loss Shelf
of a
Cable
Loss
of a
Site
Loss
of a
Controller
LOSS OF A CABLE
14 - 4
Loss
of a
Region
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Shelf Multipathing
3
A single cable
creates a
potential
vulnerability
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
0c
0d
LINK LINK
LINK
LINK
1Gb ELP
X2
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
Adding a second
cable provides
availability even
if a single cable
fails.
LINK LINK
0b
4Gb 2Gb
A
B
ESH4
4Gb 2Gb
1Gb ELP
Multipathing provides:
1. Increased availability
2. Increased throughput
2011 NetApp, Inc. All rights reserved.
SHELF MULTIPATHING
14 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Loss of a Shelf
Implement SyncMirror software to protect
against the loss of a shelf (a mirrored
implementation).
Loss
of a
Building
Loss
of a
Loss Shelf
of a
Cable
Loss
of a
Site
Loss
of a
Controller
LOSS OF A SHELF
14 - 6
Loss
of a
Region
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SyncMirror Software
Can be configured:
In an HA pair (the most common configuration)
In a stand-alone storage system
plex1
plex0
/vol
Data within
the aggregate
aggr1
/vol
/vol0
/etc
/vol0
Mirrored data
within the aggregate
/etc
SYNCMIRROR SOFTWARE
SyncMirror protects against data loss by maintaining two copies of the data contained in the aggregate, one
in each plex. Any data loss due to disks failure in one plex is repaired by the undamaged data in the other
plex.
14 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0a
e0b
RLM
e0c
e0d
e0a
e0b
RLM
e0c
e0d
0d
FC
0d
0e
LVD SCSI
0e
LVD SCSI
AC
AC
status
status
A
B
X2
X2
Pool0
1Gb 2Gb 4Gb
SHELF
ID
ESH4
4Gb 2Gb
1Gb ELP
A
B
X2
Pool1
1Gb 2Gb 4Gb
SHELF
ID
FC
0c
X2
Pool0 - 0a and 0b
and HBAs attached
to slots 1-2
0c
ESH4
0b
1Gb ELP
0b
FC
4Gb 2Gb
FC
0a
PCI 4
DISCONNECT AC POWER
CORD BEFORE REMOVAL
Pool1 - 0c and 0d
and HBAs attached
to slots 3-4
ESH4
0a
PCI 2
1Gb ELP
Console
PCI 3
4Gb 2Gb
Console
PCI 1
ESH4
4Gb 2Gb
1Gb ELP
14 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0b
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0d
LINK
4Gb 2Gb
1Gb ELP
ESH4
X2
X2
ESH4
Pool1
1Gb 2Gb 4Gb
SHELF
ID
1Gb ELP
A
B
X2
X2
Pool0
1Gb 2Gb 4Gb
SHELF
ID
ESH4
4Gb 2Gb
1Gb ELP
14 - 9
0c
LINK LINK
4Gb 2Gb
0b
LINK
ESH4
e0a
1Gb ELP
4Gb 2Gb
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Double the
number of
needed
disks
10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0b
e0c
e0d
e0e
0a
e0f
LINK
X2
Pool0
SHELF
ID
4Gb 2Gb
0c
LINK LINK
0d
LINK
1Gb ELP
ESH4
ESH4
4Gb 2Gb
X2
Pool1
1Gb 2Gb 4Gb
SHELF
ID
1Gb ELP
A
B
ESH4
4Gb 2Gb
1Gb ELP
14 - 11
0b
LINK
X2
LINK LINK
X2
LINK
ESH4
e0a
1Gb ELP
4Gb 2Gb
Nondisruptive shelf
replacement (NDSR) is
now available in Data
ONTAP 7.3.2 and later.
If multiple disks fail in
an aggregate, data is
still available from the
alternate pool.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
14 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
Loss of a Controller
Use an HA controller configuration to protect
against loss of a controller.
Loss
of a
Building
Loss
of a
Loss Shelf
of a
Cable
Loss
of a
Site
Loss
of a
Controller
LOSS OF A CONTROLLER
14 - 13
Loss
of a
Region
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
HA Controller Configuration
X3149A
X3149A
4
LNK
system
LNK
ACT
ACT
5
INT LNK
INT LNK
LNK
LNK
ACT
e0c
e0d
e0e
0a
e0f
0b
LINK
0c
LINK LINK
0d
e0a
e0b
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
4Gb 2Gb
1Gb ELP
A
B
X2
X2
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0c
LINK
LINK
ESH4
LINK LINK
1Gb ELP
LINK
X2
e0b
SHELF
ID
e0a
4Gb 2Gb
system2
ACT
ESH4
4Gb 2Gb
1Gb ELP
A
B
ESH4
4Gb 2Gb
1Gb ELP
14
HA CONTROLLER CONFIGURATION
In an HA configuration, the controllers of two storage systems (nodes) are connected to each other either
directly or through switches.
The nodes are connected to each other through a cluster adapter or NVRAM adapter, which allows one node
to serve data to the disks on its partner if the partner node fails. Each node continually monitors its partner,
mirroring data for the partners NVRAM.
14 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
X3149A
4
LNK
system
LNK
ACT
ACT
5
INT LNK
INT LNK
LNK
LNK
ACT
e0c
e0d
e0e
0a
e0f
0b
LINK
0c
LINK LINK
0d
e0a
e0b
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
4Gb 2Gb
1Gb ELP
A
B
X2
X2
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0c
LINK
LINK
ESH4
LINK LINK
1Gb ELP
LINK
X2
e0b
SHELF
ID
e0a
4Gb 2Gb
system2
ACT
ESH4
4Gb 2Gb
1Gb ELP
A
B
ESH4
4Gb 2Gb
1Gb ELP
Fault tolerance
Nondisruptive software upgrades
Nondisruptive hardware maintenance
15
Fault tolerance: When one node fails or becomes impaired, a takeover occurs and the partner node
continues to serve the data of the failed node.
Nondisruptive software upgrades: When you halt one node and allow takeover, the partner node
continues to serve data for the halted node, allowing you to upgrade the halted node. For more
information about nondisruptive software upgrades, see the Data ONTAP Upgrade Guide.
Nondisruptive hardware maintenance: When you halt one node and allow takeover, the partner node
continues to serve data for the halted node, allowing you to replace or repair hardware on the halted node.
14 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
Both Fibre Channel (FC) and SATA storage types are supported in standard HA configurations, if the two
storage types are not mixed on the same loop.
A node can have exclusively FC storage and the partner node can have exclusively SATA storage.
Cluster interconnect adapters and cables must be installed.
Nodes must be attached to the same network and the network interface cards must be configured
correctly.
System features such as CIFS, NFS, or SyncMirror software must be licensed and enabled on both nodes.
14 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Partner Communication
In an HA controller configuration, partners
communicate through the interconnect with a
heartbeat.
The system state is written to disk in a mailbox.
Data not committed to disk is written to the local
and partner nonvolatile RAM (NVRAM).
17
PARTNER COMMUNICATION
To ensure that each node in an HA controller configuration maintains the correct and current status of its
partner node, heartbeat information and node status are stored on each node in the mailbox disks.
Mailbox disks are a redundant set of disks used in coordinating takeover and giveback operations. If one node
stops functioning, the surviving partner node uses the information on the mailbox disks to perform takeover
processing, which creates a virtual storage system.
If an interconnect failure occurs, the mailbox heartbeat information prevents an unnecessary failover from
occurring. Moreover, if the HA configuration information that is stored on the mailbox disks is not
synchronized during boot, the HA controller nodes automatically resolve the situation. The FAS system
failover process is extremely robust, preventing split-brain issues from occurring.
14 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage System 2
Storage
System
NVLOG
Storage
System 2
NVLOG
Storage
System 2
NVLOG
(mirror)
Storage
System
NVLOG
(mirror)
18
14 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
14 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Value
Date
date, rdate
NDMP
route
Route
Time zone
timezone
20
14 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Normal Operation
X3149A
X3149A
4
LNK
system
LNK
ACT
ACT
5
INT LNK
INT LNK
LNK
LNK
ACT
e0c
e0d
e0e
0a
e0f
0b
LINK
0c
LINK LINK
0d
e0a
e0b
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
4Gb 2Gb
1Gb ELP
A
B
X2
X2
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0c
LINK
LINK
ESH4
LINK LINK
1Gb ELP
LINK
X2
e0b
SHELF
ID
e0a
4Gb 2Gb
system2
ACT
ESH4
4Gb 2Gb
1Gb ELP
A
B
ESH4
4Gb 2Gb
1Gb ELP
NORMAL OPERATION
14 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
Takeover Operation
X3149A
X3149A
4
LNK
system
e0e
0a
e0f
0b
0c
LINK LINK
0d
e0a
e0b
e0c
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
4Gb 2Gb
1Gb ELP
A
B
X2
X2
ESH4
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0d
LINK
LINK
1Gb ELP
LINK LINK
X2
e0d
LINK
LINK
system2
ACT
SHELF
ID
e0c
LNK
ACT
4Gb 2Gb
e0b
5
INT LNK
system2
e0a
ACT
5
INT LNK
LNK
LNK
ACT
ESH4
4Gb 2Gb
A
B
ESH4
1Gb ELP
4Gb 2Gb
1Gb ELP
system> cf takeover
The surviving partner has two identities, each of which can only
access its own volumes and networks.
You can access the failed node using console commands.
2011 NetApp, Inc. All rights reserved.
22
TAKEOVER OPERATION
When a takeover occurs, the functioning partner node takes over the functions and disk drives of the failed
node by creating an emulated storage system that:
Assumes the identity of the failed node
Accesses the failed nodes disks and serves its data to clients
The partner node maintains its own identity and its own primary functions, but also handles the added
functionality of the failed node through the emulated node.
14 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
14 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
Giveback Operation
X3149A
X3149A
4
LNK
system
e0e
0a
e0f
0b
0c
LINK LINK
0d
e0b
e0c
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
0d
LINK LINK
LINK
LINK
4Gb 2Gb
1Gb ELP
A
B
X2
X2
ESH4
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0d
LINK
LINK
1Gb ELP
LINK LINK
e0a
X2
e0d
LINK
LINK
system2
ACT
SHELF
ID
e0c
LNK
ACT
4Gb 2Gb
e0b
5
INT LNK
system2
e0a
ACT
5
INT LNK
LNK
LNK
ACT
ESH4
4Gb 2Gb
A
B
ESH4
1Gb ELP
4Gb 2Gb
1Gb ELP
system> cf giveback
The cf giveback command terminates the emulated node.
The failed node resumes normal operation.
The HA configuration resumes normal operation.
2011 NetApp, Inc. All rights reserved.
25
GIVEBACK OPERATION
When a failed node is repaired and functioning again, execute the cf giveback command, which
terminates the emulated node on the partner. The failed node resumes serving its own data and the HA
configuration resumes normal operation. Each node is ready to take over for its partner if the partner fails.
14 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
Enable HA
You cannot currently enable high availability from
NetApp System Manager so you must enable it from the
command-line interface:
1. License controller failover (cf):
system> license add xxxxxx
system2> license add xxxxxx
2. Reboot:
system> reboot
system2> reboot
4. Check status:
system> cf status
ENABLE HA
14 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
Add HA Systems
ADD HA SYSTEMS
14 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
The HA pair
HA
configuration
problems
14 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
Verify Licenses
VERIFY LICENSES
14 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
Configure an IP address to
take over the partners IP
and enablethe interface.
14 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
31
32
Description
Shared
This type of interface supports both the local and partner nodes.
It contains both the local node and partner node IP addresses.
During takeover, it supports the identity of both nodes.
Dedicated
Standby
This type of interface is on the local node, but only contains the IP
address of the partner node. It is paired with a dedicated interface
14 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
Perform a Takeover
To configure HA
To perform a takeover
PERFORM A TAKEOVER
14 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
14 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
35
14 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
36
Perform a Giveback
To perform a giveback
PERFORM A GIVEBACK
14 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
Giveback
complete
14 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
38
14 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
39
Negotiated Failover
Data ONTAP allows failover to occur with failure of one or
more network interfaces to ensure continual client interaction
To enable negotiated failover (NFO):
Off by default
system> options
cf.takeover.on_network_interface_failure on
NEGOTIATED FAILOVER
To enable negotiated failover for failed network interfaces, you must explicitly enable the
cf.takeover.on_network_interface_failure option, set the failover policy, and mark each
interface that can trigger a negotiated failover (NFO).
NOTE: The cf.takeover.on_network_interface_failure.policy option must be set
manually on both of the controllers in an HA pair:
all_nics: All interfaces marked for failover must fail before takeover will occur.
any_nic: Any interface marked for failover will trigger a high-availability takeover.
The cf.takeover.on_network_interface_failure option is not the primary defense against a
network switch becoming a single point of failure. This option should only be considered when a single-mode
vif or second-level vif cannot be used. Controller failover is disruptive to CIFS clients and can be disruptive
to NFS clients that use soft mounts. In contrast, interface group (or virtual interface in Data ONTAP 7.3)
failover is completely nondisruptive and is therefore the preferred method. Also note that negotiated failover
is being used increasingly in MultiStore environments.
14 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
HA Best Practices
Test failover and giveback operations before
placing HA controllers into production.
Monitor:
The performance of the network
The performance of disks and storage shelves
CPU utilization of both controllers, in order to
ensure that neither exceeds 50%
Enable AutoSupport.
NOTE: For more information about high availability, please see
the High Availability Web-based course.
2011 NetApp, Inc. All rights reserved.
41
HA BEST PRACTICES
General best practices require comprehensive testing of all mission-critical systems before introducing them
into a production environment. HA controller testing should include takeover and giveback, or functional
testing as well as performance evaluation. Extensive testing validates planning.
Monitor network connectivity and stability.
Unstable networks not only affect total takeover and giveback times, they adversely affect all devices on the
network in various ways. NetApp storage controllers are typically connected to the network to serve data, so
if the network is unstable, the first symptom is degradation of storage-controller performance and availability.
Client service requests are retransmitted many times before reaching the storage controller, appearing to the
client as slow responses from the storage controller. In a worst-case scenario, an unstable network can cause
communication to time-out, and the storage controller appears to be unavailable.
During takeover and giveback operations in an HA controller environment, storage controllers attempt to
connect to numerous types of servers on the network, including DNS, Network Information Service (NIS),
Lightweight Directory Access Protocol (LDAP), and application servers, as well as Windows domain
controllers. If these systems are unavailable or the network is unstable, the storage controller continues to try
to establish communications, which delays takeover and giveback times.
14 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Loss of a Building
Stretch MetroCluster configuration protects
against local issues, such as loss of
power in a building.
Loss
of a
Building
Loss
of a
Loss Shelf
of a
Cable
Loss
of a
Site
Loss
of a
Controller
LOSS OF A BUILDING
14 - 42
Loss
of a
Region
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
42
Stretch MetroCluster
Building 1
Building 2
X3149A
X3149A
system
LNK ACT
system2
LNK ACT
INT LNK
INT LNK
LNK ACT
LNK ACT
0a
e0f
0b
LINK
e0e
LINK
LINK LINK
1Gb ELP
4Gb 2Gb
1Gb ELP
X2
X2
ESH4
1Gb 2Gb 4Gb
A
B
ESH4
4Gb 2Gb
1Gb ELP
System:
Pool 1
0c
LINK LINK
0d
LINK
X2
System2:
Pool 0
0b
LINK
ESH4
4Gb 2Gb
1Gb ELP
X2
4Gb 2Gb
0a
e0f
ESH4
SHELF
ID
e0d
X2
X2
X2
ESH4
System2:
Pool 1
e0c
LINK
e0b
LINK
LINK
1Gb ELP
System:
Pool 0
LINK LINK
e0a
4Gb 2Gb
LINK LINK
0d
1Gb ELP
LINK
0c
X2
e0e
ESH4
e0d
1Gb ELP
e0c
4Gb 2Gb
e0b
ESH4
e0a
4Gb 2Gb
A
B
ESH4
4Gb 2Gb
1Gb ELP
STRETCH METROCLUSTER
14 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
43
Loss of a Site
Fabric-attached MetroCluster protects against
the loss of sites.
Loss
of a
Building
Loss
of a
Loss Shelf
of a
Cable
Loss
of a
Site
Loss
of a
Controller
LOSS OF A SITE
14 - 44
Loss
of a
Region
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
44
Fabric-Attached MetroCluster
Site 1
Site 2
X3149A
X3149A
LNK ACT
system
LNK ACT
system2
INT LNK
INT LNK
LNK ACT
LNK ACT
e0a
e0b
e0c
e0d
e0e
0a
e0f
0b
LINK
LINK
LINK LINK
0c
LINK LINK
0d
e0c
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
3
4
X2
X2
A
B
ESH4
1Gb ELP
System:
Pool 1
X2
X2
X2
1Gb ELP
ESH4
1
4Gb 2Gb
ESH4
1Gb ELP
4Gb 2Gb
4Gb 2Gb
X2
X2
X2
1Gb ELP
ESH4
ESH4
4Gb 2Gb
System2:
Pool 0
1Gb ELP
1Gb ELP
ESH4
4Gb 2Gb
4Gb 2Gb
ESH4
1Gb ELP
LINK
4Gb 2Gb
0d
LINK
Long
Haul FC
SHELF
ID
System2:
Pool 1
e0b
LINK
LINK
Switch 1
Switch 2
System:
Pool 0
e0a
A
B
ESH4
4Gb 2Gb
1Gb ELP
FABRIC-ATTACHED METROCLUSTER
14 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
45
Loss of a Region
The SnapMirror product family can be
implemented to protect against the
loss of entire regions.
Loss
of a
Building
Loss
of a
Loss Shelf
of a
Cable
Loss
of a
Site
Loss
of a
Controller
LOSS OF A REGION
14 - 46
Loss
of a
Region
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
46
X3149A
X3149A
LNK ACT
system
LNK ACT
system2
INT LNK
INT LNK
LNK ACT
LNK ACT
e0c
e0d
e0e
0a
e0f
LINK
LINK LINK
0d
e0a
e0b
e0d
e0e
0a
e0f
LINK
0b
0c
LINK
LINK
LINK
LINK LINK
LINK LINK
0d
LINK
LINK
1Gb ELP
ESH4
A
B
X2
X2
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0c
4Gb 2Gb
LINK LINK
0c
1Gb ELP
LINK
0b
X2
e0b
SHELF
ID
1Gb ELP
ESH4
ESH4
4Gb 2Gb
e0a
4Gb 2Gb
4Gb 2Gb
1Gb ELP
14 - 47
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
47
Steps
system2
system
0a 0b
0c 0d
0a 0b
1. Connect cluster
interconnect cables
0c 0d
NOTE: Example shows DS14 FC shelves. Cabling will be different for SAS shelves.
2011 NetApp, Inc. All rights reserved.
48
14 - 48
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
Describe HA solutions
Discuss how high availability increases the
reliability of storage
Define HA controller configuration
Describe the three modes of HA operation with
an HA pair
Analyze the effect on client protocols during
failover and giveback operations
MODULE SUMMARY
14 - 49
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
49
Exercise
Module 14: High Availability
Estimated Time: 30 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
14 - 50
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14 - 51
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
51
Virtualization
Solutions
Module 15
Data ONTAP 7-Mode Administration
VIRTUALIZATION SOLUTIONS
15 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
List the virtualization vendors that the Data
ONTAP operating system supports
Illustrate virtualization solutions
Describe how to virtualize a storage controller
using MultiStore software
Configure MultiStore software
Assign client protocols on MultiStore software
MODULE OBJECTIVES
15 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vFiler
vFiler
vFiler
MultiStore
Virtualization storage
controllers: MultiStore software
2011 NetApp, Inc. All rights reserved.
15 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage Architecture
ApplicationBased Silos
IT as a Service
(ITaaS)
Internal Cloud
Zones of
Virtualization
Consolidate
Centralize
Standardize
Virtualize
External
Cloud Services
Self-Service
Automate
STORAGE ARCHITECTURE
Storage architecture has evolved. First, there were application-based silos with separate physical servers and
storage. Then VMware began a movement to virtualize these silos. Virtualization might begin in one
department at a company, but over time much of the company was virtualized and consolidated.
But consolidation is limited, generally by backup or compliance restrictions. Share infrastructure is now
increasing, such as IT as a service (or ITaaS), which is an internal cloud of resources available. External
service providers (external clouds) also meet a market need by standardizing, automating, and providing selfservice computing and storage resources.
15 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
VMware
Products
VMware View
NetApp
Solutions
FlexClone software
Deduplication
SnapManager for Virtual
Infrastructure (SMVI)
Cloud Platform
Management
vSphere
15 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
VM
VM
VM
Fault Tolerance
VMware ESXi
VM
VM
Fault Tolerance
VMware ESXi
VM
VM VM
VMware ESXi
15 - 7
Fault tolerance
Support for FCoE
SAN multipath I/O support
Support for 10 Gigabit Ethernet (GbE) storage networking
vNetwork distributed switch (network configuration can be done across multiple VMs and then applied to
individual VMs)
Service Console and VMkernel support for IPv6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
VM1 VM2
Virtual
Server
Administrator
VM3 VM4
Restores
Replication
vCenter
API
SMVI
POLICIES
VM1
VM2
VM3
VM4
Storage Pool
Storage
Administrator
Policy-based
management of:
Snapshot copy
creation
Primary Site
15 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
VM1 VM2
Virtual
Server
Administrator
VM3 VM4
vCenter
API
SMVI
POLICIES
VM1
VM2
VM3
VM4
Storage Pool
Primary Site
VM1
VM5
Storage Pool
15 - 9
VM2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Virtual
Server
Administrator
SRM
VM3 VM4
Site
Failure
vCenter
Confirm?
Site Recovery
Manager (SRM)
helps automate
disaster recovery
(DR)
VM1
VM2
VM3
VM4
VM1
Storage Pool
Primary Site
VM2
VM5
Storage Pool
10
15 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Virtual
Server
Administrator
SRM
VM3 VM4
vCenter
Test
disaster
recovery
With NetApp
FlexClone Software,
VM1
VM2
VM3
VM4
administrators can
VMDK VMDK VMDK VMDK
test the disaster
recovery automation
Storage Pool
of SRM to ensure
reliability
Primary Site
VM1
VM2
VM5
Storage Pool
11
15 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NetApp Array
Primary Storage
Double Disk
Data Protection
VMware DiskBased Backup
12
15 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FlexPod
Cisco UCS
B-Series
Cisco UCS Manager
Cisco Nexus
Family Switches
NetApp FAS
10 GE and FCoE
Complete Bundle
Features
Complete data center in a single
rack
Performance-matched stack
Step-by-step deployment guides
13
FLEXPOD
FlexPod is the best infrastructure foundation supporting both virtualized and nonvirtualized workloads using
Cisco Unified Computing System (UCS), Cisco Nexus (servers and network), and NetApp FAS (storage). It
provides the best unified computing, networking, and storage.
The FlexPod solution is based on three key capabilities:
Low Risk: As a validated, simplified data center solution and a cooperative support model, FlexPod
provides a safe and proven journey to virtualization and toward the cloud.
Business agility from flexible IT: FlexPod scales to fit a variety of use cases and environments, such as
SAP, Exchange 2010, SQL, VDI, and Secure Multi-Tenancy (SMT).
Reduced TCO from higher data center efficiency: FlexPod decreases the number of operational
processes, reduces energy consumption, and maximizes resources.
15 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NetApp FAS3210A
1 Enterprise IT Infrastructure
14
15 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SQLSRV2
VM3 VM4
Virtual Server
Administrator
Billing 1
VM1 VM2
SQLSRV1
SANscreen VM Insight
Storage Pool
CIS200S
NTAP01
CIS200H
Storage
Administrator
2011 NetApp, Inc. All rights reserved.
15
15 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SANscreen VM Insight
SANSCREEN VM INSIGHT
15 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
SANscreen
Storage
Management
Software
Identifies ESX
Server Load
15 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
15 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
15 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
Virtual Server
Administrator
SCOM
SCVMM
Hyper-V
SCOM
Hypervisor-based technology
SCVMM
Systems Center Virtual Machine Manager
Management for hybrid hypervisor
environments
2011 NetApp, Inc. All rights reserved.
20
15 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Virtual Server
Administrator
SCOM
SCVMM
Storage Pool
NetApp
ApplianceWatch
Plug-in
15 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
15 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
15 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
Citrix
Products
XenDesktop
NetApp
Solutions
FlexClone software
Deduplication
SMVI
XenServer
Thin-provisioning SAN
Deduplication
SMVI
15 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
Clients
and Web
Disaster
Recovery Site
Desktop Broker
VM VM VM
VM
VM
VM VM VM
Storage Pool
VM
VM
VM
VM
Storage Pool
CIFS
and NFS
2011 NetApp, Inc. All rights reserved.
15 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
25
XenCenter
NetApp
Adapter
One-click storage
integration for server
administrators
Management of NetApp
storage:
Fast Snapshot creation and
cloning
Fast backup and recovery
Storage Pool
26
15 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
27
Controller
Virtualization
CONTROLLER VIRTUALIZATION
15 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
MultiStore Software
MultiStore Software
vFiler0
vFiler1
vFiler2
29
MULTISTORE SOFTWARE
MultiStore software provides these benefits:
Consolidation and ease of management: Application service providers can consolidate your the storage
needs. You can maintain domain infrastructure while providing multidomain storage consolidation. You
can reduce management costs while offering independent, domain-specific storage management.
Security: Security is one of the key concerns when storage is consolidated either within an organization
or by an application service provider. Different vFiler units can have different security systems within
the same storage system.
Delegation of management: vFiler unit administrators can have different access rights than storage
system administrators.
Disaster recovery and data migration: MultiStore software enables you to migrate or back up data from
one storage system to another without extensively reconfiguring the destination storage system.
15 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
MultiStore Software
vFiler0
Initially, this owns all
resources; then it
owns any resources
not owned by other
vFiler units
30
15 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
IPspace
10.x.x.x
Allows
non-unique
network routing
to separate
vFiler units
Default
IPspace
e0a
e0b
0a
0b
0c
0d
10.x.x.x
MultiStore Software
e0a
e0b
e0c
vFiler0
vFiler1
vFiler2
default
spaceB
spaceC
Routing
table
Routing
table for B
Routing
table for C
Could be
physical, an
interface group,
or a VLAN
Interface
must be down
to assign with
no address
31
IPSPACE
An IPspace defines a distinct IP address space in which vFiler units can participate. IP addresses defined for
an IPspace are applicable only within that IPspace. A distinct routing table is maintained for each IPspace. No
cross-IPspace traffic is routed.
15 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
MultiStore Software
vFiler0
32
15 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
MultiStore Software
vFiler0
vFiler1
Create the new
vFiler unit
If no IPspace is given,
the command uses the
default IPspace
33
You must create at least one unit of storage (qtrees or volumes, traditional or flexible) before creating the
vFiler unit.
The storage unit that contains the vFiler unit configuration information must be writable; it must not be a
read-only file system, such as the destination volume or qtree in a SnapMirror relationship.
The IP address used by the vFiler unit must not be configured when you create the vFiler unit.
15 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vFiler Start
To start a vFiler unit:
system> vfiler start vFiler1
10.x.x.x
e0a
e0b
0a
0b
0c
0d
MultiStore Software
e0b
vFiler0
vFiler1
spaceB
Routing
table for B
34
VFILER START
You can start a vFiler unit that is in the stopped state; after a vFiler unit starts, it is in running state and can
receive packets from clients.
15 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
e0a
e0b
0a
0b
0c
0d
10.x.x.x
MultiStore Software
e0b
vFiler0
Configure the interface
to the vFiler IP address
vFiler1
spaceB
Routing
table for B
35
15 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vFiler Management
To learn more about running
commands on vFiler1, display
the vFiler1 help:
10.x.x.x
e0a
e0b
0a
0b
0c
0d
To assign a protocol to
a vFiler unit:
1. License the protocol on
the storage system
2. Assign the protocol to a
vFiler unit
system> vfiler allow
vFiler1 proto=cifs
proto=iscsi
MultiStore Software
e0b
vFiler0
vFiler1
NFS
CIFS
iSCSI
spaceB
Routing
table for B
CIFS
iSCSI
36
VFILER MANAGEMENT
By default, a vFiler unit can use the protocols for the host storage system. You can select the protocols that
you want to allow on the vFiler units.
15 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vFiler Context
To access vFiler1:
system> vfiler context vFiler1
vFiler1@system>
10.x.x.x
e0a
e0b
0a
0b
0c
0d
To configure vFiler1:
1. Since we are allowing
CIFS, setup CIFS services
2. Since we are allowing
iSCSI, configure iSCSI
services
MultiStore Software
e0b
vFiler0
vFiler1
NFS
CIFS
iSCSI
spaceB
Routing
table for B
CIFS
iSCSI
VFILER CONTEXT
15 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
37
MultiStore Integrations
Providing
disaster recovery
Providing
data migration
MultiStore Software
vFiler0
vFiler1
SnapMirror
vFiler2
SnapVault
38
MULTISTORE INTEGRATIONS
MultiStore software integrates into the SnapMirror product family and into SnapVault software:
Snapmirror Product Family
The SnapMirror product for mirroring volumes and qtrees has been integrated to work with vFiler technology
after the SnapMirror product family is licensed on the source and destination storage systems. You can enter
SnapMirror commands from the default storage system (vFiler0) or from a specific non-default vFiler unit.
SnapMirror commands entered from the default storage system can be used to affect or display information
about all of the non-default vFiler units on the host storage system. SnapMirror commands entered from a
non-default vFiler unit only affect or display information about that specific unit.
For backward compatibility, the default storage system (vFiler0) can operate on all volumes and qtrees, even
if they are owned by other vFiler units.
If vFiler unit storage volumes and qtrees are mirrored by vFiler0, the SnapMirror relationship will be reflected
only on vFiler0.
Snapvault Software
After SnapVault software is licensed on the source and destination storage units, the SnapVault product for
backing up volumes and qtrees is integrated to work with vFiler technology. See the MultiStore Management
Guide for more information.
15 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
system2
MultiStore
Software
vFiler0
vFiler1
Providing
disaster recovery
MultiStore
Software
vFiler0
vFiler1
39
15 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vFiler Migration
system
system2
MultiStore
Software
vFiler0
vFiler1
Providing
data migration
MultiStore
Software
vFiler0
vFiler1
40
VFILER MIGRATION
If heavy traffic to one vFiler unit is affecting the performance of its host node, and its high-availability
configuration partner is lightly loaded, you can transfer ownership of the vFiler unit to the partner.
Transferring ownership allows you to balance load processing on the two nodes without copying data.
When you migrate a vFiler unit, you move it from the remote storage system to the local storage system. You
initiate migration on the destination storage system, which will host the vFiler unit after the migration. Add a
static route entry, if required, because the static routing information will not be carried to the destination
storage system.
Migration across storage systems enables workload management. Migration automatically destroys the source
vFiler unit and activates the destination, which starts serving data to its clients automatically. Only the
configuration is destroyed on the source, not the data.
See the MultiStore Management Guide for more information.
15 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
ON
24/7
Storage
StoragePool
Pool
vFiler1
Data
Data
Data
Data Motion
Mirrors a vFiler unit to another
storage system
Allows cut over to completely
non-disruptively move a vFiler
unit and all its data to a new
storage system
41
15 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10.x.x.x
e0a
e0b
0a
0b
0c
0d
MultiStore Software
e0b
vFiler0
vFiler1
spaceB
Routing
table for B
42
15 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
List the virtualization vendors that the Data
ONTAP operating system supports
Illustrate virtualization solutions
Describe how to virtualize a storage controller
using MultiStore software
Configure MultiStore software
Assign client protocols on MultiStore software
MODULE SUMMARY
15 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
43
Exercise
Module 15: Virtualization Solutions
Estimated Time: 60 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
15 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15 - 45
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
45
Backup and
Recovery Methods
Module 16
Data ONTAP 7-Mode Administration
16 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
List the methods available to back up and
recover data
Use ndmpcopy to process full and incremental
data transfers
Discuss dump and restore
Describe, enable, and configure Network Data
Management Protocol (NDMP) on a storage
system
MODULE OBJECTIVES
16 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Snapshot Copies
Back up to Local Storage
Recover files
Data Center
SNAPSHOT COPIES
16 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
ndmpcopy Command
Back up to Local or Remote Storage
Recover volume, qtrees, or directories
Used to transfer data between storage systems
that support NDMPv3 or NDMPv4
system> ndmpd on
Data Center
NDMPCOPY COMMAND
The ndmpcopy command enables you to transfer file system data between storage systems that support
Network Data Management Protocol verison 3, NDMPv3, or NDMPv4, and the UNIX file system (UFS)
dump format.
Using the ndmpcopy command, you can perform both full and incremental data transfers. However,
incremental transfers can have no more than two levels (one full and no more than two incremental levels).
You can transfer full or partial volumes, qtrees, or directories, but not individual files.
To copy data within a storage system or between storage systems using ndmpcopy, use the following
command from the source or the destination system, or from a storage system that is not the source or the
destination:
system> ndmpcopy [options] source_hostname:source_path
destination_hostname:destination_path
In this command, source_hostname and destination_hostname can be host names or IP addresses. If
destination_path does not specify a volume (or specifies a nonexistent volume), the root volume is used.
16 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
SnapVault Software
Back up to Remote Storage
Recover qtrees, directories, or files
SnapVault software is
Data Center
embedded NetApp
FAS1
software for disk-todisk backup and
FAS2
archiving
Administrators can
back up and recover:
Primary
Qtrees
Directories on storage
not produced by
NetApp
Central
Repository
SnapVault
SnapVault
Storage Systems
Non NetApp
Storage
Open
Systems
SnapVault
Secondary
Storage System
7
SNAPVAULT SOFTWARE
SnapVault software is a disk-based storage backup feature of the Data ONTAP operating system. SnapVault
software enables you to back up data stored on multiple storage systems to a central, secondary storage
system quickly and efficiently as read-only Snapshot copies.
If data is lost or corrupted on a storage system, you can restore backed-up data from the SnapVault secondary
system with less downtime and uncertainty than is associated with conventional tape backup and restore
operations.
Additionally, users who want to restore their own data may do so without the intervention of a system
administrator. The SnapVault secondary system may be configured with NFS exports and CIFS shares to let
users copy files from Snapshot copies to the correct locations.
16 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Data Center
Tape
System
2011 NetApp, Inc. All rights reserved.
16 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
VTL
System
8
State
----------ACTIVE
RESTARTABLE
Type
---NDMP
dump
Device
-----urst0a
Start Date
-----------Nov 28 00:22
Nov 29 00:22
Level
----0
1
Path
--------/vol/vol0/
/vol/vol1/
NOTE: See the Data Protection Tape Backup and Recovery Guide
for more information.
2011 NetApp, Inc. All rights reserved.
16 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Dump format:
Phases 1 and 2: Build a map of files and directories,
and collect file history and attribute information
Phase 3: Dump data to tape, specifically directory
entries
Phase 4: Dump files
Phase 5: Dump access control lists (ACLs)
Restore format:
Phase I: Restore directories
Phase II: Restore files
2011 NetApp, Inc. All rights reserved.
16 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
16 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
13
16 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Product
NOTE: This is an
incomplete list.
14
16 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
NDMP server
The NDMP server is a process or service that
runs on the NetApp storage system.
The NDMP server processes requests from
NDMP clients, and then returns reply and status
information back to the NDMP client.
2011 NetApp, Inc. All rights reserved.
15
16 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Control Messages
Data Connection
DMA
Payload Data
Notifications, file history, log messages
Content
Index
TCP/IP
TCP/IP
IP Network
NDMP
Data
Service
NDMP
Tape
Service
TCP/IP, IPC
2.
Primary
Storage
System
3.
Secondary
Storage
System
16
16 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
NDMP Server
NDMP Control Connection
Tape Drive
Tape Drive
Robot
NDMP Server
NDMP Control Connection
Tape Drive
Tape Drive
Robot
18
16 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
system> ndmpd on
system> options ndmpd.enable on
19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
16 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
16 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
List the methods available to back up and
recover data
Use ndmpcopy to process full and incremental
data transfers
Discuss dump and restore
Describe, enable, and configure NDMP on a
storage system
MODULE SUMMARY
16 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
Exercise
Module 16: Backup and Recovery
Methods
Estimated Time: 15 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
16 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
Data Collection
Tools
Module 17
Data ONTAP 7-Mode Administration
17 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Use the sysstat, stats, and statit
commands
Describe the factors that affect RAID performance
Execute commands to collect data about write and
reads throughputs
Execute commands to verify the operation of
hardware, software, and network components
Identify commands and options used to obtain
configuration and status
MODULE OBJECTIVES
17 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
System Health
Performance problems can originate from
multiple sources. To avoid some of these
problems, check or monitor the following:
Disk configuration
Disk status
Read and write performance
RAID configuration
Connectivity configuration
Performance measures
SYSTEM HEALTH
Good performance results when hardware, software, and communication protocols work together at optimal
limits. Failure or underperformance of one element affects the other elements. Therefore, monitor your system
and use NetApp command tools to adjust the system. Correct adjustments reduce latency, improve data
throughput, and allow you to achieve optimal performance.
17 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk Status
DISK STATUS
17 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk Status
Monitor disks:
shelfchk
sasadmin
led_on diskid and led_off diskid
(priv set advanced command)
DISK STATUS
To verify that host adaptors on a storage appliance are communicating with Fibre Channel (FC) disk shelves,
use the shelfchk command. The command prompts you to verify whether specified LEDs are on or off.
Because you must be able to see the LEDs, enter the command from a console near the shelves.
Checking Disk LED Function
To verify that LEDs are working on all disks, run the led_on and led_off tests. To use these commands,
you must be operating in advanced mode.
NOTE: The led_on and led_off tests can also be used to identify the address where disks are located.
To verify that LEDs are working on all disks, complete the following steps:
1.
2.
3.
4.
5.
17 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Syslog Messages
shm: disk has reported a predicted
failure (PFA) event: disk XX,
serial_number XXXX
shm: link failure detected, upstream
from disk: id XX, serial_number XXXXX
shm: disk I/O completion times too long:
disk XX, serial number XXXXX
shm: possible link errors on disk: id
XX, serial number XXXXX
shm: disk returns excessive recovered
errors: disk XX, serial number XXXXX
shm: intermittent instability on the
loop that is attached to Fibre Channel
adapter: id XXX, name XXXXX
2011 NetApp, Inc. All rights reserved.
SYSLOG MESSAGES
shm: disk has reported a predicted failure (PFA) event: disk XX,
serial_number XXXX
Description: The disk's internal error processing and logging algorithm computation results exceed an
internally set threshold. The disk will likely fail in a matter of hours.
shm: link failure detected, upstream from disk: id XX, serial_number
XXXXX
Description: An FC disk (or cable, if disks are in different disk shelves) might be malfunctioning, causing an
open loop condition. This results in a synchronization loss of more than 100 milliseconds for the downstream
disk that reported the problem as a link failure.
shm: disk I/O completion times too long: disk XX, serial number XXXXX
Description: Either the disk is old and slow, or it is internally recovering errors and taking too long to
complete an I/O. This message also indicates that there are too many I/O timeouts and retries on the disk. The
disk might also be frequently returning the Command Aborted status. All these issues can produce a low datathroughput rate for this specific disk and a reduction in overall system performance.
shm: possible link errors on disk: id XX, serial number XXXXX
Description: One of a group of four FC disks in a disk shelf (or any connecting cable) might be
malfunctioning. This results in a large number of invalid cyclic redundancy check (CRC) frames and data
under-runs on the loop. The invalid CRC and under-run count has crossed the specified threshold several
times.
17 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
shm: disk returns excessive recovered errors: disk XX, serial number
XXXXX
Description: Either the disk has found media or hardware errors (unrecovered errors), or it has internally
recovered a large number of errors. The disk might also be returning a Command Aborted status. The errors
returned have exceeded the bit error rate specified by the disk vendor.
shm: intermittent instability on the loop that is attached to Fibre
Channel adapter: id XXX, name XXXXX
Description: An FC adapter, attached disk shelf, disk, cable, or connector might have caused instability on
the FC-AL loop, which resulted in I/O completion rates below a set threshold.
17 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Read Performance
The Data ONTAP operating system is
optimized for write performance.
Read performance can decrease over time,
although efficient use of cache can offset some
disk performance issues.
To administrate read performance:
To measure optimization level:
system> reallocate measure [vol | file]
READ PERFORMANCE
The WAFL (Write Anywhere File Layout) file system does the following to optimized write performance:
Writes adjacent blocks in files that are adjacent on the disk, whenever possible. As the file system grows,
blocks may not be written on an immediately adjacent disk, but the blocks will still be close.
Reserves 10% of the disk space to increase the probability of blocks being available at or near optimal
locations.
Manages interleaved writes much better than other file systems, because it does not immediately allocate
date to the write. By holding the write data in system memory until a consistency point (CP) is generated,
the WAFL file system can allocate a lot of write data from a particular file into contiguous blocks.
Minimizes the impact of write performance with the write anywhere" allocation scheme, which
minimizes disk-seeks for writes.
Write optimization can lead to decreased file and LUN read performance as the file system ages, because files
are written to the best place on the disks for write performance. As the WAFL file system expands, fewer
options are available for writing blocks, so the system may have to write to blocks that are not immediately
adjacent on the disk. You can help prevent problems by using flexible volumes and the autosize volume
option. In addition, the WAFL file system uses built-in, multiple-read cache algorithms to offset any potential
performance degradation.
NOTE: Reallocation is covered in detail in the Data ONTAP Performance course.
17 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Function
sysstat
stats
statit
17 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
17 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Performance Counters
Counters are organized in an object-instancecounter hierarchy.
Counters are collected from Counter Manager.
The stats command allows users to look at any
object-instance and the corresponding counter (and
supports preset files).
volume
vol1
avg_latency:53.18us
vol2
avg_latency:53.18us
PERFORMANCE COUNTERS
17 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
Counter Manager
Third-Party Tools
Data
Archive
SNMP
AutoSupport
Ops.
Mgr.
Windows
Perfmon
Clients
New and
Enhanced
CLI
Existing
PerformanceC
ommands
Zephyr APIs
SMB calls
Windows
Perfmon
Support
Performance Counters
12
COUNTER MANAGER
Counter Manager is a thin layer built into the Data ONTAP architecture that provides a single view of Data
ONTAP performance counters and a standard performance API set for all clients. Clients include Manage
ONTAP, the AutoSupport support tool, Windows perfmon, SNMP, and the command-line interface.
The Purpose of Counter Manager
Counter Manager was introduced in Data ONTAP 6.5. It provides a complete set of performance metrics that
supply statistics for you to use when analyzing configuration mistakes.
Counter Manager provides an infrastructure to:
Improve customer and internal performance monitoring
Provide simple performance problem diagnoses
Enhance existing sizing processes
Provide capacity planning capabilities
For a complete list of the performance counters available in Data ONTAP, look in the Operations Manager
documentation for Performance Objects and Counters.
17 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
17 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
qtree
aggregates
iscsi
fcp
volume
lun
flexvol1/users
flexvol2/home
aggr1
vol0
iscsi
fcp
vol0
flexvol1
flexvol2
flexvol3
clone1
/vol/clone1/lun1 : C4/phnu0DG6S
/vol/flexvol3/lun1 : C4/phnu0AbVV
/vol/flexvol2/lun1 : C4/phnu0Ab3S
/vol/flexvol1/lun1 : C4/phnu0AaWl
target
nfsv3
cifs
ifnet
processor
system
disk
vtic
iswta
nfs
cifs
e0
e7a
e7b
processor0
processor1
processor2
processor3
system
20:00:00:0c:50:a3:c7:1
20:00:00:0c:50:a3:b5:0
20:00:00:0c:50:a3:66:f
20:00:00:0c:50:a3:6b:5
20:00:00:0c:50:a3:69:8
17 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
qtree
volume
flexvol1/users
flexvol2/home
vol0
flexvol1
clone1
nfs_ops
cifs_ops
total_ops
avg_latency
read_ops
read_data
read_latency
write_ops
write_data
write_latency
other_ops
other_latency
17 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
disk:20:00:00:0c:50:a3:67:5a:user_read_chain:0
disk:20:00:00:0c:50:a3:67:5a:user_write_chain0
In the sample above, we are listing stats for all the disks
system>stats show disk:20::00::00::0c::50::a3::6b::58:disk_busy
disk:20:00:00:0c:50:a3:6b:58:disk_busy:0%
system>
In the sample above, we are listing a specific counter for a disk instance
16
17 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
<counter name="cpu_busy">
<width>4</width>
<title>CPU</title>
</counter>
<counter name="nfs_ops">
<width>6</width>
<title>NFS</title>
</counter>
<counter name="cifs_ops">
<width>6</width>
<title>CIFS</title>
</counter>
</object>
</preset>
17
17 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
17 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
RAID Configuration
RAID CONFIGURATION
17 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
RAID Groups
aggr0
aggr1
rg0
aggr2
rg0
rg0
rg1
2011 NetApp, Inc. All rights reserved.
20
RAID GROUPS
The relationship between aggregates and RAID groups has these characteristics:
Each aggregate has at least one RAID group, and each RAID group belongs to only one aggregate.
When a new aggregate is created, a new RAID group is also created with two parity disks and at least one
data disk.
When disks are added that exceed the specified or maximum RAID group size, new RAID groups are
automatically created for an aggregate.
You can increase or decrease RAID group size using the aggr options aggr_name raidsize
option.
17 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
17 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
22
23
17 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Monitoring
Connectivity
MONITORING CONNECTIVITY
17 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
Monitor Connectivity
Media Access Control (MAC)
ifconfig
ifstat
arp
TCP/IP
ifconfig
/etc/rc and /etc/hosts
ping
netstat r
netdiag
Protocols
nfsstat
cifs stat
nbtstat
25
MONITOR CONNECTIVITY
Connectivity problems can arise with functions at the Media Access Control (MAC), TCP/IP, and protocol
layers. At the MAC level, you can use the commands in this table to view connectivity statistics and settings:
SAMPLE COMMAND
ifstat a
ifstat ns1
RESULT
arp
arp a
arp -d
arp s
17 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Performance Measures
PERFORMANCE MEASURES
17 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
Round-trip
response times
for specific NFS
operations are
displayed.
system> nfsstat -l
172.17.25.13
sherlock
172.17.25.16
watson
172.17.25.18
hudson
172.17.230.7
conan
172.17.230.8
baker
172.17.230.9
moriarty
175.17.230.10 doyle
NFSOPS
NFSOPS
NFSOPS
NFSOPS
NFSOPS
NFSOPS
NFSOPS
=
=
=
=
=
=
=
2943506
3553686
2738083
673247l
202614527
1006881
1185
(90%)
( 2%)
( 1%)
( 3%)
( 1%)
( 0%)
( 0%))
27
To display real-time NFS operations every second on your console, enter sysstat 1, or view the
output using NetApp System Manager.
To focus the output on counters related to response times on Solaris NFS clients, run nfsstat -m.
To reset statistics and counters to zero, use nfsstat -z.
17 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
0ms
1ms
2ms
3ms
4ms
5ms
6ms
7ms
13175
17752
5111
664
451
478
570
568
<16ms
<24ms
<32ms
<40ms
<48ms
<56ms
<64ms
unused
4039
2309
569
165
61
21
10
28
In the first part of this example smb_hist output, 13,715 operations occurred in less than 0.5 milliseconds
(ms), 17,752 operations occurred in the window from 0.5 ms to 1.5 ms, and 5,111 operations occurred in the
window from 1.5 ms to 2.5 ms. In normal situations, as the interval window gets larger, the number of
operations that take that long decreases to zero.
17 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
17 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
CPU
Multiprocessor
CSMP domain switches
Miscellaneous
WAFL (Write Anywhere File Layout)
RAID
Network interface
Disk
Aggregate
Spares and other disks
FCP
iSCSI
Tape
17 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
31
CPU Statistics
CPU Statistics
506.934263 time (seconds)
275.044317 system time
23.412966 rupt time
251.466451 non-rupt system time
271.837944 idle time
439.543653 time in CP
21.837230 rupt time in CP
100 %
54 %
5 % (7022 rupts x 0 usec/rupt
50 %
44 %
92 % 100 %
5 % (132 rupts x 0 sec/rupt)
CPU STATISTICS
The first section of the statit statistics report provides CPU statistics.
In this example:
17 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
Multiprocessor Statistics
Multiprocessor Statistics (per second)
cpu0
cpu1
total
sk switches
1378.09
46.82
1424.91
hard switches
1175.27
29.15
1204.42
domain switches
103.89
16.08
119.96
CP rupts
nonCP rupts
nonCP rupt usec
Idle
0.00
0.00
0.00
100.00
0.00
100.00
0.00
0.00
0.00
1000000.00
1000000.00
2000000.00
kahuna
0.00
0.00
0.00
network
0.00
0.00
0.00
storage
0.00
0.00
0.00
exempt
0.00
0.00
0.00
raid
0.00
0.00
0.00
target
0.00
0.00
0.00
netcache
0.00
0.00
0.00
netcache2
0.00
0.00
0.00
33
MULTIPROCESSOR STATISTICS
The second section of the statistics report includes multiprocessor statistics for multiple CPUs.
17 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Miscellaneous Statistics
Miscellaneous Statistics (per second)
175680.88
0.00
50215.09
101387.45
46074.00
23517.69
23517.69
0.00
16477.97
hard context switches
0.00
CIFS operations
102220.83
network KB received
76757.23
disk KB read
0.00
NVRAM KB written
0.00
WAFL bufs given to clients
0.00
no checksum - partial buffer
iSCSI operations
NFS operations
HTTP operations
network KB transmitted
disk KB written
nolog KB written
checksum cache hits(0%)
FCP operations
34
MISCELLANEOUS STATISTICS
The miscellaneous section of the statistics report includes rates (or counts) for many operations. The statistics
from this section that are most likely to be of interest to you are:
17 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
WAFL Rates
WAFL Statistics (per second)
47.29
213379.74
28896.85
38058.36
910.79
11436.80
1778.91
20.76
0.01
0.00
0.00
0.00
0.00
0.00
49323.58
93731410.56
0.00
0.39
31023.74
0.00
23119.68
23551.76
63.04
16734.62
0.00
0.00
0.00
0.00
0.00
0.00
0.17
862.70
0.00
1429632
35
WAFL RATES
The WAFL section of the statistics report displays WAFL rates (or counts). The statistics from this section
that are most likely to be of interest to you are:
All cache hits and misses
Inode cache hits and misses
Per-second rates for all the CP types
All cache hits and misses and inode cache hits and misses provide information about read performance. It is
generally better to have more hits than misses. However, you should consider many factors when analyzing
these numbers. For example, a file that is only read once, such as a backup application file, does not reside in
cache.
17 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vh
side
recv
xmit
recv
xmit
recv
xmit
recv
xmit
bytes
171.69
115.22
0.00
0.00
0.00
0.00
0.00
0.00
packets
2.55
1.42
0.00
0.00
0.00
0.00
0.00
0.00
multicasts
0.00
0.00
0.00
0.00
0.00
0.00
0.00
0.00
errors
0.00
0.00
0.00
0.00
0.00
0.00
0.00
0.00
collisions
0.00
0.00
0.00
0.00
0.00
0.00
0.00
0.00
36
17 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk Statistics
Disk Statistics (per second)
ut% is the percent of time the disk was busy.
xfers is the number of data transfer commands issued per second.
xfers = ureads + writes + cpreads + greads + gwrites
chain is the average number of 4K blocks per command.
usecs is the average disk round trip time per 4K block.
disk
ut% xfers ureads--chain-usecs writes--chain-usecs cpreads-chain-usecs
/vol0/plex0/rg0:
8a.16
5
3.69
0.57
1.00
94500 ...
8a.21
4
3.12
0.57
1.00
39500 ...
37
DISK STATISTICS
The Disk section of the statistics report provides statistics for each drive. Some of the column headings are
defined at the top of the screen.
Beginning with the fourth column of data, the report uses hyphens in the column headings to group related
information. For example, user reads and the associated chain and round-trip times are linked in the heading
ureads--chainusecs.
The following list defines some of the column headings on the Disk Statistics report:
17 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
38
17 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
39
Other Resources
For more information about data collection and performance,
see the Data ONTAP Performance Analysis course, in which
you learn to:
Use the recommended methodology to compare performance
data and performance analysis information
Monitor performance using performance tools and establish a
baseline of expected throughput and response times for storage
systems under planned and increasing workloads
Perform capacity planning by monitoring performance and
comparing baseline information over time to determine when a
storage system will reach maximum capacity
Tune protocols such as CIFS, NFS, and SAN for optimal
performance (including locating resources with tuning guidelines
for database scenarios)
Perform bottleneck analysis
OTHER RESOURCES
17 - 41
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
Module Summary
In this module, you should have learned to:
Use the sysstat, stats, and statit
commands
Describe the factors that affect RAID performance
Execute commands to collect data about write and
read throughputs
Execute commands to verify the operation of
hardware, software, and network components
Identify commands and options used to obtain
configuration and status
MODULE SUMMARY
17 - 42
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
41
Exercise
Module 17: Data Collection Tools
Estimated Time: 60 minutes
EXERCISE
Please refer to your Exercise Guide for more instruction.
17 - 43
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17 - 44
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
43
Data ONTAP
Upgrades
Module 18
Data ONTAP 7-Mode Administration
18 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Access the NetApp Support site for the following
documents:
Data ONTAP Upgrade Guide
Data ONTAP Release Notes
MODULE OBJECTIVES
18 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Boot Sequence
BOOT SEQUENCE
18 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Boot Sequence
When the boot sequence starts, a user may
press any key to abort and go to the firmware
prompt:
CFE version 1.2.0 based on Broadcom CFE: 1.0.35
Copyright (C) 2000,2001,2002,2003 Broadcom Corporation.
Portions Copyright (C) 2002,2003 Network Appliance Corporation.
BOOT SEQUENCE
18 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
boot_ontap
boot_primary
boot_backup
boot_diags
boot_ontap: boots the current Data ONTAP software release stored on the boot device (such as the
CompactFlash card). By default, the storage system automatically boots this release if you do not select
another option from the basic menu.
boot_primary: boots the Data ONTAP release stored on the boot device as the primary kernel. This
option overrides the firmware AUTOBOOT_FROM environment variable if it is set to a value other than
PRIMARY.
By default, the boot_ontap and boot_primary commands load the same kernel.
boot_backup: boots the backup Data ONTAP release from the boot device. The backup release is
created during the first software upgrade to preserve the kernel that shipped with the storage system. It
provides a known good release from which you can boot the storage system if it fails to automatically
boot the primary image.
netboot: boots from a Data ONTAP version stored on a remote HTTP or TFTP server.
Netboot enables you to:
18 - 5
boot_diags: boots Data ONTAP into a special diagnostic kernel that can be used to troubleshoot
hardware problems.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 8
Choice 4 initializes all of the disks and creates a FlexVol root volume.
Choice 5 allows administrators to enter maintenance mode, where they can perform aggregate and disk
operations.
Choice 6 allows administrators to update the boot device card from a backup configuration.
Choice 7 allows administrators to install new software on a V-Series system.
Choice 8 reboots the storage system.
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
11
18 - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
18 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Upgrade Procedures
UPGRADE PROCEDURES
18 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
13
Configuration Worksheet
eng_router
NetApp1
10.10.10.1
OurDomain
Joey
10.10.10.100
GMT
Bldg. 1
10.10.10.200
en_US
adminhost
10.10.10.20
e0
10.10.10.30
255.255.255.0
10.10.10.100
Administrator
vif1
4
nollip
e4a,e4b,e4c,e4d
CONFIGURATION WORKSHEET
18 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
15
18 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
16
18 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
18
18 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19
20
18 - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
21
18 - 21
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
+60
min
system> version -b
2011 NetApp, Inc. All rights reserved.
22
d: This option prevents the system from automatically performing the download command, which
updates the boot device card. The command can take a lot of time to run, during which you do not have
access to the prompt. For this reason, some administrators use the d option and then issue the
download command separately, at a time convenient for them.
r: This option prevents the system from rebooting automatically.
NOTE: the software install option has been deprecated in favor of the software update option
for upgrades. Other methods of installation, such as using setup.exe from a CIFS share or a .tar file, are no
longer supported. These files will not be available for Data ONTAP 8.0.
18 - 22
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
23
18 - 23
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
24
18 - 24
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Nondisruptive Upgrades
X3149A
X3149A
4
LNK
system
LNK
ACT
ACT
5
INT LNK
INT LNK
LNK
LNK
ACT
e0c
e0d
e0e
0a
e0f
LINK
0b
0c
LINK LINK
0d
e0a
e0b
e0d
e0e
0a
e0f
LINK
LINK
LINK LINK
0b
0c
LINK LINK
0d
LINK
LINK
4Gb 2Gb
1Gb ELP
A
B
X2
X2
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0c
LINK
LINK
ESH4
LINK LINK
1Gb ELP
LINK
X2
e0b
SHELF
ID
e0a
4Gb 2Gb
system2
ACT
ESH4
4Gb 2Gb
1Gb ELP
A
B
ESH4
4Gb 2Gb
1Gb ELP
25
NONDISRUPTIVE UPGRADES
A nondisruptive upgrade, or NDU, is a mechanism that uses high-availability storage controller technology to
minimize client disruption during an upgrade. This procedure allows each of the two nodes in a highavailability pair to be upgraded individually to a newer version of the Data ONTAP operating system and
firmware.
When you perform an NDU, you upgrade three key areas:
Shelf firmware
Disk firmware
The Data ONTAP operating system and storage controller firmware (BIOS)
18 - 25
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Review the NetApp Support Bugs Online site for any known
installation and upgrade problems.
Validate the high-availability controller configuration.
Remove all failed disks to allow giveback operations to
succeed.
Upgrade disk and shelf firmware, as discussed earlier in
this module.
Verify that system loads are within the acceptable range
(less than 50% on each system).
2011 NetApp, Inc. All rights reserved.
18 - 26
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
26
X3149A
4
LNK
system
LNK
ACT
ACT
5
INT LNK
INT LNK
LNK
LNK
ACT
e0c
e0d
e0e
0a
e0f
LINK
0b
0c
LINK LINK
0d
e0a
e0b
e0c
e0d
0a
e0f
0b
LINK
LINK
LINK LINK
0c
0d
LINK LINK
LINK
LINK
4Gb 2Gb
1Gb ELP
A
B
X2
X2
X2
X2
ESH4
1Gb 2Gb 4Gb
SHELF
ID
e0e
LINK
LINK
ESH4
LINK LINK
1Gb ELP
LINK
SHELF
ID
e0b
4Gb 2Gb
e0a
system2
ACT
ESH4
4Gb 2Gb
A
B
ESH4
1Gb ELP
4Gb 2Gb
1Gb ELP
2. Reboot the first system. The second system will take over for the first.
3. Give back to the first system and then reboot the second system.
4. Give back to the second system. Both systems now run the new version.
2011 NetApp, Inc. All rights reserved.
27
RELEASE
UPGRADE
REVERT
NDU UPGRADE
7.2.x
7-Mode
Yes
Yes
No
7.3.x
7-Mode
Yes
Yes
Yes
18 - 27
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
28
18 - 28
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Setup
SETUP
18 - 29
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
29
18 - 30
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
30
31
18 - 31
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 32
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
32
18 - 33
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
33
18 - 34
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
34
35
18 - 35
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 36
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
36
The convention
is to use
the current date
of the dump
Remote system
user name and
password
37
18 - 37
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
MODULE SUMMARY
18 - 38
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
38
Exercise
Module 18: Data ONTAP Upgrades
Estimated Time: 90 minutes
EXERCISE
Please refer to your Exercise Guide for more instructions.
18 - 39
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18 - 40
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
40
Final Words
Module 19
Data ONTAP 7-Mode Administration
FINAL WORDS
19 - 1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Recall major areas of this course
Identify available resources
MODULE OBJECTIVES
19 - 2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage Architecture
ApplicationBased Silos
Zones of
Virtualization
Consolidate
Centralize
IT as a Service
(ITaaS)
Internal Cloud
Standardize
Virtualize
External
Cloud Services
Self-Service
Automate
STORAGE ARCHITECTURE
19 - 3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Unified Storage
NFS
Corporate
LAN
iSCSI
CIFS
FCoE
FC
NAS
SAN
NetApp FAS
UNIFIED STORAGE
19 - 4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
7-Mode
ClusterMode
Data
ONTAP
GX
19 - 5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19 - 6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Storage Architecture
Storage Objects:
Aggregates
Plexes
RAID groups
Disks
aggr1
plex0
rg0
rg1
system> sysconfig -r
...
RAID group /aggr1/plex0/rg0 (normal)
RAID Disk Device HA SHELF BAY CHAN Pool...
--------- ------ ------------- ---- ---parity
0a.24
0a
1
8
FC:A
0...
data
0a.25
0a
1
9
FC:A
0...
system>
2011 NetApp, Inc. All rights reserved.
STORAGE ARCHITECTURE
19 - 7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Space utilization:
Vol 1
Vol 2
Free
Vol 3
Vol 4
19 - 8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
19 - 9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Groups
Roles
Capabilities
19 - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
Interface Groups
Interface groups enable trunking of one or more
Ethernet interfaces (IEEE 802.3ad link
aggregation).
Types:
Single-mode
Multimode
e0a
e0b
e0c
e0d
e0e
0a
e0f
LINK LINK
0d
LINK
10-Gb Optical
Interfaces
Interface Group
Interface Group
0
0c
LINK LINK
LINK
1-Gb Copper
Interfaces
INTERFACE GROUPS
19 - 11
0b
LINK
LINK
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
11
vol0
flexvol1
data_files
etc
eng_files
home
misc_files
Network Connection
Client1
Client2
19 - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
CIFS
Clients
Member Server
Domain Controller
Machine
Accounts
CIFS
19 - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Directory
Machine name
13
SAN
Initiator
Application
File System
SCSI Driver
Target
SAN Services
WAFL (Write Anywhere File Layout)
IP
SAN
LUN
SAN
19 - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
FC
SAN
14
Snapshot Copies
Active Data
Snapshot
File X
File X
Disk Blocks
SNAPSHOT COPIES
19 - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
15
Steps
system2
system
0a 0b
0c 0d
0a 0b
1. Connect cluster
interconnect cables
0c 0d
NOTE: Example shows DS14 FC shelves. Cabling will be different for SAS shelves.
2011 NetApp, Inc. All rights reserved.
16
19 - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
vFiler
vFiler
vFiler
MultiStore
Virtualization storage
controllers: MultiStore software
2011 NetApp, Inc. All rights reserved.
19 - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
17
Web sites
NetApp Support (support.netapp.com)
NetApp (www.netapp.com)
19 - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
18
Thank You!
Please complete an evaluation.
THANK YOU!
19 - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
WAFL Internals
Appendix A
Data ONTAP 7-Mode Administration
WAFL INTERNALS
A-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Describe how data is structure within a WAFL
(Write Anywhere File Layout) file system on a
traditional volume
Explain how data is structure within a WAFL
file system in a flexible volume on a 32-bit
aggregate
Describe how data is structure within a WAFL
file system in a flexible volume on a 64-bit
aggregate
MODULE OBJECTIVES
A-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
WAFL Structure
WAFL STRUCTURE
A-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
A-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
A-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
WAFL Structure
The WAFL file system is structured into volumes:
Aggregate
vol1
vol1
2011 NetApp, Inc. All rights reserved.
WAFL STRUCTURE
A-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
A-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
volinfo
block 1
Aggregate
vol1
fsinfo
block
0
Active
file system
...
vol1
fsinfo
block
255
Snapshot
definitions
A-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Aggregate
192-byte inode
...
20 21 Inode file
Blocks of 4096-byte
each
vol1
vol1
2011 NetApp, Inc. All rights reserved.
A-9
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Level 0
For files that are less than 65 bytes, the data is
stored within the inode file.
Root inode
0
Aggregate
4-KB block
20
Inode file
vol1
vol1
2011 NetApp, Inc. All rights reserved.
LEVEL 0
A - 10
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
10
20
...
0 1
...
Inode file
15
4 bytes
vol1
Direct
Data Block
Direct
Data Block
Direct
Data Block
vol1
4-KB block
11
A - 11
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Disk
Physical
Block
Number
(PBN)
500 block
number
Volume
Block
Number
(VBN)
500 block
number
Traditional
Volume
A - 12
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
12
File inode
20
...
0
...
32-bit pointers
Inode file
7
2x4
bytes*
vol1
*NOTE: 2 x 4 bytes, because
the physical and virtual VBNs
are separate
Direct
Data Block
Direct
Data Block
Direct
Data Block
vol1
4-KB block
13
A - 13
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Aggregate
Disk
PvBN
456 block
number
vol1
vVBN
500 block
number
vol2
vVBN
500 block
number
Disk
PvBN
123 block
number
A - 14
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
14
File inode
Inode file
20
...
0
64-bit pointers
...
2x8
bytes
64-Bit Aggregate
vol1
Direct
Data Block
Direct
Data Block
vol1
2011 NetApp, Inc. All rights reserved.
4-KB block
15
A - 15
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
...
Direct
Data Block
...
1023
32-bit pointers
Inode file
20
...
0 1
vol1
File inode
Up to 16
indirect
blocks
15
Direct
Data Block
...
1023
Direct
Data Block
vol1
2011 NetApp, Inc. All rights reserved.
16
A - 16
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
...
...
511
32-bit pointers
Inode file
20
...
0
32-Bit Aggregate
File inode
Up to 8
indirect
blocks
...
511
vol1
Direct
Data Block
Direct
Data Block
Direct
Data Block
vol1
2011 NetApp, Inc. All rights reserved.
17
A - 17
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
...
64-bit pointers
Inode file
20
...
0
64-Bit Aggregate
File inode
...
255
Up to 4
indirect
blocks
...
255
vol1
Direct
Data Block
Direct
Data Block
Direct
Data Block
vol1
2011 NetApp, Inc. All rights reserved.
18
A - 18
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Directories
Each directory inode points to at least one 4-KB block
that holds the metadata for the block.
Root inode
Directory inode
Inode file
4-KB block
Aggregate
vol1
Entries Chunks
vol1
2011 NetApp, Inc. All rights reserved.
19
DIRECTORIES
Each directory block is divided into two primary portions: an array of entries and an array of name chunks.
The entry array for each directory block contains 128 rows, each currently 12 bytes long. The rest of the
WAFL (Write Anywhere File Layout) block contains the array of 160 name chunks, each 16 bytes long.
Entries contain a file ID, a generation number, and a pointer to related name chunks. If the NFS name of a
storage object in the directory is longer than 16 characters, it uses multiple name chunks from that directory
block.
Directory entries often have three names: one for NFS, another for DOS 8.3 compatibility, and a third for
Unicode naming. Unicode and NFS names can't be merged, because NFS is case-sensitive and CIFS is not. If
a file has multiple names, each name uses a separate name chunk. Some Unicode character sets use two bytes
per character, in which case the Unicode name will need a name chunk per 8 characters. After all the name
chunks in a directory block are used, the WAFL file system uses another directory block, even though there
are still entry slots available. The same holds true when you use fill all of the name slots for NFS
environments with short names. Finally, two files with the same name are not allowed in the same directory.
A - 19
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
Now that you have completed this module, you
should be able to:
Describe how data is structure within a WAFL
file system on a traditional volume
Explain how data is structure within a WAFL
file system in a flexible volume on a 32-bit
aggregate
Describe how data is structure within a WAFL
file system in a flexible volume on a 64-bit
aggregate
MODULE SUMMARY
A - 20
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
20
Shells
Appendix B
Data ONTAP 7-Mode Administration
SHELLS
B-1
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Objectives
By the end of this module, you should be able to:
Distinguish between administration and system
shells
Enable the diagnostic account
Log in to the system shell
MODULE OBJECTIVES
B-2
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Shells
Data ONTAP 8.0 7-Mode has two shells:
Administration shell
Allows normal operations at privileged levels
Is configured using priv set
System shell
Is used for low-level diagnostic purposes
Should only be used by customers under
guidance of technical support
SHELLS
The system shell provides a powerful run-time environment, which has proven useful in the field for
diagnosing problems with GX deployments. The Data ONTAP 7G operating system does not have this
option, but in a clustered Data ONTAP configuration, many common mode features reside in the FreeBSD
ecosystem and kernel. Those common-mode features include EMS, the AutoSupport support tool, Network
Data Management Protocol (NDMP), environmental policy, and ntpd. The FreeBSD shell is accessible from
both Data ONTAP 8.0 7-Mode and Data ONTAP 8.0 Cluster-Mode of operation.
System shell access is not available through network protocols, such as Remote Shell (RSH), Secure Shell
(SSH), and Telnet. Shell access is restricted to console sessions invoked on either the serial port or Remote
LAN Module (RLM), and is intended for internal development as well as in-field serviceability.
B-3
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
B-4
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Enter the
password
twice
B-5
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
B-6
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
whoami
ps
top
uname -a
B-7
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.
Module Summary
In this module, you should have learned to:
Distinguish between administration and system
shells
Enable the diagnostic account
Log in to the system shell
MODULE SUMMARY
B-8
2011 NetApp, Inc. This material is intended for training use only. Not authorized for reproduction purposes.