Netapp Student Guide Ontapp 7
Netapp Student Guide Ontapp 7
Netapp Student Guide Ontapp 7
Course
Revision 2.0
Copyright © 2004-2005 Network Appliance, Inc. All rights reserved. Printed in the U.S.A. Specifications
subject to change without notice.
No part of this book covered by copyright may be reproduced in any form or by any means—graphic,
electronic, or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval
system—without prior written permission of the copyright owner.
Network Appliance reserves the right to change any products described herein at any time, and without
notice. Network Appliance assumes no responsibility or liability arising from the use of products or
materials described herein, except as expressly agreed to in writing by Network Appliance. The use or
purchase of this product or materials does not convey a license under any patent rights, trademark rights,
or any other intellectual property rights of Network Appliance.
The product described in this manual may be protected by one or more U.S. patents, foreign patents, or
pending applications.
Trademark information
NetApp, the Network Appliance logo, NetApp–the Network Appliance Company, FAServer, NearStore,
NetCache, WAFL, DataFabric, FilerView, SecureShare, SnapManager, SnapMirror, SnapRestore,
Spinnaker Networks, the Spinnaker Networks logo, SpinAccess, SpinCluster, SpinFS, SpinHA,
SpinMove, SpinServer, and SpinStor are registered trademarks of Network Appliance, Inc. in the United
States and other countries. Network Appliance, Data ONTAP, Snapshot, ApplianceWatch, BareMetal,
Center-to-Edge, ContentDirector, gFiler, MultiStore, SecureAdmin, Smart SAN, SnapCache, SnapDrive,
SnapMover, SnapVault, vFiler, Web Filer, SpinAV, SpinManager, SpinMirror, Camera-to-Viewer,
ComplianceClock, ComplianceJournal, EdgeFiler, FlexClone, FlexVol, FPolicy, HyperSAN, LockVault,
Manage ONTAP, ONTAPI, RAID-DP, RoboCache, RoboFiler, SharedStorage, Simulate ONTAP,
SnapCopy, SnapDirector, SnapFilter, SnapMigrator, SnapSuite, SohoFiler, SyncMirror®, VFM, VFM
Virtual File Manager, VPolicy, Serving Data by Design,The evolution of storage,“Bolt design” ®, and
SpinShot are trademarks of Network Appliance, Inc. in the United States and other countries.
Apple is a registered trademark and QuickTime is a trademark of Apple Computer, Inc. in the United
States and/or other countries.
Microsoft is a registered trademark and Windows Media is a trademark of Microsoft Corporation in the
United States and/or other countries.
RealAudio, RealNetworks, RealPlayer, RealSystem, RealText, and RealVideo are registered trademarks
and RealMedia, RealProxy, and SureStream are trademarks of RealNetworks, Inc. in the United States
and/or other countries.
All other brands or products are trademarks or registered trademarks of their respective holders and
should be treated as such.
Change History
Date Comment
June 4, 2004 Initial release of the Version 1.0 materials for
Data ONTAP 6.5.
February 14, 2005 Next release, Version 2.0 of the materials for
Data ONTAP 7.0
Course Introduction
Welcome to the
Network Appliance
Logistics
Introductions
Schedule (start time, breaks, lunch, close)
Telephones and messages
Food and drinks
Restrooms
Course Prerequisites
Course Objectives
Course Objectives
Course Objectives
Course Agenda
Day 1
– Morning
• Overview
• Basic Administration
• Managing Disks
– Afternoon
• Network
• NFS
Day 2
– Morning
• CIFS
• Multiprotocol
– Afternoon
• SAN
• Install
Course Agenda
Day 3
– Morning
• Snapshot
• Quota
– Afternoon
• Backup
• Restore
Day 4
– Morning
• NDMP
• Vol Copy
– Afternoon
• Checking Health and Performance
Day 5
– Morning
• Maintaining Health and Performance
• The NOW Site
Information Sources
NOW Site
– NOW.NetApp.com
NetApp Training
– www.netapp.com/education
– email
• Americas
[email protected]
• Asia Pacific
[email protected]
• Europe and Middle East
[email protected]
3.0
– You may not rent, lend, lease
or sublease this software
Typographic Conventions
Class Size
The recommended maximum number of students is 16 with 1 Windows workstation per student
and 2 students per storage appliance.
Equipment Requirements
Classrooms
Delivery Equipment
• White boards and pens
• Printer
Instructor PC
Hardware:
• Windows based PC
Software
• WinZip
• PowerPoint
Student PC
Hardware:
• Windows based PC
Software
• WinZip
Lab Equipment
Storage Appliance (1 each for every 2 students)
Unix Admin-host
• These files are important so the Web-based materials can be utilized for the SAN,
Backup and Restore module exercises.
• Release 7.X
Two versions of 7.0 should be here for install and upgrade purposes, If need be, it is OK
to do an install and upgrade with the same version. It is helpful for students to see the
version number change.
Ethernet Switch
Class Setup
Storage Appliances
• Initialize all disks
• ONTAP 7.X
• DNS configured
• The environment variable for floppy boot should be deleted. After a halt enter the
following at the ok prompt:
• time zone set to PST/PDT for local classes (instructor sets on the road)
• DOT Fundamentals courseware will also need to be placed into this directory.
It is important to place proper DOT software for the hardware in the class. This DOT
software will be utilized with the software command in the installation module.
Exercise Setup
In 2 instances when running the exercise for the Backup module the student experienced their
keyboard input was being typed in backwards on the screen within the WBT. The solution was
to stop and restart Internet Explorer.
Safety
Alarm signal
Evacuation route
Assembly area
Electrical safety
ESD procedures
Module 1. Overview
Overview
Objectives
Storage Appliances
UNIX
UNIX
HPUX
HPUX
Storage Appliances
NetApp storage appliances are designed for data storage, connect directly to a network, and have
integrated disks. They use a streamlined Data ONTAP operating system that operates simply,
quickly, and reliably.
NFS
CIFS
FCP or iSCSI
DAFS
HTTP
FTP
Protocol Description
NFS Network File Service protocol allows UNIX and PC NFS clients to mount
file systems to local mount points. The storage appliance supports: NFS v2,
NFS v3, and NFS v4, NFS over UDP and TCP.
CIFS Common Internet File System supports Windows 95, Windows 98, Windows
2000, Windows for Workgroups, Windows NT 3.51, Windows NT 4.0, and
Windows 2000.
FCP or iSCSI Fibre Channel Protocol or internet Small Computer System Interface enables
a storage device to communicate with one or more hosts running operating
systems such as Solaris or Windows in a SAN environment. You can also
configure logical units of storage (LUNs) for multi-protocol access, for block
access or as files for file access, or both.
Protocol Description
DAFS Direct Access File System is a file access and management protocol
designed for local file-sharing environment. It provides low latency, high
throughput, and low overhead data management.
HTTP Hypertext Transfer Protocol enables World Wide Web browsers to display
files that are stored on the storage appliance.
FTP File Transfer Protocol enables UNIX clients to remotely transfer files to and
from the storage appliance.
Administration Services
Administration Services
NetApp storage appliances support the following administration services:
Service Technology
Networking Services VLAN
RIP
Directory Look up Services DNS
NIS
WINS
Remote Administration Services RSH
Telnet
ssh
SNMP
RMT
SNTP
SMTP
Security Services Kerberos V5
LDAP V3
Service Description
DNS Domain Name Service protocol enables queries for IP address vs. host names from
DNS servers.
LDAP v3 Lightweight Directory Access Protocol provides directory services for Windows
2000.
NDMP Network Data Management Protocol enables remote backup and restore of storage
appliance data to disks or tape devices, using industry standard protocol.
NIS Network Information Service protocol enables the storage appliance to query NIS
servers to authenticate user names, passwords, group names, and netgroup access
permissions.
RIP Routing Information Protocol enables the storage appliance to query RIP servers to
determine the default gateway for the network.
RMT Remote Magnetic Tape protocol enables remote hosts to remotely access the
storage appliance tape drive.
rsh Remote Shell protocol enables administrators to send commands from designated
remote hosts to the storage appliance.
SNTP Simple Network Time Protocol allows time synchronization with an NTP server.
Telnet Telnet protocol enables administrators to log in, monitor, and manage the storage
appliance from remote hosts using telnet client software.
VLAN A Virtual Local Area Network provides a virtual local area network, which is
IEEE 802.1Q compliant.
WINS Windows Interface Naming Service protocol enables the storage appliance to
query WINS servers to resolve CIFS netbios names.
How data is written – When data comes into the filer, it is first stored in
one of a pair of battery-backed up memory banks. As one memory bank
becomes full, it dumps the data onto disks while the other memory bank
takes over the task of caching data.
Purpose – Stores data into a group of disks, which is safer than putting it
in a single disk. Protects against disk failure and avoids disruption to
users.
Features – In RAID 4, if a data disk fails, the RAID manager uses the
parity disk and the information contained on the remaining disks to
calculate and reconstruct the missing data and then rewrite it to a
replacement disk.
For failure protection that is 4,000 times more reliable than RAID 4,
Network Appliance Inc. offers RAID DP. RAID DP (Dual Parity) is a
double disk failure protection scheme. RAID DP incorporates a second
parity disk. With this scheme you can have two disks fail in a RAID
group without data loss.
Snapshot WAFL uses Snapshot as a fast and simple file backup system. Snapshots
are “pictures” of an entire file system as it was when the snapshot was
taken. They are not complete copies of everything on the system, but are a
sort of directory of where old files are located and what they looked like
before they were changed or deleted. Snapshots enable you to find files
and copy them to the regular file system. Snapshots take up less space
than other backups because they only keep track of changes, rather than
contain all of the data. Snapshots can be done manually or set up
automatically on a schedule without taking the filer off-line. Up to 255
Snapshots can be stored on a traditional or flexible volume at one time.
The most important feature of Snapshot that differentiates it from other
file retrieval systems is the small amount of file space required.
Network Services Network services provide connectivity to many types of networks using
many types of protocols. Data ONTAP provides file-level access through
protocols including NFS, CIFS, Direct Access File System (DAFS),
HTTP, and FTP, and block-level access through Fibre Channels for SCSI
and iSCSI for TCP/IP protocols.
Data ONTAP
Data ONTAP
Network Appliance’s Data ONTAP operating system provides comprehensive software
architecture for its storage appliances to ensure that storage management is simplified, and
business continuance is maximized. This architecture contains three main elements that work
together to provide speed, and reliability, and safety.
• RAID manager
Topic Review
Basic Administration
Objectives
Console Access
RJ-45
Connection to DB9-DB9
console port
Console Access
A terminal, or terminal server, can be connected to the storage appliance console port via a
standard RS232 connection. For example, a DB9 to DB9 serial cable (null modem) with the
following setting for the serial communication port:
• Data bits 8
• Parity None
• Stop bits 1
Note: For illustration purposes, the graphic above shows an adminhost and terminal server
connected to the console of the storage appliance. There is only one console connection so you
would have either the adminhost or the terminal server connected, not both.
Telnet Access
Telnet Access
Once you have a connection, these are the steps to login:
3. To access the storage appliance with an alternative user account, enter username.
4. Enter the password at the prompt or press Enter if no password is defined for the account.
Note: The console and telnet share a single session. Commands typed at either location are
displayed at the other location. Commands entered at either location can be aborted by pressing
Ctrl-C.
Note: Where host name is the name or IP address of the storage appliance, follow the same
login instructions as though you were entering them directly on the console.
Options
Example Result
options telnet.enable on Enables telnet access.
FilerView
XX
FilerView
FilerView is an administration tool available to every NetApp storage appliance. This tool
enables IT administrators to use a web browser to access a consistent, easy-to-use graphical
interface for everyday administration tasks.
Administrators can set up and control any NetApp storage appliance remotely without disruption
to business-critical operations. While file systems remain accessible to users, they can:
• Monitor status
FilerView runs in local-client web browsers and communicates to the storage appliance mostly
with HTML and SNMP protocols. It also will establish a real telnet console session to the
storage appliance upon requesting the “Use Command Line” function.
Using FilerView
Accessing FilerView remotely requires either:
Accessing FilerView
http:/hostname_or_IP/na_admin
When you leave the Use Command Line window in FilerView, the telnet session is closed.
Transition Slide
Basic
Appliance
Configuration
Console Commands
Console Commands
Many console commands provide storage appliance system configuration information. These
commands can be used to:
Example Result
sysconfig -v Displays detailed information about each I/O device.
vol status -r Displays volume and RAID group information. (Note: Same as
for sysconfig –r.)
options commands:
• Can be entered on the console and some are available with FilerView
• Are automatically added to the storage appliance’s registry in the /etc/registry file
The configuration file is named rc and is located in the /etc directory of the storage appliance’s
root volume. The default root volume is /vol/vol0. The /etc/rc file is created automatically when
the storage appliance is configured.
• the network interface configuration commands in the /etc/rc file specify an incorrect address
or there are other mis-configured items
Since you cannot access the storage appliance’s configuration file to edit it with a text editor, you
will have to use other methods to correct errors in the /etc/rc file.
• You can correct the errors by using the ifconfig and exportfs commands via the
console.
• Alternately, if CIFS is enabled you can access the /etc/rc file from a CIFS client and correct
the NFS export error once the network interface is configured correctly.
Registry Database
Registry Database
Persistent configuration information and other data are stored in a registry database.
Several backups of the registry database exist and are automatically used if the original registry
becomes unusable. In particular, /etc/registry.lastgood is a copy of the registry as it existed after
the last successful boot.
The /etc/registry, is edited by Data ONTAP and should not be manually edited.
Configuration commands such as the network interface configuration (ifconfig) must remain
in the /etc/rc file.
Several methods can be used to manage which individuals have administrative access to a
system:
User Access
User Access
An administrative user is a named account that exists on a storage appliance. Each administrative
user will have a unique login name and password, which increases security.
Administrative console users have the same privileges as root console users. Syslog
(/etc/messages) records console logins by username, time of access, and node name/address.
Note: The password must be at least 6 characters and contain at least two letters and at least one
number or special character.
Example Result
useradmin useradd devadmin1 Creates a new administrative user named
devadmin1 and prompts you for a password.
Trusted Hosts
Trusted Hosts
The trusted.hosts option can be used to limit telnet and FilerView access to administrative
pages to only those hosts that have been approved in advance. This prevents individuals who
have obtained administrative access IDs and passwords from accessing the system from
unknown and unapproved machines, thus increasing security.
Admin Hosts
Admin Hosts
The term adminhost is used to describe an NFS or a CIFS client machine that has the ability to
view and modify configuration files stored in the /etc directory of the storage appliance’s root
volume.
The storage appliance grants root permissions to the administration host after the setup procedure
is complete.
CIFS User must be a member of the Edit configuration files by accessing the
“Domain Administrators” or \\filer\C$ share
“Administrators” W2Kgroups.
Transition Slide
Autosupport
Autosupport
Autosupport is a service provided for NetApp storage appliances that monitors the function of a
storage appliance. The Autosupport daemon triggers automatic email messages to members of
Network Appliance Technical Support, alerting them to potential storage appliance problems.
If necessary, technical support contacts the administrator via email and provides troubleshooting
information for resolution. Specific storage appliance conditional events can be configured as
traps that will trigger an Autosupport sequence.
Network Appliance encourages all customers to enable Autosupport. This allows our
Autosupport mechanisms to be proactive and makes us better able to assist you when you call.
If the mail host is using SMTP then it should be configured to listen on SMTP port (25).
By default, the administration host defined during setup is used as a mail host.
• System reboots
• Shelf faults
• System overheating
• Cluster events
To read descriptions of Autosupport messages you might receive, complete the following steps.
1. Go to the Network Appliance NOW site, and search for “ Autosupport Message Matrices.”
2. View the matrices in the online version or the Data ONTAP manual listed.
• Contents of /etc/messages
In addition to the output of this list of auto-generated status reporting commands, the
Autosupport messages contain additional storage appliance-specific information. This
information helps to identify crucial parameters that are needed in follow-up handling of the
triggering event.
Autosupport Options
The table shows a shortened version of the Autosupport options available. See the command
reference for a full list of options and descriptions.
Example Result
options autosupport.enable off Disables the Autosupport daemon. Default
is on.
options autosupport.mailhost Specifies two mail host names: maildev1
maildev1,mailengr1 and mailengr1. (You can enter up to five
mail host names).
Transition Slide
Documentation
& Support
www.netapp.com/Library
www.netapp.com/Library
You can access many documents from the NetApp website at http://www.netapp.com by
selecting the Library link on the menu toolbar at the top of the web page.
There is a Table of Contents where you can select a document listed alphabetically and a search
function where you can search either the Tech Library or the www.netapp.com site for a
document.
now.netapp.com
NOW
The NOW site has a tremendous amount of support and documentation information available to
Network Appliance customers.
• You can access the NOW site by clicking on the following website: http://now.netapp.com
• If you do not have a user name and password, they can be easily obtained by clicking on the
New User Sign Up link.
• You can find documents by clicking on the Technical Assistance & Documentation link or
by performing a PowerSearch for Product Documents.
Documentation
Documentation
The system administration documents are available in the Data ONTAP Information Library at
http://now.netapp.com.
Since these materials are updated regularly, you should check the website for the most recent
version.
Document Description
Software Setup Guide Describes how to set up different protocols on the filer.
System Administration File Describes how to configure and manage different file
Access Management Guide access protocols supported by Data ONTAP software
and are Serving Data By Design.
Document Description
System Administration Block Describes how to configure, operate, and manage
Access Management Guide Network Appliance filers that run Data ONTAP and are
Serving Data By Design.
Commands: Manual Page Provides a listing of the man pages for filer commands.
Reference
Hardware and Service Guide Describes how to install a storage system, connect it to
the network, and start it up.
Hardware Documentation
The NOW site contains a Hardware Information Library at http://now.netapp.com
The Hardware Information Library has documentation for NetApp filers, NearStore systems,
NetCache appliances, disk shelves, disk drives, power supplies, and related information.
Topic Review
Autosupport Exercises
Basic Administration
Exercise Overview
Student has the opportunity to use commands, FilerView and to configure Autosupport
Time Estimate
20 Minutes.
Step Action
1. Use either HyperTerminal, Tera Term Pro or telnet to access the filer.
Step Action
1. Enter sysconfig. What happens?
Step Action
1. Enter vol status. What happens?
Disk Space
Enter the following commands and observe the results.
Step Action
1. Enter df . What happens?
Step Action
1. Enter sysstat and wait 15 seconds. What happens?
_________________________________________
_________________________________________
_________________________________________
_________________________________________
_________________________________________
FilerView
The purpose of this activity is for you to practice using the FilerView tool. You will access
FilerView, use FilerView to access Manual Pages and use the FilerView administration tool.
Accessing FilerView
Step Action
1. Open the web browser. (Use Internet Explorer 5.x or later.)
http://filername/na_admin
Note: If response is slow, check the host file of the host you are working from (or
other resolution services such as the DNS server), if you are using one. You may
also use the filer’s IP address instead of the filer name:
http://x.x.x.x/na_admin
Installing Documentation
Step Action
1. Click the link to the NOW site log in and select the appropriate version of ONTAP
documentation. There are designated download links for WinZip format and TAR
files for Unix systems.
3. On the FilerView page, select Click Here next to the Documentation subheading,
respond to the prompts to install the documentation software. When prompted, enter
“root” for user name and the appropriate root password for the filer.
4. Once the installation has finished, return to the main FilerView page and observe that
the documentation link (and icon) is now active. You may need to refresh the display.
Step Action
1. On the FilerView page, click the documentation icon and observe that you are
provided with a list of available documents.
___________________________________________________________.
________________________________________________________
________________________________________________________
________________________________________________________
___________________________________________________
Step Action
1. On the main FilerView page, click the Manual Pages icon.
____________________
____________________
____________________
5. What three Table of Contents topics are always included in the manual pages?
____________________
____________________
____________________
Step Action
1. Return to the FilerView main page. If prompted, enter “root” for user name and the
appropriate root password for the filer.
3. Explore these options. Use the ? and Help buttons, locate information.
Step Action
5. What is the path to configure Autosupport?
__________________________________________________
____________________________________________
d. Check df, system configuration, and network interface configuration on the same
report.
Configuring AutoSupport
The purpose of this activity is for you to practice configuring the filer’s Autosupport feature.
You will execute Autosupport console commands, enter SNMP contact and location information,
verify the filer’s serial number and test your Autosupport configuration.
Step Action
1. Use either telnet or HyperTerminal Tera Term Pro to access the filer.
2. Using the information provided to you by your instructor, enter the following list of
commands at the console prompt:
options autosupport.enable on
Step Action
1. Enter the following list of commands at the console prompt:
snmp init 1
Step Action
1. Execute this command at the console prompt:
5. Type: mail
6. Enter the message number of the ‘testing’ message. For instance, if ‘testing’ is
message 1 - type 1.
8. Press the space bar to scroll forward in the message until you view the System
Serial Number line. For instance, if your serial number was 3003908 you will see
the following:
Netapp-asup-serial-num: 3003908
9. Continue to scroll through the Autosupport message to view the other information
Autosupport sends to Autosupport recipients.
10. Press ‘q’ to exit.
End of Exercises
Objectives
RAID-DP
Minimum Maximum group
Platform group size size Default group size
R200 3 16 14
R150 3 16 12
R100 3 12 12
All other NetApp 3 28 16
platforms
RAID 4
Minimum Maximum group
Platform group size size Default group size
R200 2 7 7
R150 2 6 6
R100 2 8 8
FAS250 2 14 7
All other NetApp 2 14 8
platforms
RAID Group
RAID4
RAID DP
RAID Group
A RAID group (Redundant Array of Independent Disks) is comprised of several disks linked
together in a storage appliance. (There are different implementations of RAID; Data ONTAP
uses RAID4.) A key to understanding how to manage disks and volumes is the understanding of
RAID groups.
IN Data ONTAP, each RAID4 group consists of at least one parity disk and one or more data
disks. The storage appliance assigns the role of parity disk to the largest disk in the RAID group.
When a data disk fails, the storage appliance will determine the data that was on the failed disk
and rebuild a hot spare with that data.
RAID DP provides for dual parity protection against a single or double disk failure within a
RAID group. The minimum number of disks in a RAID DP group is three. One data, one parity,
and one dual parity (dparity) disk.
Note: If a parity disk fails, it can be rebuilt from the data on the data disks.
Disk Failures
Disk Failures
You can determine which disk has failed by using the sysconfig -r command.
Hopefully, your system is equipped with appropriate hot spare disks. Notice in this graphic that
hot spares are not part of any RAID group but are part of the storage appliance. When a disk
fails, the storage appliance automatically rebuilds data or parity onto a hot spare disk if one is
available.
Replacing Disks
You can also replace a failed disk by hot swapping which is the removal or installation of a disk
drive while the storage appliance is running, with minimal interruption to a file system. This
allows new disks to be added whenever needed.
If two disks are removed from a RAID4 group at the same time, this constitutes a double-disk
failure, and data loss will occur. If the volume is protected by RAID-DP, your data is protected.
If a volume contains more than one RAID4 group, you could have two disks in a volume fail as
long as they were not in the same RAID group.
Degraded Mode
Hours
Degraded Mode
If no hot spare disk is available to replace a failed disk, the system will operate in “degraded”
mode for a period of time. The default is 24 hours.
No data will be lost, although the system will not perform optimally. If the failed disk is not
replaced during this period, the system will shut down. You can reset this time interval by using
the options raid.timeout command.
You may want to set this to a longer time interval if access to the system is limited for a specified
period, such as a long weekend.
However, if a second disk in a RAID4 group should fail during degraded mode, it will constitute
a double-disk failure and data loss will result. (In a RAID DP group no data loss occurs unless a
third disk fails.) For this reason, failed disks and used hot spare disks should be replaced as soon
as possible. In addition, be careful about using the options raid.timeout command to
lengthen the time the system will operate in degraded mode before shutdown because a longer
interval increases the risk of a second disk failure and the resulting data loss.
12
34 56
However, different-sized disks require different versions of Data ONTAP, and different disk
shelves. Consult the NOW site for specific information about your system by checking the
System Configuration Guides.
Remember, parity and hot spare disks must be as large as the largest disk in a RAID group, so
they can support all the stripes on any of the data disks. (When creating RAID groups with
different size disks, Data ONTAP will assign parity to the largest disk. If you later add larger
disks to the RAID group, Data ONTAP will reassign parity to the largest of those disks.)
Note: While mixing different disk sizes in a volume is a supported configuration, this can lead
to sub-optimal performance of the volume. Network appliance recommends that all disks in a
volume be of the same size.
If the usable space on the replacement disk is larger than the failed disk, the replacement disk
will be right-sized to the failed disk capacity. The extra space on the disk is not useable.
If you have a storage appliance with a mix of FC7, FC8 and FC9 shelves and a 9 GB drive fails
on an FC7 shelf, an 18 GB drive on another shelf will be right-sized and used to replace the
failed disk. The 18GB disk cannot be moved to the FC7 shelf because the FC7 shelf can only
support up to 9 GB drives.
Transition Slide
Configuring
RAID Groups
options raid.timeout
options raid.reconstruct.perf_impact
options raid.scrub.enable
options raid.scrub.perf_impact
options raid.default_raidtype
Note: For a complete listing of all the RAID options, see your product documentation.
Example Result
options raid.timeout 36 Changes the amount of time the system will
operate in degraded mode from the default
(24 hours) to 36 hours.
options Changes the amount of system resources
raid.reconstruct.perf_impact low allocated to reconstruction of data from
default (medium) to low (runs when nothing
else is running). Can also be set to high
(runs except when CPIO is running).
options raid.scrub.enable on Enables RAID scrub to occur automatically
at 1:00 a.m. on Sundays.
options raid.scrub.perf_impact low Sets scrub performance at low. Can also be
set to medium or high.
options raid.default_raidtype raid4 Specifies RAID4 as the default raidtype
used when creating new volumes. Entering
"raid4" creates one parity disk per
raidgroup; entering "raid_dp" creates two
parity disks per raidgroup.
Disk Scrub
Disk Scrub
Storage appliances use disk scrubbing to protect data from media errors, or bad sectors, on a
disk. Each disk in a RAID group is scanned for errors. If errors are found, they are fixed by
reconstructing data from parity and rewriting the data. Without this process, a disk media error
might cause a multiple disk failure while running in degraded mode.
Automatic RAID scrub is enabled by default. You can set it to off, if you prefer to control when
RAID scrub will occur. You can also manually start and stop disk scrubbing regardless of the
current value (on or off) of the raid.scrub.enable option.
Multiple bad blocks found on volume volume_name, More than one bad block
RAID group n, stripe #n
Scrub found n parity inconsistencies. Scrub found n media When disk scrubbing is complete
errors. Disk scrubbing finished.
Disk Commands
Disk Commands
Example Result
disk fail 4a.16 Fails the file system disk, 4a.16.
disk replace start 4a.16 Replace disk 4a.16 with a hot spare.
Disk Qualification
Transition Slide
Disk Qualification
Only disks qualified by Network Appliance, Inc. can be used with NetApp products. This means
they must be purchased only from NetApp or an approved reseller. Data ONTAP automatically
detects unqualified disks and takes the following action.
Unqualified Disks
• Attempting to use an unqualified disk will produce a “delay forced shutdown” for 72 hours.
This means that you have 72 hours to remove and replace the unqualified disk before a
forced system shutdown will occur. Additional actions include:
• Automatic error generation and delayed forced shutdown if the /etc/qual_devices file is
modified
Disk Qualification
Disk Qualification
Firmware download occurs automatically at system boot, disk insertion, and cluster takeover.
If you installed a new drive into your disk shelf and your storage appliance responds with an
error message identifying the disk and ID number indicating the disk is unqualified, you must
remove the disk and insert one that is qualified.
To correct an unqualified disk error so that the storage appliance does not halt within 72 hours:
1. Remove disk drives that are not provided by Network Appliance, Inc. or an authorized
NetApp vendor or reseller.
3. If "unqualified" error messages persist after installing an up-to-date /etc/qual_devices file, try
reinstalling the /etc/qual_devices file.
4. If reinstalling fails, remove the unqualified disk and contact Network Appliance Technical
Support.
Transition Slide
Identifying
Disks
Disk ID
Disk ID
Disks are numbered in all storage appliances. Disk numbering allows you to:
• For example, command output or error messages you see on your display.
• To identify the disk ID, use the sysconfig –r or vol status –r commands.
Path ID refers to the adapter number associated with the disk. Device ID refers to the logical
loop ID of the disk.
In the example shown here, the disk with the ID 4a.16 is on the loop connected to port A of the
host adapter in slot 4.
DS14 Style
FCX Style
• Device IDs are determined by the type of shelf, the shelf number, and the bay in which the
device is installed.
Note: If you are installing a DS14 into a loop that also contains FC7, FC8, or FC9 Fibre
Channel storage shelves, to avoid address conflicts, the DS14 must be the last disk shelf in the
loop and must have the highest disk shelf ID in the loop.
• DS14 Series Shelves: 0-15, 30-31, 46-47, 62-63, 78-79, 94-95, 110-111
Transition Slide
Managing
Volumes
Traditional volumes
A traditional volume is a volume that is contained by a single, dedicated, aggregate; it is tightly
coupled with its containing aggregate. The only way to grow a traditional volume is to add entire
disks to its containing aggregate. It is impossible to decrease the size of a traditional volume.
All volumes created with a version of Data ONTAP earlier than 7.0 are traditional volumes. If
you upgrade to Data ONTAP 7.0, your volumes and data remain unchanged, and the commands
you used to manage your volumes and data are still supported.
Flexible volumes
A flexible volume is a volume that is loosely coupled to its containing aggregate. You can create
small flexible volumes (20 MB or larger), and you can increase or decrease the size of flexible
volumes in increments as small as 4 KB.
Limits
You can create up to 200 flexible and traditional volumes on a single filer. In addition, the
following limits apply.
Traditional volumes: You can have up to 100 traditional volumes and aggregates combined on
a single filer.
• Each traditional volume is also an aggregate; therefore a combination of 100 hits the
aggregate limit.
Flexible volumes: The only limit imposed on flexible volumes is the overall system limit of 200
volumes.
Setting up Volumes
filer
S S S S S S
Aggregate
Traditional P
A
P
A
P
A
P
A
P
A
P
A /flexvol1/plex0
/vol0/plex0 R R R R R R
/flexvol2/plex0
E E E E E E
Raid Raid
group 0 group 1
D Raid group 1
PDDD PDDD PPDDDDDDDDDDDD
Setting up Volumes
Considerations for traditional volumes
Upgrading
If you upgrade to Data ONTAP 7.0 from a previous version, the upgrade program preserves each
of your existing volumes as traditional volumes.
Disk portability
You can create traditional volumes and aggregates whose disks you intend to physically
transport from one appliance to another.
You can choose to over commit space with flexible volumes. Refer to your documentation on
Aggregate over commitment.
Volume language
During volume creation you can specify the language character set to be used.
Backup
You can size your flexible volumes for convenient volume-wide data backup
Volume cloning
Many database programs enable data cloning. This is an efficient way to copy data for:
• Manipulation
• Projection operations
• Upgrade testing
Data ONTAP allows you to create a duplicate of a volume by having the original volume and
clone volume share the same disk space for storing unchanged data. Refer to your documentation
on Cloning flexible volumes.
Foreign Volume
A foreign volume or aggregate is one which has been removed from one storage appliance and
installed into another.
• Replace a disk shelf with one that has a greater storage capacity
NetApp recommends that you only move disks from a source filer to a destination filer if the
destination filer has equivalent or higher NVRAM capacity.
Multiple Volumes
Multiple Volumes
Many administrators decide to set up multiple volumes, rather than using only one. Advantages
of using multiple volumes are:
• Backup and restore functions take less time when performed on individual, smaller volumes
than on large volumes.
• Many properties and options command values can be set differently for individual volumes.
• Individual volumes can be taken off-line to perform administrative and maintenance tasks
while the other volumes remain online, without interrupting the availability of data on them.
If the original root volume is not available, the storage appliance could still boot from another
volume and provide continued service from the remaining volumes.
Root Volumes
Root Volumes
Each storage appliance has only one root volume, although the designated root volume can be
changed. The root volume is used to boot the storage appliance. It is the only volume with “root”
attributes, meaning that its “/etc” directory is used for configuration information.
Note: /vol is not a directory—it is a special virtual root path under which the storage appliance
mounts other directories. You cannot mount /vol to view all of the volumes on the storage
appliance; you must mount each volume separately.
Data Reliability
Data Reliability
Data reliability is fundamental to NetApp products. There are two functions that increase that
reliability:
• RAID-level checksums – These enhance data protection and reliability and are integral to
future Data ONTAP releases.
Checksums
A checksum verifies that the amount of data read, equals the amount of data written. If we know
that these two figures are equal, then we can be certain that there is no missing data. Data
ONTAP does this, and it is invisible to the user. Two types of checksum are supported:
Multipath I/O
Multipath I/O
The Multipath I/O feature enables you to provide both a primary and a secondary access path for
each disk on a storage appliance.
By providing redundant paths to the same disk on a single storage appliance, the Multipath I/O
feature provides the following advantages:
• Overall reliability and uptime of the storage subsystem of the storage appliance is increased
• Increase throughput
The slide illustrates an example of a Multipath I/O setup on a storage appliance. The storage
appliance has dual-port host adapters installed in slot 7 and slot 8. The host adapter ports connect
to the disk shelf ports as shown. This setup uses two dual-port host adapters to connect to two
disk shelf loops, thus preventing the host adapters from being the single points of failure.
Although it is not necessary to have a dual-port host adapter to set up Multipath I/O, it is
recommended because using dual-port adapters conserves PCI slots.
• The storage appliance must be connected to FC9 (XL500) and/or DS14 shelves
aggr Command
vol Commands
Flexible
Example Result
vol create vol2 2 Creates a new volume named vol2 from spares. You can
ask for disks of a certain size, enter a specific list of
disks, or specify how many to add.
vol create vol2 -n 3 Displays the command that the system will execute
without actually making any changes. In this example,
vol create vol2 -d 0b.28 0b.27 0b.26 is
returned.
vol create flexvol Creates a new volume named flexvol on aggr1 that is
aggr1 20G 20GBs in size.
vol add vol1 3 Adds 3 more disks to the existing traditional volume,
vol1.
vol status vol1 Displays the volume size, options, etc., for vol1.
vol rename vol2 vol3 Gives volume vol2 the new name, vol3.
vol offline vol3 Removes volume vol3 from active use without reboot.
vol destroy vol1 Turns volume vol1 (if offline) back into individual spare
disks.
vol size flexvol 30G Changes the size of the volume named flexvol to 30GBs.
vol size flexvol +10g Increases the size of the volume named flexvol by
10GBs.
Scrubbing
Scrubbing
Scrubbing compares the data disks to the parity disk in a RAID group, correcting the parity disk's
contents as necessary.
The vol scrub or aggr scrub commands may be used only on RAID groups with active
parity; it will not work on groups that are rebuilding parity, degraded, or reconstructing.
If the name of a specific volume or aggregate is not specified, all volumes or aggregates will be
scrubbed. If a volume or aggregate has some RAID groups that are eligible to be scrubbed and
others not eligible, a scrub can still be started. You will receive error messages for the ineligible
groups, but scrubbing will be performed on the rest.
• Rather than detecting disk problems when one actually fails, the Storage Health Monitor
detects impending disk problems before they occur.
• You can then elect to replace the disk before any actual client data problems occur.
• Messages are reported through SNMP, Autosupport, and system log, depending on user-
specified error metrics.
Syslog Messages
shm: disk has reported a predicted failure (PFA) event: disk XX,
serial_number XXXX
shm: link failure detected, upstream from disk: id XX,
serial_number XXXXX
shm: disk I/O Completion times too long: disk XX, serial number
XXXXX
shm: possible link errors on disk: id XX, serial number XXXXX.
shm: disk returns excessive recovered errors: disk XX, serial
number XXXXX
shm: intermittent instability on the loop that is attached to Fibre
channel adapter: id XXX, name XXXXX
Syslog Messages
shm: disk has reported a predicted failure (PFA) event: disk XX,
serial_number XXXX
Description of Problem: The disk has reported a Predicted Failure (PFA) Event. The disk's
internal error processing and logging algorithm computation results are exceeding an internally
set threshold. The disk is bound to fail in a matter of hours.
Category: Urgent
Action Required: Replace the disk.
Category: Urgent
Action Required: Halt the storage appliance. Use disk scrub on each disk, and replace disks and
cable one at a time to determine what is malfunctioning. Replace malfunctioning disk or cable.
shm: disk I/O completion times too long: disk XX, serial number
XXXXX
Description of Problem: Either the disk is old and slow, or it is internally recovering errors,
thereby taking too long to complete an I/O. The message also indicates that there are too many
I/O timeouts and retries on a disk. The disk might also be returning Command Aborted status
quite often. All these can result in low data throughput rate for that disk, and lowered overall
system performance.
Category: Non-urgent
Action Required: The disk is failure-prone; you should replace it.
Category: Non-urgent
Action Required: Halt the storage appliance and remove the disks and cables one at a time to
determine which is malfunctioning. Replace malfunctioning disk or cable.
Category: Non-urgent
Action Required: The disk is failure-prone; you should replace it.
Category: Informational
Action Required: None
Topic Review
Autosupport Exercises
Managing Disks
• Create an aggregate
Exercise Overview
The purpose of this activity is for you to practice the skills needed to manage disks and volumes.
You will add a disk to an existing file system, use command line entries to create a new volume,
manually fail a disk, and replace a failed disk.
Time Estimate
30 minutes
Start of Exercise
Creating a new volume.
Step Action
1. At the storage appliance’s prompt, create aggr1 with 2 disks.
Step Action
1. Access the storage appliance’s console.
2. Enter vol status –r and determine which bay on your shelf does not have a
disk installed.
Hint: Determine how many bays your disk shelf has based on the vol status –
r command. If you have an FC7-FC9 disk shelf, you should have bays 0-6. If you
have a DS14 type shelf, you should have bays 0-13. The bay that is not shown is the
one without the drive installed.
4. View the messages that appeared on the storage appliance’s console after the
insertion of the disk.
Enter vol status –r to verify the addition of the new disk. The disk should
show up in the missing bay.
5. If all of the slots are full, there are no hot spares, and all of the disks are assigned to
volumes, can you add a disk to a volume? What must you do?
___________________________________________________
___________________________________________________
Step Action
1. Access the storage appliance’s console and enter vol status -r to determine the
availability of hot spares.
_________________________________________
3. Copy the returned command and enter it at the storage appliances prompt. View the
output.
5. At the storage appliance’s console, enter the following command to rename the
volume.
Note: At this point you should have two volumes, vol0 has two disks and vol2
should be a flexible volume that is 2 Gig in size. The volume named vol2 should be a
flexible volume on aggr1 which consists of four disks. If you have a different
configuration, please consult the instructor before proceeding to the next activity.
Step Action
1. At the storage appliance’s console, enter the following and view the vol options.
2. At the storage appliance’s console, enter the following to change the nosnap setting
of vol1.
3. At the storage appliance’s console, enter the following and view change to the vol2
options.
4. At the storage appliance’s console, enter the following to change the raidtype of
aggr1 to dp.
5. At the storage appliance’s console, enter the following to view the activity to change
the raidtype.
NetApp> sysstat 1
You should see about 2-3 times the amount of reads to writes. The system is
computing the dual parity and writing it to the dparity disk.
6. At the storage appliance’s console, enter the following to change the raidtype of
aggr1 to raid4
Failing a disk.
Step Action
1. At the storage appliance’s console, enter aggr status aggr1 –r or
sysconfig -r to view the disk id numbers for aggr1.
_________________________________________
_________________________________________
_________________________________________
4. What would happen if you failed a disk in vol1 with no hot spare available?
________________________________________
_________________________________________
5. What is the difference between the information provided by the vol status and
the sysconfig command?
_________________________________________
_________________________________________
_________________________________________
End of Exercise
Networking
Objectives
Hostname Resolution
/etc/hosts
A DNS server
A NIS server
• /etc/hosts
• DNS
• NIS
By default, the storage appliance first tries to resolve host names locally by searching the
/etc/hosts and the /etc/nsswitch.conf file.
Note: DNS and NIS can be configured using the setup command during installation of a
storage appliance. As a result, many of the commands and files that you will learn about in this
lesson are executed automatically. NIS or DNS commands are usually entered manually if:
Hostname Resolution
/etc/hosts
Function
The /etc/hosts file is automatically generated during the setup procedure for the storage
appliance, as a part of the data install process. It is populated at that time with the IP addresses
and hostnames.
Note that:
• The default IP address for the local host (storage appliance) is listed
• Installed cards that do not have IP addresses are included but are commented out
The /etc/hosts file may also be managed using the FilerView web application. Choose Manage
Hosts File from the Network node on the main menu to access and edit the file.
Hostname Resolution
NIS server
NIS enables you to centrally maintain host information, so you don't have to update the /etc/hosts
file on each storage appliance on your network.
The storage appliance can be a NIS client and can query NIS servers for host information, but it
cannot be a NIS server. If you want to use NIS as the primary method for host resolution,
specify it ahead of other methods in the /etc/nsswitch.conf file.
Hostname Resolution
Domain
Controller
user info
group info
password info
machine info
To make the configuration commands permanent, enter them in the /etc/rc file. The /etc/rc file is
automatically generated during the setup procedure as part of the Data ONTAP install process. It is
populated with the DNS configuration information if you choose to set up DNS at that time.
The information command, dns info, displays the status of the DNS resolver, a list of DNS
servers, the state of each DNS server, the default domain configured on the storage appliance,
and a list of other domains that will be used with unqualified names for name lookup.
Command: dns
Example Result
options dns.domainname Sets the DNS domain name to dns_campus2.
dns_campus2
Hostname Resolution
/etc/nsswitch.conf
Each line in the /etc/nsswitch.conf file uses the format shown above.
The file can be modified at any time to change the default search order for hostname resolution.
Once a storage appliance resolves the hostname, the search ends.
Routing
netstat –r command
Routing
Even though a storage appliance may have multiple network interfaces, it does not function as a
router for other network hosts. It does, however, route its own packets.
To display the default and explicit routes your storage appliance uses for routing its own packets,
check the current routing table using the netstat -r command. The netstat command
displays network-related data structures.
route command
To add or delete a specific route for a host or network in the routing table, use route.
Command Result
route add default 10.10.10.1 1 Adds a default route through
10.10.10.1 with a metric (hop) of
one.
For more details, view the manual pages or the product documentation.
routed
To view the status of the default gateway list, use the routed status command to display
the following information:
Interface Names
• Ethernet 10/100-baseT
• Gigabit Ethernet
• FDDI
• ATM
Each port on an interface card is named using a combination of interface type and slot number.
Ethernet port on the system board, for example, is e0. Details regarding supported slot
assignments can be found in the hardware guide specific to the storage appliance or in the
System Configuration Guide on the NOW site.
Note: If you can't get to the NOW site, do an rdfile on /etc/sysconfigtab or view the file from
an adminhost. This file contains information about what is supported based on the release of
ONTAP and each storage appliance model.
Interface Names
Interface Names
Interface Names
• IP address
• Netmask address
• Broadcast address
• Up or down state
Changes made on the command line interface, however, are not permanent until added to the
/etc/rc file from the command line or from FilerView.
Net mask and broadcast address: Standard format is used for netmask and broadcast
addresses; for example 255.255.255.0 for netmask and 192.168.1.255 for broadcast address.
Media type and speed: the following media types can be configured:
Maximum transmission unit (MTU): Use a smaller MTU value for an interface if a bridge or
router on the attached network cannot break large packets into fragments.
Flow control for the Gigabit Ethernet II controller: The original Gigabit Ethernet Controller
only supports full duplex, not flow control. The Gigabit Ethernet Controller II negotiates flow
control with an attached device that supports autonegotiation; however, if autonegotiation fails
on either device, the flow control setting entered with the ifconfig command is used. These
flow control settings can be used:
What is a VIF?
– Aggregate multiple ethernet links into a single logical channel
between two devices
Clients access a single virtual IP address
What is a VIF?
AVIF is a group of Ethernet interfaces working together as a logical unit. You can group up to
sixteen Ethernet interfaces into a single logical interface.
• Fault tolerance; if one interface in a VIF goes down, the remaining interfaces maintain
connection to the network
Single-Mode Trunk
Single-Mode Trunk
VIFs are also known as trunks, virtual aggregations, link aggregations, or etherchannel virtual
interfaces.
Trunks can be single-mode or multi-mode. In a single-mode trunk, one interface is active while
the other interface is on standby. Failure signals the inactive interface to take over and maintain
the connection with the switch.
Multi-Mode Trunk
Multi-Mode Trunk
In a multi-mode trunk, all interfaces are active, providing greater speed when multiple hosts
access the storage appliance. The switch determines how the load is balanced among the
interfaces and must therefore support manually configurable trunking.
In the figure above, four active interfaces comprise the multi-mode trunk MultiTrunk1. If any
three interfaces fail, the storage appliance still remains connected to the network.
Load Balancing
Load Balancing
Load-balancing ensures that all the interfaces of a multi-mode VIF are equally utilized for
outbound traffic. It is supported for multi-mode trunks only, and assumes a nice distribution of
hosts. There are three methods of load-balancing with IP-based as the default:
• IP-based - the outgoing interfaces selected based on the filer and clients IP address.
• MAC-based - the outgoing interface is selected on the basis of the filer and client’s MAC
address.
Both IP-based and MAC-based address methods use a formula to determine the interface to use
for outgoing frames. The formula uses the exclusive operator (XOR) value of the last four bits of
the source destination addresses to determine which interface to return data on.
Note: The Round-Robin method provides true load balancing but may cause out-of-order packet
delivery and retransmissions due to overruns.
Creating a VIF
A trunk is created and modified using VIF commands. A trunk name must be unique, begin with
a letter, contain no spaces, and not exceed 15 characters in length. Once the trunk is created,
configure it with the ifconfig command, just like any other network interface.
Command: vif
Example Result
vif create single SingleTrunk e1 e2 Creates a single trunkVIF on interfaces e1 and e2.
Enter this command into the /etc/rc file to make it
persistent over reboots.
VLAN
(Virtual Local Area Network)
What is a VLAN?
What is VLAN Tagging?
VLAN Tagging in Data ONTAP
VLAN Commands
Advantages of VLANs
• Ease of administration. VLANs enable a logical grouping of users who are physically
dispersed. Moving to a new location does not interrupt membership in a VLAN. Similarly,
changing job function does not require moving the end-station because it can be reconfigured
into a different VLAN.
• Confinement of broadcast domains. VLANs reduce the need for routers on the network to
contain broadcast traffic. Packet flooding is limited to the switch ports on the VLAN.
• Reduction of network traffic. Because the broadcast domains aren't confined, traffic on the
network is significantly reduced.
VLANS
Similarly, a member of the Marketing VLAN on the second floor can talk to a member of the
Marketing VLAN on the first floor, but not to members of the Engineering VLAN on the first
floor.
VLAN Tagging
An end-station must become a member of a VLAN before it can share the broadcast domain with
other end-stations on that VLAN. In Data ONTAP, the VLAN membership is port-based. Ports
on the same or different switches can be grouped on a port-based VLAN. This allows multiple
VLANs to exist on a single switch.
Data ONTAP limits the number of interfaces on a storage appliance to 128, including physical,
VLAN, VIFs, vh, and loopback interfaces and VLAN IDs from one to 4094 are supported.
Network Appliance suggests using a VLAN ID other than one, since many switch vendors use
one. VLANs over VIFs is supported using the vlan create command.
VLAN Tagging
For example, a member of VLAN 10 on the first floor sends a frame to a member on the second
floor. Switch 1 inspects the frame header for the VLAN tag and the destination MAC address.
Switch 1 forwards the frame to all other ports on VLAN 10, port 1 on Switches 2 and 3. If the
destination MAC address is known to either switch, the frame is forwarded to the end-station on
the second floor.
VLAN Membership
VLAN membership is based on one of the following:
• Switch ports
• Protocol
GARP VLAN Registration Protocol (GVRP) uses the Generic Attribute Registration Protocol
(GARP), allowing end-stations to dynamically register their VLAN membership. Because
registration is dynamic, members can be added on-the-fly, limiting the need for maintaining
static VLAN configuration on the switch port. Additionally, membership information stays
current and limits the broadcast domain to active members of the VLAN.
By default, GVRP is disabled, but it can be enabled by using the -g flag with the vlan
create command.
Prerequisites
Prerequisites for setting up VLANs include:
• The switches used in the network must either comply with IEEE 802.1 Q standards or have a
vendor-specific implementation of VLANs.
• For an end-station to support multiple VLANs, it must either dynamically register using
GVRP or be statically configured to belong to one or more VLANs. If an end-station cannot
register or cannot be configured to belong to a VLAN, the end-station can only belong to one
VLAN. This VLAN is configured on the switch port to which the end-station connects. The
frames sent on this switch port are untagged.
VLAN Commands
VLAN commands
– vlan create –g on <ifname> <vlanid vlanid
…>
– vlan delete [-q] <ifname> <vlanid>
– vlan add <ifname> <vlanid vlanid ...>
– vlan stat <ifname> <vlanid>
– vlan modify –g [on|off] <ifname>
VLAN Commands
A VLAN is created using the vlan create command on the command line or in FilerView.
Once the trunk is created, configure it using the ifconfig command, just as you would any
other network interface.
Example Result
vlan create –g on e4 2 3 4 Creates three VLANs on interface e4 named e4-2, e4-3, and e4-
4. The -g on option enables GVRP on the VLANs. Enter this
command in the /etc/rc file to make it persistent over reboots.
vlan delete -q e8 2 Removes VLAN e8-2. If the interface was configured UP, a
message appears asking you to confirm the deletion.
vlan add e8 3 Adds e8-3 to the VLAN. Enter this command in the /etc/rc file
to make it persistent over reboots.
vlan stat e4 10 Displays the number of packets received and transmitted on
each interface. Specify the time interval, in seconds, at which
the statistics are displayed. If no number is entered, by default,
statistics are displayed at a 2-second interval.
vlan modify –g off e8 Interface e8 will not participate with GVRP. Enter this
command in the /etc/rc file to make it persistent over reboots.
Topic Review
Autosupport
Exercises
Exercise: Networking
Objective
When you have completed this module, you will be able to do the following:
• Create a VLAN
• Create a VIF
Exercise Overview
The purpose of this activity is for you to practice configuring and viewing interface adapters.
Depending on the hardware installed on your storage appliance, this lab may or may not execute
properly. If your hardware does not support the lab, enter the commands to practice.
Time Estimate
30 minutes
Start of Exercise
Step Action
1. Connect to the storage appliance via the serial port or console connection. Do not try
to telnet to your storage appliance..
2. At the command prompt, enter ifconfig -a
NetApp> ifconfig -a
e0: flags=848043<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.41.66.130 netmask 0xffffff00 broadcast 10.41.66.255
lo: flags=948049<UP,LOOPBACK,RUNNING,MULTICAST,TCPCKSUM> mtu 9188
inet 127.0.0.1 netmask 0xff000000 broadcast 127.0.0.1
Step Action
2. At the command prompt, enter vif create and view the syntax.
Step Action
1. This exercise can only be performed on a system with a quad Ethernet card installed.
Skip to next exercise if your system is a FAS2XX system.
Open Internet Explorer and enter the following url
http://ip_address_of_storage_appliance/na_admin
For example:
http://10.32.69.15/na_admin.
2. Select Network, then Add Virtual Interface.
Step Action
2. At the command prompt, enter vif create and view the syntax.
Creating a VLAN
Step Action
________________________________________________
________________________________________________
Step Action
________________________________________________
________________________________________________
6. Open a session with the storage appliance via the console port.
The netdiag command is used to check the network attached to the storage
appliance for errors or miss-configurations. Depending on the severity, the netdiag
command may or may not find your error.
NetApp> netdiag –v
End of Exercise
NFS Administration
Objectives
/etc/exports File
As a system administrator, you want to control how NFS clients access files and directories on a
storage appliance. Exported resources are those that you make available to hosts. NFS clients can
only mount resources that have been exported from a storage appliance that has been licensed for
NFS.
• For persistence across reboots, specify resources to export in the /etc/exports file; then,
execute the exportfs -a command at the command line to make changes effective
immediately
• For temporary access, use the exportfs command to export resources not specified in the
/etc/exports file or to export resources specified in the file but with different access
permissions
Add entries to the /etc/exports file for each directory you want to export. Entries specify the full path to a
directory and options. The full path name must include /vol, as in /vol/vol0/home.
• Exclusion occurs when a host is not listed or a “–“ precedes the host
5. Permissions are determined by matching the longest prefix to the access permissions in the
/etc/exports file
If you create, rename or destroy a volume, the /etc/exports file will be updated automatically.
Export Options
1.1.For
Forall
allhosts
hoststo
tohave
have
read-write
read-writeaccess,
access,dodonot
not # vi
enter any options ~
/vol/vol1/pubs (1)
enter any options /etc/exports
~
/vol/vol1/sales –ro (2)
~
/vol/vol1/pubs –rw=host1:host2:-host3 (3)
2.2.For ~
Forall
allhosts
hoststo
tohave
have /vol/vol0/home –rw=host1:host2,ro (4)
read-only
read-onlyaccess,
access,use
usethe
the
~
–ro option
–ro option ~
~
~
3.3.To
Toallow
allowsome
somehosts
hoststo to ~
mount
mountwithwithread-write
read-write ~
access, use the –rw
access, use the –rw ~
option.
option.Unspecified
Unspecifiedhosts
hosts
cannot ~
cannotmount
mountthethe
directory. ~
directory. Also noticethe
Also notice the
exclusion
exclusionofofhost3
host3(-host3)
(-host3) ~
“/etc/exports“ 1 line 10 characters
4.4.To
Toallow
allowsome
somehosts
hoststo
to
mount Host1
Host1andandhost2
host2can
canmount
mountaadirectory
directorywith
with mount
read-only access, use the
read-only access, use the /vol/vol0/homeread-write,
/vol/vol0/home read-write,all
all
–rw others have read-only
–rwandandrorooptions
options others have read-only
access
access
Sample entry:
/vol/vol0/ -rw=host1:192.168.15.0/24:netgroup1,root=host1
1. Select Manage Exports from the NFS menu on the FilerView screen.
2. Click the Add Export hot link in the upper left corner
3. The NFS Export Wizard will start. Select the check boxes for Read-Write access and
Anonymous ID
4. Click next and enter /vol/vol2; when prompted for the export path, then click next.
6. When prompted for Read-Write Hosts, click add and enter host1, OK, then click next
7. A summary will display. Ensure the summary is correct and click commit.
1.1.Allow
Allowroot
rootaccess
accessto
to
/vol/vol0
/vol/vol0to
toadminhost
adminhost
2.2.Allow
Allowread-write
read-write
access
accessto to
/vol/vol0/home
/vol/vol0/hometotohost1
host1
and
andhost2
host2
3.3.Allow
Allowread-write
read-write
access
accessto to/vol/vol1
/vol/vol1to
to
host1
host1andandread-only
read-only
access
accessto tohost3
host3
Example Result
exportfs -a Exports all entries in the /etc/exports
file
1.1.Telnet
Telnetto
tothe
thehost
host
telnet 10.32.30.20 (1)
4.4.Change
Changedirectories
directoriesto
to
the
themounted
mountedexport
export
5.5.Enter
Enterlsls–l–lto
toverify
verifythe
the
storage
storageappliance
applianceisis
mounted
mountedand andaccessible
accessible
Topic Review
Exercises
17
Exercise Overview
In this exercise, you will license nfs, and export file systems with vi, command line and
FilerView. You will also export a file system with the exportfs command.
Time Estimate
Estimated completion time 30 minutes
Start of Exercise
License NFS and mount a volume
Step Action
1. Telnet to your assigned storage appliance
NetApp> license
NetApp> license add abcdefg (Obtain the license code from the Instructor)
NetApp> license
3. Verify the content of the /etc/exports file with the rdfile command
NetApp>rdfile /etc/exports
4. At the storage appliance’s console, view the exported file systems.
NetApp> exportfs
You will notice that just by licensing NFS, all volumes and qtrees that were in the
/etc/exports file have been exported.
In the below example, use your actual filer’s name where it states “filer_name”.
Do not create a directory with the name “filer_name”.
# mkdir /mnt/filer_name
6. Create the vol0 directory under your filer_name directory created in step #5.
# mkdir /mnt/filer_name/vol0
7. Mount your filer’s root volume to the directory you just created and view the
contents. When mounting the filer, use the filer_name or IP address.
# mount IP_address:/vol/vol0/ /mnt/filer_name/vol0
# cd /mnt/filer_name/vol0
# ls –al
The directory structure of you storage appliance should now be viewable via the ls
command.
Step Action
1. Create a qtree named nfs_tree1 from the filer’s console.
NetApp>qtree status
2. Export the qtree using the rdfile and exportfs commands.
In the below example, use your actual Adminhost’s name where it states
“UNIX_adminhost”. Do not type “UNIX_adminhost “
NetApp>rdfile /etc/exports
NetApp>wrfile /etc/exports
Copy, then paste all the exports from the cli window and add the following line.
/vol/vol0/nfs_tree1 -rw=UNIX_adminhost,root= UNIX_adminhost
Note: make sure to add a carriage return <enter> after the nfs_tree1 line and then
enter ctrl-C on the keyboard. You will see the following error message:
read: error reading standard input: Interrupted system call
NetApp>exportfs –a
Enter exportfs at the storage appliance prompt to ensure the qtree was exported.
NetApp>exportfs
# cd /mnt/filer_name/nfs_tree1
Step Action
1. At the storage appliance’s console, use the qtree create command to create a qtree
named nfs_tree2
NetApp> qtree create /vol/vol0/nfs_tree2
Click add
Click Add
The NFS export wizard will automatically export the volume/qtree after
completion. Use the exportfs command from the filer’s command line to
view the export.
NetApp> exportfs
# cd /mnt/filer_name/nfs_tree2
#ls -a
Step Action
1. Access the storage appliance’s console and create a qtree in vol0 named nfs_tree3.
Netapp> qtree create /vol/vol0/nfs_tree3
2. From the adminhost, verify that the present working directory is the storage
appliance’s etc directory on the root volume.
# pwd
If this is not the case, enter the following command:
# cd /mnt/filer_name/vol0/etc
Now edit the filer’s exports file with the following command:
# vi exports
# cd /mnt/filer_name/nfs_tree3
#ls -a
End of Exercises
CIFS Administration
Windows 2000
Objectives
Objectives
Joining a Domain
• Centralized administration
Joining a Domain
Prerequisites
– CIFS must be licensed on the storage appliance
– Name of the Windows 2000 domain
– IP addresses for up to four Windows Internet Name
Services (WINS) servers (optional)
– Administration name and password for the
Windows domain server
– Multiprotocol or NTFS only
– Security authentication will be Windows domain,
Windows Workgroup or UNIX password
authentication
• IP addresses for up to four Windows Internet Name Service (WINS) servers (optional)
• Whether the security authentication will be Windows domain, Windows work group, or
UNIX password authentication
Joining a Domain
Joining a Domain
9. The Commit screen presents a summary of your configuration. Press Commit to accept the
entries.
After a successful commit, you'll get a notification of the CIFS Setup Wizard success.
CIFS Shares
CIFS Shares
Command Line
Computer Management
-forcegroup Names the group which will have access to all files created by CIFS
name users in the UNIX environment. The group must be a predefined group
in the UNIX group database. Specifying a forcegroup is useful only if
the share is in a UNIX or mixed qtree. By default, the shares give
everyone full control.
description Describes the purpose of the share and contains only characters in the
current code page. It is required by the CIFS protocol and is displayed
in the share list in Network Neighborhood. If the description contains
spaces, enclose it in single quotes.
group name The name of the group in the UNIX group database. This group will
own all files created in the share.
-noforcegroup Specifies that no particular UNIX group owns files that are created in
the share. Files that are created belong to the same group as the owner
of the file.
CIFS Shares
CIFS Access
CIFS Access
Command Line
Computer Management
CIFS Access
Example Result
cifs access webfinal tuxedo Gives full NT access to the group, tuxedo,
Full Control on the webfinal share.
cifs access webfinal Gives read/write access to the user,
engineering\mia rw engineering\mia, on the webfinal share.
user Specifies that the user or group for the ACL entry can be an
NTuser or group (if the storage appliance uses NT domain
authentication) or can be the special group, everyone.
group Specifies the user or group for the ACL entry. Can be an NT
user or group if the storage appliance uses NT domain
authentication or can be the special group, everyone.
-delete Removes the ACL entry for the named user on the share.
CIFS Shares
CIFS Services
If you run cifs terminate without specifying a time before shutdown and users have open
files, you are prompted to enter the number of minutes to delay before terminating. If CIFS
service is terminated immediately for a host that has one or more files open, the user will not be
able to save changes. The -t option, can be used to warn of an impending shutdown of service. If
you execute cifs terminate from rsh, you need to supply the -t option.
Example Result
cifs terminate -t 10 gloriaswan Terminates a session in 10 minutes for the
host gloriaswan. Alerts are sent periodically
to the affected host(s).
Reconfiguring CIFS
CIFS Sessions
NT membership
EDSVCS\Administrator
EDSVCS\Domain Users
EDSVCS\Domain Admins
BUILTIN\Users
BUILTIN\Administrators
User is also a member of Everyone, Network Users,
Authenticated Users
***************
Example Result
cifs sessions Displays a summary about all connected
users.
CIFS Sessions
1. From the main menu, select the CIFS node, then select Session Report.
Note: leaving the name field blank and selecting one of the option buttons gives you either a full
session or security report on all connected users. Current session status is displayed at the
bottom of the CIFS Session Report screen.
Topic Review
Exercises
Exercise Overview
The purpose of this activity is for you to perform routine CIFS administration procedures on
your Storage Appliance. You will join the Storage Appliance to a Windows 2000 Domain, add a
share, verify access to the share, administer user access, create a local group, and display session
information.
Time Estimate
This lab should take you approximately 1 hour.
Start of Exercise
Joining a Domain
Step Action
1. Telnet to your Storage Appliance’s IP address or Storage Appliance name.
2. License CIFS by typing the following command and using the license code
provided by your instructor.
• No to WINS
4. The Storage Appliance, at this point will determine what type of domain it is in
and continue with the setup. If the Storage Appliance does not find all the
components of a Windows 2000 domain, the program will assume it is in a NT4
domain. If you are trying to join a Windows 2000 and this occurs, this would
indicate a problem with your setup.
5. Sample Script
Note: The following is a sample output of what your entries in Step 3 might
produce. Naturally your output will be slightly different due to different network
and host names.
Favored Addresses:
10.32.91.15 DEVDC PDC
Other Addresses:
None
NetApp> Thu Apr 29 10:24:52 PDT [NBNS00:info]: All
CIFS name registrations complete for local
NetApp>
Step Action
1. Open Active Directory
Click on Start -> Programs -> Administrative Tools-> Active Directory Users and
computers
Click the Action button, select New then User.
In the step below, please do not create “UserX”. If you are unclear, ask your
Instructor as to what user to create.
Create UserX with your Storage Appliance # (If your Storage Appliance name
is Storage Appliance10, then create User10)
Click next and set the users password. Set the password the same as the user’s
name.
Step Action
1 View the shares on the storage appliance by entering the following command.
Step Action
1 Create a qtree named cli in vol0 and change security to ntfs.
NetApp> qtree create ./vol/vol0/cli
NetApp> qtree security /vol/vol0/cli ntfs
2 View the qtree information (You may have other qtrees from previous exercises).
NetApp>qtree status
Volume Tree Style Oplocks Status
------ -------- ----- -------- ---------
vol2 mixed enabled normal
vol0 mixed enabled normal
vol0 cli ntfs enabled normal
The share name 'cli' will not be accessible by some MS-DOS workstations
Are you sure you want to use this share name? [n]:Y
4 View the new share.
NetApp> cifs shares cli
Name Mount Point Description
---- ----------- -----------
cli /vol/vol0/cli
everyone / Full Control
5 Add a comment to the share.
NetApp> cifs shares -change cli -comment 'Share created
via CLI'
6. View the change to the share
NetApp> cifs shares cli
Name Mount Point Description
---- ----------- -----------
cli /vol/vol0/cli Share created via CLI
everyone / Full Control
Step Action
1. Right click the Shares folder and select New File Share.
2. Enter the following information
Folder to share: C:\vol\vol2
Share name: vol2
Share Description: Share for volume two
Click NEXT to continue.
Click Next.
3.
Click the Customize share and folder permissions radio button, and then select
the Custom button.
Click OK.
5. Now select Finish and observe that the selection is displayed in the Share
Permissions window.
6. Select no to create another share.
7. Observe that the new-shared directory, vol2 is displayed in the shared directories
for the Storage Appliance.
8. Close the Computer Management dialog box.
Step Action
1. At the Windows desktop, right click My Network Places, and Select Map
Network Drive.
2. Enter the following information in the appropriate fields:
Drive: Select any unused letter.
Path: \\Storage_Appliancename\vol2
Click Finish to accept the changes and close the window
3. Now map the cli_share to a different drive letter.
Step Action
1 Access the Storage Appliance console and enter the following:
NetApp> cifs access vol2 userX rwx
(Where userX is the user created in the previous steps)
2 Type cifs shares on the console to verify the result.
3 View the access change in Computer Management.
Start –> Programs - > Administrative Tools -> Computer Management
4 Select your Storage Appliance.
5 Select System Tools->Shared folders-> Shares
6 Select vol2
7 Click on Properties -> Permissions
8 Note that the permission is set to Full Control.
9 Go back to step 1 and enter the following
NetApp> cifs access vol2 userX read
10 Enter cifs shares and observe the effect.
11 Use Computer Management to review the permissions for userX on VOL2.
Step Action
1. Start -> Programs -> Administrative Tools-> Active Directory Users and
computers
2. Left-click the Action button and select New then Group
3. Create a new Global group called Storage ApplianceXX Global Group
4. Assign the group name, description, add a few users from the domain, and click
on OK.
Step Action
1. Open Computer Management
2. Select your Storage Appliance.
3. Click on System Tools->Shared folders-> Sessions
4. Review the displayed information.
5. Open the Storage Appliance console.
6. Enter cifs sessions.
7. Compare the results of step 6 with the results of step 3.
Step Action
1. Open Computer Management
2. Select your Storage Appliance.
3. Click on System Tools->Shared folders-> Sessions
4. Right click on a session and select Close Session
5. Close the dialog boxes and windows.
6. Go to the Storage Appliance console.
7. Enter cifs sessions and observe the effect of terminating the session.
8. Enter cifs terminate
9. Observe the effect of this command and compare it with step 4.
10. Enter cifs restart on the Storage Appliance console to restart the CIFS
service.
11. What is the difference when comparing the results of step 4 with the results of step
8? _____________________________________________________
End of Exercise
MultiProtocol
Administration
Objectives
Objectives
• The security style for a qtree is the security style of the volume’s root directory
You can use qtrees to group files or projects that have the same security style and oplocks
settings. Use NTFS-style security in a qtree, for example, for Windows files and applications.
Another project in a different qtree may use UNIX files and applications, while a third project in
another qtree may contain both UNIX and Windows files. In Windows projects, oplocks can be
turned on for one qtree and off on another qtree.
Qtree Advantages
Advantages of Qtrees
The advantages of qtrees over volumes lie in the fact that you can group files by any
combination of security style, oplocks setting, quota limit, and backup unit. When setting up a
qtree for a complex Windows database project, for example, you can:
• Set the security style without affecting the security style or projects in other qtrees
• Set CIFS oplocks, if appropriate, without affecting the settings of projects in other qtrees
• The CIFS oplocks protect the content of a file from being changed by another user of
the shared file.
• Use quotas to limit the disc space and number of files available to the qtree so that resources
for other projects and qtrees are not used up
Backing up individual qtrees adds flexibility to backup schedules, allows you to modularize
backups, and keeps the size of qtree backups to one tape.
Qtree Limitations
Limitations
Qtrees have the following limitations:
• When you enter a df command on a UNIX client with a path name of a qtree, the command
shows the smaller of the client's file system limit or the storage appliance’s disk space. This
makes the qtree look fuller than it is.
Command: qtree
Example Result
The example lists information about qtrees and volumes on a selected storage appliance:
• The root volume, vol0 has the default settings: the security style is UNIX, oplocks is enabled,
and it is not snapmirrored.
• The marketing qtree in the root volume has NTFS security with oplocks enabled and it is not
snapmirrored.
• The volume, vol1 has the default settings: the security style is UNIX, oplocks is enabled, and
it is not snapmirrored.
• The engr qtree in the volume, vol1 has NTFS security, but oplocks is disabled, and the qtree
is not snapmirrored.
• The backup qtree in the volume, vol1has UNIX security, oplocks is enabled, and it is
snapmirrored.
Qtree Commands
You can set the security style and oplocks state in the previous step or you can modify it later:
Select Qtrees from the Volumes menu. Click Manage under the Qtrees node. Click the qtree
name where you want to change the settings to open the Volumes ->Qtree->Modify menu.
Modify the setting as desired and click Apply. The new qtree is listed and the changes are
updated on the FilerView screen.
What differs is the security and permissions. The security style determines who can modify the
security properties and directories in a volume or qtree. The security style also determines a
process by which users are authenticated.
Change security style of a qtree to accommodate new users or files that require a different style.
Security Styles
UNIX: files and directories have UNIX permissions security style.
Mixed: both NTFS and UNIX security styles are allowed. A file or directory can have either
Windows NT permissions or UNIX permissions. Security style is determined on file-by file
basis.
NTFS: files and directories have Windows NT file-level permission settings over the Access
Control Lists (ACLs).
NFS and CIFS Clients: both CIFS and NFS clients can change security.
CIFS Clients Only: file permissions and ownership can be set by CIFS clients only.
Depends on Last Client to Set Security: both CIFS and NFS clients can change security. This
can cause confusion because the security style of a file or directory is whatever style was set by
the most recent client.
Depends on Last Client to Set Security: both CIFS and NFS clients can change security. This
can cause confusion because the security style of a file or directory is whatever style was set by
the most recent client.
• The Windows NT account name does not match the desired UNIX account name
The /etc/usermap.cfg file can explicitly match Windows NT users to the current UNIX account
and UNIX users to a Windows account. Entries in the file are processed sequentially. The order
of entries is important because Data ONTAP uses the first matching entry to determine the
mapping.
/etc/usermap.cfg
"Bob Garg" == bobg
mktg\Roy => nobody
engr\Tom => ""
uguest <= *
NT-Domain \NTuser
Contains a username and an optional domain name. If the NTuser name is empty or specified as
“” on the destination side of the map entry, the matching UNIX name is denied access. If the
domain name is omitted, it is assumed to be the domain in which the storage appliance is
installed. If the storage appliance uses local accounts for authentication, the domain name is the
storage appliance name. On the source side of the map entry, use of the domain name specifies
the domain in which the user resides. On the destination side of the entry, the domain specifies
the domain used for the mapped UNIX entry. If an NTuser name contains spaces, enclose the
name in quotation marks.
Direction Field
Determines whether the entry maps Windows to UNIX, UNIX to Windows, or maps in both
directions. The direction field can use one of three values. Use = = to indicate that mapping is
bidirectional, so that the entry maps from Windows to UNIX and from UNIX to Windows.
Omitting the direction field has the same meaning as using = =.
UnixUser field
Contains a name in the UNIX password database.
Example Result
“Bob Garj” == bobg Map the NT user Bob Garj to the UNIX
user bobg and vice versa
• If the * is on the source side, any user maps to the specified name on the destination site
• If the destination side contains * but the source side does not, no mapping is done
• If both the source and destination sides contain an asterisk, the corresponding name is
mapped. In this example, all UNIX users map to corresponding names in the homeusers
domain
The asterisk is also used in the domain name field. Here are guidelines for its use:
• If the * is on the source side, the specified name in any domain maps to the specified UNIX
name
• If the * is on the destination side, the specified UNIX name maps to a Windows name in any
trusted environment
/etc/usermap.cfg
Domain\user <= UNIX User
DOMAIN_of_filer\Username
Accept
reject
Multi-protocol accept
1. The UNIX username and the /etc/usermap.cfg file are used to query the appropriate domain.
The UNIX users UID and GID are mapped to an NT security ID (SID).
2. If the username cannot be mapped and the wafl.default_nt_user is not set, the user is rejected.
3. If the username is mapped, the information passes to the domain server for authentication.
4. If the username cannot be mapped and the wafl.default_nt_user is set, the information is
passed to the domain server for authentication.
5. If authentication with the domain controller passes, access to the storage appliance is
accepted.
/etc/usermap.cfg
domain\user => unixuser
/etc/passwd or NIS
unixuser UID Maps to
wafl.default_unix_user
Multi-protocol accept
1. The domain, user, and password are authenticated with a domain controller.
2. If authentication fails, the user is either rejected or given access with guest restrictions.
4. Data ONTAP uses the Windows NT name as the UNIX name when it attempts to look up the
UNIX user in the /etc/usermap.cfg file. If the UNIX name is a null string, access is denied. If
no entry is found, Data ONTAP converts the Windows name to lowercase and considers the
UNIX name the same as the Windows name.
5. The mapped name is checked with the /etc/passwd file or NIS to assign a UID. If there is no
matching entry in the /etc/passwd file or NIS, the wafl.default_unix_user default, pcuser, is
used.
Topic Review
Autosupport
Exercises
• Distinguish a qtree from a volume and list the advantages of using qtrees
Exercise Overview
During these exercises, you will be guided through creating a UNIX, NTFS and mixed qtree and
make the qtrees accessible to NFS and CIFS clients.
Time Estimate
20 Minutes
Start of Exercise
Step Action
1. At the storage appliance’s console, use the qtree create command to create a qtree
named unix_tree
3. Edit the /etc/exports file to export and grant access to /vol/vol0/unix_tree by adding the
following line:
/vol/vol0/unix_tree -rw=UNIX Adminhost,root=UNIX
Adminhost
4. At the storage appliance’s console run the following command to re-export the export
file.
NetApp> exportfs –a
At the storage appliance’s console run the following command to view the exports.
NetApp> exportfs
5. Create the following mount point on the UNIX host:
# mkdir /mnt/storage_appliance_name/unix_tree
6. Mount the new export
# mount storage_appliances_name:/vol/vol0/unix_tree
mnt/storage_appliances_name/unix_tree
# touch file1
8. View the directory and files:
$ ls -l
Step Action
1. Open Computer Management
Start -> Programs -> Administrative Tools -> Computer Management.
Connect to your storage appliance.
Action -> Connect to another computer …
2. Add new shared directory.
Expand the System Tools item and select the Shares Folder. Right click in the white
space with the shared folders displayed and select “New File Share”.
3. Enter the following information in the appropriate fields.
Folder to share: C:\vol\vol0\unix_tree
Share name: unix_tree
Share description: Share for new volume:
Step Action
1. Access View http://IP_address/na_admin.
Enter the following information in the screen capture and click Add.
Step Action
1. Create an export of the ntfs_tree and grant NFS access for this qtree.
2. Mount and access this new export from the adminhost client.
Step Action
1. At the storage appliance’s console, use the qtree create command to create a qtree
named mixed_tree
NetApp> qtree create /vol/vol0/mixed_tree
2. Set the security style to MIXED
NetApp> qtree security /vol/vol0/mixed_tree mixed
Step Action
1. Create an export and grant NFS access for this qtree.
2. Mount and access this new export from the adminhost client.
Step Action
1. Create a share and grant access to this new qtree.
2. Map this new share from a PC client.
Usermapping
Step Action
1. At the storage appliance’s console, turn on cifs trace login.
NetApp> options cifs.trace_login on
This will enable messages to the console which shows the login process and the
responses. It is not recommended to keep this on for normal operations. It should only
be utilized for troubleshooting purposes and then turned off as it will generate a
considerable amount of syslog messages.
Click OK, then click Finish on the Map Network Drive dialog box.
You should have received an error message when trying to map the drive.
The following is the output with cifs trace login set to on.
Notice that the Storage appliance attempted to map DOMAIN\jbrown to Unix user
jbrown. This mapping is attempted automatically.
DOMAIN\jbrown == bigjoe
Sample output
Fri Dec 5 10:46:38 PST [Auth07:info]: Login attempt by
EDSVCS\jbrown from JBROWN (10.10.10.21)
Fri Dec 5 10:46:38 PST [Auth07:info]: Attempting
authentication with DC \\DOMAIN
Fri Dec 5 10:46:38 PST [Auth07:info]: User authenticated
by DC
Fri Dec 5 10:46:38 PST [Auth07:info]: Attempting to map
PC user name to UNIX user bigjoe
Fri Dec 5 10:46:38 PST [Auth07:info]: Login accepted
4. At the storage appliance’s console, turn off cifs trace login.
NetApp> options cifs.trace_login off
End of Exercises
SAN Administration
Objectives
Objectives
SAN
FCP iSCSI
In contrast, iSCSI is an IP-based protocol, designed to make SAN a global technology. It allows
for data storage and retrieval of information from geographically independent locations. The
iSCSI protocol is expected to foster development of the SAN market by enhancing the
performance and capability of storage data transmission.
Connectivity Types:
Hosts and filers can be connected and configured for FCP data storage in three ways:
• Direct attached
In a fabric attached single path connection, there are one or more hosts, two Fibre Channel
switches, and one filer cluster. There is one initiator HBA. The switches, with the connected
hosts and filers, each form an independent Fibre Channel fabric.
In the fabric attached multipath connection, there are one or more hosts, two Fibre Channel
switches, and one filer cluster. There are, however, two initiator HBAs per host cluster. The
configuration additionally requires multipathing software such as the Dynamic Multipathing
module of the VERITAS® Volume Manager for Solaris or Microsoft MPIO for Windows.
iSCSI Configuration
ISCSI Configuration
In contrast to the FCP configurations, an iSCSI configuration uses simpler cabling in a local area
network (LAN) environment. The Windows hosts use a single path connection to a switch,
which is, in turn, connected to a storage appliance and runs over an existing Ethernet network.
Define LUN
WWPN WWPN
Target Target
LUN
LUN
Define LUN
In order to define or describe Logical Unit Numbers (LUNs), you must first understand the
relationship between hosts and filers in a Storage Area Network (SAN) environment. In a
NetApp SAN environment hosts are initiators and storage appliances are targets that have
storage target devices, referred to as LUNs. With Data ONTAP, you configure the filer’s storage
by creating LUNs that can be accessed by hosts.
A host sees LUNs as local disks that can be formatted by the host. The storage appliance sees a
LUN as a logical representation of physical storage.
The diagram shows four LUNs that were created on a storage appliance:
• LUNs cannot be created on /vol/vol0 because that is the root volume used by Data ONTAP
for system administration.
• /vol/vol1/LUN0
• /vol/vol1/LUN1
• /vol/vol1/qtree1/LUN2
• /vol/vol1/qtree1/LUN3
• If you are using snapshots, create volumes at least twice the size of LUNs
• Create volumes for the exclusive use of LUNs; no other files or directories should exist in
volumes that contain LUNs
• Ensure that volumes accessed by Network Attached Storage (NAS) protocols do not contain
LUNs, because they have different space reservation requirements
• Enable space reservations for the volume to guarantee that space is available on the LUN to
write to.
• Enable the create_ucode options for the volume to dynamically allocate more space for
system messages
• Create a qtree on the volume to store LUNs of the same type since grouping qtrees facilitates
management tasks, such as backup and recovery
Required Information
Path: /vol/solarisvol/tree1/lun0
LUN ID: 0
Path: /vol/solarisvol/tree1/lun0
LUN ID: 0
Path: /vol/solarisvol/tree1/lun0
LUN ID: 0
Operating Windows
System:
Path: /vol/winvol/tree1/lun0
Space yes
reservation:
Nodename: iqn.1991-05.com.microsoft:slu2-win.edsvcs.netapp.com
LUN ID: 0
Operating Windows
System:
Path: /vol/winvol/tree1/lun0
Space yes
reservation:
Nodename: iqn.1991-05.com.microsoft:slu2-win.edsvcs.netapp.com
LUN ID: 0
Operating Windows
System:
Path: /vol/winvol/tree1/lun0
Space yes
reservation:
Nodename: iqn.1991-05.com.microsoft:slu2-win.edsvcs.netapp.com
LUN ID: 0
3. Follow the instructions in the Wizard and enter information in appropriate fields.
Perform the exercise “Practice: Create an FCP and an iSCSI LUN”. Let the instructor know
when you are finished.
Note: These exercises use the Data ONTAP Fundamentals web based training material.
In certain configurations the Solaris host will be bound to a WWPN (Worldwide Portname) of a
target card on the storage appliance instead of the WWNN. These configurations are covered in
the NetApp attach-kit information for the Solaris host. A script will be run on the Solaris host
that will assist in performing the WWPN bindings.
The SnapDrive for UNIX software interacts with the host operating system and host volume
manager. It coordinates the host volume manager, volume groups and file systems to ensure that
the host file systems stored on NetApp LUNs have consistent images in the snapshot.
Exercise Slide
Exercise
Perform the exercise “Practice: Accessing LUNs on a Solaris Host”. Let the instructor know
when you are finished.
Note: This exercise uses the Data ONTAP Fundamentals web based training material.
Three methods:
– SnapDrive
– lun setup with Windows Disk Management
– FilerView with Windows Disk Management
SnapDrive only requires that the pathname for the LUN be known. The other attributes can be
defined throughout the SnapDrive creation process. For example, SnapDrive will determine the
minimum and maximum size available from the path name that is given for the lun. It will also
determine the LUN ID and which WWPNs are available.
• MMC plug-in
Use SnapDrive to create Fibre Channel Protocol (FCP) LUNs or iSCSI LUNs on a Windows
host.
SnapDrive integrates the features of lun setup on the storage appliance and has added value as
well. It will complete the process of adding the LUN to the Windows host and integrates the use
of the LUN into other NetApp applications such as SnapManager.
• Size in megabytes
To create a new LUN with SnapDrive, navigate to the Storage directory under Computer
Management. Right-click the SnapDrive MCC plug-in and select Create Disk… to open the
Create Disk Wizard.
• Select the protocol type. In this case, select LUN (FCP). (A VLD, Virtualized Local Disk, Is
a local disk in a NAS environment.)
• Browse to or enter the absolute path to the Storage Appliance volume or qtree that will
contain the LUN.
Next, select Dedicated as the virtual disk type since this lesson does not deal with clustered
services.
To connect the LUN, select the appropriate HBA port from the list of Available Ports. Use the
arrows to move port names between lists. This step is critical. Make sure you have selected the
appropriate HBA port on the Windows host you are connecting to. If not, you can spend a great
deal of time trying to troubleshoot the connectivity.
SnapDrive – Completion
Verify that the settings for the new LUN are correct then click Finish. Note that SnapDrive adds
an extension (.lun) to the end of the name of the LUN.
Watch the Operation Status messages that appear in the bottom left corner of the window as the
creation process takes place. When the process is complete the LUN is created and ready for
access by the Windows host.
That completes the process for creating an FCP LUN using SnapDrive
Write Signature
In the situation where SnapDrive is not being used on the Windows host, then after the LUN is
created with lun setup, use Windows Disk Management on the host to complete the process
to access the LUN.
Once an iSCSI LUN has been created on the filer, use Disk Management on the Windows host to
prepare the LUN for use. The new LUN should be visible as a local disk. If it is not, select
Rescan Disks under the Action button.
Right click the bar that represents the unallocated disk space and select Create Partition.
The Create Partition Wizard opens. As you navigate through the screens, create a primary
partition of a size no larger than the maximum size available.
Accept the default drive assignment or use the drop-down menu to select a different drive.
Partition the drive using the setting shown but change the Volume Label to an appropriate
Windows volume name that represents the LUN you are creating.
Final Step
Verify that the LUN appears as a local drive in Disk Manager. You may then copy files to the
new disk and treat it as any other local disk.
That completes the process for creating an iSCSI LUN using lun setup and Windows Disk
Management.
Topic Review
Topic Review
Topic Review
Exercise Slide
Exercise
Perform the final exercise for this module, “Scenario: SAN Admin”. Let the instructor know
when you are finished.
Note: This exercise uses the Data ONTAP Fundamentals web based training material.
Exercise Overview
The purpose of this exercise is to create a LUN for a Solaris host using the FCP protocol and a
LUN for a Windows host using the iSCSI protocol
Time Estimate
20 minutes
Software
• Access to the course copy of the Data ONTAP Fundamentals web based training
Start of Exercise
Step Action
1. On your local workstation, open the Data ONTAP Fundamentals web based training
materials..
2. Select Tutorials, Roll the mouse over SAN Administration and select Creating a LUN
with lun setup.
3. Advance through the material to page 11 by clicking on the “right arrow” at the
bottom of the screen.
4. Position the cursor in the CLI screen and enter the lun setup command and create
an FCP LUN using the information provided in the web based training.
5. Advance to page 12 by clicking on the “right arrow” at the bottom of the screen.
6. Position the cursor in the CLI screen and enter the lun setup command and create an
iSCSI LUN using the information provided in the web based training.
Note: If you have some extra time after completing this exercise, you can advance
through pages 13 – 16 of the tutorial and complete the activities.
End of Exercise
Exercise Overview
The purpose of this exercise is to demonstrate how to access a LUN from a Solaris host after it
has been created on the storage appliance
Time Estimate
15 minutes
Software
• Access to the course copy of the Data ONTAP Fundamentals web based training
Start of Exercise
Step Action
1. On your local workstation, open the Data ONTAP Fundamentals web based training
materials.
2. Select Tutorials, Roll the mouse over SAN Administration and select Accessing LUNs
on a Solaris host.
3. Perform all the instructions on pages 1 – 6. When you are through, stop and let the
instructor know when you have completed the exercise.
Note: If you have some extra time after completing this exercise, you can advance to
page 8 of the tutorial and complete the activity.
End of Exercise
Exercise Overview
This exercise is in the form of a scenario. You will be given a configuration and setup
information for several hosts and LUN types.
Time Estimate
25 minutes
Software
• Access to the course copy of the Data ONTAP Fundamentals web based training
Start of Exercise
Step Action
1. On your local workstation, open the Data ONTAP Fundamentals web based training
materials.
3. Perform all the instructions on pages 1 – 13. When you are through, stop and let the
instructor know when you have completed the exercise.
Note: Setup information that is in the scenario is included below for your benefit in the
event a printer is not available to you.
Page 2: Diagram
• LUN ID: 16
• Comment: Team16
• Path/Volume: /vol/sanvol
• Space Reserved: y
• Note: The portname for the HBA is pre-entered for you in the scenario.
• LUN ID: 1.
• Comment: DBgroup
• Path/Volume: /vol/sanvol
• Space Reserved: y
• LUN Size: 50 GB
• Assigned Drive: R:
• Size: 50 GB
• Drive Letter: H:
Module 9. Installation
Installation
Objectives
Product Documentation
Software
Boot Diskettes (non-flashcard system)
Hardware
Product Documentation
New storage appliances are shipped with product documentation (on CD-ROM) and software
(CD-ROM and diskettes if applicable). Product documentation and additional information about
your new storage appliance are also available online at http://now.netapp.com. Along with the
product documentation is a list of all licenses that were purchased for the storage appliance.
Additional Information:
Check the Data ONTAP Release Notes and Read Me First document for descriptions of the latest
details of the release
Software
The CD-ROM contains system software and system boot diskettes (for storage appliances that
use diskettes instead of CompactFlash™ cards). Because the system software was installed at the
factory, you don’t need the CD-ROM or system boot diskettes to install or configure a new
storage appliance. However, Network Appliance recommends that you store the CD-ROM and
system boot diskettes in a safe place so that you can use them to recover from any unlikely
software problems in the future
The CD-ROM contains the system software and system boot software in two formats so that
both UNIX and PC workstations can read it. If you need to reinstall the system software for any
reason, you need this CD-ROM or access to the NOW site.
1. Access the NOW site and enter the Service and Support window.
3. Scroll down to the Documentation & Related Knowledge section and select the appropriate
“boot diskette” link
4. Scroll down and review the instructions. Print a copy for easy reference.
Hardware Install
The product documentation includes a copy of the Hardware and Service Guide for your storage
appliance. Detailed instruction, including important cautions and warnings are provided.
• Plug in serial cable to console port of storage appliance and a terminal device
• Apply power to the disk shelves and then to the CPU unit
Prepare
Prepare
Choose
Choose
Task
Task
Initialize Disks
Initialize Disks
Re-enable Choose
Choose
Re-enable
Licenses Method
Method
Choose Setup Licenses
Choose Setup
Method
Method
System Verify
Verify
System
Repurposed Reboot
Reboot
Repurposed Installation
Installation
Software Installation
There are three types of software installations:
Regardless of which type of installation you choose, planning ahead will ensure that you have
the information you need to conduct a flawless installation.
If a reconfiguration is done, the old contents of these five configuration files are saved in rc.bak,
exports.bak, resolv.conf.bak, hosts.bak, hosts.equiv.bak, and dgateways.bak
eng_router
10.10.10.1
NetApp1 OurDomain
Joey 10.10.10.100
GMT 10.10.10.200
Bldg. 1
en_US
adminhost
10.10.10.20
e0
10.10.10.30 10.10.10.100
255.255.255.0
Administrator
vif1
4 nollip
e4a, e4b, e4c, e4d
Configuration Worksheet
The setup script requires information specific to your network environment. A Configuration
Worksheet is provided in Appendix A of the Software Setup Guide. You can use the worksheet
for information gathering. Not all the information requested on the worksheet is required for all
installations.
Host name
The name by which the storage appliance is known on the network. If the storage appliance is
licensed for the NFS protocol, the name can be no longer than 32 characters. If the storage
appliance is licensed for the CIFS protocol, the name can be no longer than 15 characters. The
host name must be unique for each storage appliance in a cluster.
Password
A password that the storage appliance requires before granting administrative access at the
console, through a Telnet session, or through the Remote Shell protocol.
Time zone
The time zone in which the storage appliance resides. See the Setup Guide, Appendix B, “Time
Zones,” for a list of valid time zones. The time zone must be identical on both storage
appliances in a clustered system.
Location
A description of the physical location of the storage appliance. This information sets the SNMP
location information.
Language
The language used for MultiProtocol storage appliances if both the CIFS and NFS protocols are
licensed. See Setup Guide, Appendix C, “Supported Languages,” for a list of supported
languages and their abbreviations. The language must be identical on both storage appliances in
a cluster.
Administration host
A client computer that is allowed to access the storage appliance through a Telnet session or
through the Remote Shell protocol. In /etc/exports, adminhost is granted root access to / so that it
can access and modify the configuration files in /etc. All other NFS clients are granted access
only to /home. If no adminhost is specified, then all clients are granted root access to the root
directory. This is not recommended for sites where security is a concern.
Ethernet
If your network uses standard Ethernet or Gigabit Ethernet (GbE) interfaces, gather the following
information for each interface.
IP address
A unique address for each network interface.
Example: 255.255.255.0
Jumbo Frames
If jumbo frames are supported, set the Maximum Transmission Unit (MTU) size
The default frame size defined for a jumbo frame on the storage appliance is 9,018 bytes, and the
maximum supported size is 9,210 bytes. These sizes correspond to MTU sizes of 9,000 and
9,192, respectively.
Virtual interface
Specify the interface name rather than the interface IP address.
DNS domain
Enter the name of your network’s Domain Name Service (DNS). The DNS domain name must
be identical on both storage appliances in a cluster. Record the IP addresses of your DNS servers.
NIS servers
Enter the IP or host names of your preferred NIS servers.
Windows domain
If your site uses Windows servers, it has one or more Windows domains. Record the name of the
Windows domain to which the storage appliance should belong.
WINS servers
The servers that handle Windows Internet Name Service (WINS) name registrations, queries,
and releases. If you choose to make the storage appliance visible through WINS, you need to
record up to four WINS IP addresses.
Active Directory
The container in which to place storage appliance accounts. This can be either the default of
Computers or a previously created organizational unit (OU) specified by you. The path for the
OU must be specified in reverse order, separated by commas.
Example: if the path is eng\dev\mgmt, the active directory distinguished name is as follows:
ou=mgmt, ou=dev, ou=eng
Note: A user in the Windows 2000 domain can pre-create the account and Data ONTAP updates
that account.
What language will be used for multi-protocol files (Type ? for list)?: en_US
Setting language on volume vol0
The new language mappings will be available after reboot
Wed Apr 7 16:12:15 GMT [localhost: rc:ALERT]: Language on volume vol0
changed to en_US Language set on volume vol0
Do you want to run DNS resolver? [n]: y
Please enter DNS domain name []: OurDomain.company.com
You may enter up to 3 nameservers
Please enter the IP address for first nameserver []: 10.10.10.100
Do you want another nameserver? [n]: y
Please enter the IP address for alternate nameserver []: 10.10.10.200
Do you want another nameserver? [n]:
Do you want to run NIS client? [n]:
This system will send event messages and weekly reports to Network Appliance Tec
hnical Support. To disable this feature, enter "options autosupport.support.enab
le off" within 24 hours. Enabling Autosupport can significantly speed problem de
termination and resolution should a problem occur on your system. For further in
formation on Autosupport, please see: http://now.netapp.com/autosupport/
Press the return key to continue.
Setting the administrative (root) password for 270B ...
NetApp1>
Transition Slide
Upgrade
4. In the Software Download table, click the Select Platform list box in the Data ONTAP
product row.
5. Select your storage appliance from the list and click Go.
Caution: Before upgrading to any release, make sure that you read the Important Caution issues
that might affect the availability of your systems.
2. In the WinZip dialog box that opens, enter the drive letter to which you mapped the storage
appliance. In the example shown, you would replace <drive> with G which you mapped in a
previous step.
3. Ensure that the two check boxes are selected: Overwrite files without Prompting and When
done unzipping run…ainstall.bat
4. Click the unzip button. numerous files are copied to the /etc directory on the storage
appliance.
NetApp1> download
Sun Feb 9 19:03:20 GMT [download.request: notice]:
Operator requested download initiated
download: Downloading disks: opening Data ONTAP 6.5
…………………………………………… done
download: boot blocks successfully copied to disk(s)
Sun Feb 9 19:15:23 GMT [download.request Done:notice]:
Operator requested download completed
NetApp1> reboot
Tue Feb 4 21:23:03:55 GMT [kern.shutdown:notice]:
System shutdown because:"reboot"
Alpha Open Firmware by FirmWorks
Copyright 1995-1998 FirmWorks, Network Appliance.
All Rights Reserved. Firmware release 2.3_a2
Memory size is 1024 MB
Testing SIO
Testing LCD
Probing devices
NetApp1> version
NetApp Release XX: Fri Feb 7 00:03:16 PST 2005
When the system files have decompressed, open the storage appliance console and follow these
steps:
2. When the boot blocks have been successfully copied, reboot the storage appliance.
Note: Rebooting or halting will only work on a console session. A telnet session will end! If
the unit has a floppy drive, check to be sure that there are no diskettes inserted.
1. Create a mount point for the storage appliance in the root directory on the adminhost.
$ cd /dldir
$ cp *.tar /NetApp
$ cd /NetApp
$ tar xvf XX_sysfiles.tar
$ ./install_netapp /NetApp
xx
xx
1. Copy the compressed files from the UNIX client download directory (/dldir) to the storage
appliance.
2. Go to the directory on the storage appliance containing the compressed file and expand it.
3. Verify that the files tar_image.Z and install_netapp were created in the directory, and then
enter the command to install the system files. ./install_netapp /NetApp
Numerous files are copied to the /etc directory on the storage appliance.
2. When the boot blocks have been successfully copied, reboot the storage appliance.
Note: Rebooting or halting will only work on a console session. A telnet session will end! If
the unit has a floppy drive, check to be sure that there are no diskettes inserted.
Before you start, you need to establish an HTTP host and download the appropriate software (the
Windows executable file for the specific platform, for example: XX_setup_i.exe) from the NOW
site to the host.
Once the .exe files are on an HTTP server, you can get and install them on any storage appliance
by using the software commands.
NetApp>software
NetApp>software get
get http://swserver/XX_setup_i.exe
http://swserver/XX_setup_i.exe
NetApp>software
NetApp>software list
list
setup.exe
setup.exe
XX_setup_i.exe
XX_setup_i.exe
NetApp>software
NetApp>software delete
delete setup.exe
setup.exe
NetApp>software
NetApp>software install
install XX_setup_i.exe
XX_setup_i.exe
NetApp>software
NetApp>software install
install http://swserver/XX_setup_i.exe
http://swserver/XX_setup_i.exe
1. Download appropriate system files from the NOW site to a host HTTP server (internal or
external)
5. Verify installation/upgrade.
Transition SlideReinstall or
Repurpose a
Storage
Appliance
Re-installation
A major difference between this process and a new install is the initialization step. A new
storage appliance is shipped with two disks initialized in one file system (vol0) and all other
disks marked as spares. When you reinitialize an existing storage appliance, you wipe out the
disk configuration and all system configuration files. All data on existing drives is destroyed.
Initialization provides a fresh start.
4. License protocol to install Data ONTAP software or utilize the software command
5. Run download
6. Reboot
7. Re-enable licenses
Topic Review
Exercises
Installation-Remainder of
Exercises
Exercise: Installation
Objective
When you have completed this module, you will be able to do the following:
• Assemble the information and materials needed to initialize a storage appliance and create a
new file system.
• Install licenses.
Exercise Overview
You will perform all of the pre-installation preparations required for a successful installation.
You will boot the storage appliance from floppy disks and install the software. During this
process you will create a new file system and configure the network file system. You will install
the licenses needed. You will install the system files. You will use the download command to
install system files on the boot sector of the disk. You will verify that the software is correctly
installed and the storage appliance is functioning properly.
Note: The following exercises will take you through installing Data ONTAP on a storage
appliance. The actual text on the screen may differ depending on the version of Data ONTAP
you install.
Time Estimate
30 Minutes
Start of Exercise
Step Action
1. Compile the information listed in the Filer Configuration table. Your instructor will
provide you with specific information for your storage appliance.
2. Filer Configuration
Filer hostname ______________
e0 IP Address ______________
Subnet Mask ______________
Media type ______________
Adminhost Name ______________
Adminhost IP Address ______________
DNS Domain Name ______________
3. Access the storage appliance’s console via the console port and halt the storage
appliance.
NetApp> halt
Enter the boot command in the storage appliance console, or, if the system is
4.
powered off, power it on.
6. When the 1-5 menu displays, select option (4) Initialize all disks. From
the storage appliance’s list of options.
7. When prompted type y to zero all disks and install a new file system.
Step Action
1. Enter the software install command from the storage appliance’s console.
NetApp> software install
http://IP_of_DomainController/XX_setup_i.exe
Obtain the filename from you Instructor.
2. When prompted, enter the download command to copy the boot block information
to disk or compact flash.
NetApp> download
Sample output, your output might vary.
NetApp> download
download: You can cancel this operation by hitting Ctrl-C
in the next 6 seconds.
download: Depending on system load, it may take many
minutes
download: to complete this operation. Until it finishes,
you will
download: not be able to use the console.
Wed May 12 20:40:02 GMT [download.request:notice]: Operator
requested download initiated
download: Downloading boot device
......................
download: Downloading boot device (Service Area)
.....
NetApp> Wed May 12 20:40:54 GMT
[download.requestDone:notice]: Operator requested download
completed
NetApp>
NetApp> version
Step Action
1. License NFS by typing the following command and using the license code provided
by your instructor.
NetApp> license add nfslicense
2. License CIFS by typing the following command and using the license code provided
by your instructor.
NetApp> license add cifslicense
3. License HTTP by typing the following command and using the license code provided
by your instructor.
NetApp> license add httplicense
At the storage appliance prompt, type cifs setup
4
NetApp> cifs setup
• No to WINS
The Storage Appliance, at this point will determine what type of domain it is in and
5.
continue with the setup. If the filer does not find all the components of a Windows
2000 domain, the program will assume it is in an NT4 domain. If you are trying to join
a Windows 2000 domain and this occurs, this would indicate a problem with your
setup.
7. Right click My Network Places -> Map a Network Drive to the storage appliance as
shown in the example below.
8. Download the Window version of the system files from the NOW site or use the
following URL http://IP_ofDC/XX_setup.exe to obtain the software.
Now double click on the setup.exe file. (Filename may vary depending on your
hardware).
9. When the WinZip Self-Extractor dialog box is displayed, replace “<drive>” with
the drive letter you mapped to in Step 7 and select Unzip.
11. Return to the storage appliance’s console and enter download at the prompt as
shown below.
NetApp> download
..done
NetApp>
Step Action
$ mkdir storage_appliance_name
(Replace with your storage appliance’s name).
$ cd /storage_appliance_name
Verify that the following two files were created in the directory:
6.
tar_image.Z
install_netapp
9. Go to the storage appliance console when you see the UNIX prompt.
NetApp>
Snapshots
Objectives
Snapshot Overview
The SnapShot technology is a key element in the implementation of the WAFL file system.
• It is only a picture of the file system and does not contain the actual contents of data
files.
• Snapshots are used for such purposes as backup and error recovery.
Data ONTAP automatically creates and deletes snapshots of data in volumes to support
commands related to Snapshot technology.
Volumes
• Snapshot subdirectory accessible to users
• Users can access and recover files
Aggregates
• 5% of aggregate reserved for aggregate
snapshots
• Primary function is to support functions
related to Snapshot technology
Volumes
Snapshots for traditional and flexible volumes are stored in “special” subdirectories that can be
made accessible to Windows and UNIX clients so users can access and recover their own files
without assistance. A maximum of 255 Snapshots per volume may be stored at any one time.
Aggregates
Five percent of an aggregate is reserved for snapshots of the aggregate. In normal day to day
operations, aggregate snapshots are not actively managed by the system administrator. Instead,
for example, Data ONTAP automatically creates snapshots of aggregates to support commands
related to the SnapMirror® software, which provides volume-level mirroring.
Snapshot Overview
Snapshot Overview
Snapshots are taken according to an automatic schedule. You can manually reset the schedule
when you configure the storage appliance. Schedule intervals are weekly, nightly, and hourly.
Because the Snapshots are stored independently of the Active File System (AFS), you can
perform backups on recently created Snapshots without taking the system off-line, even while
users are heavily accessing and updating data.
Snapshot Overview
Snapshot Overview
Snapshots begin to use space when data is deleted or modified. WAFL writes the new data to a
new block on disk (D’) and changes the root structure for the active file system to point to the
new block.
Meanwhile, the Snapshot still references the original block D. As long as there is a Snapshot
referencing a data block, the block remains unavailable for other uses. So Snapshots only start to
consume disk space as the file system changes after a Snapshot is created.
Aggregates Aggregate
Each aggregate has 5% allocatedSpace
for snap reserve and 10% 10% WAFL Overhead
allocated for WAFL.
WAFL Aggregate Space
Flexible Volumes
Each volume has 20% allocated FlexVol1
for snap reserve. The remainder 80%
is used for client data.
.snapshot 20% FlexVol
Space
Snap Reserve 95% plus
90% FlexVol#n
The amount of space allocated for Aggregate
80%
snap reserve is adjustable. To use Snapshot
Reserve
this space for data (not .snapshot 20%
recommended), you must
manually override the allocation
which is used for Snapshots.
Aggregate Snapshot Reserve 5%
(adjustable)
Snapshot Commands
Snapshot Commands
In the snap command the option A is used for aggregates and the option V is used for volumes.
Volume is the default if neither A or V is specified. The table shown above lists commands you
can use to create and manage Snapshots.
If you omit the volume name in any of these commands, the command applies to the root
volume. The Snapshot commands are persistent across reboots.
Example Result
snap create Creates a snapshot named Friday5pm in the engineering volume.
engineering Friday5pm
snap list engineering Lists all available snapshots in the engineering volume.
snap delete Deletes Friday5pm in the engineering volume.
engineering Friday5pm
Example Result
snap sched vol2 0 2 6 Sets the automatic schedule on vol2 to save the following:
@ 8, 12, 16, 20
• 0 weekly snapshots
• 2 nightly
Snapshot Schedule
The snap schedule in the example above would keep the following snapshots for vol2:
No weekly snapshots
2 nightly snapshots
6 hourly snapshots taken at 8:00 A.M., 12:00 P.M., 4:00 P.M. and 8:00 P.M.
Snapshots are a “picture” of a volume. The only difference between a weekly snapshot and a
nightly or an hourly is the time at which the Snapshot was taken and any data that was changed
between the snapshots.
• The first column, % used, shows the relationship between accumulated Snapshots and the
total disk space consumed by the active file system. Values in parentheses show the
contribution of this individual Snapshot.
• The second column, % total, shows the relationship between accumulated Snapshots in the
total disk space consumed by the volume. Values in parentheses show the contribution of this
individual Snapshot.
• The date column shows the date and time the Snapshot was taken. Time is indicated on the
24-hour clock and in this example, reflects the hours set in the automatic Snapshot schedule.
• Finally, the name column lists the names of each of the saved Snapshots. Scheduled
Snapshots are automatically renumbered as new ones are taken so that the most recent is
always .0. This also ensures that the file with the highest number (in this case, hourly.5) is
always the oldest Snapshot.
13
• To modify the schedule for an existing Snapshot: From the Volumes node on the main menu,
open Snapshots and select Configure. Enter data in the available fields and click Apply to
activate the schedule.
• To create a brand-new Snapshot: Open the Volumes node, select Snapshot, then Add. The
Add Snapshot pane allows you to select a volume and insert a new Snapshot name. Click the
Add button to create the new Snapshot.
• To view a list of current Snapshots: Open the Volumes node, select Snapshots, and select
Manage.
• To manually delete individual Snapshots from the Volume: Open the Volumes node, select
Snapshots node, then select Manage. Locate the Snapshot you want to delete and check its
box. Click the active Delete button, then click OK to verify your action.
Snapshot Options
15
Snapshot Options
The table shown here lists the options available for controlling the creation of and access to
Snapshots and Snapshot directories on a volume
• Disable automatic snapshots: setting the nosnap option to on disables automatic Snapshot
creation. You may still manually create Snapshots at any time.
• Make .snapshot directory invisible to clients, and turn off access to .snapshot directory:
setting the nosnapdir option to on disables access to the Snapshot directory that is present at
client mount points and the root of CIFS directories and makes the Snapshot directories
invisible. (For NFS, the directories are named .snapshot; for CIFS, the directories are named
~snapshot.) By default, this option is off (directories are visible).
• Make ~snapshot directory visible to CIFS clients: Two steps are required to make the
~Snapshot directories viewable by clients:
You must also ensure that the show hidden files in enabled on your Windows system.
Snapshot Options
Example Result
vol options vol2 nosnap on Disables automatic snapshots for vol2
vol options vol2 nosnapdir on Makes (.snapshot) (~snapshot) directory
invisible to clients.
options cifs.show_snapshot on Makes ~snapshot directory visible to CIFS
clients.
# pwd
/filer /.snapshot
# ls -l
total 240
drwxrwxrwx 9 root other 12288 Jan 29 16:19 hourly.0
drwxrwxrwx 9 root other 12288 Jan 29 16:19 hourly.1
drwxrwxrwx 9 root other 12288 Jan 29 16:19 hourly.2
drwxrwxrwx 9 root other 12288 Jan 29 16:19 hourly.3
drwxrwxrwx 9 root other 12288 Jan 29 16:19 hourly.4
drwxrwxrwx 9 root other 12288 Jan 29 16:19 hourly.5
drwxrwxrwx 9 root other 12288 Jan 29 16:19 nightly.0
drwxrwxrwx 9 root other 12288 Jan 29 16:19 nightly.1
drwxrwxrwx 9 root other 12288 Jan 29 16:19 weekly.1
drwxrwxrwx 9 root other 12288 Jan 29 16:19 weekly.2
#
16
Snapshot Directories
Every volume in the file system contains a special Snapshot sub-directory. This allows users to
access earlier-in-time versions of the file system in cases where they need to recover lost or
damaged files.
1. On the storage appliance, login as root and ensure that the nosnapdir option is set off.
2. To view the hidden directories, from the NFS mount point, enter the (ls) command with the
-a (all) option.
When listing the snapshot directories from a client, the date/time stamp is usually the same for
all the directories. Therefore, to find the actual date/time of each snapshot you should use the
snap list command on the storage appliance.
Not
Note:e:SSnapshots
napshotsare arevisib
visibleletoto
Windows
Windowsclien clientststhat
thathave
haveFileFile
Manage
Manager rconfigure
configureddtotodisplay
display
“hid den file s”
“hid den file s”
17
The Snapshots sub-directory appears to CIFS clients as ~Snapshot. Files shown here are those
created automatically for specified intervals. Manually created Snapshots, if any, would also be
listed.
Restoring a File
To restore a file from the ~snapshot directory, rename or move the original file then copy the file
from the ~snapshot directory to the directory in which the file originally existed.
Topic Review
Exercises
20
Exercise: Snapshots
Objective
When you have completed this module, you will be able to do the following:
• Navigate and copy deleted files from the .snapshot and ~snapshot directory
Exercise Overview
During this exercise you will view current Snapshots, set up a new Snapshot schedule, and
manually create a Snapshot.
Time Estimate
20 Minutes
Start of Exercise
Manage snapshots
Step Action
1. Access the storage appliance console and type the following to get a list of Snapshots
on vol0:
NetApp> snap list vol0
2. Enter the following command to schedule Snapshots for vol0:
NetApp> snap sched vol0 1 3 4@8,10,12,14
3. Enter the following command to create 2 new Snapshots:
NetApp> snap create vol0 newsnap1
NetApp> snap create vol0 hourly.1
4. Enter the following command to view the newly created snapshots.
NetApp> snap list vol0
5. Enter the following command to delete the hourly.1 Snapshot:
NetApp> snap delete vol0 hourly.1
6. Verify hourly.1 was deleted by running snap list again.
7. What times of day and which days will Snapshots be taken based on the schedule you
entered in Step 2?
______________________________________________
______________________________________________
______________________________________________
Notice the differences in the output from step #1. You should have noticed an increase
in the used space on vol0. The amount of change may vary based on the size of the
disks in your volume.
4. At the filer console, type the following:
Netapp> snap create vol0 mysnap
5. At the filer console, type the following:
Netapp> snap list
Observe that the snapshot has zero size.
6. From the Adminhost, in your filer’s /vol/vol0 mount point; delete the 3-100 MB files
you created.
# rm fo*
7. At the filer console, type the following:
Netapp> snap list
Notice the difference in the % used columns.
8. At the filer console, type the following:
Netapp> df
Notice the differences
9. From the Adminhost, in the filer’s mount point, cd to the /.snapshot/mysnap and copy
the files back to the storage appliance’s root directory.
cd to /filers_mountpoint/.snapshot/mysnap/home
# cp foo*
10. At the filer console, type the following:
Netapp> snap list
11. At the filer console, type the following:
Netapp> df
Step Action
1. Access the filer console and type the following to view snap reserve on vol0:
NetApp> snap reserve
View the space reserved for snapshots on vol0
2. Change the snap reserve value to 5% for vol0
Netapp> snap reserve vol0 5
View the space reserved for snapshots on vol0
3. Set the snap reserve back to the original value of 20 for vol0.
4. Access the filer console and type the following to view snap reserve on vol0:
NetApp> snap reserve
Ensure the value has been set back to 20%.
Step Action
1. From the Windows desktop double click my computer. Access the c$ share that is
mapped to your system. Navigate to the /etc directory. Locate the file named
cifssec.bak and delete the file.
2. Navigate to the ~snapshot directory and locate the file in the /etc directory. Copy the
file back to its original location /etc/cifssec.bak
End of Exercise
Quotas Administration
Objectives
Quotas Overview
Functions of Quotas
Limit set to control use of file or disk space
Method to track usage without imposing a
limit
Way to warn users when usage is high
Functions of Quotas
Quotas are important tools for managing the use of disk space on your storage appliance. A
quota is a limit set to control or monitors the number of files or amount of disk space an
individual or group can consume. Quotas allow you to manage and track the use of disk space by
clients on your system.
• limit the amount of disk space or the number of files that can be used
• track the amount of disk space or number of files used, without imposing a limit
• warn users when their disk space or file usage is high
Quota Targets
Quota Targets
The target of a quota limit can be an individual user, a group, or a qtree:
Quota Targets
Quota Targets
Quotas are based on a Windows account name, UNIX UID, or GID in both NFS and CIFS
environments.
The CIFS system administrator must maintain the /etc/passwd file for CIFS users to obtain UIDs
(if those users are going to create UNIX files) and the /etc/group file for CIFS users to obtain
GIDs, or use an NIS server to implement CIFS quotas.
Tree quotas do not require UIDs or GIDs. If you only implement tree quotas, it is not necessary
to maintain the /etc/passwd and /etc/group files (or NIS services).
Quota Types
group@vol group@tree
group
tree@vol
tree
Target lists the entity the quota will be applied against. The examples in this column represent
equivalent ways you can specify the target. The entries serve to inform the storage appliance of
the target’s UID (if it’s a user) or GID (if it’s a group). The ID numbers must not be zero. The
system checks quotas every time it receives a write request—so it is important to use a target that
won’t change over time.
Note: Do not use the backslash (\) or at sign (@) in UNIX quota targets – Data ONTAP
interprets them as being part of Windows names.
Type Column
Type is the kind of quota applied. You can enter one of the values shown here to define the quota
type. A tree quota is created in the root directory of a volume. The target for a tree quota is the
complete path name to this directory.
Note that while the root user and Windows Administrators are exempt from user and group
quotas, they are not exempt from tree quotas.
Quota type Value in the Type field Sample entry in the Type field
Note: If the user or group name is not fully qualified the quota applies to the root volume only.
Disk Column
The Disk field lists the maximum disk space allocated to the quota target. This hard limit cannot
be exceeded: If the limit is reached, messages are sent to the user and console and SNMP traps
are created.
Use abbreviations (G, M, or K) for gigabytes, megabytes, and kilobytes. You can enter letters
either upper or lowercase. If you omit the letter, the system assumes K (kilobytes). Do not leave
this field blank: enter a dash (-) to track usage without imposing a limit.
Maximum Values: 4,294,967,295k, 4,194,303m, 4,095g
Files Column
The Files field specifies the maximum number of files the quota target can use. A blank or a
dash (-) in this field indicates that the number of files is not part of the quota and is to be tracked
only. You can omit abbreviations (upper or lowercase) and you can enter an absolute value such
as 15000.
Maximum Value: 4,294,967,295
Note: the value for the files field must be on the same line in your quotas file as the value for the
disk field –otherwise, the Files field will be ignored.
Threshold Column
The Threshold field specifies the limit at which write requests trigger messages to the console. If
the threshold is exceeded, the write still succeeds, but a warning is logged to the console.
The Threshold field has the same format as the Disk field.
Do not leave this field blank. The value following Files is always assigned to the Threshold
field. If you do not want to specify a threshold limit, type a dash (-) here.
The maximum values in the Threshold field are: 4,294,967,295k, 4,194,303m, 4,095g
Soft Disk Column
The Soft Disk field specifies the disk space that can be used before a warning is issued. If this
limit is exceeded, a message is logged to the console and an SNMP trap is generated.
When the soft disk limit returns to normal, another syslog message and second SNMP trap are
generated. The Soft Disk field has the same format as the Disk field. If you do not want to
specify a soft limit, use a dash (-) or leave the field blank.
The maximum value you can enter in the Soft Disk field is 4,294,967,295 K. Note: The Soft
Disk field value must be on the same line as the value for the Disk field–otherwise, Soft Disk
will be ignored. The Sdisk limit is the NFS equivalent of a CIFS threshold.
Soft Files Column
The Soft Files field specifies the number of files that can be used before a warning is issued. If
the soft limit is exceeded, a warning message is logged to the storage appliance console and an
SNMP trap is generated. When the soft files limit returns to normal, another syslog message and
an SNMP trap are generated. The Soft Files field has the same format as the Files field. If you do
not want to specify a soft files limit, type a dash (-) or leave the field blank.
The maximum value you can enter in the Soft Files field is 4,294,967,295 K. Note: The Soft
Files field value must be on the same line as the value for the Disk field–otherwise, Soft Files
will be ignored. The Sfiles limit is the NFS equivalent of a CIFS threshold.
Quotas Example
Quotas Example
Users in the Technical Publications group are limited to 100M of disk space on the techpubs
volume. Yolanda, the graphic artist, is responsible for managing the entire department’s graphic
and photo files. She’s constantly receiving warnings about disk space being full. Creating a new
quota for Yolanda on that volume solves this problem. Her userid is yhagopian. This example
shows an increase in the amount of the disk space allowed, an increase in the number of files that
can be created and an increase on the threshold limit.
Managing Quotas
Managing
Quotas
Quota Commands
Quota Commands
The table shown here lists the commands you can use to manage quotas in each volume. For all
of these commands, if there is only one volume on the system, you may omit the volume name.
The quota commands are persistent across reboots.
Using FilerView
Quotas can also be managed using the FilerView interface. To access the Quota functions, point
your browser to the storage appliance’s address and open the Volumes node. Choose Quotas,
then the Manage function.
Example Result
quota on vol1 Activates quotas on vol1 based on the contents
of the /etc/quotas file
quota resize vol1 Activates changes on vol1 based on the
contents of the /etc/quotas file
qtree create /vol/vol2/techpubs Creates a special directory at the root of a
volume for ./vol/vol2/techpubs
Before activating quotas, you must first define quota rules for the volume in the /etc/quotas file.
Modifying /etc/quotas has no effect until the next time you execute quota on (or quota
resize).
Use quota resize only when quotas are already on for the volume, quota resize
implements newly added and changed entries to the /etc/quotas file.
The example above shows the report command with the –u option. For targets with multiple
IDs, this report shows the first ID on the first line of each report entry. Other IDs are shown on
separate lines, one ID per line. Each ID is followed by its original quota specifier, if any.
(Default displays one ID per target.)
Option: -s
Prints soft and hard limit values for each user, group, and qtree.
Option: -u
For targets with multiple IDs, shows first ID on first line of each report entry. Other IDs shown
on separate lines, one ID per line. Each ID is followed by its original quota specifier, if any.
(Default displays one ID per target.)
Option: -x
For targets with multiple IDs, shows all IDs, comma separated, on first line of report entry.
Report shows threshold column. Columns are tab delineated.
Option: -t
Prints the threshold of the quota entry. If omitted, the warning threshold is not included.
Example Result
quota report -s Prints a report of active quotas for .
/vol/vol1/techpubs /vol/vol1/techpubs
Using FilerView
You can also view reports showing quota usage in volumes by using the FilerView interface. To
access the Reports function, point your browser to the storage appliance’s address and open the
Volumes node. Select Quotas, then the Report function.
Option Function
ON Example: quota logmsg on 60m –v vol2
OFF Disables logging of messages to system log
-v Applies interval to named volume
all Applies interval to all volumes on the filer
Option: on
Specify “on” followed by a number and a letter: d (days), h (hours), and m (minutes). If no
interval is specified, a default interval of 60 minutes is used. An interval of 0 causes continuous
logging. For very small interval settings, message logging may not occur at the specified
interval rate. This is due to the system buffering messages instead of outputting them
immediately.
Option: off
Use this option to disable logging of quota messages.
Option: -v [volume_name]
Use this option to specify a volume name.
Option: all
Use this option to apply an interval to all the volumes in the system.
Example Result
quota logmsg on 120 all Activates interval logging every 120 minutes
for all volumes
– QUOTA_TARGET_DOMAIN
– QUOTA_PERFORM_USER_MAPPING
QUOTA_TARGET_DOMAIN [domain_name]
– QUOTA_PERFORM_USER_MAPPING
Data ONTAP consults the /etc/usermap.cfg file to map the user names. For UNIX to Windows
mapping: if the /etc/usermap.cfg file maps “Roberts” to “corp/jroberts,” the first quota entry
applies to both the user whose UNIX name is Roberts and to the user whose Windows name is
corp\jroberts (who should be the same user). A file owned by either is subject to the quota.
Quota Error
Messages
Exceeding Quotas
Quotas are set to forewarn you that limits are being approached so you can do something before
users are impacted. Quota Types are shown here.
For all types, Data ONTAP sends console messages when the quota is exceeded and when it
returns to normal. SNMP traps about quota events are also initiated. Additional messages are
sent to the client when hard quota limits are violated.
Note: Threshold quotas (CIFS) and Soft quotas (NFS) are equivalent.
If the qtree is not full, but the write would cause either the user or group quota to be exceeded,
Data ONTAP logs one of these errors:
When hard quota limits are violated, Data ON TAP returns an "out of disk space" error to the
NFS write request or a "disk full" error to the CIFS write request.
Not all versions of UNIX perform the quota check described above and messages vary
depending on version.
When the user tries to copy a file using the Explorer in Windows 95, the following error is
displayed:
Cannot create or replace filename: cannot read from the source file or disk.
If a soft quota is exceeded, a console message is generated as well as SNMP traps. When the
quotas return to normal, another console message is sent.
Topic Review
Topic Review
Exercises
Quotas True/False
Quota Management and Administration
• Describe how quotas are used to restrict and track disk access
• Determine the function of quotas
• Recognize the purpose of the /etc/quotas file
• Interpret the contents of the /etc/quotas file
• Define the function and syntax of quota, quota resize, quota report, and quota logmsg
commands
• Turn quotas on for a specific volume
• Display a quota report to view current status
• Identify and define the function of two special entries in the /etc/quotas file
Exercise Overview
This exercise tests knowledge of quotas through the use of True/False questions.
Time Estimate
20 minutes
Start of Exercise
Step Action
Question True or
False?
1. You can modify the /etc/quotas files from either the command line or
using the FilerView interface but you must create the file using CLI.
2. User quotas, group quotas, and tree quotas are stored in the /etc/quotas
file.
4. You can enter zero for a UID or GID in the Target field
7. The root user and Windows administrators are exempt from tree quotas.
8. When entering values in the Disk and File fields you can use the
abbreviations G, M, or K.
9. You can leave the Threshold field blank if you want to track usage
rather than applying a limit.
10. If a Threshold limit is exceeded, the write operation still succeeds, but a
warning is logged to the storage appliance console.
11. The values for Soft Disk and Disk must be on the same line in the
/etc/quotas file—otherwise, Soft Disk will be ignored.
12. The quota target for a qtree should be the qtree name.
13. To make sense, the value in the Disk field should be smaller than the
value in the Threshold field.
End of Exercise
• Describe how quotas are used to restrict and track disk access
• Determine the function of quotas
• Recognize the purpose of the /etc/quotas file
• Interpret the contents of the /etc/quotas file
• Define the function and syntax of quota, quota resize, quota report, and quota logmsg
commands
• Turn quotas on for a specific volume
• Display a quota report to view current status
• Identify and define the function of two special entries in the /etc/quotas file
Exercise Overview
The purpose of this activity is for you to perform the procedures to administer quotas on the
storage appliance. During this part of the lab you will create a quota, enable the quota, alter
quotas and display quota information.
Time Estimate
20 minutes
Start of Exercise
Step Action
1. On the storage appliance verify that a qtree with the name of tree1 exists on vol1.
For example,
NetApp> qtree status
Volume Tree Style Oplocks Status
-------- -------- ----- -------- ---------
vol1 tree1 unix enabled normal
vol0 unix enabled normal
If the qtree or vol1 does not exist, then create them by typing:
NetApp> #Comment: If aggr1 does not exist then create it.
NetApp> aggr create aggr1 -t raid4 2
NetApp> #Comment: Create “vol1” and qtree “tree1”
NetApp> vol create vol1 aggr1 2g
NetApp> qtree create /vol/vol1/tree1
NetApp> #Comment: Turn quotas on “vol1”.
NetApp> quota on vol1
2. Using the Unix Adminhost or a Windows workstation, update the /etc/quotas file.
Use vi or wordpad to add the following entries to the /etc/quotas file.
#QuotaTarget type Disk Files Thresh Sdisk Sfiles
/vol/vol1/tree1 tree 100K 5 10K 20K 4
* user - - -
3. Activate the changes by entering the following command:
NetApp> quota resize vol1
4. Use a Windows or UNIX client to create at least five small files in the tree1 directory
on vol1 of your storage appliance.
5. When you exceeded the file quota, what message did you receive on your Windows or
UNIX client?
6. When you exceeded the file quota, what message did you receive on your storage
appliance?
7. Create and then analyze a quota report. Type in the following command:
NetApp> quota report –tx
8. How much disk space is being used by all users on your storage appliance?
9. How many files were created on your storage appliance for qtree tree1?
10. Prepare to increase the amount of disk space, files and other thresholds available
through quotas.
Use FilerView to update the following entries to the /etc/quotas file.
Disk Space Soft Limit: No Entry
Disk Space Hard Limit: 152KB
Threshold: 20KB
Files Soft Limit: 15
Files Hard Limit: 15
13. Use a Windows or UNIX client to create more than 15 files in the tree1 directory on
vol0 of your storage appliance
14. When you exceeded the quota, what message did you receive on your Windows or
UNIX client?
15. When you exceeded the file quota, what message did you receive on your storage
appliance?
End of Exercise
Administering Backups
Objectives
Businesses need data backup and protection systems in order to: protect data from accidental
deletion, application crashes, data corruption, and viruses; archive data for future use; and to
recover from a disaster.
Making tape archives gives you the following advantages over relying solely on online storage:
Autosupport
Preparing for Tape
Backup
NetApp> sysconfig -t
l
l
l
• Rewind--storage appliance rewinds the tape after it finishes writing the tape file. The name of
a rewind tape file begins with an r.
• Norewind—storage appliance does not rewind; specify norewind to write multiple tape files
on the same tape. The name of a norewind tape file begins with the letter “n.”
• Unload/reload--type applies only if you are backing up to tapes in tape stackers. The tape is
unloaded when it reaches the end of tape and another tape is reloaded. The name of an
unload/reload tape file begins with the letter “u.”
•
Qualified Tape Devices
To identify NetApp-qualified tape drives, view the Data Protection—Supported Devices page on
the NetApp NOW site. Information is also available in the System Configuration Guides found
on the web site.
You need to get the information for this file from the tape drive documentation and then use a
text editor to create the file. Contact the tape vendor to see if this file is available.
There may be multiple files in the directory, one for each model being qualified.
Autosupport
Using the dump
Command
• Full volume
• Full qtree
• Miscellaneous
In miscellaneous backups, you back up a subtree that is neither an entire volume nor an entire
qtree. You can also backup files and directories.
The dump path can exist in the active file system or in a Snapshot. If the dump path is in an
active file system, a Snapshot of the active file system is taken before the data is written to tape.
The system then uses that Snapshot to create the backup. As a result, the backup always contains
the most recent file system data.
Whenever you use a Snapshot as the source for creating the archived tape images (rather than the
active file system), users can continue to access their files while archiving to tape media takes
place.
The variable n is an integer starting at zero. Each time the dump command creates a Snapshot, it
increments the integer. The integer is reset to 0 when the system is rebooted.
The dump command automatically deletes the Snapshot after finishing the backup. (Unless you
point the dump command to an existing Snapshot. In this case, the Snapshot is not deleted.)
Note: When you back up from an existing Snapshot, no additional Snapshot is created.
Dump Level
Update etc/dumpdates
f specifies tape file Path
b specifies blocking factor Blocking Name
Factor
Tape
File
Name
option argument
0 – specifies a level 0 dump no argument
u – records information about the dump to no argument
/etc/dumpdates file
f – specifies the backup to use a tape device a list of one or more tape devices
b – specifies a custom blocking factor is 63 is the default blocking factor. The storage
specified. appliance supports a blocking factor of 4-64.
Blocking factors of 4 – 256 are supported from
remote hosts that are not storage appliances
Tape Options
• The ‘f’ option specifies backup to a tape file and corresponds to one or more tape device
names in the argument. You can list several devices in the dump command for the backup
• There are different types of tape files that you choose based on functionality.
• Join multiple tape names with commas: rst0a, urst0a, etc.
Note: There are more options available for use with the dump command than those described in
this topic. For detailed information, see the Command Reference or review the MAN pages from
the console and the Tape Backup and Recovery Guide available on the NOW site.
Command Result
Level 0 backups to a local tape file
dump 0uf rst0a Creates a full backup of the
/vol/vol1/users/tom /vol/vol1/users/tom directory and records
the backup in the /etc/dumpdates file.
dump 0fQ rst0a /vol/vol1 Creates a full backup of all data in the
/vol/vol1 volume that does not belong in any
qtrees.
Incremental backup to a local tape drive
dump 1uf nrst0a /vol/vol1 Performs a level-1 backup of /vol/vol1 to
nrst0a and records the backup in the
/etc/dumpdates file. Only data that has
changed since the most recent level-0
backup is written to tape. After the
command is finished, it does not rewind the
tape.
dump 1f nrst0a,nrst1a /vol/vol1 Performs a level-1 backup of /vol/vol1 to
the tape in nrst0a. After the command
finishes writing the first tape drive, it does
not rewind the tape.
Backing up a directory from a Snapshot
dump 0f rst0a Performs a level-0 backup of the
/vol/vol1/.Snapshot/weekly.0 /vol/vol1/home/user directory from the
/home/user weekly Snapshot.
Command Result
Backups to a tape stacker
dump 0f urst0a,urst0a,nrst0a Backs up the /vol/vol1 volume to a tape
/vol/vol1 stacker and records the backup in the
/etc/dumpdates file. After the command
finishes writing a tape file, it unloads the
tape and reloads another tape. After the
command finishes writing the third tape
file, it does not rewind the tape.
Backing up data without ACLs
dump 0uAf rst0a /vol/vol1 Performs a level-0 backup of /vol/vol1 and
records the backup in the /etc/dumpdates
file. The A option means that the backup
does not include any NT ACL information.
Use this option if the files in the volume are
for NFS only.
Specifying a tape file size
dump 0ufB nrst0a,nrst0a 2000000 Performs a level-0 backup of /vol/vol1 to
/vol/vol1 the tape in nrst0a using a tape file size of
2,000,000 kilobytes and records the backup
in the /etc/dumpdates file. After writing
2,000,000 kilobytes to the first tape file, the
system does not rewind the tape; it
continues writing the second tape file on
the same tape. If there is more data to be
backed up after the command reaches the
end of the second tape file, the system
prompts you for a new tape.
Backups to a remote tape file
dump 0f root@netapp1:nrst0a Performs a backup to a tape drive attached
/vol/vol1 to a storage appliance named netapp1.
Command Result
Excluding files from a backup
dump 0ufX rst0a Records the backup in the /etc/dumpdates
tmp,*.o,core*,*backup*,usr\ file and performs a level-0 backup of the
/vol/vol1 /vol/vol1 volume, which excludes the files
that meet one of these requirements:
• The name is tmp
• The name ends in .o (for example,
program.o)
• The name begins with core (for
example, core.small)
• The name contains backup (for
example, spec.backup.1)
• The name is usr
Metadata
Information about the data files includes the following information:
• Qtree information
Maps
On each tape, the dump command creates two maps:
• The first map shows which inodes are used in the directory to be dumped. The storage
appliance uses this map to determine which files have been deleted between incremental
dumps.
• The second map shows which inodes have been written to the tape. The storage appliance
uses this map to verify the accuracy of the restore operation when the backup data is restored.
Backup Preparation
Backup Preparation
Backups require preparation. As you perform the steps, you should keep notes so you can refer to
them when you decide whether the data can be restored from another computer.
• Verify the trust relationships between source and destination. The remote storage appliance
must be listed in both the /etc/hosts.equiv file and the /etc/hosts file on the local storage
appliance or the DNS database, if the storage appliance uses DNS. The local storage
appliance should be listed in the remote appliance’s /etc/hosts file as well.
• Verify rsh is enabled for remote access. You will need remote access to identify the tape
devices on the host appliance and, if the backup process is lengthy, to check the status of the
operation from another appliance.
• Use a private network so that network traffic does not slow the process
• Schedule the dump command on each storage appliance to start only when no other storage
appliances are using the tape drive
You enter the full dump path in the dump command. To determine the amount of space required
on tape, look up how much space corresponding directories, volumes, or qtrees are using.
There are various ways to find the information, depending on the file system and what you’re
backing up.
The amounts shown as “used” are good estimates to use in your calculations for a full volume
dump.
Specify a pathname (df /vol/vol0) to view information for a specified volume only.
NFS CIFS
[root@acme] #cd /NetApp10
[root@acme] /NetApp10 #du –s docs home
91424 docs
2833 home
[root@acme] /NetApp10
2. Enter df –s [directory_name]
The command output shows the amount of space allocated for the directories. Refer to the
documentation for your client system for interpreting the output because the output is written in
different units (for example, 512-byte units or 1,024 units) depending on the operating system.
CIFS
If a CIFS client shares the storage appliance, follow these steps to determine the amount of
backup data on the client:
1. On the CIFS client, point to the shared file or directory that you want to back up.
3. Click Properties to display the number of bytes used by the file or directory.
A tape block is 1 kilobyte of data. In the dump command, you can specify the number of tape
blocks that are transferred in each write operation. This number is called the “blocking factor.”
If you use a storage appliance to restore the backup data, the blocking factor must not exceed 64.
The storage appliance has a default blocking value of 63.
Tape Files
A tape can contain multiple tape files, but any tape must contain at least one complete tape file.
You can specify the maximum size of the tape file in terms of tape blocks. For example, if you
want the maximum tape file to be 2 GB, you specify 2,097,151 in the dump command.
Considerations
If the files, being backed up, are to be restored on a computer other than the storage appliance,
make sure that the tape file size you choose does not exceed the maximum tape file size
supported by that computer.
When the path being backed up exceeds a tape file, the dump command automatically writes to
the next tape file specified in the command, regardless of the amount of space left in the current
tape.
If the current tape file is the last tape file listed on the dump command, the storage appliance
prompts you to load another tape.
• Ensure that the dump command does not fail because it runs out of tapes
• Load the right number of tapes in the tape drives or stackers in advance for an unattended
backup
If you do not load enough tapes before entering the dump command and you start the operation
from the console, Data ONTAP prompts you to load additional tapes. However, if you start the
dump command through an rsh connection, you will not see the prompts from Data ONTAP
and the dump command will terminate because of the lack of tapes.
1. Determine the capacity of the tape device to be used by entering the sysconfig –t
command.
4. If your data will nearly fill the last tape, add a tape in case the estimate is exceeded.
Note: This is especially important when using compression, because compression rates vary
based on the data.
Autosupport
Managing the Tape
Backup Process
How long it takes to finish a backup depends on the data to be backed up, your equipment, and
when and how you enter the dump command. For maximum efficiency consider:
Organize Data
In this example, data has been backed up in five dump paths: 100GB for each of five qtrees.
Restoring the data for each qtree is relatively straightforward. In the second example, the restore
process requires the system to extract 100GB of data from a 500GB backup—a process that
takes more time.
Topic Review
Autosupport Exercise
Administering Backups
• Verify amount of data and tape device before issuing a dump command
• Execute a full backup of a volume using the dump command
• Back up the data in a qtree
Overview
The purpose of this lab is to provide hands-on practice performing the tasks required to use the
dump command to backup the data on a storage appliance.
Time Estimate
20 minutes
Software
− Access to the course copy of the Data ONTAP Fundamentals web based training
Start of Exercise
Step Action
1. On your local workstation, open the Data ONTAP Fundamentals web-based training
course.
4. Access the Backup and Restore module of Scenario 3, Backup, Restore, and Upgrade..
Note: Pages 5 through 8 concerns the restore command and will be addressed in
the next module.
Administering Restores
Objectives
• Files are corrupted. In this case, you can restore the subtree containing the files.
• You need more disk space. You can back up to tape, swap in larger disks, set up new
volumes, and then restore from tape.
• The entire storage appliance is damaged and unusable. Restoring a tape backup allows you to
recover to either a repaired or replaced system.
It is helpful to keep a log of information about each dump performed. However, if the
information is not available in a log, you can obtain some information about the dump using the
restore command. This will be covered later in this module.
Permissions Limitations
Takes on
Default
Windows
permissions
• If you dump a file that has only Windows permissions, and restore it into a UNIX-style qtree
or volume, the file gets the default UNIX permissions for that qtree or volume, and the
ACL’s are not restored.
• If you dump a file that has only UNIX permissions, and restore it into an NTFS-style qtree or
volume, the file gets the default Windows permissions for that qtree or volume.
• The back-up level defines the amount of data to be copied. Level 0 specifies all data
in the dump path. Levels 1-9 specify incremental back ups. For example, Level 1 is
all data that has changed since the last Level 0backup. When you restore incremental
backups, you must have all tapes in the increment chain.
• The tape device you used for each tape file in the backup from which you are restoring data
If you want to perform a full restore, this additional space should be in the root directory
containing the backup data. If you want to restore only some data from the backup, this
additional space should be in the /etc/tmp directory of the volume where data is to be restored.
Incremental Restore
The restore command supports incremental-only restores. You need not begin the restoration
from a level 0 dump, you can restore from level 1 dump.
Restore type
f specifies tape file
D specifies absolute pathname Path
Name
Tape
File
Name
Arguments are linked to options by their order in the command, so you need to list the arguments
in the same order as you list the options.
The path name is an exception to the order rule — it should always be entered as the last
argument in the list. If you are restoring data to its original location, no path is needed.
Transition Slide
Managing
Restores
The tape file number and information about qtree security style is displayed.
Generally, a table-of-contents restore should be done using a remote shell connection. Because
the system generates a line-by-line list of all the files in the backup, controlling and saving such a
large amount output is frequently easier via a client console.
For obvious reasons it is helpful to be able to identify the files that are stored on a given tape—
especially if the tape hasn’t been labeled and the information isn’t recorded elsewhere.
Example Result
Enter a number to
Use nrst devices
specify how many
for all movement
filemarks should be
operations
skipped
The –f and –t
options specify the
tape device Use fsf or bsf
commands to move the
tape forward or
backward a specified
number of filemarks
• rewind: enables you to rewind to the beginning of the first tape file on the tape.
• status: displays the current location of the tape head on the tape.
For example, here we’ve backed up the contents of four qtrees to a single tape using a non-
rewinding tape device and consecutive dump commands.
Rewind using:
– mt –f [tape device] rewind
Check head position using:
– mt –f [tape device] status
Use no-rewind tape devices (starting with ‘n’)
for tapes with multiple tape files
Remember that tape file numbering starts at
zero
• Tape movements are relative to the position of the tape head: use mt –f [tape device] status
to check the location of the tape head.
• Use no-rewind tape devices for tapes that will have multiple tape files on them.
• You can restart a restore process only if the backup consists of multiple tape files. If the
backup contains only one tape file, simply re-enter the restore command to start the recovery
from the beginning of the backup.
• The restore command can only restart full restores. It cannot restart incremental restores.
The example illustrates the process for restarting an interrupted restore operation.
The original restore command was entered and sometime during the process (while tape file #2
was in use) someone entered Ctrl-C from the console. As a result, the restore operation was
aborted, the file was closed, and the tape was ejected from the drive. To restart:
2. Enter the same restore command as the one that was interrupted with the changes
summarized above.
The new restore command restarts data recovery from the beginning of the second tape file.
Restore Operations
1. Ensure there is adequate disk space in the root of the destination volume.
2. Review the original backup command to verify level, tape device, blocking factor, and path.
Basic
BasicSteps
Steps
1.
1. Ensure adequatedisk
Ensure adequate diskspace
space
inindestination root.
destination root.
2.
2. Verify
Verifylevel,
level,tape
tapedevice,
device,
blocking
blockingfactor,
factor,and
andpath.
path.
Restoreto
Restore tooriginal
originallocation
location Restore
Restoreto
todifferent
differentlocation
location
3.Enter
3. Enterthe
therestore command.
restore command. 3.Rename
3.Renameor ormove
movefiles
filesthat
thatmight
might
be
beoverwritten.
overwritten.
4.If
4.Ifnecessary,
necessary,create
createnewnewvolume,
volume,
directory,
directory,or
orqtrees
qtreesininthe
thenew
new
location.
location.
5.Enter
5.Enterthe restorecommand
therestore command
specifying
specifyingnew
newlocation
locationpath.
path.
• D option and path name of the file or directory relative to the backed up subtree
For example, volume vol0 was backed up to two tapes as a subtree. The tape devices used were
rst0a and rst2a. You want to restore all contents of the /vol/vol0/projects directory to /vol/vol2.
Topic Review
Exercise Slide
Exercise
Administering Restores
Overview
The purpose of this exercise is to provide experience using the dump command.
Time Estimate
20 minutes
Software
• Access to the course copy of the Data ONTAP Fundamentals web based training
Start of Exercise
Step Action
1. On your local workstation, open the Data ONTAP Fundamentals web-based training
course.
6. Access the Backup and Restore module of Scenario 3, Backup, Restore, and Upgrade.
End of Exercise
NDMP
Objectives
NDMP
The Network Data Management Protocol (NDMP) is a standard protocol for controlling data
transfers between primary and secondary storage devices.
NDMP allows network backup applications to backup and restore data on a NAS file server,
without sharing the same OS or being installed on the filer itself.
This is possible because NDMP separates the data management functions from the backup and
restore operations, as shown here.
NDMP-compliant programs offer many advantages over using native dump and restore
commands alone:
• Faster operations: you can execute more parallel backup and recovery operations. Filers
support up to 100 NDMP sessions
• Visit http://now.netapp.com for details on which versions of each vendor’s software are
certified to work with a specific version of Data ONTAP.
Depending on the release version of Data ONTAP software, you can use any third-party backup
management program that supports NDMP versions 2 through 4 .
NDMP Functionality
NDMP Functionality
You can use third-party backup management programs that support NDMP to enable your
storage appliance to read from or write to the following devices:
• Tape drives, libraries, or stackers attached to the storage appliance or work station
Simple Configuration
Juke Box
NDMP - Jukebox
NDMP applications offer precise management of robotic control functions. The jukebox/tape
library has become a key technology for backups. As systems have grown in size, backups
require multiple tapes and increasing amounts of time and effort to physically manage the
process. The use of robotic hardware automates the work of locating existing tapes and switching
and loading new tapes.
Data ONTAP supports a maximum of eight concurrent backup and/or restore operations. The
maximum includes backups initiated by NDMP as well as by the filer’s dump and/or restore
command.
NDMP services generate file history data when requested by backup applications. This data is
used by backup applications to recover selected subsets of data from a backup image. Generating
and processing file history data is time-consuming and CPU-intensive for both the filer and the
backup application. If your needs are limited to disaster recovery, where the entire backup image
will be recovered, you may want to disable file history generation to reduce backup times. See
your backup application documentation to determine if it is possible to disable NDMP file
history generation.
NDMP does not support Unicode format. If you use a third-party tool to back up a storage
appliance using the Unicode directory format, the NDMP client displays the file names in the
NDMP file history database in two ways:
1. If possible, the Unicode format is replaced with the NFS character set.
2. If the Unicode format cannot be replaced with the NFS character set, the NDMP client
displays the file names as :XXXXXXX, where XXXXXXX is a character string.
Note: Because NDMP uses the restore command to recover files, you can use NDMP to
restore files with correct file names regardless of how the client displays the file names in the
NDMP file history database.
Several NDMP-related security issues have been addressed in the latest release of Data ONTAP
software, such as password protection, access control, authentication, and connection event
tracking. New security features include:
1. New command to enable non-root users to obtain NDMP passwords (ndmpd password
[user name])
You can use NDMP services across a WAN link. However, because there is no mechanism for
bandwidth control inside the NDMP protocol, backup and restore operations could significantly
slow traffic on the WAN line. Incremental backups and selective restores may not cause a
problem, but full backup and restore operations on WAN links are not recommended.
Transition Slide
Managing
NDMP
Functions
ndmpd [on|off]
ndmpd password [user_name]
ndmpd status [session #]
ndmpd probe [session #]
ndmpd kill [session #]
ndmpd version [maxversion]
Example Result
ndmpd on Enables NDMP services.
ndmpd kill 4 Terminates the NDMP session #4 (if the session is not
responding).
FilerView
FilerView
FilerView can be used to manage NDMP functions and services.
Example Result
options ndmpd.enable on Enables NDMP services.
options ndmpd.access host=10.56.10.113 Restricts access to NDMP operations to:
options ndmpd.access ‘if=e0,e8’ • the IP address 10.56.10.113
options ndmpd.access host=filer3 • the interfaces e0 and e8
options ndmpd.access ‘host=filer3 and • the hostname, filer3
if=e8’
options ndmpd.preferred_interface e0 Specifies e0 as the preferred network
interface to be used when establishing an
NDMP data connection to another storage
appliance.
options ndmpd.connectlog.enabled on Enables the optional audit log to track
NDMP connection events for security
purposes.
options ndmpd.authtype Specifies the acceptable authentication
challenge,plaintext methods challenge and plaintext for the
storage appliance.
Transition Slide
Using the
ndmpcopy
Command
Features Limitations
– Local and remote copies – Cannot copy individual files
– Full and incremental – Incremental limited to
transfers maximum of two levels
– Transfer of full or partial – Works only with NetApp
volumes, qtrees, or filers
directories
– Supports data migration
between all releases of Data
ONTAP (NDMP v3 and above)
– Auto-negotiates between
filers to use highest common
NDMP version
The ndmpcopy command can be executed locally or remotely and supports both full and
incremental transfers. You can transfer full or partial volumes, qtrees, or directories.
In addition, you can migrate data between storage appliances at different ONTAP release levels
(providing the storage appliances support NDMP v3 or above and the command is issued from a
storage appliance supporting v4).
Since ndmpcopy is an NDMP application, not an NDMP server, it can be executed from the
command line of the source storage appliance, the destination storage appliance, or a storage
appliance that is neither the source nor the destination of the data transfer. You can also execute
ndmpcopy on a single storage appliance that is both the source and the destination.
Command Syntax
To create an ndmpcopy command you enter the command, followed by options and their
arguments, followed by the source storage appliance and path, followed by the destination
storage appliance and path.
[-sa <username>:<password>]
[-da <username>:<password>]
source/destination filer authentication
[-st { text | md5 }]
[-dt { text | md5 }]
source/destination filer authentication type
default is md5
[-l { 0 | 1 | 2 }] incremental level default is 0
[-d] debug mode
[-f] force flag, to copy system files
[-h] display this message
Example Result
Option Description
-sa (source storage appliance Specifies authorized access to the source storage appliance.
authentication) Takes username:password as argument.
-da (destination storage Specifies authorized access to the destination storage
appliance authentication) appliance. Takes username:password as argument.
-st (source storage appliance Specifies authentication type used by the source storage
authentication type) appliance when processing the ndmpcopy request. Takes
one of two arguments: text or md5. The md5 argument
encrypts the passwords so clear-text passwords cannot be
intercepted over the network.
-dt (destination storage Specifies authentication type used by the destination storage
appliance authentication type) appliance when processing the ndmpcopy request.
–l (incremental level) Specifies the backup level of the data to be transferred.
Valid levels: 0, 1, 2. If no level is specified, the default is 0
(full backup).
–d (debug mode) Specifies that debug log messages should be generated. Log
files appear in the root volume /etc/log directory. Log file
names are in the form: ndmpcopy.yyyymmdd.
–f (forced mode) Specifies that the system files in the /etc directory on the
root volume should be overwritten. Default is to preserve
the files in /etc directory.
Topic Review
What is NDMP?
What types of tape devices can be used with
NDMP?
What is the command to check NDMP status?
What are some limitations of ndmpcopy?
What is the syntax of the ndmpcopy
command?
Exercise Slide
Exercise
NDMP
• Test NDMP
• Use the ndmpcopy command to copy the contents of qtrees and volumes
Exercise Overview
The purpose of this lab is to provide hands-on practice performing the tasks required to turn on
the NDMP daemon, verify NDMP is running, and view and terminate NDMP sessions.
Time Estimate
15 minutes
Start of Exercise
Turn on NDMP and check NDMP status.
Step Action
1. Access the filer console. Type ndmpd status. What happened?
Note: If you are going to use NDMP, it is recommended that you add ndmpd on to
the /etc/rc file, or, turn NDMP on using the options command
Step Action
1. From a Windows or Unix host, telnet to port 10000 on your filer.
or
Step Action
1. Make sure you are connected to the filer via telnet to port 10000. If you are not, repeat
step 2 of the previous exercise.
2. Access the filer console, and, while the telnet session is still active type
What happened?
4. On the filer console, type the following to kill the NDMP session.
5. What happened?
For this section, you may use either the command line or FilerView.
Step Action
1. Create a qtree named tree1 on vol0 with a mixed security style.
Hint: From the Adminhost mount point in the tree1 directory, enter
# mkfile 5m foo
4. What happened?
Step Action
1. Select a partner to copy to.
2. Copy tree1 to your partner filer with the following command:
filer>ndmpcopy –da root:password
sourcefiler:/vol/vol0/tree1
destinationfiler:/vol/vol0/copy
3. On the destination filer, type qtree and note that a qtree named copy was created on
vol0.
End of Exercise
Objectives
Snapshots
• Aggregate to Aggregate
The command must be issued from either the source or the destination storage appliance. You
cannot initiate the copy operation from a third storage appliance.
Migrating Data
Ensuring High Availability of Data
Managing Disks and Volumes
Creating an identical volume copy or aggregate copy guarantees access to the data even when:
A network client process accidentally deletes a large number of files on the source storage
appliance. Clients can continue to have access to the files as you work to restore the files to the
source storage appliance.
There is a natural disaster and the source storage appliance becomes unusable. You can put the
destination storage appliance online to continue file service.
Splitting a volume. Using the vol copy command you can copy the contents of vol0 to vol1
and then delete portions of the duplicated files and directories in each volume so that the original
contents of vol0 are split into two volumes.
Expanding storage appliance storage. If you had eight 18-GB disks for vol0 and four 36-
GB spare disks, you could use vol copy or aggr copy to migrate vol0 to the four larger
disks. You might then replace the 18-GB disks with larger ones. One advantage of using aggr
copy is if the aggregate being copied contains ten Flexible volumes you could migrate all ten
Flexible volumes to the new aggregate with one command. The aggr copy command transfers
everything within the aggregate and treats the aggregate as one object regardless of the number
of Flexible volumes contained within it.
The vol copy command is faster. A volume copy operation copies data block for block
directly from the disks. This is much faster than methods where the storage appliance traverses
directories in the volume.
Snapshot data is preserved. The volume copy process saves the source volume Snapshot data,
which can then be used to recover deleted files.
Multiprotocol security is preserved. All Windows Access Control Lists (ACL) and security
information is copied.
The aggr copy command will transfer all Flexible volumes in the aggregate. When copying
single Flexible volumes or traditional volumes using vol copy you may only have two copies
going at once. When copying the aggregate you are able to copy all the Flexible volumes within
the aggregate (bulk copy).
One Consideration…
If you have disk fragmentation, do not use vol copy or aggr copy commands. The block-
by-block copy process will transfer the fragmentation to the new volume or aggregate. Use
ndmpcopy instead of vol copy, or use reallocate before the vol copy.
The aggr copy command syntax and options are identical to the vol copy command.
Option Description
-s Specifies a specific Snapshot to be copied from the source to the
destination volume or aggregate. You must enter it followed by
the name of an existing Snapshot. This copies the blocks
represented in the Snapshot. The destination volume or
aggregate will look like the source at the time the Snapshot was
taken.
-S Specifies that all Snapshots be copied from the source to the
destination volume or aggregate. This is a “full” copy.
None (Null) Indicates that only the Snapshot created when the volume or
aggregate copy operation was initiated (the current AFS) is
copied to the destination volume.
Preparing for a
Transition Slide
Volume Copy or
Aggregate Copy
Operation
Status
The source volume or aggregate must be online and the destination volume or aggregate must be
restricted. Because root volumes or root aggregates cannot be offline, the destination volume or
aggregate cannot be a root volume or root aggregate.
The vol copy command will not automatically create a volume if it doesn’t already exist. The
storage appliance will return the following error message:
NetApp10>vol copy start vol0 vol2
Capacity
The usable disk space of the destination volume or aggregate must be equal to or larger than the
source volume or aggregate. Trying to copy a volume to a smaller volume results in an error
message:
VOLCOPY: volcopy restore:volume is too small, aborting
Networking
Each storage appliance must be defined as a trusted host of the other storage appliance. In other
words, each storage appliance’s /etc/hosts.equiv file must contain the other storage appliance’s
host name or IP address. If the source storage appliance does not have permission to copy to the
destination storage appliance, you may receive the following error message:
Permission denied.VOLCOPY: Could not connect to filer NetApp20Volume
Copy operations will flood the network connection between storage appliances with large
amounts of data. To avoid negative impact on your network traffic, you should set up a private
network connection between source and destination storage appliances.
Access Protocol
The Remote Shell program must be enabled. This is important because once the volume copy
operation is in progress, the console prompt on both the source and destination storage
appliances will not be available. To view the operation status, you will need remote access from
another machine. If rsh access is not enabled when a local volume copy is attempted, the result
is an error message similar to the following:
Write: setting up STDERR broken pipe Popup for Data:
Data
If the destination volume or aggregate is not a new file system, make sure that it does not contain
data you might need in the future. The volume copy and aggregate copy operation overwrites all
data in the active file system and in the Snapshots of the destination volume or aggregate.
Which is the root volume or aggregate? It cannot be the destination volume or aggregate.
Is access to the destination volume or aggregate restricted? It must be restricted before copying
begins.
Note: The status column indicates whether a volume is online, offline, or restricted.
Is there room on the destination volume or aggregate for the source data?
How large (in blocks) is the source aggregate aggr3 and the destination aggr4?
Transition SlideManaging
Volume and
Aggregate
Copy
Operations
Depending on the amount of data being copied, these processes can continue from several
minutes to many hours. Data ONTAP provides commands for viewing status, controlling speed,
and terminating the processes while they are in progress.
Example Result
vol copy status 0 Displays the status of volume copy operation #0.
vol copy abort 1 Stops volume copy operation #1.
options vol.copy.throttle Displays current speed setting for the
vol.copy.throttle option.
vol copy throttle 1 5 During volume copy operation #1. Sets the
vol.copy.throttle speed to 5 (medium).
aggr copy status 0 Displays the status of aggregate copy operation #0.
aggr copy abort 1 Stops aggregate copy operation #1.
aggr copy throttle 1 5 During aggregate copy operation #1. Sets the
aggr.copy.throttle speed to 5 (medium).
Topic Review
Exercise Slide
Exercise
vol copy
Overview
The purpose of this lab is to provide hands-on practice performing the tasks required to prepare a
filer to run volume copy operations.
Time Estimate
15 minutes
Start of Exercise
Preparing for a Volume Copy Operation
At the beginning of this exercise, the instructor will assign each filer a partner. You will use the
vol copy command to copy data to your partner's filer.
Step Action
options rsh.enable on
This will ensure Remote Shell access is enabled. If RSH is disabled, and you execute
this command from a workstation, vol copy will fail.
2. Add the following entry to the /etc/hosts.equiv file for both filers:
3. Add the following line to the /etc/hosts file for both filers.
filerx ipaddress
Where filerx is the hostname of your partner's filer and ipaddress is the IP
address of your partner's filer.
Note: This step is not required if your filer is able to resolve your partner filer's IP
address using DNS.
Where snapshotname is the name of the Snapshot you just created and filerX is the
name of your partner's filer.
9. Export and mount or share and map to the root of copyvol and verify the data on your
partner's filer was copied to your filer.
End of Exercise
Objectives
Transition Slide
Normal and Advanced
Privilege Commands
Option settings
The commands set arguments and are available from the options command. Typing
options at the command line prompt displays the option settings.
Some commands are simple; some use arguments; some perform an obvious function, such as
backup, ping, or help. Typing help <command name> on the command line displays a brief
description of the command. Typing the command alone on the command line displays the full
syntax of the command and any arguments it takes.
Advanced privilege commands are accessed by using the priv set advanced command.
This changes the command line prompt by inserting an asterisk (*) in the prompt when advanced
privileges are enabled.
To return to basic administration mode, type the priv set admin command. There are
additional administration commands that are considered advanced but are also available from the
basic administration mode. They are hidden however and do not appear when help is typed
from the basic administration mode. Three of those commands are:
Example Result
rdfile /etc/exports displays the contents of the /etc/exports file
wrfile /etc/exports creates or overwrites the contents of the
/etc/exports file
mv /etc/exports /etc/exports.old move /etc/exports file to /etc/exports.old
file
Exercise
Exercises
Perform the exercises “Functions of Common Commands” and “Using Common Commands”.
Let your instructor know when you complete the exercises.
Transition Slide
statit Commands
The output from statit displays statistics relative to almost all functions of the storage
appliance. It can be used when the storage appliance is suspected of poor performance.
The statit command is an advanced privilege command so you must change to advanced
privilege mode before issuing the command. Return to normal admin privilege mode when
reporting is complete.
Command: statit
Example Function
statit Displays the syntax for the command.
Obtaining Statistics
Obtaining Statistics
Statit output
slu2-f2*> statit -b
slu2-f2*> statit -e -n
Hostname: slu2-f2 ID: 0033604816 Memory: 3072 MB
NetApp Release 6.5: Tue Jan 6 00:49:17 PST 2004
<3O>
Start time: Fri Apr 2 13:36:26 PST 2004
CPU Statistics
3.523732 time (seconds) 100 %
0.045492 system time 1 %
0.010523 rupt time 0 % (7258 rupts x 1 usec/rupt)
0.034969 non-rupt system time 1 %
7.001972 idle time 199 %
The next few pages contain the report output for the storage appliance.
NetApp*> statit -b
NetApp *> statit -e -n
CPU Statistics
3.523732 time (seconds) 100 %
0.045492 system time 1 %
0.010523 rupt time 0 % (7258 rupts x 1 usec/rupt)
0.034969 non-rupt system time 1 %
7.001972 idle time 199 %
Aggregate statistics:
Minimum 0 0.00 0.00 0.00 0.00 0.00
0.00
Mean 1 0.28 0.00 0.28 0.00 0.00
0.00
Maximum 5 3.69 0.57 3.12 0.00 0.00
0.00
<report edited>
UDP:
calls badcalls nullrecv badlen xdrcall
0 0 0 0 0
Server nfs:
calls badcalls
0 0
CPU Statistics
Statistic Interpretation
Shows the percentage of time the CPU was
275.044317 system time 54 %:
busy.
Multiprocessor Statistics
CSMP Domain
Miscellaneous Statistics
• Context switches
• NFS, CIFS, and HTTP operations
• Network KB transmitted and received
• Disk KB read and written
• NVRAM KB written
• WAFL bufs to clients
• FCP and iSCSI operations
WAFL Rates
RAID Statistics
Disk Statistics
Beginning with the fourth column of data, the report uses hyphens in the column headings to
group related information; for example, user reads and the associated chain and round-trip time
are linked in the heading ureads--chain--writes.
Column Content
Column 1 (disk) Indicates the drives for which the statistics were collected.
Column 2 (ut%) Shows the drive utilization, that is, the percent of elapsed time
that the driver had a request outstanding.
Column 3 (xfers) Shows the number of transfers, that is, reads and writes per
second. Most drives are capable of 50 100 IOPS.
Columns 4-6 Ureads shows the number of reads per second performed to
(ureads--chain—usecs) satisfy user requests for data.
Columns 7-9 Writes displays the number of write operations performed per
(writes--chain—usecs) second.
Exercise
Exercise
Using the statit Command
Perform the exercise “Using the statit Command”. Let your instructor know when you
complete the exercise.
Transition Slide
Accessing and Modifying
Options Settings
To preview the options commands, enter options at the command line prompt to see a list of
most available options. Enter options <optionname> to see the current value for a particular
option. Detailed descriptions of all options are in the Command Reference Manual, which can be
downloaded from on the NOW site.
Exercise
Exercise
Accessing and Modifying options Settings
Perform the exercise “Accessing and Modifying options Settings”. Let your instructor know
when you complete the exercise.
Transition Slide
Accessing and Executing
Special Boot Commands
NetApp1> reboot
Selection (1-5)?
(2) Boot without /etc/rc. This does a normal boot, but bypasses execution of the etc/rc
file. Following this, the system is running normally, but
without the configuration normally provided to it in the etc/rc
file and system daemons. The commands in the etc/rc file can
be typed manually to bring the system fully operational.
(4) Initialize all disks. This command zeroes all the disks of the storage appliance,
and re-enters the setup menu. It is typically used only once, at
(4a)Same as option 4, but create system reinstallation time. This option asks you to confirm its
a flexible root volume. use; once confirmed, there is no way to retrieve data
previously on the disks. Zeroing the disks may take time
(sometimes hours), depending on how many disks there are,
whether they need to be zeroed or not, and what capacity each
has.
Do not use this option unless you are positive that you want to
initialize your disks.
(5) Maintenance mode boot. This enters a mode of the system in which a small subset of
commands is available, and is usually employed to diagnose
hardware (often disk-related) problems. In maintenance mode,
WAFL volumes are recognized but are not used, the /etc/rc
file is not interpreted, and few system services are started.
NFS and CIFS cannot be used. Disk reconstructions do not
occur. No file system upgrade occurs, even if the system is
newer than the OS release previously installed.
NetApp> halt
Note: Depending on the filer hardware and software the screen may look different.
CFE> printenv
CFE> bye
CFE version 1.2.0 based on Broadcom CFE: 1.0.35
Copyright (C) 2000,2001,2002,2003 Broadcom Corporation.
Portions Copyright (C) 2002,2003 Network Appliance Corporation.
Selection (1-5)? 1
Wed Apr 7 20:52:50 GMT [fmmbx_instanceWorke:info]: Disk 0b.18 is a
primary mailbox disk
.
.
.
NetApp>
NetApp> halt
Command Function
(22/7) Print this secret list. Allows you to review the whole list of secret
boot commands.
(25/7) Boot w/ disk labels Used when a consistency point was interrupted
forced to clean. during a shutdown while in degraded mode.
This command dumps NVRAM and cleans the
disk labels. Clean signifies that data on disks
match the parity on the parity disk. Up to ten
seconds of NVRAM will be lost when this
command is executed.
(30/7) Edit disk labels. Allows you to edit the disk labels. Do NOT
use this command without proper
understanding of the label structure and
guidance from NetApp.
Exercise
Exercise
Special Boot Commands
Perform the exercise “Special Boot Commands”. Let your instructor know when you complete
the exercise.
Transition Slide
Using the Command
Reference
• Commands, listing most of the commands available for use on a storage appliance
• Special Files, containing a single reference on the storage appliance tape interface
• File Formats and Conventions, containing detailed information on the system files, logs,
databases, and mappings
• System Management and Services, containing in-depth information on protocols, daemons,
and services
Manual pages can also be viewed from the FilerView main navigational page or displayed at the
filer command line.
Topic Review
Topic Review
Topic Review
Exercise
Exercises
Using the Command Reference Manual
Perform the exercise “Using the Command Reference Manual”. Let your instructor know when
the exercise is complete.
Time Estimate
20 minutes
Start of Exercise
Match the Command to its Function. When you complete this exercise, continue on to the next
exercise.
End of Exercise
Objective
When you have completed this module, you will be able to do the following
Time Estimate
10 minutes
Start of Exercise
Log on to the storage appliance and enter the following commands
Step Action
2. Type ifconfig to see required syntax that is returned to use the command.
5. Stop, and let your instructor know that you have completed this exercise.
End of Exercise
Exercise Overview
This exercise creates a report of the storage appliance’s performance.
Time Estimate
10 minutes
Start of Exercise
Log on to the storage appliance and perform the following steps.
Step Action
3. Using your Unix or Windows host, copy the contents of the directory disk_fw on
/vol/vol0/etc/ to vol1.
4. Wait approximately 30 seconds and type the appropriate command to stop data
gathering for statit.
5. Review the report results, then type in the appropriate command to return to normal
administrative mode.
What disks on vol0 were showing read activity?
6. Stop, and let your instructor know that you have completed this exercise.
End of Exercise
Exercise Overview
This exercise uses the command line to view the man page for options.
Time Estimate
15 minutes
Start of Exercise
Step Action
> options
2. Look up the following sub-commands for options in the table below and briefly write
down the definitions and possible setting for each
autosupport.support.transport
cifs.max_mpx
cifs.netbios_over_tcp.enable
dns.domainname
dns.enable
httpd.rootdir
raid.timeout
rsh.access
timed.sched
wafl.default_security_style
End of Exercise
Time Estimate
15 minutes
Start of Exercise
Step Action
2. Type reboot
Type ^c when the following message appears:
Press CTRL-C for special boot menu
................................
Selection (1-5)?
Type 1 to have the system complete a normal boot
5. Once the storage appliance halts type the following command and view the results.
> printenv
Scan the output for an entry for floppy-boot?. There should either be no entry at
all, or it should have a variable of false
6. Change the action taken during a boot by typing in the following command.
> setenv floppy-boot? true
Verify the change by typing in the following command.
> printenv
7. Now enter bye to boot the system and watch it go to the special boot menu without
using ^c as you had to do in Step 2.
9. Now, halt the system and re-set the action taken during a boot by typing in the
following command.
> unsetenv floppy-boot?
11. Now enter bye to boot the system and watch it boot normally without displaying the
special boot menu.
12. Stop, and let your instructor know that you have completed this exercise.
End of Exercise
Time Estimate
15 minutes
Start of Exercise
Step Action
1. On your local workstation open an Internet Explorer session and enter the following
URL
http//NOW.NetApp.com
2. Log on to the NOW site using your user-id or a temporary user-id supplied to you by
your instructor.
3. Navigate to and locate the most current Command Reference Manual on the NOW
site. Open the HTML or PDF version of the manual to perform the following tasks
and answer the associated questions
4. Locate information about the cifs setup command and answer the following
question.
What is the function of the cifs setup command?
5. Locate information about the netdiag command and answer the following
question.
What is the purpose of the –b option when used with the netdiag command
6. Locate information about the rc file and answer the following question.
What is the function of the rc file?
7. Stop, and let your instructor know that you have completed this exercise.
End of Exercise
Objectives
This module provides information about commands, procedures, and features you can use to
check the health and performance of your storage appliance. While this module focuses
specifically on storage appliances, much of the information is applicable to any system running
Data ONTAP.
Check or monitor:
Hardware components
Software versions
Connectivity issues (MAC, TCP/IP, protocols)
Performance measures
Command: sysconfig
Command Function
sysconfig Provides a brief summary.(Runs automatically with “setup.”
sysconfig –a Displays very detailed information about each I/O device.
• Is memory correct?
sysstat 1
The statistics displayed by this command should help to answer questions such as:
1. Point your browser to the storage appliance’s address to access FilerView. Select the Filer
Node and then open Show System Status.
2. Select the number of iterations (rows) in the report and how frequently the statistics should
be captured.
Note: The Summary shows minimum, average, and maximum values for each column. This
additional statistical analysis is useful for establishing performance baselines.
1. Point your browser to the storage appliance’s address to access FilerView. Select the Real
Time Status Node and then open Filer At-A-Glance.
2. Select the refresh rate from the drop down menu. Here, the default is every 10 seconds.
The graphs provide a visual illustration of Network file operations and CPU performance. You
can get more detail by clicking on a graph.
options
Enter the options command to view a list of the current settings for the storage appliance. Use
the vol options volume_name command to display volume-specific settings.
CPU-Related Options
Example Result
options The amount of CPU used determines the speed
raid.reconstruct.perf_impact of RAID reconstruction. If storage appliance
medium performance during reconstruction is more
important, you can adjust this option setting
down. If the speed of reconstruction is more
important, adjust the setting up. This option
also controls CPU utilization for the disk scrub
function.
Checking Memory
sysconfig -v
sysstat 1
Checking Memory
To verify that the memory displayed is the right amount for the storage appliance, use
sysconfig –v . This command displays the size of the system and NVRAM memory.
Cache: The Cache column displays the RAM cache age. The number represents how many
minutes the oldest data has been in cache. A low cache age means that the storage appliance is
retrieving information from the disk, instead of from memory. If the values in this column were
consistently below five, it would be beneficial to upgrade to a storage appliance with more
RAM.
sysconfig -v
Checking Cards
To verify the cards installed on the PCI bus, type sysconfig –v and review the items that are
installed in each slot. The output provides slot number and a description of the hardware in that
slot. One by one, verify that all cards are where they should be.
At boot time or when you use the sysconfig –c command, you might see messages that
expansion cards must be in certain slots. To improve performance, follow these
recommendations.
Note: The System Configuration Guide on http://now.netapp.com is a very useful reference for
determining whether cards are installed in the correct supported configuration.
Exercise
Exercise
Check System Status and CPU Performance
Check and record the number of SCSI ports and fiber loops that are being used.
Enter the scsi test [device_name] command to issue a “test unit ready cdb” to
the drive. Drives that are up and ready will reply with a good status. Drives that are in the
process of getting ready, or are spun down, may generate a check condition and return
sense data about their current state.
If there are bad spots on a disk, they will usually be part of the RAID scrubbing log. It
could mean that the disk or controller is having problems.
rdfile /etc/messages
• Use the Syslog Translator feature on the NOW site to interpret the messages
1. Point your browser to the storage appliance’s address to access FilerView. Select the Filer
node and then open Syslog Messages.
2. Scroll through the messages for the date and time of concern to see if any error messages
have been logged that might point to possible problems.
3. Select a message and it will open the Syslog Translator on the NOW site and provide a more
thorough explanation of the Syslog messages that appear on the console of your NetApp
appliance
shelfchk
yes
yes
led_on 7b.16
led_off 7b.16
priv set admin
1. Set command privileges to advanced (you must enter the advanced mode to use these
commands).
2. Turn on the LEDs for a specific disk. Enter led_on and the device name.
3. Go and physically locate the disk on the shelf and verify that the LEDs are lit.
4. Turn off the LEDs for the device. Enter led_off [device name].
5. Return command privileges back to basic administration mode. Enter priv set admin.
vol status -v
sysstat –u 1
1. Point your browser to the storage appliance’s address to access FilerView. Select the
Volumes node and then Manage.
sysconfig -r
sysconfig -r
• Enter sysconfig –r and find the section reporting broken disks. Note the device number
of any failed disks --in this case 3.12.
• Disks that are marked as “failed” can be returned to the system as spares by using the disk
unfail command. Do this only with disks that you know are good.
• Check sysconfig -r again to verify the disk has been returned as a spare.
disk shm_stats
This advanced command reads information updated by the SHM every 10 seconds. You can
view current status for all disks or for individual disks at any time.
• Physically inspect the main chassis power: a fan should be blowing on the main power
supply; the CPU fan should also be spinning.
• Check the voltage levels for the NVRAM card batteries: enter the sysconfig –v
command and locate the section showing the NVRAM slot—battery condition is indicated
there.
• Test the LEDs: LEDs should be lit that indicate correct power to the shelves. While in
advanced command mode, enter the shelfchk command and observe the LEDs. When
prompted, verify that the LEDs are lit.
Exercise
Exercise
Checking Software
Checking Software
Performance problems can crop up if you have the wrong or different versions of software and
firmware installed and if you lack the proper licenses for software. If you are not sure of the
storage appliance’s status regarding these characteristics, you may need to perform the tasks
above.
NetApp1> sysconfig -v
NetApp Release 6.5R2: Tue Mar 16 13:53:42 PST 2004
System ID: 0084166726 (NetApp1)
System Serial Number: 3003908 (NetApp1)
slot 0: System Board 599 MHz (TSANTSA D0)
Model Name: FAS250
Part Number: 110-00016
Revision: D0
Serial Number: 280646
Firmware release: CFE 1.2.0
Processors: 2
Processor revision: B2
Processor type: 1250
license
Memory Size: 510 MB
NVMEM Size: 64 MB of Main Memory Used
NetApp1> version
NetApp Release 6.5R2: Tue Mar 16 13:53:42 PST 2004
Check Firmware Version: There are two primary ways of checking the firmware version: one
is by using sysconfig –v; the other is by halting the storage appliance and typing version
from the OK prompt. Make sure the firmware version on your system is what it should be, and
make sure that you have the most current version of the firmware for your platform.
Check License Status: Use the license command to verify that all licenses are listed for
your storage appliance. The licenses that are displayed in the autosupport log are encrypted
versions of the actual licenses. If not all authorized licenses are displayed by this command,
contact Network Appliance.
Note: You can also access the license information through FilerView. Under the Filer node,
select Manage Licenses.
Example Result
ifconfig -a Does a real-time check on interface UP status, the MTU size,
and Ethernet address of all interfaces. Make sure these values
ifconfig e1 are what they are supposed to be for each interface.
rdfile /etc/messages Displays the messages file to see if the storage appliance has
logged any MAC-related messages, For example, if a duplicate
Example Result
MAC address appears on the network, a message will be
logged. You can also use FilerView to view the syslog
messages.
arp This command set allows you to display the contents of the
address resolution table (hostname/IPaddress) so they can be
modified. They may also help identify duplicate MAC
addresses.
arp -d Deletes or flushes a bad MAC address from the ARP table.
Example Result
rdfile /etc/rc View the /etc/rc file for the host IP. Look at the ifconfig
rdfile /etc/hosts statements in the /etc/rc file. Do they specify an IP address or do
they reference a host listed in the /etc/hosts files? If they
reference a host, review the /etc/hosts file to verify the correct IP
address for the host. Does everything match up? Are there any
redundant or incorrect entries in the host’s file?
ifconfig -a Reissue the ifconfig -a command and make sure that the
IP addresses are correct for each interface.
ping Test TCP/IP connectivity by pinging the storage appliance, first
by its hostname and then by its IP address, from an external
client.
arp Issue the arp -a command to review the ARP tables on the
storage appliance. Perform a sanity check on all entries. Are any
of them incorrect? Do all IP addresses have the correct Ethernet
addresses, etc.?
Example Result
netstat –r Issue a netstat -r command to verify that all gateways are
set correctly.
Command Purpose
nfsstat View the output of nfsstat from the storage
appliance and the client. Look for bad calls or client
nfsstat -l mis-configuration. For example, if all clients are using
NFS version 3, and version 3 is not enabled, there will
be performance problems.
nfs.per_client.stats.enable
Use nfsstat –l to display usage per client (if the
NFS statistics per client option is on). Using
nfsstat -l can show you how evenly (or
unevenly) dispersed the NFS traffic is.
Command Purpose
counts and percentages of all CIFS operations as well
as a number of internal statistics that may be of use
when diagnosing performance and other problems.
Exercise
Exercise
Measuring Performance
Optimum
Performance
Measuring Performance
Monitoring and adjusting the components of a data system must be done in tandem with ongoing
measurements of system performance. Results from such measurements tell you if your efforts
have been successful and where you should focus more attention and resources to improve
performance. This section describes tools to use to measure the performance of NFS and CIFS
operations so you can identify where latencies occur and track data throughput.
Terminology
Latency: the interval of time one component in a system waits for another component. Examples
include the time it takes to locate the proper sector of a disk under a read/write head; the time
between successive accesses to a memory chip; and, the time it takes for a packet to travel from
source to destination on a network. It all adds up to wasted time.
Throughput: the amount of data processed or transferred (without loss) in a given time interval.
Also called data transfer rate. The throughputs of disk drives and networks are measured in bits
per second (Kbps, Mbps, Gbps). In a complex system, many factors can affect throughput.
You can use the sysstat and nfsstat commands to measure NFS performance.
• Enter the sysstat 1 command to display real-time NFS operations every second on your
console (or view the output using FilerView).
• On Solaris NFS clients, you can run nfsstat -m to focus the output on response time
related counters.
Use nfsstat -m to display average (mean) response times since the statistics were
reset.
• Enter the sysstat 1 command to display CIFS operations per second on the console (or
use FilerView).
Performing a
Warm Reboot
AAwarm-reboot
warm-rebootoccurs
occursunder
underthe
the AAcold-reboot
cold-rebootoccurs
occursunder
underthe
thefollowing
following
following
followingconditions:
conditions: conditions:
conditions:
rebootcommand
•• reboot commandisisexecuted
executed •• power
powerisiscycled
cycled
•• aapanic
panicoccurs
occursininsoftware
software •• aapanic
panicoccurs
occursduring
duringthe
theboot
bootprocess
process
•• error
error occurs duringinterrupt
occurs during interrupthandling
handling •• system halt command is executed
system halt command is executed
•• instruction
instructionfault
faultoccurs
occurs
Starting with the Data ONTAP 6.0 release, a warm-reboot operation is available that greatly
reduces the reboot time on the storage appliance. Whether the system undergoes a warm reboot
or a cold reboot depends on conditions such as those listed above.
Command Options:
reboot –d halt_string
reboot –t minutes
Example Result
reboot -d installed Data Dumps system core before rebooting. The halt string
ONTAP on test1 server should indicate the reason why the system was rebooted.
Using the reboot command logs a message describing the reason for the system halt. Display
the /etc/messages file to view these messages.
Obtaining Autosupport
Information
Using Autosupport
Autosupport Listing
What is it?
– Comprehensive status and configuration report
Where does the data come from?
– Compilation of results from system commands
(such as sysconfig, statit, etc.)
How do you get an Autosupport listing?
– Sent automatically via email to either Netapp or
address you specify
AutoSupport Contents
This chart lists most of the console commands whose output appears in the Autosupport report.
Exercise
Exercise
Factors to Consider
– Traditional Volumes
• Single file system with a single or dual parity
disks
• File system can be expanded with the addition of
new disks
– Additional Considerations for Flexible Volumes
• Can be as small as 20Mb
• Can be increased or decreased in size
• Can be cloned
Traditional Volumes
A file system has either single or dual parity disks for raid data protection. Dual parity is the
more protective of the two but requires an additional disk. The file system on a traditional
volume can be increased by adding additional physical disks to the volume.
Note the Summary lines showing minimum, average, and maximum values for each column.
This additional statistical analysis is useful for establishing performance baselines.
• xfers is the number of data-transfer commands issued per second. (xfers = ureads +
writes + cpreads + greads + gwrites chain is the average number of 4K blocks per
command).
cp_from_timer
cp_from_timer == 1202
1202 cp_from_timer
cp_from_timer == 202
202
cp_from_log_full
cp_from_log_full == 81
81 cp_from_log_full
cp_from_log_full == 1300
1300
cp_from_cp
cp_from_cp == 00 cp_from_cp
cp_from_cp == 3327
3327
A B
2. At the beginning of that time period, run wafl_susp –z to clear statistics. (This is an
advanced command.)
3. At the end of the period, run wafl_susp –w to write the output to the console.
• Each RAID group belongs to only one traditional volume or aggregate (physical file
system). Each volume has its own rg0, rg1, and so on.
• When a new traditional volume or aggregate is created, a new RAID group (rg0) is
also created with one or two parity disks and at least one data disk.
• The RAID group size for traditional volumes can be increased or decreased using the
vol options volume_name raidsize option. The RAID group size for
aggregates is increased or decreased using the aggr options command
• Adding RAID groups increases the Mean Time To Data Loss (MTTDL).
Why Not? Unnecessarily using multiple RAID groups is a poor choice because one parity disk
is required for each RAID group and storage potential is wasted. For example, configuring two
RAID groups of 36 GB disks (when only one is needed) will waste a 36 GB investment, since a
second, underused parity disk will not be storing data.
Conclusion: Add RAID groups when required by usage; that is, when the applied load is
stressing the drives in the current array.
Why Not? Using mixed disk sizes is a poor choice because it impacts write performance. The
primary issue is variable stripe widths. WAFL writes to all data disks without regard to RAID
group boundaries, using volume-wide stripes. A volume or aggregate with many small disks and
few large disks has two (or more, depending on the mixture of disk sizes) stripe regions with
different characteristics. As WAFL moves through the disk block numbers in sequential order,
performance may be reduced because most of the disks are not used. For example, if there are
many 18Gb drives and a few 36Gb drives, writing in the 18Gb to 36Gb disk block number range
would slow as there would be fewer disks in which to write.
Why Not? This is not a good idea because it works against WAFL’s write allocation policy.
Suppose you have two RAID groups in a volume or aggregate: one containing 14 disks and a
new RAID group with the minimum of two disks. The single data-disk RAID group can cause
serious performance problems.
Conclusion: Ensure that each RAID group in a volume has approximately the same capacity.
Why Not? Adding a small number of new disks to a RAID group is a poor choice because it
defeats the read-ahead performance strategy. When writing a large amount of data to a single
file, WAFL attempts to write the data in clusters of 96 KB of data per disk. Because read-ahead
of up to 288 KB is performed, having at least three data disks (3x96=288) to write to maximizes
throughput on reads of large files. If the RAID group has fewer than three data disks, WAFL’s
performance increase strategy will be defeated.
Conclusion: Ensure that each RAID group in a volume or aggregate has at least three data disks.
Why Not? Usually, adding more disks is a good thing: RAID groups of 8-14 disks result in
increased performance (although, as more disks are added, performance levels off). However,
increasing the number of disks in a RAID group past this limit is counterproductive. Large RAID
groups increase the probability of a failed disk in a RAID group. In fact, doubling the number of
disks roughly quadruples the chance of a double-disk failure. Another drawback to large RAID
group configurations is the increased time required to perform administrative tasks: larger groups
require more reconstruction time should a disk fail; backup and restore operations are lengthier
with larger data sets, etc.
Conclusion: Limit the number of disks in a RAID group to the optimal recommended based on
your system and RAID type. See product documentation for current values.
Topic Review
Topic Review
Exercise Exercise
Planning a Drive
Configuration
Exercise Overview
The purpose of these exercises is to give you hands-on practice executing the tasks required to
maintain the health of your storage appliance and maximize its performance.
Time Estimate
15 minutes
Start of Exercise
Check System Status and Hardware Components
The purpose of this exercise is to become familiar with the storage appliance’s configuration and
component status.
Step Action
3. Enter sysconfig –t to find out if there is a tape drive attached to the system.
Step Action
Enter the command to check settings for options on volume vol0:
1.
vol options vol0
raid.scrub.enable
vol.copy.throttle
Enter the command to gather statistical data about CPU performance; set the interval
3.
to 2 seconds.
sysstat 2
Based on this figure, does the storage appliance need more RAM?
The purpose of this exercise is to use FilerView features to gain a quick view of current system
status and to obtain more detailed status reports.
Step Action
Check the “Filer-At-A-Glance” feature on FilerView. Point your browser to the
1.
storage appliance’s address to access FilerView:
http://[filer’s IP address]/na_admin
Select the Real Time Status node and then open Filer-At-A-Glance.
2.
Select the refresh rate from the drop-down menu. (Default is every 10 seconds.)
3.
Next, view a system status report on FilerView. Select the Filer node and then open
4.
Show System Status.
Select the number of iterations (rows) in the report and how frequently the statistics
5.
should be captured.
End of Exercise
Exercise Overview
The purpose of these exercises is to give you hands-on practice executing the tasks required to
maintain the health of your storage appliance and maximize its performance.
Time Estimate
25 minutes
Start of Exercise
Step Action
2. Enter sysconfig –r to view a list of disk drives in their associated RAID groups.
Step Action
1. While still in advanced mode, enter the scsi test command and the device name
for the disk you chose above. For example: scsi test 0b.20
What happens?
What are some of the other tasks you might perform to check disk status? ((see page
2.
17 for answer))
Check the Syslog Messages to See if any Disk Errors have been Recorded
Step Action
Access FilerView:
1.
http://[filer’s IP address]/na_admin
Step Action
1. Enter sysconfig –v and locate the section showing the NVRAM slot. What is the
storage appliance’s battery condition?
While still in advanced mode, test the LEDs to verify that the disk shelves are
2.
receiving power. Enter: shelfchk and observe the LEDs.
End of Exercise
Exercise Overview
The purpose of these exercises is to give you hands-on practice executing the tasks required to
maintain the health of your storage appliance and maximize its performance.
Time Estimate
20 minutes
Start of Exercise
Step Action
1. Enter sysconfig command to view the basic system information including software
and firmware release numbers
Is NFS licensed?
Is CIFS licensed?
Is HTTP licensed?
Step Action
Display information about all interfaces on the storage appliance. Enter:
1.
ifconfig –a
Choose one of the interfaces and check its performance stats. Enter:
2.
ifstat [device_name]
Check if the storage appliance has logged any MAC-related messages by displaying
3.
the syslog message file. In advanced mode, enter:
rdfile /etc/messages
Check the TCP/IP connection by pinging the storage appliance from an external client.
4.
Login as the adminhost (instructor has login info) and ping the storage appliance’s IP
address.
ifstat –a
arp –a
netstat –r
nfsstat
exportfs
cifs stat
nbstat
cifs testdc
End of Exercise
Exercise Overview
The purpose of these exercises is to give you hands-on practice executing the tasks required to
maintain the health of your storage appliance and maximize its performance.
Time Estimate
20 minutes
Start of Exercise
Step Action
Enter the command to reboot the storage appliance in 2 minutes.
1.
reboot –t 2
Step Action
1. Open the Data ONTAP Fundamentals online course. Go to the Tutorial for Health and
Performance: Identifying Autosupport Information.
2. On page 2 of the topic, click on the “View a sample Autosupport link.” and use it to
answer the following questions:
Step Action
4. What is the hostname for the storage appliance this message reports on?
Step Action
Step Action
Access FilerView:
1.
http://[filer’s IP address]/na_admin
Gather Data about the System’s Disk Performance and Utilization Statistics Using
CLI
Step Action
Step Action
2. After a few minutes, run wafl_susp –w to write the output to the console.
Examine the results, what are the stats for the following three values?
3.
cp_from_timer
cp_from_log_full
cp_from_cp
End of Exercise
Exercise Overview
The purpose of these exercises is to give you hands-on practice executing the tasks required to
maintain the health of your storage appliance and maximize its performance.
Time Estimate
20 minutes
Start of Exercise
Question Answer
1. Which of the volumes would best be used only for administration?
Based on your understanding from the lecture material, answer these questions:
7. What are the recommendations regarding disk size and RAID group capacity?
End of Exercise
Objectives
http://now.netapp.com
Take a Tour
NOW PowerSearch
Answers to administrative and troubleshooting questions can be found through the NOW
PowerSearch function.
The steps to perform a NOW PowerSearch are:
1. Select the Knowledgebase Solutions and Bugs Online boxes.
4. Click GO!
Advanced Keyword Search and Search Tips can be used for assistance in selecting more specific
criteria.
Search Results
A question about a filer overheating might produce the results in the graphic above. To view
more results from the search, click on Show More…
Additional Help
Additional Help
For further assistance the NOW site provides 3 additional methods if your search does not
produce the desired results:
• Click on Submit a Support Case to open a case with NetApp that can be tracked.
Software Tools
Finding Bugs Online
Bugs Online is a resource to find answers to questions about bugs and how to solve them.
It is accessed from the main NOW site by clicking on the Bugs Online link under the Technical
Assistance & Documentation heading as shown in the graphic above.
Bugs Online provides a list of software tools on the main screen.
Release Comparison Tool
This tool lets you compare the fixes in multiple releases.
Release Metrics
This tool helps you determine which release to run by providing data calculated based on
Autosupport messages and the CD call center database.
Release Advisor
This tool looks at the bugs you are trying to fix and your current release, and suggests the best
release to fix as many as possible.
Panic Message Analyzer
This tool lets you determine if a release is available to fix a panic message error.
Syslog Translator
The Syslog Translator provides a more thorough explanation of the Syslog messages that appear
on the console of your NetApp appliance. Enter your Syslog message and results will appear for
your software and release.
Bug Notification
Any1 Anypass
[email protected]
Bug Notification
Bugs Online provides two proactive bug notification tools:
• Bug Watcher Summary allows individuals to see bugs they have placed a watch on.
• New Bug Alerts Profiler allows you to set parameters for bugs you wish to be notified about
via the contact information submitted.
Downloading Software
Downloading Software
Software can be downloaded from the NOW website by clicking on the Software Download
menu bar. The Software Download page displays a summary of information about each of the
available downloads.
Topic Review
Exercise
Exercise
• Use the Knowledgebase to find answers to administrative and trouble shooting questions
Exercise Overview
This exercise accesses the NOW site to accomplish the objectives above. You will use your
NOW user-id and password or a temporary one provided to you by the instructor. Note that the
NOW site is routinely updated and that it is possible that links have been re-titled or even moved.
The NOW site is available to all users. However, information may appear differently depending
on if you are a customer, reseller, partner or NetApp employee.
Time Estimate
20 minutes
Miscellaneous
Start of Exercise
Step Action
1. Open up Internet Explorer and log on to the NOW site. Use the URL below:
http://now.netapp.com/
2. Use the “NOW Natural Language PowerSearch” window and search for, “filer head
migration instructions”.
3. Under the heading “All Products: Product Documents” click on Filer Head
Migration Instructions. What information do you see?
Next, locate the NOW Community Forums. Hint: Look in the Technical Assistance
4.
and Documentation section.
a) f)
b) g)
c) h)
d) i)
5. Next locate “Bugs Online & Release Tools”. Under “Quick Search” enter the bug
id “23009”. What is the title for the bug id you entered?
6. Finally, in Software Downloads locate “Tools and Utilities” and answer the
following question.
What is the name of the tool that captures performance and configuration statistics.
There are versions for UNIX and for Windows and replaces STATS.?
7. Exit the NOW site and close your Internet Explorer application and let the instructor
know that you have completed the exercise.
End of Exercise
Module 4: Networking............................................................................................................. 13
Module 1: Overview
Topic Review
Topic Review
Topic Review
Topic Review
Step Action
2. Enter either help or ? at the filer prompt. What is displayed?
A complete list of available commands is displayed.
At the cmd line enter man [cmd] to see the man page or access the man pages in
FilerView.
Enter help [cmd] to see man page type information
In addition, there is a link to “Commands: Manual Page Reference” at the NOW site.
Step Action
1. Enter sysconfig. What happens?
Displays the configuration information about the filer including the Data
ONTAP(tm) version number and a separate line for each I/O device on the filer
2. Enter sysconfig –d. What happens?
Device and configuration information for each installed tape drive is displayed.
5. Enter sysconfig –v. What happens?
A message reporting errors associated with expansion cards in the appropriate slots is
displayed.
Step Action
1. Enter vol status. What happens?
The on/off state of all per-volume options and displays information about each plex
and RAID group within the volume is displayed.
Disk Space
Step Action
1. Enter df . What happens?
Displays statistics about the amount of free disk space in one or all volumes on the
filer.
Step Action
1. Enter sysstat and wait 15 seconds. What happens?
Aggregated filer performance statistics such as the current CPU utilization, the
amount of network I/O, the amount of disk I/O, and the amount of tape I/O is
displayed.
By entering sysstat 1
Step Action
2. Use the documentation to find the following information:
The filer can send Autosupport messages by SMTP, HTTP, or HTTPS (the secure
socket layer [SSL] Internet transport protocol). HTTPS is the default
Step Action
4. List three Autosupport options:
autosupport.cifs.verbose
autosupport.content
autosupport.dafs.verbose
autosupport.doit
autosupport.enable
autosupport.from
autosupport.mailhost
autosupport.minimal.subject.id
autosupport.noteto
autosupport.retry.count
autosupport.retry.interval
autosupport.support.enable
autosupport.support.proxy
autosupport.support.to
autosupport.support.transport
autosupport.support.url
autosupport.throttle
autosupport.to
5. What three Table of Contents topics are always included in the manual pages?
Name
Synopsis
Description
Step Action
5. What is the path to configure Autosupport?
FilerView>Filer>Configure Autosupport
FilerView> Volumes>Snapshots>Manage
Topic Review
Step Action
3 Enter vol status –r and view the results.
Step Action
5. If all of the slots are full, there are no hot spares, and all of the disks are assigned to
volumes, can you add a disk to a volume? What must you do?
Yes, but a new shelf must be added, but not beyone the capacity of the appliance.
Step Action
2. Enter vol add aggr1–n 2
What output was returned on the console? <Note: Your disk numbers may be
different.>
Failing a disk.
Step Action
1. At the storage appliance’s terminal, enter vol status vol1 –r or sysconfig
-r to view the disk id numbers for aggr1.
*** You are about to fail the following file system disk ***
Disk /vol1/plex0/rg0/0b.21
RAID Disk Device HA SHELF BAY CHAN Used (MB/blks) Phys (MB/blks)
4. What would happen if you failed a disk in vol1 with no hot spare available?
The volume would go into degraded mode, a hot spare should be added as soon as
possible.
5. What is the difference between the information provided by the vol status and
the sysconfig command?
If you use each command with the –r switch, the commands are basically the same.
However, if you don’t use the –r command, the outputs will be quite different.
Module 4: Networking
Topic Review
Step Action
7. Record the values below.
Interface name Answer varies
Is the interface up or down Up
IP Address Answer varies
Netmask value 255.255.255.0
Step Action
6. At the command prompt, enter vif status
What is the load balancing policy? IP
Creating a VLAN
Step Action
The command should fail because “test” is not a valid vlan id.
Step Action
5. What happened and why?
The telnet session should have ended as you are reconfiguring the onboard interface
that your telnet connection is based on.
Topic Review
Topic Review
Topic Review
Topic Review
Joining a Domain
Step Action
6. At the Storage Appliance prompt, test the cifs setup with the following
command:
Step Action
11. What is the difference when comparing the results of step 4 with the results of step
8?
Module 7: MultiProtocol
Topic Review
Topic Review
– Yes
Topic Review
– Yes
Topic Review
Module 9: Installation
Topic Review
Topic Review
Topic Review
Manage snapshots
Step Action
7. What times of day and which days will Snapshots be taken based on the schedule you
entered in Step 2?
8:00, 10:00 A.M. 12:00 P.M. and 2:00 P.M.
Step Action
1. Access the storage appliance console and type the following:
NetApp> df
Write the values for vol0 from the df command.
Filesystem kbytes used avail capacity Mounted on
/vol/vol0 ________ ______ _____ _____ /vol/vol0/
/vol/vol0/.snapshot________ ______ _____ _____ /vol/vol0/.snapshot
Answer varies
3. At the filer console, type the following:
NetApp> df
Write the values for vol0 from the df command.
Filesystem kbytes used avail capacity Mounted on
/vol/vol0 ________ ______ _____ _____ /vol/vol0/
/vol/vol0/.snapshot________ ______ _____ _____ /vol/vol0/.snapshot
Answer varies
Notice the differences in the output from step #1. You should have noticed an increase
in the used space on vol0. The capacity may change based on the size of the disks in
your volume.
Topic Review
Topic Review
Question Answer
1. You can modify the /etc/quotas files from either the False
command line or using the FilerView interface but you
must create the file using CLI.
2. User quotas, group quotas, and tree quotas are stored True
in the /etc/quotas file.
4. You can enter zero for a UID or GID in the Target False
field
8. When entering values in the Disk and File fields you True
can use the abbreviations G, M, or K.
9. You can leave the Threshold field blank if you want to False
track usage rather than applying a limit.
11. The values for Soft Disk and Disk must be on the True
same line in the /etc/quotas file—otherwise, Soft Disk
will be ignored.
12. The quota target for a qtree should be the qtree name. False
13. To make sense, the value in the Disk field should be False
smaller than the value in the Threshold field.
Step Action
6. When you exceeded the file quota, what message did you receive on your storage
appliance?
8. How much disk space is being used by all users on your storage appliance?
9. How many files were created on your storage appliance for qtree tree1?
Answer: 4
14. When you exceeded the quota, what message did you receive on your Windows or
UNIX client?
Answer: Yes
15. When you exceeded the file quota, what message did you receive on your storage
appliance?
Answer: Yes
Topic Review
Topic Review
Topic Review
Topic Review
What is NDMP?
– Network Data Management Protocol – the standard protocol
for controlling data transfers between primary and secondary
storage devices
What types of tape devices can be used with NDMP?
– Tape drives, libraries, or stackers
What is the command to check NDMP status?
– ndmp status [session #]
What are some limitations of ndmpcopy?
– Cannot copy individual files, increments limited to two levels,
and only works with NetApp storage appliances.
What is the syntax of the ndmpcopy command?
– ndmpcopy [options] [source] [desitnation]
Step Action
2. Type ndmpd status. What happened?
ndmpd OFF.
ndmpd ON.
Step Action
2. Telnet to port 10000 on your filer.
or
What happened?
Step Action
2. Access the filer console, and, while the telnet session is still active type
What happened?
Session: 2
Active
version: 4
5. What happened?
For this section, you may use either the command line or FilerView.
Step Action
4. What happened?
Ndmpcopy: Done
Topic Review
Topic Review
Topic Review
Topic Review
Topic Review
Topic Review
Step Action
5. Review the report results, then type in the appropriate command to return to normal
administrative mode.
Answer: All disks on vol1 should show generally the same write activity
Step Action
4. Locate information about the cifs setup command and answer the following
question.
Answer: The cifs setup command performs the initial configuration of the filer for
CIFS
5. Locate information about the netdiag command and answer the following
question.
What is the purpose of the –b option when used with the netdiag command
Answer: This option provides non-interactive usage. The command will not prompt
for user input.
6. Locate information about the rc file and answer the following question.
Topic Review
Topic Review
Topic Review
Step Action
Answer varies
Answer varies
3. Enter sysconfig –t to find out if there is a tape drive attached to the system.
Answer varies
Step Action
What are the current settings for the following options?
2.
raid.reconstruct.perf.impact
raid.scrub.enable
vol.copy.throttle
Based on this figure, does the storage appliance need more RAM?
Step Action
1. While still in advanced mode, enter the scsi test command and the device name
for the disk you chose above. For example: scsi test 0b.20
What happens?
What are some of the other tasks you might perform to check disk status?
2.
Loop and SCSI ports
Check the Syslog Messages to See if any Disk Errors have been Recorded
Step Action
Scroll down the message display to see if any error messages have been logged.
3.
Click on a message. What happens?
You will be directed to the NOW site and after login, the syslog translator will explain
the message.
Step Action
1. Enter sysconfig –v and locate the section showing the NVRAM slot. What is the
storage appliance’s battery condition?
Answer varies
While still in advanced mode, test the LEDs to verify that the disk shelves are
2.
receiving power. Enter: shelfchk and observe the LEDs.
Step Action
Is NFS licensed?
Is CIFS licensed?
Is HTTP licensed?
Step Action
Display information about all interfaces on the storage appliance. Enter:
1.
ifconfig –a.
Answer varies
Choose one of the interfaces and check its performance stats. Enter:
2.
ifstat [device_name].
Are there any stats for collisions, CRCs, or runt frames? Answer varies
exportfs To verify that directories and files are being exported as expected.
cifs stat To view cumulative statistics for all CIFS clients, including counts and
percentages of all CIFS operations as some internal statistics that may be
of use when diagnosing performance and other problems.
cifs testdc To test the connectivity between the storage appliance and domain
controllers in its NT Domain. To help diagnose CIFS-related network
problems.
Step Action
Read the message related to the reboot. What does it say?
4.
Date/time varies:
Fri Apr 30 07:54:59 PDT [mgr.boot.reason_ok:notice]: System rebooted after a reboot
command.
Step Action
4. What is the hostname for the storage appliance this message reports on?
Answer varies
Answer varies
Answer varies
Answer varies
Answer varies
Step Action
Answer varies
Step Action
Select Filer node, then select Show System Status.
2.
Answer varies
Check the utilization radio button and the Show Summary check box.
3.
Answer varies
Scroll down to see the results. Explain what the results are telling you.
4.
Answer varies
Gather Data about the System’s Disk Performance and Utilization Statistics Using
CLI
Step Action
Review the results.
2.
What percentage of the time were disks busy? Answer varies
Step Action
Examine the results, what are the stats for the following three values?
3.
cp_from_timer Answer varies
cp_from_log_full Answer varies
cp_from_cp Answer varies
Question Answer
1. Which of the volumes would best be used only for administration? (vol0)
4. Which volume/RAID group contains the default number of disks (vol0, rg0)
assigned when a new volume is created?
5. Which volume/RAID group shows what happens when the system (vol1, rg1)
automatically creates a new RAID group.
7. What are the recommendations regarding disk size and RAID group capacity?
Each RAID group in a volume should have approximately the same capacity.
Disks should be matched for size to optimize write performance.
8. When should you add RAID groups and/or disks?
Before the file system is 90-90% full.
Topic Review
Step Action
3. Under the heading “All Products: Product Documents” click on Filer Head
Migration Instructions. What information do you see?
4. Next, locate the NOW Community Forums. There are 7 different categories to
browse. What are they?
5. Next locate “Bugs Online & Release Tools”. Under “Quick Search” enter the bug
id “23009”. What is the title for the bug id you entered?
6. Finally, locate “Tools and Utilities” and answer the following question.
What is the name of the tool that captures performance and configuration statistics.
There are versions for UNIX and for Windows and replaces STATS.?
Answer: Perfstat