Exercise Guide NetApp University - Do Not Distribute 1 Data ONTAP 7.3 Fundamentals: Welcome 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. NETAPP UNIVERSITY Data ONTAP 7.3 Fundamentals Exercise Guide
Version Number: 5.0 Release Number: Data ONTAP 7.3 Course Number: STRSW-ED-ILT-DOTF-REV05 Catalog Number: STRSW-ED-ILT-DOTF-REV05-EG
NetApp University - Do Not Distribute 2 Data ONTAP 7.3 Fundamentals: Welcome 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. ATTENTION The information contained in this guide is intended for training use only. This guide contains information and activities that, while beneficial for the purposes of training in a closed, non-production environment, can result in downtime or other severe consequences and therefore are not intended as a reference guide. This guide is not a technical reference and should not, under any circumstances, be used in production environments. To obtain reference materials, please refer to the NetApp product documentation located at www.now.com for product information. COPYRIGHT 2008 NetApp. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice. No part of this book covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written permission of the copyright owner. NetApp reserves the right to change any products described herein at any time and without notice. NetApp assumes no responsibility or liability arising from the use of products or materials described herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product or materials does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of NetApp. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.277-7103 (October 1988) and FAR 52-227-19 (June 1987). TRADEMARK INFORMATION NetApp, the NetApp logo, and Go further, faster, FAServer, NearStore, NetCache, WAFL, DataFabric, FilerView, SecureShare, SnapManager, SnapMirror, SnapRestore, SnapVault, Spinnaker Networks, the Spinnaker Networks logo, SpinAccess, SpinCluster, SpinFS, SpinHA, SpinMove, SpinServer, and SpinStor are registered trademarks of Network Appliance, Inc. in the United States and other countries. Network Appliance, Data ONTAP, ApplianceWatch, BareMetal, Center-to-Edge, ContentDirector, gFiler, MultiStore, SecureAdmin, Smart SAN, SnapCache, SnapDrive, SnapMover, Snapshot, vFiler, Web Filer, SpinAV, SpinManager, SpinMirror, and SpinShot are trademarks of NetApp, Inc. in the United States and/or other countries. Apple is a registered trademark and QuickTime is a trademark of Apple Computer, Inc. in the United States and/or other countries. Microsoft is a registered trademark and Windows Media is a trademark of Microsoft Corporation in the United States and/or other countries. RealAudio, RealNetworks, RealPlayer, RealSystem, RealText, and RealVideo are registered trademarks and RealMedia, RealProxy, and SureStream are trademarks of RealNetworks, Inc. in the United States and/or other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. NetApp is a licensee of the CompactFlash and CF Logo trademarks.
NetApp University - Do Not Distribute 3 Data ONTAP 7.3 Fundamentals: Welcome 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. EXERCISE & ANSWER TABLE OF CONTENTS WELCOME ............................................................................................................................ 1 MODULE 1: OVERVIEW ................................................................................................... E1-1 MODULE 2: INSTALLATION AND CONFIGURATION ................................................... E2-1 MODULE 3: BASIC ADMINISTRATION .......................................................................... E3-1 MODULE 4: ADMINISTRATION SECURITY ................................................................... E4-1 MODULE 5: NETWORKING ............................................................................................. E5-1 MODULE 6: PHYSICAL STORAGE MANAGEMEN ........................................................ E6-1 MODULE 7: LOGICAL STORAGE MANAGEMENT ........................................................ E7-1 MODULE 8: CIFS .............................................................................................................. E8-1 MODULE 9: NFS ................................................................................................................ E9-1 MODULE 10: QTREES AND SECURITY STYLE ........................................................... E10-1 MODULE 11: SAN ............................................................................................................ E11-1 MODULE 12: SNAPSHOT COPIES ................................................................................ E12-1 MODULE 13: WRITE AND READ REQUEST PROCESSING......................................... E13-1 MODULE 14: SYSTEM DATA COLLECTION ................................................................. E14-1 MODULE 15: FLEXSHARE ............................................................................................. E15-1 MODULE 16: NDMP FUNDAMENTALS ......................................................................... E16-1 MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION .............................. E17-1 MODULE 18: FINAL WORDS .......................................................................................... E18-1 APPENDIX A: ANSWERS .................................................................................................. A-1
NetApp University - Do Not Distribute O v e r v i e w NetApp University - Do Not Distribute E1-1 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 1: OVERVIEW Exercise Module 1: Overview Estimated Time: 45 minutes
EXERCISE OVERVIEW The goal of this exercise is to give you an opportunity to explore the current exercise environment with the assistance of your instructor. If you do not have a storage system environment, you will be redirected to the appendix for the simulator setup. OBJECTIVES At the conclusion of this exercise, you should be able to identify all the essential components of your exercise environment. TIME ESTIMATE 45 minutes
NetApp University - Do Not Distribute E1-2 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 21 2008 NetApp. All rights reserved. Topic Review What are the two topologies supported by Data ONTAP? What are the three NetApp product series? What is the main function of WAFL? Where can you find supporting documents for Data ONTAP?
22 2008 NetApp. All rights reserved. Topic Review What are some benefits of simulating Data ONTAP? How is SAN different than NAS? What are some of the basic functions of Data ONTAP?
NetApp University - Do Not Distribute E1-3 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: EXPLORING THE EXERCISE ENVIRONMENT OVERVIEW The goal of this exercise is to give you an opportunity to explore the current exercise environment with the assistance of your instructor. If you do not have a storage system environment, you will be redirected to the appendix for the simulator setup. This task familiarizes you with the exercise environment you will use for all exercises in this course. If you dont have an appropriate storage system environment, see Appendix B to set up the Data ONTAP simulator. OBJECTIVES At the conclusion of this exercise, you should be able to identify all the essential components of your exercise environment. TIME ESTIMATE 15 minutes
START OF TASK STEP ACTION
1.
With the assistance of your instructor, identify the following essential equipment:
REMOTE DESKTOP CONNECTION
Name: _____________________________
IP address: __________________________
Local Administrator Password: ___________________________
Windows Workstation NetApp University - Do Not Distribute E1-4 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION
Name: ______________________________
Type: _______________________________
Internal IP address: ___________________________
Terminal IP address: ___________________________
Root Password: ____________________________
END OF TASK
TASK 2: EXPLORING THE NOW SITE OVERVIEW This exercise provides hands-on experience using the NOW site. OBJECTIVE At the conclusion of this task, you should be able to use the NOW site to answer questions about Data ONTAP. TIME ESTIMATE 30 minutes
START OF TASK STEP ACTION 1. a. Go to the NOW site at http://now.netapp.com. b. Log in using your NetApp user ID and password. c. Select the Service & Support option. d. Storage System NetApp University - Do Not Distribute E1-5 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 2. Examine the Service & Support page and notice the organization. Observe the top of the page and notice the various options. Click on the Sitemap/Tour link. 3. Find the Take a Tour link under the NOW site map. This is a nine-minute multimedia tour of NOW. The tour is a little out of date, but you should take the tour later when you have an opportunity. 4. Observe the NOW site organizational chart. Each box is linked to the related information. Click on a few boxes and become familiar with this interface. Notice that when you are redirected to a link, the map at the top of the page shows you where you are. You can use these and other links in the top portion of the screen to help you navigate. Use the spaces below to note any locations you would like to examine more carefully at another time. __________________________________________________________
5. Return to the Service & Support page. Notice the Info Flash section on the right side of the Start page. This information is dynamic and is periodically updated. To go to a topic, click the image. Use your back button to return. 6. Before you logged in, you were instructed to select Service & Support as your start page. Notice the other Start pages available at the top of the NOW page. Explore these links, making note of any areas you would like to investigate further later on.
NetApp University - Do Not Distribute E1-6 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: LOCATING TECHNICAL ASSISTANCE AND DOCUMENTATION OVERVIEW NetApp technical documentation provides a wealth of both practical and theoretical information. Because the documentation set is large, it is important to have some understanding of what information is documented and how. START OF TASK STEP ACTION 1. Return to the Service & Support page. Select the Access Product Documentation link. Locate each of the following categories, familiarizing yourself with the subcategories, and checking off each item. NOTE: The following titles are listed alphabetically, instead of the order in which they appear on NOW. _____Best Practices guides _____Configuration and Hardware guides _____Storage system resources _____Storage system and NetCache _____General information _____Interoperability _____NetApp Library (white Papers, tech reports, and so on) _____NetCache resources _____Product Documentation & System Configuration (by product) _____Other 2. Under Product Documentation & System Configuration, select Data ONTAP Product Documentation & System Configuration. Notice that the Data ONTAP Information Library page opens. View all documents for the Data ONTAP for Filer/NearStore Release 7.3. Open the Documentation Roadmap and browse the result. What information does this provide? ___________________________________________________________ ___________________________________________________________ ___________________________________________________________ 3. Return to the Data ONTAP for Filer/NearStore Release 7.3 page. Open the Master Index. NOTE: The Master Index is created when a release becomes Generally Available (GA). Using the index, determine where you can get information about setting up anonymous FTP access. ___________________________________________________________ NetApp University - Do Not Distribute E1-7 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. Return to the Access & Order Product Documentation page. Locate the System Configuration Guide link and answer the following questions: 1. What is the size of NVRAM in the FAS3050? ___________________________________________________ 2. What is the maximum number of drives for a single FAS6030? _____________________________________________________ 3. Which slots on an FAS6070 can be used as SCSI ports for tape drives? _____________________________________________________
END OF TASK
TASK 4: ACESSING THE STORAGE SYSTEM START OF TASK STEP ACTION 1. Access the storage system using telnet. You can use TeraTerm Pro or PuTTY to open a telnet session to your storage system. To set up TeraTerm Pro as your telnet emulator (with SSH support): a. Download the latest version of TeraTerm Pro from: http://www.ayera.com/teraterm b. Make sure you are using TeraTerm Pro version 3.1.3 or later. TeraTerm Pro does not need an installation routine. When you download the software, place the ttermpro.exe file in a folder thats easy to find (preferably on the Desktop of your laptop computer). NOTE: Before downloading TeraTerm Pro, check your desktop to see if it is already installed.
2. To launch a TeraTerm Pro window, double-click the ttermpro.exe icon on the desktop of your Windows machine, or in the folder where you extracted the installation files. A TeraTerm Pro Configuration window appears
NetApp University - Do Not Distribute E1-8 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 3. Customize the terminal emulator to connect using telnet or SSH by typing the IP address of your storage system in the Host text box, and then selecting the appropriate radio button for Telnet (Port: 23) or SSH (Port: 22). 4. Enter root at the login prompt. Your instructor will give you the root password.
5. Arrange your displays so that both console and telnet sessions are visible. 6. Observe the echoing effects. Why do you see the same thing in both sessions? ___________________________________________________________
7. Why did you use port 23 to access the storage system through telnet and a different port to access the console? ___________________________________________________________
8. Type sysconfig d. This command lists all of the disk HA.IDs (device names), along with shelf, bay, and disk serial numbers. 9. To access the storage system Web interface, enter: http://[Storage system IP}/na_admin 10. Select the FilerView link to access FilerView. Use the same user name and password. This task demonstrates how to access a storage system and assure that you have access. You will be using these interfaces throughout the remainder of the course. 11. From FilerView, navigate to the telnet session by selecting NetApp > Use Command Line.
NetApp University - Do Not Distribute E1-9 Data ONTAP 7.3 Fundamentals: Overview 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 12. Are you able to launch the session? Y or N If no, why not? ____________________________________________________________
13. Close the telnet session through TeraTerm. Try again to initiate a telnet session with FilerView. Was it successful? Y or N
END OF TASK
NetApp University - Do Not Distribute I n s t a l l
C o n f i g NetApp University - Do Not Distribute E2-1 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 2: INSTALLATION AND CONFIGURATION Exercise Module 2: Installation and Configuration Estimated Time: 45 minutes
EXERCISE: SYSTEM CONFIGURATION OVERVIEW This exercise familiarizes you with the Configuration Worksheet, which aids in the setup of your storage system. When you boot up your new storage system for the first time, the storage system immediately runs the setup command (see Task 2). But before you start, you must identity all the relevant information that is needed for configuration. To do this, you need to record all relevant information on the Configuration Worksheet so that this information is available during setup when you are entering values. OBJECTIVES At the conclusion of this exercise, you should be able to: Use the System Configuration Worksheet Use the setup command TIME ESTIMATE 20 minutes REQUIRED HARDWARE, SOFTWARE, AND TOOLS HardwareAny storage system SoftwareData ONTAP 7.3.x NetApp University - Do Not Distribute E2-2 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 43 2008 NetApp. All rights reserved. Topic Review What links on the NOW site do you use to help identify a storage systems current configuration? What is the name of the worksheet which aids in storage system setup, and where do you find it? What command is immediately run when you boot the storage system the first time? What command simplifies Data ONTAP upgrades?
NetApp University - Do Not Distribute E2-3 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: USING THE CONFIGURATION WORKSHEET START OF TASK STEP ACTION 1. While the Configuration Worksheet is provided in this exercise module, you can also find it at http://now.netapp.com. The worksheet can be found in Chapter 2 of the Data ONTAP 7.3 Software Setup Guide. 2. To complete the worksheet, your instructor will provide you with the information relevant to your environment.
END OF TASK
TASK 2: APPLYING CONFIGURATIONS OVERVIEW This task familiarizes you with how to use the configurations recorded on the Configuration Worksheet to set up your storage system. OBJECTIVE At the conclusion of this task, you should be able to configure the Data ONTAP simulator. START OF TASK STEP ACTION 1. Use a telnet session to access the CLI, or from FilerView, select Filer > Use Command Line. 2. When your storage system boots for the first time, it immediately initiates the setup command. If you enter any incorrect values, complete the setup and then run the setup command again with new values. Enter the setup command at the storage system prompt. Example: system> setup The setup command will rewrite the /etc/rc, /etc/exports, /etc/hosts, /etc/hosts.equiv, /etc/dgateways, /etc/nsswitch.conf, and /etc/resolv.conf files, saving the original contents of these files in .bak files (e.g. /etc/exports.bak). Are you sure you want to continue? [yes] yes <enter> 3. The output of the sysconfig command is displayed, followed by a prompt for the host name. Record the value for the host name on the Configuration Worksheet and then press Enter. NetApp University - Do Not Distribute E2-4 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION Example: Are you sure you want to continue? [yes] yes NetApp Release RironcityN_080118_2230: Sat Jan 19 01:37:34 PST 2008 System ID: 0101169724 (system); partner ID: 0101173126 (devslu20-f1) System Serial Number: 1056896 (system) System Rev: C0 slot 0: System Board Processors: 4 Memory Size: 3072 MB slot 0: Dual 10/100/1000 Ethernet Controller VI e0a MAC Address: 00:a0:98:03:28:8e (auto- 1000t-fd-cfg_down) e0b MAC Address: 00:a0:98:03:28:8f (auto- 1000t-fd-up) e0c MAC Address: 00:a0:98:03:28:8c (auto- unknown-cfg_down) e0d MAC Address: 00:a0:98:03:28:8d (auto- unknown-cfg_down) slot 0: FC Host Adapter 0a 14 Disks: 952.0GB 1 shelf with ESH2 slot 0: FC Host Adapter 0b 14 Disks: 476.0GB 1 shelf with ESH2 slot 0: Fibre Channel Target Host Adapter 0c slot 0: Fibre Channel Target Host Adapter 0d slot 0: SCSI Host Adapter 0e slot 0: NetApp ATA/IDE Adapter 0f (0x000001f0) 0f.0 245MB slot 3: NVRAM Memory Size: 512 MB Please enter the new hostname [system]: <enter>
NetApp University - Do Not Distribute E2-5 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. The next setup question is regarding virtual network interfaces. However, because we are not using virtual interfaces at this time, press Enter to access the no default. Example: Do you want to configure virtual network interfaces? [n]: n <enter>
5. The next step is to record the IP address. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter the IP address for Network Interface e0a [10.254.134.36]: <enter> 6. The next step is to record the netmask. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter the netmask for Network Interface e0a [255.255.252.0]: <enter> 7. The next question is regarding the IP address of the partner in active-active systems (which will be covered later in this course). Record the value on the Configuration Worksheet. Press n (for no), and then Enter. Example: Should interface e0a take over a partner IP address during failover? [y]: n <enter> 8. The next step is to record the media type. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter media type for e0a {100tx-fd, tp-fd, 100tx, tp, auto (10/100/1000)} [auto]: <enter> Please enter flow control for e0a {none, receive, send, full} [full]: <enter> Please enter the IP address for Network Interface e0b []:<enter>
9. Depending on the way your student environment is set up, there could be several more questions about the other interfaces on your system. You can enter n for no and continue. The next prompt asks you if you would like to continue using the Web interface. Enter n for no. Example: Would you like to continue setup through the web interface? [n]: n <enter> NetApp University - Do Not Distribute E2-6 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 10. The next step is to record the IP address for the default gateway. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter the name or IP address of the default gateway [10.254.132.1]: <enter> 11. The next step is to record the name of the administration host. Record the value on the Configuration Worksheet and then press Enter. Example: The administration host is given root access to the filer's /etc files for system administration. To allow /etc root access to all NFS clients, enter 'all' below. Please enter the name or IP address of the administration host [10.254.134.38]: <enter> 12. The next step is to record the IP of the administration host. Your instructor may have a specific value for you to enter. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter the name or IP address of the administration host [10.254.134.38]: <enter>
13. The next step is to record the time zone for your system. Your instructor may have a specific value for you to enter. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter timezone [US/Pacific]: <enter>
14. The next question is regarding the system location. This is a text field. Type in any value you would like. Example: Where is the filer located? []: the best place <enter>
15. The next question is regarding system language. This value is used with the multiprotocol features that are discussed later in this course. To skip setting a language, press Enter. Example: What language will be used for multi-protocol files (Type ? for list)?: <enter>
NetApp University - Do Not Distribute E2-7 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 16. The next question is regarding DNS resolution. Your instructor will give you information about DNS for your lab environment. Type yes and press Enter. Example: Do you want to run DNS resolver? [y]: y <enter>
17. The next question is regarding the DNS domain name. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter DNS domain name [netappu.com]: netappu.com <enter> 18. The next step is to record the IP of the name server. Record the value on the Configuration Worksheet and then press Enter. Example: Please enter the IP address for first nameserver [216.240.23.25]: <enter> NOTE: You can enter up to three name servers. 19. The next question is about whether or not your storage system is an NIS client. Press Enter to accept the default value. Example: Do you want to run NIS client? [n]:n <enter> 20. Students using a simulated environment are asked for the new password for root. Type netapp and press Enter. Re-enter the password for root. 21. The setup now is complete. Because the storage system has CIFS licensed, it automatically initiates the cifs setup command. 22. The first question is regarding the use of WINS. Press Enter to accept the default value. We are not using WINS. 23. The next question is regarding the use of multiprotocol (NTFS and UNIX File System) or Microsoft Windows NTFS only. Press Enter to accept the default value. We will be using multiprotocol. 24. The next two questions are regarding the password for root. Type netapp and press Enter twice. 25. The system defaults the CIFS server name to the system host name. You are then asked if you want to change this default. Press Enter to accept the default. 26. The next question is regarding user authentication. In this environment, we will be using Active Directory domain authentications. Press Enter to accept the default. NetApp University - Do Not Distribute E2-8 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 27. The next question is regarding the name of the Active Directory domain. This is the same as the DNS domain. Press Enter to accept the default. 28. The next step is to configure the time services. Press Enter to accept the default.
29. The name of the time server should be the IP address of the Windows domain controller. Type the IP address of the Windows domain controller and press Enter. 30. Because there is only one time server, press Enter to accept the default. 31. To add the system account to Active Directory, you must authenticate as a domain administrator,. Press Enter to accept the default user.
32. Type in the password of the domain administrator (provided by your instructor) and press Enter. 33. The next question is regarding the identification of the system in Active Directory. Press Enter to accept the default of CN=computers. 34. The next question asks if the simulator should create the Windows local administrator account in the local /etc/passwd file. Press Enter to accept the default. 35. Type the password of the Windows administrator and press Enter. Repeat this step to configure the password. 36. In this lab, we will not be using any other users or groups to administrate the system. Press Enter to accept the default. 37. The CIFS service is now running.
END OF TASK
NetApp University - Do Not Distribute E2-9 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. CONFIGURATION WORKSHEET TYPES OF INFORMATION YOUR VALUES MAC address for the storage system's built-in Ethernet interface
Host name Password Time zone Storage system location Storage system Language used for multiprotocol storage systems
Host name Administration host IP address Link names (physical interface names, such as e0, e5a, or e9b)
Number of links (number of physical interfaces to include in the vif)
Virtual interfaces Name of virtual interface (name of vif, such as vif0
Interface name IP address Subnet mask Partner IP address Media type (network type) Are jumbo frames supported? Ethernet interfaces MTU size for jumbo frames Gateway name Router (if used) IP address Location of HTTP directory Domain name Server address 1 Server address 2 DNS Server address 3 Domain name Server name 1 Server name 2 NIS Server name 3 Windows domain 1 2 WINS servers 3 Windows Active Directory domain administrator user name Windows Active Directory domain administrator password Active Directory (command line setup only) RMC MAC address IP address Network mask (subnet mask) Gateway Media type Mail host RLM MAC address IP address Network mask (subnet mask) NetApp University - Do Not Distribute E2-10 Data ONTAP 7.3 Fundamentals: Installation and Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TYPES OF INFORMATION YOUR VALUES Gateway AutoSupport mail host AutoSupport recipient(s)
NetApp University - Do Not Distribute B a s i c
A d m i n NetApp University - Do Not Distribute E3-1 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 3: BASIC ADMINISTRATION Exercise Module 3: Basic Administration Estimated Time: 60 minutes
EXERCISE: BASIC ADMINISTRATION OVERVIEW The purpose of this exercise is to give you an opportunity to initiate a console session to Data ONTAP. After you are logged in, you will view console messages and execute commands on the NetApp storage system. You will then view console messages and execute commands through a terminal emulator and FilerView as if you were sitting at the console. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Log in and establish a remote login session (telnet) Execute basic system commands on the storage system List the options on a storage system List the system configurations of a storage system Use the sysconfig command to discover an add-on card and view its documentation on the Parts Finder Web site Configure AutoSupport TIME ESTIMATE 60 minutes
NetApp University - Do Not Distribute E3-2 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 39 2008 NetApp. All rights reserved. Check Your Understanding Name three ways to access a storage systems CLI. What is the URL to access FilerView? How can you view the system configuration for a FAS storage system? How can you configure a FAS storage system from a remote adminhost? When are AutoSupport messages generated?
NetApp University - Do Not Distribute E3-3 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: ACCESSING THE STORAGE SYSTEM OVERVIEW This task demonstrates methods of accessing the storage system through the console, telnet, and FilerView. It is important to keep in mind that for the purpose of this exercise, the system console is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system.
START OF TASK STEP ACTION 1. Access the CLI using a telnet session or from FilerView. system> 2. Enter help to see the available commands. Enter the ? character and compare this to the help command. Do you see the same results? ______________
3. Try entering a command followed by the word help. Example: license help 4. How is help by itself different from help appended to a command? ___________________________________________________________
5. View the manual page for the useradmin command from the command line. ___________________________________________________________
6. View the manual page for the useradmin command from FilerView. Compare this with the output from the man command. Try this using a few other commands. 7. Examine the CLI privilege levels. 8. Read the man page for the priv command. system> man priv What does the q argument do? (Bonus: When would it be useful?) ___________________________________________________________
9. Look at the available command using help. 10. Run the disk command. Note which subcommands are available. system> disk Now change to the advanced level and issue the disk command again. Do you see any new commands? ______________
NetApp University - Do Not Distribute E3-4 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION system> priv set advanced system*> disk Hint: It might help to do something from a UNIX system like:
11. Return to the administrative mode. system> priv set 12. Verify which services are available on your storage system by entering: system> license If NFS and CIFS are not licensed, you can license them by entering the following command twice using the appropriate license code. system> license add abxxggee (Obtain the license code from the instructor) View the newly added license(s). system> license 13. If you have a storage system with only seven disks available, you must use the disks economically. You will learn more about aggregates and the aggr command in Module 6. Right now, you must make sure that aggr0 is a RAID 4 aggregate and not a RAID-DP aggregate. To change the aggr0 RAID type to RAID 4, at the storage system console, enter the following. system> aggr options aggr0 raidtype raid4 This command leaves your system with one non-zero spare if the aggregate was RAID-DP. To prepare the disk for future use, execute the following command: system> disk zero spares 14. Task complete. Proceed to the next task. END OF TASK
NetApp University - Do Not Distribute E3-5 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: EXPLORING STORAGE SYSTEM OPTIONS OVERVIEW This task demonstrates methods of displaying storage system options.
START OF TASK STEP ACTION 1. Log in to the storage system and access the CLI. 2. Enter options. What happened? ___________________________________________________________ ___________________________________________________________
3. At the prompt, enter man options. What happened? ______________________________________________________ ______________________________________________________
4. Quit the man page by entering q. 5. At the prompt, enter options telnet. What happened? ______________________________________________________ ______________________________________________________
6. Review the options list from Step 2. Be careful when making changes. You should take note of any changes you make for later reference. 7. Task complete. Proceed to the next task.
END OF TASK NetApp University - Do Not Distribute E3-6 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: EXPLORING STORAGE SYSTEM CONFIGURATIONS OVERVIEW This task demonstrates methods of displaying storage system configurations.
START OF TASK STEP ACTION 1. Log in to the storage system, access the CLI, and enter the sysconfig command. What happened? ___________________________________________________________ ___________________________________________________________
2. Enter man sysconfig and determine the correct argument to verify that the expansion cards are in the appropriate slots. ___________________________________________________________
3. Compare the outputs of sysconfig a and sysconfig v. Do you notice any differences? ___________________________________________________________ 4. Access FilerView for this storage system. Go to the Report link under Filer. Observe the information displayed. How does this information compare to the sysconfig command? ___________________________________________________________
5. Select the Show Status link. What is the host name (model name) for this system? ___________________________________________________________
Accept the current setting. 6. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E3-7 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 4: EXPLORING PARTS FINDER OVERVIEW This task demonstrates how to use the sysconfig command to identify a part, and then obtain information about the part on the Parts Finder Web site. You will then use the System Configuration Guide Web site to verify the configuration of a storage system.
START OF TASK STEP ACTION 1. Access the CLI. 2. Use the sysconfig command to display configuration information. Notice that the information displayed does not indicate what is needed to obtain a replacement. 3. Log in to the NOW site. Locate and select the Parts Finder.
Notice that the Parts Finder Selection Criteria screen is displayed. 4. Return to the CLI and use the sysconfig command display detailed information about the storage system configuration. NOTE: If the storage system you are using does not have expansion slots, or if these slots are not used, there will not be enough information displayed to make using the Parts Finder or System Configuration Guide interesting. In this case, you will be supplied with information. 5. Access the NOW site and open the Parts Finder. 6. Search by category for the following: Category = Data Cables Platform = [your storage system] Notice that the results give you an opportunity to see each cable type. 7. Notice that there are two part numbers shown for each cable: x### and sp###. The x### part number is for new parts, while the sp### is for spares (possibly reissued). 8. Click the link with the camera icon. What happens? ______________________________________________________ NetApp University - Do Not Distribute E3-8 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 9. Do another search. This time, locate the part information for an NVRAM card for an FAS3050. How many part numbers are available? ______________________________________________________
10. Go to NOW > Service and Support > Technical Assistance and Documentation > Access & Order Product Documentation > System Configuration Guides. 1. Search Data ONTAP Release 7.2. 2. Select NetApp Storage Appliances. 3. Select both FAS6070 and Expansion slots/cards. 4. Select Expansion Slot Assignments for an FAS6070 in a single configuration. What happens? ______________________________________________________
11. Use the table and the explanations at the bottom of the table to answer questions 10 through 14. 12. Which is the preferred slot for the NVRAM card? ______________________________________________________
13. Which is the least preferred slot for a dual-port optical iSCSI target-mode interface? ______________________________________________________
14. Which adapter should never be installed in slot 4? ______________________________________________________
15. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E3-9 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 5: CONFIGURING AUTOSUPPORT OVERVIEW The purpose of this task is to give you some practice configuring the storage systems AutoSupport feature. You will execute AutoSupport console commands, enter SNMP contact and location information, verify the storage systems serial number, and test your AutoSupport configuration. For the purposes of this task, the Linux Admin host will either be the virtual machine running the Data ONTAP simulator, or a standalone machine. Ask your instructor if you have any questions.
START OF TASK STEP ACTION 1. Access the CLI. 2. At the console prompt, enter the following list of commands. NOTE: <mailhost>, user#, and system# will be replaced with information provided by your instructor. Turn on autosupport: system> options autosupport.enable on Set the location of your mail server: system> options autosupport.mailhost <mailhost> Specify the recipient to send the AutoSupport e-mail: system> options autosupport.to user#@<mailhost> Specify the sender of the AutoSupport e-mail: system> options autosupport.from user#@system# Specify the recipient of an optional, shorter e-mail address: system> options autosupport.noteto user#@<mailhost> 3. At the console prompt, enter the following commands: system> snmp contact Student#, 555-333-3333 system> snmp location NetApp Corp, Training Lab snmp init 1 4. At the console prompt, enter the command: system> options autosupport.doit testing 5. Telnet to mailhost where the UNIX Admin host IP address or host name is obtained from the instructor. 6. Log in as user#. 7. Enter the password. 8. Enter /usr/ucb/mail. You should see an e-mail message with the subject: System Notification from system# (testing) NetApp University - Do Not Distribute E3-10 Data ONTAP 7.3 Fundamentals: Basic Administration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 9. Enter the message number of the testing message. For instance, if testing is message 1, type 1. The message opens. 10. On the first screen, verify that the SNMP_CONTACT and SNMP_LOCATION information reflect what you entered. This information will also be shown in the second section of the AutoSupport message. 11. Press the space bar to scroll forward in the message until the System Serial Number line is displayed. For example, if your serial number is 3003908, you will see the following: Netapp-asup-serial-num: 3003908 12. Continue to scroll through the AutoSupport message to view the other information AutoSupport sends to AutoSupport recipients. 13. Press q to exit. 14. Task complete.
END OF TASK
NetApp University - Do Not Distribute A d m i n
S e c u r i t y NetApp University - Do Not Distribute E4-1 Data ONTAP 7.3 Fundamentals: Administration Security 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 4: ADMINISTRATION SECURITY Exercise Module 4: Administration Security Estimated Time: 30 minutes
EXERCISE: CREATING USERS, GROUPS, AND ROLES OVERVIEW The purpose of this exercise is to set up a storage system with local user accounts. The user account will be associated with groups, and the groups associated with roles. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Create a new role, new group, and new user account Log in with a new user account Log in with a guest account TIME ESTIMATE 30 minutes NetApp University - Do Not Distribute E4-2 Data ONTAP 7.3 Fundamentals: Administration Security 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 26 2008 NetApp. All rights reserved. Check Your Understanding How do you control administrative access to the storage system? Why would you use the useradmin command?
NetApp University - Do Not Distribute E4-3 Data ONTAP 7.3 Fundamentals: Administration Security 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CREATING A LOCAL USER ACCOUNT ON THE STORAGE SYSTEM OVERVIEW In this task, you will create a local user account on your storage system. In the lab environment, all commands should be entered at the storage system prompt.
START OF TASK STEP ACTION 1. From your workstation: a. Open a telnet session to the storage system using the storage systems IP address or name. You can use TeraTermPro or PuTTY to open the telnet session. b. Log in as root. NOTE: Verify with the instructor the password for root. 2. Before adding a local user to the storage system, check the current security options to determine password rules by entering the following command: storage_sys> options security What is the value for the security.passwd.rules.enable option? __________________
If the security.passwd.rules.enable option is set to on, then you must have a password to create a local user based on the following rules: It must be at least eight characters long. It must contain at least two alphabetic characters. It must contain at lease one digit. If security.passwd.rules.enable.option is set to off, then these restrictions are not enforced when you create a password. 3. Create a new role that includes only the capability to log in to the storage system through the console by entering the following command: storage_sys> useradmin role add r_login a login-telnet 4. Create a new group on the storage system that is associated with the new role created in step 3 (r_login) by entering the following command: storage_sys> useradmin group add g_login r r_login 5. Add a local user (your name) in the g_login group to the storage system by entering the following command: NOTE: User names are not case sensitive. storage_sys> useradmin user add your_name g g_login Enter your password. Record your password._______________________________________
NetApp University - Do Not Distribute E4-4 Data ONTAP 7.3 Fundamentals: Administration Security 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 6. Verify that the local user (your name) was added to the storage system by entering the following command: storage_sys> useradmin user list your_name What are your allowed capabilities? ___________________________________________________________
7. Verify the allowed capabilities for the root account by entering the following command: storage_sys> useradmin user list root What are the capabilities of the root user? ____________________________________________________________
8. View the list of all local storage system users by entering the following command: storage_sys> useradmin user list What local users are listed? _____________________________________________________________
9. Task complete. Proceed to the next task.
END OF TASK
TASK 2: LOGGING IN AS THE NEW USER OVERVIEW In this task, you will log in with the new user account created in Task 1. In the lab environment, all commands should be entered at the storage system prompt.
START OF TASK STEP ACTION 1. Log out of your current telnet session by pressing Ctrl-C. 2. From your workstation: a. Open a telnet session to the storage system using the storage systems IP address or name. You can use TeraTerm Pro or PuTTY to open the telnet session. b. Log in as your_name and enter the password that you created earlier. 3. On the Linux virtual machine, notice the console message that appears advising you that a new user has logged in through a telnet session. NetApp University - Do Not Distribute E4-5 Data ONTAP 7.3 Fundamentals: Administration Security 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. At the storage system prompt, view the RAID group configuration by entering the following command: storage_sys> sysconfig -r What was the response? ____________________________________________________________
What capability do you need to issue this command? _____________________________________________________________
5. We are now going to modify the role to allow your user account to issue this command. Log out of your current telnet session by pressing Ctrl-C. 6. From your workstation: a. Open a telnet session to the storage system using the storage systems IP address or name. You can use TeraTermPro or PuTTY to open the telnet session. b. Log in as root. NOTE: Verify with your instructor the password for root.
7. To grant your user the capability required to issue the sysconfig command, modify the role by entering the following command: storage_sys> useradmin role modify r_login a login- telnet,cli-sysconfig 8. Log out of your current telnet session by pressing Ctrl-C.
9. From your workstation: Open a telnet session to the storage system using the storage systems IP address or name. You can use TeraTermPro or PuTTY to open the telnet session. Log in as your_name and enter the password you created earlier. 10. At the storage system prompt, view the RAID group configuration by entering the following command: storage_sys> sysconfig -r Did the command execute properly?
Y or N ______________
11. Task complete. Proceed to the next task. END OF TASK NetApp University - Do Not Distribute E4-6 Data ONTAP 7.3 Fundamentals: Administration Security 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: CREATING AND LOGGING IN AS GUEST USER OVERVIEW In this task, you will create a user that belongs to the guest group, and then observe the results of logging in as the new guest user. In the lab environment, all commands should be entered at the storage system prompt.
START OF TASK STEP ACTION 1. Access the CLI. 2. Use the useradmin user list command to identify configured system users. The default user is root. 3. Enter the useradmin help command to see the available useradmin commands. 4. New users must be members of a group. Use the useradmin user help add command to display the syntax and command options associated with this command. Permissions (access) are assigned to groups. Users inherit permissions from the groups to which they belong. 5. Use the useradmin group list command to display the available groups and the role that is assigned to each. 6. Use the command useradmin user add bob g guests to add a user named bob to the guest group. 7. When the system prompts for a password, enter bob12345 (for this demonstration). 8. Use the useradmin user list command to verify that bob has been added as a user. 9. Use the useradmin user list bob command to display the capabilities of user bob, and notice that this user has no administrative rights. 10. To demonstrate the difference between assigning users to a group with few capabilities and assigning them to a group with more capabilities, use the useradmin user add dennis g administrators command to add a user named dennis to the administrator group. 11. When the system prompts for a password, enter den12345 (for this demonstration). 12. Use the useradmin user list command to verify that dennis has been added as a user. 13. Use the useradmin user list dennis command to display the capabilities of user dennis, and notice that this user has full administrative rights. 14. The prompt to create a password when adding users is controlled by a system option that is configurable using the options security command. NOTE: After a second user is added, all users will be authenticated on the storage system.
NetApp University - Do Not Distribute E4-7 Data ONTAP 7.3 Fundamentals: Administration Security 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 15. Exit your telnet and console session. Open a new telnet session and log in as guest user bob. Are you successful? Y or N ______________ 16. Log in as bob and access FilerView. (If you have FilerView open already, close the browser and open a new one.) Are you able to access FilerView as bob? Y or N ______________ 17. Open a new telnet session and log in as the administrator user dennis. Are you successful? Y or N ______________ 18. Access FilerView and log in as dennis. What are the results? ____________________________________________________________
19. From FilerView, view the syslog and locate the log of your login attempts. Filer > Syslog Messages
END OF TASK NetApp University - Do Not Distribute N e t w o r k i n g NetApp University - Do Not Distribute E5-1 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 5: NETWORKING Exercise Module 5: Networking Estimated Time: 45 minutes
EXERCISE: NETWORK CONFIGURATION OVERVIEW The purpose of this exercise is to give you an opportunity to configure network settings and host name resolution on the Data ONTAP simulator. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Configure network settings from FilerView Configure network settings from the CLI Describe and configure virtual interfaces TIME ESTIMATE 45 minutes NetApp University - Do Not Distribute E5-2 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 48 2008 NetApp. All rights reserved. Check Your Understanding Where can you set or change a host name locally on the storage system? How do you configure host-name resolution for a storage system? What is the difference between single-mode and multimode trunks? Single-modefailover Multimodeimproved bandwidth What are the benefits of a VLAN?
NetApp University - Do Not Distribute E5-3 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CONFIGURING NETWORK SETTINGS FROM FILERVIEW OVERVIEW This task demonstrates the use of FilerView to configure the simulators network interfaces.
START OF TASK STEP ACTION 1. Use FilerView to view and configure network settings. FilerView > Network > Configure Record the network setting for each of the following: Route Enabled: ____________________________________________ Default Gateway: ___________________________________________ MTU Discovery: ____________________________________________ IP Match Any Address: _______________________________________ FTPD Enabled: ______________________________________________ RSH Enabled: _______________________________________________
2. Use FilerView to display and configure network interfaces. FilerView > Network > Manage Interfaces NOTE: Preserve ns0. The second interface, ns1, will be used.
3. Under Operations for ns1, select Modify.
4. Configure this interface using the following information: IP Address: ____________________________________ (supplied by instructor) NetMask: ______________________________________ (supplied by instructor) Broadcast (leave blank) Media Type: 10/100/1000 Auto-negotiate MTU Size: Accept the default (1500) Flow Control: Full Trusted: Selected WINS: Select Use WINS
Click Apply.
NetApp University - Do Not Distribute E5-4 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 5. Verify that the modifications to the interface were accepted. FilerView > Network> Manage Interfaces > Show Interface Details 6. What must you do to use this interface? ___________________________________________________________
7. Verify host name resolution on the simulator. 8. Use FilerView to view the /etc/hosts file. FilerView > Network > Manage Hosts File How many entries are there in the /etc/hosts file? ___________________________________________________________
9. Configure host name resolution. FilerView > Network > Configure Host Name Resolution (DNS and NIS) Step through the wizard and observe the configured information. (If required, your instructor will supply DNS server information.) 10. Notice that the last step in the process displays host name resolution information configuration. Record the information here: DNS Domain Name: __________________________________________ DNS Dynamic Update Interval: __________________________________ Dynamic DNS Updates: ________________________________________ DNS Cache: __________________________________________________ DNS Name Servers:____________________________________________ ____________________________________________ Either commit the information or select Cancel (because you didnt change anything). 11. Select Network > Report and review the information displayed. 12. Task complete. Proceed to the next task. END OF TASK
NetApp University - Do Not Distribute E5-5 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: CONFIGURING NETWORK SETTINGS FROM THE CLI OVERVIEW This task demonstrates the use of system commands to configure the simulators network interfaces.
START OF TASK STEP ACTION 1. Connect to the storage systems console. Do not try to telnet to your storage system. 2. At the command prompt, enter: ifconfig a 3. Interface names may have different designations. Ensure that the display is similar to the following: NetApp> ifconfig -a
e0: flags=848043<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 10.41.66.130 netmask 0xffffff00 broadcast 10.41.66.255
lo: flags=948049<UP,LOOPBACK,RUNNING,MULTICAST,TCPCKSUM> mtu 9188 inet 127.0.0.1 netmask 0xff000000 broadcast 127.0.0.1 4. At the command prompt, enter: ifconfig 5. The following ifconfig syntax is displayed: NetApp> ifconfig usage: ifconfig [ -a | [ <interface> [ [ alias | -alias ] <address> ] [ up | down ] [ netmask <mask> ] [ broadcast <address> ] [ mtusize <size> ] [ mediatype { tp | tp-fd | 100tx | 100tx-fd 1000fx | auto } ] [ flowcontrol { none | receive | send | full } ] [ trusted | untrusted ] [ wins | -wins ] [ [ partner { <address> | <interface> } ] | [ -partner ] ] ] ] 6. At the command prompt, enter: ifconfig <onboard interface from step #3>
NetApp University - Do Not Distribute E5-6 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 7. Record the displayed values below.
Interface name: ______________________________________________ Is the interface up or down? ____________________________________ IP address: __________________________________________________ Netmask value: _______________________________________________ Media type: __________________________________________________
8. At the command prompt, enter: ifconfig <interface> 10.10.10.XX where XX is the last octet of your storage systems IP address 9. At the command prompt, enter: ifconfig <interface> down 10. From your workstation: a. Open a telnet session to the storage system using the storage system IP address or name. You can use TeraTerm Pro or PuTTY to open the telnet session. b. Log in as root. NOTE: Verify with your instructor the password for root. Were you able to connect? ___________
11. From the console, enter: ifconfig <interface> the_original_ip netmask the_original_netmask 12. From the console, enter: ifconfig <interface> up 13. Task complete. Proceed to the next task. END OF TASK NetApp University - Do Not Distribute E5-7 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: LEARNING MORE ABOUT VIRTUAL INTERFACES OVERVIEW This task helps you learn more about configuring a storage system for virtual interfaces.
START OF TASK STEP ACTION 1. What is the purpose of a single-mode virtual interface? a. A single-mode virtual interface provides failover if one port fails. b. A single-mode virtual interface provides load-balancing capabilities. c. A single-mode virtual interface provides security. d. A single-mode virtual interface allows you to configure the interface to work for only one client at a time, thus improving performance. 2. What is the purpose of a multi-mode virtual interface? a. A multi-mode virtual interface provides failover if one port fails. b. A multi-mode virtual interface allows for switching between interfaces. c. A multi-mode virtual interface provides more security options. d. A multi-mode virtual interface enables faster throughput by having links that share network loads. 3. What is the maximum number of interfaces in a single-mode virtual interface for an FAS270? (Hint: Use FilerView Help.) a. 1 b. 2 c. 3 d. 4 4. How many interfaces can you configure in a multi-mode virtual interface? a. 1 b. 2 or more 5. You will now create and manage a single-mode vif from the CLI. From your workstation: a. Open a telnet session to the storage system using the storage system IP address or name. You can use TeraTerm Pro or PuTTY to open the telnet session. b. Log in as root. NOTE: Verify with your instructor the password for root. 6. At the command prompt, enter: ifconfig a 7. At the command prompt, enter: vif create NetApp University - Do Not Distribute E5-8 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION View the syntax. 8. At the command prompt, enter: vif create single singletrunk1 <interface> <interface> 9. At the command prompt, enter: ifconfig singletrunk1 10. At the command prompt, enter: ifconfig singletrunk1 <original IP of filer> up netmask <original Netmask of filer> 11. Telnet to the IP address used in step 5 and then enter: vif status 12. Connect to the console or enter the next commands in the console connection window that has been established. 13. At the command prompt, enter: ifconfig a 14. At the command prompt, enter: vif destroy singletrunk1 NOTE: You cannot destroy a vif in the up state. 15. At the command prompt, enter: ifconfig singletrunk1 down 16. At the command prompt, enter: vif destroy singletrunk1 17. At the command prompt, enter: ifconfig -a 18. Next, you will create a single-mode vif using FilerView. 19. This task can be performed only on a system with a quad Ethernet card installed. Skip to next task if your system is a FAS2XX system. Open Internet Explorer and enter the following URL: http://ip_address_of_storage_system/na_admin For example: http://10.32.69.15/na_admin 20. Select Network > Add Virtual Interface. NetApp University - Do Not Distribute E5-9 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION
Enter the following information: Virtual Interface name = SingleTrunk1 Network Interfaces = any two available Trunk Mode = Single Click Apply. 21. View the vif in FilerView. After viewing the details, delete SingleTrunk1. 22. Finally, you will create a multi-trunk mode from the CLI. 23. View the configured interfaces by entering at the command prompt: ifconfig a 24. At the command prompt, enter: vif create View the syntax. 25. At the command prompt, enter: vif create multi MultiTrunk1 b ip <interface> <interface> 26. At the command prompt, enter: ifconfig MultiTrunk1
NetApp University - Do Not Distribute E5-10 Data ONTAP 7.3 Fundamentals: Networking 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 27. At the command prompt, enter: ifconfig MultiTrunk1 <IP obtained in previous exercises> up netmask <Netmask obtained in previous exercises> 28. At the command prompt, enter: vif status What is the load balancing policy?_______________________________ How many links are active?____________________________________ What is the vif type?__________________________________________
END OF TASK
NetApp University - Do Not Distribute P h y s i c a l
S t o r a g e NetApp University - Do Not Distribute E6-1 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 6: PHYSICAL STORAGE MANAGEMENT Exercise Module 6: Physical Storage Management Estimated Time: 60 minutes
EXERCISE: CONFIGURING DISKS AND AGGREGATES OVERVIEW The purpose of this exercise is to give you an opportunity to explore how disks and aggregates work on a storage system using both the CLI and FilerView. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Plan a disk configuration for an FAS storage system Explore how disk sizing affects usable disk space Turn on disk scrub and understand the impact it has on a storage system Fail a disk in an FAS storage system Create an aggregate Add disks to an aggregate TIME ESTIMATE 60 minutes
NetApp University - Do Not Distribute E6-2 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 48 2008 NetApp. All rights reserved. Check Your Understanding What is a RAID group? Why use double parity? How many RAID groups does the following command create? What is the minimum size of a RAID-DP group?
NetApp University - Do Not Distribute E6-3 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: PLANNING DISK CONFIGURATION OVERVIEW The purpose of this exercise is to check your knowledge of requirements for RAID group size and composition. Based on the lecture information and the diagram below, answer the following questions.
START OF TASK STEP ACTION
1. Which of the volumes would best be used only for administration? ___________________________________________________________
2. Which volume/RAID group contains the maximum number of disks? ___________________________________________________________
3. Which volume/RAID group contains the minimum recommended number of disks (for a non-admin volume)? ___________________________________________________________
4. Which volume/RAID group contains the default number of disks assigned when a new volume is created? ___________________________________________________________ /vol0 /aggr1 /aggr2 NetApp University - Do Not Distribute E6-4 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION
5. Which volume/RAID group contains an optimum number of disks? ___________________________________________________________
6. What are the recommendations regarding disk size and RAID group capacity? ____________________________________________________________ ____________________________________________________________
7. When should you add RAID groups and/or disks? ___________________________________________________________ ___________________________________________________________
8. Task complete. Proceed to the next task.
END OF TASK
TASK 2: SIZING OVERVIEW This task demonstrates how disk sizing creates usable disk space on a flexible volume.
START OF TASK STEP ACTION 1. In this next exercise, you will calculate how much usable space would be available if you added a full shelf of 72-GB FC drives to a flexible volume.
2. How many disks are contained in a full DS-14 shelf? ____________________
If you add all these disks to a single aggregate with one RAID-DP group, how many data disks are there? ____________________
3. These FC data disks are right sized. What is the right-size space per 72 GB? ___________ NetApp University - Do Not Distribute E6-5 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION
Multiply this number by the number of disks you calculated in Step 2. ___________
4. Subtract the amount of space reserved for the file system (WAFL). What is the percentage you need to subtract? ________________
Right-sized amount total = (WAFL reserved percentage * right-sized amount total) The usable disk size is: _________________
5. Your aggregate snap reserve is turned on. What is the default percentage for aggregate snap reserve? ________________
Multiply this percentage by the usable disk size, and then subtract it from the total usable disk size. Usable disk size = (percent of aggregate snap reserve * usable disk size) The total space available to any flexible volume is: ________________
6. Finally, you have the volume snap reserve turned on in your new flexible volume. What is the default percentage for volume snap reserve? __________________
Multiply this percentage by the total space available to the flexible volume, and then subtract it from the total from step 5. (Total available to flexvol) = (percent of vol snap reserve * total available to flexvol) This is the amount of disk space that a full disk shelf of 72-GB drives adds to a flexible volume with both aggregate Snapshot protection, and volume Snapshot protection with RAID-DP. ______________________
7. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E6-6 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: EXPLORING THE CURRENT DISK CONFIGURATION OVERVIEW This task demonstrates methods of verifying the storage systems current disk configuration using the CLI and FilerView. For the purposes of this exercise, the system console is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system.
START OF TASK STEP ACTION 1. Open FilerView and select: Storage > Disks > Manage 2. Use the drop-down list. How many spare disks are available? ______________
3. View All Disks. How many parity disks are there? ______________
4. Log in to the storage system, access the CLI, and then enter: sysconfig v 5. Review the output and answer the following questions: Which slot is being used for the disk controller? ________________ How many shelves are there? _________________ What are the disk sizes? __________________
6. Enter: sysconfig d Compare the results with the previous output. 7. Enter: fcstat device_map Can you see where each of your disks is located in the shelf? Y or N _______________ 8. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E6-7 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 4: DISK SCRUB OVERVIEW This task demonstrates methods of configuring disk scrubbing using the CLI and FilerView. You will then run the disk scrub command and view disk status from FilerView.
START OF TASK Identify whether statements 1 through 7 are true or false. STEP ACTION 1. Disk scrubbing identifies media errors and rewrites information to another location on the disk. _________________
2. Increasing the time interval that the system operates in degraded mode is a smart and safe way of handling the system so that you dont need to reboot every 24 hours. __________________
3. An unqualified disk is one that is too large for the shelf on which it is placed. __________________
4. A RAID group of six or more disks is more fault-tolerant for critical data than a RAID group of 20. _________________
5. Data ONTAP automatically identifies an unqualified disk. _________________
6. The parity disk must be at least as large as the largest disk in a RAID group. _________________
7. A RAID group with 18 disks is recommended for optimal performance and fault tolerance. _________________ 8. Which option enables you to set scrub performance? a. options raid.reconstruct_speed b. options raid.scrub.perf_impact c. options disk scrub d. options disk.performance.cpu NetApp University - Do Not Distribute E6-8 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 9. Which option enables you to change the amount of system resources allocated to the reconstruction of data? (Default is set to medium.) a. options raid.reconstruct_speed b. options raid.reconstruct.perf_impact c. options raid.scrub.perf_impact d. options disk_reconstruct_speed 10. Is scrub enabled by default? ________________
11. What is the command to fail a disk? a. disk fail b. disk RAID disable c. zero spares d. options raid.timeout 12. Task complete. Proceed to the next task.
END OF TASK
TASK 5: IMPACT OF DISK SCRUBBING OVERVIEW This task demonstrates the impact of the disk scrub command on performance.
START OF TASK STEP ACTION 1. Issue the following command to view system statistics every second: NetApp > sysstat 1 Can you confirm that the disks are in use from the output? _____________
2. Issue the command to view the manual page for the sysstat command. NetApp > sysstat x s 1 What does this command do? ____________________________________________________________
3. Start the disk scrubbing by entering: NetApp University - Do Not Distribute E6-9 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION NetApp> disk scrub start Is there any visible sign that the scrub has begun? ___________________________________________________________
4. While the disk scrub is running, issue the following command: sysstat How does this output compare to the one before the disk scrub? NetApp> sysstat 1 ___________________________________________________________
5. View the system statistics from FilerView. How would you accomplish this? ____________________________________________________________
6. How does FilerView compare to using the command line? ___________________________________________________________
7. Enter the command to stop the scrub. NetApp> disk scrub stop 8. View the disks using FilerView. FilerView > Storage > Disks > Manage Can you see the failed disks? ________________
9. View the spare disks using FilerView. How many spares are there? ________________
10. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E6-10 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 6: CREATING AN AGGREGATE OVERVIEW This task demonstrates how to create an aggregate using FilerView. For the purpose of this lab, the system console is the Data ONTAP simulator running in a Linux virtual environment.
START OF TASK STEP ACTION 1. Access FilerView for your storage system. 2. In the FilerView left navigation pane under Aggregates, click Manage to view the aggregates that already exist. 3. Click Add to launch the Aggregate Wizard. 4. Name the aggregate aggr1. 5. Notice the default parity option. Why is that the default for the aggregate? ___________________________________________________________
What can you do to conserve disks? ____________________________________________________________
Select the option that uses the least number of disks.
6. Use the ? character to determine the minimum RAID group size for your system, and then record that number. ______________ 7. Use the Automatic option. What safeguard is built into the FilerView automatic disk selection? (Hint: Use the help option.) ____________________________________________________________
8. What disk size options do you have? ____________________________________________________________
Select any size. 9. Select the minimum number of disks for this volume type and parity choice. _______________
NetApp University - Do Not Distribute E6-11 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 10. Review your changes and commit them if they are correct. Close the wizard. 11. Use Aggregates > Manage to view your changes. You might need to refresh the display. 12. How many disks have been assigned to your new aggregate? Why? ___________________________________________________________
13. Task complete. Proceed to the next task.
END OF TASK
TASK 7: FAILING A DISK OVERVIEW This task demonstrates how to fail a disk.
START OF TASK STEP ACTION 1. To view the disk ID numbers for aggr1, at the storage system console, enter: aggr status aggr1 r or sysconfig r Record the ID of a disk in aggr1. _______________ Are there any failed disks? ________________
2. At the storage system console, enter: NetApp> options raid.reconstruct.perf_impact high 3. At the storage system prompt, enter: Netapp> disk fail [device_id from step 1] What messages were displayed on the console? ____________________________________________________________ ____________________________________________________________ ____________________________________________________________
NetApp University - Do Not Distribute E6-12 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION If the disk fail command is used without options, the disk is first marked as ``prefailed.'' If an appropriate spare is available, it will be selected for Rapid RAID Recovery. In that process, the prefailed disk is copied to the spare. At the end of the copy process, the prefailed disk is removed from the RAID configuration. The filer then spins the disk down so it can be removed from the shelf. (The disk swap command must be used when physically removing SCSI disks.) The disk being removed is marked as broken,'' so that if it remains in the disk shelf, it will not be used by the filer as a spare disk. If the disk is moved to another filer, that filer will use it as a spare. This is not a recommended course of action, as the reason that the disk was failed might have been because it needed to be replaced.
4. What would happen if you failed a disk in aggr1 with no hot spare available? ___________________________________________________________ ___________________________________________________________
5. What is the difference between the information provided by the vol status command and the sysconfig command? ___________________________________________________________ ___________________________________________________________ ___________________________________________________________
6. Make sure that the failed (broken) disk is available for use later on in the class by entering the following at the storage system console: Netapp> priv set advanced Netapp> disk unfail [device_id from step 1] Netapp> priv set 7. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E6-13 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 8: ADDING DISKS TO AN AGGREGATE OVERVIEW This task demonstrates how to add disks to an existing aggregate using the CLI.
START OF TASK STEP ACTION 1. Access the storage system console. To determine the availability of hot spares, enter: vol status -r 2. To view automatic disk selection, enter: NetApp> aggr add aggr1 n 1 What output is returned on the console? ___________________________________________________________ NOTE: The above command does not add a disk to the aggregate aggr1.
3. Copy the returned command and enter it at the storage system prompt. View the output.
4. To verify the addition of two disks, enter: sysconfig r
5. To view the aggregates options, enter: NetApp> aggr options aggr1
6. To change the aggr1 RAID type to double parity, at the storage system console, enter: NetApp> aggr options aggr1 raidtype dp
7. Note that there are no volumes created in this aggregate yet. You will do that in the next module. However, if you had created a volume for this aggregate, you could enter the following at the storage system console to view the activity for the RAID-type change. NetApp> sysstat 1 The output from this command would show two to three times more reads than writes. The system is computing the double parity and writing it to the dp disk. Press Crtl-C to stop the display.
NetApp University - Do Not Distribute E6-14 Data ONTAP 7.3 Fundamentals: Physical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 8. To change the aggr1 RAID type to RAID 4, at the storage system console, enter: NetApp> aggr options aggr1 raidtype raid4 This command aborts the conversion to RAID-DP. It also leaves your system with one non-zero spare. You can proceed to the next exercise with a dirty spare or you can execute the following command: NetApp> disk zero spares 9. Task complete. END OF TASK NetApp University - Do Not Distribute L o g i c a l
S t o r a g e NetApp University - Do Not Distribute
E7-1 Data ONTAP 7.3 Fundamentals: Logical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 7: LOGICAL STORAGE MANAGEMENT Exercise Module 7: Logical Storage Management Estimated Time: 40 minutes
EXERCISE: CONFIGURING VOLUMES, QTREES, AND QUOTAS OVERVIEW The purpose of this exercise is to give you an opportunity to create traditional and flexible volumes on the storage system, and create a qtree and define quotas for those volumes. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Create a traditional volume Create a flexible volume Destroy a volume Create a qtree Define and manage quotas on a storage system TIME ESTIMATE 40 minutes NetApp University - Do Not Distribute
E7-2 Data ONTAP 7.3 Fundamentals: Logical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 36 2008 NetApp. All rights reserved. Check Your Understanding How does a traditional volume compare to an aggregate? What is the difference between a traditional volume and a flexible volume? What is the name of the root volume?
NetApp University - Do Not Distribute
E7-3 Data ONTAP 7.3 Fundamentals: Logical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CREATING A TRADITIONAL VOLUME OVERVIEW This task demonstrates how to create a traditional volume using FilerView. For the purposes of this exercise, the system console is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system.
START OF TASK STEP ACTION 1. Access FilerView for your storage system by entering: http://[IP address]/na_admin 2. In the FilerView left navigation pane under Volumes, click Add to launch the Volume Wizard.
3. Create a traditional volume.
4. You can name this volume anything except vol0. Why? ___________________________________________________________
5. Review the language choices, but accept the default, POSIX.
6. We want to conserve disks. What type of parity uses a single-parity disk? ___________________________________________________________
7. Use the ? character to determine the minimum RAID group size for your system and enter that number. (Three is the minimum for all systems.)
8. Use the automatic option. What safeguard is built into the FilerView automatic disk selection? ___________________________________________________________
(Hint: use the help option.)
9. What disk size options do you have? ___________________________________________________________ Select any size.
NetApp University - Do Not Distribute
E7-4 Data ONTAP 7.3 Fundamentals: Logical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 10. Select the minimum number of disks for this volume type and parity choice. ______________
11. Review your changes and commit them if they are correct. If necessary, how would you make a correction? ____________________________________________________________
12. Use the Volumes > Manage selection to review your changes.
13. Using the filter, display the different views of your volumes.
14. Task complete. Proceed to the next task.
END OF TASK
TASK 2: CREATE A FLEXIBLE VOLUME OVERVIEW This task demonstrates how to create and resize a flexible volume using FilerView.
START OF TASK STEP ACTION 1. Access FilerView for your storage system.
2. In the FilerView left navigation pane under Volumes, click Add to launch the Volume Wizard.
3. You can name this volume anything except vol0. Why? ___________________________________________________________
For the purposes of this task, name your volume FLEXSAN. You will use this flexible volume when we get to the SAN module.
NetApp University - Do Not Distribute
E7-5 Data ONTAP 7.3 Fundamentals: Logical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. Accept the default, POSIX, as the language choice.
5. There is no parity option offered. Why? ___________________________________________________________
6. Select an online aggregate (such as aggr1) from the previous exercise. ______________
7. If we need 100 MB of available data storage in this volume, how large should you set the total volume size? _______________ 8. Select the space guarantee that is the equivalent to a traditional volume. ___________________________________________________________
Select any size. 9. Review your changes and commit them if they are correct. If necessary, how would you make a correction? ____________________________________________________________
10. When you have finished, review the results in the Manage Volumes display. Did you calculate correctly? Do you have 100 GB available?
11. Using the filter, observe the different views of your volumes. 12. In the management view, notice that the name of your new volume is a link. What happens when you click this link? __________________________________________________________
13. Click Modify and review the Modify Volume Wizard. You may make changes or simply review the options. Return to the Volume Management window and select the volume link again. 14. Select Show Aggregate and observe some of the things you can change. Return to the Aggregate Properties window. 15. Return to the Volumes Management window either by selecting Show Volume on the Aggregate Properties window, or from FilerView. 16. Repeat this task and create another flexible volume named FLEXTREE in aggr1. 17. Task complete. Proceed to the next task.
END OF TASK NetApp University - Do Not Distribute
E7-6 Data ONTAP 7.3 Fundamentals: Logical Storage Management 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: DESTROYING A VOLUME OVERVIEW This task demonstrates how to destroy a volume using FilerView.
START OF TASK STEP ACTION 1. Access FilerView. 2. Go to Manage Volumes. 3. What must be done before a volume or aggregate can be destroyed? ___________________________________________________________
4. Select the traditional volume you have already created and try to destroy it without taking it offline. What happens? ___________________________________________________________ 5. Destroy the traditional volume, making sure not to destroy the FLEXSAN volume, which will be used in the SAN module, or FLEXTREE, which will be used in the next module. 6. Try to destroy the root volume. What happens? ___________________________________________________________
7. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute C I F S NetApp University - Do Not Distribute
E8-1 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 8: CIFS Exercise Module 8: CIFS Estimated Time: 20 minutes
EXERCISE: CONFIGURING CIFS, CREATING AND MAPPING SHARES OVERVIEW The purpose of this exercise is to give you an opportunity to configure a Common Internet File System (CIFS) on a storage system. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Verify CIFS setup Create a Windows domain user View and create shares using the CLI Create shares using Windows Computer Management Map a drive Modify user permissions Display CIFS sessions Terminate CIFS sessions TIME ESTIMATE 45 minutes NetApp University - Do Not Distribute
E8-2 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 38 2008 NetApp. All rights reserved. Check Your Understanding What is the purpose of CIFS? In what server environments can a storage system participate? What are the steps to set up CIFS?
NetApp University - Do Not Distribute
E8-3 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: VERIFYING CIFS SETUP OVERVIEW This task demonstrates how to verify CIFS setup on a storage system. For the purposes of this exercise, the system console is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system.
START OF TASK STEP ACTION 1. At the storage system prompt, test the CIFS setup using the following commands: NetApp> cifs testdc NetApp> cifs domaininfo List preferred DCs: ____________________________________________________________
List favored DCs: ____________________________________________________________
List other DCs: ___________________________________________________________
2. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute
E8-4 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: CREATING A WINDOWS DOMAIN USER OVERVIEW This task demonstrates how to create a new Windows domain user.
START OF TASK STEP ACTION 1. Open Active Directory by clicking: Start Programs Administrative Tools Active Directory Users and Computers If the Active Directory Users and Computers option is not present, check with your instructor. Click Action, select New, and then select User. Create UserX, where X is the number of your storage system. (For example, if your storage system name is Storage System10, create User10.) NOTE: Do not create UserX without replacing the X with a number. If you are not sure what user to create, ask your instructor.
Click Next, and then set the user password the same as the user name.
END OF TASK
NetApp University - Do Not Distribute
E8-5 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: VIEWING SHARES AND CREATING A NEW SHARE USING THE CLI OVERVIEW This task demonstrates how to view shares and create a new share from the CLI.
START OF TASK STEP ACTION 1. View the shares on the storage system by entering the following command: NetApp> cifs shares Name Mount Point Description ---- ----------- ----------- ETC$ /etc Remote Administration BUILTIN\Administrators / Full Control HOME /vol/vol0/home Default Share everyone / Full Control C$ / Remote Administration BUILTIN\Administrators / Full Control These are the default shares. 2. Open Computer Management by clicking: Start Programs Administrative Tools Computer Management 3. Click Action, and then select Connect to another computer. Highlight the name of your storage system. 4. In the left pane, click: System Tools Shared folders Shares 5. Observe the list of currently shared directories on the right. 6. Create a qtree named cifs_tree in vol0 and change security to ntfs by entering: NetApp> qtree create /vol/vol0/cifs_tree NetApp> qtree security /vol/vol0/cifs_tree ntfs 7. View the qtree information. (You might see other qtrees from previous exercises.) NetApp>qtree status Volume Tree Style Oplocks Status ------ -------- ----- -------- --------- FLEXTREE mixed enabled normal vol0 mixed enabled normal vol0 cifs_tree ntfs enabled normal
NetApp University - Do Not Distribute
E8-6 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 8. Access the storage system console and enter the following: NetApp> cifs shares add cifs_tree /vol/vol0/cifs_tree Answer yes to the following question: The share name 'cifs_tree' will not be accessible by some MS- DOS workstations. Are you sure you want to use this share name? [n]:Y 9. To view the new share, enter: NetApp> cifs shares cifs_tree Name Mount Point Description ---- ----------- ----------- cifs_tree /vol/vol0/cifs_tree everyone / Full Control 10. To add a comment to the share, enter: NetApp> cifs shares -change cifs_tree -comment 'Share created via CLI'
11. To view the change to the share, enter: NetApp> cifs shares cifs_tree Name Mount Point Description ---- ----------- ----------- cifs_tree /vol/vol0/cifs_tree Share created via CLI everyone / Full Control 12. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute
E8-7 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 4: CREATING A NEW SHARE WITH COMPUTER MANAGEMENT OVERVIEW This task demonstrates how to create a new share with Windows Computer Management.
START OF TASK STEP ACTION 1. Right-click the Shares folder, and then select New File Share.
2. Enter the following information: Folder to share: C:\vol\FLEXTREE Share name: FLEXTREE Share Description: Share for FLEXTREE Click Next to continue.
3. Select the option, Customize share and folder permissions, and then click Custom.
NetApp University - Do Not Distribute
E8-8 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. Add UserX from the previous exercise with Full Control.
Click OK. 5. Click Finish. Notice that the selection is displayed in the Share Permissions window. 6. Select No to create another share. 7. Notice that the new shared directory, FLEXTREE, is displayed in the shared directories for the storage system. 8. Close the Computer Management dialog box. 9. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute
E8-9 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 5: MAPPING THE NEW SHARES TO A DRIVE LETTER OVERVIEW This task demonstrates how to map new shares to a drive letter.
START OF TASK STEP ACTION 1. From the Windows desktop, right-click My Network Places, and then select Map Network Drive. 2. Enter the following information in the appropriate fields: Drive: <an unused letter> Path: \\Storage_System_name\FLEXTREE Click Finish to accept the changes and close the window. 3. Map the CLI share to a different drive letter. 4. Task complete. Proceed to the next task.
END OF TASK
TASK 6: USER PERMISSIONS OVERVIEW This task demonstrates how to modify permissions.
START OF TASK STEP ACTION 1. Access the storage system console and enter the following: NetApp> cifs access FLEXTREE userX rwx where userX is the user created previously 2. To verify the result, on the console, enter: cifs shares 3. To view the access change in Windows Computer Management, select Start Programs Administrative Tools Computer Management 4. Select your storage system. 5. Select System Tools Shared folders Shares. 6. Select FLEXTREE. 7. Click Properties Permissions. 8. Note that the permission is set to Full Control. NetApp University - Do Not Distribute
E8-10 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 9. Go back to step 1 and enter the following: NetApp> cifs access FLEXTREE userX read 10. Enter: cifs shares Observe the effect. 11. Use Windows Computer Management to review the permissions for UserX on FLEXTREE. 12. Task complete. Proceed to the next task.
END OF TASK
TASK 7: DISPLAYING CIFS SESSIONS OVERVIEW This task demonstrates how to display CIFS sessions on a storage system.
START OF TASK STEP ACTION 1. Open Computer Management. 2. Select your storage system. 3. Select System Tools Shared Folders Sessions. 4. Review the displayed information. 5. Open the storage system console. 6. Enter: cifs sessions 7. Compare the results of step 6 with the results of step 3. 8. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute
E8-11 Data ONTAP 7.3 Fundamentals: CIFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 8: TERMINATING CIFS SESSIONS OVERVIEW This task demonstrates how to terminate a CIFS session on a storage system.
START OF TASK STEP ACTION 1. Open Computer Management. 2. Select your storage system. 3. Select System Tools Shared Folders Sessions. 4. Right-click a session, and then select Close Session. 5. Close the dialog boxes and Windows. 6. Go to the storage system console. 7. Enter: cifs sessions Observe the effect of terminating the session. 8. Enter: cifs terminate 9. Observe the effect of this command and compare it with step 4. 10. To restart the CIFS service, on the storage system console, enter: cifs restart 11. When comparing the results of step 4 with the results of step 8, what is the difference? ____________________________________________________________
12. Task complete.
END OF TASK
NetApp University - Do Not Distribute N F S NetApp University - Do Not Distribute E9-1 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 9: NFS Exercise Module 9: NFS Estimated Time: 45 minutes
EXERCISE: CONFIGURING NFS, CREATING AND MOUNTING EXPORTS OVERVIEW The purpose of this exercise is to give you an opportunity to configure Network File System (NFS) on a storage system. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: License and mount a volume Edit and modify the /etc/exports file using the CLI Configure the /etc/exports file using FilerView Create an export with vi TIME ESTIMATE 45 minutes NetApp University - Do Not Distribute E9-2 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 30 2008 NetApp. All rights reserved. Check Your Understanding What does NFS stand for? What is the format for the /etc/exports file? What is the purpose of export options? What command would you use to view what is exported from the storage appliance?
NetApp University - Do Not Distribute E9-3 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: LICENSING NFS AND MOUNTING A VOLUME OVERVIEW This task demonstrates how to start the NFS daemon on a storage system. For the purposes of this exercise, the system console is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system.
START OF TASK STEP ACTION 1. Telnet to your assigned storage system. 2. At the storage system console, license the NFS protocol by entering: NetApp> license NetApp> license add abcdefg (Obtain the license code from your instructor) View the newly added license by entering: NetApp> license 3. Verify the content of the /etc/exports file by entering: NetApp>rdfile /etc/exports 4. At the storage system console, view the exported file systems by entering: NetApp> exportfs Notice that just by licensing NFS, all volumes and qtrees in the /etc/exports file have been exported. 5. Telnet to the adminhost and create a directory for your filer. In the example below, use your actual filer name for filer_name. Do not create a directory with the name filer_name. # mkdir /mnt/filer_name 6. Create the vol0 directory under the filer_name directory created in step 5 by entering: # mkdir /mnt/filer_name/vol0 7. Mount the filers root volume to the directory you just created and view the contents. When mounting the filer, use the filer_name or IP address. # mount IP_address:/vol/vol0/ /mnt/filer_name/vol0 # cd /mnt/filer_name/vol0 You should now be able to view the directory structure of your storage appliance by entering: # ls al 8. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E9-4 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: EDITING AND MODIFYING THE /ETC/EXPORTS FILE USING THE CLI OVERVIEW This task demonstrates how to configure an export on a storage system using the CLI. For the purposes of this exercise, the system console is the Data ONTAP simulator running in a Linux virtual environment.
START OF TASK STEP ACTION 1. Create a qtree named nfs_tree1 from the filers console by entering: NetApp>qtree create /vol/vol0/nfs_tree1 View the qtree by entering: NetApp>qtree status 2. Export the qtree using the rdfile and exportfs commands. In the example below, use your actual adminhost name instead of UNIX_adminhost. (Do not type UNIX_adminhost.) NetApp>rdfile /etc/exports NetApp>wrfile /etc/exports Copy and paste all the exports from the CLI window, and then add the following line: /vol/vol0/nfs_tree1 -rw=UNIX_adminhost,root= UNIX_adminhost NOTE: Add a carriage return <Enter> after the nfs_tree1 line, and then press Ctrl-C. The following error message is displayed: read: error reading standard input: Interrupted system call NetApp>exportfs a To ensure that the qtree was exported, at the storage system prompt, enter: NetApp>exportfs 3. Telnet to the UNIX adminhost, and then create and mount the qtree by entering: # mkdir /mnt/filer_name/nfs_tree1 # mount IP_address:/vol/vol0/nfs_tree1 /mnt/filer_name/nfs_tree1 # cd /mnt/filer_name/nfs_tree1 4. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E9-5 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: CONFIGURING THE /ETC/EXPORTS FILE USING FILERVIEW OVERVIEW This task demonstrates how to configure an export on a storage system using FilerView. For the purposes of this exercise, the system console is the Data ONTAP simulator running in a Linux virtual environment.
START OF TASK STEP ACTION 1. At the storage system console, use the following qtree create command to create a qtree named nfs_tree2. NetApp> qtree create /vol/vol0/nfs_tree2 2. Use FilerView to add an export. http://IP_address_of_storage_appliance/na_admin Navigate to NFS and click Add Export.
NetApp University - Do Not Distribute E9-6 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION Enable read-write and root access.
NetApp University - Do Not Distribute E9-7 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION Enter /vol/vol0/nfs_tree2 and click Next.
Click Add.
NetApp University - Do Not Distribute E9-8 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION Enter the name of the UNIX adminhost and click OK.
The Adminhost is added. Click Next.
NetApp University - Do Not Distribute E9-9 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION Click Add.
Enter the name of the UNIX adminhost and click OK.
NetApp University - Do Not Distribute E9-10 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION The UNIX adminhost is added. Click Next.
View the summary for accuracy, and then click Commit.
NetApp University - Do Not Distribute E9-11 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION Click Close.
NetApp University - Do Not Distribute E9-12 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION The NFS export wizard automatically exports the volume/qtree when you are finished. Use the exportfs command from the filer command line to view the export by entering: NetApp> exportfs
3. Mount the export through the UNIX adminhost. # mkdir /mnt/filer_name/nfs_tree2 # mount IP_address:/vol/vol0/nfs_tree2 /mnt/filer_name/nfs_tree2 # cd /mnt/filer_name/nfs_tree2 #ls -a
END OF TASK
NetApp University - Do Not Distribute E9-13 Data ONTAP 7.3 Fundamentals: NFS 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 4: CREATING AN EXPORT WITH VI OVERVIEW This task demonstrates how to configure an export on a storage system from vi. For the purposes of this exercise, the system console is the Data ONTAP simulator running in a Linux virtual environment.
START OF TASK STEP ACTION 1. Access the storage system console and create a qtree in vol0 named nfs_tree3 by entering: Netapp> qtree create /vol/vol0/nfs_tree3 2. From the adminhost, verify that the present working directory is the storage systems etc directory on the root volume. # pwd If this is not the case, enter the following command: # cd /mnt/filer_name/vol0/etc Now edit the filers exports file using the following command: # vi exports Add the following line to the exports file: /vol/vol0/nfs_tree3 -rw=<UNIX Admin host>,root=<UNIX Admin host> Save and exit /etc/exports using the following vi commands: <Esc> :wq or :wq! 3. Access the storage system console to export the new entry. 4. Enter the following command: NetApp> exportfs a 5. Mount the export through the UNIX adminhost by entering: # mkdir /mnt/filer_name/nfs_tree3 # mount IP_address:/vol/vol0/nfs_tree3 /mnt/filer_name/nfs_tree3 # cd /mnt/filer_name/nfs_tree3 #ls -a 6. Task complete.
END OF TASK
NetApp University - Do Not Distribute Q t r e e s NetApp University - Do Not Distribute E10-1 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 10: QTREES AND SECURITY STYLES Exercise Module 10: Qtrees and Security Styles Estimated Time: 60 minutes
EXERCISE: QTREES AND SECURITY STYLES OVERVIEW The purpose of this exercise is to give you an opportunity to create a qtree and define quotas for that qtree. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Create a qtree Define and manage quotas on a storage system Create and manage a quota Modify the /etc/quotas file and implement the quota changes Generate a quota report Practice creating qtrees and quotas REQUIRED HARDWARE, SOFTWARE, AND TOOLS HardwareAny storage system SoftwareData ONTAP 7.3 TIME ESTIMATE 60 minutes NetApp University - Do Not Distribute E10-2 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 38 2008 NetApp. All rights reserved. Check Your Understanding What is a qtree? What are security styles? Does a security style prevent protocols from accessing the volume or qtree? What are the functions of a quota? Name three quota targets.
NetApp University - Do Not Distribute E10-3 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CREATING AND MANAGING A QUOTA In the following task, you should continue to use the aggregate, flexible volume, and qtrees from previous exercises. START OF TASK STEP ACTION 1. Verify that the qtrees tree1 and tree2 exist: FilerView > Volumes > Manage > Qtrees > Manage If these qtrees do not exist, create them: FilerView > Volumes > Manage > Qtrees > Manage > Qtrees > Add 2. Use FilerView to share tree1: FilerView > CIFS > Shares > Add a Share Share Name: tree1 Mountpoint: /vol/vol0/tree1 Share Description: Quota lab tree Max. Users: Leave blank Force Group: Leave blank Click Add. 3. Map the storage system root volume to your student workstation. The root volume is shared by default. My Computer > Tools > Map Network Drive Drive: R (choose a letter not in use) Folder: \\<IP of Storage System>\C$ Uncheck Reconnect at login. Click OK. 4. From the client system, edit the /etc/quotas file using wordpad. Add the following: /vol/vol0/tree1 tree 10k 5 2k * user - - - NOTE: For this task, we are intentionally using small restrictions. 5. Use FilerView to enable quotas: FilerView > Volumes > Quotas > Manage Check the box for vol0. On The message, Enable quotas on Selected Volume(s)? is displayed. OK Alternately, you can return to the storage system CLI and turn on quotas for the volume using the quota on nfsflex command.
NetApp University - Do Not Distribute E10-4 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 6. After enabling quotas, verify the status. What do you see?
Alternately, you can return to the storage system CLI and issue the quota status command. Initializing, scanning (0% done) 7. Use FilerView to view your changes to the /etc/quotas file. FilerView > Volumes > Quotas > Manage > Edit Rules 8. Return to the client. Map tree1 to your student workstation. My Computer > Tools > Map Network Drive Drive: Q (choose a letter not in use) Folder: \\<IP of Storage System>\tree1 Uncheck Reconnect at login. Connect using a different user name. Username: <domain>\administrator Password: <password> Click OK.
9. Create at least six small files in the tree1 directory. (Hint: You can do this easily by copying files from the local C: drive to the mapped drive.) 10. When you exceed the soft limit for the file quota, what do you see on the client?
Cannot copy <filename>: There is not enough free disk space. Delete one or more files to free disk space and then try again. 11. What message appears on the storage system console? FilerView > Filer > Syslog Messages
Fri Oct 20 12:24:17 EST [wafl.quota.qtree.exceeded:notice]: tid 3: tree quota exceeded on volume vol_quotaslab. Additional warnings will be suppressed for approximately 60 minutes or until a 'quota resize' is performed. Fri Oct 20 12:25:54 EST [quota.softlimit.exceeded:notice]: Threshold exceeded for tree 3 on volume vol_quotaslab.
END OF TASK
NetApp University - Do Not Distribute E10-5 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: PRODUCING A QUOTA REPORT START OF TASK STEP ACTION 1. Display a list of quotas: FilerView > Volumes > Quotas > Report From the storage system CLI, issue the command quota report. 2. How much disk space is being used by all users on your storage system? ___________________________________________________________
3. How many files were created on your storage system for tree1? ___________________________________________________________
END OF TASK
TASK 3: MODIFYING THE /ETC/QUOTAS FILE AND IMPLEMENTING QUOTA CHANGES
START OF TASK STEP ACTION 1. From the client system, edit the /etc/quotas file. Make the modifications shown in bold. /vol/vol0/tree1 tree 10k 2048 4k * user - - -
2. Do your changes take effect automatically? ____________________________________________________________
3. Use FilerView to issue the resize command. FilerView > Volumes > Quotas > Manage > Check vol0 and click Resize. Alternately, use the quota resize <vol> command to implement changes.
4. Verify that the new quota rules are in effect before moving on to the next step. FilerView > Volumes > Quotas > Manage > Report
NetApp University - Do Not Distribute E10-6 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 5. Use FilerView to edit the quotas for a qtree. FilerView > Volumes > Quotas > Manage > Edit Rule Are you able to do this? ___________________________________________________________
6. The quota report command provides more detail than FilerView. Read the manual for the quota report command and give a brief description of the following arguments:
7. Continue to review the manual page for the quota command. What is the purpose of the logmsg sub-command? ____________________________________________________________
END OF TASK
TASK 4: PRACTICE CREATING QTREES AND QUOTAS START OF TASK STEP ACTION 1. Create two qtrees in the nfsflex volume using either FilerView or the CLI. Name the first qtree cobra and the second qtree firebird. The following is an example of using the CLI to create qtrees: system> qtree create /vol/nfsflex/cobra system> qtree create /vol/nfsflex/firebird 2. View the qtrees you just created. What is the security style? ___________________________________________________________ NetApp University - Do Not Distribute E10-7 Data ONTAP 7.3 Fundamentals: Qtrees and Security Styles 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 3. Edit the correct file to give the cobra qtree a size limit of 50 M with a threshold of 45 M, and the firebird qtree a limit of 20 M with a threshold of 18 M, and limit the files on firebird to 10. Use tree for the type on both quotas. What file did you edit? ___________________________________________________________
Record the entries you create. # TARGET TYPE DISK FILE THRESHOLD SDISK SFILE
4. How did you edit the file? ___________________________________________________________
5. What does the entry look like that gives the /vol/nfsflex flexible volume a default quota of 150 M of disk space with a threshold of 145 M for any user? # TARGET TYPE DISK FILE THRESHOLD SDISK SFILE
6. Before enabling quotas, set the interval for the log to two hours on /vol/nfsflex/eng by entering: system> quota logmsg on /vol/nfsflex 120 7. What is the command to enable quotas on the /vol/nfsflex? ___________________________________________________________
8. What is the command to view the threshold for all quotas? ___________________________________________________________
9. Change the quotas for the qtree firebird to the same settings as cobra. When you change the size of a quota, what command do you enter for changes to take effect? ___________________________________________________________
END OF TASK NetApp University - Do Not Distribute S A N NetApp University - Do Not Distribute E11-1 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 11: SAN Exercise Module 11: SAN Estimated Time: 45 minutes
EXERCISE: CREATING ISCSI LUNS FOR WINDOWS OVERVIEW The purpose of this exercise is to give you an opportunity to set up an iSCSI LUN for Windows on a storage system. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Enable iSCSI services on the storage system Configure iSCSI for Windows Create a LUN on the storage system Access the LUN from Windows TIME ESTIMATE 45 minutes NetApp University - Do Not Distribute E11-2 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 40 2008 NetApp. All rights reserved. Check Your Understanding What are the two protocols NetApp supports in the SAN environment? What are the functions of a LUN? What are the methods of creating a LUN? Why would you use SnapDrive in a SAN environment?
NetApp University - Do Not Distribute E11-3 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: ENABLING ISCSI SERVICES OVERVIEW This task demonstrates how to enable iSCSI services on a storage system. For the purposes of this exercise, the storage system is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system.
START OF TASK STEP ACTION 1. From your workstation: a. Open a telnet session to the storage system using the storage system IP address or name. You can use TeraTerm Pro or PuTTY to open a telnet session. b. Log in as root. NOTE: Verify with your instructor the password for root. 2. You must first license iSCSI before enabling it. To view the current license, at the prompt enter: license The Data ONTAP simulator comes with iSCSI licensed. If it is not, ask your instructor for a valid license code. 3. To configure and manage iSCSI, use the iscsi command. To determine if the iSCSI service is running, at the prompt enter: iscsi status.
4. If the service is not running, enter: iscsi start Then use the iscsi status command to verify that the service is running. 5. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E11-4 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: CONFIGURING ISCSI ON WINDOWS OVERVIEW This task demonstrates how to configure the Windows iSCSI software initiator. START OF TASK STEP ACTION 1. The Microsoft iSCSI software initiator is already installed in your Windows client environment. You can locate the software initiator at: http://go.microsoft.com/fwlink/?LinkId=44352 After it is installed, open the Windows Control Panel: Start > Control Panel 2. From the Control Panel, open the Microsoft iSCSI Initiator. The iSCSI Initiator Properties dialog box is displayed.
NetApp University - Do Not Distribute E11-5 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 3. Select the Discovery tab and then click Add. Enter the IP address of your storage systems ns0 interface. Leave the default port and then click OK.
NetApp University - Do Not Distribute E11-6 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. From the iSCSI Initiator Properties dialog box, select the Targets tab. Make sure you can see the simulators iqn WWNN. If you cant, click Refresh. After the simulators iqn appears, select it, and then click Log On.
NetApp University - Do Not Distribute E11-7 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 5. Select the check box, Automatically restore this connection when the system boots.. Enabling this option places this connection in the Persistent Targets tab in the iSCSI Initiator Properties dialog box. Click OK.
6. Click OK again to close the iSCSI Initiator Properties dialog box. 7. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E11-8 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: CREATING A LUN OVERVIEW This task demonstrates how to create a LUN using the system console lun setup command. START OF TASK STEP ACTION 1. From your workstation: a. Open a telnet session to the storage system using the storage system IP address or name. You can use TeraTerm Pro or PuTTY to open the telnet session. b. Log in as root. NOTE: Verify with your instructor the password for root. 2. To view the current LUNs on the simulator, enter: lun show - m. (There probably are no LUNs to view.) 3. You can create LUNs several different ways: FilerView lun create and lun setup commands SnapDrive We will be using the lun setup command for this exercise. At the prompt, enter: lun setup The lun setup wizard begins. 4. The LUN wizard asks if you want to create a LUN. Enter Y. 5. The next question is regarding the LUNs multiprotocol type. Since we are going to use this LUN in a Windows environment, enter: windows 6. The wizard requests the LUN path. You should place the LUN on the FlexSAN volume you created earlier by entering: /vol/FLEXSAN/lunSAN NOTE: The name of the new LUN is lunSAN. 7. The wizard asks if you want to turn on space reservation for the LUN. Enter Y. 8. The wizard requests the LUN size. Because you are working on the simulator, space is an issue. For this exercise, we will create a very small LUN (32 MB). Enter 32m. 9. The wizard asks you to add a comment to describe the LUN. Type any comment and press Enter.
10. The wizard asks you for an initiator group or igroup. You can type ? to list the NetApp University - Do Not Distribute E11-9 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION current igroup or enter the name of an existing igroup to map the new LUN to. If this is a new simulator, there may not be any existing igroups. Enter: myigroup 11. An igroup not only contains the initiators, but it also defines the protocol that will be used to access the LUN. The wizard asks you if you will be grouping FCP initiators or iSCSI initiators in this igroup. Enter: iscsi 12. The wizard requests the iqn of your initiators. You can type ? to list the current initiators connected to the simulator. (This is why you performed Task 2 before creating your LUN.) Enter: ? 13. The iqn WWNN for your Microsoft Software iSCSI initiator appears. Enter the iqn WWNN. NOTE: The node name begins with iqn.1991-05.microsoft.com 14. Press Enter again to finish adding initiators to this igroup. 15. The wizard requests the OS type for the igroup. Enter: windows 16. Finally, the wizard requests the LUN ID for the new LUN. Enter: 0 17. The wizard lists all previous configurations for the new LUN. At this point, the LUN is not yet created. The wizard then asks you whether you want to accept these configurations. Enter Y. 18. The last question the wizard asks is whether you want to create another LUN. Enter N. 19. The LUN is now created. To verify the LUN creation, enter: lun show -m 20. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E11-10 Data ONTAP 7.3 Fundamentals: SAN 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 4: ACCESSING THE LUN OVERVIEW This task demonstrates how to access your newly created LUN from Windows. START OF TASK STEP ACTION 1. From the Windows client environment, open Windows Explorer. Right-click My Computer (in the tree pane) and select Manage. The Computer Management MMC appears. 2. Under the Storage node, click Disk Management. 3. A list of all the present disks associated with this system is displayed. Click the Action menu item and then Rescan Disks to make sure your new LUN appears properly. The LUN should appear as an unallocated disk. 4. Select the LUN disk and click: Action > All Tasks > Initialize Disk 5. The Initialize Disk dialog box appears. Make sure the disk check box is selected, and then click OK. The disk is now online. 6. Right-click the unallocated disk. To start the wizard, select New Partition from the drop-down menu. 7. Click Next. 8. You are going to create a new primary partition, so accept the default and then click Next. 9. In the Partition Size step, accept the default by clicking Next. 10. In the Assign Drive Letter or Path step, accept the default by clicking Next. 11. In the Format Partition step, accept the default by clicking Next. 12. Accept the wizard configurations by clicking Finish. The LUN will be ready to use after a moment or two. 13. Open up Windows Explorer, do you see your new drive? _______________ Can you create files in it? _______________ 14. Task complete.
END OF TASK
NetApp University - Do Not Distribute S n a p s h o t
C o p i e s NetApp University - Do Not Distribute E12-1 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 12: SNAPSHOT COPIES Exercise Module 12: Snapshot Copies Estimated Time: 45 minutes
EXERCISE: MANAGING SNAPSHOT COPIES OVERVIEW The purpose of this exercise is to give you the opportunity to create and manage Snapshot copies, which are a key feature of the WAFL file system. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Create Snapshot copies Restore Windows files from a Snapshot copy Restore UNIX files from a Snapshot copy Mange Snapshot copies from FilerView Use SnapRestore to restore an entire volume TIME ESTIMATE 45 minutes NetApp University - Do Not Distribute E12-2 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 49 2008 NetApp. All rights reserved. Check Your Understanding What is a Snapshot copy? What are some of the NetApp products that are based on Snapshot technology? What are some of the Snapshot commands? What is the Snapshot schedule syntax?
NetApp University - Do Not Distribute E12-3 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CREATING SNAPSHOT COPIES OVERVIEW This task demonstrates how to create a Snapshot copy, list existing Snapshot copies, and delete a Snapshot copy. For the purposes of this exercise, the system console is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system.
START OF TASK STEP ACTION 1. From FilerView, view the existing Snapshot copies. FilerView > Volumes > Snapshots > Manage 2. To choose a FLEXTREE volume, from the drop-down menu, select Change View, and then click View. 3. Click Add Snapshot, or navigate to: FilerView > Volumes > Snapshot > Add 4. For the volume, choose FLEXTREE. For the Snapshot Name, use snap1. Click Add. 5. What are the results? ____________________________________________________________
6. Return to FilerView > Volumes > Snapshots > Manage. Can you find the listing for snap1? _______________
7. Repeat the process to manually create a Snapshot copy. Name this Snapshot copy snap2. 8. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute E12-4 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: RESTORING A WINDOWS FILE FROM A SNAPSHOT COPY OVERVIEW This task demonstrates how to create a Snapshot copy, list existing Snapshot copies, and delete a Snapshot copy.
START OF TASK STEP ACTION 1. From the Windows environment, click Start > Run. In the textbox, enter: \\ip_address_of_storage_system\C$ Click OK. Navigate to the /etc directory. Locate the cifsconfig_share.bak file and delete it. 2. Navigate to the ~snapshot directory and locate the file in the /etc directory. If the ~snapshot directory is not displayed, at the console prompt, enter: options cifs.show_snapshot on Copy the file back to its original location at /etc/cifsconfig_share.bak. 3. Task complete. Proceed to the next task.
END OF TASK
TASK 3: RESTORING A UNIX FILE FROM A SNAPSHOT COPY OVERVIEW This task demonstrates how to create a Snapshot copy, list existing Snapshot copies, and delete a Snapshot copy. For the purposes of this exercise, the UNIX Admin host could be the Linux virtual machine or a standalone machine. Consult your instructor if you have any questions.
START OF TASK STEP ACTION 1. Telnet to the <UNIX Admin host>. 2. Log in to <UNIX Admin host> as root using the password provided by your instructor. 3. Navigate to the storage system /etc directory and delete the hosts.bak file: # cd /mnt # mkdir <storage_name> # cd /mnt/<storage_name> NetApp University - Do Not Distribute E12-5 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION # mkdir vol0 # mount <storage_system_ip>:/vol/vol0 /mnt/<storage_name>/vol0 # cd /mnt/<storage_name>/vol0/etc # pwd /mnt/<storage_name>/vol0/etc # rm hosts.bak
NOTE: If you cannot find the hosts.bak file, you are probably in the wrong directory. 4. Change directory (cd) to the .snapshot directory at the root of the mount point: # cd /mnt/<storage_name>/vol0/.snapshot/snap1/etc # pwd /mnt/filer_name/vol0/.snapshot/vol0snap /etc # cp hosts.bak /mnt/<storage_name>/vol0/etc # cd /mnt/<storage_name>/vol0/etc # ls l hosts.bak 5. Task complete. Proceed to the next task.
END OF TASK
TASK 4: MANAGING SNAPSHOT COPIES OVERVIEW This task demonstrates how to schedule Snapshot copies using FilerView, and how to use FilerView to monitor disk usage.
START OF TASK STEP ACTION 1. From FilerView, view the existing Snapshot copies: Filerview > Volumes > Snapshots > Configure 2. Configure hourly Snapshot copies for the FLEXTREE volume to occur at 10 a.m., 12 p.m., 2 p.m., and 5 p.m. Click Apply. 3. Do hourly Snapshot copies occur every hour? ___________________________________________________________
NetApp University - Do Not Distribute E12-6 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. How can you view the Snapshot copy schedule for the root volume? ___________________________________________________________
Use the drop-down menu to choose the volume, and then scroll down to see the settings. 5. Can you change the percentage for the Snapshot reserve? ___________________________________________________________
6. From FilerView, view the available and used space in your volumes and aggregates: FilerView > Volumes > Manage 7. View the amount of space used by a Snapshot copy. FilerView > Volumes > Snapshots > Manage 8. Record the totals for snap1 and snap2 below. snap1 Total _______________ snap1 Used _______________ snap2 Total _______________ snap2 Used _______________
9. Task complete. Proceed to the next task.
END OF TASK
TASK 5: REVERTING A VOLUME USING SNAPRESTORE OVERVIEW This task demonstrates how to revert a volume using SnapRestore.
START OF TASK STEP ACTION 1. Create a new flexible volume named FLEXCOPY on aggr1. The vol2 size must be equal to the FLEXTREE size. FLEXTREE is the volume you created in the previous exercise. NetApp>vol create FLEXCOPY aggr1 25m 2. Create a file (for example, named filetest) in FLEXTREE that contains the following text: This is line 1. NetApp University - Do Not Distribute E12-7 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION The purpose of this text is to modify and then use SnapRestore to recover it. NetApp>wrfile /vol/FLEXTREE/filetest This is line 1 ^c read: error reading standard input: Interrupted system call 3. Verify that SnapRestore is licensed. If necessary, enter the license code for SnapRestore. (Your instructor will provide the code.) 4. Create a copy of FLEXTREE on FLEXCOPY. Restrict FLEXCOPY by entering: NetApp>vol restrict FLEXCOPY Make a copy of FLEXTREE on FLEXCOPY by entering: NetApp>vol copy start FLEXTREE FLEXCOPY After the restore operation is complete, enter make FLEXCOPY online: NetApp>vol online FLEXCOPY 5. View the Snapshot copies that currently exist on FLEXCOPY by entering: NetApp>snap list FLEXCOPY Volume FLEXCOPY working... %/used %/total date name ---------- ---------- ------------ -------- 0% ( 0%) 0% ( 0%) Aug 31 08:33 snapshot_for_volcopy.1 6. View the contents of filetest on FLEXCOPY. Enter the following: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 7. Create a Snapshot copy of FLEXCOPY by entering: NetApp>snap create FLEXCOPY snap1 8. Overwrite the contents of filetest on FLEXCOPY by entering: NetApp>wrfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 2
^c read: error reading standard input: Interrupted system call
View the contents of filetest on FLEXCOPY by entering: NetApp>rdfile /vol/FLEXCOPY/filetest NetApp University - Do Not Distribute E12-8 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION This is line 1 This is line 2 Going to take snapshot 2 9. Create another Snapshot copy of FLEXCOPY by entering: NetApp>snap create FLEXCOPY snap2 10. Overwrite the contents of filetest on FLEXCOPY again by entering: NetApp>wrfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 3
^c read: error reading standard input: Interrupted system call 11. Create a third Snapshot copy of FLEXCOPY by entering: NetApp>snap create FLEXCOPY snap3 12. View the Snapshot copies that currently exist on FLEXCOPY by entering: NetApp>snap list FLEXCOPY Volume FLEXCOPY working... %/used %/total date name ---------- ---------- ------------ -------- 0% ( 0%) 0% ( 0%) Aug 31 09:02 snap3 0% ( 0%) 0% ( 0%) Aug 31 09:00 snap2 0% ( 0%) 0% ( 0%) Aug 31 08:53 snap1 0% ( 0%) 0% ( 0%) Aug 31 08:33 snapshot_for_volcopy.1 13. Overwrite the contents of the file on FLEXCOPY again by entering: NetApp>wrfile /vol/FLEXCOPY/filetest ^c read: error reading standard input: Interrupted system call 14. Ensure that the contents of the file are empty by entering: NetApp>rdfile /vol/FLEXCOPY/filetest 15. Perform a volume restore by entering: NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp University - Do Not Distribute E12-9 Data ONTAP 7.3 Fundamentals: Snapshot Copies 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 3 Which Snapshot did you use? ___________________________________ 16. Perform a second volume restore by entering: NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 2 Which Snapshot did you use? ___________________________________ 17. Perform a third volume restore by entering: NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 Which Snapshot did you use? ___________________________________ 18. Finally, perform a volume restore by entering: NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 2 Which Snapshot were you able to use? ____________________________
R e a d s NetApp University - Do Not Distribute E13-1 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 13: WRITE AND READ REQUEST PROCESSING Exercise Module 13: Write and Read Request Processing Estimated Time: 10 minutes
EXERCISE: EXPLORING WAFL OVERVIEW The purpose of this exercise is to reinforce how Data ONTAP and its file system WAFL executes write and read requests. OBJECTIVE At the conclusion of this exercise, you should be able to understand writes and reads. TIME ESTIMATE 10 minutes NetApp University - Do Not Distribute E13-2 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 22 2008 NetApp. All rights reserved. Check Your Understanding What is a consistency point? What is the purpose of RAID? What is the storage layer?
NetApp University - Do Not Distribute E13-3 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: UNDERSTANDING WAFL OVERVIEW This task demonstrates how Data ONTAP executes write and read requests.
START OF TASK Answer the following true or false questions. STEP ACTION 1. WAFL write requests are stored in a buffer in memory and a copy is journaled in NVLOG RAM. _____________
2. The RAID manager determines where data will go on the disk. _____________
3. The RAID manager creates a stripe that represents 4 K across each disk, where one disk is the parity. (Assuming RAID 4) ______________
4. The RAID layer transfers data to the physical disks. ______________
5. WAFL determines how data will be laid out on disks using columns and rows. This layout is called a tetris. ______________
6. WAFL acknowledges a write request when the data is physically stored to disk and a consistency point is complete. ________________
7. Read requests are always processed from the disk. ________________
8. A consistency point is a completely self-consistent image of the entire file system that is taken when all the data is written to the disks and a new root inode is determined. ________________
NetApp University - Do Not Distribute E13-4 Data ONTAP 7.3 Fundamentals: Write and Read Request Processing 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 9. A consistency point is initiated when the NVLOG is half full, every 10 seconds, or when Data ONTAP has initiated it for other reasons. ________________
10. NVRAM logs are flushed when a consistency point is completed. ________________
11. Task complete.
END OF TASK
NetApp University - Do Not Distribute D a t a
C o l l e c t i o n NetApp University - Do Not Distribute
E14-1 Data ONTAP 7.3 Fundamentals: System Data Collection 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 14: SYSTEM DATA COLLECTION Exercise Module 14: System Data Collection Estimated Time: 30 minutes
EXERCISE: PERFORMANCE TROUBLESHOOTING OVERVIEW The purpose of this exercise is to demonstrate how to retrieve statistical information about the Data ONTAP simulator. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: Identify commands useful for troubleshooting and problem solving Execute the statit command on a storage system Execute the wafl_susp command on a storage system TIME ESTIMATE 30 minutes NetApp University - Do Not Distribute
E14-2 Data ONTAP 7.3 Fundamentals: System Data Collection 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 42 2008 NetApp. All rights reserved. Check Your Understanding What command(s) would you use to display disk utilization? What command(s) would you use to monitor connectivity? What command(s) would you use to help detect impending disk problems before they occur?
NetApp University - Do Not Distribute
E14-3 Data ONTAP 7.3 Fundamentals: System Data Collection 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: IDENTIFYING COMMANDS FOR TROUBLESHOOTING AND PROBLEM SOLVING OVERVIEW The purpose of this task is to check your understanding of the various commands used for gathering information about MAC, TCP/IP, and protocol issues.
START OF TASK Fill in the blanks in the table below. COMMAND WHY USE IT? ifconfig a
ifstat a
arp a
netstat r
nfsstat
exportfs
cifs stat
nbtstat
cifs testdc
Proceed to the next task. END OF TASK NetApp University - Do Not Distribute
E14-4 Data ONTAP 7.3 Fundamentals: System Data Collection 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: EXECUTING THE STATIT COMMAND ON A STORAGE SYSTEM OVERVIEW This task demonstrates the use of the CLI commands and FilerView to view system stats, disk utilization data, and performance data for various system operations. This information is used to help optimize system write performance. For the purposes of this exercise, the system console is either the Data ONTAP simulator running in a Linux virtual environment, or your assigned FAS storage system. Execute the following commands to view system information.
START OF TASK STEP ACTION 1. Access FilerView: http://[filers IP address]/na_admin 2. Select Filer node > Show System Status. 3. Select the Utilization and Show Summary options. 4. Scroll down to see the results. Explain what these results mean. ____________________________________________________________ ____________________________________________________________ ____________________________________________________________
5. Enter statit b to begin capturing data. Wait a couple of minutes. Enter statit e to end the data capture and display a report. 6. Review the results. What percentage of the time were disks busy? _____________ What RAID groups show activity? _____________
7. Task complete. Proceed to the next task.
END OF TASK
NetApp University - Do Not Distribute
E14-5 Data ONTAP 7.3 Fundamentals: System Data Collection 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: EXECUTING THE PERFMON COMMAND TO CONNECT TO STORAGE SYSTEM DATA
START OF TASK STEP ACTION 1. Open a command window on your Windows system. Start > Run > cmd 2. Issue perfmon: C:> perfmon 3. Click on the plus sign (+). A pop-up appears.
4. Click to select counter from computer. Enter the IP address or name of your storage system. Click on Performance Object and observe the list of objects from the drop- down menu. These are all Data ONTAP objects. NetApp University - Do Not Distribute
E14-6 Data ONTAP 7.3 Fundamentals: System Data Collection 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION
5. Task complete.
END OF TASK
NetApp University - Do Not Distribute F l e x S h a r e NetApp University - Do Not Distribute E15-1 Data ONTAP 7.3 Fundamentals: FlexShare 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 15: FLEXSHARE Exercise Module 15: FlexShare Estimated Time: 30 minutes
EXERCISE: FLEXSHARE OVERVIEW The purpose of this exercise is to give you an opportunity to configure FlexShare and test the results. OBJECTIVE At the conclusion of this exercise, you should be able to: Configure and test FlexShare Assign priority to system operations relative to user operations Set the volume buffer cache policy TIME ESTIMATE 30 minutes
NetApp University - Do Not Distribute E15-2 Data ONTAP 7.3 Fundamentals: FlexShare 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CONFIGURING AND TESTING FLEXSHARE START OF TASK STEP ACTION 1. Create two flexible volumes or choose two existing volumes by entering: nfsvol cifsvol 2. The volume create command automatically exports volumes when NFS is licensed. If necessary, export or share each using FilerView. 3. Set up two clients and create some load by copying files and removing files to perform reads and writes to each volume. 4. Configure each volume priority as Low: priority set volume volname option=value [option=value ...] {VeryHigh, High, Medium, Low, or VeryLow} system> priority set volume nfsvol level=VeryLow system> priority set volume cifsvol level=VeryLow system> sysstat x 1 5. Enter: priority show volume What do you see? ____________________________________________________________
6. Enter: system> priority on 7. Copy files to create some activity on the client. 8. Monitor the transfer of data by each protocol using: system> sysstat x 1 What do you see? ____________________________________________________________
9. Enter: system> priority set volume nfsvol level= VeryHigh What happens? ___________________________________________________________
10. Enter: NetApp University - Do Not Distribute E15-3 Data ONTAP 7.3 Fundamentals: FlexShare 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION system> priority set volume nfsvol level= VeryLow What happens? ____________________________________________________________
11. Enter: system> priority set volume cifsvol level= VeryHigh What happens? ____________________________________________________________
END OF TASK TASK 2: ASSIGNING PRIORITY TO SYSTEM OPERATIONS RELATIVE TO USER OPERATIONS START OF TASK STEP ACTION 1. Ensure that FlexShare is enabled for your storage system by entering: priority on 2. Specify the priority for system operations for the volume by entering: priority set volume cifsvol system=priority_level where vol_name is the name of the volume for which you want to set the priority of system operations, and priority_level is one of the following values: VeryHigh, High, Medium, Low, VeryLow, or a number from 1 to 100 The number indicates the priority of system operations. When both user and system operations are requested, system operations are selected over user operations 1 to 100 percent of the time, and the other percentage of user operations are selected. NOTE: Setting the priority of system operations to 30 does not mean that 30 percent of storage system resources are devoted to system operations. Rather, when both user and system operations are requested, the system operations are selected over the user operations 30 percent of the time, and the other 70 percent of the time, the user operation is selected. 3. You can optionally verify volume priority levels by entering: priority show volume [-v] cifsvol
END OF TASK
NetApp University - Do Not Distribute E15-4 Data ONTAP 7.3 Fundamentals: FlexShare 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: SETTING THE VOLUME BUFFER CACHE POLICY OVERVIEW The purpose of this task is to demonstrate how to use FlexShare to influence how Data ONTAP determines when to reuse buffers.
START OF TASK STEP ACTION 1. If you havent already done so, ensure that FlexShare is enabled for your storage system by entering: priority on 2. Specify the cache buffer policy for the volume by entering: priority set volume cifsvol cache=policy Example: The following command sets the cache buffer policy for the testvol1 volume to keep, which instructs Data ONTAP not to reuse buffers for this volume when possible. priority set volume cifsvol cache=keep 3. You can optionally verify volume priority levels by entering: priority show volume [-v] cifsvol
END OF TASK
NetApp University - Do Not Distribute N D M P NetApp University - Do Not Distribute E16-1 Data ONTAP 7.3 Fundamentals: NDMP Fundamentals 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 16: NDMP FUNDAMENTALS Exercise Module 16: NDMP Fundamentals Estimated Time: 30 minutes
EXERCISE: NDMPCOPY OVERVIEW The purpose of this exercise is to demonstrate how to transfer data from one source volume to a destination volume on the same system using the ndmpcopy command. TIME ESTIMATE 15 minutes NetApp University - Do Not Distribute E16-2 Data ONTAP 7.3 Fundamentals: NDMP Fundamentals 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 29 2008 NetApp. All rights reserved. Check Your Understanding What is NDMP? What types of tape devices can be used with NDMP? What is the command to check NDMP status? What are some limitations of ndmpcopy? What is the syntax of the ndmpcopy command?
NetApp University - Do Not Distribute E16-3 Data ONTAP 7.3 Fundamentals: NDMP Fundamentals 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: USING NDMPCOPY TO COPY A VOLUME OVERVIEW In this task, you will create two flexible volumes on top of the same aggregate, aggr1 (created in a previous exercise), and copy the data from one volume to the other using the ndmpcopy command. The following steps must be performed on a single storage system that acts as the source and the destination system.
START OF TASK STEP ACTION 1. Log in to the storage system and ensure that the WAFL default security style is set to ntfs (using the options command): system>options wafl.default_security_style 2. Enable and configure NDMP using the following options: system>options ndmpd.enable on system>options ndmpd.access all 3. Create the source flexible volume on top of aggregate aggr1: system>vol create src_vol aggr1 1g Verify that the volume is available and online: system>vol status src_vol 4. Create the destination flexible volume on top of aggregate aggr1: system>vol create dst_vol aggr1 1g Verify that the volume is available and online: system>vol status dst_vol 5. Create a CIFS share for the source and destination volumes: system>cifs shares add <sharename> /vol/src_vol system>cifs shares add <sharename> /vol/dst_vol Copy and paste some files into the source volume. 6. Perform the data transfer from the source volume to the destination volume using the following ndmpcopy command syntax: system>ndmpcopy src_hostname:/vol/src_vol dst_hostname:/vol/dst_vol When the ndmpcopy command is running on the same storage system as the source storage system or destination storage system, you can omit the -sa or -da options. 7. Verify that the data was copied to the destination volume.
END OF TASK
NetApp University - Do Not Distribute A c t i v e - A c t i v e NetApp University - Do Not Distribute E17-1 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION Exercise Module 17: Active-Active Controller Configuration Estimated Time: 30 minutes
EXERCISE: ACTIVE-ACTIVE STORAGE CONTROLLERS OVERVIEW The purpose of this exercise is to give you and opportunity to enable an active-active configuration and observe how it works. OBJECTIVES At the conclusion of this exercise, you should be able to do the following: License and configure active-active storage controller configurations Perform a cluster failover Perform a cluster giveback Restart a CIFS client connection after a failover TIME ESTIMATE 30 minutes NetApp University - Do Not Distribute E17-2 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 25 2008 NetApp. All rights reserved. Check Your Understanding What are three modes of operation for an active-active controller configuration? What is the purpose of using an active-active controller configuration? What happens during a takeover? True or False: Options must be set the same on both nodes License must be set the same on both nodes Both nodes must have the same number of disks Both nodes must be part of the same domain Name three active-active storage controller configurations: What are some of the requirements for setting up a standard active-active controller configuration?
NetApp University - Do Not Distribute E17-3 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: LICENSING AND CONFIGURING ACTIVE-ACTIVE STORAGE CONTROLLER CONFIGURATIONS START OF TASK STEP ACTION 1. Look at the hardware on your system. Do you see any indication that your storage system is cabled for active-active? What command will give you information about the hardware installed on your storage system? ___________________________________________________________
2. License and then reboot each system. Your instructor will help you identify the system that is cabled as the partner for your system. Example: systemA> license add ABCDEFG systemA> cf status systemA> reboot
systemB> license add ABCDEFG systemB> cf status systemB> reboot
What does the cf status command tell you before you reboot? ____________________________________________________________ 3. Enable active-active on one of the systems. How does this affect the other system? Example: systemA> cf status ____________________________________________________________ systemA> cf enable ____________________________________________________________ systemA> cf status ____________________________________________________________ systemB> cf status ____________________________________________________________
NetApp University - Do Not Distribute E17-4 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION 4. On Partner A, locate the files for a failover test from your Windows and UNIX hosts. From your Windows hosts, view the mapped drive for the /nfsflex/cifstree and then view the drive associated with the iSCSI LUN on your storage system. Use Windows Explorer to view these drives. Try copying a file or two to each of these drives. From your UNIX host, view the mounted file systems from Partner A. Determine where you mounted /nfsflex/tree1. Example: # cd /mnt/<system>/nfsflex # cat /etc/hosts > Newfile # ls l 5. Halt Partner A to cause a takeover. Time the takeover process and note how long it takes to complete. 6. Halt PartnerA: Example: systemA> halt How long did it take for Partner B to complete the takeover? ______________
What happens to the Windows client connection? ______________
What happens to the UNIX client connection?______________
What caused the difference between NFS and CIFS connections during takeover? ___________________________________________________________ 7. Run the following commands on both Partner A and Partner B. Compare the output. (Remember to access your partner storage system.) systemA(takeover)> sysconfig r sysconfig v sysstat 1 Example: systemA(takeover)> sysconfig r systemA(takeover)> partner systemA/systemB>> sysconfig r
systemA/systemB>> partner systemA(takeover)> sysconfig v NetApp University - Do Not Distribute E17-5 Data ONTAP 7.3 Fundamentals: Active-Active Controller Configuration 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. STEP ACTION
systemA(takeover)> partner systemA/systemB>> sysconfig v
Was there a difference between the two storage system outputs? ____________________________________________________________ ____________________________________________________________
8. Restore the halted storage system to service. What steps do you take to bring the halted storage system back into the active-active relationship? ___________________________________________________________ ___________________________________________________________
END OF TASK
NetApp University - Do Not Distribute A p p e n d i x NetApp University - Do Not Distribute
A-1 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. NETAPP UNIVERSITY Data ONTAP Fundamentals Appendix A: Answer Key
Version Number: 5.0 Release Number: Data ONTAP 7.3 Course Number: STRSW-ED-ILT-DOTF-REV05 Catalog Number: STRSW-ED-ILT-DOTF-REV05-EG NetApp University - Do Not Distribute
A-2 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. APPENDIX TABLE OF CONTENTS WELCOME ............................................................................................................................ 1 MODULE 1: OVERVIEW ................................................................................................... A1-1 MODULE 2: INSTALLATION AND CONFIGURATION ................................................... A2-1 MODULE 3: BASIC ADMINISTRATION .......................................................................... A3-1 MODULE 4: ADMINISTRATION SECURITY ................................................................... A4-1 MODULE 5: NETWORKING ............................................................................................. A5-1 MODULE 6: PHYSICAL STORAGE MANAGEMEN ........................................................ A6-1 MODULE 7: LOGICAL STORAGE MANAGEMENT ........................................................ A7-1 MODULE 8: CIFS .............................................................................................................. A8-1 MODULE 9: NFS ................................................................................................................ A9-1 MODULE 10: QTREES AND SECURITY STYLE ........................................................... A10-1 MODULE 11: SAN ............................................................................................................ A11-1 MODULE 12: SNAPSHOT COPIES ................................................................................ A12-1 MODULE 13: WRITE AND READ REQUEST PROCESSING......................................... A13-1 MODULE 14: SYSTEM DATA COLLECTION ................................................................. A14-1 MODULE 15: FLEXSHARE ............................................................................................. A15-1 MODULE 16: NDMP FUNDAMENTALS ......................................................................... A16-1 MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION .............................. A17-1 MODULE 18: FINAL WORDS .......................................................................................... A18-1
NetApp University - Do Not Distribute
A-3 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 1: OVERVIEW Answers Module 1: Data ONTAP Fundamentals
23 2008 NetApp. All rights reserved. Check Your Understanding What are the two topologies supported by Data ONTAP? NAS, SAN What are three NetApp product series? FAS2000, FAS3000, FAS6000 What is the main function of WAFL? WAFL (Write Anywhere File Layout) makes decisions on how to write data to disk Where can you find supporting documents for Data ONTAP? NOW site
NetApp University - Do Not Distribute
A-4 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: LOCATING TECHNICAL ASSISTANCE AND DOCUMENTATION 2. Under Product Documentation & System Configuration, select Data ONTAP Product Documentation & System Configuration. Notice that the Data ONTAP Information Library page opens. View all documents for the Data ONTAP for Filer/NearStore Release 7.3. Open the Documentation Roadmap and browse the result. What information does this provide? Each table in the roadmap lists documentation to help you complete one of the following major tasks: I nstalling new storage systems, on page 2 Configuring new storage systems, on page 3 Upgrading Data ONTAP on storage systems, on page 3 Managing storage systems, on page 4 Diagnosing and troubleshooting problems, on page 5 Customizing or automating processes, on page 6
3. Return to the Data ONTAP for Filer/NearStore Release 7.3 page. Open the Master Index. NOTE: The Master Index is created when a release becomes Generally Available (GA). Using the index, determine where you can get information about setting up anonymous FTP access. FTP anonymous user File Access Mgmt pp.182
4. Return to the Access & Order Product Documentation page. Locate the System Configuration Guide link and answer the following questions: 1. What is the size of NVRAM in the FAS3050? The FAS3050 comes standard with a maximum of 512 MB of NVRAM memory on the NVRAM5 adapter. 2. What is the maximum number of drives for a single FAS6030? 672 3. Which slots on an FAS6070 can be used as SCSI ports for tape drives? See the NOW Site.
NetApp University - Do Not Distribute
A-5 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 4: ACCESSING THE STORAGE SYSTEM 6. Observe the echoing effects. Why do you see the same thing in both sessions? Both methods connect you to the same session on the storage system. Data ONTAP does not allow multiple interactive logins by default. 7. Why did you use port 23 to access the storage system through telnet and a different port to access the console? Port 23 is the well known port for telnet. The other port is the physical port that the files console is cabled to on the Terminal Server. 12. Are you able to launch the session? Y or N If no, why not? There is only one telnet session allowed to the console. You already have a telnet session open with your emulator. NetApp University - Do Not Distribute
A-6 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 2: INSTALLATION AND CONFIGURATION Answers Module 2: Installation and Configuration
44 2008NetApp. All rights reserved. Topic Review What links on the NOW site do you use to help identify a storage systems current configuration? Configuration Guide, Parts Finder What is the name of the worksheet which aids in storage system setup, and where do you find it? The Configuration Worksheet Currently, in chapter 2 of the Software Setup Guide What command is immediately run when you boot the storage system the first time? setup What command simplifies Data ONTAP upgrades? software update NetApp University - Do Not Distribute
A-7 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 3: BASIC ADMINISTRATION Answers Module 3: Basic Administration
40 2008 NetApp. All rights reserved. Check Your Understanding Name three ways to access a storage systems CLI. Console, Telnet, RLM, RSH, SecureShare, and the FilerView CLI What is the URL to access FilerView? http://[system name or IP]/na_admin How can you view the system configuration for a FAS storage system? sysconfig [-v] FilerView How can you configure a FAS storage system from a remote adminhost? For UNIX, set up NFS and a mount an export of the root directory For Windows, set up CIFS and access the \\filer\C$ share When are AutoSupport messages generated? Messages are generated when: Events occur on the storage system that require corrective action The storage system reboots You initiate a test message Once a week, usually after 12 a.m. on Sundays
NetApp University - Do Not Distribute
A-8 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: COMMAND LINE INTERFACE 2. Enter help to see the available commands. Enter the ? character and compare this to the help command. Do you see the same results? Yes 4. How is help by itself different from help appended to a command? When you enter help after a command, the subcommands available for this command are displayed. When you enter just help, a listing of Data ONTAP commands is displayed. 5. View the manual page for the useradmin command from the command line. man useradmin 8. Read the man page for the priv command. system> man priv What does the q argument do? (Bonus: When would it be useful?) -q stands for quiet. This argument suppresses the warning message when you switch to the advanced or diagnostic level. This would be useful when scripting and when using the rsh command. 10. Run the disk command. Note which subcommands are available. system> disk Now change to the advanced level and issue the disk command again. Do you see any new commands? ______________
system> priv set advanced system*> disk Hint: It might help to do something from a UNIX system like: #rsh<filer-ip>disk >first #rsh <filer-ip>priv set advanced q | disk >second #diff first second TASK 2: EXPLORING STORAGE SYSTEM OPTIONS 2. Enter options. What happened? The current system configuration information is displayed. 3. At the prompt, enter man options. What happened? The man page for the options command is displayed. 5. At the prompt, enter options telnet. What happened? The configurable options related to telnet are displayed with their current values.
NetApp University - Do Not Distribute
A-9 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: EXPLORING STORAGE SYSTEM CONFIGURATIONS 1. Log in to the storage system, access the CLI, and enter the sysconfig command. What happened? Without any arguments, the output includes the Data ONTAP version number and a separate line for each I /O device on the storage system. 2. Enter man sysconfig and determine the correct argument to verify that the expansion cards are in the appropriate slots. -c 3. Compare the outputs of sysconfig a and sysconfig v. Do you notice any differences? The a output contains more information, but it is difficult to see what is different. 4. Access FilerView for this storage system. Go to the Report link under Filer. Observe the information displayed. How does this information compare to the sysconfig command? The summary information is provided in FilerView, but the detailed information is not shown. 5. Select the Show Status link. What is the host name (model name) for this system? Answers vary. TASK 4: EXPLORING PARTS FINDER 8. Click the link with the camera icon. What happens? Part details for the part are displayed along with a photograph of the part. 9. Do another search. This time, locate the part information for an NVRAM card for an FAS3050. How many part numbers are available? Two X3145A and SP3145A 10. Go to NOW > Service and Support > Technical Assistance and Documentation > Access & Order Product Documentation > System Configuration Guides. 1. Search Data ONTAP Release 7.2. 2. Select NetApp Storage Appliances. 3. Select both FAS6070 and Expansion slots/cards. 4. Select Expansion Slot Assignments for an FAS6070 in a single configuration. What happens? Expansion slot assignments for an FAS6070 in a single configuration is displayed for this storage system. 12. Which is the preferred slot for the NVRAM card? Expansion slot 2.
NetApp University - Do Not Distribute
A-10 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 13. Which is the least preferred slot for a dual-port optical iSCSI target-mode interface? Expansion slot 9. 14. Which adapter should never be installed in slot 4? Single-port copper GbE TOE or quad-port copper GbE TOE cards. NetApp University - Do Not Distribute
A-11 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 4: ADMINISTRATION SECURITY Answers Module 4: Administration Security
27 2008 NetApp. All rights reserved. Check Your Understanding How do you control administrative access to the storage system? By creating users with the useradmin command and assigning users to a role Why would you use the useradmin command? To create and manage: Administrator user accounts Groups Roles
NetApp University - Do Not Distribute
A-12 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CREATING A LOCAL USER ACCOUNT ON THE STORAGE SYSTEM 6. Verify that the local user (your name) was added to the storage system by entering the following command: storage_sys> useradmin user list your_name What are your allowed capabilities? The group g_login is associated with the role r_login. This role has the login through telnet capability. 7. Verify the allowed capabilities for the root account by entering the following command: storage_sys> useradmin user list root What are the capabilities of the root user? The administrator has the login-*, cli-*, api-*, and security-* capabilities. 8. View the list of all local storage system users by entering the following command: storage_sys> useradmin user list What local users are listed? This might vary, but you should at least see the administrator, root, and local user. TASK 2: LOGGING IN AS THE NEW USER 4. At the storage system prompt, view the RAID group configuration by entering the following command: storage_sys> sysconfig -r What was the response? The command fails because of lack of security. What capability do you need to issue this command? Your user account must have the cli-sysconfig capability to execute the command. 10. At the storage system prompt, view the RAID group configuration by entering the following command: storage_sys> sysconfig -r Did the command execute properly?
Y or N Yes
NetApp University - Do Not Distribute
A-13 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 3: CREATING AND LOGGING IN AS GUEST USER 15. Exit your telnet and console session. Open a new telnet session and log in as guest user bob. Are you successful? Y or N No. bob does not have the rights to log in to the filer console. 16. Log in as bob and access FilerView. (If you have FilerView open already, close the browser and open a new one.) Are you able to access FilerView as bob? Y or N No. bob does not have the rights to use FilerView. 17. Open a new telnet session and log in as the administrator user dennis. Are you successful? Y or N Yes. dennis belongs to the administrators group with the rights to access the storage system through the command line. 18. Access FilerView and log in as dennis. What are the results? has the rights to administer the storage system through FilerView.
NetApp University - Do Not Distribute
A-14 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 5: NETWORKING Answers Module 5: Networking
49 2008 NetApp. All rights reserved. Check Your Understanding Where can you set or change a host name locally on the storage system? FilerView > Network > Manage Hosts File /etc/hosts How do you configure host-name resolution for a storage system? FilerView > Network > Host Name Resolution Modifying /etc/hosts DNS, NIS commands /etc/nsswitch.conf
NetApp University - Do Not Distribute
A-15 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 50 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) What is the difference between single-mode and multimode trunks? Single-modefailover Multimodeimproved bandwidth What are the benefits of a VLAN? Increased security Improved packet routing
TASK 1: CONFIGURING NETWORK SETTINGS FROM FILERVIEW 6. What must you do to use this interface? Select the Up link and respond to the confirmation question. 8. Use FilerView to view the /etc/hosts file. FilerView > Network > Manage Hosts File How many entries are there in the /etc/hosts file? Answer varies. TASK 3: LEARNING MORE ABOUT VIRTUAL INTERFACES 1. What is the purpose of a single-mode virtual interface? a. A single-mode virtual interface provides failover should one port fail. b. A single-mode virtual interface provides load balancing capabilities. c. A single-mode virtual interface provides security. d. A single-mode virtual interface allows you to configure the interface to work for only one client at a time, thus improving performance. a
2. What is the purpose of a multi-mode virtual interface? NetApp University - Do Not Distribute
A-16 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. a. A multi-mode virtual interface provides failover if one port fails. b. A multi-mode virtual interface allows for switching between interfaces. c. A multi-mode virtual interface provides more security options. d. A multi-mode virtual interface enables faster throughput by having links that share network loads. a 3. What is the maximum number of interfaces in a single-mode virtual interface for an FAS270? (Hint: Use FilerView Help.) a. 1 b. 2 c. 3 d. 4 b 4. How many interfaces can you configure in a multi-mode virtual interface? a. 1 b. 2 or more b NetApp University - Do Not Distribute
A-17 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 6: PHYSICAL STORAGE MANAGEMENT Answers Module 6: Physical Storage Management
49 2008 NetApp. All rights reserved. Check Your Understanding What is a RAID group? A collection of disks organized to protect data that includes: One or more data disks Data striped for performance One or two parity disks for protection Why use double parity? To protect against a double-disk failure
NetApp University - Do Not Distribute
A-18 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 50 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) How many RAID groups does the following command create? aggr create newaggr 32 Assuming a default RAID group size of 16, this creates two RAID groups What is the minimum size of a RAID-DP group? Three disks (one data, two parity)
TASK 3: EXPLORING THE CURRENT DISK CONFIGURATION 2. Use the drop-down list. How many spare disks are available? ______________ Answers vary. 3. View All Disks. How many parity disks are there? Answers vary. 5. Review the output and answer the following questions: Which slot is being used for the disk controller? ________________ How many shelves are there? _________________ What are the disk sizes? __________________ Answers vary depending on the hardware used. 7. Enter: fcstat device_map Can you see where each of your disks is located in the shelf? Y or N Yes, the first disk on the left facing the shelf.
NetApp University - Do Not Distribute
A-19 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 4: DISK SCRUB 1. Disk scrubbing identifies media errors and rewrites information to another location on the disk. True 2. Increasing the time interval that the system operates in degraded mode is a smart and safe way of handling the system so that you dont need to reboot every 24 hours. False 3. An unqualified disk is one that is too large for the shelf on which it is placed. False 4. A RAID group of six or more disks is more fault-tolerant for critical data than a RAID group of 20. True 5. Data ONTAP automatically identifies an unqualified disk. True 6. The parity disk must be at least as large as the largest disk in a RAID group. True 7. A RAID group with 18 disks is recommended for optimal performance and fault tolerance. False 8. Which option enables you to set scrub performance? a. options raid.reconstruct_speed b. options raid.scrub.perf_impact c. options disk scrub d. options disk.performance.cpu b 9. Which option enables you to change the amount of system resources allocated to the reconstruction of data? (Default is set to medium.) a. options raid.reconstruct_speed b. options raid.reconstruct.perf_impact c. options raid.scrub.perf_impact options disk_reconstruct_speed b 10. Is scrub enabled by default? Yes 11. What is the command to fail a disk? a. disk fail b. disk RAID disable c. zero spares d. options raid.timeout a NetApp University - Do Not Distribute
A-20 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 5: IMPACT OF DISK SCRUBBING 2. Issue the command to view the manual page for the sysstat command. NetApp > sysstat x s 1 What does this command do? The x displays the extended output. The s displays the summary, and 1 is the interval. 3. Start the disk scrubbing by entering: NetApp> disk scrub start Is there any visible sign that the scrub has begun? No, the command continues in the background. However, using the sysstat command will give you information. 4. While the disk scrub is running, issue the following command: sysstat How does this output compare to the one before the disk scrub? NetApp> sysstat 1 The Disk/Read column shows high usage. The CPU is higher than before. 5. View the system statistics from FilerView. How would you accomplish this? FilerView >Filer >Show System Status 6. How does FilerView compare to using the command line? FilerView works like using the c option (for count) where you need to provide the number of iterations. Example: NetApp>sysstat c 30 1 Where 30 equals the number of iterations and 1 equals the interval. 9. View the spare disks using FilerView. How many spares are there? Select Filerview >Storage >Disks >Manage, choose Spare Disks from the drop-down menu, and then click View. TASK 6: CREATING AN AGGREGATE 5. Notice the default parity option. Why is that the default for the aggregate? Double parity is the best protection against disk failure offered. What can you do to conserve disks? Uncheck the double parity option. Select the option that uses the least number of disks.
NetApp University - Do Not Distribute
A-21 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 6. Use the ? character to determine the minimum RAID group size for your system, and then enter that number. 3 is the minimum for all systems. 7. Use the Automatic option. What safeguard is built into the FilerView automatic disk selection? (Hint: Use the help option.) FilerView prevents you from accidentally selecting the last spare. For automatic disk selection, the number of disks displayed is the number of available disks minus one spare. 8. What disk size options do you have? Answers vary, but FAS270 storage systems that are used in training typically have 68-GB disks. I f you are using a Data ONTAP simulator, the disk size was set when the simulator was installed. Select any size. 9. Select the minimum number of disks for this volume type and parity choice. 2 12. How many disks have been assigned to your new aggregate? Why? 0. The aggregate is initializing the disks. Two disks appear after the initialization is complete. TASK 7: FAILING A DISK 1. To view the disk ID numbers for aggr1, at the storage system console, enter: aggr status aggr1 r or sysconfig r Record the ID of a disk in aggr1. Are there any failed disks? Answers vary depending on the hardware used. NetApp University - Do Not Distribute
A-22 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 7: LOGICAL STORAGE MANAGEMENT Answers Module 7: Logical Storage Management
37 2008 NetApp. All rights reserved. Check Your Understanding How does a traditional volume compare to an aggregate? An aggregate defines physical disks, while the term volume relates to the logical collection of information. A traditional volume cannot share disks with other volumes; therefore, a traditional volume fully occupies the aggregate containing it, making the two terms functionally synonymous.
NetApp University - Do Not Distribute
A-23 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 38 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) What is the difference between a traditional volume and a flexible volume? Shares aggregate Change size to limits of storage Minimum of 20 MB added in 4-MB increments Each volume administered separately Dedicated aggregate Disks dedicated to volume Size is changed by adding disks Disks organized into RAID groups Minimum size depends on RAID type Flexible Volume Traditional Volume
39 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) What is the name of the root volume? vol0
NetApp University - Do Not Distribute
A-24 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: CREATING A TRADITIONAL VOLUME 4. You can name this volume anything except vol0. Why? Vol0 is the root volume. 6. We want to conserve disks. What type of parity uses a single-parity disk? RAI D 4, or dont select Double Parity. 8. Use the automatic option. What safeguard is built into the FilerView automatic disk selection? FilerView prevents you from accidentally selecting the last spare. For automatic disk selection, the number of disks displayed is the number of available disks minus one spare. (Hint: use the help option.) 9. What disk size options do you have? Answers vary, but FAS270 storage systems currently used in training typically have 68-GB disks. Select any size. 10. Select the minimum number of disks for this volume type and parity choice. 2 11. Review your changes and commit them if they are correct. If necessary, how would you make a correction? Use the Back button. Click Commit. Close the wizard. TASK 2: CREATE A FLEXIBLE VOLUME 3. You can name this volume anything except vol0. Why? Vol0 is the root volume. For the purposes of this task, name your volume FLEXSAN. You will use this flexible volume when we get to the SAN module. 5. There is no parity option offered. Why? The flexible volume exists inside an aggregate, and the parity was configured for the aggregate. 6. Select an online aggregate (such as aggr1) from the previous exercise. The new aggregate created in the last exercise might not be ready for use. 7. If we need 100 MB of available data storage in this volume, how large should you set the total volume size? 100MB =80% of 125 M; therefore, you should set to 125 MB. 8. Select the space guarantee that is the equivalent to a traditional volume. Volume Select any size. NetApp University - Do Not Distribute
A-25 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 9. Review your changes and commit them if they are correct. If necessary, how would you make a correction? Use the Back button. Click Commit. Close the wizard. 12. In the management view, notice that the name of your new volume is a link. What happens when you click this link? A new window opens showing the specification for this volume. TASK 3: DESTROYING A VOLUME 3. What must be done before a volume or aggregate can be destroyed? I t must be taken offline. 4. Select the traditional volume you have already created and try to destroy it without taking it offline. What happens? Failed to destroy get an error: Failure on volume 'flex2': Volume 'flex2' cannot be destroyed because it is online. I t must be taken offline before destroying it. 6. Try to destroy the root volume. What happens? Failed to destroy Cannot take the root volume off line - get an error: Failure on volume 'vol0': Offlining root volume 'vol0' is not allowed. NetApp University - Do Not Distribute
A-26 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 8: CIFS Answers Module 8: CIFS
39 2008 NetApp. All rights reserved. Check Your Understanding What is the purpose of CIFS? In a CIFS environment, an application that processes network I/O can access and manipulate files on remote servers similar to the way they are accessed locally In what server environments can a storage system participate? Windows workgroup, non-Windows workgroup, Active Directory domain, and Windows NT 4 domain What are the steps to set up CIFS? 1. License CIFS 2. Set up the CIFS environment
NetApp University - Do Not Distribute
A-27 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 8: TERMINATING CIFS SESSIONS 11. When comparing the results of step 4 with the results of step 8, what is the difference? Not all sessions can be terminated from Computer Management because Computer Management uses a CI FS session. You can only terminate all sessions through the console or FilerView. NetApp University - Do Not Distribute
A-28 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 9: NFS Answers Module 9: NFS
31 2008 NetApp. All rights reserved. Check Your Understanding What does NFS stand for? Network File System What is the format for the /etc/exports file? path -{export_option} What is the purpose of export options? To set access rights and host access What command would you use to view what is exported from the storage appliance? exportfs
NetApp University - Do Not Distribute
A-29 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 10: QTREES AND SECURITY STYLES Answers Module 10: Qtrees and Security Styles
39 2008 NetApp. All rights reserved. Check Your Understanding What is a qtree? A logically defined file system or a sub volume What are security styles? Permissions for the qtree Does a security style prevent protocols from accessing the volume or qtree? No, they only define which rules to apply
NetApp University - Do Not Distribute
A-30 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 40 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) What are the functions of a quota? Limit amount of disk space that can be used Track disk space usage Warn of excessive usage Name three quota targets. Users, groups, and qtrees
TASK 1: CREATING AND MANAGING A QUOTA
6. After enabling quotas, verify the status of the quotas. What do you see?
Alternately, you can return to the storage system CLI and issue the quota status command. I nitializing, scanning (0% done) TASK 2: PRODUCING A QUOTA REPORT 2. How much disk space is being used by all users on your storage system? Answer varies. 3. How many files were created on your storage system for tree1? Answer varies. TASK 4: PRACTICE CREATING QTREES AND QUOTAS 2. View the qtrees you just created. What is the security style? By default, it will be UNI X. 3. Edit the correct file to give the cobra qtree a size limit of 50 M with a threshold of 45 M, and the firebird qtree a limit of 20 M with a threshold of 18 M, and limit the files on firebird to 10. Use tree for the type on both quotas. What file did you edit? /etc/quotas NetApp University - Do Not Distribute
A-31 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. Record the entries you create. # TARGET TYPE DISK FILE THRESHOLD SDISK SFILE /vol/nfsflex/cobra Tree 50M - 45M - - /vol/nfsflex/firebird Tree 20M 10 18M - - 4. How did you edit the file? Using CI FS, map the root volume and use Wordpad to create and edit the file. Using NFS, mount the root volume and use vi or any UNI X editor to edit the file. Without administrative access from a client, you can use rdfile to view the file and wrfile to add entries. 5. What does the entry look like that gives the /vol/nfsflex flexible volume a default quota of 150 M of disk space with a threshold of 145 M for any user? # TARGET TYPE DISK FILE THRESHOLD SDISK SFILE * user@/vol/nfsf lex 150M - 145M - -
7. What is the command to enable quotas on the /vol/nfsflex? quota on nfsflex 8. What is the command to view the threshold for all quotas? quota report t 9. Change the quotas for the qtree firebird to the same settings as cobra. When you change the size of a quota, what command do you enter for changes to take effect? quota resize nfsflex NetApp University - Do Not Distribute
A-32 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 11: SAN Answers Module 11: SAN
41 2008 NetApp. All rights reserved. Check Your Understanding What are the two protocols NetApp supports in the SAN environment? FCP iSCSI What are the functions of a LUN? Logical representation of storage Configured as a single disk Appear as local disks on the host Managed at the block level
NetApp University - Do Not Distribute
A-33 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 42 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) What are the methods of creating a LUN? Using the lun create command from a storage system Using the lun setup command from a storage system Using FilerView from a host Using SnapDrive from a host Why would you use SnapDrive in a SAN environment? It is integrated with Microsoft Management Console It ensures a consistent LUN Snapshot
NetApp University - Do Not Distribute
A-34 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 12: SNAPSHOT COPIES Answers Module 12: Snapshot Copies
50 2008 NetApp. All rights reserved. Check Your Understanding What is a Snapshot copy? A read-only image of the file system What are some of the NetApp products that are based on Snapshot technology? SnapRestore SnapMirror SnapVault SnapManager SnapDrive FlexClone
NetApp University - Do Not Distribute
A-35 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 51 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) What are some of the Snapshot commands? snap list snap create snap delete snap delta snap reclaimable What is the Snapshot schedule syntax? snap sched vol0 2 6 8@8,12,16,20
TASK 1: CREATING SNAPSHOT COPIES 5. What are the results? You will see Success and Created snapshot snap1 on volume FLEXTREE. 6. Return to FilerView > Volumes > Snapshots > Manage. Can you find the listing for snap1? Yes. TASK 4: MANAGING SNAPSHOT COPIES 3. Do hourly Snapshot copies occur every hour? No, they occur at the times checked. 4. How can you view the Snapshot copy schedule for the root volume? Under Filer >Volumes >Snapshots >Configure Use the drop-down menu to choose the volume, and then scroll down to see the settings. 5. Can you change the percentage for the Snapshot reserve? Yes. You can use any percentage between 0 to 100.
8. Record the totals for snap1 and snap2 below. NetApp University - Do Not Distribute
A-36 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. snap1 Total _______________ snap1 Used _______________ snap2 Total _______________ snap2 Used _______________ Answers vary. TASK 5: REVERTING A VOLUME USING SNAPRESTORE 15. Perform a volume restore by entering: NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 3 Which Snapshot did you use? snap3 16. Perform a second volume restore by entering: NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 2 Which Snapshot did you use? snap2 17. Perform a third volume restore by entering: NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 Which Snapshot did you use? snap1
18. Finally, perform a volume restore by entering: NetApp University - Do Not Distribute
A-37 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. NetApp>snap restore t vol /vol/FLEXCOPY When asked to select a Snapshot copy, enter the Snapshot copy name that returns the following results from the file: NetApp>rdfile /vol/FLEXCOPY/filetest This is line 1 This is line 2 Going to take snapshot 2 Which Snapshot were you able to use? None. Why? When you used snap1 for a SnapRestore, it released snapshots that were taken after that Snapshot copy was created. The Snapshot copy snap2 no longer exists. For more information, see the Data ONTAP Data Protection and Retention course.
NetApp University - Do Not Distribute
A-38 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 13: WRITE AND READ REQUEST PROCESSING Answers Module 13: Write and Read Request Processing
23 2008 NetApp. All rights reserved. Check Your Understanding What is a consistency point? A completely self-consistent image of the entire file system What is the purpose of RAID? To protect dataRAID striping is the method used to protect disk data by which a parity value is calculated across the disks in 4-Kb blocks What is the storage layer? Handles the I/Os to disk and checks for disk failures
NetApp University - Do Not Distribute
A-39 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: UNDERSTANDING WAFL 1. WAFL write requests are stored in a buffer in memory and a copy is journaled in NVLOG RAM. True. 2. The RAID manager determines where data will go on the disk. False. This is determined by WAFL. 3. The RAID manager creates a stripe that represents 4 K across each disk, where one disk is the parity. (Assuming RAID 4) True. 4. The RAID layer transfers data to the physical disks. False. The storage layer transfers data to physical disks. 5. WAFL determines how data will be laid out on disks using columns and rows. This layout is called a tetris. True. 6. WAFL acknowledges a write request when the data is physically stored to disk and a consistency point is complete. False. WAFL acknowledges receipt as requests are received. 7. Read requests are always processed from the disk. False. WAFL might be able to satisfy the request for a Read cache buffer. 8. A consistency point is a completely self-consistent image of the entire file system that is taken when all the data is written to the disks and a new root inode is determined. True. 9. A consistency point is initiated when the NVLOG is half full, every 10 seconds, or when Data ONTAP has initiated it for other reasons. True. 10. NVRAM logs are flushed when a consistency point is completed. True. NetApp University - Do Not Distribute
A-40 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 14: SYSTEM DATA COLLECTION Answers Module 14: System Data Collection
43 2008 NetApp. All rights reserved. Check Your Understanding What command(s) would you use to display disk utilization? statit What command(s) would you use to monitor connectivity? ifconfig, ifstat, arp, ping, netstat What command(s) would you use to help detect impending disk problems before they occur? disk shm_stat
NetApp University - Do Not Distribute
A-41 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 2: EXECUTING THE STATIT COMMAND ON A STORAGE SYSTEM 4. Scroll down to see the results. Explain what these results mean. Answers vary. NetApp University - Do Not Distribute
A-42 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 15: FLEXSHARE Answers Module 15: FlexShare
TASK 1: CONFIGURING AND TESTING FLEXSHARE 5. Enter: priority show volume What do you see? system>priority show volume Volume Priority Relative Sys Priority Service Priority (vs User) nfsflex on VeryHigh Medium cifstree on VeryLow Medium 8. Monitor the transfer of data by each protocol using: system> sysstat x 1 What do you see? NFS and CI FS are roughly comparable. Not much is happening in a typical classroom environment. 9. system> priority set volume nfsvol level= VeryHigh What happens? NFS should go up.
NetApp University - Do Not Distribute
A-43 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 10. system> priority set volume nfsvol level= VeryLow What happens? NFS and CI FS are roughly comparable. 11. system> priority set volume cifsvol level= VeryHigh What happens? CI FS should go up. NetApp University - Do Not Distribute
A-44 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 16: NDMP FUNDAMENTALS Answers Module 16: NDMP Fundamentals
30 2008 NetApp. All rights reserved. Check Your Understanding What is NDMP? Network Data Management Protocolthe standard protocol for controlling data transfers between primary and secondary storage devices What types of tape devices can be used with NDMP? Tape drives, libraries, or stackers What is the command to check NDMP status? ndmp status [session #] What are some limitations of ndmpcopy? Cannot copy individual files Increments limited to two levels Works only with NetApp storage appliances What is the syntax of the ndmpcopy command? ndmpcopy [options] [source] [destination]
NetApp University - Do Not Distribute
A-45 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. MODULE 17: ACTIVE-ACTIVE CONTROLLER CONFIGURATION Answers Module 17: Active-Active Controller Configuration
26 2008 NetApp. All rights reserved. Check Your Understanding What are three modes of operation for an active-active controller configuration? Normal, Takeover, Giveback What is the purpose of using an active-active controller configuration? Fault tolerance Nondisruptive software upgrades Nondisruptive hardware maintenance What happens during a takeover? Surviving partner has two identities: Each identity can only access appropriate volumes and networks The failed node can be accessed using rsh and telnet commands
NetApp University - Do Not Distribute
A-46 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. 27 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) True or False: Options must be set the same on both nodes True License must be set the same on both nodes True Both nodes must have the same number of disks True Both nodes must be part of the same domain False
28 2008 NetApp. All rights reserved. Check Your Understanding (Cont.) Name three active-active storage controller configurations: Standard MetroCluster SyncMirror What are some of the requirements for setting up a standard active-active controller configuration? Architecture compatibility Storage capacity Disks and disk shelf compatibility Cluster interconnect adapters and cables installed Nodes attached to the same networks Same software licensed and enabled
NetApp University - Do Not Distribute
A-47 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. TASK 1: LICENSING AND CONFIGURING ACTIVE-ACTIVE STORAGE CONTROLLER CONFIGURATIONS 1. Look at the hardware on your system. Do you see any indication that your storage system is cabled for active-active? What command will give you information about the hardware installed on your storage system? sysconfig -a Example from sysconfig a from a FAS3050 slot 3: NVRAM (NetApp NVRAM V) Revision: F0 Serial Number: 506428 Memory Size: 512 MB Battery Status: OK (4086 mV) Charger Status: OFF Running Firmware: 7 (3.5.0) Cluster I nterconnect Port 1: copper Cluster I nterconnect Port 2: copper memory mapped I /O base 0xe1000000, size 0x100000 prefetchable memory base 0xe0800000, size 0x800000 prefetchable memory base 0xc0000000, size 0x20000000 2. License and then reboot each system. Your instructor will help you identify the system that is cabled as the partner for your system. Example: systemA> license add ABCDEFG systemA> cf status systemA> reboot
systemB> license add ABCDEFG systemB> cf status systemB> reboot What does cf status tell you before you reboot? Cluster must be licensed and the system rebooted before using this command.
3. Enable active-active on one of the systems. How does this affect the other NetApp University - Do Not Distribute
A-48 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. system? Example: systemA> cf status Cluster disabled. systemA> cf enable Sat May 24 01:47:38 GMT [DEVSLU20-F2: cf.misc.operatorEnable:warning]: Cluster monitor: operator initiated enabling of cluster Sat May 24 01:47:39 GMT [DEVSLU20-F2: cf.fsm.takeoverOfPartnerEnabled:notice]: Cluster monitor: takeover of DEVSLU20-F1 enabled Sat May 24 01:47:39 GMT [DEVSLU20-F2: cf.fsm.takeoverByPartnerEnabled:notice]: Cluster monitor: takeover of DEVSLU20-F2 by DEVSLU20-F1 enabled systemA> cf status Cluster enabled, DEVSLU20-F1 is up systemB> cf status Cluster enabled, DEVSLU20-F2 is up Both systems now have the active-active service enabled. 7. Run the following commands on both Partner A and Partner B. Compare the output. (Remember to access your partner storage system.) systemA(takeover)> sysconfig r sysconfig v sysstat 1 Example: systemA(takeover)> sysconfig r systemA(takeover)> partner systemA/systemB>> sysconfig r
systemA/systemB>> partner systemA(takeover)> sysconfig v
systemA(takeover)> partner systemA/systemB>> sysconfig v
systemA/systemB>> partner NetApp University - Do Not Distribute
A-49 Data ONTAP 7.3 Fundamentals: Appendix 2008 NetApp. This material is intended for training use only. Not authorized for reproduction purposes. systemA(takeover)> sysstat -1 systemA(takeover)> partner systemA/systemB>> sysstat -1
Was there a difference between the two storage system outputs? The Windows client connection to the storage system was stateful; the Windows client and the storage system had an established session that was broken when Partner A was halted. This session needed to be restarted with Partner B. The UNI X client connection was stateless; therefore, there was no established session that was broken. The next request from the UNI X client was not dependant on the previous request, so the UNI X client was able to wait for the takeover of Partner B to allow you access to your files. 8. Restore the halted storage system to service. What steps do you take to bring the halted storage system back into the active-active relationship? Connect to the halted system console and boot the system. When the system is ready to finish booting, you will see the following message: Waiting for giveback...(Press Ctrl-C to abort wait) On the partner, issue the following command: systemB (takeover)>cf giveback cf status NetApp University - Do Not Distribute