ebook img

Clustered Data ONTAP 8.2 System Administration Guide for Cluster Administrators PDF

330 Pages·2014·2.22 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Clustered Data ONTAP 8.2 System Administration Guide for Cluster Administrators

Updated for 8.2.1 Clustered Data ONTAP® 8.2 System Administration Guide for Cluster Administrators NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-08516_B0 495 East Java Drive Fax: +1 (408) 822-4501 February 2014 Sunnyvale, CA 94089 Support telephone: +1 (888) 463-8277 U.S. Web: www.netapp.com Feedback: [email protected] Table of Contents | 3 Contents Differences between cluster and SVM administrators ........................... 10 Data ONTAP management interface basics ............................................ 11 Accessing the cluster by using the CLI (cluster administrators only) ....................... 11 Accessing the cluster by using the serial port ............................................... 11 Accessing the cluster by using SSH .............................................................. 12 Enabling Telnet or RSH access to the cluster ............................................... 14 Accessing the cluster by using Telnet ........................................................... 15 Accessing the cluster by using RSH ............................................................. 16 Using the Data ONTAP command-line interface ..................................................... 18 Understanding the different shells for CLI commands (cluster administrators only) ................................................................................. 18 Methods of navigating CLI command directories ......................................... 19 Rules for specifying values in the CLI .......................................................... 20 Methods of viewing command history and reissuing commands ................. 21 Keyboard shortcuts for editing CLI commands ............................................ 21 Use of administrative privilege levels ........................................................... 23 Setting the privilege level in the CLI ............................................................ 23 Setting display preferences in the CLI .......................................................... 24 Methods of using query operators ................................................................. 24 Methods of using extended queries ............................................................... 26 Methods of customizing show command output by using fields .................. 26 Methods of accessing Data ONTAP man pages ........................................... 27 Managing CLI sessions (cluster administrators only) ............................................... 28 Managing records of CLI sessions ................................................................ 28 Managing the automatic timeout period of CLI sessions .............................. 29 Understanding OnCommand System Manager ......................................................... 29 Cluster management basics (cluster administrators only) ..................... 31 What a cluster is ........................................................................................................ 31 Considerations for single node clusters ..................................................................... 32 What the cluster management server is ..................................................................... 33 Understanding quorum and epsilon ........................................................................... 33 What a cluster replication ring is ............................................................................... 34 4 | System Administration Guide for Cluster Administrators Displaying the nodes in a cluster ............................................................................... 35 Displaying cluster attributes ...................................................................................... 36 Modifying cluster attributes ...................................................................................... 36 Reassigning epsilon to another node in the cluster ................................................... 37 Displaying the status of cluster replication rings ...................................................... 38 Managing nodes (cluster administrators only) ........................................ 39 Displaying node attributes ......................................................................................... 39 Modifying node attributes ......................................................................................... 40 Renaming a node ....................................................................................................... 40 Adding nodes to the cluster ....................................................................................... 41 Removing nodes from the cluster .............................................................................. 42 Accessing a node's log, core dump, and MIB files by using a web browser ............ 43 Rules governing node root volumes and root aggregates ......................................... 44 Freeing up space on a node’s root volume .................................................... 45 Starting or stopping a node ........................................................................................ 46 Rebooting a node at the system prompt ........................................................ 46 Booting Data ONTAP at the boot environment prompt ............................... 47 Rebooting a node remotely ........................................................................... 47 Shutting down a node .................................................................................... 48 Managing a node by using the boot menu ................................................................. 48 Recovering from a corrupted image of a node's boot device .................................... 50 Managing a node remotely ........................................................................................ 51 Managing a node remotely by using the Service Processor .......................... 51 Managing a node remotely by using the Remote LAN Module ................... 75 Managing SVMs (cluster administrators only) ....................................... 93 What SVMs are ......................................................................................................... 93 About SVMs root volumes ............................................................................ 95 Types of SVMs .............................................................................................. 95 Why you use SVMs ....................................................................................... 96 Number of SVMs in a cluster ........................................................................ 97 Creating SVMs .......................................................................................................... 97 List of language options ................................................................................ 98 Language configurations ............................................................................. 101 Completing the SVM setup worksheet ........................................................ 102 Creating SVMs by using the CLI wizard .................................................... 107 Creating SVMs with FlexVol volumes ....................................................... 115 Table of Contents | 5 Creating SVMs with Infinite Volume ......................................................... 117 Considerations for modifying SVMs ...................................................................... 118 Modifying SVMs ..................................................................................................... 120 Delegating administration to SVM administrators .................................................. 121 Displaying information about SVMs ...................................................................... 125 Renaming SVMs ..................................................................................................... 126 Deleting SVMs ........................................................................................................ 127 Administering SVMs from the SVM context ......................................................... 128 Starting SVMs ......................................................................................................... 129 Stopping SVMs ....................................................................................................... 130 Restoring the root volume of an SVM .................................................................... 131 Promoting a load-sharing mirror copy ........................................................ 132 Promoting a data-protection mirror copy .................................................... 133 Promoting a new FlexVol volume .............................................................. 134 Controlling and monitoring I/O performance to SVMs by using Storage QoS ...... 135 Managing access to the cluster (cluster administrators only) .............. 137 Managing user accounts .......................................................................................... 137 Access methods for user accounts ............................................................... 138 Authentication methods for user accounts .................................................. 139 Enabling Active Directory domain users to access the cluster ................... 140 Commands for managing user accounts ...................................................... 141 Managing access-control roles ................................................................................ 142 Predefined roles for cluster administrators .................................................. 142 Predefined roles for SVM administrators .................................................... 143 Considerations for customizing an access-control role ............................... 145 Customizing an access-control role to restrict user access to specific commands .............................................................................................. 148 Managing rule settings for user names and passwords in an access- control role ............................................................................................. 150 Considerations for password rule settings ................................................... 151 Commands for managing access-control roles ............................................ 152 Managing firewall service and policies ................................................................... 154 Creating a firewall policy and assigning it to a LIF .................................... 155 Commands for managing firewall service and policies .............................. 157 Managing SSH security configurations ................................................................... 158 Commands for managing SSH security configurations .............................. 160 6 | System Administration Guide for Cluster Administrators Managing public keys ............................................................................................. 160 Commands for managing public keys ......................................................... 161 Managing digital certificates for server or client authentication ............................. 161 Generating and installing a CA-signed digital certificate for server authentication ........................................................................................ 163 Installing a server intermediate certificate .................................................. 165 Providing mutual authentication ................................................................. 165 Installing the root certificate of an SSL server ............................................ 168 Commands for managing digital certificates .............................................. 169 Managing access to web services ............................................................................ 170 Managing the web protocol engine ............................................................. 171 Managing web services ............................................................................... 173 Managing SSL ............................................................................................. 175 Configuring access to web services ............................................................ 176 Managing audit settings .......................................................................................... 180 Commands for managing audit settings ...................................................... 181 Managing the cluster time (cluster administrators only) ..................... 182 Commands for managing the cluster time ............................................................... 183 Managing licenses (cluster administrators only) ................................... 185 License types and licensed method ......................................................................... 186 Commands for managing licenses ........................................................................... 187 Managing jobs and schedules .................................................................. 189 Job categories .......................................................................................................... 189 Commands for managing jobs ................................................................................. 189 Commands for managing job schedules .................................................................. 191 Backing up and restoring cluster configurations (cluster administrators only) ............................................................................ 193 What configuration backup files are ....................................................................... 193 Managing configuration backups ............................................................................ 193 How the node and cluster configurations are backed up automatically ...... 193 Commands for managing configuration backup schedules ......................... 194 Commands for managing configuration backup files ................................. 195 Recovering a node configuration ............................................................................ 196 Finding a configuration backup file to use for recovering a node .............. 196 Restoring the node configuration using a configuration backup file .......... 197 Recovering a cluster configuration ......................................................................... 198 Table of Contents | 7 Finding a configuration to use for recovering a cluster .............................. 198 Restoring a cluster configuration from an existing configuration ............... 199 Synchronizing a node with the cluster .................................................................... 201 Managing core dumps (cluster administrators only) ............................ 202 Methods of segmenting core dump files ................................................................. 202 Commands for managing core dumps ..................................................................... 203 Commands for managing core segmenting ............................................................. 204 Monitoring the storage system ................................................................ 206 Managing event messages ....................................................................................... 206 Setting up the Event Management System .................................................. 207 Commands for managing events ................................................................. 209 Managing AutoSupport ........................................................................................... 210 When and where AutoSupport messages are sent ....................................... 211 How AutoSupport creates and sends event-triggered messages ................. 212 How AutoSupport On Demand obtains delivery instructions from technical support .................................................................................... 213 Types of AutoSupport messages and their content ..................................... 214 Structure of AutoSupport messages sent by email ...................................... 215 AutoSupport severity types ......................................................................... 216 Requirements for using AutoSupport .......................................................... 216 Setting up AutoSupport ............................................................................... 218 Getting AutoSupport message descriptions ................................................ 220 Commands for managing AutoSupport ....................................................... 220 Information included in the AutoSupport manifest ..................................... 222 What My AutoSupport is ............................................................................ 223 Troubleshooting AutoSupport ..................................................................... 223 Monitoring the health of your system ..................................................................... 227 How health monitoring works ..................................................................... 227 What health monitors are available ............................................................. 229 Receiving system health alerts automatically ............................................. 230 Responding to degraded system health ....................................................... 231 Configuring discovery of cluster and management network switches ........ 233 Verifying the monitoring of cluster and management network switches .... 234 Commands for monitoring the health of your system ................................. 235 Using dashboards to display critical system information ........................................ 238 Getting notified of dashboard alarms .......................................................... 239 8 | System Administration Guide for Cluster Administrators Commands for managing dashboards ......................................................... 240 Monitoring cluster performance .............................................................................. 241 What objects, instances, and counters are ................................................... 241 Decisions to make before you view performance data ............................... 242 Viewing performance data for a time period .............................................. 243 Viewing continuously updated performance data ....................................... 245 Commands for monitoring cluster performance ......................................... 246 Displaying environmental information ................................................................... 247 Managing system performance (cluster administrators only) ............. 248 Managing workload performance by using Storage QoS ....................................... 248 How Storage QoS works ............................................................................. 250 Controlling and monitoring workload performance .................................... 256 Example: Isolating a workload .................................................................... 258 Example: Proactively setting a limit on non-critical workloads ................. 260 Example: Proactively setting a limit on workloads in a shared storage infrastructure .......................................................................................... 261 Commands for controlling and monitoring workloads ............................... 262 Increasing WAFL cache memory ........................................................................... 264 How Flash Pool aggregates and Flash Cache compare ............................... 265 Enabling and disabling WAFL external cache ............................................ 266 Caching normal user data blocks ................................................................ 266 Caching low-priority user data blocks ........................................................ 267 Caching only system metadata .................................................................... 267 Displaying the WAFL external cache configuration ................................... 268 Displaying usage and access information for WAFL external cache ......... 268 Preserving the cache in the Flash Cache family of modules ....................... 269 Improving read performance ................................................................................... 271 What read reallocation is ............................................................................. 271 Commands for managing read reallocation ................................................ 272 Improving write performance .................................................................................. 272 How free space reallocation optimizes free space ...................................... 272 When to enable free space reallocation ....................................................... 273 When to use free space reallocation with other reallocation features ......... 274 Types of aggregates that free space reallocation can and cannot optimize . 274 Commands for managing free space reallocation ....................................... 274 Table of Contents | 9 Managing peer relationships for data backup and recovery (cluster administrators only) ............................................................................ 275 Managing cluster peer relationships ........................................................................ 275 What a cluster peer is .................................................................................. 275 Connecting one cluster to another cluster in a peer relationship ................. 275 Displaying a cluster peer relationship ......................................................... 290 Modifying a cluster peer relationship .......................................................... 291 Deleting a cluster peering relationship ........................................................ 291 Managing jobs on another cluster ............................................................... 292 Managing SVM peer relationships .......................................................................... 294 What an SVM peer relationship is .............................................................. 295 States of SVM peer relationships ................................................................ 296 Creating an SVM peer relationship ............................................................. 297 Accepting an SVM peer relationship .......................................................... 299 Rejecting an SVM peer relationship ........................................................... 300 Modifying an SVM peer relationship .......................................................... 302 Deleting an SVM peer relationship ............................................................. 303 Suspending an SVM peer relationship ........................................................ 304 Resuming an SVM peer relationship .......................................................... 305 Displaying information about SVM peer relationships ............................... 305 Glossary ..................................................................................................... 307 Copyright information ............................................................................. 315 Trademark information ........................................................................... 316 How to send your comments .................................................................... 317 Index ........................................................................................................... 318 10 | System Administration Guide for Cluster Administrators Differences between cluster and SVM administrators Cluster administrators administer the entire cluster and the Storage Virtual Machines (SVMs, formerly known as Vservers) it contains. SVM administrators administer only their own data SVMs. Cluster administrators can administer the entire cluster and its resources. They can also set up data SVMs and delegate SVM administration to SVM administrators. The specific capabilities that cluster administrators have depend on their access-control roles. By default, a cluster administrator with the “admin” account name or role name has all capabilities for managing the cluster and SVMs. SVM administrators can administer only their own SVM storage and network resources, such as volumes, protocols, LIFs, and services. The specific capabilities that SVM administrators have depend on the access-control roles that are assigned by cluster administrators. For more information about SVM administrator capabilities, see the Clustered Data ONTAP System Administration Guide for SVM Administrators. Note: The Data ONTAP command-line interface (CLI) continues to use the term Vserver in the output, and vserver as a command or parameter name has not changed. Related concepts Managing SVMs (cluster administrators only) on page 93 Predefined roles for cluster administrators on page 142 Predefined roles for SVM administrators on page 143

Description:
Configuring discovery of cluster and management network switches .. 233. Verifying the monitoring of cluster and management network switches .
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.