Table Of ContentClustered Data ONTAP® 8.2
System Administration Guide for Cluster Administrators
NetApp, Inc. Telephone: +1(408) 822-6000 Part number: 215-07956_A0
495 East Java Drive Fax: +1(408) 822-4501 May 2013
Sunnyvale, CA 94089 Support telephone: +1 (888) 463-8277
U.S. Web: www.netapp.com
Feedback: doccomments@netapp.com
Table of Contents | 3
Contents
Differences between cluster and Vserver administrators ....................... 10
Data ONTAP management interface basics ............................................ 11
Accessing the cluster by using the CLI (cluster administrators only) ....................... 11
Accessing the cluster by using the serial port ............................................... 11
Accessing the cluster by using SSH .............................................................. 11
Enabling Telnet or RSH access to the cluster ............................................... 14
Accessing the cluster by using Telnet ........................................................... 15
Accessing the cluster by using RSH ............................................................. 16
Using the Data ONTAP command-line interface ..................................................... 17
Understanding the different shells for CLI commands (cluster
administrators only) ................................................................................. 18
Methods of navigating CLI command directories ......................................... 19
Rules for specifying values in the CLI .......................................................... 20
Methods of viewing command history and reissuing commands ................. 21
Keyboard shortcuts for editing CLI commands ............................................ 21
Use of administrative privilege levels ........................................................... 22
Setting the privilege level in the CLI ............................................................ 23
Setting display preferences in the CLI .......................................................... 23
Methods of using query operators ................................................................. 24
Methods of using extended queries ............................................................... 25
Methods of customizing show command output by using fields .................. 26
Methods of accessing Data ONTAP man pages ........................................... 27
Managing CLI sessions (cluster administrators only) ............................................... 27
Managing records of CLI sessions ................................................................ 27
Managing the automatic timeout period of CLI sessions .............................. 28
Understanding OnCommand System Manager ......................................................... 29
Cluster management basics (cluster administrators only) ..................... 30
What a cluster is ........................................................................................................ 30
Considerations for single node clusters ..................................................................... 31
What the cluster management server is ..................................................................... 32
Understanding quorum and epsilon ........................................................................... 32
What a cluster replication ring is ............................................................................... 33
4 | System Administration Guide for Cluster Administrators
Displaying the nodes in a cluster ............................................................................... 34
Displaying cluster attributes ...................................................................................... 35
Modifying cluster attributes ...................................................................................... 35
Reassigning epsilon to another node in the cluster ................................................... 36
Displaying the status of cluster replication rings ...................................................... 37
Managing nodes (cluster administrators only) ........................................ 38
Displaying node attributes ......................................................................................... 38
Modifying node attributes ......................................................................................... 39
Renaming a node ....................................................................................................... 39
Adding nodes to the cluster ....................................................................................... 40
Removing nodes from the cluster .............................................................................. 41
Accessing a node's log files or core dump files by using a web browser ................. 42
Rules governing node root volumes and root aggregates ......................................... 43
Freeing up space on a node’s root volume .................................................... 44
Starting and stopping a node ..................................................................................... 45
Rebooting a node at the system prompt ........................................................ 45
Booting Data ONTAP at the boot environment prompt ............................... 46
Rebooting a node remotely ........................................................................... 46
Shutting down a node .................................................................................... 47
Managing a node by using the boot menu ................................................................. 47
Recovering from a corrupted image of a node's boot device .................................... 49
Managing a node remotely ........................................................................................ 50
Managing a node remotely by using the Service Processor .......................... 50
Managing a node remotely by using the Remote LAN Module ................... 74
Managing Vservers (cluster administrators only) ................................... 92
What a Vserver is ...................................................................................................... 92
About a Vserver's root volume ...................................................................... 94
Types of Vservers .......................................................................................... 94
Why you use Vservers ................................................................................... 95
Number of Vservers in a cluster .................................................................... 95
Creating a Vserver ..................................................................................................... 96
List of language options ................................................................................ 97
Language configurations ............................................................................. 100
Completing the Vserver setup worksheet .................................................... 101
Creating a Vserver by using the CLI wizard ............................................... 106
Creating a Vserver by using the vserver create command .......................... 113
Table of Contents | 5
Considerations for modifying a Vserver ................................................................. 116
Modifying a Vserver ............................................................................................... 118
Delegating administration to a Vserver administrator ............................................ 119
Displaying information about Vservers .................................................................. 122
Deleting a Vserver ................................................................................................... 123
Renaming a Vserver ................................................................................................ 124
Administering a Vserver from the Vserver context ................................................ 125
Starting a Vserver .................................................................................................... 126
Stopping a Vserver .................................................................................................. 127
Restoring a Vserver's root volume .......................................................................... 128
Controlling and monitoring I/O performance to Vservers by using Storage QoS .. 131
Managing access to the cluster (cluster administrators only) .............. 134
Managing user accounts .......................................................................................... 134
Access methods for user accounts ............................................................... 135
Authentication methods for user accounts .................................................. 136
Enabling Active Directory domain users to access the cluster ................... 137
Commands for managing user accounts ...................................................... 138
Managing access-control roles ................................................................................ 139
Predefined roles for cluster administrators .................................................. 139
Predefined roles for Vserver administrators ................................................ 140
Considerations for customizing an access-control role ............................... 142
Customizing an access-control role to restrict user access to specific
commands .............................................................................................. 145
Managing rule settings for user names and passwords in an access-
control role ............................................................................................. 147
Considerations for password rule settings ................................................... 148
Commands for managing access-control roles ............................................ 149
Managing firewall service and policies ................................................................... 151
Creating a firewall policy and assigning it to a LIF .................................... 152
Commands for managing firewall service and policies .............................. 154
Managing public keys ............................................................................................. 155
Commands for managing public keys ......................................................... 155
Managing digital certificates for server or client authentication ............................. 156
Generating and installing a CA-signed digital certificate for server
authentication ........................................................................................ 157
Installing a server intermediate certificate .................................................. 159
6 | System Administration Guide for Cluster Administrators
Providing mutual authentication ................................................................. 159
Commands for managing digital certificates .............................................. 162
Managing access to web services ............................................................................ 163
Managing the web protocol engine ............................................................. 164
Managing web services ............................................................................... 166
Managing SSL ............................................................................................. 168
Configuring access to web services ............................................................ 169
Managing audit settings .......................................................................................... 173
Commands for managing audit settings ...................................................... 174
Managing the cluster time (cluster administrators only) ..................... 175
Commands for managing the cluster time ............................................................... 176
Managing licenses (cluster administrators only) ................................... 177
License types and licensed method ......................................................................... 178
Commands for managing licenses ........................................................................... 179
Managing jobs and schedules .................................................................. 181
Job categories .......................................................................................................... 181
Commands for managing jobs ................................................................................. 181
Commands for managing job schedules .................................................................. 183
Backing up and restoring cluster configurations (cluster
administrators only) ............................................................................ 185
What configuration backup files are ....................................................................... 185
Managing configuration backups ............................................................................ 185
How the node and cluster configurations are backed up automatically ...... 185
Commands for managing configuration backup schedules ......................... 186
Commands for managing configuration backup files ................................. 187
Recovering a node configuration ............................................................................ 188
Finding a configuration backup file to use for recovering a node .............. 188
Restoring the node configuration using a configuration backup file .......... 189
Recovering a cluster configuration ......................................................................... 190
Finding a configuration to use for recovering a cluster .............................. 190
Restoring a cluster configuration from an existing configuration ............... 191
Synchronizing a node with the cluster .................................................................... 192
Managing core dumps (cluster administrators only) ............................ 194
Methods of segmenting core dump files ................................................................. 194
Commands for managing core dumps ..................................................................... 195
Commands for managing core segmenting ............................................................. 196
Table of Contents | 7
Monitoring the storage system ................................................................ 198
Managing event messages ....................................................................................... 198
Setting up the Event Management System .................................................. 199
Finding corrective actions for events .......................................................... 201
Commands for managing events ................................................................. 202
Managing AutoSupport ........................................................................................... 203
When and where AutoSupport messages are sent ....................................... 204
How event-triggered AutoSupport messages work ..................................... 205
How AutoSupport On Demand obtains delivery instructions from
technical support .................................................................................... 206
What data AutoSupport messages contain .................................................. 207
Structure of AutoSupport messages sent via email ..................................... 211
AutoSupport severity types ......................................................................... 211
AutoSupport transport protocols ................................................................. 212
Setting up AutoSupport ............................................................................... 213
Getting AutoSupport message descriptions ................................................ 215
Commands for managing AutoSupport ....................................................... 216
Information included in the AutoSupport manifest ..................................... 217
What My AutoSupport is ............................................................................ 218
Troubleshooting AutoSupport ..................................................................... 218
Monitoring the health of your system ..................................................................... 222
How health monitoring works ..................................................................... 222
What health monitors are available ............................................................. 225
Getting notified of system health alerts ....................................................... 225
Responding to degraded system health ....................................................... 226
Configuring discovery of cluster and management network switches ........ 228
Verifying the monitoring of cluster and management network switches .... 229
Commands for monitoring the health of your system ................................. 230
Using dashboards to display critical system information ........................................ 233
Getting notified of dashboard alarms .......................................................... 234
Commands for managing dashboards ......................................................... 235
Monitoring cluster performance .............................................................................. 236
What objects, instances, and counters are ................................................... 236
Decisions to make before you view performance data ............................... 237
Viewing performance data for a time period .............................................. 238
Viewing continuously updated performance data ....................................... 240
8 | System Administration Guide for Cluster Administrators
Commands for monitoring cluster performance ......................................... 241
Displaying environmental information ................................................................... 243
Managing system performance (cluster administrators only) ............. 244
Managing workload performance by using Storage QoS ....................................... 244
How Storage QoS works ............................................................................. 246
Controlling and monitoring workload performance .................................... 251
Example: Isolating a workload .................................................................... 253
Example: Proactively setting a limit on non-critical workloads ................. 254
Example: Proactively setting a limit on workloads in a shared storage
infrastructure .......................................................................................... 255
Commands for controlling and monitoring workloads ............................... 256
Increasing WAFL cache memory ........................................................................... 259
How Flash Pools and Flash Cache compare ............................................... 260
Enabling and disabling WAFL external cache ............................................ 260
Caching normal user data blocks ................................................................ 261
Caching low-priority user data blocks ........................................................ 261
Caching only system metadata .................................................................... 262
Displaying the WAFL external cache configuration ................................... 262
Displaying usage and access information for WAFL external cache ......... 263
Preserving the cache in the Flash Cache family of modules ....................... 264
Improving read performance ................................................................................... 266
What read reallocation is ............................................................................. 266
Commands for managing read reallocation ................................................ 267
Improving write performance .................................................................................. 267
How free space reallocation optimizes free space ...................................... 267
When to enable free space reallocation ....................................................... 268
When to use free space reallocation with other reallocation features ......... 269
Types of aggregates that free space reallocation can and cannot optimize . 269
Commands for managing free space reallocation ....................................... 269
Managing peer relationships for data backup and recovery (cluster
administrators only) ............................................................................ 270
Managing cluster peer relationships ........................................................................ 270
What a cluster peer is .................................................................................. 270
Connecting one cluster to another cluster in a peer relationship ................. 270
Displaying a cluster peer relationship ......................................................... 285
Modifying a cluster peer relationship .......................................................... 286
Table of Contents | 9
Deleting a cluster peering relationship ........................................................ 286
Managing jobs on another cluster ............................................................... 287
Managing Vserver peer relationships ...................................................................... 290
What Vserver peer relationship is ............................................................... 290
States of Vserver peer relationships ............................................................ 291
Creating a Vserver peer relationship ........................................................... 292
Accepting a Vserver peer relationship ........................................................ 294
Rejecting a Vserver peer relationship ......................................................... 295
Modifying a Vserver peer relationship ........................................................ 296
Deleting a Vserver peer relationship ........................................................... 297
Suspending a Vserver peer relationship ...................................................... 299
Resuming a Vserver peer relationship ........................................................ 300
Displaying information about Vserver peer relationships ........................... 300
Glossary ..................................................................................................... 302
Copyright information ............................................................................. 310
Trademark information ........................................................................... 311
How to send your comments .................................................................... 312
Index ........................................................................................................... 313
10 | System Administration Guide for Cluster Administrators
Differences between cluster and Vserver
administrators
Cluster administrators administer the entire cluster and the virtual storage servers (Vservers) it
contains. Vserver administrators administer only their own data Vservers.
Cluster administrators can administer the entire cluster and its resources. They can also set up data
Vservers and delegate Vserver administration to Vserver administrators. The specific capabilities that
cluster administrators have depend on their access-control roles. By default, a cluster administrator
with the “admin” account name or role name has all capabilities for managing the cluster and
Vservers.
Vserver administrators can administer only their own data Vservers' storage and network resources,
such as volumes, protocols, LIFs, and services. The specific capabilities that Vserver administrators
have depend on the access-control roles that are assigned by cluster administrators. For more
information about Vserver administrator capabilities, see the Clustered Data ONTAP System
Administration Guide for Vserver Administrators.
Related concepts
Managing Vservers (cluster administrators only) on page 92
Predefined roles for cluster administrators on page 139
Predefined roles for Vserver administrators on page 140
Description:Cluster management basics (cluster administrators only) . Controlling and monitoring I/O performance to Vservers by using Storage QoS .. 131.