ebook img

Clustered Data ONTAP 8.3 System Administration Guide for Cluster Administrators PDF

372 Pages·2015·2.78 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Clustered Data ONTAP 8.3 System Administration Guide for Cluster Administrators

Clustered Data ONTAP® 8.3 System Administration Guide for Cluster Administrators NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-09167_C0 495 East Java Drive Fax: +1 (408) 822-4501 March 2015 Sunnyvale, CA 94089 Support telephone: +1 (888) 463-8277 U.S. Web: www.netapp.com Feedback: [email protected] Table of Contents | 3 Contents Differences between cluster and SVM administrators ........................... 11 Data ONTAP management interface basics ............................................. 12 Accessing the cluster by using the CLI ..................................................................... 12 Accessing the cluster by using the serial port ............................................... 12 Accessing the cluster by using SSH .............................................................. 13 Enabling Telnet or RSH access to the cluster ............................................... 15 Accessing the cluster by using Telnet ........................................................... 16 Accessing the cluster by using RSH ............................................................. 17 Using the Data ONTAP command-line interface ...................................................... 19 Understanding the different shells for CLI commands ................................. 19 Methods of navigating CLI command directories ......................................... 21 Rules for specifying values in the CLI .......................................................... 22 Methods of viewing command history and reissuing commands ................. 22 Keyboard shortcuts for editing CLI commands ............................................ 23 Use of administrative privilege levels ........................................................... 25 Setting the privilege level in the CLI ............................................................. 25 Setting display preferences in the CLI .......................................................... 26 Methods of using query operators ................................................................. 27 Methods of using extended queries ............................................................... 28 Methods of customizing show command output by using fields .................. 28 Understanding positional parameters ............................................................ 29 Methods of accessing Data ONTAP man pages ............................................ 31 Managing CLI sessions ............................................................................................. 31 Managing records of CLI sessions ................................................................ 31 Managing the automatic timeout period of CLI sessions .............................. 32 Accessing the cluster by using OnCommand System Manager browser-based graphic interface .................................................................................................. 33 Understanding OnCommand System Manager ............................................. 34 Ways to manage access to OnCommand System Manager ........................... 35 Cluster management basics (cluster administrators only) ..................... 36 What a cluster is ........................................................................................................ 36 Considerations for single-node clusters .................................................................... 37 4 | System Administration Guide for Cluster Administrators What the cluster management server is ..................................................................... 38 Understanding quorum and epsilon ........................................................................... 39 What a cluster replication ring is ............................................................................... 40 Displaying information about the nodes in a cluster ................................................. 40 Displaying cluster attributes ...................................................................................... 41 Modifying cluster attributes ...................................................................................... 41 Reassigning epsilon to another node in the cluster ................................................... 42 Displaying the status of cluster replication rings ...................................................... 43 Managing nodes .......................................................................................... 45 Displaying node attributes ......................................................................................... 45 Modifying node attributes ......................................................................................... 46 Renaming a node ....................................................................................................... 46 Adding nodes to the cluster ....................................................................................... 47 Removing nodes from the cluster .............................................................................. 49 Accessing a node's log, core dump, and MIB files by using a web browser ............ 51 Accessing the system console of a node ................................................................... 52 Rules governing node root volumes and root aggregates .......................................... 54 Freeing up space on a node’s root volume .................................................... 55 Starting or stopping a node ........................................................................................ 56 Rebooting a node at the system prompt ........................................................ 56 Booting Data ONTAP at the boot environment prompt ................................ 57 Shutting down a node .................................................................................... 57 Managing a node by using the boot menu ................................................................. 58 Managing a node remotely by using the Service Processor ...................................... 60 Understanding the SP .................................................................................... 60 Configuring the SP network .......................................................................... 62 Methods of managing SP firmware updates .................................................. 68 Accessing the SP ........................................................................................... 70 Using online help at the SP CLI .................................................................... 75 Commands for managing a node remotely ................................................... 76 Commands for managing the SP from Data ONTAP .................................... 86 Managing SVMs ......................................................................................... 93 What SVMs are ......................................................................................................... 93 How SVMs root volumes are used for data access ....................................... 95 Types of SVMs .............................................................................................. 96 Why you use SVMs ....................................................................................... 96 Table of Contents | 5 Number of SVMs in a cluster ........................................................................ 97 Setting up SVMs ....................................................................................................... 98 Planning to create SVMs ............................................................................... 98 Guidelines for creating SVMs ..................................................................... 101 Creating SVMs with FlexVol volumes ........................................................ 105 Creating SVMs with Infinite Volume .......................................................... 109 Configuring SVMs ...................................................................................... 110 Creating user accounts for SVM administrators ..................................................... 111 Creating local user accounts for SVM administrators ................................ 112 Providing access to NIS or LDAP user accounts for SVM administrators . 113 Providing access to Active Directory users or groups for SVM administrators ........................................................................................ 114 Delegating administration to SVM administrators .................................................. 114 Modifying SVMs ..................................................................................................... 118 Modifying aggregates for SVMs ................................................................. 118 Modifying protocols for SVMs ................................................................... 119 Commands for modifying SVM attributes .................................................. 120 Displaying information about SVMs ...................................................................... 121 Renaming SVMs ..................................................................................................... 123 Deleting SVMs ........................................................................................................ 124 Starting SVMs ......................................................................................................... 125 Stopping SVMs ....................................................................................................... 126 Administering SVMs from the SVM context ......................................................... 128 Restoring the root volume of an SVM .................................................................... 129 Promoting a load-sharing mirror copy ........................................................ 130 Promoting a data-protection mirror copy .................................................... 131 Promoting a new FlexVol volume ............................................................... 132 Creating a new root volume on an SVM with Infinite Volume ................... 133 Controlling and monitoring I/O performance to SVMs by using Storage QoS ...... 134 Managing access to the cluster ................................................................ 136 Managing user accounts .......................................................................................... 136 Access methods for user accounts ............................................................... 137 Authentication methods for user accounts .................................................. 138 Enabling AD users and groups to access the cluster and SVMs ................. 139 Commands for managing user accounts ...................................................... 141 Managing access-control roles ................................................................................ 142 6 | System Administration Guide for Cluster Administrators Predefined roles for cluster administrators .................................................. 143 Predefined roles for SVM administrators .................................................... 144 Considerations for customizing an access-control role ............................... 147 Customizing an access-control role to restrict user access to specific commands .............................................................................................. 150 Managing rule settings for user names and passwords in an access- control role ............................................................................................. 152 Considerations for password rule settings ................................................... 154 Commands for managing access-control roles ............................................ 155 Managing SSH security configurations ................................................................... 157 Commands for managing SSH security configurations .............................. 159 Managing public keys ............................................................................................. 160 Commands for managing public keys ......................................................... 160 Managing digital certificates for server or client authentication ............................. 161 Installing a server certificate to authenticate the cluster or SVM as an SSL server ............................................................................................. 163 Installing a client CA or root CA certificate to authenticate an SSL client of the cluster or SVM .................................................................. 166 Installing a server CA certificate to authenticate an SSL server to which the cluster or SVM is a client ................................................................ 170 Installing a client certificate to authenticate the cluster or SVM as an SSL client .............................................................................................. 171 Replacing an expired digital certificate ....................................................... 173 Commands for managing digital certificates ............................................... 174 Managing access to web services ............................................................................ 175 Managing the web protocol engine ............................................................. 177 Managing web services ............................................................................... 179 Managing SSL ............................................................................................. 181 Configuring access to web services ............................................................. 182 Managing audit settings .......................................................................................... 186 Commands for managing audit settings ...................................................... 187 Managing the cluster time ....................................................................... 188 Commands for managing the cluster time ............................................................... 189 Managing licenses ..................................................................................... 191 License types and licensed method ......................................................................... 192 Commands for managing licenses ........................................................................... 193 Table of Contents | 7 Managing jobs and schedules .................................................................. 195 Job categories .......................................................................................................... 195 Commands for managing jobs ................................................................................. 195 Commands for managing job schedules .................................................................. 197 Backing up and restoring cluster configurations .................................. 199 What configuration backup files are ....................................................................... 199 Managing configuration backups ............................................................................ 200 How the node and cluster configurations are backed up automatically ...... 200 Commands for managing configuration backup schedules ......................... 200 Commands for managing configuration backup files ................................. 201 Recovering a node configuration ............................................................................. 202 Finding a configuration backup file to use for recovering a node ............... 203 Restoring the node configuration using a configuration backup file .......... 203 Recovering a cluster configuration .......................................................................... 205 Finding a configuration to use for recovering a cluster ............................... 205 Restoring a cluster configuration from an existing configuration ............... 206 Synchronizing a node with the cluster .................................................................... 209 Managing core dumps .............................................................................. 210 Methods of segmenting core dump files ................................................................. 210 Commands for managing core dumps ..................................................................... 211 Commands for managing core segmenting ............................................................. 213 Monitoring the storage system ................................................................ 215 Managing event messages ....................................................................................... 215 Setting up the Event Management System .................................................. 216 Commands for managing events ................................................................. 218 Managing AutoSupport ........................................................................................... 219 When and where AutoSupport messages are sent ....................................... 220 How AutoSupport creates and sends event-triggered messages ................. 223 Types of AutoSupport messages and their content ..................................... 224 What AutoSupport subsystems are ............................................................. 225 AutoSupport size and time budgets ............................................................. 225 Files sent in event-triggered AutoSupport messages .................................. 227 Log files sent in AutoSupport messages ..................................................... 227 Files sent in weekly AutoSupport messages ............................................... 228 How AutoSupport obtains delivery instructions from technical support .... 228 Structure of AutoSupport messages sent by email ...................................... 230 8 | System Administration Guide for Cluster Administrators AutoSupport severity types ......................................................................... 230 Requirements for using AutoSupport .......................................................... 231 Setting up AutoSupport ............................................................................... 233 Uploading core dump files .......................................................................... 236 Uploading performance archive files .......................................................... 237 Getting AutoSupport message descriptions ................................................ 238 Commands for managing AutoSupport ....................................................... 238 Information included in the AutoSupport manifest ..................................... 240 What My AutoSupport is ............................................................................ 241 Troubleshooting AutoSupport ..................................................................... 241 Monitoring the health of your system ..................................................................... 247 How health monitoring works ..................................................................... 248 What health monitors are available ............................................................. 250 Receiving system health alerts automatically ............................................. 250 Responding to degraded system health ....................................................... 251 Configuring discovery of cluster and management network switches ........ 254 Verifying the monitoring of cluster and management network switches .... 255 Commands for monitoring the health of your system ................................. 255 Using dashboards to display critical system information ........................................ 259 Getting notified of dashboard alarms .......................................................... 260 Commands for managing dashboards ......................................................... 261 Monitoring cluster performance .............................................................................. 263 What objects, instances, and counters are ................................................... 263 How performance presets define what data is collected ............................. 264 Collecting and viewing performance data for objects ................................. 265 Filtering the statistics .................................................................................. 266 Sorting the statistics .................................................................................... 267 Importing a performance preset configuration (cluster administrators only) ....................................................................................................... 268 Monitoring cluster performance using advanced methods .......................... 269 Commands for monitoring cluster performance ......................................... 273 Displaying environmental information ................................................................... 276 Managing system performance ............................................................... 277 Managing workload performance by using Storage QoS ....................................... 277 How Storage QoS works ............................................................................. 279 Controlling and monitoring workload performance .................................... 285 Table of Contents | 9 Example: Isolating a workload .................................................................... 287 Example: Proactively setting a limit on non-critical workloads ................. 288 Example: Proactively setting a limit on workloads in a shared storage infrastructure .......................................................................................... 290 Commands for controlling and monitoring workloads ............................... 291 Histogram-based predictions in RAVE ....................................................... 293 Increasing WAFL cache memory ............................................................................ 294 How Flash Pool aggregates and Flash Cache compare ............................... 294 Enabling and disabling WAFL external cache ............................................ 295 Caching normal user data blocks ................................................................ 297 Caching low-priority user data blocks ......................................................... 298 Caching only system metadata .................................................................... 298 Enabling and disabling the caching of blocks from random write workloads .............................................................................................. 299 Enabling and disabling the caching of readahead data ............................... 299 Displaying the WAFL external cache configuration ................................... 299 Displaying usage and access information for WAFL external cache .......... 300 Preserving the cache in the Flash Cache family of modules ....................... 301 Improving read performance ................................................................................... 304 What read reallocation is ............................................................................. 304 Commands for managing read reallocation ................................................ 304 Improving write performance .................................................................................. 305 How free space reallocation optimizes free space ....................................... 305 When to enable free space reallocation ....................................................... 306 When to use free space reallocation with other reallocation features ......... 307 Types of aggregates that free space reallocation can and cannot optimize . 307 Commands for managing free space reallocation ....................................... 307 Managing peer relationships for data backup and recovery ................ 308 Managing cluster peer relationships ........................................................................ 308 What a cluster peer is .................................................................................. 308 Commands for managing cluster peer relationships ................................... 308 Cluster peer security using authentication passphrases ............................... 310 Connecting one cluster to another cluster in a peer relationship ................. 311 Modifying a cluster peer relationship .......................................................... 327 Deleting a cluster peering relationship ........................................................ 327 Managing SVM peer relationships .......................................................................... 328 10 | System Administration Guide for Cluster Administrators What an SVM peer relationship is .............................................................. 329 States of SVM peer relationships ................................................................ 330 Creating an SVM peer relationship ............................................................. 330 Accepting an SVM peer relationship .......................................................... 334 Rejecting an SVM peer relationship ........................................................... 335 Modifying the peering application on an SVM peer relationship ............... 337 Deleting an SVM peer relationship ............................................................. 338 Suspending an SVM peer relationship ........................................................ 339 Resuming an SVM peer relationship .......................................................... 340 Displaying information about SVM peer relationships ............................... 341 Glossary ..................................................................................................... 343 Copyright information ............................................................................. 352 Trademark information ........................................................................... 353 How to send comments about documentation and receive update notification ............................................................................................ 354 Index ........................................................................................................... 355

Description:
System Administration Guide for Cluster Administrators. NetApp, Inc. 495 East Java Drive. Sunnyvale, CA 94089. U.S.. Telephone: +1 (408) 822-6000.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.