Table Of ContentClustered Data ONTAP® 8.3
System Administration Guide for Cluster Administrators
NetApp, Inc. Telephone: +1 (408) 822-6000 Part number: 215-09167_C0
495 East Java Drive Fax: +1 (408) 822-4501 March 2015
Sunnyvale, CA 94089 Support telephone: +1 (888) 463-8277
U.S. Web: www.netapp.com
Feedback: doccomments@netapp.com
Table of Contents | 3
Contents
Differences between cluster and SVM administrators ........................... 11
Data ONTAP management interface basics ............................................. 12
Accessing the cluster by using the CLI ..................................................................... 12
Accessing the cluster by using the serial port ............................................... 12
Accessing the cluster by using SSH .............................................................. 13
Enabling Telnet or RSH access to the cluster ............................................... 15
Accessing the cluster by using Telnet ........................................................... 16
Accessing the cluster by using RSH ............................................................. 17
Using the Data ONTAP command-line interface ...................................................... 19
Understanding the different shells for CLI commands ................................. 19
Methods of navigating CLI command directories ......................................... 21
Rules for specifying values in the CLI .......................................................... 22
Methods of viewing command history and reissuing commands ................. 22
Keyboard shortcuts for editing CLI commands ............................................ 23
Use of administrative privilege levels ........................................................... 25
Setting the privilege level in the CLI ............................................................. 25
Setting display preferences in the CLI .......................................................... 26
Methods of using query operators ................................................................. 27
Methods of using extended queries ............................................................... 28
Methods of customizing show command output by using fields .................. 28
Understanding positional parameters ............................................................ 29
Methods of accessing Data ONTAP man pages ............................................ 31
Managing CLI sessions ............................................................................................. 31
Managing records of CLI sessions ................................................................ 31
Managing the automatic timeout period of CLI sessions .............................. 32
Accessing the cluster by using OnCommand System Manager browser-based
graphic interface .................................................................................................. 33
Understanding OnCommand System Manager ............................................. 34
Ways to manage access to OnCommand System Manager ........................... 35
Cluster management basics (cluster administrators only) ..................... 36
What a cluster is ........................................................................................................ 36
Considerations for single-node clusters .................................................................... 37
4 | System Administration Guide for Cluster Administrators
What the cluster management server is ..................................................................... 38
Understanding quorum and epsilon ........................................................................... 39
What a cluster replication ring is ............................................................................... 40
Displaying information about the nodes in a cluster ................................................. 40
Displaying cluster attributes ...................................................................................... 41
Modifying cluster attributes ...................................................................................... 41
Reassigning epsilon to another node in the cluster ................................................... 42
Displaying the status of cluster replication rings ...................................................... 43
Managing nodes .......................................................................................... 45
Displaying node attributes ......................................................................................... 45
Modifying node attributes ......................................................................................... 46
Renaming a node ....................................................................................................... 46
Adding nodes to the cluster ....................................................................................... 47
Removing nodes from the cluster .............................................................................. 49
Accessing a node's log, core dump, and MIB files by using a web browser ............ 51
Accessing the system console of a node ................................................................... 52
Rules governing node root volumes and root aggregates .......................................... 54
Freeing up space on a node’s root volume .................................................... 55
Starting or stopping a node ........................................................................................ 56
Rebooting a node at the system prompt ........................................................ 56
Booting Data ONTAP at the boot environment prompt ................................ 57
Shutting down a node .................................................................................... 57
Managing a node by using the boot menu ................................................................. 58
Managing a node remotely by using the Service Processor ...................................... 60
Understanding the SP .................................................................................... 60
Configuring the SP network .......................................................................... 62
Methods of managing SP firmware updates .................................................. 68
Accessing the SP ........................................................................................... 70
Using online help at the SP CLI .................................................................... 75
Commands for managing a node remotely ................................................... 76
Commands for managing the SP from Data ONTAP .................................... 86
Managing SVMs ......................................................................................... 93
What SVMs are ......................................................................................................... 93
How SVMs root volumes are used for data access ....................................... 95
Types of SVMs .............................................................................................. 96
Why you use SVMs ....................................................................................... 96
Table of Contents | 5
Number of SVMs in a cluster ........................................................................ 97
Setting up SVMs ....................................................................................................... 98
Planning to create SVMs ............................................................................... 98
Guidelines for creating SVMs ..................................................................... 101
Creating SVMs with FlexVol volumes ........................................................ 105
Creating SVMs with Infinite Volume .......................................................... 109
Configuring SVMs ...................................................................................... 110
Creating user accounts for SVM administrators ..................................................... 111
Creating local user accounts for SVM administrators ................................ 112
Providing access to NIS or LDAP user accounts for SVM administrators . 113
Providing access to Active Directory users or groups for SVM
administrators ........................................................................................ 114
Delegating administration to SVM administrators .................................................. 114
Modifying SVMs ..................................................................................................... 118
Modifying aggregates for SVMs ................................................................. 118
Modifying protocols for SVMs ................................................................... 119
Commands for modifying SVM attributes .................................................. 120
Displaying information about SVMs ...................................................................... 121
Renaming SVMs ..................................................................................................... 123
Deleting SVMs ........................................................................................................ 124
Starting SVMs ......................................................................................................... 125
Stopping SVMs ....................................................................................................... 126
Administering SVMs from the SVM context ......................................................... 128
Restoring the root volume of an SVM .................................................................... 129
Promoting a load-sharing mirror copy ........................................................ 130
Promoting a data-protection mirror copy .................................................... 131
Promoting a new FlexVol volume ............................................................... 132
Creating a new root volume on an SVM with Infinite Volume ................... 133
Controlling and monitoring I/O performance to SVMs by using Storage QoS ...... 134
Managing access to the cluster ................................................................ 136
Managing user accounts .......................................................................................... 136
Access methods for user accounts ............................................................... 137
Authentication methods for user accounts .................................................. 138
Enabling AD users and groups to access the cluster and SVMs ................. 139
Commands for managing user accounts ...................................................... 141
Managing access-control roles ................................................................................ 142
6 | System Administration Guide for Cluster Administrators
Predefined roles for cluster administrators .................................................. 143
Predefined roles for SVM administrators .................................................... 144
Considerations for customizing an access-control role ............................... 147
Customizing an access-control role to restrict user access to specific
commands .............................................................................................. 150
Managing rule settings for user names and passwords in an access-
control role ............................................................................................. 152
Considerations for password rule settings ................................................... 154
Commands for managing access-control roles ............................................ 155
Managing SSH security configurations ................................................................... 157
Commands for managing SSH security configurations .............................. 159
Managing public keys ............................................................................................. 160
Commands for managing public keys ......................................................... 160
Managing digital certificates for server or client authentication ............................. 161
Installing a server certificate to authenticate the cluster or SVM as an
SSL server ............................................................................................. 163
Installing a client CA or root CA certificate to authenticate an SSL
client of the cluster or SVM .................................................................. 166
Installing a server CA certificate to authenticate an SSL server to which
the cluster or SVM is a client ................................................................ 170
Installing a client certificate to authenticate the cluster or SVM as an
SSL client .............................................................................................. 171
Replacing an expired digital certificate ....................................................... 173
Commands for managing digital certificates ............................................... 174
Managing access to web services ............................................................................ 175
Managing the web protocol engine ............................................................. 177
Managing web services ............................................................................... 179
Managing SSL ............................................................................................. 181
Configuring access to web services ............................................................. 182
Managing audit settings .......................................................................................... 186
Commands for managing audit settings ...................................................... 187
Managing the cluster time ....................................................................... 188
Commands for managing the cluster time ............................................................... 189
Managing licenses ..................................................................................... 191
License types and licensed method ......................................................................... 192
Commands for managing licenses ........................................................................... 193
Table of Contents | 7
Managing jobs and schedules .................................................................. 195
Job categories .......................................................................................................... 195
Commands for managing jobs ................................................................................. 195
Commands for managing job schedules .................................................................. 197
Backing up and restoring cluster configurations .................................. 199
What configuration backup files are ....................................................................... 199
Managing configuration backups ............................................................................ 200
How the node and cluster configurations are backed up automatically ...... 200
Commands for managing configuration backup schedules ......................... 200
Commands for managing configuration backup files ................................. 201
Recovering a node configuration ............................................................................. 202
Finding a configuration backup file to use for recovering a node ............... 203
Restoring the node configuration using a configuration backup file .......... 203
Recovering a cluster configuration .......................................................................... 205
Finding a configuration to use for recovering a cluster ............................... 205
Restoring a cluster configuration from an existing configuration ............... 206
Synchronizing a node with the cluster .................................................................... 209
Managing core dumps .............................................................................. 210
Methods of segmenting core dump files ................................................................. 210
Commands for managing core dumps ..................................................................... 211
Commands for managing core segmenting ............................................................. 213
Monitoring the storage system ................................................................ 215
Managing event messages ....................................................................................... 215
Setting up the Event Management System .................................................. 216
Commands for managing events ................................................................. 218
Managing AutoSupport ........................................................................................... 219
When and where AutoSupport messages are sent ....................................... 220
How AutoSupport creates and sends event-triggered messages ................. 223
Types of AutoSupport messages and their content ..................................... 224
What AutoSupport subsystems are ............................................................. 225
AutoSupport size and time budgets ............................................................. 225
Files sent in event-triggered AutoSupport messages .................................. 227
Log files sent in AutoSupport messages ..................................................... 227
Files sent in weekly AutoSupport messages ............................................... 228
How AutoSupport obtains delivery instructions from technical support .... 228
Structure of AutoSupport messages sent by email ...................................... 230
8 | System Administration Guide for Cluster Administrators
AutoSupport severity types ......................................................................... 230
Requirements for using AutoSupport .......................................................... 231
Setting up AutoSupport ............................................................................... 233
Uploading core dump files .......................................................................... 236
Uploading performance archive files .......................................................... 237
Getting AutoSupport message descriptions ................................................ 238
Commands for managing AutoSupport ....................................................... 238
Information included in the AutoSupport manifest ..................................... 240
What My AutoSupport is ............................................................................ 241
Troubleshooting AutoSupport ..................................................................... 241
Monitoring the health of your system ..................................................................... 247
How health monitoring works ..................................................................... 248
What health monitors are available ............................................................. 250
Receiving system health alerts automatically ............................................. 250
Responding to degraded system health ....................................................... 251
Configuring discovery of cluster and management network switches ........ 254
Verifying the monitoring of cluster and management network switches .... 255
Commands for monitoring the health of your system ................................. 255
Using dashboards to display critical system information ........................................ 259
Getting notified of dashboard alarms .......................................................... 260
Commands for managing dashboards ......................................................... 261
Monitoring cluster performance .............................................................................. 263
What objects, instances, and counters are ................................................... 263
How performance presets define what data is collected ............................. 264
Collecting and viewing performance data for objects ................................. 265
Filtering the statistics .................................................................................. 266
Sorting the statistics .................................................................................... 267
Importing a performance preset configuration (cluster administrators
only) ....................................................................................................... 268
Monitoring cluster performance using advanced methods .......................... 269
Commands for monitoring cluster performance ......................................... 273
Displaying environmental information ................................................................... 276
Managing system performance ............................................................... 277
Managing workload performance by using Storage QoS ....................................... 277
How Storage QoS works ............................................................................. 279
Controlling and monitoring workload performance .................................... 285
Table of Contents | 9
Example: Isolating a workload .................................................................... 287
Example: Proactively setting a limit on non-critical workloads ................. 288
Example: Proactively setting a limit on workloads in a shared storage
infrastructure .......................................................................................... 290
Commands for controlling and monitoring workloads ............................... 291
Histogram-based predictions in RAVE ....................................................... 293
Increasing WAFL cache memory ............................................................................ 294
How Flash Pool aggregates and Flash Cache compare ............................... 294
Enabling and disabling WAFL external cache ............................................ 295
Caching normal user data blocks ................................................................ 297
Caching low-priority user data blocks ......................................................... 298
Caching only system metadata .................................................................... 298
Enabling and disabling the caching of blocks from random write
workloads .............................................................................................. 299
Enabling and disabling the caching of readahead data ............................... 299
Displaying the WAFL external cache configuration ................................... 299
Displaying usage and access information for WAFL external cache .......... 300
Preserving the cache in the Flash Cache family of modules ....................... 301
Improving read performance ................................................................................... 304
What read reallocation is ............................................................................. 304
Commands for managing read reallocation ................................................ 304
Improving write performance .................................................................................. 305
How free space reallocation optimizes free space ....................................... 305
When to enable free space reallocation ....................................................... 306
When to use free space reallocation with other reallocation features ......... 307
Types of aggregates that free space reallocation can and cannot optimize . 307
Commands for managing free space reallocation ....................................... 307
Managing peer relationships for data backup and recovery ................ 308
Managing cluster peer relationships ........................................................................ 308
What a cluster peer is .................................................................................. 308
Commands for managing cluster peer relationships ................................... 308
Cluster peer security using authentication passphrases ............................... 310
Connecting one cluster to another cluster in a peer relationship ................. 311
Modifying a cluster peer relationship .......................................................... 327
Deleting a cluster peering relationship ........................................................ 327
Managing SVM peer relationships .......................................................................... 328
10 | System Administration Guide for Cluster Administrators
What an SVM peer relationship is .............................................................. 329
States of SVM peer relationships ................................................................ 330
Creating an SVM peer relationship ............................................................. 330
Accepting an SVM peer relationship .......................................................... 334
Rejecting an SVM peer relationship ........................................................... 335
Modifying the peering application on an SVM peer relationship ............... 337
Deleting an SVM peer relationship ............................................................. 338
Suspending an SVM peer relationship ........................................................ 339
Resuming an SVM peer relationship .......................................................... 340
Displaying information about SVM peer relationships ............................... 341
Glossary ..................................................................................................... 343
Copyright information ............................................................................. 352
Trademark information ........................................................................... 353
How to send comments about documentation and receive update
notification ............................................................................................ 354
Index ........................................................................................................... 355
Description:System Administration Guide for Cluster Administrators. NetApp, Inc. 495 East Java Drive. Sunnyvale, CA 94089. U.S.. Telephone: +1 (408) 822-6000.