netapp change disk container

Veeam NetApp ONTAP integration setup

netapp change disk container

NetApp ONTAP disk management using simulator

netapp change disk container

Synology DS620slim network configuration

domalab.com TPlink firmware upgrade

TPlink firmware upgrade on T2600G-18TS

domalab.com Synology DS620slim setup

Synology DS620Slim setup first time install

netapp change disk container

TPlink install: unboxing the T2600G-18TS

domalab.com VMware home lab

VMware home lab: 2020 easy and fun setup

domalab.com Veeam white paper vbo v4.0

White Paper VBO v4: agnostic approach and cloud ready

netapp change disk container

Intel NUC 64GB RAM Memory: yes you can!

netapp change disk container

Intel NUC 7i7DNHE setup: quick overview

netapp change disk container

VCSA 6.7 update 3b: what’s new and how to install

domalab.com white paper vbo v3.0

White Paper VBO v3: how to protect Office 365 with Veeam

netapp change disk container

Wasabi cloud Veeam SOBR: how to scale to infinite storage

netapp change disk container

Wasabi S3 Veeam Repository in 3 easy steps

netapp change disk container

Wasabi S3 account setup: blob storage made easy

netapp change disk container

Azure Blob Storage setup for Veeam backup data

netapp change disk container

Veeam DellEMC Unity Backup from Storage Snapshots

netapp change disk container

Veeam Backup 9.5U4b: what’s new in the latest release

domalab

NetApp ONTAP Disk move and replace

netapp change disk container

The ability to quickly move data between different locations between on-premises and cloud is one of the important requirements especially when dealing with critical data. The more important is the data, higher the pressure. This requirement doesn’t change for “local” storage either where expectations are even higher. NetApp ONTAP Disk move and replace options by using command line is a great feature to address situations where data is growing outside the expected thresholds. It can simply move data into a new disk or storage. Similar considerations are valid for hardware failures. What if disks that are part of a RAID start to show signs of malfunctions? These are only a few cases where managing data across different hardware storage and tiers is beneficial for long term retention and compliance.

When running a NetApp ONTAP Disk move and replace all the operations can be done just by leveraging the command line. In this case even it couldn’t be any easier considering the NetApp ONTAP simulator is used an example.. In fact although the Disks are emulated it offers a good understanding of the main operations and how to get familiar with the NetApp ONTAP solution.

For the purpose of this exercise the article goes through different steps like connecting to the storage appliance using SSH, list the current disks and owners, changing the Owner default policy and finally run the commands to copy the data content to other disks before removing the existing ones.

To start with the NetApp ONTAP disk move first step is to connect to the storage appliance using a SSH connection. Putty utility is probably the easiest to use. If the connection is successful it will show the certificate key fingerprint which will be automatically stored for next connections. Credentials are the same provided for accessing the web GUI of OnCommand System Manager .

netapp change disk container

A simple Disk show command will display all the mounted disks along with other useful info like Size, Disk Type, Container, Pool and Owner.

domalab.com NetApp ONTAP disk move

Next step is to verify the active auto assign policy for the new disks:

“storage disk option show”

shows the Node owner and the current policy with the Auto Assign set to on.

domalab.com NetApp ONTAP disk move

In order to disable the default policy is sufficient to enter:

“storage disk option modify -autoassign off”

This will update now to the current value for the the auto assign method.

netapp change disk container

According to the available disks (or the emulated ones for this NetApp ONTAP Simulator) it is now possible to copy the data from one disk to another before the replacement takes place. In this case data is copied from Disk 15 on the second disk shelf (0-1-2-3) to the disk in the first bay on the same shelf.

domalab.com NetApp ONTAP disk move

During the copy command operation is possible to take a look at the OnCommand System Manager  in the Storage > Aggregate & Disks section > Aggregates > Volumes > Disks > Disk Information. It shows the copy progress from the old disk to the new one.

domalab.com NetApp ONTAP disk move

As soon as the operation is completed the old disk (1.15 in this case) is automatically unmounted.

domalab.com NetApp ONTAP disk move

This particular Aggregate consists of 2 disks. Assuming the goal is to keep all disks for the same aggregate contiguous it is just a matter to rerun the same command for the new disk couple (old and new). In this case moving data from disk 1.36 to 1.2.

domalab.com NetApp ONTAP disk move

The OnCommand System Manager interface shows the action in real time.

domalab.com NetApp ONTAP disk move

As a result the data for this particular aggregate and volume is contiguous on the desired disks.

netapp change disk container

Don't be shy and share with the Community!

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • Click to share on Tumblr (Opens in new window)

You may also like

domalab.com Synology disk fail

Synology Disk fail: How to replace RAID online

netapp change disk container

NetApp VSC 9.7 upgrade with latest patch

netapp change disk container

NetApp VSC 9.7 storage provisioning for VMware

netapp change disk container

NetApp VSC 9.7 setup on a VMware homelab

netapp change disk container

NetApp VSC 9.7 deployment on VMware

netapp change disk container

NetApp ONTAP 9.7 simulator upgrade guide

About the author.

' src=

Michele Domanico

Passionate about Virtualization, Storage, Data Availability and Software Defined Data Center technologies. The aim of Domalab.com is sharing with the Community the knowledge and experience gained with customers, industry leaders and like minded peers. Always open to constructive feedback and new challenges.

Add Comment

Leave a reply cancel reply.

This site uses Akismet to reduce spam. Learn how your comment data is processed .

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Email Address

Recent comments

  • Michele Domanico on Uninstall NetApp VSC from VMware vCenter
  • James Forth on Uninstall NetApp VSC from VMware vCenter
  • Michele Domanico on Configure Nutanix Time Server using command line
  • Krispy215 on Configure Nutanix Time Server using command line
  • Miguel on VMware VCSA Backup on Synology NAS

Latest articles

  • VMware Log Disk Exhaustion alert and how to remediate
  • VCSA SSL mismatch and cannot edit VM properties
  • Can Linux delete immutable files?
  • Veeam XFS Repository setup for immutable backups
  • Linux ubuntu setup for Veeam Immutability on VMware
  • VMware VCSA 7.0U2d upgrade using the Patch ISO method
  • Veeam Backup Nutanix Job setup for AHV VM

Browse articles

Articles by category, top 20 tags.

  • Product and Solutions
  • Support and Training
  • Cloud Central
  • Customer Stories

Collapse navigation panel

Creating your file...

netapp change disk container

  • Release Notes
  • System Manager integration with BlueXP
  • ONTAP platforms
  • Cluster storage
  • High-availability pairs
  • AutoSupport and Active IQ Digital Advisor
  • Logical ports
  • Support for industry-standard network technologies
  • Client protocols
  • Aggregates and RAID groups
  • Root-data partitioning
  • Volumes, qtrees, files, and LUNs
  • SVM use cases
  • Cluster and SVM administration
  • Namespaces and junction points
  • NAS path failover
  • SAN path failover
  • Load balancing
  • Snapshot copies
  • SnapMirror disaster recovery and data transfer
  • SnapMirror Cloud backups to object Storage
  • SnapVault archiving
  • Cloud backup and support for traditional backups
  • MetroCluster continuous availability
  • Thin provisioning
  • Deduplication
  • Compression
  • Capacity measurements in System Manager
  • FlexClone volumes, files, and LUNs
  • Client authentication and authorization
  • Administrator authentication and RBAC
  • Virus scanning
  • WORM storage
  • Application aware data management
  • Get started
  • Set up a cluster with System Manager
  • Create the cluster on the first node
  • Join remaining nodes to the cluster
  • Convert management LIFs from IPv4 to IPv6
  • Check your cluster with Active IQ Config Advisor
  • Synchronize the system time across the cluster
  • Commands for managing symmetric authentication on NTP servers
  • Additional system configuration tasks to complete
  • ASA configuration support and limitations
  • When to upgrade ONTAP
  • Preparation summary
  • Choose your target ONTAP release
  • Confirm configuration support
  • Identify common configuration errors
  • Upgrade paths
  • Create an upgrade plan
  • Verify LIF failover configuration
  • Verify SVM routing configuration
  • Summary of special considerations
  • Mixed version clusters
  • MetroCluster upgrade requirements
  • SAN configurations
  • Prepare SnapMirror relationships
  • Verify compatibility of ONTAP versions
  • DP-type relationships
  • Deduplicated volumes and aggregates
  • NetApp Storage Encryption
  • LDAP clients using SSLv3
  • Session-oriented protocols
  • SSH public keys
  • Load sharing mirrors (8.3)
  • Reboot SP or BMC
  • Download the ONTAP software image
  • Overview of upgrade methods
  • Automated nondisruptive using System Manager
  • Automated nondisruptive using the CLI
  • Automated disruptive
  • Install software package
  • Manual nondisruptive non-MetroCluster
  • Manual nondisruptive MetroCluster (4 or 8 node)
  • Manual nondisruptive MetroCluster (2-node)
  • Manual disruptive
  • Summary of post-upgrade verifications
  • Verify the cluster
  • Verify all LIFs are on home ports
  • Summary of post-upgrade special configurations
  • Network configuration
  • EMS LIF service
  • Networking and storage status
  • SAN configuration
  • KMIP server connections
  • Load-sharing mirror source volumes
  • SnapMirror operations
  • User accounts that can access the Service Processor
  • Update the DQP
  • How automatic updates are scheduled for installation
  • Enable automatic updates
  • Modify automatic updates
  • Manage recommended automatic updates
  • Update firmware manually
  • Do I need technical support?
  • What are the revert paths?
  • Pre-reversion resources
  • Revert considerations
  • What should I verify before I revert?
  • Summary of pre-revert checks
  • SnapMirror Synchronous relationships
  • SnapMirror/SnapVault relationships
  • Split FlexClone volumes
  • FlexGroup volumes
  • SMB servers in workgroup mode
  • Deduplicated volumes
  • User accounts that use SHA-2 hash function
  • Anti-ransomware licensing
  • S3 NAS buckets
  • 2 or 4-node MetroCluster
  • Disable IPsec
  • How do I get and install the revert software image?
  • Revert my cluster
  • Verify cluster and storage health
  • Enable automatic switchover for MetroCluster configurations
  • Enable and revert LIFs to home ports
  • Enable Snapshot copy policies
  • Verify client access (SMB and NFS)
  • Verify IPv6 firewall entries
  • Revert password hash function
  • Maually update SP firmware
  • Verify user accounts that can access the Service Processor
  • Administration overview
  • Use System Manager to access a Cluster
  • Enable new features
  • Download a cluster configuration
  • View and submit support cases
  • Manage maximum capacity limit of a storage VM
  • Monitor capacity with System Manager
  • Manage AutoSupport with System Manager
  • Monitor risks with Active IQ Digital Advisor
  • Gain insights to help optimize your system
  • View hardware configurations and determine problems
  • Reboot, shut down, take over, and give back nodes
  • Add nodes to cluster
  • Manage access to System Manager
  • What the cluster management server is
  • Types of SVMs
  • Access the cluster by using the serial port
  • Access the cluster by using SSH
  • SSH login security
  • Enable Telnet or RSH access to the cluster
  • Access the cluster by using Telnet
  • Access the cluster by using RSH
  • Different shells for CLI commands (cluster administrators only)
  • Methods of navigating CLI command directories
  • Rules for specifying values in the CLI
  • Methods of viewing command history and reissuing commands
  • Keyboard shortcuts for editing CLI commands
  • Use of administrative privilege levels
  • Set the privilege level in the CLI
  • Set display preferences in the CLI
  • Methods of using query operators
  • Methods of using extended queries
  • Methods of customizing show command output by using fields
  • About positional parameters
  • Methods of accessing ONTAP man pages
  • Record a CLI session
  • Commands for managing records of CLI sessions
  • Commands for managing the automatic timeout period of CLI sessions
  • Display information about the nodes in a cluster
  • Display cluster attributes
  • Modify cluster attributes
  • Display the status of cluster replication rings
  • About quorum and epsilon
  • What system volumes are
  • Display node attributes
  • Modify node attributes
  • Rename a node
  • Add nodes to the cluster
  • Remove nodes from the cluster
  • Access a node’s log, core dump, and MIB files by using a web browser
  • Access the system console of a node
  • Manage node root volumes and root aggregates
  • Start or stop a node
  • Manage a node by using the boot menu
  • Isolate management network traffic
  • Considerations for the SP/BMC network configuration
  • Enable the SP/BMC automatic network configuration
  • Configure the SP/BMC network manually
  • Modify the SP API service configuration
  • About the Service Processor (SP)
  • About the Baseboard Management Controller (BMC)
  • Methods of managing SP/BMC firmware updates
  • When the SP/BMC uses the network interface for firmware updates
  • Accounts that can access the SP
  • Access the SP/BMC from an administration host
  • Access the SP/BMC from the system console
  • Relationship among the SP CLI, SP console, and system console sessions
  • Manage the IP addresses that can access the SP
  • Use online help at the SP/BMC CLI
  • Commands to manage a node remotely
  • About the threshold-based SP sensor readings and status values of the system sensors command output
  • About the discrete SP sensor status values of the system sensors command output
  • Commands for managing the SP from ONTAP
  • ONTAP commands for BMC management
  • BMC CLI commands
  • How ONTAP implements audit logging
  • Changes to audit logging in ONTAP 9
  • Display audit log contents
  • Manage audit GET request settings
  • Manage audit log destinations
  • Commands for managing the cluster time
  • Create a banner
  • Manage the banner
  • Create an MOTD
  • Manage the MOTD
  • License types and licensed method
  • Commands for managing licenses
  • Job categories
  • Commands for managing jobs
  • Commands for managing job schedules
  • What configuration backup files are
  • How the node and cluster configurations are backed up automatically
  • Commands for managing configuration backup schedules
  • Commands for managing configuration backup files
  • Find a configuration backup file to use for recovering a node
  • Restore the node configuration using a configuration backup file
  • Find a configuration to use for recovering a cluster
  • Restore a cluster configuration from an existing configuration
  • Synchronize a node with the cluster
  • Commands for managing core dumps
  • Use AutoSupport and Active IQ Digital Advisor
  • When and where AutoSupport messages are sent
  • How AutoSupport creates and sends event-triggered messages
  • Types of AutoSupport messages and their content
  • What AutoSupport subsystems are
  • AutoSupport size and time budgets
  • Files sent in event-triggered AutoSupport messages
  • Log files sent in AutoSupport messages
  • Files sent in weekly AutoSupport messages
  • How AutoSupport OnDemand obtains delivery instructions from technical support
  • Structure of AutoSupport messages sent by email
  • AutoSupport severity types
  • Requirements for using AutoSupport
  • Set up AutoSupport
  • Upload core dump files
  • Upload performance archive files
  • Get AutoSupport message descriptions
  • Commands for managing AutoSupport
  • Information included in the AutoSupport manifest
  • AutoSupport case suppression during scheduled maintenance windows
  • Troubleshoot AutoSupport when messages are not received
  • Troubleshoot AutoSupport message delivery over HTTP or HTTPS
  • Troubleshoot AutoSupport message delivery over SMTP
  • Troubleshoot the AutoSupport subsystem
  • How health monitoring works
  • Ways to respond to system health alerts
  • System health alert customization
  • How health alerts trigger AutoSupport messages and events
  • Available cluster health monitors
  • Receive system health alerts automatically
  • Respond to degraded system health
  • Example of responding to degraded system health
  • Configure discovery of cluster and management network switches
  • Verify the monitoring of cluster and management network switches
  • Commands for monitoring the health of your system
  • Display environmental information
  • Manage access to web services
  • Manage the web protocol engine
  • Commands for managing the web protocol engine
  • Configure SAML authentication for web services
  • Configure access to web services
  • Commands for managing web services
  • Commands for managing mount points on the nodes
  • Commands for managing SSL
  • Troubleshoot web service access problems
  • Verify digital certificates are valid using OCSP
  • View default certificates for TLS-based applications
  • Generate a certificate signing request for the cluster
  • Install a CA-signed server certificate for the cluster
  • Install a CA-signed client certificate for the KMIP server
  • Local tiers (aggregates) and RAID groups
  • Mirrored and unmirrored local tiers (aggregates)
  • Fast zeroing of drives
  • Manually assign disk ownership
  • Workflow to add a local tier (aggregate)
  • Determine the number of disks or disk partitions required for a local tier (aggregate)
  • Decide which local tier (aggregate) creation method to use
  • Add (create) local tiers (aggregates) automatically
  • Add (create) local tiers (aggregates) manually
  • Rename a local tier (aggregate)
  • Set media cost of a local tier (aggregate)
  • Determine drive and RAID group information for a local tier (aggregate)
  • Assign local tiers (aggregates) to storage VMs (SVMs)
  • Determine which volumes reside on a local tier (aggregate)
  • Determine and control a volume’s space usage in a local tier (aggregate)
  • Determine space usage in a local tier (aggregate)
  • Relocate local tier (aggregate) ownership within an HA pair
  • Delete a local tier (aggregate)
  • Commands for relocating local tiers (aggregates)
  • Commands for managing local tiers (aggregates)
  • Workflow to add capacity to a local tier (expanding an aggregate)
  • Methods to create space in a local tier (aggregate)
  • Add disks to a local tier (aggregate)
  • Add drives to a node or shelf
  • Correct misaligned spare partitions
  • How hot spare disks work
  • How low spare warnings can help you manage your spare disks
  • Additional root-data partitioning management options
  • When you need to update the Disk Qualification Package
  • About auto-assignment of disk ownership
  • Display disk and partition ownership
  • Change auto-assignment settings for disk ownership
  • Manually assign ownership of disks
  • Manually assign ownership of partitioned disks
  • Set up an active-passive configuration on nodes using root-data partitioning
  • Set up an active-passive configuration on nodes using root-data-data partitioning
  • Remove ownership from a disk
  • Remove a failed disk
  • When sanitization cannot be performed
  • What happens if sanitization is interrupted
  • Tips for managing local tiers (aggregates) containing data to be sanitized
  • Sanitize a disk
  • Commands for managing disks
  • Commands for displaying space usage information
  • Commands for displaying information about storage shelves
  • Default RAID policies for local tiers (aggregates)
  • RAID protection levels for disks
  • Drive and RAID group information for a local tier (aggregate)
  • Convert from RAID-DP to RAID-TEC
  • Convert RAID-TEC to RAID-DP
  • Considerations for sizing RAID groups
  • Customize the size of your RAID groups
  • Flash Pool local tier (aggregate) caching policies
  • Determine whether to modify the caching policy of Flash Pool local tiers (aggregates)
  • Modify caching policies of Flash Pool local tiers (aggregates)
  • Set the cache-retention policy for Flash Pool local tiers (aggregates)
  • Flash Pool SSD partitioning for Flash Pool local tiers (aggregates) using storage pools
  • Flash Pool candidacy and optimal cache size
  • Create a Flash Pool local tier (aggregate) using physical SSDs
  • Determine whether a Flash Pool local tier (aggregate) is using an SSD storage pool
  • Add cache by adding an SSD storage pool
  • Create a Flash Pool using SSD storage pool allocation units
  • Determine the impact to cache size of adding SSDs to an SSD storage pool
  • Add SSDs to an SSD storage pool
  • Commands for managing SSD storage pools
  • Benefits of storage tiers by using FabricPool
  • Considerations and requirements for using FabricPool
  • About FabricPool tiering policies
  • FabricPool management workflow
  • Add a connection to the cloud
  • Install a FabricPool license
  • Install a CA certificate if you use StorageGRID
  • Install a CA certificate if you use ONTAP S3
  • Set up StorageGRID as the cloud tier
  • Set up ONTAP S3 as the cloud tier
  • Set up Alibaba Cloud Object Storage as the cloud tier
  • Set up Amazon S3 as the cloud tier
  • Set up Google Cloud Storage as the cloud tier
  • Set up IBM Cloud Object Storage as the cloud tier
  • Set up Azure Blob Storage for the cloud as the cloud tier
  • Set up object stores for FabricPool in a MetroCluster configuration
  • Attach the cloud tier to an aggregate
  • Tier data to local bucket
  • Determine how much data in a volume is inactive by using inactive data reporting
  • Create a volume for FabricPool
  • Move a volume to FabricPool
  • Assign a new tag during volume creation
  • Modify an existing tag
  • Delete a tag
  • View existing tags on a volume
  • Check object tagging status on FabricPool volumes
  • Monitor the space utilization for FabricPool
  • Manage storage tiering by modifying a volume’s tiering policy or tiering minimum cooling period
  • Archive volumes with FabricPool (video)
  • Use cloud migration controls to override a volume’s default tiering policy
  • Promote all data from a FabricPool volume to the performance tier
  • Promote file system data to the performance tier
  • Check the status of a performance tier promotion
  • Trigger scheduled migration and tiering
  • Create a FabricPool mirror
  • Monitor FabricPool mirror resync status
  • Display FabricPool mirror details
  • Promote a FabricPool mirror
  • Remove a FabricPool mirror
  • Replace an existing object store using a FabricPool mirror
  • Replace a FabricPool mirror on a MetroCluster configuration
  • Commands for managing aggregates with FabricPool
  • Migrate an SVM
  • Monitor migration
  • Pause and resume migration
  • Cancel migration
  • Manually cut over clients
  • Manually remove source SVM
  • How hardware-assisted takeover works
  • How automatic takeover and giveback works
  • Automatic takeover commands
  • Automatic giveback commands
  • Manual takeover commands
  • Manual giveback commands
  • Testing takeover and giveback
  • Commands for monitoring an HA pair
  • Commands for enabling and disabling storage failover
  • Halt or reboot a node without initiating takeover
  • Rest log overview
  • Access the REST API log
  • Manage volumes
  • Add a volume
  • Expand volumes and LUNs
  • Recover deleted volumes
  • Save storage space
  • Balance load by moving LUNs
  • Balance loads by moving volumes to another tier
  • Use Ansible Playbooks to add or edit volumes or LUNs
  • Manage storage efficiency policies
  • Manage resources using quotas
  • Limit resource use
  • Clone data with FlexClone
  • Search, filter, and sort
  • Capacity measurements
  • Create a volume
  • Enable large volume and large file support
  • Configure volume provisioning options
  • Determine space usage in a volume or aggregate
  • Delete Snapshot copies automatically
  • Configure volumes to automatically provide more space when they are full
  • Configure volumes to automatically grow and shrink their size
  • Requirements for enabling both autoshrink and automatic Snapshot copy deletion
  • How the autoshrink functionality interacts with Snapshot copy deletion
  • Address FlexVol volume fullness and overallocation alerts
  • Address aggregate fullness and overallocation alerts
  • Considerations for setting fractional reserve
  • Display file or inode usage
  • Control and monitoring I/O performance to FlexVol volumes by using Storage QoS
  • Delete a FlexVol volume
  • Protection against accidental volume deletion
  • Commands for managing FlexVol volumes
  • How moving a FlexVol volume works
  • Considerations and recommendations when moving volumes
  • Requirement for moving volumes in SAN environments
  • Move a volume
  • Commands for moving volumes
  • Methods for copying a volume
  • Create a FlexClone volume
  • Split a FlexClone volume from its parent volume
  • Determine the space used by a FlexClone volume
  • Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
  • Create a FlexClone file or FlexClone LUN
  • View node capacity for creating and deleting FlexClone files and FlexClone LUNs
  • View the space savings due to FlexClone files and FlexClone LUNs
  • Methods to delete FlexClone files and FlexClone LUNs
  • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
  • Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted
  • Commands for configuring deletion of FlexClone files
  • Obtain a qtree junction path
  • Qtree name restrictions
  • Convert a directory to a qtree using a Windows client
  • Convert a directory to a qtree using a UNIX client
  • Commands for managing and configuring qtrees
  • What logical space reporting shows
  • What logical space enforcement does
  • Enable logical space reporting and enforcement
  • Manage SVM capacity
  • Quota process
  • Differences among hard, soft, and threshold quotas
  • About quota notifications
  • Why you use quotas
  • What quota rules, quota policies, and quotas are
  • Quota targets and types
  • How default quotas work
  • How you use explicit quotas
  • How derived quotas work
  • How you use tracking quotas
  • How quotas are applied
  • Considerations for assigning quota policies
  • How you specify UNIX users for quotas
  • How you specify Windows users for quotas
  • How default user and group quotas create derived quotas
  • How quotas are applied to the root user
  • How quotas work with special Windows groups
  • How quotas are applied to users with multiple IDs
  • How ONTAP determines user IDs in a mixed environment
  • How quotas with multiple users work
  • How you link UNIX and Windows names for quotas
  • How quotas work with qtrees
  • How user and group quotas work with qtrees
  • How default tree quotas on a FlexVol volume create derived tree quotas
  • How default user quotas on a FlexVol volume affect quotas for the qtrees in that volume
  • How deleting a qtree affects tree quotas
  • How renaming a qtree affects quotas
  • How changing the security style of a qtree affects user quotas
  • When you can use resizing
  • When a full quota reinitialization is required
  • How you can use the quota report to see what quotas are in effect
  • Why enforced quotas differ from configured quotas
  • Use the quota report to determine which quotas limit writes to a specific file
  • Commands for displaying information about quotas
  • When to use the volume quota policy rule show and volume quota report commands
  • How the ls command accounts for space usage
  • How the df command accounts for file size
  • How the du command accounts for space usage
  • Examples of quota configuration
  • Set up quotas on an SVM
  • Modify (or Resizing) quota limits
  • Reinitialize quotas after making extensive changes
  • Commands to manage quota rules and quota policies
  • Commands to activate and modify quotas
  • Enable deduplication on a volume
  • Disable deduplication on a volume
  • Manage automatic volume-level background deduplication on AFF systems
  • Manage aggregate-level inline deduplication on AFF systems
  • Manage aggregate-level background deduplication on AFF systems
  • Temperature-sensitive storage efficiency overview
  • Storage efficiency behavior with volume move and SnapMirror
  • Set storage efficiency modes
  • Change volume inactive data compression threshold
  • Check volume efficiency mode
  • Change volume efficiency mode
  • View volume footprint savings with or without temperature-sensitive storage efficiency
  • Enable data compression on a volume
  • Move between secondary compression and adaptive compression
  • Disable data compression on a volume
  • Manage inline data compaction for AFF systems
  • Enable inline data compaction for FAS systems
  • Inline storage efficiency enabled by default on AFF systems
  • Enable storage efficiency visualization
  • Assign a volume efficiency policy to a volume
  • Modify a volume efficiency policy
  • View a volume efficiency policy
  • Disassociate a volume efficiency policy from a volume
  • Delete a volume efficiency policy
  • Run efficiency operations manually
  • Use checkpoints to resume efficiency operation
  • Resume a halted efficiency operation
  • Run efficiency operations manually on existing data
  • Run efficiency operations depending on the amount of new data written
  • Run efficiency operations using scheduling
  • View efficiency operations and status
  • View efficiency space savings
  • View efficiency statistics of a FlexVol volume
  • Stop volume efficiency operations
  • Information about removing space savings from a volume
  • Rehost SMB volumes
  • Rehost NFS volumes
  • Rehost SAN volumes
  • Rehost volumes in a SnapMirror relationship
  • Features that do not support volume rehost
  • Storage limits
  • Determine the correct volume and LUN configuration combination for your environment
  • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
  • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
  • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
  • Considerations for changing the maximum number of files allowed on a FlexVol volume
  • Cautions for increasing the maximum directory size for FlexVol volumes
  • Rules governing node root volumes and root aggregates
  • Relocate root volumes to new aggregates
  • How deduplication works with FlexClone files and FlexClone LUNs
  • How Snapshot copies work with FlexClone files and FlexClone LUNs
  • How access control lists work with FlexClone files and FlexClone LUNs
  • How quotas work with FlexClone files and FlexClone LUNs
  • How FlexClone volumes work with FlexClone files and FlexClone LUNs
  • How NDMP works with FlexClone files and FlexClone LUNs
  • How volume SnapMirror works with FlexClone files and FlexClone LUNs
  • How volume move affects FlexClone files and FlexClone LUNs
  • How space reservation works with FlexClone files and FlexClone LUNs
  • How an HA configuration works with FlexClone files and FlexClone LUNs
  • FlexGroup volumes management with System Manager
  • What a FlexGroup volume is
  • Supported and unsupported configurations for FlexGroup volumes
  • Enable 64-bit NFSv3 identifiers on an SVM
  • Provision a FlexGroup volume automatically
  • Create a FlexGroup volume
  • Monitor the space usage of a FlexGroup volume
  • Increase the size of a FlexGroup volume
  • Reduce the size of a FlexGroup volume
  • Configure FlexGroup volumes to automatically grow and shrink their size
  • Delete directories rapidly on a cluster
  • Manage client rights to delete directories rapidly
  • Create qtrees with FlexGroup volumes
  • Use quotas for FlexGroup volumes
  • Enable storage efficiency on a FlexGroup volume
  • Protect FlexGroup volumes using Snapshot copies
  • Move the constituents of a FlexGroup volume
  • Use aggregates in FabricPool for existing FlexGroup volumes
  • Rebalance FlexGroup volumes
  • Create a SnapMirror relationship for FlexGroup volumes
  • Create a SnapVault relationship for FlexGroup volumes
  • Create a unified data protection relationship for FlexGroup volumes
  • Create an SVM disaster recovery relationship for FlexGroup volumes
  • Transition an existing FlexGroup SnapMirror relationship to SVM DR
  • Convert a FlexVol volume to a FlexGroup volume within an SVM-DR relationship
  • Considerations for creating SnapMirror cascade and fanout relationships for FlexGroups
  • Considerations for creating a SnapVault backup relationship and a unified data protection relationship for FlexGroup volumes
  • Monitor SnapMirror data transfers for FlexGroup volumes
  • Activate the destination FlexGroup volume
  • Reactivate the original source FlexGroup volume after disaster
  • Reverse a SnapMirror relationship between FlexGroup volumes during disaster recovery
  • Expand the source FlexGroup volume of a SnapMirror relationship
  • Expand the destination FlexGroup volume of a SnapMirror relationship
  • Perform a SnapMirror single file restore from a FlexGroup volume
  • Restore a FlexGroup volume from a SnapVault backup
  • Disable SVM protection on a FlexGroup volume
  • Enable SVM protection on a FlexGroup volume
  • Convert a FlexVol volume to a FlexGroup volume
  • Convert a FlexVol volume SnapMirror relationship to a FlexGroup volume SnapMirror relationship
  • FlexCache volumes management with System Manager
  • Benefits of FlexCache volumes
  • Typical FlexCache deployments
  • Supported and unsupported features for FlexCache volumes
  • Add a FlexCache license
  • Create a FlexCache volume
  • Guidelines for sizing a FlexCache volume
  • Considerations for auditing FlexCache volumes
  • Synchronize properties of a FlexCache volume from an origin volume
  • Update the configurations of a FlexCache relationship
  • Enable file access time updates
  • Enable global file locking
  • Prepopulate a FlexCache volume
  • Delete a FlexCache relationship
  • View and manage your network
  • Auto detect wiring issues
  • Download network data for reporting
  • About NAS path failover for ONTAP 9.8 and later
  • Worksheet for NAS path failover configuration
  • Create IPspaces
  • Move broadcast domains
  • Repair port reachability
  • Create SVMs
  • Create LIFs
  • Configure DNS services
  • Set up NAS path failover (ONTAP 9.0-9.7 CLI)
  • Determine which ports can be used for a broadcast domains
  • Remove ports from a broadcast domain
  • Create a broadcast domain
  • Create a subnet
  • Configure dynamic DNS services
  • Network management overview
  • Network features by release
  • Verify your networking configuration after upgrading to ONTAP 9.8 or later
  • Network cabling guidelines
  • Relationship between broadcast domains, failover groups, and failover policies
  • Combine physical ports to create interface groups
  • Configure VLANs over physical ports
  • Modify network port attributes
  • Modify MTU setting for interface group ports
  • Monitor the health of network ports
  • Monitor the reachability of network ports in ONTAP 9.8 and later
  • Convert 40GbE NIC ports into multiple 10GbE ports for 10GbE connectivity
  • Removing a NIC from the node on ONTAP 9.7 or earlier
  • Removing a NIC from the node on ONTAP 9.8 or later
  • Example of using IPspaces
  • Standard properties of IPspaces
  • Display IPspaces
  • Delete an IPspace
  • About broadcast domains for ONTAP 9.8 and later
  • Example of using broadcast domains
  • Add a broadcast domain
  • Add or remove ports from a broadcast domain
  • Split broadcast domains
  • Merge broadcast domains
  • Change the MTU value for ports in a broadcast domain
  • Display broadcast domains
  • Delete a broadcast domain
  • About broadcast domains for ONTAP 9.7 and earlier
  • Create a failover group
  • Configure failover settings on a LIF
  • Commands for managing failover groups and policies
  • Add or remove IP addresses from a subnet
  • Change subnet properties
  • Display subnets
  • Delete a subnet
  • LIF compatibility with port types
  • LIF roles in ONTAP 9.5 and earlier
  • LIFs and service policies
  • Configure LIF service policies
  • Create a LIF
  • Modify a LIF
  • Migrate a LIF
  • Revert a LIF to its home port
  • ONTAP 9.8 or later-Recover from an incorrectly configured cluster LIF
  • Delete a LIF
  • Configure virtual IP (VIP) LIFs
  • Configure DNS for host-name resolution
  • Manage the hosts table (cluster administrators only)
  • How DNS load balancing works
  • Create a DNS load balancing zone
  • Add or remove a LIF from a load balancing zone
  • Configure network security using Federal Information Processing Standards (FIPS)
  • Configure IP security (IPsec) over wire encryption
  • Configure firewall policies for LIFs
  • Commands for managing firewall service and policies
  • DSCP marking for UC compliance
  • Modify QoS marking values
  • Display QoS marking values
  • What MIBs are
  • Create an SNMP community and assign it to a LIF
  • Configure SNMPv3 users in a cluster
  • Configure traphosts to receive SNMP notifications
  • Commands for managing SNMP
  • Create a static route
  • Enable multipath routing
  • Delete a static route
  • Display routing information
  • Remove dynamic routes from routing tables
  • ONTAP internal ports
  • Display network port information
  • Display information about a VLAN (cluster administrators only)
  • Display interface group information (cluster administrators only)
  • Display LIF information
  • Display DNS host table entries (cluster administrators only)
  • Display DNS domain configurations
  • Display information about failover groups
  • Display LIF failover targets
  • Display LIFs in a load balancing zone
  • Display cluster connections
  • Commands for diagnosing network problems
  • Display network connectivity with neighbor discovery protocols
  • NAS storage overview
  • VMware datastores
  • Home directories
  • Linux servers
  • Export policies
  • Windows servers
  • Both Windows and Linux
  • Secure client access with Kerberos
  • Provide client access with name services
  • Manage directories and files
  • Manage host-specific users and groups
  • Monitor NFS active clients
  • Enable Linux servers
  • Enable Windows servers
  • Enable Both Windows and Linux
  • Assess physical storage requirements
  • Assess networking requirements
  • Decide where to provision new NFS storage capacity
  • Worksheet for gathering NFS configuration information
  • Create an SVM
  • Verify that the NFS protocol is enabled on the SVM
  • Open the export policy of the SVM root volume
  • Create an NFS server
  • Enable DNS for host-name resolution
  • Configure the name service switch table
  • Create a local UNIX user
  • Load local UNIX users from a URI
  • Create a local UNIX group
  • Add a user to a local UNIX group
  • Load local UNIX groups from a URI
  • Load netgroups into SVMs
  • Verify the status of netgroup definitions
  • Create an NIS domain configuration
  • Create a new LDAP client schema
  • Install the self-signed root CA certificate on the SVM
  • Create an LDAP client configuration
  • Associate the LDAP client configuration with SVMs
  • Verify LDAP sources in the name service switch table
  • Verify permissions for Kerberos configuration
  • Create an NFS Kerberos realm configuration
  • Configure NFS Kerberos permitted encryption types
  • Enable Kerberos on a data LIF
  • Create an export policy
  • Add a rule to an export policy
  • Create a qtree
  • Manage the processing order of export rules
  • Assign an export policy to a volume
  • Assign an export policy to a qtree
  • Verify NFS client access from the cluster
  • Test NFS access from client systems
  • Where to find additional information
  • Comparison of exports in 7-Mode and ONTAP
  • Examples of ONTAP export policies
  • What the typical NAS namespace architectures are
  • Authentication-based restrictions
  • File-based restrictions
  • How ONTAP uses name services
  • How ONTAP grants SMB file access from NFS clients
  • How the NFS credential cache works
  • Create data volumes with specified junction points
  • Creating data volumes without specifying junction points
  • Mounting or unmounting existing volumes in the NAS namespace
  • Displaying volume mount and junction point information
  • What the security styles and their effects are
  • Where and when to set security styles
  • Decide which security style to use on SVMs
  • How security style inheritance works
  • How ONTAP preserves UNIX permissions
  • Manage UNIX permissions using the Windows Security tab
  • Configure security styles on SVM root volumes
  • Configure security styles on FlexVol volumes
  • Configure security styles on qtrees
  • How export policies control client access to volumes or qtrees
  • Default export policy for SVMs
  • How export rules work
  • Manage clients with an unlisted security type
  • How security types determine client access levels
  • Manage superuser access requests
  • How ONTAP uses export policy caches
  • How the access cache works
  • How access cache parameters work
  • Removing an export policy from a qtree
  • Validating qtree IDs for qtree file operations
  • Export policy restrictions and nested junctions for FlexVol volumes
  • ONTAP support for Kerberos
  • Requirements for configuring Kerberos with NFS
  • Specifying the user ID domain for NFSv4
  • How ONTAP name service switch configuration works
  • LDAP signing and sealing concepts
  • LDAPS concepts
  • Enable LDAP RFC2307bis support
  • Configuration options for LDAP directory searches
  • Improve performance of LDAP directory netgroup-by-host searches
  • Use LDAP fast bind for nsswitch authentication
  • Display LDAP statistics
  • How name mapping works
  • Multidomain searches for UNIX user to Windows user name mappings
  • Name mapping conversion rules
  • Create a name mapping
  • Configure the default user
  • Commands for managing name mappings
  • Enable access for Windows NFS clients
  • Enable the display of NFS exports on NFS clients
  • Enable or disable NFSv3
  • Enable or disable NFSv4.0
  • Enable or disable NFSv4.1
  • Manage NFSv4 storepool limits
  • Enable or disable pNFS
  • Controlling NFS access over TCP and UDP
  • Controlling NFS requests from nonreserved ports
  • Handling NFS access to NTFS volumes or qtrees for unknown UNIX users
  • Considerations for clients that mount NFS exports using a nonreserved port
  • Performing stricter access checking for netgroups by verifying domains
  • Modifying ports used for NFSv3 services
  • Commands for managing NFS servers
  • Troubleshooting name service issues
  • Verifying name service connections
  • Commands for managing name service switch entries
  • Commands for managing name service cache
  • Commands for managing local UNIX users
  • Commands for managing local UNIX groups
  • Limits for local UNIX users, groups, and group members
  • Manage limits for local UNIX users and groups
  • Commands for managing local netgroups
  • Commands for managing NIS domain configurations
  • Commands for managing LDAP client configurations
  • Commands for managing LDAP configurations
  • Commands for managing LDAP client schema templates
  • Commands for managing NFS Kerberos interface configurations
  • Commands for managing NFS Kerberos realm configurations
  • Commands for managing export policies
  • Commands for managing export rules
  • Reasons for modifying the NFS credential cache time-to-live
  • Configure the time-to-live for cached NFS user credentials
  • Flush export policy caches
  • Display the export policy netgroup queue and cache
  • Checking whether a client IP address is a member of a netgroup
  • Optimizing access cache performance
  • About file locking between protocols
  • How ONTAP treats read-only bits
  • How ONTAP differs from Windows on handling locks on share path components
  • Display information about locks
  • Breaking locks
  • How FPolicy first-read and first-write filters work with NFS
  • Modifying the NFSv4.1 server implementation ID
  • Benefits of enabling NFSv4 ACLs
  • How NFSv4 ACLs work
  • Enable or disable modification of NFSv4 ACLs
  • How ONTAP uses NFSv4 ACLs to determine whether it can delete a file
  • Enable or disable NFSv4 ACLs
  • Modifying the maximum ACE limit for NFSv4 ACLs
  • Enable or disable NFSv4 read file delegations
  • Enable or disable NFSv4 write file delegations
  • About NFSv4 file and record locking
  • Specifying the NFSv4 locking lease period
  • Specifying the NFSv4 locking grace period
  • How NFSv4 referrals work
  • Enable or disable NFSv4 referrals
  • Displaying NFS statistics
  • Displaying DNS statistics
  • Displaying NIS statistics
  • Support for VMware vStorage over NFS
  • Enable or disable VMware vStorage over NFS
  • Enable or disable rquota support
  • NFSv3 and NFSv4 performance improvement by modifying the TCP transfer size
  • Modifying the NFSv3 and NFSv4 TCP maximum transfer size
  • Configure the number of group IDs allowed for NFS users
  • Controlling root user access to NTFS security-style data
  • NFSv4.0 functionality supported by ONTAP
  • Limitations of ONTAP support for NFSv4
  • ONTAP support for NFSv4.1
  • ONTAP support for NFSv4.2
  • ONTAP support for parallel NFS
  • Use of hard mounts
  • Characters a file or directory name can use
  • Case-sensitivity of file and directory names in a multiprotocol environment
  • How ONTAP creates file and directory names
  • How ONTAP handles multi-byte file, directory, and qtree names
  • Configure character mapping for SMB file name translation on volumes
  • Commands for managing character mappings for SMB file name translation
  • Configure NICS and NFS
  • Configure LIFs
  • Modify the NFS settings
  • Decide where to provision new SMB storage capacity
  • Worksheet for gathering SMB configuration information
  • Verify that the SMB protocol is enabled on the SVM
  • Configure time services
  • Create an SMB server in an Active Directory domain
  • Create keytab files for SMB authentication
  • Create an SMB server in a workgroup
  • Create local user accounts
  • Create local groups
  • Manage local group membership
  • Verify enabled SMB versions
  • Map the SMB server on the DNS server
  • Requirements and considerations for creating an SMB share
  • Create an SMB share
  • Verify SMB client access
  • Create SMB share access control lists
  • Configure NTFS file permissions in a share
  • Verify user access
  • Supported SMB versions and functionality
  • Unsupported Windows features
  • Configure NIS or LDAP name services on the SVM
  • Modify SMB servers
  • Available SMB server options
  • Configure SMB server options
  • Configure the grant UNIX group permission to SMB users
  • Configure access restrictions for anonymous users
  • Enable or disable the presentation of NTFS ACLs for UNIX security-style data
  • How ONTAP handles SMB client authentication
  • Guidelines for SMB server security settings in an SVM disaster recovery configuration
  • Display information about CIFS server security settings
  • Enable or disable required password complexity for local SMB users
  • Modify the CIFS server Kerberos security settings
  • Set the CIFS server minimum authentication security level
  • Configure strong security for Kerberos-based communication by using AES encryption
  • Enable or disable AES encryption for Kerberos-based communication
  • How SMB signing policies affect communication with a CIFS server
  • Performance impact of SMB signing
  • Recommendations for configuring SMB signing
  • Guidelines for SMB signing when multiple data LIFS are configured
  • Enable or disable required SMB signing for incoming SMB traffic
  • Determining whether SMB sessions are signed
  • Monitor SMB signed session statistics
  • Performance impact of SMB encryption
  • Enable or disable required SMB encryption for incoming SMB traffic
  • Determine whether clients are connected using encrypted SMB sessions
  • Monitor SMB encryption statistics
  • Enable LDAP signing and sealing on the CIFS server
  • Export a copy of the self-signed root CA certificate
  • Enable LDAP over TLS on the CIFS server
  • Configure SMB Multichannel for performance and redundancy
  • Configure the default UNIX user
  • Configure the guest UNIX user
  • Map the administrators group to root
  • Display information about what types of users are connected over SMB sessions
  • Command options to limit excessive Windows client resource consumption
  • Write cache data-loss considerations when using oplocks
  • Enable or disable oplocks when creating SMB shares
  • Commands for enabling or disabling oplocks on volumes and qtrees
  • Enable or disable oplocks on existing SMB shares
  • Monitor oplock status
  • Supported GPOs
  • Requirements for using GPOs with your CIFS server
  • Enable or disable GPO support on a SMB server
  • What to do if GPO updates are failing
  • Manually updating GPO settings on the CIFS server
  • Display information about GPO configurations
  • Display detailed information about restricted group GPOs
  • Display information about central access policies
  • Display information about central access policy rules
  • Commands for managing CIFS servers computer account passwords
  • Display information about discovered servers
  • Reset and rediscover servers
  • Manage domain controller discovery
  • Add preferred domain controllers
  • Commands for managing preferred domain controllers
  • Enable SMB2 connections to domain controllers
  • Enable encrypted connections to domain controllers
  • How the storage system provides null session access
  • Grant null users access to file system shares
  • Add a list of NetBIOS aliases to the CIFS server
  • Remove NetBIOS aliases from the NetBIOS alias list
  • Display the list of NetBIOS aliases on CIFS servers
  • Determine whether SMB clients are connected using NetBIOS aliases
  • Stop or start the CIFS server
  • Move CIFS servers to different OUs
  • Modify the dynamic DNS domain on the SVM before moving the SMB server
  • Join anSVM to an Active Directory domain
  • Display information about NetBIOS over TCP connections
  • Commands for managing CIFS servers
  • Enable the NetBios name service
  • Requirements for using IPv6
  • Support for IPv6 with SMB access and CIFS services
  • How CIFS servers use IPv6 to connect to external servers
  • Enable IPv6 for SMB (cluster administrators only)
  • Disable IPv6 for SMB
  • Monitor and display information about IPv6 SMB sessions
  • Create data volumes without specifying junction points
  • Mount or unmount existing volumes in the NAS namespace
  • Display volume mount and junction point information
  • Enable or disable multidomain name mapping searches
  • Reset and rediscover trusted domains
  • Display information about discovered trusted domains
  • Add, remove, or replace trusted domains in preferred trusted domain lists
  • Display information about the preferred trusted domain list
  • What the default administrative shares are
  • SMB share naming requirements
  • Directory case-sensitivity requirements when creating shares in a multiprotocol environment
  • Add or remove share properties on an existing SMB share
  • Optimize SMB user access with the force-group share setting
  • Create an SMB share with the force-group share setting
  • View information about SMB shares using the MMC
  • Commands for managing SMB shares
  • Guidelines for managing SMB share-level ACLs
  • Commands for managing SMB share access control lists
  • Configure advanced NTFS file permissions using the Windows Security tab
  • Configure NTFS file permissions using the ONTAP CLI
  • How UNIX file permissions provide access control when accessing files over SMB
  • Supported Dynamic Access Control functionality
  • Considerations when using Dynamic Access Control and central access policies with CIFS servers
  • Enable or disable Dynamic Access Control
  • Manage ACLs that contain Dynamic Access Control ACEs when Dynamic Access Control is disabled
  • Configure central access policies to secure data on CIFS servers
  • Display information about Dynamic Access Control security
  • Revert considerations for Dynamic Access Control
  • Where to find additional information about configuring and using Dynamic Access Control and central access policies
  • How export policies are used with SMB access
  • Examples of export policy rules that restrict or allow access over SMB
  • Enable or disable export policies for SMB access
  • Use cases for using Storage-Level Access Guard
  • Workflow to configure Storage-Level Access Guard
  • Configure Storage-Level Access Guard
  • Effective SLAG matrix
  • Display information about Storage-Level Access Guard
  • Remove Storage-Level Access Guard
  • Local users and groups concepts
  • Reasons for creating local users and local groups
  • How local user authentication works
  • How user access tokens are constructed
  • Guidelines for using SnapMirror on SVMs that contain local groups
  • What happens to local users and groups when deleting CIFS servers
  • How you can use Microsoft Management Console with local users and groups
  • Guidelines for reverting
  • List of supported privileges
  • Assign privileges
  • Guidelines for using BUILTIN groups and the local administrator account
  • Requirements for local user passwords
  • Predefined BUILTIN groups and default privileges
  • Enable or disable local users and groups
  • Enable or disable local user authentication
  • Modify local user accounts
  • Enable or disable local user accounts
  • Change local user account passwords
  • Display information about local users
  • Display information about group memberships for local users
  • Delete local user accounts
  • Modify local groups
  • Display information about local groups
  • Display information about members of local groups
  • Delete a local group
  • Update domain user and group names in local databases
  • Add privileges to local or domain users or groups
  • Remove privileges from local or domain users or groups
  • Reset privileges for local or domain users and groups
  • Display information about privilege overrides
  • Allow users or groups to bypass directory traverse checking
  • Disallow users or groups from bypassing directory traverse checking
  • Display information about file security on NTFS security-style volumes
  • Display information about file security on mixed security-style volumes
  • Display information about file security on UNIX security-style volumes
  • Display information about NTFS audit policies on FlexVol volumes using the CLI
  • Display information about NFSv4 audit policies on FlexVol volumes using the CLI
  • Ways to display information about file security and audit policies
  • Use cases for using the CLI to set file and folder security
  • Limits when using the CLI to set file and folder security
  • How security descriptors are used to apply file and folder security
  • Guidelines for applying file-directory policies that use local users or groups on the SVM disaster recovery destination
  • Create an NTFS security descriptor
  • Add NTFS DACL access control entries to the NTFS security descriptor
  • Create security policies
  • Add a task to the security policy
  • Apply security policies
  • Monitor the security policy job
  • Verify the applied file security
  • Add NTFS SACL access control entries to the NTFS security descriptor
  • Verify the applied audit policy
  • Considerations when managing security policy jobs
  • Commands for managing NTFS security descriptors
  • Commands for managing NTFS DACL access control entries
  • Commands for managing NTFS SACL access control entries
  • Commands for managing security policies
  • Commands for managing security policy tasks
  • Commands for managing security policy jobs
  • How SMB metadata caching works
  • Enable the SMB metadata cache
  • Configure the lifetime of SMB metadata cache entries
  • Display SMB session information
  • Display information about open SMB files
  • Determine which statistics objects and counters are available
  • Display statistics
  • Requirements for using offline files
  • Guidelines for deploying offline files
  • Configure offline files support on SMB shares using the CLI
  • Configure offline files support on SMB shares by using the Computer Management MMC
  • Requirements for using roaming profiles
  • Configure roaming profiles
  • Requirements for using folder redirection
  • Configure folder redirection
  • Access the ~snapshot directory from Windows clients using SMB 2.x
  • Requirements for using Microsoft Previous Versions
  • Use the Previous Versions tab to view and manage Snapshot copy data
  • Determine whether Snapshot copies are available for Previous Versions use
  • Create a Snapshot configuration to enable Previous Versions access
  • Guidelines for restoring directories that contain junctions
  • How ONTAP enables dynamic home directories
  • Add a home director share
  • Home directory shares require unique user names
  • What happens to static home directory share names after upgrading
  • Add a home directory search path
  • Create a home directory configuration using the %w and %d variables
  • Configure home directories using the %u variable
  • Additional home directory configurations
  • Commands for managing search paths
  • Display information about an SMB user’s home directory path
  • Manage accessibility to users' home directories
  • How ONTAP enables you to provide SMB client access to UNIX symbolic links
  • Limits when configuring UNIX symbolic links for SMB access
  • Control automatic DFS advertisements in ONTAP with a CIFS server option
  • Configure UNIX symbolic link support on SMB shares
  • Create symbolic link mappings for SMB shares
  • Commands for managing symbolic link mappings
  • BranchCache version support
  • Network protocol support requirements
  • ONTAP and Windows hosts version requirements
  • Reasons ONTAP invalidates BranchCache hashes
  • Guidelines for choosing the hash store location
  • BranchCache recommendations
  • Requirements for configuring BranchCache
  • Configure BranchCache on the SMB server
  • Where to find information about configuring BranchCache at the remote office
  • Create a BranchCache-enabled SMB share
  • Enable BranchCache on an existing SMB share
  • Modify BranchCache configurations
  • Display information about BranchCache configurations
  • Change the BranchCache server key
  • Pre-computing BranchCache hashes on specified paths
  • Flush hashes from the SVM BranchCache hash store
  • Display BranchCache statistics
  • Support for BranchCache Group Policy Objects
  • Display information about BranchCache Group Policy Objects
  • Disable BranchCache on a single SMB share
  • Stop automatic caching on all SMB shares
  • What happens when you disable or reenable BranchCache on the CIFS server
  • Disable or enable BranchCache
  • What happens when you delete the BranchCache configuration
  • Delete the BranchCache configuration
  • What happens to BranchCache when reverting
  • How ODX works
  • Requirements for using ODX
  • Guidelines for using ODX
  • Use cases for ODX
  • Enable or disable ODX
  • Requirements and guidelines for using automatic node referrals
  • Support for SMB automatic node referrals
  • Enable or disable SMB automatic node referrals
  • Use statistics to monitor automatic node referral activity
  • Monitor client-side SMB automatic node referral information using a Windows client
  • Enable or disable access-based enumeration on SMB shares
  • Enable or disable access-based enumeration from a Windows client
  • NAS data requirements
  • Enable S3 multi-protocol access
  • Create S3 NAS bucket
  • Enable S3 client users
  • Configure ONTAP for Microsoft Hyper-V and SQL Server over SMB solutions
  • What are nondisruptive operations?
  • Protocols that enable nondisruptive operations over SMB
  • Key concepts about nondisruptive operations for Hyper-V and SQL Server over SMB
  • How SMB 3.0 functionality supports nondisruptive operations over SMB shares
  • What the Witness protocol does to enhance transparent failover
  • How the Witness protocol works
  • Remote VSS concepts
  • Example of a directory structure used by Remote VSS
  • How SnapManager for Hyper-V manages Remote VSS-based backups for Hyper-V over SMB
  • How ODX copy offload is used with Hyper-V and SQL Server over SMB shares
  • ONTAP and licensing requirements
  • Network and data LIF requirements
  • SMB server and volume requirements for Hyper-V over SMB
  • SMB server and volume requirements for SQL Server over SMB
  • Continuously available share requirements and considerations for Hyper-V over SMB
  • Continuously available share requirements and considerations for SQL Server over SMB
  • Remote VSS considerations for Hyper-V over SMB configurations
  • ODX copy offload requirements for SQL Server and Hyper-V over SMB
  • Recommendations for SQL Server and Hyper-V over SMB configurations
  • Complete the volume configuration worksheet
  • Complete the SMB share configuration worksheet
  • Verify that both Kerberos and NTLMv2 authentication are permitted (Hyper-V over SMB shares)
  • Verify that domain accounts map to the default UNIX user
  • Verify that the security style of the SVM root volume is set to NTFS
  • Verify that required CIFS server options are configured
  • Create NTFS data volumes
  • Create continuously available SMB shares
  • Add the SeSecurityPrivilege privilege to the user account (for SQL Server of SMB shares)
  • Configure the VSS shadow copy directory depth (for Hyper-V over SMB shares)
  • Configure existing shares for continuous availability
  • Enable or disable VSS shadow copies for Hyper-V over SMB backups
  • Display SMB statistics
  • Use health monitoring to determine whether nondisruptive operation status is healthy
  • Display nondisruptive operation status by using system health monitoring
  • Verify the continuously available SMB share configuration
  • Verify LIF status
  • SAN provisioning with iSCSI
  • How iSCSI authentication works
  • iSCSI initiator security management
  • iSCSI endpoint isolation
  • What CHAP authentication is
  • How using iSCSI interface access lists to limit initiator interfaces can increase performance and security
  • iSNS server registration requirement
  • SAN provisioning with FC
  • SAN provisioning with NVMe
  • SAN volume configuration options
  • Automatic host-side space management with SCSI thinly provisioned LUNs
  • Enable space allocation for SCSI thinly provisioned LUNs
  • Host support for SCSI thin provisioning
  • Simplified host management with SnapCenter
  • About igroups
  • Example of how igroups give LUN access
  • Specify initiator WWPNs and iSCSI node names for an igroup
  • How LUN access works in a virtualized environment
  • Considerations for LIFs in cluster SAN environments
  • Improve VMware VAAI performance for ESX hosts
  • Microsoft Offloaded Data Transfer (ODX)
  • Configure switches for FCoE
  • System requirements
  • What to know before you create a LUN
  • Verify or add the FC or iSCSI license
  • Provision SAN storage
  • License requirements
  • NVMe support and limitations
  • Configure an SVM for NVMe
  • Provision NVMe storage
  • Map an NVMe namespace to a subsystem
  • Edit LUN QoS Policy
  • Convert a LUN into a namespace
  • Take a LUN offline
  • Resize a LUN
  • Delete a LUN
  • What to know before copying LUNs
  • Examine configured and used space of a LUN
  • Control and monitor I/O performance to LUNs using Storage QoS
  • Tools available to effectively monitor your LUNs
  • Capabilities and restrictions of transitioned LUNs
  • I/O misalignments on properly aligned LUNs
  • Ways to address issues when LUNs go offline
  • Troubleshoot iSCSI LUNs not visible on the host
  • Ways to limit LUN access with portsets and igroups
  • Manage igroups and initiators
  • Create nested igroup
  • Map igroup to multiple LUNs
  • Create a portset and bind to an igroup
  • Manage portsets
  • Selective LUN Map
  • Configure your network for best performance
  • Configure an SVM for iSCSI
  • Define a security policy method for an initiator
  • Delete an iSCSI service for an SVM
  • Get more details in iSCSI session error recoveries
  • Register the SVM with an iSNS server
  • Resolve iSCSI error messages on the storage system
  • iSCSI LIF failover for ASA platforms
  • Configure an SVM for FC
  • Delete an FC service for an SVM
  • Recommended MTU configurations for FCoE jumbo frames
  • Start the NVMe/FC service for an SVM
  • Delete NVMe/FC service from an SVM
  • Resize a NVMe namespace
  • Convert a namespace into a LUN
  • Set up secure authentication over NVMe/TCP
  • Disable secure authentication over NVMe/TCP
  • Commands for managing FC adapters
  • Configure FC adapters
  • View adapter settings
  • Change the UTA2 port from CNA mode to FC mode
  • Change the CNA/UTA2 target adapter optical modules
  • Supported port configurations for X1143A-R6 adapters
  • Configure X1143A-R6 adapter ports
  • Prevent loss of connectivity when using the X1133A-R6 adapter
  • Configure an NVMe LIF
  • What to know before moving a SAN LIF
  • Remove a SAN LIF from a port set
  • Move a SAN LIF
  • Delete a LIF in a SAN environment
  • SAN LIF requirements for adding nodes to a cluster
  • Configure iSCSI LIFs to return FQDN to host iSCSI SendTargets Discovery Operation
  • Calculate rate of data growth for LUNs
  • Restore a single LUN from a Snapshot copy
  • Restore all LUNs in a volume from a Snapshot copy
  • Delete one or more existing Snapshot copies from a volume
  • Reasons for using FlexClone LUNs
  • How a FlexVol volume can reclaim free space with autodelete setting
  • Clone LUNs from an active volume
  • Create FlexClone LUNs from a Snapshot copy in a volume
  • Access a read-only LUN copy from a SnapVault backup
  • Restore a single LUN from a SnapVault backup
  • Restore all LUNs in a volume from a SnapVault backup
  • How you can connect a host backup system to the primary storage system
  • Back up a LUN through a host backup system
  • Ways to configure iSCSI SAN hosts with single nodes
  • Ways to configure iSCSI SAN hosts with HA pairs
  • Benefits of using VLANs in iSCSI configurations
  • Considerations for FC-NVMe configurations
  • Ways to configure FC and FC-NVMe SAN hosts with single nodes
  • Ways to configure FC & FC-NVMe SAN hosts with HA pairs
  • FC switch configuration best practices
  • Supported number of FC hop counts
  • FC target port supported speeds
  • FC Target port configuration recommendations
  • Configure FC adapters for initiator mode
  • Configure FC adapters for target mode
  • Display information about an FC target adapter
  • Change the FC adapter speed
  • Supported FC ports
  • Configure the ports
  • FCoE initiator and target combinations
  • FCoE supported hop count
  • World Wide Name-based zoning
  • Individual zones
  • Single-fabric zoning
  • Dual-fabric HA pair zoning
  • Zoning restrictions for Cisco FC and FCoE switches
  • Requirements for shared SAN configurations
  • When host multipathing software is required
  • Recommended number of paths from host to nodes in cluster
  • Determine the number of supported nodes for SAN configurations
  • Determine the number of supported hosts per cluster in FC and FC-NVMe configurations
  • Determine the supported number of hosts in iSCSI configurations
  • FC switch configuration limits
  • Calculate queue depth
  • Set queue depths
  • Prevent port overlap between switchover and switchback
  • ONTAP S3 architecture and use cases
  • ONTAP version support for S3 object storage
  • ONTAP S3 supported actions
  • ONTAP S3 interoperability
  • ONTAP S3 validated third-party solutions
  • Decide where to provision new S3 storage capacity
  • Create an SVM for S3
  • Create and install a CA certificate on the SVM
  • Create an S3 service data policy
  • Create data LIFs
  • Create intercluster LIFs for remote FabricPool tiering
  • Create the S3 object store server
  • Create a bucket
  • Create a bucket lifecycle rule
  • Create an S3 user
  • Create or modify S3 groups
  • About bucket and object store server policies
  • Modify a bucket policy
  • Create or modify an object store server policy
  • Enable ONTAP S3 access for remote FabricPool tiering
  • Enable ONTAP S3 access for local FabricPool tiering
  • Enable client access from an S3 app
  • Storage service definitions
  • Create mirror for new bucket
  • Create mirror for existing bucket
  • Takeover from destination
  • Restore from destination
  • Requirements for cloud targets
  • Create backup for new bucket
  • Create backup for existing bucket
  • Restore from cloud target
  • Modify mirror policy
  • Plan a configuration
  • Create and enable the configuration
  • Select buckets for auditing
  • Modify the configuration
  • Show configurations
  • Security with System Manager
  • Configuration worksheets
  • Create login accounts
  • Create local accounts
  • Enable password account access
  • Enable SSH public key accounts
  • Manage multifactor authentication with System Manager
  • Enable MFA with SSH and TOTP
  • Configure local user account for MFA with TOTP
  • Reset TOTP configuration
  • Disable TOTP secret key
  • Enable SSL certificate accounts
  • Enable Active Directory account access
  • Enable LDAP or NIS account access
  • Configure SAML authentication
  • Modify the role assigned to an administrator
  • Define custom roles
  • Predefined roles for cluster administrators
  • Predefined roles for SVM administrators
  • Control administrator access with System Manager
  • Associate a public key with an administrator account
  • Manage SSH public keys and X.509 certificates for an administrator account
  • Generate and install a CA-signed server certificate
  • Configure Active Directory domain controller access
  • Configure LDAP or NIS server access
  • Change an administrator password
  • Lock and unlock an administrator account
  • Manage failed login attempts
  • Enforce SHA-2 on administrator account passwords
  • Diagnose and correct file access issues with System Manager
  • Manage administrator groups
  • Enable and disable multi-admin verification
  • Manage protected operation rules
  • Request execution of protected operations
  • Manage protected operation requests
  • Use cases and considerations
  • Enable by default
  • Manage attack detection parameters
  • Respond to abnormal activity
  • Recover data after an attack
  • Modify Snapshot copy options
  • Understanding NetApp virus scanning
  • Virus scanning workflow
  • Antivirus architecture
  • Vscan partner solutions
  • Vscan server installation and configuration
  • Create a scanner pool on a single cluster
  • Create scanner pools in MetroCluster configurations
  • Apply a scanner policy on a single cluster
  • Apply scanner policies in MetroCluster configurations
  • Commands for managing scanner pools
  • Create an on-access policy
  • Enable an on-access policy
  • Modify the Vscan file-operations profile for an SMB share
  • Commands for managing on-access policies
  • Create an on-demand task
  • Schedule an on-demand task
  • Run an on-demand task immediately
  • Commands for managing on-demand tasks
  • Best practices for configuring off-box antivirus functionality
  • Enable virus scanning on an SVM
  • Reset the status of scanned files
  • View Vscan event log information
  • Potential connectivity issues involving the scan-mandatory option
  • Commands for viewing Vscan server connection status
  • Troubleshoot common virus scanning issues
  • Monitor status and performance activities
  • Basic auditing concepts
  • How the ONTAP auditing process works
  • Auditing requirements and considerations
  • Limitations for the size of audit records on staging files
  • What the supported audit event log formats are
  • View audit event logs
  • Determine what the complete path to the audited object is
  • Considerations when auditing symlinks and hard links
  • Considerations when auditing alternate NTFS data streams
  • NFS file and directory access events that can be audited
  • Plan the auditing configuration
  • Create the auditing configuration
  • Enable auditing on the SVM
  • Verify the auditing configuration
  • Configure audit policies on NTFS security-style files and directories
  • Configure auditing for UNIX security style files and directories
  • Display information about audit policies using the Windows Security tab
  • Manage file-share event
  • Manage audit-policy-change event
  • Manage user-account event
  • Manage security-group event
  • Manage authorization-policy-change event
  • Manually rotate the audit event logs
  • Enable and disable auditing on SVMs
  • Display information about auditing configurations
  • Commands for modifying auditing configurations
  • Delete an auditing configuration
  • What the process is when reverting
  • Troubleshoot auditing and staging volume space issues
  • What the two parts of the FPolicy solution are
  • What synchronous and asynchronous notifications are
  • Roles that cluster components play with FPolicy implementation
  • How FPolicy works with external FPolicy servers
  • What the node-to-external FPolicy server communication process is
  • How FPolicy services work across SVM namespaces
  • FPolicy configuration types
  • How FPolicy passthrough-read enhances usability for hierarchical storage management
  • Requirements, considerations, and best practices for configuring FPolicy
  • What the steps for setting up an FPolicy configuration are
  • Additional information about configuring FPolicy external engines to use SSL authenticated connections
  • Certificates do not replicate in SVM disaster recovery relationships with a non-ID-preserve configuration
  • Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM disaster recovery configurations
  • Complete the FPolicy external engine configuration worksheet
  • Supported file operation and filter combinations that FPolicy can monitor for SMB
  • Supported file operation and filter combinations that FPolicy can monitor for NFSv3
  • Supported file operation and filter combinations that FPolicy can monitor for NFSv4
  • Complete the FPolicy event configuration worksheet
  • Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine
  • Complete the FPolicy policy worksheet
  • Complete the FPolicy scope worksheet
  • Create the FPolicy external engine
  • Create the FPolicy event
  • Create the FPolicy policy
  • Create the FPolicy scope
  • Enable the FPolicy policy
  • Commands for modifying FPolicy configurations
  • Enable or disabling FPolicy policies
  • How the show commands work
  • Commands for displaying information about FPolicy configurations
  • Display information about FPolicy policy status
  • Display information about enabled FPolicy policies
  • Connect to external FPolicy servers
  • Disconnect from external FPolicy servers
  • Display information about connections to external FPolicy servers
  • Display information about the FPolicy passthrough-read connection status
  • How security traces work
  • Types of access checks security traces monitor
  • Considerations when creating security traces
  • Create security trace filters
  • Display information about security trace filters
  • Display security trace results
  • Modify security trace filters
  • Delete security trace filters
  • Delete security trace records
  • Delete all security trace records
  • Interpret security trace results
  • NetApp Volume Encryption workflow
  • Determine whether your cluster version supports NVE
  • Install the license
  • Enable onboard key management in ONTAP 9.6 and later (NVE)
  • Enable onboard key management in ONTAP 9.5 and earlier (NVE)
  • Enable onboard key management in newly added nodes
  • Assign a data authentication key to a FIPS drive or SED (onboard key management)
  • Collect network information in ONTAP 9.2 and earlier
  • Manage certificates with System Manager
  • Install SSL certificates on the cluster
  • Manage external key managers with System Manager
  • Enable external key management in ONTAP 9.6 and later (NVE)
  • Enable external key management in ONTAP 9.5 and earlier
  • Configure clustered external key server
  • Create authentication keys in ONTAP 9.6 and later
  • Create authentication keys in ONTAP 9.5 and earlier
  • Assign a data authentication key to a FIPS drive or SED (external key management)
  • Manage keys with a cloud provider
  • Enable aggregate-level encryption with VE license
  • Enable encryption on a new volume
  • Enable encryption on an existing volume
  • Enable node root volume encryption
  • Hardware-based encryption workflow
  • Encrypt stored data (software) with System Manager
  • Encrypt stored data (hardware) with System Manager
  • Unencrypting volume data
  • Move an encrypted volume
  • Delegate authority to run the volume move command
  • Change the encryption key for a volume with the volume encryption rekey start command
  • Change the encryption key for a volume with the volume move start command
  • Rotate authentication keys for NetApp Storage Encryption
  • Delete an encrypted volume
  • Securely purge data on an encrypted volume without a SnapMirror relationship
  • Securely purge data on an encrypted volume with an Asynchronous SnapMirror relationship
  • Scrub data on an encrypted volume with a Synchronous SnapMirror relationship
  • Change the onboard key management passphrase
  • Back up onboard key management information manually
  • Restore onboard key management encryption keys
  • Restore external key management encryption keys
  • Replace SSL certificates
  • Replace a FIPS drive or SED
  • Sanitize a FIPS drive or SED
  • Destroy a FIPS drive or SED
  • Emergency shredding of data on a FIPS drive or SED
  • Return a FIPS drive or SED to service when authentication keys are lost
  • Return a FIPS drive or SED to unprotected mode
  • Remove an external key manager connection
  • Modify external key management server properties
  • Transition to external key management from onboard key management
  • Transition to onboard key management from external key management
  • What happens when key management servers are not reachable during the boot process
  • Disable encryption by default with ONTAP 9.7 and later
  • Data protection overview
  • Create custom data protection policies
  • Configure Snapshot copies
  • Recalculate reclaimable space
  • Enable or disable client access to Snapshot copy directory
  • Recover from Snapshot copies
  • Prepare for mirroring and vaulting
  • Configure mirrors and vaults
  • Resynchronize a protection relationship
  • Restore a volume from an earlier Snapshot copy
  • Restore to a new volume
  • Reverse resynchronize a protection relationship
  • Serve data from a destination
  • Configure storage VM disaster recovery
  • Serve data from an SVM DR destination
  • Reactivate a source storage VM
  • Resynchronize a destination storage VM
  • Back up data to the cloud using SnapMirror
  • Back up data using Cloud Backup
  • Peer basics
  • Prerequisites for cluster peering
  • Use shared or dedicated ports
  • Use custom IPspaces to isolate replication traffic
  • Configure intercluster LIFs on shared data ports
  • Configure intercluster LIFs on dedicated ports
  • Configure intercluster LIFs in custom IPspaces
  • Create a cluster peer relationship
  • Create an intercluster SVM peer relationship
  • Add an intercluster SVM peer relationship
  • Enable cluster peering encryption on an existing peer relationship
  • Remove cluster peering encryption from an existing peer relationship
  • When to configure a custom Snapshot policy
  • Create a Snapshot job schedule
  • Create a Snapshot policy
  • When to increase the Snapshot copy reserve
  • How deleting protected files can lead to less file space than expected
  • Monitor Snapshot copy disk consumption
  • Check available Snapshot copy reserve on a volume
  • Modify the Snapshot copy reserve
  • Autodelete Snapshot copies
  • Restore a file from a Snapshot copy on an NFS or SMB client
  • Enable and disable NFS and SMB client access to Snapshot copy directory
  • Restore a single file from a Snapshot copy
  • Restore part of a file from a Snapshot copy
  • Restore the contents of a volume from a Snapshot copy
  • Asynchronous SnapMirror disaster recovery basics
  • SnapMirror Synchronous disaster recovery basics
  • About workloads supported by StrictSync and Sync policies
  • Vault archiving using SnapMirror technology
  • SnapMirror unified replication basics
  • XDP replaces DP as the SnapMirror default
  • When a destination volume grows automatically
  • Fan-out and cascade data protection deployments
  • Install a SnapMirror Cloud license
  • DPO systems feature enhancements
  • SnapMirror replication workflow
  • Configure a replication relationship in one step
  • Create a destination volume
  • Create a replication job schedule
  • Create a custom replication policy
  • Define a rule for a policy
  • Define a schedule for creating a local copy on the destination
  • Create a replication relationship
  • Initialize a replication relationship
  • Example: Configure a vault-vault cascade
  • Convert an existing DP-type relationship to XDP
  • Convert the type of a SnapMirror relationship
  • Convert the mode of a SnapMirror Synchronous relationship
  • Make the destination volume writeable
  • Configure the destination volume for data access
  • Reactivate the original source volume
  • Restore a single file, LUN, or NVMe namespace from a SnapMirror destination
  • Restore the contents of a volume from a SnapMirror destination
  • Update a replication relationship manually
  • Resynchronize a replication relationship
  • Delete a volume replication relationship
  • Manage storage efficiency
  • Use SnapMirror global throttling
  • About SnapMirror SVM replication
  • SnapMirror SVM replication workflow
  • Criteria for placing volumes on destination SVMs
  • Replicate an entire SVM configuration
  • Exclude LIFs and related network settings from SVM replication
  • Exclude network, name service, and other settings from SVM replication
  • Specify aggregates to use for SVM DR relationships
  • SMB only: Create a SMB server
  • Exclude volumes from SVM replication
  • SVM disaster recovery workflow
  • Make SVM destination volumes writeable
  • Source SVM reactivation workflow
  • Reactivate the original source SVM
  • Reactivate the original source SVM (FlexGroup volumes only)
  • Convert volume replication relationships to an SVM replication relationship
  • Delete an SVM replication relationship
  • Create and initializing load-sharing mirror relationships
  • Update a load-sharing mirror relationship
  • Promote a load-sharing mirror
  • Use path name pattern matching
  • Use extended queries to act on many SnapMirror relationships
  • Ensure a common Snapshot copy in a mirror-vault deployment
  • Compatible ONTAP versions for SnapMirror relationships
  • SnapMirror limitations
  • What SnapLock is
  • Initialize the ComplianceClock
  • Create a SnapLock aggregate
  • Create and mount a SnapLock volume
  • Set the retention time
  • Create an audit log
  • Verify SnapLock settings
  • Commit files to WORM
  • Commit Snapshot copies to WORM on a vault destination
  • Mirror WORM files for disaster recovery
  • Retain WORM files during litigation
  • Delete WORM files
  • Move a SnapLock volume
  • Tamperproof Snapshot copy locking
  • SnapLock APIs
  • Consistency group limits
  • Configure a single consistency group
  • Configure a hierarchical consistency group
  • Modify geometry
  • Key concepts
  • Prerequisites
  • Supported configurations
  • Configure ONTAP Mediator and clusters
  • Configure protection
  • Create a common snapshot copy
  • Perform a planned failover
  • Recover from automatic unplanned failover operations
  • Monitor SM-BC
  • Add and remove volumes to a consistency group
  • Convert existing relationships to SM-BC relationships
  • Upgrade and revert
  • Remove an SM-BC configuration
  • Remove ONTAP Mediator
  • SnapMirror delete operation fails in takover state
  • Failure creating a SnapMirror relationship and initializing consistency group
  • Planned failover unsuccesful
  • Mediator not reachable or Mediator quorum status is false
  • Automatic unplanned failover not triggered on Site B
  • Link between Site B and Mediator down and Site A down
  • Link between Site A to Mediator Down and Site B down
  • SM-BC SnapMirror delete operation fails when fence is set on destination volumes
  • Volume move operation stuck when primary site is down
  • Release operation fails when unable to delete Snapshot copy
  • Volume move reference Snapshot copy shows as the newest
  • Prepare to install or upgrade
  • Upgrade host OS and Mediator
  • Enable access to repositories
  • Download install package
  • Verify code signature
  • Install Mediator package
  • Verify installation
  • Post-installation configuration
  • Host maintenance
  • MetroCluster overview
  • Set up a MetroCluster site
  • Set up MetroCluster peering
  • Configure a MetroCluster site
  • Perform MetroCluster switchover and switchback
  • Modify address, netmask, and gateway in a MetroCluster IP
  • Troubleshoot problems with a MetroCluster
  • Tape backup overview
  • Tape backup and restore workflow
  • Use cases for choosing a tape backup engine
  • Commands for managing tape drives, media changers, and tape drive operations
  • Use a nonqualified tape drive
  • Assign tape aliases
  • Remove tape aliases
  • Enable or disable tape reservations
  • Commands for verifying tape library connections
  • Qualified tape drives overview
  • Format of the tape configuration file
  • How the storage system qualifies a new tape drive dynamically
  • Tape device name format
  • Supported number of simultaneous tape devices
  • What physical path names are
  • What serial numbers are
  • Considerations when configuring multipath tape access
  • How you add tape drives and libraries to storage systems
  • What tape reservations are
  • Options for the ndmpcopy command
  • About NDMP for FlexVol volumes
  • What node-scoped NDMP mode is
  • What SVM-scoped NDMP mode is
  • Considerations when using NDMP
  • Environment variables supported by ONTAP
  • Common NDMP tape backup topologies
  • Supported NDMP authentication methods
  • NDMP extensions supported by ONTAP
  • NDMP restartable backup extension for a dump supported by ONTAP
  • What enhanced DAR functionality is
  • Scalability limits for NDMP sessions
  • About NDMP for FlexGroup volumes
  • About NDMP with SnapLock volumes
  • Commands for managing node-scoped NDMP mode
  • User authentication in a node-scoped NDMP mode
  • Commands for managing SVM-scoped NDMP mode
  • What Cluster Aware Backup extension does
  • Availability of volumes and tape devices for backup and restore on different LIF types
  • What affinity information is
  • NDMP server supports secure control connections in SVM-scoped mode
  • NDMP data connection types
  • User authentication in the SVM-scoped NDMP mode
  • Generate an NDMP-specific password for NDMP users
  • How tape backup and restore operations are affected during disaster recovery in MetroCluster configuration
  • How a dump backup works
  • Types of data that the dump engine backs up
  • What increment chains are
  • What the blocking factor is
  • When to restart a dump backup
  • How a dump restore works
  • Types of data that the dump engine restores
  • Considerations before restoring data
  • Scalability limits for dump backup and restore sessions
  • Tape backup and restore support between Data ONTAP operating in 7-Mode and ONTAP
  • Delete restartable contexts
  • How dump works on a SnapVault secondary volume
  • How dump works with storage failover and ARL operations
  • How dump works with volume move
  • How dump works when a FlexVol volume is full
  • How dump works when volume access type changes
  • How dump works with SnapMirror single file or LUN restore
  • How dump backup and restore operations are affected in MetroCluster configurations
  • Use Snapshot copies during SMTape backup
  • SMTape capabilities
  • Features not supported in SMTape
  • Scalability limits for SMTape backup and restore sessions
  • What tape seeding is
  • How SMTape works with storage failover and ARL operations
  • How SMTape works with volume move
  • How SMTape works with volume rehost operations
  • How NDMP backup policy are affected during ADB
  • How SMTape backup and restore operations are affected in MetroCluster configurations
  • Access the event log files
  • What logging events are
  • What dump events are
  • What restore events are
  • Enable or disable event logging
  • Resource limitation: no available thread
  • Tape reservation preempted
  • Could not initialize media
  • Maximum number of allowed dumps or restores (maximum session limit) in progress
  • Media error on tape write
  • Tape write failed
  • Tape write failed - new tape encountered media error
  • Tape write failed - new tape is broken or write protected
  • Tape write failed - new tape is already at the end of media
  • Tape write error
  • Media error on tape read
  • Tape read error
  • Already at the end of tape
  • Tape record size is too small. Try a larger size.
  • Tape record size should be block_size1 and not block_size2
  • Tape record size must be in the range between 4KB and 256KB
  • Network communication error
  • Message from Read Socket: error_string
  • Message from Write Dirnet: error_string
  • Read Socket received EOF
  • ndmpd invalid version number: version_number ``
  • ndmpd session session_ID not active
  • Could not obtain vol ref for Volume volume_name
  • Data connection type ["NDMP4_ADDR_TCP"|"NDMP4_ADDR_TCP_IPv6"] not supported for ["IPv6"|"IPv4"] control connections
  • DATA LISTEN: CAB data connection prepare precondition error
  • DATA CONNECT: CAB data connection prepare precondition error
  • Error:show failed: Cannot get password for user '<username>'
  • Destination volume is read-only
  • Destination qtree is read-only
  • Dumps temporarily disabled on volume, try again
  • NFS labels not recognized
  • No files were created
  • Restore of the file <file name> failed
  • Truncation failed for src inode <inode number>…​
  • Unable to lock a snapshot needed by dump
  • Unable to locate bitmap files
  • Volume is temporarily in a transitional state
  • Chunks out of order
  • Chunk format not supported
  • Failed to allocate memory
  • Failed to get data buffer
  • Failed to find snapshot
  • Failed to create snapshot
  • Failed to lock snapshot
  • Failed to delete snapshot
  • Failed to get latest snapshot
  • Failed to load new tape
  • Failed to initialize tape
  • Failed to initialize restore stream
  • Failed to read backup image
  • Image header missing or corrupted
  • Internal assertion
  • Invalid backup image magic number
  • Invalid backup image checksum
  • Invalid input tape
  • Invalid volume path
  • Mismatch in backup set ID
  • Mismatch in backup time stamp
  • Job aborted due to shutdown
  • Job aborted due to Snapshot autodelete
  • Tape is currently in use by other operations
  • Tapes out of order
  • Transfer failed (Aborted due to MetroCluster operation)
  • Transfer failed (ARL initiated abort)
  • Transfer failed (CFO initiated abort)
  • Transfer failed (SFO initiated abort)
  • Underlying aggregate under migration
  • Volume is currently under migration
  • Volume offline
  • Volume not restricted
  • Prepare for NDMP configuration
  • Verify tape device connections
  • Enable tape reservations
  • Enable SVM-scoped NDMP on the cluster
  • Enable a backup user for NDMP authentication
  • Enable node-scoped NDMP on the cluster
  • Configure a LIF
  • Configure the backup application
  • Enable SnapMirror on the Element cluster
  • Enable SnapMirror on the Element source volume
  • Create a SnapMirror endpoint
  • Create a relationship from an Element source to an ONTAP destination
  • Create a relationship from an ONTAP source to an Element destination
  • Dashboard tour
  • Identify hot objects
  • Verify that your VMware environment is supported
  • Active IQ Unified Manager worksheet
  • Download and deploy Active IQ Unified Manager
  • Configure initial Active IQ Unified Manager settings
  • Specify the clusters to be monitored
  • Perform daily monitoring
  • Use weekly and monthly performance trends to identify performance issues
  • Use performance thresholds to generate event notifications
  • Set performance thresholds
  • Configure alert settings
  • Identify performance issues in Active IQ Unified Manager
  • Use Active IQ Digital Advisor to view system performance
  • Check the NFS TCP maximum transfer size
  • Check the iSCSI TCP read/write size
  • Check the CIFS multiplex settings
  • Check the FC adapter port speed
  • Check the network settings on the data switches
  • Check the MTU network setting on the storage system
  • Check disk throughput and latency
  • Check throughput and latency between nodes
  • Identify remaining performance capacity
  • Identify high-traffic clients or files
  • Enable or disable throughput floors v2
  • Storage QoS workflow
  • Set a throughput ceiling with QoS
  • Set a throughput floor with QoS
  • Use adaptive QoS policy groups
  • Set adaptive policy group template
  • Monitor cluster performance with Unified Manager
  • Monitor cluster performance with Cloud Insights
  • Enable File System Analytics
  • View activity on a file system
  • Enable Activity Tracking
  • Enable usage analytics
  • Take corrective action based on analytics
  • Role-based access control
  • Considerations
  • Configure EMS event notifications with System Manager
  • Configure EMS events to send email notifications
  • Configure EMS events to forward notifications to a syslog server
  • Configure SNMP traphosts to receive event notifications
  • Configure EMS events to forward notifications to a webhook application
  • EMS event mapping models
  • Update EMS event mapping from deprecated ONTAP commands
  • ONTAP manual pages
  • Legal notices

Expand navigation panel

  • docs.netapp.com
  • ONTAP 9

netapp-thomi

IMAGES

  1. Netapp DS14 MK2 RA-1402 19 " Rack Mount Disk Shelf Storage Hot Swap

    netapp change disk container

  2. NetApp 19 Zoll Disk Storage DS14MK2

    netapp change disk container

  3. NetApp HCI Hits General Availability

    netapp change disk container

  4. NetApp DS4243 24-Bay SAS/SATA 4U Disk Shelf w/ 24x 600GB 15K SAS HDD

    netapp change disk container

  5. NetApp DS4486 2x8TB 7200rpm Disk Shelf

    netapp change disk container

  6. NetApp 19" Disk Array SAS DS4246 Disk Shelf 24x LFF

    netapp change disk container

VIDEO

  1. NetApp Storage

  2. HOW TO CHANGE DISK AND PADS ON HONDA CIVIC 2014

  3. DELL EMC Storage Disks adding in disk shelfs. || Unity || Netapp

  4. NetApp Storage Failover SFO Groups

  5. mekenik@

  6. NetApp Cloud Backup Service in 60 seconds or less

COMMENTS

  1. Solved: container-type change

    How can i do that? Can I modify existing one? or move node1 aggr to node2 aggr then create new one? Thanks in advance for any help Solved! See The Solution 0 ello Reply 1 ACCEPTED SOLUTION nboggs 2020-04-20 06:16 AM 6,562 Views Have you checked to see if advanced disk partitioning is enable on this system? View solution in original post 1 Reply

  2. Solved: How to change container ?

    Solved: How to change container ? Solved: HI, I assigned new disk to nodes, but the capacity still not added into container. How do I change current container to SATA01 container ? NetApp.com Support Blog Training Contact Discussions Knowledge Base NetApp A-Team Register Sign In Help Discussions Knowledge Base NetApp A-Team ONTAP Discussions

  3. Commands for managing disks

    Set up, upgrade and revert ONTAP. Cluster administration. Volume administration. Network management. NAS storage management. SAN storage management. S3 object storage management. Security and data encryption. Data protection and disaster recovery.

  4. How to change ownership of disk or partition in ...

    6/24/2021, 7:30:21 PM Table of contents Applies to Description Applies to Data ONTAP 8.3.x ONTAP 9.x Advanced Drive Paritioning (ADP) All Flash FAS (AFF) Description This article describes the procedure to change ownership of disk or partition in ADP and AFF platforms.

  5. Newly-added disks show type container

    Newly-added disks show type container Save as PDF Share Views: 267 Visibility: Public Votes: 0 Category: ontap-9 Specialty: core Last Updated: 12/18/2020, 10:19:17 PM Table of contents Applies to Issue Applies to ONTAP 9 New disks added to system Issue In some instances, newly-added disks may still contain old/stale aggregate information

  6. ONTAP 9 assign a disk as a spare

    2021-03-10 05:09 AM 4,271 Views Hi all, I want to assign a new disk as a new spare but ontap set the 'container type' to 'shared' and not to 'spare'. I try with 😆 storage disk assign -disk 1.0.15 -oppl 0 -owner OwnerName ... so what can I do? Greetings Michael 0 Reply All forum topics Previous Topic Next Topic 7 REPLIES pedro_rocha

  7. Reassign disks to nodes with System Manager

    Steps Click Storage > Aggregates & Disks > Disks. In the Disks window, select the Inventory tab. Select the disks that you want to reassign, and then click Assign. In the Warning dialog box, click Continue. In the Assign Disks dialog box, select the node to which you want to reassign the disks. Click Assign. Related information

  8. Spare disk shows container type unknown after replacement

    5/24/2022, 3:56:58 AM Table of contents Applies to Issue Applies to ONTAP 9 Issue After disk replacement container type shows unknown, disk is assigned and shows as spare from sysconfig -r RAID Disk Device HA SHELF BAY CHAN Pool Type RPM Used (MB/blks) Phys (MB/blks) --------- ------ ------------- ---- ---- ---- ----- -------------- --------------

  9. Why spare disk's container type is shown as Shared

    7/7/2022, 2:17:11 AM Table of contents Applies to Answer Additional Information Applies to ONTAP 9 Answer If the spare disk is partitioned in ADP configuration, its container type is shown as Shared. If the spare disk is unpartitioned ( remain as a whole disk), its container type is shown as Spare. Additional Information N/A

  10. storage disk replace

    Description The storage disk replace command starts or stops the replacement of a file system disk with spare disk. When you start a replacement, Rapid RAID Recovery begins copying data from the specified file system disk to a spare disk.

  11. storage disk show

    Description The storage disk show command displays information about disks and array LUNs. Where it appears in the remainder of this document "disk" may refer to either a disk or an array LUN. By default, the command displays the following information about all disks in column style output: Disk name

  12. NetApp ONTAP Disk move and replace » domalab

    This requirement doesn't change for "local" storage either where expectations are even higher. NetApp ONTAP Disk move and replace options by using command line is a great feature to address situations where data is growing outside the expected thresholds. It can simply move data into a new disk or storage. ... Disk Type, Container, Pool ...

  13. Assigning disk to cluster after disk replacement

    Hello NetApp Community, Pardon the ignorance. We have cluster netapp 8.3P1 and one disk failed. It has been replaced but the disk is showwing as unnassign. I am not so sure what command/syntax to use to assign it back to the cluster. clu01::> storage disk show -container-type unassigned Usable Disk Container Container

  14. How to remove ownership on foreign disks in ...

    If disks are introduced into a clustered system and those disks came from another system (either a 7-Mode or a clustered Data ONTAP system) and they were not properly unowned, the disks will be owned by the node they came from and will be inaccessible by the cluster.

  15. Solved: Broken Disks

    . 5.50.10 3.63TB 50 10 FSAS broken - yyyyy 5.50.11 3.63TB 50 11 FSAS broken - yyyyy 5.50.12 3.63TB 50 12 FSAS broken - yyyyy . . . Thanks. Solved! See The Solution 0 ONTAP 9 Reply 1 ACCEPTED SOLUTION COG 2017-12-20 05:07 AM In response to GidonMarcus 14,114 Views

  16. Solved: NetApp FAS2552 Aggregate and Disk

    2016-11-09 02:00 AM In response to edlam2000 8,151 Views So 1.0.23 is used as spare for both root and data partitions. 1.0.22 has one spare partition (root). Both partitions are independent, so one can be used as part of aggregate and another can be used as spare.

  17. Removing a data disk

    Steps. Determine the name of the disk you want to remove. If the disk is reporting errors, you can find the disk name in the log messages that report disk errors. The name is prefixed with the word "Disk". Determine the location of the disk you want to remove by entering the following command: aggr status -r. The location of the disk appears to ...

  18. Converting a data disk to a hot spare

    Step. Destroy the aggregate that contains the disk by entering the following command:aggr destroy aggr_name. All disks in use by that aggregate are converted to hot spare disks. Parent topic: Managing disks using Data ONTAP.

  19. Disks window in System Manager

    Disks window in System Manager - ONTAP 9.7 and earlier 05/27/2022 Contributors You can use the Disks window in ONTAP System Manager classic (avaiable in ONTAP 9.7 and earlier) to view all the disks in your storage system. Command buttons Assign Assigns or reassigns the ownership of the disks to a node.

  20. bars

    Introduction and concepts. Set up, upgrade and revert ONTAP. Cluster administration. Volume administration. Network management. NAS storage management. SAN storage management. S3 object storage management. Security and data encryption.

  21. Disk showing an 'Unknown' container-type

    ONTAP 9 Drive Issue A disk reports container type unknown instead of spare cluster::> storage show disk -container-type unknown Usable Disk Container Container Disk Size Shelf Bay Type Type Name Owner -------- ---------- ----- --- ------- ----------- --------- -------- 23.21.8 - 21 8 SAS unknown - Node06

  22. The replaced disk is stuck in maintenance after replacement

    Disk is replaced and shown as spare disk. The replaced disk information is stuck in Maintenance disks. RAID Disk Device HA SHELF BAY CHAN Pool Type RPM Used (MB/blks) Phys (MB/blks) ... NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this ...