Cluster Data Ontap 8.3 Data Protection Student Guide
Cluster Data Ontap 8.3 Data Protection Student Guide
Protection Administration
NETAPP UNIVERSITY
ATTENTION
The information contained in this course is intended only for training. This course contains information and activities that,
while beneficial for the purposes of training in a closed, non-production environment, can result in downtime or other
severe consequences in a production environment. This course material is not a technical reference and should not,
under any circumstances, be used in production environments. To obtain reference materials, refer to the NetApp product
documentation that is located at http://now.netapp.com/.
COPYRIGHT
2015 NetApp, Inc. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice.
No part of this document covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or
mechanical, including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written
permission of NetApp, Inc.
TRADEMARK INFORMATION
NetApp, the NetApp logo, Go Further, Faster, ASUP, AutoSupport, Campaign Express, Customer Fitness, CyberSnap,
Data ONTAP, DataFort, FilerView, Fitness, Flash Accel, Flash Cache, Flash Pool, FlashRay, FlexCache, FlexClone,
FlexPod, FlexScale, FlexShare, FlexVol, GetSuccessful, LockVault, Manage ONTAP, Mars, MetroCluster, MultiStore,
OnCommand, ONTAP, ONTAPI, RAID DP, SANtricity, SecureShare, Simplicity, Simulate ONTAP, Snap Creator,
SnapCopy, SnapDrive, SnapIntegrator, SnapLock, SnapManager, SnapMirror, SnapMover, SnapProtect, SnapRestore,
Snapshot, SnapValidator, SnapVault, StorageGRID, Tech OnTap, and WAFL are trademarks or registered trademarks of
NetApp, Inc. in the United States and/or other countries.
Other product and service names might be trademarks of NetApp or other companies. A current list of NetApp trademarks
is available on the Web at http://www.netapp.com/us/legal/netapptmlist.aspx.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
TABLE OF CONTENTS
WELCOME .......................................................................................................................................................... 1
MODULE 1: DATA PROTECTION TECHNOLOGIES .................................................................................... 1-1
MODULE 2: DATA PROTECTION WITH NETAPP SNAPSHOT COPIES .................................................... 2-1
MODULE 3: NETAPP REPLICATION TECHNOLOGIES .............................................................................. 3-1
MODULE 4: USING SNAPMIRROR FOR DATA PROTECTION ................................................................... 4-1
MODULE 5: SNAPVAULT BACKUP AND RECOVERY ................................................................................ 5-1
MODULE 6: DATA PROTECTION USING NDMP.......................................................................................... 6-1
APPENDIX A: OPEN SYSTEMS SNAPVAULT ............................................................................................. A-1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Logistics
The Class
Resources
Schedule
Materials
Structure
Support
Activities
Participation rules
Participation rules
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOGISTICS
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Learn Together
Participant
Video
Learn
Share
Participate
Files
3
Whiteboard
Polling
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LEARN TOGETHER
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Chat
Intermediate Courses
Advanced Categories
Data ONTAP
NFS Administration
Performance
Data ONTAP
SMB (CIFS) Administration
Troubleshooting
Data ONTAP
SAN Implementation
Management
Software
Data ONTAP
Protection Administration
Enterprise
Applications
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NOTE: The advanced categories typically contain one or more courses. Refer to the NetApp University
learning maps for more details.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Course Objectives
By the end of this course, you should be able to:
Describe NetApp protection technology and the NetApp
integrated data protection solutions that are supported in
clustered Data ONTAP 8.3
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE OBJECTIVES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
10
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Additional Materials
The following materials are for your reference only:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ADDITIONAL MATERIALS
These materials are included for reference and can be read as homework. If you have questions, please discuss
these with your instructor.
11
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Windows Server
2012 R2
CentOS
6.5
Remote
Desktop
Username
Windows
Administrator
CentOS
root
admin
(case-sensitive)
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
13
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Try This
Start your session:
1. Log in to your Windows machine.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
Throughout this course, pauses enable you to experience the feature that is being discussed in the lecture. Feel
free to participate if desired.
14
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
http://support.netapp.com/
NetApp University
http://www.netapp.com/us/servicessupport/university/index.aspx
NetApp University
Support
http://netappusupport.custhelp.com
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
15
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Course Pre-Test
Please take some time now to complete the course pre-test.
At the completion of the course, you will take the same exam
again to measure how much you have learned.
All scores will remain private.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE PRE-TEST
16
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 1
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
1-2
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
Data Protection
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-3
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Increasing Probability
Increasing Downtime
Application
Failures
Component
Failures
Site, Data
Center, and
Power
Failures
Regional
Disasters
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Fire
Earthquake
Hurricane
Blizzard
Prolonged power outage
Prolonged loss of connectivity from clients to the storage system
Storage systems
Application servers
Networking connectivity
Client connectivity
1-4
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Many companies need a highly available 24x7 operation that includes disaster recovery capabilities. The
amount of protection that these companies need varies for different locations:
1-5
Data centers
Campuses
Regions
Combined data centers, campuses, and regions
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Backup
Servers
Backup
Storage
Backup
Agent
Disaster Recovery
Storage
Archive
Servers
Compliance
Storage
$$$$
$$$$
$$$$
Limited flexibility:
Is restrictive (cannot use systems for multiple
purposes)
Is difficult to use with virtual servers
Is not suited to the on-demand, multi-tenancy needs
of ITaaS and the cloud
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Costs increase.
Management overhead becomes more complex.
Management becomes more time-consuming.
Risk of data loss increases.
Example: Traditional backup that is deployed on virtual servers has the following characteristics:
1-6
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1-7
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
To recover files that are lost due to accidental deletion, application interruptions, data corruption, and
viruses
To archive data for future use
To minimize backup and recovery windows
To enable fast recovery from natural and human-caused disasters
To quickly recover data that is stored in private, public, and hybrid data centers that are in an ITaaS
environment
To satisfy compliance regulations
To satisfy the RTO and RPO
1-8
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Simplify operations
Consolidate management
Use partner tools that catalog Snapshot, remote, and tape copies of the data
Facilitate long-term retention
Simplify offline retention and e-discovery
1-9
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-10
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
1-11
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-12
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Tape Backup
Clustered Data ONTAP 8.3
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Clustered Data ONTAP 8.3 does not use dump or restore commands. Backup administrators use the NDMP
features that are available with the data management application.
You can find a list of supported tape devices here:
http://www.netapp.com/us/solutions/a-z/data-protection-devices.aspx
You can find a list of NDMP applications that are certified with the Data ONTAP operating system here:
http://www.netapp.com/us/solutions/a-z/backup-to-tape/backup-to-tape-ndmp.aspx
1-13
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster B
Centralized
Management
Intercluster Data
Protection
SnapMirror
Deduplicated, Compressed Volume
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-14
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
NetApp Management
Technologies
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-15
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Create, schedule, and maintain multiple backups of data on the primary storage volume
Quickly and easily restore data that is accidentally modified or deleted
Create clones of FlexVol volumes
A SnapRestore license is required to perform fast Snapshot recovery from Snapshot copies.
The SnapVault backup solution does the following:
Replicate data from one FlexVol volume to another within the same cluster or a different cluster
Retain those Snapshot copies
Use the destination volume for efficient and fast restoration of data after a disaster
The OnCommand management suite of tools falls outside the scope of this course. NetApp University offers
courses that enable you to use the following tools:
1-16
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
CLI
OnCommand
Unified Manager
OnCommand
Manage functions through an easy-to-use graphical interface.
System Manager Manage all Data ONTAP features, including storage efficiency, security,
high availability, and replication.
Use a web-based tool that provides dashboards, graphical reports, and
automated workflows.
Manage multiple storage systems.
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Alerts
Reports
Performance
Configuration tools
1-17
Snapshot operations
SnapMirror operations
SnapVault operations
Open Systems SnapVault operations
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Set up and manage NetApp storage systems from this Windows-based tool
Create aggregates, volumes, and Snapshot copies
Manage shares and exports, network settings, and other configurations
You cannot use versions 1.0 or 1.1 of NetApp System Manager to configure SnapMirror, SnapVault, or Open
Systems SnapVault software.
1-18
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapDrive for
Windows and
SnapDrive for UNIX
SnapManager
products for
application-aware data
protection
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-19
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
Additional Storage
Technologies
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-20
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-21
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Symantec and Data ONTAP are integrated for backups with the
following procedure:
1. Install the NetApp Plug-in for Symantec and the NetApp
OnCommand Core Package on the same host.
2. Configure the plug-in and the OnCommand Unified Manager
server to the same storage system.
The OnCommand Unified Manager server creates primary
Snapshot copies on the primary NetApp storage system.
The copies are replicated to the secondary storage system by
using a SnapMirror, SnapVault, or tape replication process.
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-22
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-23
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
1-24
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Up to 200
kilometers (km)
Set-it-once simplicity
Zero change management
Seamless integration with
storage efficiency, backup,
disaster recovery, nondisruptive
operations (NDO), and nonfabric-attached storage
22
MetroCluster
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MetroCluster is an active-active solution, which means that all nodes in each cluster actively serve data to
applications. Data can be read from the primary and secondary clusters, which is a feature that can improve
read performance. MetroCluster is foundational for creating an active-active data center, similar to the Cisco
Virtualized Multisite Data Center.
1-25
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data Center A
Up to 200 km
Cluster A in
Data Center A
Cluster B in
Data Center B
MetroCluster
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-26
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Controller failure
Storage or rack failure
Up to 200 km
Site or Bldg B
24
Network failure
Local data center failure
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-27
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-28
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Up to 200 km
SnapMirror
Unlimited Distance
Backup and
Recovery Site
MetroCluster
SnapVault
Unlimited Distance
26
Unlimited Distance
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-29
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Up to 200 km
MetroCluster
Read/
Write
SnapMirror
SnapVault
Disaster Recovery Site
Read
Only
Read
Only
Backup and Recovery Site
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-30
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28
Node A1
Site B
Active Nodes
Synchronous
Replication
Node B1
A
Local
HA
Node A2
Local
HA
Node B2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-31
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster Peering
Node A1
NVRAM
Mirroring
Cluster B
Data Center B
NVRAM Mirroring
NVRAM
Mirroring
ISL
Synchronous Mirroring
Node A2
Node B1
Node B2
200 km
Two two-node clusters are present, one on each site, which are separated by up to 200
km.
The clusters are connected through redundant fabrics.
NVRAM is mirrored to the local HA partner and disaster recovery partner on the remote
site, which share the same Inter-Switch Link (ISL) fabric as the storage replication.
Data is written to the primary copy and is synchronously replicated to the secondary copy
in the remote site.
A cluster peering interconnect mirrors cluster configurations.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-32
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Three replication streams are present between two HA pairs across sites.
FC requirements:
NVRAM is mirrored to the HA partner and disaster recovery partner.
All disk traffic is mirrored at the aggregate level.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-33
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31
Switchover
or Switchback
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-34
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
One-disk or two-disk
failure
Shelf failure
Data served from surviving plex Data served from surviving plex
Switch failure
Automatic failover to HA
partner at local cluster or site
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-35
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Not applicable
Automatic failover to HA
partner at local cluster or site
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-36
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
References
NetApp University courses:
Clustered Data ONTAP Administration
SnapMirror Planning and Implementation
SnapMirror Disaster Recovery
Installing and Configuring OnCommand Unified Management
Solution
Planning to Implement MetroCluster on Clustered Data ONTAP
Community:
http://communities.netapp.com/community/products_and_solutions/
netapp_integrated_data_protection
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
1-37
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
1-38
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Exercise
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
1-39
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-1
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
2-2
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-3
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapRestore
SnapDrive
FlexClone
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The Data ONTAP operating system can be configured to automatically create and delete Snapshot copies of
data in volumes to support commands that are related to Snapshot technology.
2-4
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot Creation
Manually
Automatically
based on schedule
UNIX:
.snapshot directory
Windows:
~snapshot directory
Restore Through
SnapRestore
Entire volume or
individual file
restored
License required
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
A policy can include multiple schedules, so that Snapshot copies are created hourly, daily, weekly, and so
on.
A policy indicates how many of each type of Snapshot copy to retain before deleting older copies.
For example, you can keep four hourly Snapshot copies, and when the fifth copy is created, the oldest copy is
removed.
In this way, a continuously updated group of the previous four hourly Snapshot copies is retained.
Clients can see and use the .snapshot directories, so that users can restore their own data without administrator
intervention.
2-5
When an entire volume needs to be restored from a Snapshot copy, an administrator uses the volume
snapshot promote command.
This process is the same as using SnapRestore technology to restore the volume.
The entire Snapshot copy is promoted, which replaces the entire volume.
Individual files can also be restored.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
PROD
SNAP 1
SNAP 2
EE
FF
F
F
Prod
S1
SNAP 1
6
WRITE
WRITE
S2
SNAP 2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
When the Snapshot copy is created, the file structure metadata is saved.
The Snapshot copy points to the same data blocks as the file structure metadata that existed when the
Snapshot copy was created.
Because the file structure of a Snapshot copy takes up little space, and no data blocks must be copied to disk,
the creation of a new Snapshot copy consumes almost no additional disk space.
In this case, the phrase consumes no space really means consumes no appreciable space. The socalled top-level root inode, which contains metadata that is necessary to define the Snapshot copy, is 4
kilobytes (KB).
2-6
The WAFL file system writes the new data to a new block (F) on the disk and changes the root structure
for the active file system to point to the new block.
Meanwhile, the Snapshot copy still references the original block F. When a Snapshot copy references a
data block, that block remains unavailable for other uses. In other words, Snapshot copies start to
consume disk space only when the file system data changes after a Snapshot copy is created.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-7
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Aggregate Space
Active
File
System
95%
5%
Default Volume
Snapshot Reserve 5%
Default Aggregate
Snapshot Reserve 0%
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
By default, volume Snapshot copies are stored in the Snapshot copy reserve storage space.
The Snapshot copy reserve space is not counted as part of the volumes disk space that is allocated for the
active file system.
When a Snapshot copy is first created, none of the Snapshot copy reserve space is consumed. The
Snapshot copy is protecting the active file system at a point in time when the Snapshot copy was created.
As the Snapshot copy ages, and the active file system changes, the Snapshot copy begins to own the data
blocks that were deleted or changed by the current active file system.
The Snapshot copy begins to consume the Snapshot copy reserve space. The amount of disk space that is
consumed by Snapshot copies can increase, depending on the length of time that a Snapshot copy is
retained and the rate of change of the volume.
In the example above, the Snapshot copy reserve space has been configured for 5% of the volume.*
If the Snapshot copy is retained for a long time, and the active file system has a high rate of change, the
Snapshot copy can consume 100% of the Snapshot copy reserve space, which is the full 5% of the disk
space that is set aside for Snapshot copies.
If the Snapshot copy is not deleted, the Snapshot copy can consume a portion of the disk space that is
intended for the active file system.
You monitor and manage Snapshot copies to ensure that disk space is properly managed.
*For data protection mirror volumes, the default Snapshot copy reserve space has a default setting of 0% of
the volume.
NOTE: Even if the Snapshot copy reserve default is left at 0%, you can still create Snapshot copies. If no
Snapshot copy reserve exists, then Snapshot copies consume blocks from the active file system over time.
2-8
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
For example, if a 10-gigabyte (GB) file is corrupted, and only 5 GB of free space exists in the active file
system, you cannot copy the file from a Snapshot copy to recover the file.
However, SnapRestore software can quickly recover the file by resetting the inode pointers, without using
additional disk space.
Use SnapRestore software when you need to restore data more quickly than the manual copy process can
restore data. Consider these issues before using SnapRestore:
2-9
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-10
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2-11
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-12
Snapshot copy reserve guarantees that you can create Snapshot copies until that space is filled.
When Snapshot copies fill the reserved space, then Snapshot blocks compete for space with the active file
system.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You can accumulate a maximum of 255 Snapshot copies per FlexVol volume.
If the FlexVol volume is in a data protection mirror relationship, the maximum number of
Snapshot copies is 254, because one Snapshot copy is reserved for use by the relationship during
recovery operations.
If the FlexVol volume is in a disk-to-disk backup relationship, the maximum number of Snapshot
copies is 251.
If the infinite volume is in a data protection mirror relationship, the maximum number of
Snapshot copies is reduced by two, because two Snapshot copies are used for the data protection
mirror relationship.
2-13
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
volume
snapshot
comment
-------
--------------
-----------------------------
-------
svm1
svm1_vol2
2HourSnapshot.2014-08-08_1005
User created
(Prefix)
(Timestamp)
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The prefix is an optional string of characters that you can specify for an automatic Snapshot copy. If a
prefix is specified, then the Snapshot name is made up of the prefix and timestamp. Prefix names must be
unique within a policy.
A schedule cannot have more than one prefix. The number of characters in the prefix count towards the
255-character limit on the Snapshot name.
If a prefix is specified in the Snapshot schedule, then the schedule name is not used. The schedule name is
used if the prefix is not specified for a Snapshot schedule.
Volume snapshot policy add-schedule -policy <snapshot policy> -schedule
<text> -count <integer> [-prefix <text>]
The Comment
Use the volume snapshot modify command to change the text comment that is associated with a
Snapshot copy.
Example:
Cluster > volume snapshot modify -vserver vs0 -volume vol3 -snapshot
vol3_snapshot -comment "Pre-upgrade snapshot"
2-14
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The Label
The SnapMirror label is used by the vaulting subsystem when you back up Snapshot copies to the vault
destination. If an empty label ("") is specified, the existing label is deleted.
2-15
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM
Cluster
15
FlexVol Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
When you create a storage virtual machine (or SVM, formerly called Vserver), you can specify a Snapshot
policy that becomes the default for all FlexVol volumes that are created for that SVM. When you create a
FlexVol volume, you can specify which Snapshot policy you want to use, or you can allow the FlexVol to
inherit the SVM Snapshot policy.
The default Snapshot policy might meet your needs. The default Snapshot copy policy is useful if users rarely
lose files.
The default Snapshot policy is as follows:
However, if users commonly lose files, then you should adjust the default policy to keep Snapshot copies
longer.
The recommended Snapshot copy policy for this situation:
2-16
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
For typical systems, only five to ten percent of the data changes each week: Six daily and two weekly
Snapshot copies consume 10 to 20 percent of disk space. Adjust the Snapshot copy reserve for this amount of
disk space for Snapshot copies.
Each volume on an SVM can use a different Snapshot copy policy. For very active volumes, create a
Snapshot schedule that creates Snapshot copies every hour and keeps them for just a few hours, or turn off the
Snapshot copy feature.
2-17
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
Implementing a
Snapshot Copy Solution
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-18
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Typical Workflow
Create a job schedule, or use the default.
Create a Snapshot policy and specify the job schedule.
Assign the Snapshot policy to an SVM.
Create a FlexVol volume and specify the Snapshot policy, or
inherit a Snapshot policy from the SVM.
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TYPICAL WORKFLOW
To implement a Snapshot copy solution, first, decide on a job schedule.
A Snapshot policy is created that automatically manages Snapshot copy schedules and retention on FlexVol
volumes or infinite volumes. You can apply the Snapshot policy to the cluster or to an SVM.
Unless you specify a Snapshot policy when you create a FlexVol volume or an infinite volume, a volume
inherits the Snapshot policy that is associated with its containing SVM.
The default Snapshot policy for an SVM with a FlexVol volume is named default, and the default Snapshot
policy for an SVM with infinite volume is named default-1weekly.
2-19
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Description
-----------
---------
-----------------------------------------
5min
cron
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
cron
@2:15,10:15,18:15
Every 1h
RepositoryBalanceMonitorJobSchedule
interval
Every 10m
daily
cron
@0:10
hourly
cron
@:05
weekly
cron
Sun@0:15
2-20
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
If you need to create a new job schedule, run the job schedule cron create command:
cluster1::> job schedule cron create
Usage:
[-name] <text>
Name
Month
Day of Week
Day
Hour
Minute
Example: Create a new job that runs every month, every day of the week, every two hours, at five minutes
past the hour:
cluster1::> job schedule cron create -name 2HourSnapshot -month all dayofweek all -day all -hour 0,2,4,6,8,10,12,14,16,18,20,22 -minute 5
cluster1::> job schedule cron show
Name
Description
----------------
---------------------------------------------------
2HourSnapshot
@0:05,2:05,4:05,6:05,8:05,10:05,12:05,14:05,16:05,18:05,20:05,22:05
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
daily
@0:10
hourly
@:05
weekly
Sun@0:15
2-21
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Is
Policy Name
Schedules
Enabled
Comment
------------------------
---------
-------
------------------------
true
default
3
hourly, daily & weekly schedules.
Schedule
Count
Prefix
SnapMirror
Label
---------------------- -----
--------------------
--------
hourly
hourly
daily
daily
daily
weekly
weekly
weekly
default-1weekly
true
2-22
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Schedule
Count
Prefix
SnapMirror
Label
---------------------- -----
--------------------
--------
hourly
hourly
daily
daily
weekly
weekly
none
false
Policy for no
automatic
snapshots.
Schedule
Count
Prefix
SnapMirror Label
----------------
-----
-------------
----------------
Is
Policy Name
Schedules
Enabled
Comment
------------------------
---------
-------
------------------------
true
default
3
hourly, daily & weekly schedules.
Schedule
Count
Prefix
SnapMirror
Label
---------------------- -----
---------------------- --------
hourly
hourly
daily
daily
daily
weekly
weekly
weekly
default-1weekly
3
6 hourly, 2 daily & 1 weekly schedule.
2-23
true
Schedule
Count
Prefix
SnapMirror
Label
--------------
-----
----------------------
--------
hourly
hourly
daily
daily
weekly
weekly
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
none
false
Policy for no
automatic
snapshots.
Schedule
Count
Prefix
SnapMirror
Label
--------------
-----
----------------------
--------
Vserver: svm1
Number of
Is
Policy Name
Schedules
Enabled
Comment
---------------------------------
---------
-------
------------------------
true
2Hour_Policy
Every 2 Hours
Schedule
Count
Prefix
--------------
-----
----------------------
SnapMirror
Label
--------
84
2HourSnapshot
2HourSnapshot
Is
Policy Name
Schedules
Enabled
Comment
------------------------
---------
-------
------------------------
true
2Hour_Policy
Every 2 Hours
2-24
Schedule
Count
Prefix
SnapMirror
Label
-------------2HourSnapshot
----84
---------------------2HourSnapshot
--------
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-26
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-27
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
snapshot-policy
svm1
21
The policy is
inherited from
the SVM.
svm1_vol2 2Hour_Policy
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
-------- ---------
Aggregate
State
Type
Size Available
Used%
cluster1-01
vol0
aggr0_n1
online
RW
5.16GB
4.29GB
16%
vol0
aggr0_n2
online
RW
5.16GB
4.32GB
16%
svm1
svm1_root
n1_aggr1
online
RW
20MB
18.85MB
5%
svm1
svm1_vol1
n1_aggr1
online
RW
50MB
47.36MB
5%
svm1
svm1_vol2
n1_aggr1
online
RW
20MB
18.88MB
5%
cluster1-02
2-28
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
volume
snapshot-policy
-------
--------------
---------------
svm1
svm1_vol2
2Hour_Policy
2-29
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NOTE: The job schedule is set to run every two hours at five minutes past the
hour.
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
-------- -------svm1
Snapshot
svm1_vol2
2HourSnapshot.2014-07-28_2005
60KB
0%
31%
2HourSnapshot.2014-07-28_2205
40KB
0%
23%
2-30
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume
Snapshot
svm1_vol2
2HourSnapshot.2014-07-28_2005
60KB 0%
31%
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-31
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-32
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-33
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
create
delete
modify
modify-schedule
remove-schedule
show
2-34
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27
Policy Name
Schedule
Count
Default
Hourly
Daily
Weekly
6
2
2
Default-1 weekly
Hourly
Daily
Weekly
6
2
1
None
N/A
N/A
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-35
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
@2:15,10:15,18:15
@0:10
@:05
Sun@0:15
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Description
----------------
---------------------------------------------------
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
daily
@0:10
hourly
@:05
weekly
Sun@0:15
2-36
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-37
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Vserver name
Volume name
Snapshot copy name
Creation time
Size
Blocks:
2-38
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Example:
cluster1::> volume snapshot show
---Blocks--Vserver
Volume
Size
-------- -----svm1
svm1_vol2
Snapshot
Total%
Used%
------
State
----------------
--------
0%
2HourSnapshot.2014-07-10_1005
36%
valid
64KB
0%
2HourSnapshot.2014-07-10_1205
36%
valid
64KB
0%
2HourSnapshot.2014-07-10_1405
36%
valid
64KB
2HourSnapshot.2014-07-10_1605
34%
valid
60KB
0%
svm1_root
0%
hourly.2014-07-10_1105
33%
valid
64KB
0%
hourly.2014-07-10_1205
33%
valid
64KB
---Blocks--Vserver
Volume
Size
-------svm1
-----svm1_root
Snapshot
Total%
Used%
------
64KB
0%
68KB
0%
---------------hourly.2014-07-10_1404
33%
hourly.2014-07-10_1405
35%
-------valid
valid
0%
hourly.2014-07-10_1604
35%
valid
68KB
0%
hourly.2014-07-10_1605
32%
valid
60KB
2-39
State
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Vserver
Volume
Snapshot
[ -create-time <Date> ]
Creation Time
[ -busy {true|false} ]
Snapshot Busy
List of Owners
[ -size {<integer>[KB|MB|GB|TB|PB]} ]
Snapshot Size
[ -blocks <percent> ]
Percentage of Total
Blocks
[ -usedblocks <percent> ]
Percentage of Used
Blocks
Comment
[ -is-7-mode {true|false} ]
7-Mode Snapshot
[ -state {valid|invalid|partial} ]
Snapshot State
[ -is-constituent {true|false} ]
Constituent Snapshot
Example:
cluster1::> volume snapshot show -volume svm1_vol1 -snapshot hourly.201410-01_0605 -instance
Vserver: svm1
Volume: svm1_vol1
Snapshot: hourly.2014-10-01_0605
Creation Time: Wed Oct 01 06:05:00 2014
Snapshot Busy: false
List of Owners: Snapshot Size: 80KB
Percentage of Total Blocks: 0%
Percentage of Used Blocks: 33%
Comment: 7-Mode Snapshot: false
Label for SnapMirror Operations: Snapshot State: Constituent Snapshot: false
2-40
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
Snapshot
Comment
[ -foreground {true|false} ]
Example:
cluster1::> volume snapshot create -vserver svm1 -volume svm1_vol1 snapshot MySnapshot1 -comment "Manually created Snapshot Copy"
cluster1::> volume snapshot show -volume svm1_vol1
2-41
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
---Blocks--Vserver
-------svm1
Volume
Size
Snapshot
Total%
Used%
-------svm1_vol1
---------
-----------------------
100KB
0%
daily.2014-09-30_1710
37%
76KB
0%
daily.2014-10-01_0010
31%
96KB
0%
hourly.2014-10-01_0105
36%
96KB
0%
hourly.2014-10-01_0205
36%
80KB
0%
MySnapshot1
32%
Volume
Size
--------------svm1
svm1_vol1
80KB
Snapshot
Total%
Used%
------------------------------------- --------
0%
--
MySnapshot1
32%
2-42
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-43
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
Snapshot
Comment
Example:
cluster1::> volume snapshot modify vserver svm1 -volume svm1_vol1
comment This is a new comment
cluster1::> volume snapshot rename -vserver svm1 -volume svm1_vol1 snapshot MySnapshot1 -new-name MySnapshot_Renamed
cluster1::> volume snapshot show -vserver svm1 -volume svm1_vol1
2-44
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
---Blocks--Vserver
Volume
Size
Snapshot
Total%
Used%
--------
--------
---------------
--------
svm1
svm1_vol1
96KB
MySnapshot_Renamed
0%
------
36%
cluster1::> volume snapshot show -vserver svm1 -volume svm1_vol1 snapshot MySnapshot_Renamed -fields comment
vserver volume
snapshot
comment
2-45
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
--
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-46
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-47
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Try This
In your lab kit, log in to cluster 1.
Enter: volume snapshot partial-restore-file
What do you need to know before you can restore a partial file from a Snapshot copy?
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
2-48
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 5
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-49
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
37
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2-50
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapRestore
license
requirement
Privilege
requirements
SnapMirror
relationships
Use of an entire
volume, entire file, or
partial file
38
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-51
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-52
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-53
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
Snapshot
Size
Total%
Used%
--------
--------
-------
--------------------
svm1
svm1_vol1
96KB
0%
weekly.2014-10-04_1715
37%
96KB
0%
weekly.2014-10-05_0015
37%
100KB
0%
daily.2014-10-06_0010
38%
84KB
0%
daily.2014-10-07_0010
34%
0%
hourly.2014-10-07_0105
38%
100KB
2-54
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
100KB
0%
hourly.2014-10-07_0205
38%
96KB
0%
hourly.2014-10-07_0305
37%
96KB
0%
hourly.2014-10-07_0405
37%
2-55
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Notice that Snapshot copies that are newer than the restored
Snapshot copy are deleted.
42
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
Size
Snapshot
Total%
Used%
--------
--------
----------
------------------------
svm1
svm1_vol1
96KB
0%
weekly.2014-10-04_1715
37%
96KB
0%
weekly.2014-10-05_0015
37%
100KB
0%
daily.2014-10-06_0010
38%
84KB
0%
daily.2014-10-07_0010
34%
100KB
0%
hourly.2014-10-07_0105
38%
96KB
0%
hourly.2014-10-07_0205
37%
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Notice that Snapshot copies that are newer than hourly.2014-10-07_0205 are deleted.
2-57
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
Size
Snapshot
Total%
Used%
State
--------
-------
------------
----------------
svm1
svm1_vol2
------
0%
ManualSnapshot1
39%
valid
92KB
0%
ManualSnapshot2
39%
valid
92KB
valid
0%
ManualSnapshot3
36%
80KB
2-58
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume Name
Snapshot Name
[-path] <text>
Filepath
[ -restore-path|-r <text> ]
Restore Filepath
[ -split-disabled [true] ]
Volume
Size
--------
-------
svm1
svm1_vol2
Snapshot
Total%
------------
State
Used%
----------------
92KB
0%
ManualSnapshot1
35%
0%
ManualSnapshot2
34%
valid
88KB
0%
ManualSnapshot3
32%
valid
80KB
2-59
------
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
valid
44
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-60
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
45
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-61
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
46
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-62
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
47
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-63
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
48
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-64
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
49
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-65
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 6
50
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-66
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
51
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-67
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
52
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2-68
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
53
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-69
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
54
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-70
Volume
Size
Snapshot
Total%
Used%
-------svm1_root
-------------
-----------------------------
0B
0%
hourly.2014-09-22_1404
0%
0B
0%
hourly.2014-09-22_1405
0%
0B
0%
hourly.2014-09-22_1604
0%
0B
0%
hourly.2014-09-22_1605
0%
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
svm1_vol1
0B
0%
hourly.2014-09-22_1404
0%
0B
0%
hourly.2014-09-22_1405
0%
0B
0%
hourly.2014-09-22_1604
0%
0B
0%
hourly.2014-09-22_1605
0%
64KB
0%
2HourSnapshot.2014-09-22_1405
29%
68KB
0%
2HourSnapshot.2014-09-22_1605
30%
svm1_vol2
snapshot-space-used
2-71
svm1_vol2 13%
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
*Important! For SAN solutions, refer to the Clustered Data ONTAP 8.3 SAN
Administration Guide.
55
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You can define and enable a policy to automatically delete Snapshot copies. You can better manage
space usage if you automatically delete Snapshot copies.
You can automatically delete Snapshot copies from read/write volumes. You cannot set up automatic
deletion of Snapshot copies from infinite volumes or from read-only volumes, for example, SnapMirror
destination volumes.
You can define and enable a policy to automatically delete Snapshot copies by using the volume
snapshot autodelete modify command.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Vserver Name
Volume Name
[[-enabled] {true|false}]
Enabled
[ -commitment {try|disrupt|destroy} ]
Commitment
[ -defer-delete {scheduled|user_created|prefix|none} ]
Defer Delete
[ -delete-order {newest_first|oldest_first} ]
Delete Order
Defer Delete
Prefix
[ -target-free-space <percent> ]
Target Free
Space
[ -trigger {volume|snap_reserve|space_reserve}
Trigger
[ -destroy-list <text> ]
Destroy List
Enable the automatic deletion of Snapshot copies, and set the trigger to volume for the svm1_vol2 volume,
which is part of the svm1 SVM:
cluster1::> volume snapshot autodelete modify -vserver svm1 -volume
svm1_vol2 -enabled true -trigger volume
Volume modify successful on volume: svm1_vol2
Check your work:
cluster1::> volume snapshot autodelete show -vserver svm1 -volume
svm1_vol2
Vserver Name: svm1
Volume Name: svm1_vol2
Enabled: true The autodelete feature is enabled.
Commitment: try
Defer Delete: user_created
Delete Order: oldest_first
Defer Delete Prefix: (not specified)
Target Free Space: 20%
2-73
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-74
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A Snapshot copy is in a busy state if there are any applications that are
using it:
Create a FlexClone of a volume:
cluster1::> volume clone create -vserver svm1 -flexclone
svm1_vol1_Clone -type RW -parent-volume svm1_vol1
Check to see if there are any busy Snapshot copies appearing in the
volume:
cluster1::> volume snapshot show -vserver svm1 -volume
svm1_vol1 -busy true
56
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
Size
Snapshot
Total%
State
Used%
------svm1_vol1
------------
-------
--------
0%
clone_svm1_vol1_C.0
0%
valid
0B
NOTE: The busy true switch shows only the busy Snapshot copies in the output.
2-75
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
snapshot
57
owners
------
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
volume
snapshot
owners
-------
---------
----------------------
------
svm1
svm1_vol1
clone_svm1_vol1_clone.0
"volume clone"
After you know the owner of the Snapshot copy, then you can determine if you can stop the application that is
holding the Snapshot copy busy. When the Snapshot copy is not busy, then you can safely delete it.
2-76
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
58
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
It takes longer to create a Snapshot copy of an infinite volume than of a FlexVol volume. If you schedule
Snapshot copies of infinite volumes for less than hourly, Data ONTAP attempts the schedule but might not
meet it. Scheduled Snapshot copies are missed when the previous Snapshot copy is still being created.
Time should be synchronized across all the nodes that the infinite volume spans.
Synchronized time helps schedules for Snapshot copies run smoothly and helps the restoration of
Snapshot copies function properly.
The Snapshot copy creation job can run in the background.
Creating a Snapshot copy of an infinite volume is a volume-level job (unlike the same operation on a FlexVol
volume), and the operation spans multiple nodes in the cluster. You can force the job to run in the background
by setting the -foreground parameter of the volume snapshot create command to false.
After you create Snapshot copies of an infinite volume, you cannot rename the copy or modify the comment
or SnapMirror label for the copy.
For more information about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes
Management Guide.
2-77
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
59
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You cannot calculate the amount of disk space that can be reclaimed if Snapshot copies of an infinite
volume are deleted.
The size of a Snapshot copy for an infinite volume excludes the size of namespace mirror constituents.
To reclaim disk space that is used by Snapshot copies of infinite volumes, you must manually delete the
copies.
You cannot use the automatic Snapshot copy deletion feature to automatically delete Snapshot copies of
infinite volumes. However, you can manually delete Snapshot copies of infinite volumes, and you can run the
delete operation in the background.
For more information about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes
Management Guide.
2-78
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
60
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You must restore the entire Snapshot copy of the infinite volume.
You cannot restore single files or parts of files.
You also cannot restore a Snapshot copy of a single constituent.
The Snapshot copy must be in a valid state.
You cannot use the admin privilege to restore a Snapshot copy of an infinite volume if the copy is in a partial
or invalid state, because the commands require diagnostic privilege. However, you can contact technical
support to run the commands for you. Restored Snapshot copies inherit the current efficiency settings of the
infinite volume.
If the State field contains a dash ("-") when you run the volume snapshot show command after
restoring a Snapshot copy of the infinite volume, one or more constituents are offline or have a different state
than the other constituents. To align the State field for constituents in an infinite volume, set the efficiency
settings again on the infinite volume.
For more information about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes
Management Guide.
2-79
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
References
NetApp University courses:
Clustered Data ONTAP Administration
NetApp Documentation
61
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2-80
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
62
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2-81
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Exercise
63
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2-82
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 3
NetApp Replication
Technologies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
3-2
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-3
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Mirrored
Volume
Snapshot
Copies
SnapMirror
WAN
SnapMirror
FlexClone
Volume
Mirrored
Volume
Tape
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-4
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror
Production Site
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-5
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot1
Snapshot2
Snapshot3
Snapshot4
Snapshot5
Snapshot1
Snapshot2
Snapshot3
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-6
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror
FlexCone
Volume
Snapshot
Copies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-7
For example, a 10-gigabyte (GB) FlexClone volume does not require another 10-GB FlexClone volume;
it requires only the metadata that is needed to define the FlexClone volume.
FlexClone volumes store only data that is written or changed after a clone is created.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-8
Remote data access provides faster access to data by clients in the remote locations.
Remote data access enables more efficient and more predictable use of expensive network and server
resources, because WAN usage occurs at a predetermined replication time. Storage administrators can
replicate production data at a specific time, to minimize overall network utilization.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-9
The SnapMirror process facilitates centralized backup operations and reduces backup administrative
requirements at remote locations.
Because Snapshot technology eliminates the traditional backup window on the primary storage system,
you can greatly reduce the overhead of backup operations on production storage systems by offloading
tape backups to a SnapMirror destination.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-10
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The mirror copy on the destination volume ensures quick availability and restoration of data from the time of
the latest Snapshot copy, if the data on the source volume is corrupted or lost.
A primary volume is a volume that contains data that is to be backed up.
In cascade or fan-out backup deployments, the primary volume is the volume that is backed up to a
SnapVault backup, regardless of where the SnapVault source is in the chain.
In a cascade or chain configuration in which A has a mirror relationship to B, and B has a SnapVault
relationship to C, B serves as the source for the SnapVault backup. B does this even though it is a
secondary destination in the chain.
A secondary volume is a volume to which data is backed up from a primary volume. Such a volume can be a
secondary or tertiary (and onward) destination in a cascade or fan-out backup configuration. The SnapVault
secondary system maintains Snapshot copies for long-term storage and possible restore operations.
A baseline transfer is an initial complete backup of a primary storage volume to a corresponding volume on
the secondary system.
An incremental transfer is a follow-up backup to the secondary system that contains only the changes to the
primary data since the last transfer action.
3-11
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A SnapMirror label is an attribute that identifies Snapshot copies for the purpose of selection and retention
in SnapVault backups. Each SnapVault policy configures the rules for selecting Snapshot copies on the
primary volume and transferring the Snapshot copies that match a given SnapMirror label.
3-12
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-13
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-14
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
3-15
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-16
A volume can be in multiple relationships, either as the secondary or the primary. A volume can be the
primary for multiple secondary volumes and also the secondary volume for another primary volume.
A volume can be the secondary volume for only one SnapVault relationship.
You cannot configure SnapVault relationships from multiple primary volumes to a single SnapVault
secondary volume. For example, if you want to back up an entire SVM to a SnapVault backup, then you
must create a separate secondary volume for each volume in the SVM and create a separate SnapVault
relationship for each primary volume.
You can configure SnapVault relationships to be used simultaneously with data protection mirror
relationships.
Primary or secondary volumes cannot be 32-bit volumes.
The primary of a SnapVault backup should not be a FlexClone volume. The relationship will work, but
the efficiency that is provided by FlexClone volumes is not preserved.
Primary and secondary volumes must have the same volume language settings.
After you establish a SnapVault relationship, you cannot change the language that is assigned to the
secondary volume.
A SnapVault relationship can be only one leg of a cascade chain.
After you establish a SnapVault relationship, you can rename primary or secondary volumes. If you
rename a primary volume, it can take a few minutes for the relationship to recover from the name change.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-17
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Before you create a SnapVault policy, you should plan which Snapshot copies you want to replicate to the
SnapVault secondary volume and how many of each copy you want to keep. For example:
The primary volume should have an assigned Snapshot policy that creates Snapshot copies at the intervals
you need and that labels each Snapshot copy with the appropriate snapmirror-label attribute name.
The SnapVault policy that is assigned to the SnapVault relationship:
3-18
Hourly (periodically throughout the day): Does the data change often enough throughout the day to make it
worthwhile to replicate a Snapshot copy every hour, every two hours, or every four hours?
Nightly: Do you want to replicate a Snapshot copy every night, or just on workday nights?
Weekly: How many weekly Snapshot copies is it useful to keep in the SnapVault secondary volume?
The policy should select the Snapshot copies that you want from the primary volume, which are identified by
the snapmirror-label attribute name.
The policy should specify how many Snapshot copies of each name you want to keep on the SnapVault
secondary volume.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
If deduplication and compression are enabled on the primary volume, these efficiencies are preserved
during SnapVault transfers. The result:
In addition, data is already deduplicated and compressed on the secondary volume after the SnapVault
transfer completes, without running the deduplication and compression processes on the secondary
volume.
A successful SnapVault transfer requires at least the same amount of available free space on the
secondary volume as is required to copy the data from the primary volume in a nondeduplicated and
noncompressed format. During the SnapVault transfer, it appears that the expanded size of the primary
data is consumed on the secondary. However, as soon as the transfer completes, the storage efficient
dataset size is reflected in the amount of space that is consumed.
Deduplication and compression can run on the secondary volume after the SnapVault transfer has
completed, independent of the storage efficiencies that are present on the primary volume. However,
enabling the compression process to run on the SnapVault secondary volume causes the storage
efficiencies that are present on the primary volume to not be preserved on the SnapVault secondary
volume.
For more information about this caveat and other best practices that are associated with using storage
efficiencies with SnapVault software, refer to section 14.1 of TR-3966: NetApp Data Compression and
Deduplication Deployment and Implementation Guide. TR-3966 also helps you understand how much disk
space you can save by using storage efficiencies with SnapVault software.
3-19
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data throughput
Client I/O impact
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The SnapVault secondary, or target, volume must be sized so that adequate disk space is available to
retain all of the planned backups. You can estimate this space fairly accurately by using known
information about the primary data and the required recovery point objectives (RPOs).
This calculation is independent of the systems that are used.
The data that you need to calculate the required disk space on the SnapVault target is calculated with this
information:
Data throughput
It is also important to size a SnapVault solution so that data can be transferred fast enough to complete
backups in the amount of time that is available.
3-20
First, determine how much data, on average, is transferred in a SnapVault incremental update and how
much time must be allotted to complete the backup.
Then, use these numbers to determine the required data throughput in units such as megabytes per second.
If you have multiple SnapVault relationships, remember to consider the size of all the backups that must
be completed during a given backup window.
After you determine the required data throughput speed, select an appropriate NetApp FAS system that
can handle the data speed that is required.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-21
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The SnapMirror
source volume is
online and writable.
20
The SnapMirror
destination volume
is online and readonly.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Source volumes are the data objects that need to be replicated. Typically, users can access and write to
source volumes.
Destination volumes are data objects to which the source volumes are replicated. Destination volumes are
read-only.
3-22
Destination FlexVol volumes are usually placed on a different SVM from the source SVM.
Destination infinite volumes must be placed on a different SVM from the source SVM.
Destination volumes can be accessed by users, in case the source becomes unavailable.
Administrators can use SnapMirror commands to make the replicated data at the destination accessible and
writable.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-23
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Fan-Out Topologies
Mirror-SnapVault Fan-Out
SnapMirror
SnapVault
SnapMirror
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAN-OUT TOPOLOGIES
Fan-out topologies
In a fan-out topology, a single primary volume is replicated to multiple destinations.
3-24
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault
SnapVault-SnapMirror Cascade
SnapVault
SnapMirror
Mirror-Mirror Cascade
SnapMirror
23
SnapMirror
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
A SnapMirror secondary can be the source of a SnapVault relationship (backing up a data recovery
mirror), or a SnapVault secondary can be the source of a SnapMirror relationship (protecting a backup).
In the case of a SnapMirror to SnapVault relationship, it is not possible to specify which Snapshot copies
are transferred to the SnapVault secondary; SnapVault always transfers the SnapMirror exported
Snapshot copy or the base copy of the SnapMirror relationship. This is similar to the snapmirror
base snapshot only option in Data ONTAP operating in 7-Mode.
When the most recent version of the SnapMirror exported Snapshot copy is transferred to the SnapVault
secondary
How many copies to keep on the SnapVault secondary
Only one SnapVault relationship is supported in a cascade chain configuration, but many SnapVault
relationships are supported in a fan-out configuration; multiple mirror relationships are supported.
The longer you configure a chain of relationships, or the more you add fan-out destinations, the greater the
risk that Snapshot copies will be locked on the source. Depending on the update schedule, the worst case is
when one Snapshot copy is locked for each cascade or fan-out destination.
3-25
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage
System C
Storage
System A
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-26
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-27
An hourly Snapshot copy: Every two hours, a Snapshot copy is created and is assigned the attribute
snapmirror-label hourly.
A daily Snapshot copy: Every day at 5:00 p.m., a Snapshot copy is created and is assigned the attribute
snapmirrorlabel daily.
A weekly Snapshot copy: Every Friday at 6:00 p.m., a Snapshot copy is created and is assigned the
attribute weekly.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You can use pattern matching when you use SnapMirror commands, so that the command works on
selected mirroring relationships.
SnapMirror commands use fully qualified path names in the following format: vserver:volume. You can
abbreviate the path name if you do not enter the SVM name. In such a case, the SnapMirror command
assumes the local SVM context of the user.
For example, if the SVM is called vserver1 and the volume is called vol1, the fully qualified path
name is vserver1:vol1.
You can use the asterisk (*) in paths as a wildcard to select matching, fully qualified path names. The
following table provides examples of using the wildcard to select a range of volumes.
*
vs*
Matches all SVMs and volumes with SVM names that begin with vs
*:*src*
Matches all SVMs with volume names that contain the src text
*:vol*
Matches all SVMs with volume names that begin with vol
3-28
Source and destination FlexVol volumes or infinite volumes of a mirror relationship must use the same
language setting; otherwise, NFS or CIFS clients might be unable to access data.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-29
For FlexVol volumes, it is not a problem if the source and destination volumes are located on the same
SVM, because the language is set on the SVM.
For FlexVol volumes and infinite volumes with mirror relationships between volumes on two different
SVMs, the language setting on the SVMs must be the same.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You cannot automatically delete old Snapshot copies on destination FlexVol volumes or infinite volumes
of mirror relationships, because the destination volume is a read-only version of the source volume. The
destination volume should contain the same data as the source volume.
This is not true of Snapshot copies on destination FlexVol volumes of SnapVault relationships. You can
delete old Snapshot copies on SnapVault secondary volumes.
If you use the snap autodelete command to automatically delete Snapshot copies from a destination
volume, to remove older Snapshot copies, the execution will fail.
An empty junction path on a destination volume is not accessible from CIFS clients:
If internally mounted FlexVol volumes form a namespace, and you have a mirror relationship, CIFS
clients on a destination volume that attempt to view mirrored volumes that are not at the highest level of
the namespace are denied access.
This situation occurs when you create a namespace by using more than one volume, in which one volume
is the source volume of a mirror relationship and the other volumes are members of the namespace. For
example, assume that you have two volumes: vol x, which has a junction path /x, and vol y, which has a
junction path /x/y:
When a SnapMirror transfer occurs, a directory under vol x is created for vol y on the destination volume.
From an NFS client, you can see that the directory is empty, but from a CIFS client, you get the following
message: access is denied.
The primary of a SnapVault backup should not be a FlexClone volume. The relationship will work, but the
efficiency that is provided by FlexClone volumes is not preserved.
3-30
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-31
For load-sharing mirror relationships, you can fan out a maximum of one destination volume on a node
for a single source volume.
The maximum number of nodes within a cluster depends on the platform model and licensed protocols.
For detailed information about cluster size limits, see the Hardware Universe (formerly the System
Configuration Guide) at support.netapp.com/knowledge/docs/hardware/NetApp/syscfg/ index.shtml.
For data protection mirror relationships, you can fan out a maximum of four destination volumes from a
single source volume.
A single source volume can contain both one load-sharing destination volume on a node and four data
protection destination volumes.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-32
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RW
SnapMirror
LS*
LS*
LS*
LS*
Read-Only
LS Mirror Copies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
A namespace root volume is very small. It contains only directories that are used as mount points, which
are the paths where data volumes are junctioned (mounted) into the namespace.
However, namespace root volumes are extremely important for NAS clients, which are not able to access
data if the SVM root volume is unavailable.
SAN client connections (that is, FC, FCoE, or iSCSI) do not depend on the SVM root volume.
Best practice:
Create a load-sharing mirror copy of a NAS SVM namespace root volume on every node in the cluster, so
that the root of the namespace is available, regardless of node outages or node failovers.
3-33
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-34
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
3-35
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume Types
Volume types:
FlexVol volumes
Infinite volumes
Volume variations:
FlexClone volumes
Data protection mirrors
Load-sharing mirrors
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VOLUME TYPES
3-36
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexVol Volumes
Flexible volumes in clustered Data ONTAP are the same as in
environments with Data ONTAP 7G or Data ONTAP operating
in 7-Mode.
Any single volume can exist within a single data SVM only.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FLEXVOL VOLUMES
Clustered Data ONTAP systems use flexible volumes differently than Data ONTAP 7-Mode and Data
ONTAP 7G systems do. Because Data ONTAP clusters are inherently flexible, largely due to the volume
move capability, volumes are deployed as freely as UNIX directories and Windows folders are deployed to
separate logical groups of data.
You can perform these actions:
To take advantage of this flexibility, cluster deployments typically use many more volumes than traditional
Data ONTAP 7G deployments use. In a high-availability (HA) pair, aggregate and volume limits apply to
each node individually, thus, the overall limit for the pair is effectively doubled.
3-37
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Infinite Volumes
Definition
Applications
Applications
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
To learn more about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes Management
Guide.
3-38
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexClone Volumes
Aggregate
FlexVol Volume
Snapshot
Copy of
svm_vol1 Parent
vol1clone
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FLEXCLONE VOLUMES
A FlexClone volume is a point-in-time, space-efficient, writable copy of the parent volume.
FlexClone volumes are created in the same SVM (which was previously known as a Vserver) and aggregate
as the parent volume, and FlexClone volumes share common blocks with the parent volume.
While a FlexClone copy of a volume exists, the parent volume cannot be deleted or moved to another
aggregate.
You can sever the connection between the parent and the FlexClone volume by executing a split
operation. A FlexClone split causes the FlexClone volume to use its own disk space, but the FlexClone
split enables you to delete the parent volume and to move the parent or the FlexClone volume to another
aggregate.
3-39
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RW
DP
37
RW
LS
LS
LS
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Mirror copies are synchronized with the read/write source volumes only if an administrator keeps the
mirror copies synchronized through manual replication or scheduled (automated) replication.
Generally, data protection mirror copies do not need to be as up-to-date as load-sharing mirror copies,
because they serve different purposes.
A replication schedule can be associated with each mirror copy. The schedule determines when (cron) or how
often (interval) replications are performed on the mirror copy.
All load-sharing mirror copies of a volume are treated as a unified group and use the same schedule.
The schedule is enforced by the UI, so if you choose a different schedule for one load-sharing mirror
copy, the other load-sharing mirror copies of that volume are automatically changed to match.
Each data protection mirror copy is independent; it does not have to use the same schedule as other data
protection mirror copies.
Load-sharing mirror relationships stay within the SVM of the source volume. Data protection mirror copies
can be within a SVM, between SVMs within the cluster, or between SVMs of two different clusters.
3-40
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38
DP
Schedule
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-41
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster administrators use snapmirror policy commands to create and manage all data protection
mirror and SnapVault policies. SVM administrators use the same commands to create and manage all data
protection mirror and SnapVault policies within SVMs.
All policy-management commands (except for the snapmirror policy show command) must be
run on the SVM that contains the destination volume.
3-42
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
39
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-43
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
40
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
3-44
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The passphrase is used when the relationship from the first cluster to the second cluster is created.
The passphrase is used again when the relationship from the second cluster to the first cluster is created.
NOTE: The passphrase is not exchanged on the network by the Data ONTAP operating system. However,
when Data ONTAP creates the cluster peer relationship, each cluster in the relationship recognizes the
passphrase.
3-45
When you create the cluster peer relationship from the first cluster to the second cluster, the first cluster
waits for the administrator of the second cluster to create the cluster peer relationship.
The administrator of the second cluster must create the cluster peer relationship before the waiting period
expires, within one hour by default.
If the cluster peer relationship is not created from the second cluster to the first cluster before the waiting
period expires, the cluster peer relationship is not created, and the administrators must restart the process.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM Peering
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTER PEERING AND SVM PEERING: COMPARE CLUSTER AND SVM PEERING
3-46
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-47
Cluster time must be synchronized within 300 seconds (clusters can be in different time zones).
At least one intercluster LIF must be created on every node in the cluster.
Every intercluster LIF requires an IP address that is dedicated for intercluster replication.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-48
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Intercluster LIF
12 TCP
connections that
share one LIF
Intercluster LIF
45
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Remember that, starting with the clustered Data ONTAP 8.2 operating system, Data ONTAP establishes
at least 12 intercluster TCP connections for sending data. This is true even if the source and destination
nodes have only one intercluster LIF. Enough connections are created so that all intercluster LIFs on both
the source and destination nodes are used.
If the source node, the destination node, or both nodes are configured with two intercluster LIFs, then
Data ONTAP establishes 12 TCP connections for sending data. However, both connections do not use the
same LIFs. Instead, one connection uses one LIF pair, and the other connection uses the other LIF pair. It
is not possible to select a specific LIF pair to use for a certain TCP connection; Data ONTAP manages the
LIF pairs automatically.
After scaling past 12 intercluster LIFs on a node, Data ONTAP creates additional intercluster TCP
connections. Enough connections are created so that all intercluster LIFs are used.
The creation of additional intercluster TCP connections continues, as more intercluster LIFs are added to
either the source node or the destination node. Currently, a maximum of 24 intercluster connections are
supported for SnapMirror technology on a single node in Data ONTAP.
Best practice
To ensure operational consistency, the same number of intercluster LIFs can be configured on both the source
node and destination node. However, this configuration is not required. Multiple intercluster LIFs can be
created to enable active-active multipathing across multiple physical paths.
For example, if a node is configured with four 1-gigabit Ethernet (GbE) ports for intercluster replication, then
four intercluster LIFs are required. One LIF is assigned to each port, to ensure that all paths are used to
provide bandwidth beyond just one 1-GbE link.
3-49
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster 2
Intercluster LIF
Intercluster LIF
46
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-50
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM1
SVM2
SVM4
Cluster 1
Cluster 2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The SVM peer infrastructure enables you to set up a backup and recovery mechanism between SVMs. You
can set up a mirroring relationship at the volume level between peered SVMs. If a volume in the SVM
becomes unavailable, the cluster administrator or SVM administrator can configure the respective mirrored
volume of the peered SVM to serve data.
One SVM can be peered with multiple SVMs within a cluster or across clusters.
You can set up only SnapMirror data protection and SnapVault (XDP) relationships by using the SVM peer
infrastructure.
3-51
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
48
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-52
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 5
49
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-53
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
50
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-54
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
51
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-55
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
52
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-56
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
53
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-57
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
54
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-58
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
55
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM
Logical
Status
Current
Is
Interface
Admin/Oper
------ ----------
Network
Address/Mask
Node
Current
Port
Home
------ ----
---------- -------------
--------
up/up
cluster1-0
e0c
true
cluster1-02
e0c
true
cluster1
failover_cluster1
192.168.1.50/24
3-59
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Home
Failover
Failover
Vserver
Interface
Node:Port
Policy
Group
--------
----------
--------------
----------
failover_cluster1 cluster1-01:e0c
local-only
failover_cluster1
cluster1-01:e0d
cluster1
3-60
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
failover_cluster1
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Destination
Gateway
Metric
0.0.0.0/0
192.168.0.1
20
Destination
Gateway
Metric
192.168.0.1
20
0.0.0.0/0
192.168.1.1
40
svm1
2 entries were displayed.
Important: These steps need to be performed on the peer cluster.
3-61
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
57
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Port
IPspace
MTU
Admin/Oper
Default
Default
up
1500
auto/1000
e0b
Default
Default
up
1500
auto/1000
e0c
Default
Default
up
1500
auto/1000
e0d
Default
Default
up
1500
auto/1000
e0e
Default
Default
up
1500
auto/1000
e0f
Default
Default
down
1500
auto/10
3-62
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-63
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
58
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Status
Network
Current
Current
Is
Admin/Oper
Address/Mask
Node
Port
----------
--------------
--------
----
Interface
Vserver
Home
-------
---------
cluster2
failover_cluster2
up/up
192.168.1.51/24
true
3-64
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
cluster2-01 e0c
Home
Interface
-------- ----------
----------
Failover
Failover
Node:Port
Policy
-----------
----------- --------
Group
cluster2
failover_cluster2
cluster2-01:e0c local-only
3-65
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
failover
_cluster2
59
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Destination
Gateway
Metric
192.168.0.1
20
0.0.0.0/0
192.168.1.1
40
3-66
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
60
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-67
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
61
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Authentication
1-80-000099
Available
ok
Authentication
1-80-000099
Available
3-68
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ok
3-69
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM Peering
SnapVault Peer Relationships
SVM1
SVM2
62
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-70
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM Peering
Peer Relationships Between SVMs
63
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Peer
Vserver
Vserver
State
---------
---------
svm1
svm1_2
Peering
Peer Cluster
Applications
---------
---------------
---------------
initiated
cluster2
snapmirror
Peer
Vserver
Vserver
State
Peer Cluster
Applications
---------
---------
---------
---------------
---------------
svm1_2
svm1
pending
3-71
Peering
cluster1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
snapmirror
Peer
Peering
Vserver
Vserver
State
Peer Cluster
Applications
---------
---------
---------
---------------
---------------
svm1
svm1_2
peered
cluster2
snapmirror
Peer
Vserver
Vserver
State
Peer Cluster
Applications
---------
---------
---------
---------------
---------------
svm1_2
svm1
peered
cluster1
snapmirror
3-72
Peering
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 6
64
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-73
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
65
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-74
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Replication Updates
You can perform replication updates manually.
In the next module you learn how to implement a SnapMirror
solution.
SnapMirror
Policy
SnapMirror
Relationship
RW
66
DP
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REPLICATION UPDATES
3-75
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Schedule
References
NetApp University courses:
Clustered Data ONTAP 8.3 Administration
NetApp Documentation:
67
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
3-76
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
68
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
3-77
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Exercise
69
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
3-78
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 4
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-1
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
4-2
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
SnapMirror Technology
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-3
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume-Level Replication
Source
Volume
Snapshot
Copies
SnapMirror
Mirrored
Volume
WAN
SnapMirror
FlexClone
Volumes
Mirrored
Volume
Tape
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VOLUME-LEVEL REPLICATION
SnapMirror Uses and Benefits
SnapMirror technology in clustered Data ONTAP provides asynchronous volume-level replication based on a
configured replication update interval. SnapMirror technology uses NetApp Snapshot technology as part of
the replication process.
Clustered Data ONTAP 8.3 provides the following replication capabilities:
4-4
Data protection mirror copies: These copies provide replication to create a backup copy within the
same cluster (intracluster) or to create a disaster recovery copy in a different cluster (intercluster).
Load-sharing (LS) mirror copies: These copies provide replication from one volume to multiple
volumes in the same cluster to distribute a read-only workload across a cluster.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-5
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1. Create an unscheduled
Snapshot copy at the
source.
FlexClone
Volume
Snapshot
Copies
2.
3.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-6
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-7
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-8
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-9
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-10
The schedule frequency for replicating volumes must be greater than 60 minutes.
Large to medium-sized file workloads are best suited for replication using version-independent
SnapMirror relationships.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
Implementing
SnapMirror Relationships
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-11
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-12
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Description
Expiration
-----------------
-------
---------------------
-------------
SnapMirror
site
SnapMirror License
You can use a slightly different command to view the SnapMirror license on cluster2:
cluster2::> license show -instance -package SnapMirror
(system license show)
Serial Number: 1-80-000099
Package: SnapMirror
Owner: cluster2
Expiration Date: Description: SnapMirror License
4-13
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Type: site
Legacy: no
Customer ID: 1-82-0000000000000000000000000
The licenses are in place.
Create a new destination volume. The destination volume must be type DP:
cluster2::> volume create -vserver svm1_2 -volume svm1_2_vol2 -aggregate
aggr1 -size 200m -security-style ntfs -type dp
cluster2::> volume show -volume svm1_2_vol2
Vserver
Volume
Aggregate
State
Type Size
Available Used%
-----
svm1_2
0%
4-14
svm1_2_vol2
aggr1
online
DP
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
200MB 199.88MB
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Source
Path
Progress
Destination
Type
Updated
Mirror
Path
------
--------
------- ----------
Relationship
State
Total
Status
Last
Progress
Healthy
-------
--------
-----------
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
Snapmirrored
Idle
4-15
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
true
svm1:svm1_vol3
DP
svm1_2:svm1_2_vol2
Uninitialized
Idle
4-16
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
true
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Destination
Mirror
Relationship
Total
Path
State
Status
Progress Healthy
Path
Type
Updated
------
-------- -----------
------- --------------
Last
-------
--------
true
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
Snapmirrored
Idle
4-17
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
svm1:svm1_vol3
DP
svm1_2:svm1_2_vol2
Snapmirrored
Idle
true
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Transfer Type: Transfer Error: Current Throttle: Current Transfer Priority: Last Transfer Type: update
Last Transfer Error: Last Transfer Size: 72KB
Last Transfer Network Compression Ratio: 1:1
Last Transfer Duration: 0:0:2
Last Transfer From: svm1:svm1_vol3
Last Transfer End Timestamp: 09/24 13:10:04
Progress Last Updated: Relationship Capability: 8.2 and above
Lag Time: 0:0:55
Number of Successful Updates: 1
Number of Failed Updates: 0
Number of Successful Resyncs: 0
Number of Failed Resyncs: 0
Number of Successful Breaks: 0
Number of Failed Breaks: 0
Total Transfer Bytes: 212992
Total Transfer Time in Seconds: 5
2 entries were displayed.
4-19
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Volume
Used%
Snapshot
--------
--------
-------------------------
svm1
svm1_vol3
Size
----------
Total%
--------
snapmirror.1383c700-4345-11e4-97f5-2014-090050560140c1_2147484679.24_131500
32%
68KB
4-20
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
0%
---Blocks--Vserver
Volume
Used%
Snapshot
Size
--------
--------
----------------------- --------
svm1_2
svm1_2_vol2
Total%
--------
snapmirror.1383c700-4345-11e4-97f50050560140c1_2147484679.2014-09-24_131000
76KB
0%
35%
snapmirror.1383c700-4345-11e4-97f50050560140c1_2147484679.2014-09-24_131500
0B
0%
4-21
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
0%
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Description
----------------
---------------------------------------------------
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
Hourly_SnapMirror
@:00
SnapVaultJob
@:10
daily
@0:10
hourly
@:05
weekly
Sun@0:15
4-22
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
destination-path
schedule
4-23
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Try This
Using cluster1on your lab kit:
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
4-24
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
4-25
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-26
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Load-sharing mirror relationships can be managed only by the Data ONTAP CLI. Currently, load-sharing
mirror relationships cannot be managed by using OnCommand System Manager.
A group of load-sharing mirror destination volumes that replicate from the same source volume is called a
load-sharing mirror set.
When a load-sharing mirror set is created, each destination volume must be created in the appropriate
aggregate, which creates the destination volumes with a type of data protection.
In this example, two volumes named svm1_root_lsm1 and svm1_root_lsm2 are created as load-sharing mirror
destination volumes for the SVM root volume named svm1_root:
cluster1::> volume create -vserver svm1 -volume svm1_root_lsm1 -aggregate
n1_aggr1 -size 20m -type DP
cluster1::> volume create -vserver svm1 -volume svm1_root_lsm2 -aggregate
n1_aggr1 -size 20m -type DP
4-27
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-28
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You can update load-sharing mirror relationships manually or by setting the desired schedule in the
schedule option. For load-sharing mirror relationships, you do this by setting the desired schedule on
any one of the destinations in the load-sharing mirror set. Data ONTAP automatically applies that
schedule to all destinations in that load-sharing mirror set.
A later change to the update schedule for any of the destination volumes in the load-sharing mirror set
applies the new schedule to all volumes in that load-sharing mirror set. Therefore, in the previous
example, the schedule option was used only in the creation of the last relationship, which applied the
schedule to both relationships.
4-29
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Progress
Source
Path
Type
Updated
Destination
Path
---------
Last
Healthy
-------
cluster1://svm1/svm1_root_lsm1
Snapmirrored
Transferring 696KB
false
cluster1://svm1/svm1_root_lsm2
Snapmirrored
Transferring 696KB
false
Type
Updated
----
Destination
Path
Last
Healthy
---------
-------
Idle
cluster1://svm1/svm1_root
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
true
cluster1://svm1/svm1_root_lsm2
Snapmirrored
Idle
true
4-30
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-31
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
4-32
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Clients
Cluster 2
Cluster 1
Source
Volume
27
Scheduled Copies
Destination
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-33
Client applications perform read/write actions only on the source volume. Data on the source volume is
mirrored to the destination volume. The destination volume is configured for data protection, which
makes the volume read-only, if clients are given access to it.
The process of failing over and resynchronizing a SnapMirror relationship involves three Data ONTAP
operations: break, reverse resync*, and update.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster 2
Cluster 1
Source
Volume
28
Scheduled Copies
Destination
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-34
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-35
It is common practice for a disaster recovery system to have a different name than the source system.
In disaster recovery failover scenarios, it is typical to change DNS name resolution or use DNS
aliases to redirect clients to the names of the recovered storage systems. This enables CIFS shares to
be accessible using the same UNC path name. NFS clients can also access the expected path.
Alternatively, the failed source storage system might be removed from Active Directory. The
recovery storage system might be removed and added again to Active Directory by using the same
name as the source system. However, it can take time for this change to propagate through a large
Active Directory environment.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
4-36
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Failover
Quiesce the SnapMirror Relationship
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-37
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-38
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Failover
Break the SnapMirror Relationship
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-39
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Failover
Check the Destination Volume
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-40
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Failover
Configure the Destination Volume for Data Access
Compression
Autogrow
Snapshot copy schedule
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-41
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Failover
Configure the Destination Volume for Data Access (1 of 2)
In a NAS environment:
Mount the NAS volume into the namespace using the same
junction path as the source volume.
Apply the correct access control lists (ACLs) to CIFS shares.
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-42
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Failover
Configure the Destination Volume for Data Access (2 of 2)
In a SAN environment:
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-43
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Resync
Reactivate the Original Source Volume
Cluster 2
Cluster 1
DP
RW
Resync
Destination
Volume
37
Source
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-44
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Resync
Reactivate the Original Source Volume (1 of 4)
38
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-45
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Last
Healthy
---------
-------
Idle
svm1_2:svm1_svm1_vol2_mirror
DP
svm1:svm1_vol2
Snapmirrored
true
4-46
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Resync
Reactivate the Original Source Volume (2 of 4)
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
destination-path
schedule
policy
------------------
----------------
--------
---------
svm1_2:svm1_svm1_vol2_mirror
svm1:svm1_vol2
DPDefault
4-47
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Resync
Reactivate the Original Source Volume (3 of 4)
40
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-48
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Resync
Reactivate the Original Source Volume (4 of 4)
Cluster 2
Quiesce and Break
RW
Destination
Volume
Cluster 2
Cluster 1
Resync
RW
Source
Volume
41
RW
Source
Volume
DP
Destination
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Updated
----
Destination
Path
---------
Last
Healthy
-------
svm1_2:svm1_svm1_vol2_mirror
DP
svm1:svm1_vol2
Snapmirrored
Quiesced
true
4-49
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Type
Updated
----
Destination
Path
Last
Healthy
---------
-------
Idle
svm1_2:svm1_svm1_vol2_mirror
DP
svm1:svm1_vol2
Broken-off
true
At this point, you can redirect the clients to the source volume. Ensure that the volume is in the namespace,
that NAS and SAN configurations are set up, and that the volume has all required settings.
Perform a snapmirror resync operation:
cluster2::> snapmirror resync -source-path svm1:svm1_vol2 -destinationpath svm1_2:svm1_svm1_vol2_mirror
Warning: All data newer than Snapshot copy snapmirror.67851b33-503b-11e4850e-123478563412_2147484675.2014-10-10_150854
on volume svm1_2:svm1_svm1_vol2_mirror will be deleted.
Do you want to continue? {y|n}: y
Operation is queued: initiate snapmirror resync to destination
"svm1_2:svm1_svm1_vol2_mirror".
cluster2::> snapmirror show -source-path svm1:svm1_vol2
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
---------
Last
Healthy
-------
svm1:svm1_vol2
DP
svm1_2:svm1_svm1_vol2_mirror
Snapmirrored
Idle
true
Finally, ensure that you have the required SnapMirror policy and update schedule.
4-50
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Updated
----
Destination
Path
Last
Healthy
---------
-------
Idle
cluster1://svm1/svm1_root
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
true
cluster1://svm1/svm1_root_lsm2
Snapmirrored
Idle
true
4-51
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Volume
Aggregate
State
Type Size
Available Used%
svm1_root_lsm2
n1_aggr1
online
RW
20MB
18.85MB
5%
4-52
Remember that load-sharing mirror volumes are read-only and that all client access requests are directed
only to destination volumes. Thus, no read-only connections exist to the source volume that was removed
by the promote operation, except for connections that might access the read-write admin share.
NFS file handles and CIFS connections to the read/write admin share are nondisruptively transferred to
the new source volume.
Read-only connections to the promoted volume are nondisruptively transferred to other destination
volumes in the load-sharing mirror set.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Updated
----
Destination
Path
Last
Healthy
---------
-------
true
cluster1://svm1/svm1_root_lsm2
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
Idle
Because the promoted volume would have a different volume name than the original source volume, the new
source volume can be renamed to retain that name for the source of the load-sharing mirror set, as shown in
the following example.
Rename the volume to retain the name for the source load-sharing mirror set:
4-53
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Type
Updated
----
Destination
Path
---------
Last
Healthy
-------
cluster1://svm1/svm1_root
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
Idle
true
4-54
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
44
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-55
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
WAN
Remote
(vs1R:vol1_vs1R) FlexVol
45
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Your existing SnapMirror relationships continue to remain cluster scope and behave as they did in
clustered Data ONTAP 8.1.
These SnapMirror relationships do not benefit from the scalability improvements, unless they are deleted
and recreated.
However, both clustered Data ONTAP 8.1 and clustered Data ONTAP 8.3 use the block-level engine for
mirrors, thus no rebaseline is required; only resync is required.
Refer to the Clustered Data ONTAP 8.3 Data Protection Guide for the exact steps to convert a SnapMirror
data protection mirror relationship to a SnapVault secondary.
4-56
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
46
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
When creating a new relationship, you can set a throttle through the CLI by adding the throttle
option and a value in kilobytes, by modifying an existing relationship with the snapmirror modify
command.
NetApp OnCommand System Manager 3.0 does not currently support SnapMirror throttle management.
In this example, a 10 megabyte (MB) throttle is applied to an existing relationship by using the
snapmirror modify command.
4-57
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
References
NetApp University courses:
Data ONTAP 8.3 Administration
NetApp Documentation:
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Infinite Volumes Management Guide
Clustered Data ONTAP File Access and Protocols Management
Guide
NetApp Technical Report:
TR-4015: SnapMirror Configuration Best Practices Guide for Clustered
Data ONTAP 8.2
47
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
4-58
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
48
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
4-59
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Exercise
49
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
4-60
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 5
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
5-2
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
SnapVault Technology
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-3
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault Technology
The SnapVault backup solution provides long-term, storageefficient retention of backups.
SnapVault relationships enable you to back up selected
Snapshot copies of volumes to a destination volume and to
retain the backups.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT TECHNOLOGY
Snapshot technology is the foundation for SnapRestore, SnapManager, SnapDrive, SnapMirror, FlexClone,
and SnapVault operations. SnapVault technology is a NetApp disk-to-disk backup solution that is built into
the Data ONTAP operating system. To enable SnapVault software on your NetApp system, you install a
license key; no additional hardware or software must be installed. SnapVault software enables you to replicate
your data to a secondary volume and to retain the data for longer than you might retain data on your primary
volume.
A SnapVault backup is a collection of Snapshot copies on a FlexVol volume, from which you can restore data
if the primary data is not usable. Snapshot copies are created based on a Snapshot policy. The SnapVault
backup backs up Snapshot copies based on its schedule and on SnapVault policy rules.
You can create a SnapVault relationship between FlexVol volumes and assign a SnapVault policy to the
relationship to create a SnapVault backup. A SnapVault backup contains a set of read-only backup copies,
which are located on a secondary volume.
NOTE: SnapVault relationships are supported on clustered Data ONTAP 8.2 or later. SnapVault
relationships are not supported on infinite volumes.
An important architectural change is that SnapVault software in clustered Data ONTAP replicates at the
volume Level rather than at the qtree level, as was true in SnapVault for Data ONTAP operating in 7-Mode.
This means that the source of a SnapVault relationship must be a volume, and that volume must replicate to
its own volume on the SnapVault secondary.
5-4
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-5
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault Operations
Primary Volume
(Read/Write)
Secondary Volume
(Data Protection)
Snapshot Policy
Label = Svault
SnapVault Policy
Label = Svault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT OPERATIONS
You create SnapVault relationships to back up and restore volumes. You can select the Snapshot copies that
the SnapVault relationship uses to back up and restore volumes.
The Snapshot policy that is assigned to the source volume specifies when Snapshot copies are performed and
assigns a label to the Snapshot copy. The SnapVault policy that is assigned to the SnapVault relationship
specifies which source volume Snapshot copies are replicated to the SnapVault backup, by indicating the
Snapshot copy label.
Data that is not backed up to a SnapVault backup
If you back up an entire storage virtual machine (SVM) to a SnapVault backup by establishing a SnapVault
relationship for each volume in the SVM, namespace and root information is not backed up. To protect
namespace and root information for an SVM, you must manually create the namespace and root on the
SnapVault secondary volume.
5-6
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-7
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
Implementing SnapVault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-8
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-9
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Peer relationships
A SnapVault policy
The snapmirror-label attribute
The amount of time that you need for the baseline transfer
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-10
You must have either cluster administrator privileges to perform this task for a cluster, or SVM
administrator privileges to perform this task for an SVM.
If the primary and secondary volumes are in different SVMs or clusters, peer relationships must exist.
A SnapVault policy must exist. You can either create one or accept the default SnapVault policy
(XDPDefault) that is automatically assigned. Only Snapshot copies with labels that are configured in the
SnapVault policy rules are replicated by SnapVault.
The Snapshot policy that is assigned to the primary volume must include the snapmirror-label
attribute. Snapshot copies on the primary volume without the snapmirror-label attribute are
ignored by the SnapVault software.
Depending on the amount of data on the primary volume and other factors, it might take a long time to
complete the baseline transfer.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Type
Description
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Description
Expiration
5-11
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Owner: cluster1-01
Package
Type
Description
Expiration
-----------------------
-------
---------------------
-------------
NFS
license
NFS License
CIFS
license
CIFS License
SnapRestore
license
SnapRestore License
SnapMirror
license
SnapMirror License
FlexClone
license
FlexClone License
SnapVault
license
SnapVault License
5-12
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-13
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-14
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Policy
Policy
Number
Transfer
Name
Name
Comment
Type
Of Rules
Tries
Priority
------svm1
-----------------svm1-vault-policy
-----vault
-------1
------8
-------normal
-
Keep: 7
Total Keep:
7
The -preserve option allows you to keep any Snapshot copies that are more recent than the common
Snapshot copy on the SnapVault secondary volume, and that are not present on the primary volume.
5-15
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-16
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Is
Policy Name
Schedules
Enabled
Comment
--------------------
---------
-------
-----------------------------
true
2Hour_Policy
Schedule
Count
Prefix
SnapMirror Label
----------------
-----
----------------
-------------
2HourSnapshot
2HourSnapshot
84
5-17
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Is
Policy Name
Schedules
Enabled
Comment
---------------------
---------
-------
------------------------
true
2Hour_Policy
Schedule
Count
Prefix
SnapMirror Label
----------------
-----
----------------
-------------------
2HourSnapshot
84
2HourSnapshot
SnapVault
Notice that the SnapMirror label in the policy exactly matches the snapmirror-label attribute in the
SnapVault policy.
5-18
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RW volume
DP volume
space-guarantee
volume
volume
autosize
false
true
autosize-mode
off
grow_shrink
Percent
85 (percent)
85 (percent)
autosize-shrinkthreshold-Percent
50 (percent)
min-autosize
max-autosize
5 (percent)
0 (percent)
fractional-reserve
100 (percent)
0 (percent)
autosize-growthreshold-
5-19
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5-20
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Description
-----------
---------
---------------------------------------------
5min
cron
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
cron
@2:15,10:15,18:15
Every 1h
RepositoryBalanceMonitorJobSchedule
interval
Every 10m
daily
cron
@0:10
hourly
cron
@:05
weekly
cron
Sun@0:15
5-21
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Create a new schedule by using the job schedule cron create command:
cluster2::> job schedule cron create -name SnapVaultJob -dayofweek all hour all -minute 10
This job will run every day of the week, every hour of the day, at ten minutes past the top of the hour.
Verify that the new schedule was created correctly:
cluster2::> job schedule cron show
Name
Description
----------------
--------------------------------------------------
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
Hourly_SnapMirror
@:03
SnapVaultJob
@:10
daily
@0:10
hourly
@:05
weekly
Sun@0:15
5-22
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-23
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Policy
Policy Number
Name
Name
Type
Of Rules
Tries
------- ---------
------
--------
------
svm1_2
vault
5-24
svm1_2_vault-policy
Transfer
Priority
8
SnapMirror Label:
Keep: 20
SnapVault
Keep: 20
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
-------normal
Comment
------
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-25
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Source
Destination
Relationship
Total
Type
Path
Mirror
Last
Path
State
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
true
-------
-------------------
------------
-------
--
Snapmirrored
Idle
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5-27
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-28
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
5-29
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-30
Original source volume: You can restore from a SnapVault secondary volume back to the original
SnapVault primary volume.
New, empty secondary volume: You can restore from a SnapVault secondary volume to a new, empty
secondary volume. You must first create the volume as a data protection volume.
New secondary volume that already contains data: You can restore from a SnapVault secondary volume
to a volume that is prepopulated with data. The volume must have a Snapshot copy in common with the
restore primary volume and must not be a data protection volume.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-31
A new temporary relationship is created from the restore source (which is the original SnapVault
relationship secondary volume) to the restore destination. The temporary relationship is a restore type
(RST). The snapmirror show command displays the RST type while the restore operation is in
progress.
The restore destination might be the original SnapVault primary volume or might be a new SnapVault
secondary volume.
During the restore process, the restore destination volume is changed to read-only.
When the restore operation finishes, the temporary relationship is removed, and the restore destination
volume is changed to read-write.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-32
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Path
----------- -----------
Start
End
Operation
Time
Time
---------
-----------
----------- --------
9/23/2014
9/23/2014
20:14:48
20:14:53
Result
svm1:svm1_vol1
svm1_2:svm1_2_vol1
restore
5-33
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
success
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-34
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-35
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-36
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
5-37
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-38
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Destination
Volume
Source
Volume
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The primary and secondary volumes must have a common Snapshot copy.
Snapshot copies on the secondary volume that are newer than the common Snapshot copy are deleted.
When a SnapVault relationship is created, all Snapshot copies on the secondary volume that are more recent
than the common Snapshot copy and that are not present on the primary volume are deleted. Newer Snapshot
copies on the primary volume that match the configured SnapVault policy are transferred to the secondary
volume according to the SnapVault policy. You can use the -preserve option to keep any Snapshot
copies that are more recent than the common Snapshot copy on the SnapVault secondary volume and that are
not present on the primary volume.
5-39
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
When you use the -preserve option, data on the secondary volume is logically made the same as the
common Snapshot copy. All newer Snapshot copies on the primary volume that match the SnapVault policy
are transferred to the secondary volume. This option is useful when the latest common Snapshot copy is
deleted from the primary volume but another, older common Snapshot copy between the primary and
secondary volumes still exists.
For more information, refer to the Clustered Data ONTAP 8.3 Data Protection Tape Backup and Recovery
Guide and the Clustered Data ONTAP 8.3 Data Protection Guide.
5-40
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-41
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-42
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Changes to the volume's efficiency schedule do not take effect for a SnapVault secondary volume. Instead,
when storage efficiency is enabled, the SnapVault relationship manages the schedule. When a data transfer
begins, the storage efficiency process automatically pauses until the transfer is finished and automatically
begins again after the data transfer is complete. Because data transfers to a SnapVault secondary volume
might include more than one Snapshot copy, the storage efficiency process is paused for the entire duration of
the update operation. After the transfer is finished, and the post-transfer storage efficiency process is
complete, the last Snapshot copy that was created in the secondary volume is replaced by a new, storageefficient Snapshot copy.
If the last Snapshot copy that is created in the secondary volume is locked before it can be replaced by a new,
storage-efficient Snapshot copy, then a new, storage-efficient Snapshot copy is still created, but the locked
Snapshot copy is not deleted. That Snapshot copy is deleted later during the storage-efficient cleanup process,
after a subsequent update to the SnapVault secondary volume and after the lock is released. A Snapshot copy
in a SnapVault secondary volume might be locked because the volume is the source in another relationship,
such as a data protection mirror relationship.
If the secondary volume has additional compression enabled, storage efficiency is not preserved.
Storage efficiency on all data transfers in SnapVault relationships is not preserved when the secondary
volume has additional compression enabled. Because of the loss of storage efficiency, a warning message is
displayed when you enable compression on a SnapVault secondary volume. After you enable compression on
the secondary volume, you can never have storage-efficient transfers.
5-43
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 5
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-44
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
snapmirror show
snapmirror update
snapmirror modify
snapmirror policy
modify-rule
snapmirror policy
remove-rule
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-45
All policy-management commands (except for the snapmirror policy show command) must be
run on the SVM that contains the destination volume.
Commands for SnapVault policies are supported only by FlexVol volumes.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Type
Updated
--------
----
Destination
Path
----------
Mirror
State
Relationship
Status
------- ------------
Total
Progress
Last
Healthy
---------
-------
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
Snapmirrored
Idle
true
5-46
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
5-47
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Source Path
source-cluster
Source Cluster
source-vserver
Source SVM
source-volume
Source Volume
destination-path
Destination Path
destination-cluster
Destination Cluster
destination-vserver
Destination SVM
destination-volume
Destination Volume
type
Relationship Type
relationship-group-type
vserver
Managing SVM
schedule
SnapMirror Schedule
policy-type
policy
SnapMirror Policy
tries
Tries Limit
throttle
Throttle (KB/sec)
current-throttle
Throttle (KB/sec)
Current Transfer
state
Mirror State
status
Relationship Status
file-restore-file-count
5-48
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
file-restore-file-list
transfer-snapshot
Transfer Snapshot
snapshot-progress
Snapshot Progress
total-progress
Total Progress
network-compression-ratio
Ratio
Network Compression
snapshot-checkpoint
Snapshot Checkpoint
newest-snapshot
Newest Snapshot
newest-snapshot-timestamp
Timestamp
Newest Snapshot
exported-snapshot
Exported Snapshot
exported-snapshot-timestamp
Timestamp
Exported Snapshot
healthy
Healthy
relationship-id
Relationship ID
current-operation-id
Current Operation ID
current-transfer-type
Transfer Type
current-transfer-error
Transfer Error
last-transfer-type
last-transfer-error
last-transfer-size
last-transfer-network-compression-ratio
Compression Ratio
last-transfer-duration
last-transfer-from
last-transfer-end-timestamp
Timestamp
unhealthy-reason
Unhealthy Reason
progress-last-updated
relationship-capability
Relationship Capability
lag-time
Lag Time
current-transfer-priority
Priority
Current Transfer
is-smtape-op
SMTape Operation
is-constituent
Constituent Relationship
destination-volume-node
Name
asynchronous
5-49
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
identity-preserve
update-succ-cnt
Updates
Number of Successful
update-fail-cnt
resync-succ-cnt
Resyncs
Number of Successful
resync-fail-cnt
break-succ-cnt
Breaks
Number of Successful
break-fail-cnt
tot-trans-bytes
tot-trans-time-secs
5-50
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
The snapmirror update command updates the destination volume of a SnapMirror relationship.
The snapmirror update command behaves differently for data protection, vault, and load-sharing
relationships.
For vault relationships, the snapmirror update does not take a Snapshot copy on the source volume
but transfers only selected Snapshot copies that are newer than the common Snapshot copy to the
destination volume. (Copies that are older than the common copy can be transferred by using the source-snapshot parameter.)
Snapshot copies are selected by matching the value of -snapmirror-label of a Snapshot copy with
the value of -snapmirror-label of one of the rules from the corresponding SnapMirror policy that
is associated with the SnapMirror relationship.
The snapmirror update command must be used from the destination cluster:
cluster2::> snapmirror update -source-path svm1:svm1_vol1 -destinationpath svm1_2:svm1_2_vol1 -source-snapshot Emergency_SnapVault_Update
5-51
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-52
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
-tries
-transfer-priority
-ignore-atime
-restart
5-53
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40
-keep
This rule specifies the maximum number of Snapshot copies that are retained on
the SnapMirror vault destination volume for a rule.
-preserve
This rule can be true or false. It specifies the behavior when the Snapshot copy
retention count is reached on the SnapMirror vault destination for the rule. The
default value is false.
-warn
This rule specifies the warning threshold count for the rule. The default value is 0.
-vserver
-policy
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Specifies the maximum number of Snapshot copies that are retained on the SnapMirror
vault destination volume for a rule. The total number of Snapshot copies that are retained
for all the rules in a policy cannot exceed 251.
-preserve
True or false. Specifies the behavior when the Snapshot copy retention count is reached on
the SnapMirror vault destination for the rule. The default value is false, which means that
the oldest Snapshot copy is deleted to make room for new copies, only if the number of
Snapshot copies has exceeded the retention count that is specified in the "keep" parameter.
When set to true, an incremental SnapMirror vault update will fail, when the Snapshot
copies reach the retention count.
-warn
Specifies the warning threshold count for the rule. The default value is 0. When set to a
value greater than zero, an event is generated after the number of Snapshot copies (for the
particular rule) that are retained on a SnapMirror vault destination reaches the specified
warn limit. The preserve parameter for the rule must be true, to set the warn parameter to a
value that is greater than zero.
5-54
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The snapmirror policy remove-rule command removes a rule from a SnapMirror policy. On the
vault destination, all Snapshot copies with a SnapMirror label matching the rule are no longer processed by
the snapmirror update command and might need to be deleted manually. A SnapMirror policy that is
associated with a SnapMirror vault relationship must have at least one rule.
-vserver
-policy
5-55
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
References
NetApp University courses:
Data ONTAP 8.3 Administration
NetApp Documentation:
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Data Protection Tape Backup and
Recovery Guide
NetApp Technical Reports:
41
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
5-56
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
5-57
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Exercise
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
5-58
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 6
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-1
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
6-2
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
NDMP Technology
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-3
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NDMP Technology
NDMP is an industry-standard protocol that can control backup,
recovery, and data transfer between primary and secondary
storage devices.
All communications occur over TCP/IP or TCP/IPv6.
NDMP provides low-level control of tape drives and medium
changers.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NDMP TECHNOLOGY
NDMP is an industry-standard protocol for controlling backup, recovery, and data transfer between primary
and secondary storage devices, including storage systems and tape libraries.
Enabling the NDMP protocol on a NetApp storage system enables that storage system to communicate with
NDMP-enabled backup applications.
6-4
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Ken Asks
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
6-5
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-6
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Affinity
When the backup application supports the CAB extension, the NDMP server provides unique location
information about volumes and tape devices. Using this affinity information, the backup application can
perform a local backup instead of a three-way backup, if a volume and a tape device share the same affinity.
If the volume moves from Node 1 to Node 2, affinity information about the volume and tape device changes.
Hence, for a subsequent backup, the DMA performs a three-way NDMP backup operation. This ensures
continuity of the backup policy for the volume, irrespective of the node to which the volume is moved.
6-7
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6-9
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Node-Scoped NDMP
Behaves much like NDMP in Data ONTAP operating in 7-Mode
Requires NDMP to be enabled and configured per node:
The NDMP user must be set and defined on each node.
Uses only physical resources and is not aware of other nodes or any
logical management:
Node-scoped NDMP uses clusters or SVMs.
Requires the DMA to use a LIF on the node that hosts the desired volume:
The DMA backup policy must be updated if the volume or LIF move to a different
node.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NODE-SCOPED NDMP
6-10
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM-Scoped NDMP
NDMP is now enabled and configured per SVM:
NDMP is in the allowed protocols list by default.
With CAB, NDMP can back up any volume on any node and use
any tape device in the entire cluster.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM-SCOPED NDMP
*Refer to NetApp KB ID: 1014598: How to identify which resources are available through NDMP based on
LIF type
6-11
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-12
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Firewall policy
LIF connections
CAB extension support
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6-14
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-15
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Control Connection
NDMP Control
Connection LIF
Cluster
Node 1
Node 2
Data
Connection
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-16
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Control Connection
NDMP Control
Connection LIF
Cluster
Node 1
14
Node 2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-17
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Control Connection
Tape Service
Data Service
Cluster
NDMP Control
Connection LIF
Node 1
NDMP Data
Connection LIF
Node 2
Data Connection
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-18
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Challenge
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-19
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17
SVM
Cluster
vsadmin
admin
vsadmin-backup
backup
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-20
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
20
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-21
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
Managing Node-Scoped
NDMP
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-22
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To Do This Action
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-23
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To Do This Action
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
system
system
system
system
system
services
services
services
services
services
ndmp
ndmp
ndmp
ndmp
ndmp
terminate
start
stop
log start
log stop
On the slide, the commands with an asterisk are deprecated and will be removed in a future major release.
For more information, see the man pages for the system services ndmp commands.
6-24
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To Do This Action
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-25
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
Managing SVM-Scoped
NDMP
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-26
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SVM-Aware NDMP
Remote NDMP
Server
CAB-Enabled
DMA
Data or Intercluster LIF
Control
Connection
Control
Connection
Data or Intercluster LIF
Data
Connection
Target
Volume
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM-AWARE NDMP
With Data ONTAP 8.3, you can choose to perform tape backup and restore operations at the SVM level.
For NDMP to be aware of an SVM, the NDMP data management application software must be enabled with
CAB extensions, and the NDMP service must be enabled on the SVM.
After the feature is enabled, you can back up and restore all volumes that are hosted across all nodes in the
SVM. An NDMP control connection can be established on different LIF types. An NDMP control connection
can be established on any data or intercluster LIF that is owned by an SVM that is enabled for NDMP and
that owns the target volume. If a volume and tape device share the same affinity, and if the data management
application supports the CAB extensions, then the backup application can perform a local backup or restore
operation. Therefore, you do not need to perform a three-way backup or restore operation.
6-27
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25
To Do This Action
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-28
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Try This
In your lab kit, log in to cluster 1.
Enter: vserver services ndmp version
Which NDMP version does the cluster support?
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
6-29
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
earlier?
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-30
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
To Do This Action
*Commands that are marked with an asterisk on this slide are available only at the advanced privilege level.
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-31
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
References
NetApp University course:
Clustered Data ONTAP 8.3 Administration
NetApp Documentation:
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Data Protection Tape Backup and
Recovery Guide
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
6-32
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
6-33
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Course Post-Test
Please take some time now to complete the course post-test.
Taking the same exam again measures how much you learned.
All scores will remain private.
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE POST-TEST
6-34
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University
NetApp
Explore certification.
NetApp Support
Welcome to Knowledgebase
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Search the NetApp Knowledgebase to leverage the accumulated knowledge of NetApp users and product
experts.
https://kb.netapp.com/support/index?page=home
6-36
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Appendix A
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Module Objectives
After this module, you should be able to:
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ESX Server
iSCSI
Linux Server
Windows Server
UNIX Server
Primary Systems
Running
Open Systems
SnapVault
FC
SnapVault
Secondary
Storage System
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Microsoft Windows
Red Hat Enterprise Linux
Novell SUSE Linux Enterprise Server
Sun Solaris
IBM AIX
HP HP-UX
VMware ESX Server
For a complete list of currently supported versions of these platforms, refer to the Open Systems SnapVault
2.6 Installation and Administration Guide on the NetApp Support site.
The Open Systems SnapVault agent software module is installed on the primary storage system. The agent
enables the system to back up its data to the secondary storage system.
The secondary system is a NetApp storage appliance, such as a NearStore storage system. The secondary
system uses Data ONTAP SnapVault technology to back up the data from the primary storage system.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Theory of Operation
The directory is the basic unit of Open Systems SnapVault backup.
An incremental update is based on file modification time. If blocklevel incremental (BLI) backup is enabled, only changed blocks are
transferred.
Creation of the Snapshot copy for archiving takes place on the
SnapVault secondary storage system.
Primary Systems
Windows
Server
SnapVault Secondary
Storage System
C:\data
/vol/vol1
qtree_data
UNIX
Server
qtree_usr
/usr
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THEORY OF OPERATION
Each directory, file, or drive that you want to back up from a primary system is backed up to its own qtree on
the SnapVault secondary storage system.
For the first backup, you perform an initial baseline transfer of the identified directory or file. This transfer
establishes the SnapVault relationship between the Open Systems SnapVault primary directory or file and its
mapped SnapVault secondary qtree.
You can initiate subsequent transfers manually, or you can configure transfers for automatic scheduled
updates. Using the Data ONTAP snapvault command, you specify the schedules on the secondary
system. You can also use an NDMP-based management application, such as Protection Manager or a thirdparty NDMP-based application that is supported.
When an incremental update request occurs, the Open Systems SnapVault primary storage system determines
whether the directory or file changed since the last successful transfer. This determination is made by
examining the file modification time. If BLI is enabled (for Windows platforms only), Open Systems
SnapVault determines on which blocks data changed. Then, Open Systems SnapVault sends only those
modified blocks to the secondary system. After the secondary qtree is updated, SnapVault creates a Snapshot
copy of the volume for archiving.
If a directory or file data needs to be restored to the primary system, SnapVault retrieves the data from one
specified Snapshot copy and transfers the data back to the primary system that requests it.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Central Management
Use these NDMP-based applications to centrally manage Open
Systems SnapVault backup schedules, retention policies,
backup control, and monitoring:
NetApp OnCommand Unified Manager
BakBone NetVault
Syncsort Backup Express
CommVault Galaxy
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CENTRAL MANAGEMENT
Open Systems SnapVault can be managed from a variety of management applications. These applications use
the NDMP protocol and TCP port 10000 for communication between an Open Systems SnapVault client and
the storage systems, over a TCP/IP network. Backup schedules, retention policies, backup control, and
monitoring are centrally configured on applications such as NetApp SnapProtect management software,
NetApp OnCommand Unified Manager, or third-party management programs.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Disaster
Recovery
Site
SnapVault
Volume
SnapMirror
SnapVault
7
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
Open Systems
SnapVault Features
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MaxCPRestartWaitTime
Sets the maximum waiting time a Snapshot copy is retained after a
transfer failure; the default is 10 minutes
FailCPRestartOnNewSnapshot
If a Snapshot copy is not available during restart, the following occurs:
When set to FALSE, a new Snapshot copy is created, and the transfer
continues.
When set to TRUE, the transfer is aborted.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
10
Checkpoints are enabled at block levels inside files: This enhancement is useful when the dataset contains
large files (greater than 100 megabytes [MB]).
Checkpoints are allowed inside files: Therefore, you can restart the transfer even from the middle of a
file.
Checkpoint interval configuration is enabled: You can configure the checkpoint interval by editing the
snapvault.cfg file on the Open Systems SnapVault primary system.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
11
BLI backup determines exactly which blocks in the file are changed, then backs up only those blocks to
the SnapVault secondary system.
Checksum database files are stored in the internal database directory of Open Systems SnapVault. Each
Open Systems SnapVault relationship contains its own checksum file directory. Disk storage
requirements to maintain the computed checksum values on the primary storage system are expected to be
approximately 2% of the baseline backup size.
Name-based applications, such as Microsoft Word, Excel, and PowerPoint, modify files by inserting new
data blocks in the file and rewriting all subsequent data blocks in the file to new positions in the file.
Because the modified file is considered new, a backup of all the rewritten blocks and a recalculation of
checksum are required.
Open Systems SnapVault agents work around this issue by recognizing files by name and by the filesystem location. You can use the Open Systems SnapVault Configurator to disable BLI backups for
certain name-based applications.
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
12
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
File exclusion list entries consist of single-path elements. A file or directory is excluded if the file name
or any path element matches a file exclusion entry in the list. The file exclusion list is in the
install_dir/etc/file-exclude.txt file.
Path exclusion list entries consist of complete file system paths to either a directory or a file. The path
exclusion list is in the install_dir/etc/path-exclude.txt file.
Refer to the Open Systems SnapVault Installation and Administration Guide for details on supported
characters and wildcards for those file entries.
EFS-encrypted file restore requires the Open Systems SnapVault agent to create a temporary file. The file
must be equal to or greater than the size of the EFS-encrypted file that is being replaced.
13
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
14
BLI (default): Backs up the history file and its corresponding BLI checksum file
DB only: Backs up only the history file
NONE: Disables the automatic database backup
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
15
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Registry
COM+ Class Registration database
System files and settings, including the boot files
Certificate Services database
IIS Metadirectory
System files that are under Windows file protection
Performance counters
System state data on domain controllers (Active Directory and SYSVOL data)
You can add backups of Windows system state data to existing Open Systems SnapVault backup schedules.
Then you can use the backups to restore a system to an earlier state. You can also use an Open Systems
SnapVault system state data backup along with complete file system backups. These backups can be part of a
disaster recovery plan.
With Open Systems SnapVault support for Windows Event Log, you can maintain the records of all the
events that occur in the system. Such record keeping helps you troubleshoot problems or do capacity
planning.
You can use Open System SnapVault Configurator to enable or disable support for Windows Event Log.
Application, Security, and System event log backups are configurable options.
Incremental updates of Windows Event Log files are not supported. Every update does a full backup of event
logs.
16
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
17
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Restore Limitations
You cannot use the snapvault restore command to
restore files to a directory that is part of a SnapVault
relationship. To restore these files, do these steps:
1.Release the SnapVault backup relationship from the primary
system before you perform the restore to the same location.
2.Restore the files to a new location.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORE LIMITATIONS
Restoring to a directory that is part of a SnapVault relationship
If you attempt to use the snapvault restore command to restore files to a directory that is involved in a
SnapVault relationship, the attempt fails, and you see this message:
Invalid Qtree/Snapshot requested
Directory in wrong phase
Error performing restore. Check snapvault log.
The following information is logged in the SnapVault log files:
Invalid Qtree/Snapshot requested
Directory in wrong phase
To restore to such a directory, first release the SnapVault backup relationship. To release the relationship, use
the snapvault release command that is issued from the primary system:
snapvault release pathname sec_hostname:/vol/sec_vol/sec_qtree
Alternatively, you can restore the files to a new location on the primary system.
Restoring NTFS-compressed files and directories
Open Systems SnapVault does not restore the compressed attribute on a Windows file if both of these
conditions are true:
19
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Resynchronization
To resynchronize a broken relationship, use the snapvault
start r command. This command does not support
resynchronization of restored subdirectories and single files.
To resynchronize after you use snapvault restore,
perform these steps:
1.Select the Enable restart/resync on restore option on the
primary system before you perform the restore.
2.Use the snapvault start r command to resynchronize the
relationship.
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESYNCHRONIZATION
To be able to continue incremental backups, you must resynchronize the relationship when the Open Systems
SnapVault primary and secondary systems become unsynchronized.
An Open Systems SnapVault relationship can get out of sync in these cases:
When an older version of the Open Systems SnapVault database is restored to the Open Systems
SnapVault primary system
When data is restored by using the snapvault restore command
When the state of the destination qtree in an Open Systems SnapVault relationship is changed to readwritable (such an operation breaks the Open Systems SnapVault relationship)
Open Systems SnapVault resynchronization is supported from Data ONTAP 7.2 and Open Systems
SnapVault 2.2 and later releases.
Resynchronizing a broken relationship
To resynchronize a broken Open Systems SnapVault relationship, on the SnapVault secondary system, enter
this command:
Secondary> snapvault start -r -S
prim_hostname:dirpathsec_hostname:/vol/sec_vol/sec_qtree
NOTE: Open Systems SnapVault does not support resynchronizing restored subdirectories and single files.
20
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
Open Systems
SnapVault Deployment
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
22
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
On a Windows primary, the default installation path is the C:\Program Files directory. On UNIX systems, the
default installation location is the /usr directory. During the installation process, you are prompted to enter the
NDMP account to connect to the primary system. You are also prompted to enter the NDMP listening port
and the host name or IP address of the secondary system. At the end of the installation routine, the
svinstallcheck utility verifies successful installation and ensures that the services are running properly.
Unattended installation
23
Unattended installation enables you to install or upgrade Open Systems SnapVault software over a large
number of Open Systems platforms with minimal user intervention. To perform an unattended installation
of Open Systems SnapVault, an installation script and other supporting files are required.
A utility called svconfigpackager is available in the Open Systems SnapVault software. When you
run this utility on an Open Systems SnapVault primary system, the utility saves the current configuration
settings to a file. Also, this utility can create an installation script that performs unattended installations or
upgrades, in conjunction with the configuration settings file and other files.
Ensure that the TCP port 10000 (for central management using NDMP) and TCP port 10566
(QSMSERVER) are open before Open Systems SnapVault is installed. For NetApp Host Agent, HTTP
port 4092 and HTTPS port 4093 must be open as well.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
24
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Machine tab: Displays information about the version of Open Systems SnapVault agent software and
primary system machine information, such as the IP address and OS version
Service tab: Enables you to stop and start the Open Systems SnapVault services
General tab: Enables you to generate debugging files and to modify the default db, tmp, and trace
directory locations
Trace Level tab: Is used (with the General tab) to choose which process to take traces of and chooses the
trace level
SnapVault tab: Enables you to specify the SnapVault secondary hostname or IP address and to modify
important parameters such as the BLI level, Open File Manager (OFM), Volume Shadow Copy Service
(VSS), and NDMP parameters
Alternatively, you can use the svsetstanza utility from the primary system for configuration purposes
instead of using the Configurator. The svsetstanza command is located in the install_dir/util directory.
25
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
26
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Monitoring Transfers
Use the snapvault status command to monitor the transfer progress,
status, and lag.
C:\> snapvault status -l c:\data
Source:
W2K3-Client:c:\data
Destination:
system:/vol/vol1/backup-windows
Status:
Transferring
State:
Source
Lag:
Mirror Timestamp:
Base Snapshot:
Current Transfer Type:
Contents:
Last Transfer Type:
Last Transfer From:
Bytes transferred so far:
18 MB
Transfer Time Elapsed:
00:00:21
Total files to transfer:
12
Total files transferred:
7
Current File Size:
8323815
Current File Progress:
2097152
Current File Name:
c:\data\file1
Transfer Error ID:
Transfer Error Message:
-
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MONITORING TRANSFERS
Use the snapvault status command to verify these things:
If the -l option is given, the output displays more detailed information. The information includes these
things:
For details on the snapvault status command output and options, refer to the Data ONTAP Data
Protection Online Backup and Recovery Guide.
27
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
destinations
help
release
restore
status
service
diag
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
Use the status command to monitor the status of an Open Systems SnapVault backup or restore.
Issue the destinations command to list all the known destinations for this Open Systems SnapVault
primary system.
The abort command enables you to stop a restore transfer from the secondary to the primary system.
The release command enables you to release relationships that are stopped on the secondary system.
If data loss or corruption occurs on the primary system, use the restore command to restore the
affected file, directory, drive, or even the entire system.
Use the service command to manage the Open Systems SnapVault service.
Issue the diag command to display details of a given error number.
NOTE: The service and diag commands are specific to Open Systems SnapVault primary systems.
28
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Log Files
Open Systems SnapVault primary log files:
Windows primary system:
install_dir\netapp\snapvault\etc
UNIX-based primary system:
/usr/snapvault
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOG FILES
You can find the operational status and problem reports of the Open Systems SnapVault primary system in
the log file named snapvault.
On the Open Systems SnapVault primary, these log files are found:
On a Windows primary system, log files are in the C:\Program Files\netapp\snapvault\etc directory.
On a UNIX-based primary system,log files are in the /usr/snapvault directory.
A new file is created daily at midnight or as soon after midnight as the first subsequent activity on the system
takes place. The existing file is not archived until a new file is created.
The current file has no extension. The archived files use the .yyyymmdd extension, where yyyy is the year, mm
is the month, and dd is the date when the file was created.
The log file is created during the initial baseline transfer, not by the install process. Therefore, if you search
for the log file after you complete the installation, but before you back up data for the first time, you do not
find the log file.
29
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
30
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Considerations
Open Systems SnapVault does not back up NFS mount points
and CIFS shares.
Open Systems SnapVault built-in databases require free space.
Use the Free Space Estimator utility.
OFM requires at least 15% disk space in the drive that is being
backed up.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONSIDERATIONS
Open Systems SnapVault does not back up remote NFS or CIFS file systems that are mounted on or mapped
to UNIX or Windows primary systems.
The Open Systems SnapVault database space requirements depend on several things:
Use the Free Space Estimator utility to ensure that there is sufficient space on the Open Systems SnapVault
install drive to perform an incremental update. If OFM (Windows 2000 Server) is used, the file systems that
are being backed up must contain at least 15% of free disk space in the drive that is being backed up. If free
space is not available, disable OFM for those drives.
Open Systems SnapVault supports a maximum of 16 simultaneous transfers from a primary system. Plan your
backup schedules to ensure that 16 or fewer transfers occur at the same time.
When you use Open Systems SnapVault, some overhead is always transferred for the files in the Open
Systems SnapVault relationship that were modified. The Open Systems SnapVault primary system sends one
4-kilobyte (KB) header for every file and directory that exist in the relationship. In addition, for files and
directories that are larger than 2 MB, an additional 4-KB header is transferred for every 2 MB.
A large number of small files can degrade performance. A large number of files can result in a large amount
of overhead data. If a large number of files is not likely to be modified, consider changing the BLI level to
LOW.
Open Systems SnapVault is not integrated with any database backup APIs. The database files need to be
dismounted before you use Open Systems SnapVault to back up the files. To use the hot backup mode
method, users need to script the procedure and test the script to ensure that the procedure works reliably in
their environment.
31
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Error Messages
Collect error messages that are logged on the Open Systems
SnapVault primary and the SnapVault secondary:
snapvault status l
/etc/log/snapmirror
C:\Install_dir\snapvault\etc (Windows example)
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ERROR MESSAGES
To diagnose and troubleshoot Open Systems SnapVault issues, collect and analyze the error messages that are
logged on these systems:
On the Open Systems SnapVault primary CLI, use the snapvaultdiag <err_num> command to display
details for a snapvault status l given error code. The error code number is displayed in the
command output.
Example:
$ snapvaultdiag 3016
Type: Error
Message: A network error has occurred.
Possible cause: The network socket was closed unexpectedly or the
transfer was aborted by the user.
Possible action to take: Verify network connectivity between the Open
Systems SnapVault primary system and the secondary storage system.
Error codes ranges:
Not all values in the range are used. A complete list of error codes, strings, causes, and actions is available in
the Open Systems SnapVault Installation and Administration Guide.
32
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data Collection
Open Systems SnapVault INFO tool:
Collects a complete set of information, command outputs, and
(optionally) ChangeLog and trace files
Is packaged with the Open Systems SnapVault agent:
OSSVINFO.exe for W2K and W2K3
OSSVINFO.pl for Linux-based and UNIX-based systems
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA COLLECTION
When you contact the NetApp Support site, use either of two methods to provide information:
The Open Systems SnapVault INFO tool is packaged with Open Systems SnapVault, and two versions are
available:
Open Systems SnapVault INFO.exe for Windows 2000 Server and Windows Server 2003 Open Systems
SnapVault primary systems
Open Systems SnapVault INFO.pl for Linux-based and UNIX-based Open Systems SnapVault primary
systems
The Open Systems SnapVault INFO tool writes the data to the output directory as a text file in a specific
format. Also, the tool collects the ChangeLog and trace files to this output directory if either the -q (for
Windows) or -all (for all platforms) option is given, as illustrated in this example:
Open Systems SnapVaultINFO.exe [ -s secondary ] [ -l username:password]
[-q qtreeid][-all] Output_Dir
The ChangeLog file captures duplicate inode issues and metadata corruption at run time. The ChangeLog
capture is enabled by default in the snapvault.cfg file.
NetApp technical support might ask you to enable Open Systems SnapVault debugging to troubleshoot the
issue. The traces that are collected are automatically compressed into a .bin extension file.
When you generate debug files, complete these actions:
33
Disable the generation of these files after you send a batch to technical support.
To minimize the impact on performance, delete the debug files from the system after you send the files to
technical support.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
You ship the portable device to the location of the SnapVault secondary system.
Next, you move the data from the portable device to the secondary system.
After the relationship between the primary and secondary systems is established and modified,
incremental transfers can occur directly.
You can also use LREP to restore data from the secondary storage system to the primary system.
lrep_reader: used at the remote office to write data from the Open Systems SnapVault primary system to
the portable device
lrep_writer: used at the location of the SnapVault secondary storage system to write data from the
portable device to the secondary storage system
Using a zlib library, LREP enables the compression of data. Compression of LREP data is done in the
memory, before the data is written to the disk.
The Advanced Encryption Standard algorithm is used to encrypt and decrypt the LREP data.
LREP 2.0 is packaged with Open Systems SnapVault 2.5 and later. You can also download the LREP tool
from the NetApp Support site. You run the tool on Windows 2000/2003, Linux-based, and UNIX-based
platforms.
For details on how to use LREP to back up and restore Open Systems SnapVault data, refer to the Logical
Replication (LREP) Tool 2.0 User Guide on the NetApp Support site.
34
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Remote Office
1
lrep_reader
lrep_writer
6
Low-Bandwidth
FAS1
Connection
qtree1
qtree1
qtree1
qtree1
33
FAS2
SnapVault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
35
Windows 2000, Windows Server 2003, and Windows Storage Server 2003 on x86 and x86-64/EM64T
platforms
Red Hat Enterprise Linux 4.0 for x86 and x86-64/EM64T
Red Hat Enterprise Linux 5.0 for x86 and x86-64/EM64T
SUSE Linux Enterprise Server 9 for x86 and x86-64/EM64T
SUSE Linux Enterprise Server 10 for x86 and x86-64/EM64T
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
References
Open Systems SnapVault Installation and Administration
Guide
Open Systems SnapVault Release Notes
Enabling Rapid Recovery with SnapVault
http://media.netapp.com/documents/tr-3252.pdf
Open Systems SnapVault Best Practices Guide
http://media.netapp.com/documents/tr-3466.pdf
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
For more information, see the NetApp Support site.
37
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you should be able
to:
Describe how Open Systems SnapVault integrates with Data
ONTAP SnapVault
Describe Open Systems SnapVault advanced features
Configure and administer Open Systems SnapVault
Perform Open Systems SnapVault backup and restore
operations
Troubleshoot and resolve Open Systems SnapVault transfer
failures
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE SUMMARY
38
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THANK YOU
39
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.