Data ONTAP Data
Protection Administration
NETAPP UNIVERSITY
Data ONTAP Data
Protection Administration
Student Guide
Course ID: STRSW-ILT-DATAPROT-REV06
Catalog Number: STRSW-ILT-DATAPROT-REV06-SG
Content Version: 1.0
NetApp University - Do Not Distribute
ATTENTION
The information contained in this course is intended only for training. This course contains information and activities that,
while beneficial for the purposes of training in a closed, non-production environment, can result in downtime or other
severe consequences in a production environment. This course material is not a technical reference and should not,
under any circumstances, be used in production environments. To obtain reference materials, refer to the NetApp product
documentation that is located at http://now.netapp.com/.
COPYRIGHT
2015 NetApp, Inc. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice.
No part of this document covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or
mechanical, including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written
permission of NetApp, Inc.
U.S. GOVERNMENT RIGHTS
Commercial Computer Software. Government users are subject to the NetApp, Inc. standard license agreement and
applicable provisions of the FAR and its supplements.
TRADEMARK INFORMATION
NetApp, the NetApp logo, Go Further, Faster, ASUP, AutoSupport, Campaign Express, Customer Fitness, CyberSnap,
Data ONTAP, DataFort, FilerView, Fitness, Flash Accel, Flash Cache, Flash Pool, FlashRay, FlexCache, FlexClone,
FlexPod, FlexScale, FlexShare, FlexVol, GetSuccessful, LockVault, Manage ONTAP, Mars, MetroCluster, MultiStore,
OnCommand, ONTAP, ONTAPI, RAID DP, SANtricity, SecureShare, Simplicity, Simulate ONTAP, Snap Creator,
SnapCopy, SnapDrive, SnapIntegrator, SnapLock, SnapManager, SnapMirror, SnapMover, SnapProtect, SnapRestore,
Snapshot, SnapValidator, SnapVault, StorageGRID, Tech OnTap, and WAFL are trademarks or registered trademarks of
NetApp, Inc. in the United States and/or other countries.
Other product and service names might be trademarks of NetApp or other companies. A current list of NetApp trademarks
is available on the Web at http://www.netapp.com/us/legal/netapptmlist.aspx.
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
TABLE OF CONTENTS
WELCOME .......................................................................................................................................................... 1
MODULE 1: DATA PROTECTION TECHNOLOGIES .................................................................................... 1-1
MODULE 2: DATA PROTECTION WITH NETAPP SNAPSHOT COPIES .................................................... 2-1
MODULE 3: NETAPP REPLICATION TECHNOLOGIES .............................................................................. 3-1
MODULE 4: USING SNAPMIRROR FOR DATA PROTECTION ................................................................... 4-1
MODULE 5: SNAPVAULT BACKUP AND RECOVERY ................................................................................ 5-1
MODULE 6: DATA PROTECTION USING NDMP.......................................................................................... 6-1
APPENDIX A: OPEN SYSTEMS SNAPVAULT ............................................................................................. A-1
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data ONTAP Data
Protection Administration
Course ID: STRSW-ILT-DATAPROT-REV06
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA ONTAP DATA PROTECTION ADMINISTRATION
Course ID: STRSW-ILT-DATAPROT-REV06
Content Version: 1.0
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Logistics
The Class
Resources
Schedule
Materials
Structure
Support
Activities
Participation rules
WebEx (in Some Classes)
Collaboration tools
Participants panel
Breakout sessions
Participation rules
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOGISTICS
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Learn Together
Participant
Video
Learn
Share
Participate
Files
3
Whiteboard
Polling
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LEARN TOGETHER
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Chat
Data ONTAP Learning Path
This two-day course examines clustered Data ONTAP 8.3 Data Protection features
through lectures and hands-on exercises.
Fundamental Courses
Intermediate Courses
Advanced Categories
Clustered Data ONTAP
Administration
Data ONTAP
NFS Administration
Performance
Clustered Data ONTAP
Installation Workshop
Data ONTAP
SMB (CIFS) Administration
Troubleshooting
Data ONTAP
SAN Implementation
Management
Software
Data ONTAP
Protection Administration
Enterprise
Applications
You are here.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA ONTAP LEARNING PATH
Following the Clustered Data ONTAP Administration course (and the Installation Workshop, if required),
intermediate courses can be taken to further understand and support protocols, data protection, performance,
troubleshooting, management software, and enterprise applications.
Intermediate courses can be taken to match a particular role, as needed.
Advanced categories should be taken only after taking all the intermediate courses.
NOTE: The advanced categories typically contain one or more courses. Refer to the NetApp University
learning maps for more details.
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Course Objectives
By the end of this course, you should be able to:
Describe NetApp protection technology and the NetApp
integrated data protection solutions that are supported in
clustered Data ONTAP 8.3
Manage local Snapshot copies
Manage clustered Data ONTAP 8.3 SnapMirror replication
Manage SnapVault replication operations
Manage NDMP protocol configuration
Use the OnCommand System Manager protection and
provisioning capability to set up and manage backup and restore
operations
5
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE OBJECTIVES
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Course Agenda: Day 1
Morning
Welcome and Introductions
Module 1: Data Protection Technologies
Module 2: Data Protection with NetApp Snapshot Copies
Afternoon
Module 3: NetApp Replication Technologies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE AGENDA: DAY 1
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Course Agenda: Day 2
Morning
Module 4: Using SnapMirror for Data Protection
Afternoon
Module 5: SnapVault Backup and Recovery
Module 6: Data Protection Using NDMP
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE AGENDA: DAY 2
10
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Additional Materials
The following materials are for your reference only:
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ADDITIONAL MATERIALS
These materials are included for reference and can be read as homework. If you have questions, please discuss
these with your instructor.
11
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken, Your Guide to this Course
Ken is a professional who does the following:
Maintains and provisions storage
Responds to requests and issues
Follows best practices
Ken is a thoughtful person who asks
not only how but also why.
Hes a troubleshooter who solves storage
problems.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN, YOUR GUIDE TO THIS COURSE
12
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Your Exercise Environment
Classroom,
Desktop, or
Your Laptop
Windows Server
2012 R2
CentOS
6.5
Remote
Desktop
Clustered Data ONTAP 8.3:
A One-Node Cluster and a Two-Node Cluster
Location
Username
Windows
Administrator
CentOS
root
Clustered Data ONTAP
admin
(case-sensitive)
Password for all: Netapp123
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
YOUR EXERCISE ENVIRONMENT
13
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Try This
Start your session:
1. Log in to your Windows machine.
2. From the desktop, open PuTTY.
3. Select the cluster1 or
cluster2 cluster-mgmt PuTTY session.
4. Click OK.
5. Enter the following
credentials:
Username: admin
Password: Netapp123
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
Throughout this course, pauses enable you to experience the feature that is being discussed in the lecture. Feel
free to participate if desired.
14
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NetApp University Information Sources
NetApp Support Site
http://support.netapp.com/
NetApp University
http://www.netapp.com/us/servicessupport/university/index.aspx
NetApp University
Support
http://netappusupport.custhelp.com
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETAPP UNIVERSITY INFORMATION SOURCES
15
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Course Pre-Test
Please take some time now to complete the course pre-test.
At the completion of the course, you will take the same exam
again to measure how much you have learned.
All scores will remain private.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE PRE-TEST
16
Data ONTAP Data Protection Administration: Welcome
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module 1
Data Protection Technologies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE 1: DATA PROTECTION TECHNOLOGIES
1-1
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module Objectives
After this module, you should be able to:
Describe the clustered Data ONTAP 8.3 data protection
technologies that are based on Snapshot technology
Describe NetApp and third-party technologies that manage
data protection activities
Describe the role of MetroCluster software for data protection
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
1-2
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 1
Data Protection
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 1: DATA PROTECTION
1-3
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data Loss Disaster
Increasing Probability
Increasing Downtime
Failures and Disasters
Operational
Failures
Application
Failures
Component
Failures
Site, Data
Center, and
Power
Failures
Regional
Disasters
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA LOSS DISASTER
A data loss disaster is a situation in which service from one physical site on a network (for example, a
building or a corporate campus) is lost for an extended period of time.
Data loss disasters occur for various reasons:
Fire
Earthquake
Hurricane
Blizzard
Prolonged power outage
Prolonged loss of connectivity from clients to the storage system
A disaster can affect all components of a computing infrastructure:
Storage systems
Application servers
Networking connectivity
Client connectivity
Disaster recovery is becoming more significant for these reasons:
1-4
Companies are more dependent on data.
Companies need to access data more quickly.
Computing architectures are using IT as a service (ITaaS) models more frequently.
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Many companies need a highly available 24x7 operation that includes disaster recovery capabilities. The
amount of protection that these companies need varies for different locations:
1-5
Data centers
Campuses
Regions
Combined data centers, campuses, and regions
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Traditional Data Protection
Costly:
Requires purchase of multiple specialized devices
Backup
Servers
Backup
Storage
Backup
Agent
Requires multiple products to scale as data grows
Complex:
Requires time-consuming deployments
Disaster Recovery
Storage
Requires multiple silos of management
Uses multiple vendors and support contracts
Archive
Servers
Compliance
Storage
$$$$
$$$$
$$$$
Personnel and Expenses
5
Limited flexibility:
Is restrictive (cannot use systems for multiple
purposes)
Is difficult to use with virtual servers
Is not suited to the on-demand, multi-tenancy needs
of ITaaS and the cloud
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRADITIONAL DATA PROTECTION
Characteristics of a traditional data protection solution can include the following:
Requires multiple hardware and software products
Increases cost and complexity
Is implemented on a system-by-system basis
Adds products to the existing infrastructure as needed
Dedicates a layer of servers, storage, and software to high-availability (HA) disaster recovery
Creates backup, archival, and compliance processes
Creates silos (in many cases), because each component is dedicated to one task (such as backup or
archiving)
Does not share resources, which leads to the following:
Costs increase.
Management overhead becomes more complex.
Management becomes more time-consuming.
Risk of data loss increases.
Traditional data protection has the following limitations:
Does not extend well to virtualization or cloud
Might work with physical servers but creates challenges for shared architectures
Example: Traditional backup that is deployed on virtual servers has the following characteristics:
1-6
Affects production performance
Increases the complexity of restore processes
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Example: ITaaS or cloud environments have the following characteristics:
1-7
Requires integration of data protection into the infrastructure
Increases costs (to add products to the user environment)
Increases provisioning time
Loses the advantages of virtualized desktop environments
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data Protection Requirements
Fast recovery after file deletions, application interruptions,
data corruption, and viruses
Creation of data archives
Fast disaster recovery for data files, for physical and
virtualized servers, and for private, public, and hybrid data
centers (such as ITaaS)
Data protection for compliance regulation purposes
Customer recovery time objective (RTO)
Customer recovery point objective (RPO)
6
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA PROTECTION REQUIREMENTS
Data protection encompasses backup and recovery processes. You protect data by creating copies of the data
so that it can be restored, even if the original data is not available.
Reasons that businesses need data protection include the following:
To recover files that are lost due to accidental deletion, application interruptions, data corruption, and
viruses
To archive data for future use
To minimize backup and recovery windows
To enable fast recovery from natural and human-caused disasters
To quickly recover data that is stored in private, public, and hybrid data centers that are in an ITaaS
environment
To satisfy compliance regulations
To satisfy the RTO and RPO
Recovery Time Objective (RTO)
The recovery time objective (RTO) is the amount of time within which a service, data, or process must be
made available again to avoid undesirable outcomes.
Recovery Point Objective (RPO)
The recovery point objective (RPO) is a point to which data must be restored or recovered in order to comply
with an organizations acceptable data loss policy.
The Data ONTAP operating system offers features and methods that protect data from accidental, malicious,
and disaster-induced loss.
1-8
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NetApp Integrated Data Protection
Integrates applications, workflows, and storage architectures
within a protection recovery continuum
Enables you to automate protection by policy
Provides built-in storage efficiency
Ensures flexibility to quickly recover and
repurpose data
Provides solid reliability
Enables scalability
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETAPP INTEGRATED DATA PROTECTION
NetApp technologies work together to provide integrated data protection.
NetApp replication technologies are integrated with partner monitoring and management tools:
Simplify operations
Consolidate management
Use partner tools that catalog Snapshot, remote, and tape copies of the data
Facilitate long-term retention
Simplify offline retention and e-discovery
NetApp integrated data protection does the following:
1-9
Enables you to automate protection by using policies
Provides built-in efficiency from the Data OTNAP operating system
Is flexible, reliable, and scalable
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data Protection Features
Clustered Data ONTAP 8.3
The clustered Data ONTAP 8.3 operating system introduces
these features:
Support for network compression for SnapMirror and
SnapVault technology
Support for more cluster peers
Support for version-flexible replication
Support for cluster peer authentication
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA PROTECTION FEATURES: CLUSTERED DATA ONTAP 8.3
Each of these features is discussed in this course.
1-10
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
Is there a way I can instantly clone a
volume for data protection or testing
purposes?
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
1-11
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
FlexClone Volumes for Disaster Recovery
Clustered Data ONTAP 8.3
FlexClone volumes that are used for data protection planning
have the following characteristics:
Are writeable Snapshot copies of a volume
Replicate volumes instantly and without consuming disk
space
Test mirror and backup operations without breaking the
relationship between the source volume and the destination
volume
Create production copies of volumes at the disaster recovery
site
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FLEXCLONE VOLUMES FOR DISASTER RECOVERY: CLUSTERED DATA ONTAP 8.3
With FlexClone software, disk utilization of a volume clone increases only as you add or modify data on the
volume clone.
1-12
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Tape Backup
Clustered Data ONTAP 8.3
Data ONTAP supports full and incremental tape backup and
restore through NDMP.
Data ONTAP uses supported NDMP applications to implement
dump features.
Use the data management application commands to restore
Snapshot copies that are backed up to tape.
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TAPE BACKUP: CLUSTERED DATA ONTAP 8.3
NDMP does the following:
Enables you to back up storage systems directly to tape
Uses network bandwidth efficiently
Clustered Data ONTAP 8.3 does not use dump or restore commands. Backup administrators use the NDMP
features that are available with the data management application.
You can find a list of supported tape devices here:
http://www.netapp.com/us/solutions/a-z/data-protection-devices.aspx
You can find a list of NDMP applications that are certified with the Data ONTAP operating system here:
http://www.netapp.com/us/solutions/a-z/backup-to-tape/backup-to-tape-ndmp.aspx
1-13
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Clustered Data ONTAP Integrated Data
Protection
Cluster A
Cluster B
Centralized
Management
Intercluster Data
Protection
SnapMirror
Deduplicated, Compressed Volume
Enhanced data protection that augments cluster value:
Feature additions for clustered Data ONTAP 8.3:
Preservation of data protection through volume move
Volume-level mirroring across clusters
Management by System Manager
Preservation of storage efficiency over the network and on
the destination
Application-aware and virtualization-aware protection
NDMP-based tape backups
Intracluster mirroring for load sharing
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTERED DATA ONTAP INTEGRATED DATA PROTECTION
Clustered Data ONTAP 8.3 supports nondisruptive volume moves to preserve data protection. This function
is managed by OnCommand System Manager.
1-14
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 2
NetApp Management
Technologies
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: NETAPP MANAGEMENT TECHNOLOGIES
1-15
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NetApp Protection Software Tools
Snapshot copies
SnapRestore data recovery software
SnapVault backup solution
SnapMirror software
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETAPP PROTECTION SOFTWARE TOOLS
Data ONTAP provides tools that enable you to back up, replicate, and restore data. These tools ensure that
you can recover your data if a disaster strikes at the primary data storage site.
Snapshot copies do the following:
Create, schedule, and maintain multiple backups of data on the primary storage volume
Quickly and easily restore data that is accidentally modified or deleted
Create clones of FlexVol volumes
A SnapRestore license is required to perform fast Snapshot recovery from Snapshot copies.
The SnapVault backup solution does the following:
Efficiently retains backup copies
Backs up data
Configures data retention policies that meet SLAs
SnapMirror relationships do the following:
Replicate data from one FlexVol volume to another within the same cluster or a different cluster
Retain those Snapshot copies
Use the destination volume for efficient and fast restoration of data after a disaster
The OnCommand management suite of tools falls outside the scope of this course. NetApp University offers
courses that enable you to use the following tools:
1-16
OnCommand System Manager
OnCommand Unified Manager
OnCommand Performance Manager
OnCommand Workflow Automation
OnCommand Insight
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NetApp Management Technologies
NetApp Management Interfaces
Interface
What You Can Do
CLI
Issue commands to configure data protection for one storage system at
a time.
Use scripts to automate data protection.
OnCommand
Unified Manager
Create policy-based SnapVault, Open Systems SnapVault, and
SnapMirror relationships that can run backup scripts.
Manage data protection globally.
Group storage systems into resource groups to control availability,
capacity, and storage efficiency.
Use vFiler migration technology.
OnCommand
Manage functions through an easy-to-use graphical interface.
System Manager Manage all Data ONTAP features, including storage efficiency, security,
high availability, and replication.
Use a web-based tool that provides dashboards, graphical reports, and
automated workflows.
Manage multiple storage systems.
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETAPP MANAGEMENT TECHNOLOGIES: NETAPP MANAGEMENT INTERFACES
Data ONTAP CLI
Use a Telnet or Secure Shell (SSH) client to connect to the storage system CLI.
If the storage system is not online, use a terminal server to connect to the command line through the console.
NetApp OnCommand Unified Manager
From a central console, you can monitor and manage these storage features:
Alerts
Reports
Performance
Configuration tools
With OnCommand Unified Manager, you can also do the following:
Simplify data protection tasks
Apply user-defined policies to select resources for each provisioning activity
Migrate vFiler units from one storage system to another system
Apply policies that automate these operations:
1-17
Snapshot operations
SnapMirror operations
SnapVault operations
Open Systems SnapVault operations
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NetApp OnCommand System Manager
NetApp OnCommand System Manager enables you to do the following:
Set up and manage NetApp storage systems from this Windows-based tool
Create aggregates, volumes, and Snapshot copies
Manage shares and exports, network settings, and other configurations
You cannot use versions 1.0 or 1.1 of NetApp System Manager to configure SnapMirror, SnapVault, or Open
Systems SnapVault software.
1-18
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NetApp Protection Software Interfaces
NetApp Software Interfaces
Interface
What You Can Do
SnapDrive for
Windows and
SnapDrive for UNIX
Automate storage provisioning tasks.
Simplify the creation of error-free, host-consistent Snapshot
copies of data.
SnapManager
products for
application-aware data
protection
Use these products:
SnapManager for Microsoft Exchange Server
SnapManager for Oracle
SnapManager for Virtual Infrastructure
SnapManager for Hyper-V
SnapManager for Microsoft SQL Server
SnapManager for Microsoft Office SharePoint Server
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETAPP PROTECTION SOFTWARE INTERFACES: NETAPP SOFTWARE
INTERFACES
SnapDrive for Windows and SnapDrive for UNIX enable you to do the following:
Automate storage provisioning tasks
Simplify the creation of error-free, host-consistent Snapshot copies of data
Use these SnapManager products to protect application servers:
1-19
SnapManager for Microsoft Exchange Server
SnapManager for Oracle
SnapManager for Virtual Infrastructure
SnapManager for Hyper-V
SnapManager for Microsoft SQL Server
SnapManager for Microsoft Office SharePoint Server
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 3
Additional Storage
Technologies
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 3: ADDITIONAL STORAGE TECHNOLOGIES
1-20
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
The SnapProtect Solution
Disk to Disk to Tape Backup Management
The SnapProtect solution provides the following functionalities:
Indexed, centrally managed, end-to-end, disk-to-disk
replication to Data ONTAP storage and to archival-to-tape
libraries
Application-consistent Snapshot copies for these applications
and application data:
Oracle, SAP, and other database servers
VMware ESX and Microsoft Hyper-V virtual machines
Other application data that is stored on Data ONTAP LUNs (SAN)
and NAS volumes.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THE SNAPPROTECT SOLUTION: DISK TO DISK TO TAPE BACKUP MANAGEMENT
Data centers are composed of many types of application servers. These application servers require protection.
The SnapProtect solution is an application-specific data protection management solution that provides
indexed, centrally managed, end-to-end, disk-to-disk replication to Data ONTAP storage and to archival-totape libraries.
SnapProtect software interoperates with application servers to create application-consistent Snapshot copies
of application server data that is stored on Data ONTAP primary storage systems. Application servers that are
supported by the SnapProtect solution include Oracle, SAP, and other database servers; VMware ESX and
Microsoft Hyper-V virtual machines; and other application data that is stored on Data ONTAP LUNs (SAN)
and NAS volumes.
For non-NetApp primary storage, a feature in SnapProtect 10, Open Systems SnapVault, provides replication
from non-NetApp storage to SnapVault secondary volumes on Data ONTAP operating in 7-Mode. You can
use Open Systems SnapVault to back up a local file system that is located on Windows, Linux, and Solaris
DAS and non-NetApp storage to Data ONTAP 7-Mode storage systems.
The SnapProtect solution interoperates with OnCommand Unified Manager to create SnapMirror replication
and SnapVault replication. Different versions of OnCommand Unified Manager support Data ONTAP. Data
ONTAP operating in 7-Mode requires OnCommand Unified Manager 5.2; clustered Data ONTAP requires
OnCommand Unified Manager 6.0.
The SnapProtect solution enables you to restore file and LUN data from Snapshot copies, SnapVault replicas,
or tape archives. To hasten search and recovery operations, SnapProtect software catalogs all backup copies,
including local Snapshot copies, SnapMirror and SnapVault copies, and tape backup copies.
1-21
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Symantec NetBackup Topology
The NetApp Plug-In for Symantec
Symantec and Data ONTAP are integrated for backups with the
following procedure:
1. Install the NetApp Plug-in for Symantec and the NetApp
OnCommand Core Package on the same host.
2. Configure the plug-in and the OnCommand Unified Manager
server to the same storage system.
The OnCommand Unified Manager server creates primary
Snapshot copies on the primary NetApp storage system.
The copies are replicated to the secondary storage system by
using a SnapMirror, SnapVault, or tape replication process.
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SYMANTEC NETBACKUP TOPOLOGY: THE NETAPP PLUG-IN FOR SYMANTEC
In the replication director environment, you install plug-ins on the system that hosts the storage server:
1. Install the NetApp Plug-in for Symantec and the NetApp OnCommand Core Package on the same host.
2. Configure the plug-in and the OnCommand Unified Manager server to the same storage system.
The OnCommand Unified Manager server creates primary Snapshot copies on the primary NetApp storage
system. The copies are replicated to the secondary storage system by using a SnapMirror or SnapVault
process. The copies can also be replicated to tape or to a tertiary storage system.
For data restore operations, NetBackup manages the transfer of data from the storage system to the client.
1-22
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 4
MetroCluster and Data
Protection
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: METROCLUSTER AND DATA PROTECTION
1-23
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
I have an application that requires zero
downtime. What can I do?
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
1-24
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
Continuous Availability for Mission-Critical Applications
MetroCluster software provides the
following:
Zero data loss
Zero application downtime
Up to 200
kilometers (km)
Set-it-once simplicity
Zero change management
Seamless integration with
storage efficiency, backup,
disaster recovery, nondisruptive
operations (NDO), and nonfabric-attached storage
22
MetroCluster
Multiple Recovery Points
with Snapshot Copies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: CONTINUOUS AVAILABILITY FOR
MISSION-CRITICAL APPLICATIONS
MetroCluster high-availability and disaster recovery software addresses the need to provide continuous data
availability beyond the data center (or beyond the cluster), and it does so natively in Data ONTAP.
MetroCluster software provides the following:
Zero data loss so that you never lose a transaction
Zero planned and unplanned downtime, whether downtime is caused by an IT event or by an external
event, such as a hurricane, flood, or loss of communications
Set-it-once simplicity, which requires no external devices or host-based configuration
Zero change management, so that after MetroCluster is set up, all changes on one side are automatically
replicated on the other side
Seamless integration with storage efficiency, backup (SnapVault), data recovery (SnapMirror), and
NDO and non-fabric-attached storage (via FlexArray storage virtualization software), all of which are
built into the Data ONTAP operating system
Support for both SAN and NAS, which are supported simultaneously by MetroCluster technology,
whereas most competitive solutions support only SAN protocols
Hypervisor and application integration, which integrates MetroCluster software with VMware vMSC,
Oracle RAC, SAP, and others (NetApp has certified configurations with VMware, SAP, and Cisco)
MetroCluster is an active-active solution, which means that all nodes in each cluster actively serve data to
applications. Data can be read from the primary and secondary clusters, which is a feature that can improve
read performance. MetroCluster is foundational for creating an active-active data center, similar to the Cisco
Virtualized Multisite Data Center.
1-25
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
Nondisruptive Operations Beyond the Data Center
The clustered Data ONTAP operating
system provides NDO within the data
center:
Ability to withstand component failures
Ability to perform maintenance operations without
disruption
Ability to perform a technology refresh without
disruption
Data Center A
Clustered Data ONTAP
Up to 200 km
Cluster A in
Data Center A
Cluster B in
Data Center B
MetroCluster technology enables
business continuity and continuous
availability beyond the data center.
MetroCluster
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: NONDISRUPTIVE OPERATIONS
BEYOND THE DATA CENTER
Why do you need MetroCluster software, if you have clustered Data ONTAP? Clustered Data ONTAP
already provides nondisruptive operations within the data center. The local HA capabilities of clustered Data
ONTAP enable your data center to withstand component failures and provide maintenance and upgrades
without disruption.
However, the MetroCluster solution enables business continuity and continuous availability beyond the data
center. MetroCluster technology protects your data from events that are beyond the control of the IT
organization, such as natural disasters (fires, floods, and hurricanes) and site-impacting failures (such as
network outages, power loss, and unrecoverable corruption). With MetroCluster technology, your
organization remains operational, because it can leverage the synchronously replicated copy at the secondary
site.
1-26
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
Failures
MetroCluster software protects
against
the following:
Site or Bldg A
Controller failure
Storage or rack failure
Up to 200 km
Site or Bldg B
24
Network failure
Local data center failure
Complete site failure
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: FAILURES
MetroCluster protects against events such as the following:
1-27
Controller failure, in which local HA failover is leveraged for nondisruptive operation
Storage or rack failure, which makes data inaccessible
Network failure, which makes a cluster or building inaccessible
Local data center failure; for example, when two data centers are located on one campus and one data
center is unavailable because of a power, cooling, or networking issue
Complete site failure; for example, a natural disaster that requires evacuation of the entire campus, city, or
country
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
MetroCluster Deployment Options
Across City or Metro Area
Across Floors, Buildings, or Campus
Within Data Center
MetroCluster: Dedicated FC up to 200 km
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: METROCLUSTER DEPLOYMENT
OPTIONS
MetroCluster software can address your continuous availability requirements, whether it is deployed inside a
data center; at different locations in a building or campus; or across city-wide or metro-wide deployments, up
to a maximum distance of 200 kilometers. This capability enables a level of availability that goes beyond the
HA features of a local cluster, which means that MetroCluster is a very versatile solution.
MetroCluster supports FAS arrays and non-FAS arrays that are virtualized with NetApp FlexArray software.
1-28
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
Data Protection with SnapMirror and SnapVault
Disaster Recovery Site
Up to 200 km
SnapMirror
Unlimited Distance
Backup and
Recovery Site
MetroCluster
SnapVault
Unlimited Distance
Multiple Recovery Points with
Snapshot copies
Local Data Center, Campus, or Metro Area
26
Unlimited Distance
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: DATA PROTECTION WITH
SNAPMIRROR AND SNAPVAULT
In combination with MetroCluster software, customers can take data protection a step further.
With MetroCluster software, customers can achieve continuous availability and protection from local data
center disasters. Customers can further enhance their disaster recovery protection with SnapMirror
technology, which enables them to asynchronously replicate data over any distance. Data then can be stored
on disks for faster recovery or can be backed up to tape for archiving or near-line storage. This capability is
sometimes referred to as three-way disaster recovery or zero data loss disaster recovery.
MetroCluster software can also be backed up remotely to disk and then tape by using SnapVault software.
This option provides an even lower-cost long-term archiving solution for data.
For a fully integrated business continuity solution with disaster recovery and backup, all three kinds of
software can be implemented. This option provides the range of data storage and protection options that are
needed to meet the most stringent enterprise demands.
1-29
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
Integration with SnapMirror and SnapVault
Up to 200 km
MetroCluster
Read/
Write
SnapMirror
SnapVault
Disaster Recovery Site
Read
Only
Read
Only
Backup and Recovery Site
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: INTEGRATION WITH SNAPMIRROR
AND SNAPVAULT
With MetroCluster software, SnapMirror and SnapVault relationships can be created by using the volumes in
the source plex as the primary volume.
You cannot create SnapMirror or SnapVault relationships with volumes in the MetroCluster destination plex.
1-30
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Elements of MetroCluster Data Protection
Two Data ONTAP clusters
synchronously replicate to
each other.
A MetroCluster disaster
recovery group consists of
one HA pair at each site (for
four nodes total).
Clients are served from all
nodes in normal operation.
28
Two Separate Data ONTAP Clusters
Site A
Active Nodes
Node A1
Site B
Active Nodes
Synchronous
Replication
Node B1
A
Local
HA
Node A2
Local
HA
Node B2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ELEMENTS OF METROCLUSTER DATA PROTECTION
MetroCluster software consists of two Data ONTAP clusters that synchronously replicate to each other. They
are two distinct clusters, not a single cluster that is separated by distance.
The minimum configuration for MetroCluster software is a disaster recovery partner that consists of one HA
pair at each site, for a total of four nodes (that is, controllers).
Each cluster is an active-active HA pair, so all nodes serve clients at all times.
1-31
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
MetroCluster Basic Architecture
Cluster A
Data Center A
Cluster Peering
Node A1
NVRAM
Mirroring
Cluster B
Data Center B
NVRAM Mirroring
NVRAM
Mirroring
ISL
Synchronous Mirroring
Node A2
Node B1
Node B2
200 km
Two two-node clusters are present, one on each site, which are separated by up to 200
km.
The clusters are connected through redundant fabrics.
NVRAM is mirrored to the local HA partner and disaster recovery partner on the remote
site, which share the same Inter-Switch Link (ISL) fabric as the storage replication.
Data is written to the primary copy and is synchronously replicated to the secondary copy
in the remote site.
A cluster peering interconnect mirrors cluster configurations.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: METROCLUSTER BASIC
ARCHITECTURE
Two separate two-node clusters are present, one on each site, which are separated by as much as 200
kilometers.
The clusters are connected through redundant fabrics.
NVRAM is mirrored to the local HA partner and the disaster recovery partner on the remote site, which share
the same ISL fabric as the storage replication.
Data is written to the primary copy and is synchronously replicated to the secondary copy in the remote site.
MetroCluster software works on an aggregate level. Each aggregate consists of two plexes, one that is local
and another that is remote. Writes are performed synchronously to both plexes, and reads are performed from
the local storage (by default). However, reads can be configured to read from both local and remote storage.
This configuration can be useful when the two clusters are so close together that latency is not an issue. This
configuration can increase read performance.
A cluster peering interconnect mirrors cluster configurations.
1-32
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
MetroCluster Replication Mechanism
Three replication streams are present between two HA pairs across sites.
FC requirements:
NVRAM is mirrored to the HA partner and disaster recovery partner.
All disk traffic is mirrored at the aggregate level.
A dedicated switch fabric and ISLs are required.
IP network requirements:
Cluster configuration is replicated via a peered network.
All cluster configuration information is mirrored to the remote site.
The existing, shared network infrastructure can be leveraged.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: METROCLUSTER REPLICATION
MECHANISM
Three replication streams are present between the HA pairs that make up a MetroCluster system.
NVRAM is a key component of all NetApp FAS systems. MetroCluster requires that all data that is written to
a controller is synchronously mirrored, not only to its own HA pair, but also to the remote HA pair. Also, the
data that is written to disk is mirrored at the aggregate level. Both of these functions require FC connectivity,
with a dedicated switch fabric and dedicated ISLs.
In addition, the cluster configuration is replicated over a shared IP network.
NOTE: The IP link to enable cluster peering is new for clustered Data ONTAP; it is not needed for Data
ONTAP operating in 7-Mode. This cluster peering is the same as the peering that is used between clusters for
SnapMirror and SnapVault technology.
1-33
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster and Data Protection
MetroCluster Failover Characteristics
Local failover and
failback
Simple, nondisruptive
switchover and
switchback:
One-command
switchover
Three-command
switchback
31
Switchover
or Switchback
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER AND DATA PROTECTION: METROCLUSTER FAILOVER
CHARACTERISTICS
Local HA failover typically handles most issues that face a data center, including tech refresh, component
failures, and Data ONTAP upgrades.
However, even when a switchover is required, the process is seamless with MetroCluster software. No
application or host scripting is required, and no action is required on the part of the host. Whether the
switchover is planned or unplanned, switchover requires only one command, and switchback requires only
three commands.
A planned switchover requires lower outage time for applications, because the MetroCluster systems at both
sites negotiate for a clean and fast switchover.
1-34
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster Failure Mode Comparison
Failure of Disks, Shelves, Switches, or Nodes
Failure Mode
Data ONTAP 8.3
Before Data ONTAP 8.3
One-disk or two-disk
failure
Data still available
Data still available
More than two disks fail
Data served on surviving plex,
with no impact on node
Data served on surviving plex,
with no impact on node
Shelf failure
Data served from surviving plex Data served from surviving plex
Switch failure
Data served through other path
Data served through other path
Switch ISL failure
Data available through local
node or cluster, disaster
recovery protection is offline; if
both ISLs are down, disaster
recovery protection is offline
Data available through local
node; if both ISLs are down,
disaster recovery protection is
offline
Node failure (such as
panic or power off)
Automatic failover to HA
partner at local cluster or site
Automatic switchover to remote
node
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER FAILURE MODE COMPARISON: FAILURE OF DISKS, SHELVES,
SWITCHES, OR NODES
1-35
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
MetroCluster Failure Mode Comparison
Failure of Cluster Links, Nodes, and Controllers
Failure Mode
Data ONTAP 8.3
Before Data ONTAP 8.3
Peered cluster link
failure
Data remains available from
local cluster; cluster
configuration changes are not
replicated, which can impact
future disaster recovery
Not applicable
Both nodes in HA group
fail
Data available after switchover
All data is offline
Complete failure of one
site
Automatic switchover with tiebreaker (otherwise, you need
Cluster Failover on Disaster
[CFOD])
Automatic switchover with tiebreaker (otherwise, you need
CFOD)
Controller failure after
switchover
Automatic failover to HA
partner at local cluster or site
All data is offline
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
METROCLUSTER FAILURE MODE COMPARISON: FAILURE OF CLUSTER LINKS,
NODES, AND CONTROLLERS
1-36
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
References
NetApp University courses:
Clustered Data ONTAP Administration
SnapMirror Planning and Implementation
SnapMirror Disaster Recovery
Installing and Configuring OnCommand Unified Management
Solution
Planning to Implement MetroCluster on Clustered Data ONTAP
Community:
http://communities.netapp.com/community/products_and_solutions/
netapp_integrated_data_protection
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
1-37
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
What Ken Learned in this Module
Im confident in my understanding of the
NetApp data protection products and how they
are built on Snapshot technology. Im
impressed with the integration of third-party
products for data protection. I learned how the
MetroCluster solution can offer zero downtime
for my applications.
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHAT KEN LEARNED IN THIS MODULE
1-38
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Exercise
Module 1: Data Protection
Technologies
Time Estimate: 30 Minutes
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
1-39
Data ONTAP Data Protection Administration: Data Protection Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module 2
Data Protection with NetApp
Snapshot Copies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE 2: DATA PROTECTION WITH NETAPP SNAPSHOT COPIES
2-1
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module Objectives
After this module, you should be able to:
Describe the Data ONTAP 8.3 Snapshot copy technology and
space reserve
Describe NetApp design criteria for deploying Snapshot copy
solutions
Create and manage Snapshot copies
Understand how users can access Snapshot copies
Recover data from Snapshot copies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
2-2
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 1
Data Protection with NetApp
Snapshot Copies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 1: DATA PROTECTION WITH NETAPP SNAPSHOT COPIES
2-3
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data Protection with NetApp Snapshot Copies
NetApp Snapshot Copies
A Snapshot copy is a read-only image of the active file
system at a point in time.
Snapshot technology provides these benefits:
Nearly instantaneous application data backups
Fast recovery of data that is lost
Snapshot technology is the foundation for these NetApp
technologies:
SnapManager
SnapMirror
SnapVault
SnapRestore
SnapDrive
FlexClone
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA PROTECTION WITH NETAPP SNAPSHOT COPIES: NETAPP SNAPSHOT
COPIES
Snapshot technology is a key element when you implement the WAFL (Write Anywhere File Layout) file
system:
A Snapshot copy is a read-only, space-efficient, point-in-time image of data in a volume or aggregate.
A Snapshot copy is only a picture of the file system, and it does not contain any data file content.
Snapshot copies are used for backup and error recovery.
The Data ONTAP operating system can be configured to automatically create and delete Snapshot copies of
data in volumes to support commands that are related to Snapshot technology.
2-4
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Volume Snapshot Functionality
Restore Through
Client
Snapshot Creation
Manually
Automatically
based on schedule
UNIX:
.snapshot directory
Windows:
~snapshot directory
Restore Through
SnapRestore
Entire volume or
individual file
restored
License required
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VOLUME SNAPSHOT FUNCTIONALITY
Snapshot functionality is controlled by management:
Provides the UI for manual Snapshot copies
Provides the Job Manager policies and schedules for automated Snapshot operations
You can associate a Snapshot policy with each volume.
A policy can include multiple schedules, so that Snapshot copies are created hourly, daily, weekly, and so
on.
A policy indicates how many of each type of Snapshot copy to retain before deleting older copies.
For example, you can keep four hourly Snapshot copies, and when the fifth copy is created, the oldest copy is
removed.
In this way, a continuously updated group of the previous four hourly Snapshot copies is retained.
Clients can see and use the .snapshot directories, so that users can restore their own data without administrator
intervention.
2-5
When an entire volume needs to be restored from a Snapshot copy, an administrator uses the volume
snapshot promote command.
This process is the same as using SnapRestore technology to restore the volume.
The entire Snapshot copy is promoted, which replaces the entire volume.
Individual files can also be restored.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data ONTAP Snapshot Copy
Production: Active File System
PROD
SNAP 1
SNAP 2
EE
FF
F
F
Prod
S1
SNAP 1
6
WRITE
WRITE
S2
SNAP 2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA ONTAP SNAPSHOT COPY
Before a Snapshot copy is created, a file system tree must be present that points to data blocks, which contain
content.
When the Snapshot copy is created, the file structure metadata is saved.
The Snapshot copy points to the same data blocks as the file structure metadata that existed when the
Snapshot copy was created.
Because the file structure of a Snapshot copy takes up little space, and no data blocks must be copied to disk,
the creation of a new Snapshot copy consumes almost no additional disk space.
In this case, the phrase consumes no space really means consumes no appreciable space. The socalled top-level root inode, which contains metadata that is necessary to define the Snapshot copy, is 4
kilobytes (KB).
Snapshot copies begin to use space when data is deleted or modified.
2-6
The WAFL file system writes the new data to a new block (F) on the disk and changes the root structure
for the active file system to point to the new block.
Meanwhile, the Snapshot copy still references the original block F. When a Snapshot copy references a
data block, that block remains unavailable for other uses. In other words, Snapshot copies start to
consume disk space only when the file system data changes after a Snapshot copy is created.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Disk Consumption
Snapshot Management
Display Snapshot copy disk space consumption:
volume snapshot show
Delete a Snapshot copy:
snapshot delete
volume snapshot autodelete
Calculate the volume space that can be reclaimed
if specified Snapshot copies are deleted:
volume snapshot compute-reclaimable
Available in advanced mode
Cannot use the * wildcard
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT DISK CONSUMPTION: SNAPSHOT MANAGEMENT
As the active file system data changes, the data that is preserved by Snapshot copies starts to consume space
in the FlexVol volume and aggregate.
Deleting Snapshot copies reclaims space in the volume or aggregate and returns the space for use by data or
by more Snapshot copies.
2-7
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Copy Reserve
The Snapshot copy reserve feature determines the
percentage of storage space that is set aside for
Snapshot copies.
Aggregate Space
Snapshot copy reserve:
Active
File
System
Is not used for file system writes
Can be increased or decreased
Default Snapshot copy reserve for Data ONTAP 8.3:
Reserve for aggregates = 0%
Reserve for volumes = 5%
Commands to change the Snapshot copy reserve:
95%
5%
Default Volume
Snapshot Reserve 5%
Default Aggregate
Snapshot Reserve 0%
cluster1::> vol modify vserver svm1 vol vol01
percent-snapshot-space 10
8
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPY RESERVE
You can change the percentage of storage space that is set aside for the Snapshot copies of a volume.
By default, volume Snapshot copies are stored in the Snapshot copy reserve storage space.
The Snapshot copy reserve space is not counted as part of the volumes disk space that is allocated for the
active file system.
When a Snapshot copy is first created, none of the Snapshot copy reserve space is consumed. The
Snapshot copy is protecting the active file system at a point in time when the Snapshot copy was created.
As the Snapshot copy ages, and the active file system changes, the Snapshot copy begins to own the data
blocks that were deleted or changed by the current active file system.
The Snapshot copy begins to consume the Snapshot copy reserve space. The amount of disk space that is
consumed by Snapshot copies can increase, depending on the length of time that a Snapshot copy is
retained and the rate of change of the volume.
In the example above, the Snapshot copy reserve space has been configured for 5% of the volume.*
If the Snapshot copy is retained for a long time, and the active file system has a high rate of change, the
Snapshot copy can consume 100% of the Snapshot copy reserve space, which is the full 5% of the disk
space that is set aside for Snapshot copies.
If the Snapshot copy is not deleted, the Snapshot copy can consume a portion of the disk space that is
intended for the active file system.
You monitor and manage Snapshot copies to ensure that disk space is properly managed.
*For data protection mirror volumes, the default Snapshot copy reserve space has a default setting of 0% of
the volume.
NOTE: Even if the Snapshot copy reserve default is left at 0%, you can still create Snapshot copies. If no
Snapshot copy reserve exists, then Snapshot copies consume blocks from the active file system over time.
2-8
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
The SnapRestore Feature
What SnapRestore software does:
Uses a Snapshot copy to revert a file or volume
Is enabled by licensing the feature
When to use SnapRestore software:
To recover a large file when disk space is low
When you need to restore data quickly
What to consider before using SnapRestore software:
SnapRestore operations cannot be reversed.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THE SNAPRESTORE FEATURE
SnapRestore technology is a licensed feature of the Data ONTAP operating system that enables you to use a
Snapshot copy to revert an aggregate, a volume, or a file to the state that it was in when the Snapshot copy
was created.
Use the SnapRestore feature to recover from data corruption when available disk space is low. If a file that
you want to recover needs more space than the amount of free space in the active file system, you cannot
restore the file by copying from the Snapshot copy to the active file system.
For example, if a 10-gigabyte (GB) file is corrupted, and only 5 GB of free space exists in the active file
system, you cannot copy the file from a Snapshot copy to recover the file.
However, SnapRestore software can quickly recover the file by resetting the inode pointers, without using
additional disk space.
Use SnapRestore software when you need to restore data more quickly than the manual copy process can
restore data. Consider these issues before using SnapRestore:
2-9
SnapRestore operations cannot be reversed.
SnapRestore software overwrites all data in the file or volume.
After you use SnapRestore software to revert to a selected Snapshot copy, you cannot undo the reversion.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 2
Snapshot Copy Design Criteria
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: SNAPSHOT COPY DESIGN CRITERIA
2-10
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
What do I need to know to design a
Snapshot solution for my company?
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2-11
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Copy Design
Understand that Snapshot copy design is highly dependent
on the customers environment.
Study the customers recovery time objective (RTO) and
recovery point objective (RPO) requirements.
Do not create more Snapshot copies than necessary.
Check and adjust the aggregate and volume Snapshot copy
reserve defaults.
To control storage consumption, configure Snapshot copy
automatic deletion and volume automatic increase.
NOTE: 32-bit Snapshot copies are not supported on Data ONTAP 8.3.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPY DESIGN
Snapshot copies are the first line of defense against accidental data loss or corruption. Before you implement
a Snapshot copy solution, you should thoroughly understand the customers needs and environment. Each
customer has unique requirements for RTO and RPO.
Recovery Time Objective (RTO)
The RTO is the amount of time within which the service, data, or process must be made available again to
avoid undesirable outcomes.
Recovery Point Objective (RPO)
The RPO is a point to which data must be restored or recovered in order to be acceptable to the organizations
acceptable data loss policy.
At a minimum, the Snapshot solution that you deploy should meet these criteria.
To provide efficient use of disk space, deploy only the required number of Snapshot copies on each volume.
If you deploy more Snapshot copies than required, the copies consume more disk space than necessary.
You might need to adjust default settings for Snapshot copy reserve for volumes and aggregates.
2-12
Snapshot copy reserve guarantees that you can create Snapshot copies until that space is filled.
When Snapshot copies fill the reserved space, then Snapshot blocks compete for space with the active file
system.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Maximum Number of Snapshot Copies
The number of Snapshot copies per volume can vary:
The maximum number of Snapshot copies per FlexVol
volume is 255.
If the FlexVol volume is in a data protection mirror
relationship, then the maximum number of Snapshot copies is
254.
If the FlexVol volume is in a disk-to-disk backup relationship,
then the maximum number of Snapshot copies is 251.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MAXIMUM NUMBER OF SNAPSHOT COPIES
It is important to know how many Snapshot copies you can accumulate. If you monitor the number of
Snapshot copies in a volume, you can prevent Snapshot copy failure due to volume limitations.
Maximum numbers for Snapshot copies:
You can accumulate a maximum of 255 Snapshot copies per FlexVol volume.
If the FlexVol volume is in a data protection mirror relationship, the maximum number of
Snapshot copies is 254, because one Snapshot copy is reserved for use by the relationship during
recovery operations.
If the FlexVol volume is in a disk-to-disk backup relationship, the maximum number of Snapshot
copies is 251.
Example: A SnapVault relationship of a mirror-SnapVault cascade
If the infinite volume is in a data protection mirror relationship, the maximum number of
Snapshot copies is reduced by two, because two Snapshot copies are used for the data protection
mirror relationship.
2-13
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Naming Conventions for Snapshot Copies
A Snapshot copy name can have a prefix or schedule name,
timestamp, comment, and label:
vserver
volume
snapshot
comment
-------
--------------
-----------------------------
-------
svm1
svm1_vol2
2HourSnapshot.2014-08-08_1005
User created
(Prefix)
(Timestamp)
Snapshot copy names cannot be longer than 255 characters.
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NAMING CONVENTIONS FOR SNAPSHOT COPIES
The scheduled Snapshot copy name can include an optional prefix or the schedule name that is specified in
the Snapshot policy, and the timestamp.
Snapshot copy names have a 255-character limit.
By taking advantage of the Snapshot copy prefix, timestamp, and comment features system,
administrators can easily determine why a Snapshot copy was created.
The Prefix or Schedule
The prefix is an optional string of characters that you can specify for an automatic Snapshot copy. If a
prefix is specified, then the Snapshot name is made up of the prefix and timestamp. Prefix names must be
unique within a policy.
A schedule cannot have more than one prefix. The number of characters in the prefix count towards the
255-character limit on the Snapshot name.
If a prefix is specified in the Snapshot schedule, then the schedule name is not used. The schedule name is
used if the prefix is not specified for a Snapshot schedule.
Volume snapshot policy add-schedule -policy <snapshot policy> -schedule
<text> -count <integer> [-prefix <text>]
The Comment
Use the volume snapshot modify command to change the text comment that is associated with a
Snapshot copy.
Example:
Cluster > volume snapshot modify -vserver vs0 -volume vol3 -snapshot
vol3_snapshot -comment "Pre-upgrade snapshot"
2-14
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
The Label
The SnapMirror label is used by the vaulting subsystem when you back up Snapshot copies to the vault
destination. If an empty label ("") is specified, the existing label is deleted.
2-15
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
The Snapshot Policy
Snapshot policies automatically manage Snapshot copy
schedules and retention on FlexVol volumes.
Snapshot Policy
Job Schedule
SVM
Cluster
15
FlexVol Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THE SNAPSHOT POLICY
A Snapshot policy allows you to configure the frequency and maximum number of Snapshot copies that are
created automatically.
You can create new Snapshot polices as necessary.
You can apply one or more schedules to the Snapshot policy.
The Snapshot policy can also have zero schedules.
When you create a storage virtual machine (or SVM, formerly called Vserver), you can specify a Snapshot
policy that becomes the default for all FlexVol volumes that are created for that SVM. When you create a
FlexVol volume, you can specify which Snapshot policy you want to use, or you can allow the FlexVol to
inherit the SVM Snapshot policy.
The default Snapshot policy might meet your needs. The default Snapshot copy policy is useful if users rarely
lose files.
The default Snapshot policy is as follows:
Weekly schedule to keep two weekly Snapshot copies
Daily schedule to keep two daily Snapshot copies
Hourly schedule to keep six hourly Snapshot copies
However, if users commonly lose files, then you should adjust the default policy to keep Snapshot copies
longer.
The recommended Snapshot copy policy for this situation:
2-16
Weekly schedule to keep two weekly Snapshot copies
Daily schedule to keep six daily Snapshot copies
Hourly schedule to keep eight hourly Snapshot copies
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
For typical systems, only five to ten percent of the data changes each week: Six daily and two weekly
Snapshot copies consume 10 to 20 percent of disk space. Adjust the Snapshot copy reserve for this amount of
disk space for Snapshot copies.
Each volume on an SVM can use a different Snapshot copy policy. For very active volumes, create a
Snapshot schedule that creates Snapshot copies every hour and keeps them for just a few hours, or turn off the
Snapshot copy feature.
2-17
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 3
Implementing a
Snapshot Copy Solution
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 3: IMPLEMENTING A SNAPSHOT COPY SOLUTION
2-18
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Typical Workflow
Create a job schedule, or use the default.
Create a Snapshot policy and specify the job schedule.
Assign the Snapshot policy to an SVM.
Create a FlexVol volume and specify the Snapshot policy, or
inherit a Snapshot policy from the SVM.
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TYPICAL WORKFLOW
To implement a Snapshot copy solution, first, decide on a job schedule.
Use a pre-existing schedule or create a new schedule, as required.
You can create multiple schedules that create and delete Snapshot copies.
A Snapshot policy is created that automatically manages Snapshot copy schedules and retention on FlexVol
volumes or infinite volumes. You can apply the Snapshot policy to the cluster or to an SVM.
Unless you specify a Snapshot policy when you create a FlexVol volume or an infinite volume, a volume
inherits the Snapshot policy that is associated with its containing SVM.
The default Snapshot policy for an SVM with a FlexVol volume is named default, and the default Snapshot
policy for an SVM with infinite volume is named default-1weekly.
2-19
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Create a New Job Schedule
Check to see if an existing job schedule fits your needs:
cluster1::> job schedule show
Create a new job schedule:
cluster1::> job schedule cron create -name
2HourSnapshot -month all -dayofweek all -day all
-hour 0,2,4,6,8,10,12,14,16,18,20,22 -minute 5
Verify that the job was created:
cluster1::> job schedule cron show
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATE A NEW JOB SCHEDULE
Find out which job schedules exist. If a job schedule meets your needs, then use it. If not, then create a new
job schedule.
cluster1::> job schedule show
Name
Type
Description
-----------
---------
-----------------------------------------
5min
cron
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
cron
@2:15,10:15,18:15
Auto Balance Aggregate Scheduler
interval
Every 1h
RepositoryBalanceMonitorJobSchedule
interval
Every 10m
daily
cron
@0:10
hourly
cron
@:05
weekly
cron
Sun@0:15
7 entries were displayed.
2-20
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
If you need to create a new job schedule, run the job schedule cron create command:
cluster1::> job schedule cron create
Usage:
[-name] <text>
Name
[ -month <cron_month>, ... ]
Month
[ -dayofweek <cron_dayofweek>, ... ]
Day of Week
[ -day <cron_dayofmonth>, ... ]
Day
[ -hour <cron_hour>, ... ]
Hour
[-minute] <cron_minute>, ...
Minute
Example: Create a new job that runs every month, every day of the week, every two hours, at five minutes
past the hour:
cluster1::> job schedule cron create -name 2HourSnapshot -month all dayofweek all -day all -hour 0,2,4,6,8,10,12,14,16,18,20,22 -minute 5
cluster1::> job schedule cron show
Name
Description
----------------
---------------------------------------------------
2HourSnapshot
@0:05,2:05,4:05,6:05,8:05,10:05,12:05,14:05,16:05,18:05,20:05,22:05
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
daily
@0:10
hourly
@:05
weekly
Sun@0:15
6 entries were displayed.
You will use the 2HourSnapshot job when you create the Snapshot policy.
2-21
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Create a New Snapshot Policy
Check the current volume Snapshot policies:
cluster1::> volume snapshot policy show
Create a new volume Snapshot policy:
cluster1::> volume snapshot policy create -vserver
svm1 -policy 2Hour_Policy -enabled true -comment
"Takes a Snapshot Copy Every 2 Hours" -schedule
2HourSnapshot -count 84
Keep 84
Snapshot copies.
Verify that the policy was created:
cluster1::> volume snapshot policy show -policy
2Hour_Policy
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATE A NEW SNAPSHOT POLICY
cluster1::> volume snapshot policy show
Vserver: cluster1
Number of
Is
Policy Name
Schedules
Enabled
Comment
------------------------
---------
-------
------------------------
true
Default policy with
default
3
hourly, daily & weekly schedules.
Schedule
Count
Prefix
SnapMirror
Label
---------------------- -----
--------------------
--------
hourly
hourly
daily
daily
daily
weekly
weekly
weekly
default-1weekly
true
Default policy with 6 hourly, 2 daily & 1 weekly schedule.
2-22
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Schedule
Count
Prefix
SnapMirror
Label
---------------------- -----
--------------------
--------
hourly
hourly
daily
daily
weekly
weekly
none
false
Policy for no
automatic
snapshots.
Schedule
Count
Prefix
SnapMirror Label
----------------
-----
-------------
----------------
3 entries were displayed.
Example: Create a volume Snapshot policy for vserver svm1 that uses the 2HourSnapshot job that you created
in the previous step. You keep one week of Snapshot copies, for a total of 84 copies:
cluster1::> volume snapshot policy create -vserver svm1 -policy
2Hour_Policy -enabled true -comment "Takes a Snapshot Copy Every 2 Hours"
-schedule 2HourSnapshot -count 84
cluster1::> volume snapshot policy show
Vserver: cluster1
Number of
Is
Policy Name
Schedules
Enabled
Comment
------------------------
---------
-------
------------------------
true
Default policy with
default
3
hourly, daily & weekly schedules.
Schedule
Count
Prefix
SnapMirror
Label
---------------------- -----
---------------------- --------
hourly
hourly
daily
daily
daily
weekly
weekly
weekly
default-1weekly
3
6 hourly, 2 daily & 1 weekly schedule.
2-23
true
Default policy with
Schedule
Count
Prefix
SnapMirror
Label
--------------
-----
----------------------
--------
hourly
hourly
daily
daily
weekly
weekly
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
none
false
Policy for no
automatic
snapshots.
Schedule
Count
Prefix
SnapMirror
Label
--------------
-----
----------------------
--------
Vserver: svm1
Number of
Is
Policy Name
Schedules
Enabled
Comment
---------------------------------
---------
-------
------------------------
true
Takes a Snapshot Copy
2Hour_Policy
Every 2 Hours
Schedule
Count
Prefix
--------------
-----
----------------------
SnapMirror
Label
--------
84
2HourSnapshot
2HourSnapshot
4 entries were displayed.
Another method to check the volume Snapshot policy:
cluster1::> volume snapshot policy show -policy 2Hour_Policy
Vserver: svm1
Number of
Is
Policy Name
Schedules
Enabled
Comment
------------------------
---------
-------
------------------------
true
Takes a Snapshot Copy
2Hour_Policy
Every 2 Hours
2-24
Schedule
Count
Prefix
SnapMirror
Label
-------------2HourSnapshot
----84
---------------------2HourSnapshot
--------
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Assign the Snapshot Policy to an SVM
For an existing SVM, check to see which policy is already
assigned:
cluster1::> vserver show -vserver svm1
Modify an SVM to use an existing Snapshot policy:
cluster1::> vserver modify -vserver svm1
-snapshot-policy 2Hour_Policy
Verify that the SVM configuration is using a new Snapshot
policy:
cluster1::> vserver show -vserver svm1
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ASSIGN THE SNAPSHOT POLICY TO AN SVM
First, check the current Snapshot policy for SVM svm1:
cluster1::> vserver show -vserver svm1
Vserver: svm1
Vserver Type: data
Vserver Subtype: default
Vserver UUID: cd645ac3-425d-11e4-9d2d0050560140b9
Root Volume: svm1_root
Aggregate: n1_n1_aggr1
NIS Domain: Root Volume Security Style: ntfs
LDAP Client: Default Volume Language Code: C.UTF-8
Snapshot Policy: default The current Snapshot
policy
Comment:
Quota Policy: default
List of Aggregates Assigned: 2-25
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Limit on Maximum Number of Volumes allowed: unlimited
Vserver Admin State: running
Vserver Operational State: running
Vserver Operational State Stopped Reason: Allowed Protocols: nfs, cifs, fcp, iscsi, ndmp
Disallowed Protocols: Is Vserver with Infinite Volume: false
QoS Policy Group: Config Lock: false
IPspace Name: Default
Change the current Snapshot policy so that the SVM uses the Snapshot policy that you created in the previous
step:
cluster1::> vserver modify -vserver svm1 -snapshot-policy 2Hour_Policy
Check your work:
cluster1::> vserver show -vserver svm1
Vserver: svm1
Vserver Type: data
Vserver Subtype: default
Vserver UUID: cd645ac3-425d-11e4-9d2d0050560140b9
Root Volume: svm1_root
Aggregate: n1_n1_aggr1
NIS Domain: Root Volume Security Style: ntfs
LDAP Client: Default Volume Language Code: C.UTF-8
Snapshot Policy: 2Hour_Policy New Snapshot
policy
Comment:
Quota Policy: default
List of Aggregates Assigned: Limit on Maximum Number of Volumes allowed: unlimited
Vserver Admin State: running
Vserver Operational State: running
Vserver Operational State Stopped Reason: Allowed Protocols: nfs, cifs, fcp, iscsi, ndmp
2-26
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Disallowed Protocols: Is Vserver with Infinite Volume: false
QoS Policy Group: Config Lock: false
IPspace Name: Default
2-27
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Create a New FlexVol Volume
Create a new FlexVol volume that inherits the Snapshot
policy from the SVM:
cluster1::> volume create -vserver svm1 -volume
svm1_vol2 -aggregate n1_aggr1 -size 200M
[Job 79] Job succeeded: Successful
Confirm the Snapshot policy:
cluster1::> volume show -vserver svm1 -volume
svm1_vol2 -fields Snapshot-Policy
vserver volume
snapshot-policy
------- --------- ---------------
svm1
21
The policy is
inherited from
the SVM.
svm1_vol2 2Hour_Policy
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATE A NEW FLEXVOL VOLUME
Create a new FlexVol volume without specifying the Snapshot policy. The new volume is expected to inherit
the Snapshot policy from the current setting on the SVM.
Create a new FlexVol volume:
cluster1::> volume create -vserver svm1 -volume svm1_vol2 -aggregate
n1_aggr1 -size 20M
Observe the results of the volume create command:
cluster1::> volume show
Vserver
Volume
-------- ---------
Aggregate
State
Type
Size Available
Used%
---------- --------- ---- -------- ---------- -----
cluster1-01
vol0
aggr0_n1
online
RW
5.16GB
4.29GB
16%
vol0
aggr0_n2
online
RW
5.16GB
4.32GB
16%
svm1
svm1_root
n1_aggr1
online
RW
20MB
18.85MB
5%
svm1
svm1_vol1
n1_aggr1
online
RW
50MB
47.36MB
5%
svm1
svm1_vol2
n1_aggr1
online
RW
20MB
18.88MB
5%
cluster1-02
5 entries were displayed.
2-28
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Confirm the Snapshot policy on the new volume:
cluster1::> volume show -vserver svm1 -volume svm1_vol2 -fields SnapshotPolicy
vserver
volume
snapshot-policy
-------
--------------
---------------
svm1
svm1_vol2
2Hour_Policy
2-29
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Check the Volume Snapshot Activity
1 of 2
After some time elapses, check the Snapshot activity in the
volume:
cluster1::> volume snapshot show -vserver svm1
volume svm1_vol2
NOTE: The job schedule is set to run every two hours at five minutes past the
hour.
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CHECK THE VOLUME SNAPSHOT ACTIVITY: 1 OF 2
After some time elapses, check the volume Snapshot activity:
cluster1::>volume snapshot show -vserver svm1 -volume svm1_vol2
---Blocks--Vserver
Volume
-------- -------svm1
Snapshot
------------------------------- ------ ------ -----
svm1_vol2
2HourSnapshot.2014-07-28_2005
60KB
0%
31%
2HourSnapshot.2014-07-28_2205
40KB
0%
23%
2 entries were displayed.
2-30
Size Total% Used%
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Check the Volume Snapshot Activity
2 of 2
cluster1::>volume snapshot show -vserver svm1 -volume
svm1_vol2
---Blocks--Vserver
svm1
Volume
Snapshot
Size Total% Used%
svm1_vol2
2HourSnapshot.2014-07-28_2005
60KB 0%
31%
The Snapshot copy takes
the schedule name
because the prefix option
was not used.
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CHECK THE VOLUME SNAPSHOT ACTIVITY: 2 OF 2
2-31
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Answer this Question
What can a Snapshot policy be applied to?
a) a storage virtual machine
b) a FlexVol volume
c) the cluster
d) all of the above
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ANSWER THIS QUESTION
2-32
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 4
Monitoring and Managing
Snapshot Copies
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: MONITORING AND MANAGING SNAPSHOT COPIES
2-33
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Managing Snapshot Copy Policies and
Schedules
Snapshot policies automatically manage Snapshot copy
schedules and retention on FlexVol volumes or infinite volumes
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGING SNAPSHOT COPY POLICIES AND SCHEDULES
Snapshot policies automatically manage Snapshot copy schedules and retention on FlexVol volumes or
infinite volumes. A new volume inherits the Snapshot policy that is associated with its containing SVM,
unless you specify a Snapshot policy when you create the FlexVol volume.
In some circumstances, you might need to manually manage the Snapshot policies and schedules.
The volume snapshot policy command directory contains commands that you use to manage
Snapshot copy policies.
cluster1::> volume snapshot policy ?
add-schedule
Add a schedule to snapshot policy
create
Create a new snapshot policy
delete
Delete a snapshot policy
modify
Modify a snapshot policy
modify-schedule
Modify a schedule within snapshot policy
remove-schedule
Remove a schedule from snapshot policy
show
Show snapshot policies
2-34
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Managing Snapshot Copy Policies and
Schedules (Cont.)
Three preconfigured policies exist. These policies are
affiliated with the cluster.
27
Policy Name
Schedule
Count
Default
Hourly
Daily
Weekly
6
2
2
Default-1 weekly
Hourly
Daily
Weekly
6
2
1
None
N/A
N/A
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGING SNAPSHOT COPY POLICIES AND SCHEDULES (CONT.)
2-35
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Managing Snapshot Copy Policies and
Schedules (Cont.)
Cron job schedules are schedules that run at a specific time:
5min
8hour
daily
hourly
weekly
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
@2:15,10:15,18:15
@0:10
@:05
Sun@0:15
Each Snapshot policy contains at least one schedule.
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGING SNAPSHOT COPY POLICIES AND SCHEDULES (CONT.)
The job schedule cron command directory contains commands that you use to manage schedules that
can be used for Snapshot policies.
cluster1::> job schedule cron show
Name
Description
----------------
---------------------------------------------------
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
daily
@0:10
hourly
@:05
weekly
Sun@0:15
5 entries were displayed.
2-36
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Manage Snapshot Copies
Snapshot copy management commands:
cluster1::> volume snapshot ?
autodelete>
Manage snapshot autodelete settings
modify
Modify autodelete settings
show
Display autodelete settings
create
Create a snapshot
delete
Delete a snapshot
modify
Modify snapshot attributes
partial-restore-file Restore part of a file from a snapshot
policy>
Manage snapshot policies
rename
Rename a snapshot
restore-file
Restore a file from a snapshot
show
Display a list of snapshot copies
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGE SNAPSHOT COPIES
The volume snapshot command directory contains commands for managing Snapshot copies.
2-37
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Obtain Information About Snapshot Copies
Obtain general information about all Snapshot copies:
cluster1::> volume snapshot show
Obtain granular information about a particular Snapshot
copy:
cluster1::> volume snapshot show -volume svm1_vol1
-snapshot hourly.2014-10-01_0605 -instance
Displays detailed
information about all fields
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
OBTAIN INFORMATION ABOUT SNAPSHOT COPIES
The volume snapshot show command displays information about Snapshot copies. The command
output depends on the parameters that are specified with the command. If no parameters are specified, the
command displays a table with the following information about all the available Snapshot copies:
Vserver name
Volume name
Snapshot copy name
Creation time
Size
Blocks:
2-38
Percentage of total blocks in the parent volume
Number of used blocks in the parent volume
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Example:
cluster1::> volume snapshot show
---Blocks--Vserver
Volume
Size
-------- -----svm1
svm1_vol2
Snapshot
Total%
Used%
------
State
----------------
--------
0%
2HourSnapshot.2014-07-10_1005
36%
valid
64KB
0%
2HourSnapshot.2014-07-10_1205
36%
valid
64KB
0%
2HourSnapshot.2014-07-10_1405
36%
valid
64KB
2HourSnapshot.2014-07-10_1605
34%
valid
60KB
0%
svm1_root
0%
hourly.2014-07-10_1105
33%
valid
64KB
0%
hourly.2014-07-10_1205
33%
valid
64KB
---Blocks--Vserver
Volume
Size
-------svm1
-----svm1_root
Snapshot
Total%
Used%
------
64KB
0%
68KB
0%
---------------hourly.2014-07-10_1404
33%
hourly.2014-07-10_1405
35%
-------valid
valid
0%
hourly.2014-07-10_1604
35%
valid
68KB
0%
hourly.2014-07-10_1605
32%
valid
60KB
19 entries were displayed.
2-39
State
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Other options for the volume snapshot show command:
cluster1::> volume snapshot show ?
[ -instance | -time | -fields <fieldname>, ... ]
[ -vserver <vserver name> ]
Vserver
[[-volume] <volume name>]
Volume
[[-snapshot] <snapshot name>]
Snapshot
[ -create-time <Date> ]
Creation Time
[ -busy {true|false} ]
Snapshot Busy
[ -owners <text>, ... ]
List of Owners
[ -size {<integer>[KB|MB|GB|TB|PB]} ]
Snapshot Size
[ -blocks <percent> ]
Percentage of Total
Blocks
[ -usedblocks <percent> ]
Percentage of Used
Blocks
[ -comment <text (size 0..255)> ]
Comment
[ -is-7-mode {true|false} ]
7-Mode Snapshot
[ -snapmirror-label <text (size 0..31)> ]
Label for SnapMirror
Operations
[ -state {valid|invalid|partial} ]
Snapshot State
[ -is-constituent {true|false} ]
Constituent Snapshot
Example:
cluster1::> volume snapshot show -volume svm1_vol1 -snapshot hourly.201410-01_0605 -instance
Vserver: svm1
Volume: svm1_vol1
Snapshot: hourly.2014-10-01_0605
Creation Time: Wed Oct 01 06:05:00 2014
Snapshot Busy: false
List of Owners: Snapshot Size: 80KB
Percentage of Total Blocks: 0%
Percentage of Used Blocks: 33%
Comment: 7-Mode Snapshot: false
Label for SnapMirror Operations: Snapshot State: Constituent Snapshot: false
2-40
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Manually Create a Snapshot Copy
Manually create a Snapshot copy:
cluster1::> volume snapshot create -vserver svm1
-volume svm1_vol1 -snapshot MySnapshot1 -comment
"Manually created Snapshot Copy
Obtain information about the Snapshot copy:
cluster1::> volume snapshot show -volume svm1_vol1
-snapshot MySnapshot1
---Blocks--Vserver Volume
Snapshot
Size Total% Used%
svm1
svm1_vol1 MySnapshot1
80KB
0%
32%
cluster1::> volume snapshot show -volume svm1_vol1
-snapshot MySnapshot1 -instance
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANUALLY CREATE A SNAPSHOT COPY
The volume snapshot create command creates a Snapshot copy of a specified volume.
cluster1::> volume snapshot create
Usage:
[ -vserver <vserver name> ]
Vserver (default: svm1)
[-volume] <volume name>
Volume
[-snapshot] <snapshot name>
Snapshot
[[-comment] <text (size 0..255)>]
Comment
[ -foreground {true|false} ]
Foreground Process (default:
true)
[ -snapmirror-label <text (size 0..31)> ]
Label for SnapMirror
Operations
Example:
cluster1::> volume snapshot create -vserver svm1 -volume svm1_vol1 snapshot MySnapshot1 -comment "Manually created Snapshot Copy"
cluster1::> volume snapshot show -volume svm1_vol1
2-41
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
---Blocks--Vserver
-------svm1
Volume
Size
Snapshot
Total%
Used%
-------svm1_vol1
---------
-----------------------
100KB
0%
daily.2014-09-30_1710
37%
76KB
0%
daily.2014-10-01_0010
31%
96KB
0%
hourly.2014-10-01_0105
36%
96KB
0%
hourly.2014-10-01_0205
36%
80KB
0%
MySnapshot1
32%
5 entries were displayed.
cluster1::> volume snapshot show -volume svm1_vol1 -snapshot MySnapshot1
---Blocks--Vserver
Volume
Size
--------------svm1
svm1_vol1
80KB
Snapshot
Total%
Used%
------------------------------------- --------
0%
--
MySnapshot1
32%
cluster1::> volume snapshot show -volume svm1_vol1 -snapshot MySnapshot1
-instance
Vserver: svm1
Volume: svm1_vol1
Snapshot: MySnapshot1
Creation Time: Wed Oct 01 08:38:35 2014
Snapshot Busy: false
List of Owners: Snapshot Size: 80KB
Percentage of Total Blocks: 0%
Percentage of Used Blocks: 32%
Comment: Manually created Snapshot Copy
2-42
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
7-Mode Snapshot: false
Label for SnapMirror Operations: Snapshot State: Constituent Snapshot: false
2-43
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Modify a Snapshot Copy
Modify an existing Snapshot copy comment or SnapMirror
label:
cluster1::> volume snapshot modify vserver svm1
volume svm1_vol1 -snapshot MySnapshot1 comment
This is a new comment
Rename the Snapshot copy:
cluster1::> volume snapshot rename -vserver svm1
-volume svm1_vol1 -snapshot MySnapshot1 -new-name
MySnapshot_Renamed
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODIFY A SNAPSHOT COPY
The volume snapshot modify command enables you to change the text comment that is associated
with a Snapshot copy:
cluster1::> volume snapshot modify
Usage:
[ -vserver <vserver name> ]
Vserver (default: svm1)
[-volume] <volume name>
Volume
[-snapshot] <snapshot name>
Snapshot
[ -comment <text (size 0..255)> ]
Comment
[ -snapmirror-label <text (size 0..31)> ]
Label for SnapMirror
Operations
Example:
cluster1::> volume snapshot modify vserver svm1 -volume svm1_vol1
comment This is a new comment
cluster1::> volume snapshot rename -vserver svm1 -volume svm1_vol1 snapshot MySnapshot1 -new-name MySnapshot_Renamed
cluster1::> volume snapshot show -vserver svm1 -volume svm1_vol1
2-44
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
---Blocks--Vserver
Volume
Size
Snapshot
Total%
Used%
--------
--------
---------------
--------
svm1
svm1_vol1
96KB
MySnapshot_Renamed
0%
------
36%
cluster1::> volume snapshot show -vserver svm1 -volume svm1_vol1 snapshot MySnapshot_Renamed -fields comment
vserver volume
snapshot
comment
------- --------- ------------------ --------------------svm1
2-45
svm1_vol1 MySnapshot_Renamed This is a new comment
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
--
Snapshot Copy Space Management
Find out the amount of disk space that is reclaimed by
deleting a specific Snapshot copy:
cluster1::> volume snapshot compute-reclaimable
-vserver svm1 -volume svm1_vol2 -snapshots
hourly.2014-10-13_1405
A total of 77824 bytes can be reclaimed.
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPY SPACE MANAGEMENT
2-46
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Delete Snapshot Copies
Manually delete a Snapshot copy:
cluster1::> volume snapshot delete -vserver svm1
-volume svm1_vol1 -snapshot MySnapshot_Renamed
Warning: Deleting a Snapshot copy permanently removes
any data that is stored only in that Snapshot copy.
Are you sure you want to delete Snapshot copy
"MySnapshot_Renamed" for volume "svm1_vol1" in
Vserver "svm1" ?
{y|n}: y
Delete all Snapshot copies on a volume:
cluster1::> volume snapshot delete -vserver svm1
-volume svm1_vol1 -snapshot *
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DELETE SNAPSHOT COPIES
2-47
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Try This
In your lab kit, log in to cluster 1.
Enter: volume snapshot partial-restore-file
What do you need to know before you can restore a partial file from a Snapshot copy?
Enter: volume snapshot policy show
Which policies have built-in SnapMirror labels?
Enter: job schedule cron create test
What is a required field?
Enter: job schedule cron create test minute 8
Did this command successfully create the job schedule?
When will this job run?
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
2-48
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 5
Restoring Data from Snapshot
Copies
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 5: RESTORING DATA FROM SNAPSHOT COPIES
2-49
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
What should I consider before I
restore data from a Snapshot copy?
37
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2-50
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Considerations Before Restoring Data
SnapRestore
license
requirement
Privilege
requirements
Volume I/O activity
SnapMirror
relationships
Use of an entire
volume, entire file, or
partial file
Use of the root
volume
38
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONSIDERATIONS BEFORE RESTORING DATA
Customers should consider the following factors before they decide to restore data from a Snapshot copy:
2-51
SnapRestore license requirement: A SnapRestore license is required to be able to perform Snapshot
copy restoration.
Privilege requirements: You must have the advanced privilege level or higher to restore the contents of
a volume from a Snapshot copy. Snapshot files carry the same permissions as the original files, which
keeps the integrity of the security system intact.
Volume I/O activity: To restore the contents of a volume from a Snapshot copy, there must be no I/O
activity on the volume.
Use of an entire volume, entire file, or partial file: You can restore the entire volume from a Snapshot
copy, restore an entire file, or restore part of a file.
Use of the root volume: If you are required to restore the root volume from a Snapshot copy, the node is
rebooted. Nonroot volumes do not require a reboot.
SnapMirror relationships: You should manually update all the SnapMirror relationships of a volume
immediately after you restore its Snapshot copy. If you do not do so, the result might be unusable
SnapMirror relationships that must be deleted and re-created.
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Use Data ONTAP Commands to Restore Data
Use these Data ONTAP commands to restore data from
Snapshot copies:
volume snapshot restore
volume snapshot restore-file
39
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
USE DATA ONTAP COMMANDS TO RESTORE DATA
2-52
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Whole Volume Snapshot Restore
1 of 3
General guidelines for performing a whole volume Snapshot
copy restore:
Review the existing Snapshot copies in the volume, and
carefully choose the Snapshot copy to restore.
Execute the volume snapshot restore command and
answer the prompts.
Review your results.
40
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHOLE VOLUME SNAPSHOT RESTORE: 1 OF 3
2-53
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Whole Volume Snapshot Restore
2 of 3
Review the existing Snapshot copies in the volume:
cluster1::> volume snapshot show -vserver svm1
-volume svm1_vol1
Perform the snapshot restore command for the desired
Snapshot copy:
cluster1::> volume snapshot restore
-vserver svm1 -volume svm1_vol1 -snapshot
hourly.2014-10-07_0205
41
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHOLE VOLUME SNAPSHOT RESTORE: 2 OF 3
This volume has eight Snapshot copies:
cluster1::> volume snapshot show -vserver svm1 -volume svm1_vol1
---Blocks--Vserver
Volume
Snapshot
Size
Total%
Used%
--------
--------
-------
--------------------
svm1
svm1_vol1
96KB
0%
weekly.2014-10-04_1715
37%
96KB
0%
weekly.2014-10-05_0015
37%
100KB
0%
daily.2014-10-06_0010
38%
84KB
0%
daily.2014-10-07_0010
34%
0%
hourly.2014-10-07_0105
38%
100KB
2-54
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
100KB
0%
hourly.2014-10-07_0205
38%
96KB
0%
hourly.2014-10-07_0305
37%
96KB
0%
hourly.2014-10-07_0405
37%
8 entries were displayed.
Perform the snapshot restore command:
cluster1::> volume snapshot restore -vserver svm1 -volume svm1_vol1 snapshot hourly.2014-10-07_0205
Warning: Snapshot copy "hourly.2014-10-07_0205" is not the most recent
copy.
Promoting this Snapshot copy will delete all copies made after
it.
Do you want to continue? {y|n}: y
Warning: Quota rules currently enforced on volume svm1_vol1 may change
during this operation. If the currently enforced quota rules are
different from those in Snapshot copy hourly.2014-10-07_0205,
you may have to resize or reinitialize quotas on this volume
after this operation.
Do you want to continue? {y|n}: y
Warning: Export policies currently enforced on the qtrees of volume
"svm1_vol1" will not change during this operation. If the
currently enforced export policies are different from those in
Snapshot copy "hourly.2014-10-07_0205", reassign the export
policies of the qtrees on this volume after this operation.
Do you want to continue? {y|n}: y
2-55
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Whole Volume Snapshot Restore
3 of 3
Check the Snapshot copies on the volume:
cluster1::> volume snapshot show -vserver
svm1 -volume svm1_vol1
Notice that Snapshot copies that are newer than the restored
Snapshot copy are deleted.
42
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHOLE VOLUME SNAPSHOT RESTORE: 3 OF 3
Check the Snapshot copies on the volume:
cluster1::> volume snapshot show -vserver svm1 -volume svm1_vol1
---Blocks--Vserver
Volume
Size
Snapshot
Total%
Used%
--------
--------
----------
------------------------
svm1
svm1_vol1
96KB
0%
weekly.2014-10-04_1715
37%
96KB
0%
weekly.2014-10-05_0015
37%
100KB
0%
daily.2014-10-06_0010
38%
84KB
0%
daily.2014-10-07_0010
34%
100KB
0%
hourly.2014-10-07_0105
38%
96KB
0%
hourly.2014-10-07_0205
37%
6 entries were displayed.
2-56
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Notice that Snapshot copies that are newer than hourly.2014-10-07_0205 are deleted.
2-57
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Single File Snapshot Restore
Check the volume Snapshot copies:
cluster1::> volume snapshot show
Restore the file (MyFile.txt) from a Snapshot copy:
cluster1::> volume snapshot restore-file -vserver
svm1 -volume svm1_vol2 -snapshot
2HourSnapshot.2014-09-22_1405 -path
/vol/svm1_vol2/MyFile.txt
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SINGLE FILE SNAPSHOT RESTORE
This volume contains three Snapshot copies:
cluster1::> volume snapshot show
---Blocks--Vserver
Volume
Size
Snapshot
Total%
Used%
State
--------
-------
------------
----------------
svm1
svm1_vol2
------
0%
ManualSnapshot1
39%
valid
92KB
0%
ManualSnapshot2
39%
valid
92KB
valid
0%
ManualSnapshot3
36%
80KB
3 entries were displayed.
From a Windows host, there is a mapped drive letter to the volume, and
you have created a text file named MyFile.txt.
2-58
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Check the syntax:
cluster1::> volume snapshot restore-file ?
[ -vserver <vserver name> ]
Vserver Name (default: svm1)
[ -volume <volume name> ]
Volume Name
[-snapshot|-s] <snapshot name>
Snapshot Name
[-path] <text>
Filepath
[ -restore-path|-r <text> ]
Restore Filepath
[ -split-disabled [true] ]
Disable Space Efficient LUN Splitting
Perform the volume snapshot restore-file command:
cluster1::> volume snapshot restore-file -vserver svm1 -volume svm1_vol2
-snapshot ManualSnapshot2 -path /vol/svm1_vol2/MyFile.txt
Since you restored a single file, all the Snapshot copies still exist on the volume:
cluster1::> volume snapshot show
---Blocks--Vserver
Volume
Size
--------
-------
svm1
svm1_vol2
Snapshot
Total%
------------
State
Used%
----------------
92KB
0%
ManualSnapshot1
35%
0%
ManualSnapshot2
34%
valid
88KB
0%
ManualSnapshot3
32%
valid
80KB
3 entries were displayed.
2-59
------
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
valid
Use Client Tools to Restore Data
Clients can be enabled to access the Snapshot directories on
each volume or on any volume.
Make the Snapshot copy directories visible to NFS and CIFS
clients:
cluster1::> volume modify -volume svm1_vol1
-snapdir-access true
Volume modify successful on volume svm1_vol1 of
Vserver svm1.
44
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
USE CLIENT TOOLS TO RESTORE DATA
Customers can use native client tools to access the Snapshot directories on each volume or on any volume.
The CIFS or NFS client must have access to the root directory of the volume. Ensure that the client can see
the Snapshot directories on the volume.
2-60
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Restoring Previous Versions (Windows)
45
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORING PREVIOUS VERSIONS (WINDOWS)
In Windows, right-click the file, and from the list, choose Restore previous versions.
2-61
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Previous Versions Tab (Windows)
46
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
PREVIOUS VERSIONS TAB (WINDOWS)
In the Windows Previous Versions tab, you see choices to restore, open, or copy any previous version of the
file.
If no previous versions are listed, the file has not changed.
2-62
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Previous Versions for Folders (Windows)
1 of 2
47
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
PREVIOUS VERSIONS FOR FOLDERS (WINDOWS): 1 OF 2
The Previous Versions feature is also available for folders.
2-63
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Previous Versions for Folders (Windows)
2 of 2
48
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
PREVIOUS VERSIONS FOR FOLDERS (WINDOWS): 2 OF 2
2-64
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Topic for Discussion
If a user tries to recover a file in a Snapshot copy that the user
has no permissions for, what happens?
49
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TOPIC FOR DISCUSSION
2-65
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 6
Snapshot Copy Advanced
Topics
50
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 6: SNAPSHOT COPY ADVANCED TOPICS
2-66
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Copy Advanced Topics
Managing Snapshot copy disk space
Deleting Snapshot copies automatically
Managing busy Snapshot copies
Managing Snapshot copies on infinite
volumes
51
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPY ADVANCED TOPICS
2-67
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
I really need to have a design where the
Snapshot copies are automatically
managed. Is that possible?
52
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
2-68
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Managing Snapshot Copy Disk Space
Know how much disk space is consumed by all Snapshot
copies and by each Snapshot copy.
Predict Snapshot copy disk space consumption.
Delete Snapshot copies automatically.
Find out how much disk space is recovered if a Snapshot
copy is deleted.
53
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGING SNAPSHOT COPY DISK SPACE
2-69
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Managing Snapshot Copy Disk Space
Snapshot Copy Disk Space Consumption
Monitor the Snapshot copy disk space consumption:
cluster1::> volume snapshot show
Find out how much Snapshot copy space is being used:
cluster1::> volume show -vserver svm1 -volume
svm1_vol2 -fields snapshot-space-used
54
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGING SNAPSHOT COPY DISK SPACE: SNAPSHOT COPY DISK SPACE
CONSUMPTION
The design of the Snapshot copy feature ensures that the data that is referenced by a Snapshot copy cannot be
accidentally deleted.
You can monitor Snapshot copy disk consumption by using the volume show command, which displays
the amount of free space on a disk.
cluster1::> volume snapshot show
---Blocks--Vserver
-------svm1
2-70
Volume
Size
Snapshot
Total%
Used%
-------svm1_root
-------------
-----------------------------
0B
0%
hourly.2014-09-22_1404
0%
0B
0%
hourly.2014-09-22_1405
0%
0B
0%
hourly.2014-09-22_1604
0%
0B
0%
hourly.2014-09-22_1605
0%
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
svm1_vol1
0B
0%
hourly.2014-09-22_1404
0%
0B
0%
hourly.2014-09-22_1405
0%
0B
0%
hourly.2014-09-22_1604
0%
0B
0%
hourly.2014-09-22_1605
0%
64KB
0%
2HourSnapshot.2014-09-22_1405
29%
68KB
0%
2HourSnapshot.2014-09-22_1605
30%
svm1_vol2
10 entries were displayed.
You can also find out how much Snapshot copy space is being used:
cluster1::> volume show -vserver svm1 -volume svm1_vol2 -fields snapshotspace-used
vserver volume
snapshot-space-used
------- --------- ------------------svm1
2-71
svm1_vol2 13%
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Delete Snapshot Copies Automatically
Snapshot Copy Autodelete
View the volume autodelete policy settings that are in effect
currently:
cluster1::> volume snapshot autodelete show
-vserver svm1 -volume svm1_vol2
Enable the automatic deletion of Snapshot copies, and set
the trigger to volume for the svm1_vol2 volume, which is
affiliated with the svm1 storage virtual machine:
cluster1::> volume snapshot autodelete modify
vserver svm1 -volume svm1_vol2 -enabled true
-trigger volume
*Important! For SAN solutions, refer to the Clustered Data ONTAP 8.3 SAN
Administration Guide.
55
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DELETE SNAPSHOT COPIES AUTOMATICALLY: SNAPSHOT COPY AUTODELETE
You can define and enable a policy to automatically delete Snapshot copies. You can better manage
space usage if you automatically delete Snapshot copies.
You can automatically delete Snapshot copies from read/write volumes. You cannot set up automatic
deletion of Snapshot copies from infinite volumes or from read-only volumes, for example, SnapMirror
destination volumes.
You can define and enable a policy to automatically delete Snapshot copies by using the volume
snapshot autodelete modify command.
Viewing settings for the automatic deletion of Snapshot copies
View the volume autodelete policy settings that are currently in effect:
cluster1::> volume snapshot autodelete show -vserver svm1 -volume
svm1_vol2
Vserver Name: svm1
Volume Name: svm1_vol2
Enabled: false The autodelete policy is not turned on.
Commitment: try
Defer Delete: user_created
Delete Order: oldest_first
Defer Delete Prefix: (not specified)
Target Free Space: 20%
Trigger: volume
2-72
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Destroy List: none
Is Constituent Volume: false
Snapshot policy autodelete modify command
The volume snapshot autodelete modify command enables you to modify Snapshot automatic
deletion policy settings.
Based on the defined policy, automatic deletion of Snapshot copies is triggered.
Automatic deletion of Snapshot copies is useful when you want to automatically reclaim space that is
consumed by the Snapshot copies from the volume, when the volume is low in available space.
This command works only on a read/write parent volume. You cannot set up automatic Snapshot copy
deletion for striped volumes and read-only volumes.
cluster1::> volume snapshot autodelete modify ?
-vserver <vserver name>
Vserver Name
[-volume] <volume name>
Volume Name
[[-enabled] {true|false}]
Enabled
[ -commitment {try|disrupt|destroy} ]
Commitment
[ -defer-delete {scheduled|user_created|prefix|none} ]
Defer Delete
[ -delete-order {newest_first|oldest_first} ]
Delete Order
[ -defer-delete-prefix <text (size 0..15)> ]
Defer Delete
Prefix
[ -target-free-space <percent> ]
Target Free
Space
[ -trigger {volume|snap_reserve|space_reserve}
Trigger
[ -destroy-list <text> ]
Destroy List
Enable the automatic deletion of Snapshot copies, and set the trigger to volume for the svm1_vol2 volume,
which is part of the svm1 SVM:
cluster1::> volume snapshot autodelete modify -vserver svm1 -volume
svm1_vol2 -enabled true -trigger volume
Volume modify successful on volume: svm1_vol2
Check your work:
cluster1::> volume snapshot autodelete show -vserver svm1 -volume
svm1_vol2
Vserver Name: svm1
Volume Name: svm1_vol2
Enabled: true The autodelete feature is enabled.
Commitment: try
Defer Delete: user_created
Delete Order: oldest_first
Defer Delete Prefix: (not specified)
Target Free Space: 20%
2-73
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Trigger: volume The trigger is volume free space.
Destroy List: none
Is Constituent Volume: false
This policy triggers when the free space in the volume falls below 20%.
2-74
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Manage Busy Snapshot Copies
1 of 2
A Snapshot copy is in a busy state if there are any applications that are
using it:
Create a FlexClone of a volume:
cluster1::> volume clone create -vserver svm1 -flexclone
svm1_vol1_Clone -type RW -parent-volume svm1_vol1
Check to see if there are any busy Snapshot copies appearing in the
volume:
cluster1::> volume snapshot show -vserver svm1 -volume
svm1_vol1 -busy true
56
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGE BUSY SNAPSHOT COPIES: 1 OF 2
Create a FlexClone of a volume:
cluster1::volume clone create -vserver svm1 -flexclone svm1_vol1_Clone type RW -parent-volume svm1_vol1
Check to see if there are any busy Snapshot copies in the volume:
cluster1::volume snapshot show -vserver svm1 -volume svm1_vol1 -busy true
---Blocks--Vserver
-------svm1
Volume
Size
Snapshot
Total%
State
Used%
------svm1_vol1
------------
-------
--------
0%
clone_svm1_vol1_C.0
0%
valid
0B
NOTE: The busy true switch shows only the busy Snapshot copies in the output.
2-75
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Manage Busy Snapshot Copies
2 of 2
Check the owner of a busy Snapshot copy:
cluster1::> volume snapshot show -vserver svm1
-volume svm1_vol1 -fields owners
vserver volume
snapshot
------- --------- ---------------------svm1
clone"
57
owners
------
svm1_vol1 clone_svm1_vol1_clone.0 "volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGE BUSY SNAPSHOT COPIES: 2 OF 2
cluster1::> volume snapshot show -vserver svm1 -volume svm1_vol1 -fields
owners
vserver
volume
snapshot
owners
-------
---------
----------------------
------
svm1
svm1_vol1
clone_svm1_vol1_clone.0
"volume clone"
After you know the owner of the Snapshot copy, then you can determine if you can stop the application that is
holding the Snapshot copy busy. When the Snapshot copy is not busy, then you can safely delete it.
2-76
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Copies on Infinite Volumes
Guidelines for Creating Snapshot Copies of Infinite Volumes
The volume must be online.
The Snapshot copy schedule should not be less frequent than
hourly.
Time should be synchronized across all nodes.
The Snapshot copy creation job can run in the background.
You cannot rename the Snapshot copy.
You cannot modify the comment or SnapMirror label.
58
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPIES ON INFINITE VOLUMES: GUIDELINES FOR CREATING
SNAPSHOT COPIES OF INFINITE VOLUMES
Guidelines for creating Snapshot copies of infinite volumes
You can create, manage, and restore Snapshot copies of infinite volumes. However, be aware of the factors
that affect the Snapshot creation process and the requirements for managing and restoring the copies.
The volume must be online.
You cannot create a Snapshot copy of an infinite volume if the infinite volume is in a mixed state because
a constituent is offline.
The Snapshot copy schedule should not be less than hourly.
It takes longer to create a Snapshot copy of an infinite volume than of a FlexVol volume. If you schedule
Snapshot copies of infinite volumes for less than hourly, Data ONTAP attempts the schedule but might not
meet it. Scheduled Snapshot copies are missed when the previous Snapshot copy is still being created.
Time should be synchronized across all the nodes that the infinite volume spans.
Synchronized time helps schedules for Snapshot copies run smoothly and helps the restoration of
Snapshot copies function properly.
The Snapshot copy creation job can run in the background.
Creating a Snapshot copy of an infinite volume is a volume-level job (unlike the same operation on a FlexVol
volume), and the operation spans multiple nodes in the cluster. You can force the job to run in the background
by setting the -foreground parameter of the volume snapshot create command to false.
After you create Snapshot copies of an infinite volume, you cannot rename the copy or modify the comment
or SnapMirror label for the copy.
For more information about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes
Management Guide.
2-77
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Copies on Infinite Volumes
Guidelines for Managing Snapshot Copy Disk Consumption
You cannot calculate the amount of disk space that can be
reclaimed.
The size of a Snapshot copy for an infinite volume excludes
the size of namespace mirror constituents.
To reclaim disk space that is used by Snapshot copies of
infinite volumes, you must manually delete the copies.
59
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPIES ON INFINITE VOLUMES: GUIDELINES FOR MANAGING
SNAPSHOT COPY DISK CONSUMPTION
Guidelines for managing Snapshot copy disk consumption
You cannot calculate the amount of disk space that can be reclaimed if Snapshot copies of an infinite
volume are deleted.
The size of a Snapshot copy for an infinite volume excludes the size of namespace mirror constituents.
To reclaim disk space that is used by Snapshot copies of infinite volumes, you must manually delete the
copies.
You cannot use the automatic Snapshot copy deletion feature to automatically delete Snapshot copies of
infinite volumes. However, you can manually delete Snapshot copies of infinite volumes, and you can run the
delete operation in the background.
For more information about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes
Management Guide.
2-78
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Copies on Infinite Volumes
Guidelines for Restoring Snapshot Copies of Infinite Volumes
You must restore the entire Snapshot copy of the infinite
volume.
The Snapshot copy must be in a valid state.
Restored Snapshot copies inherit the current efficiency
settings of the infinite volume.
60
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPIES ON INFINITE VOLUMES: GUIDELINES FOR RESTORING
SNAPSHOT COPIES OF INFINITE VOLUMES
Guidelines for restoring Snapshot copies of infinite volumes
You must restore the entire Snapshot copy of the infinite volume.
You cannot restore single files or parts of files.
You also cannot restore a Snapshot copy of a single constituent.
The Snapshot copy must be in a valid state.
You cannot use the admin privilege to restore a Snapshot copy of an infinite volume if the copy is in a partial
or invalid state, because the commands require diagnostic privilege. However, you can contact technical
support to run the commands for you. Restored Snapshot copies inherit the current efficiency settings of the
infinite volume.
If the State field contains a dash ("-") when you run the volume snapshot show command after
restoring a Snapshot copy of the infinite volume, one or more constituents are offline or have a different state
than the other constituents. To align the State field for constituents in an infinite volume, set the efficiency
settings again on the infinite volume.
For more information about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes
Management Guide.
2-79
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
References
NetApp University courses:
Clustered Data ONTAP Administration
NetApp Documentation
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Infinite Volumes Management Guide
Clustered Data ONTAP 8.3 Data Protection Tape Guide
NetApp Technical Report TR-4210:
Operational How-To Guide: NetApp Snapshot Management
61
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
2-80
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
What Ken Learned in this Module
I learned how to design and deploy an effective
Snapshot copy solution. I can now manage my
Snapshot copies effectively. I feel confident
restoring data from Snapshot copies, and I
understand how to give my users access to
recover their own data from Snapshot copies.
62
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHAT KEN LEARNED IN THIS MODULE
2-81
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Exercise
Module 2: Data Protection with
NetApp Snapshot Copies
Time Estimate: 30 Minutes
63
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
2-82
Data ONTAP Data Protection Administration: Data Protection with NetApp Snapshot Copies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module 3
NetApp Replication
Technologies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE 3: NETAPP REPLICATION TECHNOLOGIES
3-1
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module Objectives
After this module, you should be able to:
Compare deployment use cases for NetApp replication
solutions
Recognize important features of each replication solution
Understand design criteria for both SnapMirror and SnapVault
relationships
Recognize SnapMirror policy and Data ONTAP volume types
Understand cluster and storage virtual machine (SVM)
peering relationships
2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
3-2
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 1
Data ONTAP Replication
Technology
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 1: DATA ONTAP REPLICATION TECHNOLOGY
3-3
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Integrated Data Protection
Source
Volume
Mirrored
Volume
Snapshot
Copies
SnapMirror
WAN
SnapMirror
FlexClone
Volume
Mirrored
Volume
Tape
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INTEGRATED DATA PROTECTION
NetApp Snapshot technology is the foundation for SnapRestore, SnapManager, SnapDrive, SnapMirror,
FlexClone, and SnapVault operations.
Data protection capabilities are integrated within the Data ONTAP operating system. SnapMirror technology
is integrated with Snapshot technology. Because these technologies are integrated, you can quickly and
efficiently create on-disk replicas or point-in-time copies of data that do not require an actual copy operation.
You can use NetApp integrated data protection to create an on-disk, quickly accessible history of applicationconsistent Snapshot copies, which eliminates the need for traditional backup windows. SnapMirror software
then replicates the history of Snapshot copies to destination volumes that you can use for backup, disaster
recovery, or testing and development.
SnapMirror replication is efficient, because it replicates only the 4-kilobyte (KB) blocks that changed or were
added since the previous update. You gain efficiency when SnapMirror software is combined with NetApp
storage efficiency technologies. When FAS deduplication is used on the primary storage, only unique data is
replicated to the disaster recovery site. If compression is enabled on the source, then compression is
maintained on the destination. Data is not uncompressed, because it is replicated. These technologies can
result in telecommunications savings and significant storage capacity savings.
3-4
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror for Disaster Recovery
SnapMirror
Production Site
Disaster Recovery Site
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FOR DISASTER RECOVERY
SnapMirror technology is integral to disaster recovery planning. If critical data is replicated to a different
physical location, a serious disaster does not have to result in extended periods of unavailable data. Clients
can access replicated data across the network until the damage that is caused by the disaster is repaired.
Application servers at the recovery site can access replicated data to restore operations for business-critical
applications for as long as necessary to recover the production site. Recovery might include recovery from
corruption, natural disaster at the production site, accidental deletion, and so on.
If a disaster that requires a failover occurs, and the primary storage is not completely lost, SnapMirror
technology provides an efficient means of resynchronizing the primary and disaster recovery sites. When the
primary site is back online, SnapMirror technology resynchronizes the two sites, transferring only changed or
new data back to the primary site from the disaster recovery site. To do this, SnapMirror technology simply
reverses the SnapMirror relationships. After the primary production site resumes normal application
operations, the SnapMirror transfers to the disaster recovery facility resume without requiring another
complete data transfer.
3-5
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault for Long-Term Retention of Backups
Snapshot1
Snapshot2
Snapshot3
Snapshot4
Snapshot5
Snapshot1
Snapshot2
Snapshot3
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT FOR LONG-TERM RETENTION OF BACKUPS
SnapVault technology enables you to configure a policy that can retain more than two Snapshot copies on the
source and destination volumes. You can use SnapVault technology to restore data to the primary, similar to a
traditional backup application.
3-6
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
FlexClone Volumes for Disaster Recovery
Testing
Development Testing
Disaster Recovery Testing
SnapMirror
FlexCone
Volume
Snapshot
Copies
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FLEXCLONE VOLUMES FOR DISASTER RECOVERY TESTING
You can use NetApp FlexClone technology to quickly create a read/write copy of a SnapMirror destination
FlexVol volume, which eliminates the need for additional copies of the data.
3-7
For example, a 10-gigabyte (GB) FlexClone volume does not require another 10-GB FlexClone volume;
it requires only the metadata that is needed to define the FlexClone volume.
FlexClone volumes store only data that is written or changed after a clone is created.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data Distribution and Remote Data Access
SnapMirror
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA DISTRIBUTION AND REMOTE DATA ACCESS
You can use SnapMirror technology to distribute large amounts of data throughout the enterprise, which
enables read-only access to data at remote locations.
3-8
Remote data access provides faster access to data by clients in the remote locations.
Remote data access enables more efficient and more predictable use of expensive network and server
resources, because WAN usage occurs at a predetermined replication time. Storage administrators can
replicate production data at a specific time, to minimize overall network utilization.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Backup Offloading and Remote Tape Archiving
SnapMirror
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
BACKUP OFFLOADING AND REMOTE TAPE ARCHIVING
You can use SnapMirror technology for backup consolidation and for offloading tape backup overhead from
production servers.
3-9
The SnapMirror process facilitates centralized backup operations and reduces backup administrative
requirements at remote locations.
Because Snapshot technology eliminates the traditional backup window on the primary storage system,
you can greatly reduce the overhead of backup operations on production storage systems by offloading
tape backups to a SnapMirror destination.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Unified Architecture Flexibility
SnapMirror
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
UNIFIED ARCHITECTURE FLEXIBILITY
You can use SnapMirror technology between FAS and FlexArray Storage Virtualization Software storage
systems. You can deploy systems with different performance characteristics and different costs at the primary
and at disaster recovery sites.
For example, depending on the capabilities that are required, the disaster recovery site might contain these:
3-10
A lower-model storage system
SATA disk versus FC disk
The iSCSI or FCoE protocol versus FC
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NetApp Replication Technologies
Key Terminology
11
Data protection mirror copies
Primary volume
Secondary volume
Baseline transfer
Incremental transfer
SnapMirror label
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NETAPP REPLICATION TECHNOLOGIES: KEY TERMINOLOGY
Data protection mirror copies provide asynchronous disaster recovery.
Data protection mirror relationships enable you to perform these actions:
Periodically create Snapshot copies of data on one volume.
Copy those Snapshot copies to a partner volume (the destination volume), usually on another cluster.
Retain those Snapshot copies.
The mirror copy on the destination volume ensures quick availability and restoration of data from the time of
the latest Snapshot copy, if the data on the source volume is corrupted or lost.
A primary volume is a volume that contains data that is to be backed up.
In cascade or fan-out backup deployments, the primary volume is the volume that is backed up to a
SnapVault backup, regardless of where the SnapVault source is in the chain.
In a cascade or chain configuration in which A has a mirror relationship to B, and B has a SnapVault
relationship to C, B serves as the source for the SnapVault backup. B does this even though it is a
secondary destination in the chain.
A secondary volume is a volume to which data is backed up from a primary volume. Such a volume can be a
secondary or tertiary (and onward) destination in a cascade or fan-out backup configuration. The SnapVault
secondary system maintains Snapshot copies for long-term storage and possible restore operations.
A baseline transfer is an initial complete backup of a primary storage volume to a corresponding volume on
the secondary system.
An incremental transfer is a follow-up backup to the secondary system that contains only the changes to the
primary data since the last transfer action.
3-11
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
A SnapMirror label is an attribute that identifies Snapshot copies for the purpose of selection and retention
in SnapVault backups. Each SnapVault policy configures the rules for selecting Snapshot copies on the
primary volume and transferring the Snapshot copies that match a given SnapMirror label.
3-12
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Answer this Question
Which NetApp replication technology allows you to retain as
many Snapshot copies as you need?
a) SnapMirror
b) SnapVault
c) All of the above
d) None of the above
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ANSWER THIS QUESTION
3-13
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 2
Design Criteria for SnapVault
and SnapMirror Relationships
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: DESIGN CRITERIA FOR SNAPVAULT AND SNAPMIRROR
RELATIONSHIPS
3-14
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
What are the rules for deploying a
SnapVault solution?
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
3-15
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
General Guidelines for SnapVault
Relationships
1 of 2
A volume can be in multiple relationships.
A volume can be the secondary volume for only one
relationship.
Multiple primary volumes cannot replicate to a single
secondary volume.
SnapVault can integrate with data protection mirror
relationships.
Primary or secondary volumes cannot be 32-bit volumes.
The primary volume of a SnapVault backup should not be a
FlexClone volume.
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
GENERAL GUIDELINES FOR SNAPVAULT RELATIONSHIPS: 1 OF 2
The following guidelines apply to all SnapVault relationships:
3-16
A volume can be in multiple relationships, either as the secondary or the primary. A volume can be the
primary for multiple secondary volumes and also the secondary volume for another primary volume.
A volume can be the secondary volume for only one SnapVault relationship.
You cannot configure SnapVault relationships from multiple primary volumes to a single SnapVault
secondary volume. For example, if you want to back up an entire SVM to a SnapVault backup, then you
must create a separate secondary volume for each volume in the SVM and create a separate SnapVault
relationship for each primary volume.
You can configure SnapVault relationships to be used simultaneously with data protection mirror
relationships.
Primary or secondary volumes cannot be 32-bit volumes.
The primary of a SnapVault backup should not be a FlexClone volume. The relationship will work, but
the efficiency that is provided by FlexClone volumes is not preserved.
Primary and secondary volumes must have the same volume language settings.
After you establish a SnapVault relationship, you cannot change the language that is assigned to the
secondary volume.
A SnapVault relationship can be only one leg of a cascade chain.
After you establish a SnapVault relationship, you can rename primary or secondary volumes. If you
rename a primary volume, it can take a few minutes for the relationship to recover from the name change.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
General Guidelines for SnapVault
Relationships
2 of 2
Primary and secondary volumes must have the same volume
language settings.
After you establish a SnapVault relationship, you cannot
change the language that is assigned to the secondary
volume.
A SnapVault relationship can be only one leg of a cascade
chain.
After you establish a SnapVault relationship, you can rename
primary or secondary volumes.
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
GENERAL GUIDELINES FOR SNAPVAULT RELATIONSHIPS: 2 OF 2
The following guidelines apply to all SnapVault relationships:
3-17
A SnapVault secondary volume cannot be the primary volume of FlexCache volumes.
Primary and secondary volumes must have the same volume language settings.
After you establish a SnapVault relationship, you cannot change the language that is assigned to the
secondary volume.
A SnapVault relationship can be only one leg of a cascade chain.
After you establish a SnapVault relationship, you can rename primary or secondary volumes. If you
rename a primary volume, it can take a few minutes for the relationship to recover from the name change.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Planning the Snapshot Copy Schedule
SnapVault technology allows flexibility in planning Snapshot
scheduling and retention.
Choose an appropriate Snapshot label.
The SnapVault policy contains important information about
the relationship.
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
PLANNING THE SNAPSHOT COPY SCHEDULE
It is important to plan the Snapshot copy transfer schedule and retention for your SnapVault backups.
When planning SnapVault relationships, consider these guidelines:
Before you create a SnapVault policy, you should plan which Snapshot copies you want to replicate to the
SnapVault secondary volume and how many of each copy you want to keep. For example:
The primary volume should have an assigned Snapshot policy that creates Snapshot copies at the intervals
you need and that labels each Snapshot copy with the appropriate snapmirror-label attribute name.
The SnapVault policy that is assigned to the SnapVault relationship:
3-18
Hourly (periodically throughout the day): Does the data change often enough throughout the day to make it
worthwhile to replicate a Snapshot copy every hour, every two hours, or every four hours?
Nightly: Do you want to replicate a Snapshot copy every night, or just on workday nights?
Weekly: How many weekly Snapshot copies is it useful to keep in the SnapVault secondary volume?
The policy should select the Snapshot copies that you want from the primary volume, which are identified by
the snapmirror-label attribute name.
The policy should specify how many Snapshot copies of each name you want to keep on the SnapVault
secondary volume.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault and Storage Efficiencies
A new feature for the clustered Data ONTAP version of
SnapVault software is the ability to preserve the storage
efficiencies of the primary volume throughout a SnapVault
transfer.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT AND STORAGE EFFICIENCIES
Preserving storage efficiencies
If deduplication and compression are enabled on the primary volume, these efficiencies are preserved
during SnapVault transfers. The result:
Less data that is transmitted over the network
Shorter backup windows
Bandwidth savings
In addition, data is already deduplicated and compressed on the secondary volume after the SnapVault
transfer completes, without running the deduplication and compression processes on the secondary
volume.
A successful SnapVault transfer requires at least the same amount of available free space on the
secondary volume as is required to copy the data from the primary volume in a nondeduplicated and
noncompressed format. During the SnapVault transfer, it appears that the expanded size of the primary
data is consumed on the secondary. However, as soon as the transfer completes, the storage efficient
dataset size is reflected in the amount of space that is consumed.
Deduplication and compression can run on the secondary volume after the SnapVault transfer has
completed, independent of the storage efficiencies that are present on the primary volume. However,
enabling the compression process to run on the SnapVault secondary volume causes the storage
efficiencies that are present on the primary volume to not be preserved on the SnapVault secondary
volume.
For more information about this caveat and other best practices that are associated with using storage
efficiencies with SnapVault software, refer to section 14.1 of TR-3966: NetApp Data Compression and
Deduplication Deployment and Implementation Guide. TR-3966 also helps you understand how much disk
space you can save by using storage efficiencies with SnapVault software.
3-19
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault Sizing Considerations
Disk space
Data throughput
Client I/O impact
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT SIZING CONSIDERATIONS
Disk space
The SnapVault secondary, or target, volume must be sized so that adequate disk space is available to
retain all of the planned backups. You can estimate this space fairly accurately by using known
information about the primary data and the required recovery point objectives (RPOs).
This calculation is independent of the systems that are used.
The data that you need to calculate the required disk space on the SnapVault target is calculated with this
information:
The size of the primary data
The size of the daily, weekly, and monthly data change rates
The number of daily, weekly, and monthly backup copies to be kept
The space savings that can be anticipated by using NetApp deduplication and compression
Data throughput
It is also important to size a SnapVault solution so that data can be transferred fast enough to complete
backups in the amount of time that is available.
3-20
First, determine how much data, on average, is transferred in a SnapVault incremental update and how
much time must be allotted to complete the backup.
Then, use these numbers to determine the required data throughput in units such as megabytes per second.
If you have multiple SnapVault relationships, remember to consider the size of all the backups that must
be completed during a given backup window.
After you determine the required data throughput speed, select an appropriate NetApp FAS system that
can handle the data speed that is required.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Client I/O impact
When sizing a SnapVault solution, consider the impact of the SnapVault processes on the other workloads
that are running on a system. Clients generally experience more latency with a greater number of concurrent
SnapVault streams. If a large number of transfers need to take place during a given backup window, it may be
best to stagger the updates so that they dont all run at the same time and cause unacceptable latency to
clients.
For example, if 80 relationships must update within a 10-hour window, and it is determined that, on average,
eight concurrent updates can finish in one hour, then you can create a transfer schedule that starts eight new
updates every hour during the given 10-hour window.
When sizing a SnapVault solution, first establish an acceptable client I/O latency threshold. Then, determine
what the client I/O latency impact will be for a specific configuration, based on these factors:
3-21
The system that is used
The type of dataset that is backed up
The number of concurrent transfers that are needed to complete all backups within a given window
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Basic Backup Deployment
The SnapMirror
source volume is
online and writable.
20
The SnapMirror
destination volume
is online and readonly.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
BASIC BACKUP DEPLOYMENT
A basic data protection deployment consists of two volumes, either FlexVol volumes or infinite volumes, in a
one-to-one, source-to-destination relationship. This deployment backs up data to one location, which provides
a minimal level of data protection.
Source volumes are the data objects that need to be replicated. Typically, users can access and write to
source volumes.
Destination volumes are data objects to which the source volumes are replicated. Destination volumes are
read-only.
3-22
Destination FlexVol volumes are usually placed on a different SVM from the source SVM.
Destination infinite volumes must be placed on a different SVM from the source SVM.
Destination volumes can be accessed by users, in case the source becomes unavailable.
Administrators can use SnapMirror commands to make the replicated data at the destination accessible and
writable.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Fan-Out and Cascade Relationships
Fan-out (one-to-many relationship):
Mirror-SnapVault fan-out (FlexVol volumes only)
Multiple-mirrors fan-out (FlexVol volumes and infinite volumes)
Cascade (one-to-one-to-one relationship):
Mirror-mirror cascade (FlexVol volumes only)
Mirror-SnapVault cascade (FlexVol volumes only)
SnapVault-mirror cascade (FlexVol volumes only)
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAN-OUT AND CASCADE RELATIONSHIPS
3-23
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Fan-Out Topologies
Mirror-SnapVault Fan-Out
SnapMirror
SnapVault
Multiple Mirrors Fan-Out
SnapMirror
SnapMirror
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAN-OUT TOPOLOGIES
Fan-out topologies
In a fan-out topology, a single primary volume is replicated to multiple destinations.
A primary volume can be protected and backed up.
A read-only copy is available at a secondary site.
Only one SnapVault relationship is allowed in a fan-out topology.
3-24
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Cascading SnapVault and SnapMirror
Relationships
Mirror-SnapVault Cascade
SnapMirror
SnapVault
SnapVault-SnapMirror Cascade
SnapVault
SnapMirror
Mirror-Mirror Cascade
SnapMirror
23
SnapMirror
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CASCADING SNAPVAULT AND SNAPMIRROR RELATIONSHIPS
Cascading SnapMirror and SnapVault relationships are supported in clustered Data ONTAP 8.3.
A SnapMirror secondary can be the source of a SnapVault relationship (backing up a data recovery
mirror), or a SnapVault secondary can be the source of a SnapMirror relationship (protecting a backup).
In the case of a SnapMirror to SnapVault relationship, it is not possible to specify which Snapshot copies
are transferred to the SnapVault secondary; SnapVault always transfers the SnapMirror exported
Snapshot copy or the base copy of the SnapMirror relationship. This is similar to the snapmirror
base snapshot only option in Data ONTAP operating in 7-Mode.
An administrator can choose the following:
When the most recent version of the SnapMirror exported Snapshot copy is transferred to the SnapVault
secondary
How many copies to keep on the SnapVault secondary
Only one SnapVault relationship is supported in a cascade chain configuration, but many SnapVault
relationships are supported in a fan-out configuration; multiple mirror relationships are supported.
The longer you configure a chain of relationships, or the more you add fan-out destinations, the greater the
risk that Snapshot copies will be locked on the source. Depending on the update schedule, the worst case is
when one Snapshot copy is locked for each cascade or fan-out destination.
3-25
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Fan-In SnapVault Topologies
SnapVault
Fan-In
Storage
System B
Storage
System C
Storage
System A
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAN-IN SNAPVAULT TOPOLOGIES
Fan-in topologies
In a fan-in topology, multiple SnapVault primaries back up to one SnapVault secondary. The primary use
case for this topology is multiple remote sites that back up to one central data center.
System-level fan-in
In clustered Data ONTAP, because the relationships are configured at the volume level, it is not possible to
back up multiple volumes to one secondary volume. However, it is possible to back up SnapVault primary
volumes from multiple SVMs and clusters to separate volumes in a single destination SVM, which can be in a
different cluster.
3-26
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Creating a Tiered Backup Policy
In a tiered backup strategy, a SnapVault policy can have
several rules. Each rule identifies a different set of Snapshot
copies.
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CREATING A TIERED BACKUP POLICY
Data ONTAP uses the snapmirror-label attribute to identify Snapshot copies between primary and
secondary FlexVol volumes in a SnapVault relationship. When you configure rules in a SnapVault policy,
you enter the snapmirror-label name that you want to use to identify the Snapshot copies to which the
rule applies.
In a tiered backup strategy, a SnapVault policy might have several rules, and each rule identifies a different
set of Snapshot copies. In this example, you have a volume to which you have assigned a Snapshot policy that
specifies the following schedule:
3-27
An hourly Snapshot copy: Every two hours, a Snapshot copy is created and is assigned the attribute
snapmirror-label hourly.
A daily Snapshot copy: Every day at 5:00 p.m., a Snapshot copy is created and is assigned the attribute
snapmirrorlabel daily.
A weekly Snapshot copy: Every Friday at 6:00 p.m., a Snapshot copy is created and is assigned the
attribute weekly.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Design Considerations
Naming Guidelines
Before you create a SnapMirror policy or SnapVault policy,
create a unique policy name.
Cluster-wide policy names must be unique within the
cluster and must not conflict with any SVM-wide policy
names.
SVM-wide policy names must be unique within the SVM in
which the policy is created. However, an SVM policy name
can be the same as a policy name that was created in a
different SVM, as long as the name does not conflict with
any cluster-wide policy name.
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR DESIGN CONSIDERATIONS: NAMING GUIDELINES
Cluster-wide policy names must be unique within the cluster and must not conflict with any SVM-wide policy
names.
SVM-wide policy names must be unique within the SVM in which the policy is created. However, an SVM
policy name can be the same as a policy name that was created in a different SVM, if the name does not
conflict with any cluster-wide policy names.
Path name pattern matching:
You can use pattern matching when you use SnapMirror commands, so that the command works on
selected mirroring relationships.
SnapMirror commands use fully qualified path names in the following format: vserver:volume. You can
abbreviate the path name if you do not enter the SVM name. In such a case, the SnapMirror command
assumes the local SVM context of the user.
For example, if the SVM is called vserver1 and the volume is called vol1, the fully qualified path
name is vserver1:vol1.
You can use the asterisk (*) in paths as a wildcard to select matching, fully qualified path names. The
following table provides examples of using the wildcard to select a range of volumes.
*
Matches all paths
vs*
Matches all SVMs and volumes with SVM names that begin with vs
*:*src*
Matches all SVMs with volume names that contain the src text
*:vol*
Matches all SVMs with volume names that begin with vol
Language setting requirements:
3-28
Source and destination FlexVol volumes or infinite volumes of a mirror relationship must use the same
language setting; otherwise, NFS or CIFS clients might be unable to access data.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
3-29
For FlexVol volumes, it is not a problem if the source and destination volumes are located on the same
SVM, because the language is set on the SVM.
For FlexVol volumes and infinite volumes with mirror relationships between volumes on two different
SVMs, the language setting on the SVMs must be the same.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Limitations for Data Protection Mirror
Relationships
1 of 2
Snapshot copies cannot be deleted on destination
volumes.
An empty junction path on a destination FlexVol volume is
not accessible from CIFS clients.
A FlexClone volume should not be the source of a data
protection mirror relationship.
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LIMITATIONS FOR DATA PROTECTION MIRROR RELATIONSHIPS: 1 OF 2
Snapshot copies cannot be deleted automatically on destination volumes:
You cannot automatically delete old Snapshot copies on destination FlexVol volumes or infinite volumes
of mirror relationships, because the destination volume is a read-only version of the source volume. The
destination volume should contain the same data as the source volume.
This is not true of Snapshot copies on destination FlexVol volumes of SnapVault relationships. You can
delete old Snapshot copies on SnapVault secondary volumes.
If you use the snap autodelete command to automatically delete Snapshot copies from a destination
volume, to remove older Snapshot copies, the execution will fail.
An empty junction path on a destination volume is not accessible from CIFS clients:
If internally mounted FlexVol volumes form a namespace, and you have a mirror relationship, CIFS
clients on a destination volume that attempt to view mirrored volumes that are not at the highest level of
the namespace are denied access.
This situation occurs when you create a namespace by using more than one volume, in which one volume
is the source volume of a mirror relationship and the other volumes are members of the namespace. For
example, assume that you have two volumes: vol x, which has a junction path /x, and vol y, which has a
junction path /x/y:
When a SnapMirror transfer occurs, a directory under vol x is created for vol y on the destination volume.
From an NFS client, you can see that the directory is empty, but from a CIFS client, you get the following
message: access is denied.
The primary of a SnapVault backup should not be a FlexClone volume. The relationship will work, but the
efficiency that is provided by FlexClone volumes is not preserved.
3-30
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Limitations for Data Protection Mirror
Relationships
2 of 2
Fan-out limits depend on the type of mirror relationship that
you want to fan out from a single source volume:
For load-sharing mirror relationships, you can fan out a
maximum of one destination volume per node for one
source volume.
For data protection mirror relationships, you can fan out a
maximum of eight destination volumes from one source
volume.
A source volume can have both one load-sharing
destination volume on a node and eight data protection
destination volumes.
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LIMITATIONS FOR DATA PROTECTION MIRROR RELATIONSHIPS: 2 OF 2
Mirror relationship fan-out limits
When you are planning the number and types of mirror relationships for a source volume, remember that the
source volume is limited in the number of destination volumes that it can have.
Fan-out limits depend on the type of mirror relationship that you want to fan out from a single source volume:
3-31
For load-sharing mirror relationships, you can fan out a maximum of one destination volume on a node
for a single source volume.
The maximum number of nodes within a cluster depends on the platform model and licensed protocols.
For detailed information about cluster size limits, see the Hardware Universe (formerly the System
Configuration Guide) at support.netapp.com/knowledge/docs/hardware/NetApp/syscfg/ index.shtml.
For data protection mirror relationships, you can fan out a maximum of four destination volumes from a
single source volume.
A single source volume can contain both one load-sharing destination volume on a node and four data
protection destination volumes.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Topic for Discussion
What is a good reason to deploy load-sharing mirror
relationships?
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TOPIC FOR DISCUSSION
3-32
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Load-Sharing Mirror Copies for ReadOnly Workloads
The server accesses
the read/write admin
path to the source
volume.
RW
SnapMirror
LS*
LS*
LS*
LS*
Read-Only
LS Mirror Copies
NFSv3 and CIFS clients access read-only from multiple copies.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOAD-SHARING MIRROR COPIES FOR READ-ONLY WORKLOADS
To improve performance for read-only workloads, you can use load-sharing mirror copies to distribute data
volumes to other nodes in the cluster.
Load-sharing mirrors for SVM namespace root volumes:
A namespace root volume is very small. It contains only directories that are used as mount points, which
are the paths where data volumes are junctioned (mounted) into the namespace.
However, namespace root volumes are extremely important for NAS clients, which are not able to access
data if the SVM root volume is unavailable.
SAN client connections (that is, FC, FCoE, or iSCSI) do not depend on the SVM root volume.
Best practice:
Create a load-sharing mirror copy of a NAS SVM namespace root volume on every node in the cluster, so
that the root of the namespace is available, regardless of node outages or node failovers.
3-33
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 3
Policies and Volume Types
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 3: POLICIES AND VOLUME TYPES
3-34
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
What are the different volume types I
keep hearing about?
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
3-35
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Volume Types
Volume types:
FlexVol volumes
Infinite volumes
Volume variations:
FlexClone volumes
Data protection mirrors
Load-sharing mirrors
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VOLUME TYPES
3-36
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
FlexVol Volumes
Flexible volumes in clustered Data ONTAP are the same as in
environments with Data ONTAP 7G or Data ONTAP operating
in 7-Mode.
Any single volume can exist within a single data SVM only.
Volumes are joined together through junctions to create the
namespace of an SVM.
Volumes are the unit of data management. Volumes can be
moved, copied, mirrored, backed up, or copied by using
Snapshot copies.
Data ONTAP 7-Mode volumes cannot be used in clustered
Data ONTAP systems, and vice versa.
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FLEXVOL VOLUMES
Clustered Data ONTAP systems use flexible volumes differently than Data ONTAP 7-Mode and Data
ONTAP 7G systems do. Because Data ONTAP clusters are inherently flexible, largely due to the volume
move capability, volumes are deployed as freely as UNIX directories and Windows folders are deployed to
separate logical groups of data.
You can perform these actions:
Create and delete volumes.
Mount and unmount volumes.
Move volumes around.
Back up volumes.
To take advantage of this flexibility, cluster deployments typically use many more volumes than traditional
Data ONTAP 7G deployments use. In a high-availability (HA) pair, aggregate and volume limits apply to
each node individually, thus, the overall limit for the pair is effectively doubled.
3-37
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Infinite Volumes
Definition
Applications
Applications
OnCommand System Manager or Cluster Shell
NFSv3, NFSv4.1, pNFS, CIFS
Clustered Data ONTAP 8.3 Operating System
Single Namespace, Single Storage Pool
Up to 2 Billion Files (16-Terabyte [TB] Maximum File Size)
NAS Container (More than 20 Petabytes [PB] of Raw Capacity)
Two to Ten Nodes
in a Cluster
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INFINITE VOLUMES: DEFINITION
Infinite volumes are boundless, easily administered, scalable containers that exceed the current Data ONTAP
limits for FlexVol capacity. Infinite volumes are ideal for customers who need a single storage pool in a
single namespace across an entire cluster.
Infinite volumes consist of many FlexVol volumes. However, these volumes are presented to the storage
administrator as a single manageable volume.
The constituents of an infinite volume are standard FlexVol volumes.
Individual constituents are not managed by the storage administrator.
Although the constituents are not visible in the default displays, the administrator can choose options to
view the constituents.
To learn more about infinite volumes, refer to the Clustered Data ONTAP 8.3 Infinite Volumes Management
Guide.
3-38
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
FlexClone Volumes
cluster1::> volume clone
create -vserver svm1
-flexclone vol1clone
-parent-volume svm_vol1
Aggregate
FlexVol Volume
Snapshot
Copy of
svm_vol1 Parent
vol1clone
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FLEXCLONE VOLUMES
A FlexClone volume is a point-in-time, space-efficient, writable copy of the parent volume.
A FlexClone volume is a fully functional standalone volume.
If changes are made to the parent volume after the FlexClone volume is created, those changes are not
reflected in the FlexClone volume, and changes to the FlexClone volume are not reflected in the parent
volume.
FlexClone volumes are created in the same SVM (which was previously known as a Vserver) and aggregate
as the parent volume, and FlexClone volumes share common blocks with the parent volume.
While a FlexClone copy of a volume exists, the parent volume cannot be deleted or moved to another
aggregate.
You can sever the connection between the parent and the FlexClone volume by executing a split
operation. A FlexClone split causes the FlexClone volume to use its own disk space, but the FlexClone
split enables you to delete the parent volume and to move the parent or the FlexClone volume to another
aggregate.
To manage cloning on a cluster, use the volume clone command.
3-39
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Load-Sharing and Data Protection Mirror
Copies
RW
DP
Load-sharing and data
protection mirror copies are
similar in concept, but the type
determines how the mirror copy
is used and maintained.
37
RW
LS
LS
LS
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOAD-SHARING AND DATA PROTECTION MIRROR COPIES
Mirror copies are read-only volumes.
Each mirror copy has an association read/write volume.
Each mirror copy is labeled as a load-sharing mirror copy or a data protection mirror copy.
Mirror copies are copies of read/write volumes.
Mirror copies are synchronized with the read/write source volumes only if an administrator keeps the
mirror copies synchronized through manual replication or scheduled (automated) replication.
Generally, data protection mirror copies do not need to be as up-to-date as load-sharing mirror copies,
because they serve different purposes.
A replication schedule can be associated with each mirror copy. The schedule determines when (cron) or how
often (interval) replications are performed on the mirror copy.
All load-sharing mirror copies of a volume are treated as a unified group and use the same schedule.
The schedule is enforced by the UI, so if you choose a different schedule for one load-sharing mirror
copy, the other load-sharing mirror copies of that volume are automatically changed to match.
Each data protection mirror copy is independent; it does not have to use the same schedule as other data
protection mirror copies.
Load-sharing mirror relationships stay within the SVM of the source volume. Data protection mirror copies
can be within a SVM, between SVMs within the cluster, or between SVMs of two different clusters.
3-40
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror and SnapVault Relationships
To manage a data protection mirror or SnapVault relationship,
you must assign a policy and a schedule to the relationship.
SnapMirror
Policy
SnapMirror
Relationship
RW
38
DP
Schedule
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR AND SNAPVAULT RELATIONSHIPS
When a SnapMirror and SnapVault relationship is created, an optional update schedule is applied. The cron
job schedule is normally created to control the frequency of the SnapMirror or SnapVault update.
You use a policy to maximize the efficiency of the transfers to the backup secondaries and to manage the
update operations.
A SnapMirror and SnapVault policy consists of the following:
Vserver name: The SVM for the policy
Policy name: Must be unique within the cluster or SVM
Policy type: Vault, async-mirror, mirror-vault, sync-mirror
Comment: Text comment
Tries: Number of times to attempt each transfer
Transfer-priority: Normal or low
Ignore-atime: Whether incremental transfers ignore files that have had only their access time changed
(applies only to vault relationships)
Restart: Defines the behavior if an interrupted transfer exists
Is-network-compression-enabled: Enables or disables network compression for transfers
FlexVol volumes support data protection mirror and SnapVault relationships and policies. Infinite volumes
support only data protection mirror relationships and policies.
3-41
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Cluster administrators use snapmirror policy commands to create and manage all data protection
mirror and SnapVault policies. SVM administrators use the same commands to create and manage all data
protection mirror and SnapVault policies within SVMs.
All policy-management commands (except for the snapmirror policy show command) must be
run on the SVM that contains the destination volume.
3-42
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 4
Cluster and SVM Peering
39
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: CLUSTER AND SVM PEERING
3-43
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
How can I get the SVMs in my two
clusters to replicate data?
40
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
3-44
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Cluster and SVM Peering
Before you can set up a SnapMirror or SnapVault
relationship between volumes in different clusters or
different SVMs, a peering relationship must exist.
A peer relationship between two clusters or SVMs
enables the backup and recovery of data on clusters or
SVMs.
Data ONTAP 8.3 supports up to 255 cluster peer
relationships.
41
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTER AND SVM PEERING
If you establish cluster peer relationships, you can create data protection mirroring relationships from one
cluster to another, and you can manage the jobs on a remote cluster.
Cluster peer authentication
Before creating a cluster peer relationship, the administrators of the two clusters that will be peers agree on a
text string, which is called a passphrase, that they will use to authenticate one cluster to the other.
The passphrase is used when the relationship from the first cluster to the second cluster is created.
The passphrase is used again when the relationship from the second cluster to the first cluster is created.
NOTE: The passphrase is not exchanged on the network by the Data ONTAP operating system. However,
when Data ONTAP creates the cluster peer relationship, each cluster in the relationship recognizes the
passphrase.
3-45
When you create the cluster peer relationship from the first cluster to the second cluster, the first cluster
waits for the administrator of the second cluster to create the cluster peer relationship.
The administrator of the second cluster must create the cluster peer relationship before the waiting period
expires, within one hour by default.
If the cluster peer relationship is not created from the second cluster to the first cluster before the waiting
period expires, the cluster peer relationship is not created, and the administrators must restart the process.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Cluster Peering and SVM Peering
Compare Cluster and SVM Peering
Cluster Peering
SVM Peering
Cluster peering enables data to be
backed up across cluster volumes or
SVM volumes.
SVM names must be unique.
The relationship can be authenticated
or unauthenticated.
SVM peering can be intercluster or
intracluster.
Cluster peering requires an intercluster Intercluster peering requires cluster
network.
peering to be functional first.
Peering network topologies should be designed for fault
tolerance.
42
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTER PEERING AND SVM PEERING: COMPARE CLUSTER AND SVM PEERING
3-46
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Cluster Peering Requirements
Requirements of a Cluster Peer (1 of 2)
Cluster time must be synchronized within 300 seconds.
(Clusters can be in different time zones.)
At least one intercluster LIF must be created on every
node in the cluster.
Every intercluster LIF requires an IP address that is
dedicated for intercluster replication.
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTER PEERING REQUIREMENTS: REQUIREMENTS OF A CLUSTER PEER
(1 OF 2)
Requirements for a cluster peer relationship:
3-47
Cluster time must be synchronized within 300 seconds (clusters can be in different time zones).
At least one intercluster LIF must be created on every node in the cluster.
Every intercluster LIF requires an IP address that is dedicated for intercluster replication.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Cluster Peering Requirements
Requirements of a Cluster Peer (2 of 2)
All paths on a node that is used for intercluster networking
should have equal performance characteristics.
The intercluster network must provide connectivity among
all intercluster LIFs on all nodes in the cluster peers.
Every intercluster LIF on every node in a cluster must be
able to connect to every intercluster LIF on every node in
the peer cluster.
44
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTER PEERING REQUIREMENTS: REQUIREMENTS OF A CLUSTER PEER
(2 OF 2)
Requirements for a cluster peer relationship:
3-48
The correct maximum transmission unit (MTU) value must be used.
All paths on a node that is used for intercluster networking should have equal performance characteristics.
The intercluster network must provide connectivity among all intercluster LIFs on all nodes in the cluster
peers.
Every intercluster LIF on every node in a cluster must be able to connect to every intercluster LIF on
every node in the peer cluster.
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Intercluster Peering Network Connections
Multiple TCP Connections, One LIF
Intercluster LIF
To send data, Data ONTAP
establishes a minimum of 12
intercluster TCP connections.
12 TCP
connections that
share one LIF
Intercluster LIF
45
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INTERCLUSTER PEERING NETWORK CONNECTIONS: MULTIPLE TCP
CONNECTIONS, ONE LIF
In clustered Data ONTAP, the number of intercluster LIFs determines the number of TCP connections that
are established between the source and destination node for SnapMirror technology. TCP connections are not
created per volume or per relationship.
Remember that, starting with the clustered Data ONTAP 8.2 operating system, Data ONTAP establishes
at least 12 intercluster TCP connections for sending data. This is true even if the source and destination
nodes have only one intercluster LIF. Enough connections are created so that all intercluster LIFs on both
the source and destination nodes are used.
If the source node, the destination node, or both nodes are configured with two intercluster LIFs, then
Data ONTAP establishes 12 TCP connections for sending data. However, both connections do not use the
same LIFs. Instead, one connection uses one LIF pair, and the other connection uses the other LIF pair. It
is not possible to select a specific LIF pair to use for a certain TCP connection; Data ONTAP manages the
LIF pairs automatically.
After scaling past 12 intercluster LIFs on a node, Data ONTAP creates additional intercluster TCP
connections. Enough connections are created so that all intercluster LIFs are used.
The creation of additional intercluster TCP connections continues, as more intercluster LIFs are added to
either the source node or the destination node. Currently, a maximum of 24 intercluster connections are
supported for SnapMirror technology on a single node in Data ONTAP.
Best practice
To ensure operational consistency, the same number of intercluster LIFs can be configured on both the source
node and destination node. However, this configuration is not required. Multiple intercluster LIFs can be
created to enable active-active multipathing across multiple physical paths.
For example, if a node is configured with four 1-gigabit Ethernet (GbE) ports for intercluster replication, then
four intercluster LIFs are required. One LIF is assigned to each port, to ensure that all paths are used to
provide bandwidth beyond just one 1-GbE link.
3-49
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Cluster Peering Topologies
Cluster 1
Cluster 2
Intercluster LIF
Intercluster LIF
An intercluster network must be created.
Intercluster replication occurs between two clusters on
the intercluster network only.
46
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTER PEERING TOPOLOGIES
To ensure constant reliable communication, the best cluster peering topology is full-mesh connectivity. Full
mesh means that all intercluster LIFs in a cluster can communicate with all intercluster LIFs on all remote
clusters.
To enable intercluster communication, an intercluster network must be created. Intercluster LIFs must be
created for this explicit purpose. Intercluster replication occurs between two clusters on the intercluster
network only.
The IP addresses that are used for the intercluster LIFs can reside on the same subnet as data LIFs, or they can
reside in a different subnet. When you create an intercluster LIF, you automatically create an intercluster
routing group on that node. You can assign intercluster LIFs to ports that have the data role, or you can
dedicate ports to the intercluster role.
3-50
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SVM Peering and Cluster Peering
SVM1
SVM Peer Relationship
SVM3
SVM2
SVM4
Cluster 1
Cluster 2
Cluster Peer Relationship
47
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM PEERING AND CLUSTER PEERING
SVM peering is the act of connecting two SVMs, to allow replication to occur between them.
Before you create SnapMirror relationships between a pair of SVMs, an SVM peer relationship must exist
between the pair of SVMs.
These SVMs can be local (intracluster) or remote (intercluster).
SVM peering is a permission-based mechanism.
SVM peering is a one-time operation that must be performed by the cluster administrators.
The SVM peer infrastructure enables you to set up a backup and recovery mechanism between SVMs. You
can set up a mirroring relationship at the volume level between peered SVMs. If a volume in the SVM
becomes unavailable, the cluster administrator or SVM administrator can configure the respective mirrored
volume of the peered SVM to serve data.
One SVM can be peered with multiple SVMs within a cluster or across clusters.
You can set up only SnapMirror data protection and SnapVault (XDP) relationships by using the SVM peer
infrastructure.
3-51
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Firewall Requirements for Intercluster
SnapMirror Technology
Open the following ports on the intercluster network between all
source and destination nodes:
Port 11104
Port 11105
Clustered Data ONTAP uses port 11104 to manage intercluster
communication sessions; it uses port 11105 to transfer data.
48
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FIREWALL REQUIREMENTS FOR INTERCLUSTER SNAPMIRROR TECHNOLOGY
3-52
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 5
Implementing Cluster and
SVM Peering
49
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 5: IMPLEMENTING CLUSTER AND SVM PEERING
3-53
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Are there existing peer relationships between SVMs or
clusters?
cluster1::> cluster peer show
This table is currently empty.
cluster1::> vserver peer show
There are no SVM peer relationships.
50
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS
3-54
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Create Failover Groups for Intercluster Networking
This command creates
the failover group and
assigns port e0c to it.
cluster1::> network interface failover-groups create
-vserver cluster1 -failover-group failover_cluster1
-targets cluster1-01:e0c
cluster1::> network interface failover-groups addtargets -vserver cluster1 -failover-group
failover_cluster1 -targets cluster1-01:e0d
This command adds port e0d to the failover group.
Note that you used the admin vserver (cluster1) in
these commands.
51
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CREATE FAILOVER GROUPS FOR
INTERCLUSTER NETWORKING
3-55
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Perform the Same Steps on Node2 of the Cluster
You must create a failover group with a unique name:
cluster1::> network interface failover-groups
create -vserver cluster1 -failover-group
failover_cluster1-2 -targets cluster1-02:e0c
cluster1::> network interface failover-groups addtargets -vserver cluster1 -failover-group
failover_cluster1-2 -targets cluster1-02:e0d
52
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: PERFORM THE SAME STEPS ON
NODE2 OF THE CLUSTER
3-56
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Create an Intercluster LIF on Each Node in the Cluster (1 of 2)
cluster1::> network interface create -vserver
cluster1 -lif failover_cluster1 -role intercluster
-home-node cluster1-01 -home-port e0c -address
192.168.1.50 -netmask 255.255.255.0 -failovergroup failover_cluster1 -failover-policy localonly -firewall-policy intercluster
This command creates the intercluster LIF
on node cluster1-01.
53
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CREATE AN INTERCLUSTER LIF ON
EACH NODE IN THE CLUSTER (1 OF 2)
3-57
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Create an Intercluster LIF on Each Node in the Cluster (2 of 2)
This command creates the intercluster LIF on node cluster1-02:
cluster1::> network interface create -vserver
cluster1 -lif failover_cluster1-2 -role
intercluster -home-node cluster1-02 -home-port e0c
-address 192.168.1.60 -netmask 255.255.255.0
-failover-group failover_cluster1 -failover-policy
local-only -firewall-policy intercluster
54
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CREATE AN INTERCLUSTER LIF ON
EACH NODE IN THE CLUSTER (2 OF 2)
3-58
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Check the Network Interface Configuration
Verify that the intercluster LIFs were created properly:
cluster1::> network interface show -role
intercluster
Verify that the intercluster LIFs are configured to be
redundant:
cluster1::> network interface show -role
intercluster -failover
55
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CHECK THE NETWORK INTERFACE
CONFIGURATION
Check your work. Verify that the intercluster LIFs were created properly:
cluster1::> network interface show -role intercluster
SVM
Logical
Status
Current
Is
Interface
Admin/Oper
------ ----------
Network
Address/Mask
Node
Current
Port
Home
------ ----
---------- -------------
--------
up/up
cluster1-0
e0c
true
cluster1-02
e0c
true
cluster1
failover_cluster1
192.168.1.50/24
failover_cluster1-2 up/up 192.168.1.60/24
2 entries were displayed.
Verify that the intercluster LIFs are configured to be redundant:
3-59
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
cluster1::> network interface show -role intercluster failover
Logical
Home
Failover
Failover
Vserver
Interface
Node:Port
Policy
Group
--------
----------
--------------
----------
failover_cluster1 cluster1-01:e0c
local-only
failover_cluster1
Failover Targets: cluster1-01:e0c,
cluster1-01:e0d
cluster1
failover_cluster1-2 cluster1-02:e0c local-only
Failover Targets: cluster1-02:e0c
2 entries were displayed.
3-60
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
failover_cluster1
Configure Cluster Peer Relationships
Check for Network Routes
Display the routes in the cluster:
cluster1::> network route show
Create an intercluster route:
cluster1::> network route create -vserver cluster1
-destination 0.0.0.0/0 -gateway 192.168.1.1
-metric 40
cluster1::> network route show
Important: The destination cluster needs to be configured with intercluster
LIFs.
56
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CHECK FOR NETWORK ROUTES
Display the routes in the cluster:
cluster1::> network route show
Vserver
Destination
Gateway
Metric
------------------- --------------- --------------- -----Cluster1
0.0.0.0/0
192.168.0.1
20
Create an intercluster route:
cluster1::> network route create -vserver svm1 -destination 0.0.0.0/0 gateway 192.168.1.1 -metric 40
cluster1::> network route show
Vserver
Destination
Gateway
Metric
------------------- --------------- --------------- -----cluster1
0.0.0.0/0
192.168.0.1
20
0.0.0.0/0
192.168.1.1
40
svm1
2 entries were displayed.
Important: These steps need to be performed on the peer cluster.
3-61
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Check the Network Interfaces on the Peer Cluster
In this example, the second cluster is a single-node cluster.
Check the cluster2 network ports:
cluster2::> network port show
Create a failover group on cluster2:
cluster2::> network interface failover-groups
create -vserver cluster2 -failover-group
failover_cluster2 -targets cluster2-01:e0c
cluster2::> network interface failover-groups addtargets -vserver cluster2 -failover-group
failover_cluster2 -targets cluster2-01:e0d
57
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CHECK THE NETWORK
INTERFACES ON THE PEER CLUSTER
In this example, cluster2 is a single-node cluster.
Steps for cluster2 (with command output):
cluster2::> network port show
Speed (Mbps)
Node
Port
IPspace
Broadcast Domain Link
MTU
Admin/Oper
------ --------- ------------ ---------------- ----- ------- -----------cluster2-01
e0a
Default
Default
up
1500
auto/1000
e0b
Default
Default
up
1500
auto/1000
e0c
Default
Default
up
1500
auto/1000
e0d
Default
Default
up
1500
auto/1000
e0e
Default
Default
up
1500
auto/1000
e0f
Default
Default
down
1500
auto/10
6 entries were displayed.
3-62
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Create a failover group on cluster2:
cluster2::> network interface failover-groups create -vserver cluster2 failover-group failover_cluster2 -targets cluster2-01:e0c
cluster2::> network interface failover-groups add-targets -vserver
cluster2 -failover-group failover_cluster2 -targets cluster2-01:e0d
3-63
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Create the Intercluster LIF on Cluster2
cluster2::> network interface create -vserver
cluster2 -lif failover_cluster2 -role intercluster
-home-node cluster2-01 -home-port e0c -address
192.168.1.51 -netmask 255.255.255.0 -failovergroup failover_cluster2 -failover-policy localonly -firewall-policy intercluster
cluster2::> network interface show -role
intercluster
cluster2::> network interface show -role
intercluster -failover
58
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CREATE THE INTERCLUSTER LIF
ON CLUSTER2
Steps for cluster2 (with command output):
cluster2::> network interface create -vserver cluster2 -lif
failover_cluster2 -role intercluster -home-node cluster2-01 -home-port
e0c -address 192.168.1.51 -netmask 255.255.255.0 -failover-group
failover_cluster2 -failover-policy local-only -firewall-policy
intercluster
Check your work:
cluster2::> network interface show -role intercluster
Logical
Status
Network
Current
Current
Is
Admin/Oper
Address/Mask
Node
Port
----------
--------------
--------
----
Interface
Vserver
Home
-------
---------
cluster2
failover_cluster2
up/up
192.168.1.51/24
true
3-64
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
cluster2-01 e0c
cluster2::> network interface show -role intercluster failover
Logical
Vserver
Home
Interface
-------- ----------
----------
Failover
Failover
Node:Port
Policy
-----------
----------- --------
Group
cluster2
failover_cluster2
cluster2-01:e0c local-only
Failover Targets: cluster2-01:e0c, cluster2-01:e0d
3-65
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
failover
_cluster2
Configure Cluster Peer Relationships
Create the Network Route on the Peer Cluster
cluster2::> network route create -vserver cluster2
-destination 0.0.0.0/0 -gateway 192.168.1.1
-metric 40
Verify that the network route was created correctly:
cluster2::> network route show
59
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CREATE THE NETWORK ROUTE ON
THE PEER CLUSTER
Create the network route on cluster2 for the intercluster subnet:
cluster2::> network route create -vserver cluster2 -destination 0.0.0.0/0
-gateway 192.168.1.1 -metric 40
Check your work:
cluster2::> network route show
Vserver
Destination
Gateway
Metric
------------------- --------------- --------------- -----cluster2
0.0.0.0/0
192.168.0.1
20
0.0.0.0/0
192.168.1.1
40
2 entries were displayed.
3-66
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Create the Cluster Peer Relationship
Create the peer relationship between the two clusters:
cluster1::> cluster peer create -peer-addrs
192.168.1.51
The IP address points to the IP address that
is configured on the destination cluster.
You will be prompted for a passphrase.
60
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CREATE THE CLUSTER PEER
RELATIONSHIP
Create the peer relationship between the two clusters.
cluster1::> cluster peer create -peer-addrs 192.168.1.51
Notice: Choose a passphrase of 8 or more characters. To ensure the
authenticity of the peering relationship, use a phrase or
sequence of characters that would be hard to guess.
Enter the passphrase:
Confirm the passphrase:
Notice that the IP address in the previous command points to the IP address that was created on the
destination cluster.
3-67
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configure Cluster Peer Relationships
Configure the Peer Cluster
Repeat the same step on the peer cluster:
cluster2::> cluster peer create -peer-addrs
192.168.1.50,192.168.1.60
The two IP addresses point to the two IP
addresses that are configured on the peer
cluster.
Verify that cluster peering was created correctly:
cluster1::> cluster peer show
cluster2::> cluster peer show -instance
61
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURE CLUSTER PEER RELATIONSHIPS: CONFIGURE THE PEER CLUSTER
Repeat the same step on the peer cluster:
cluster2::> cluster peer create -peer-addrs 192.168.1.50,192.168.1.60
Notice: Choose a passphrase of 8 or more characters. To ensure the
authenticity of the peering relationship, use a phrase or
sequence of characters that would be hard to guess.
Enter the passphrase:
Confirm the passphrase:
Check your work:
cluster2::> cluster peer show
Peer Cluster Name
Cluster Serial Number Availability
Authentication
------------------- --------------------- -------------- ---------cluster1
1-80-000099
Available
ok
cluster1::> cluster peer show
Peer Cluster Name
Cluster Serial Number Availability
Authentication
---------------------- --------------------- ------------- ---------cluster2
1-80-000099
Available
cluster1::> cluster peer show -instance
3-68
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
ok
Peer Cluster Name: cluster2
Remote Intercluster Addresses: 192.168.1.51
Availability of the Remote Cluster: Available
Remote Cluster Name: cluster2
Active IP Addresses: 192.168.1.51
Cluster Serial Number: 1-80-000099
Remote Cluster Nodes: cluster2-01
Remote Cluster Health: true
Unreachable Local Nodes: Address Family of Relationship: ipv4
Authentication Status Administrative: use-authentication
Authentication Status Operational: ok
Last Update Time: 9/23/2014 12:58:53
cluster2::> cluster peer show -instance
Peer Cluster Name: cluster1
Remote Intercluster Addresses: 192.168.1.50, 192.168.1.60
Availability of the Remote Cluster: Available
Remote Cluster Name: cluster1
Active IP Addresses: 192.168.1.60, 192.168.1.50
Cluster Serial Number: 1-80-000099
Remote Cluster Nodes: cluster1-01, cluster1-02
Remote Cluster Health: true
Unreachable Local Nodes: Address Family of Relationship: ipv4
Authentication Status Administrative: use-authentication
Authentication Status Operational: ok
Last Update Time: 9/23/2014 15:06:48
3-69
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SVM Peering
SnapVault Peer Relationships
After you successfully configure the
cluster peering, you can configure the
peering of the SVMs.
SVM1
SVM2
62
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM PEERING: SNAPVAULT PEER RELATIONSHIPS
3-70
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SVM Peering
Peer Relationships Between SVMs
Set up a peer relationship between SVMs:
cluster1::> vserver peer create -vserver svm1
-peer-vserver svm1_2 -peer-cluster cluster2
-applications snapmirror
Verify that the peer state is peered:
cluster1::> vserver peer show-all
The peer SVM must accept the peer request:
cluster2::> vserver peer accept -vserver svm1_2
-peer-vserver svm1
63
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM PEERING: PEER RELATIONSHIPS BETWEEN SVMS
Set up a peer relationship between the SVMs:
cluster1::> vserver peer create -vserver svm1 -peer-vserver svm1_2 -peercluster cluster2 -applications snapmirror
cluster1::> vserver peer show-all
Peer
Peer
Vserver
Vserver
State
---------
---------
svm1
svm1_2
Peering
Peer Cluster
Applications
---------
---------------
---------------
initiated
cluster2
snapmirror
Check the state of the peering request from cluster2:
cluster2::> vserver peer show-all
Peer
Peer
Vserver
Vserver
State
Peer Cluster
Applications
---------
---------
---------
---------------
---------------
svm1_2
svm1
pending
3-71
Peering
cluster1
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
snapmirror
The peer SVM must accept the peer request:
cluster2::> vserver peer accept -vserver svm1_2 -peer-vserver svm1
Verify that the peer state is initiated:
cluster1::> vserver peer show-all
Peer
Peer
Peering
Vserver
Vserver
State
Peer Cluster
Applications
---------
---------
---------
---------------
---------------
svm1
svm1_2
peered
cluster2
snapmirror
cluster2::> vserver peer show-all
Peer
Peer
Vserver
Vserver
State
Peer Cluster
Applications
---------
---------
---------
---------------
---------------
svm1_2
svm1
peered
cluster1
snapmirror
3-72
Peering
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 6
Initial Transfer and Updates
64
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 6: INITIAL TRANSFER AND UPDATES
3-73
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
The Initial Transfer
To initialize the data protection mirror copy, use the
snapmirror initialize command.
65
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THE INITIAL TRANSFER
The initial transfer is a complete backup of a primary storage volume to a volume on the secondary system.
After the initial transfer successfully completes, subsequent transfers contain only the changes that were made
to the primary data since the previous transfer.
3-74
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Replication Updates
You can perform replication updates manually.
In the next module you learn how to implement a SnapMirror
solution.
SnapMirror
Policy
SnapMirror
Relationship
RW
66
DP
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REPLICATION UPDATES
3-75
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Schedule
References
NetApp University courses:
Clustered Data ONTAP 8.3 Administration
NetApp Documentation:
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Commands: Manual Page Reference
Clustered Data ONTAP 8.3 Infinite Volumes Management Guide
NetApp Technical Report TR-4037
Introduction to NetApp Infinite Volume
NetApp Technical Report TR-4210
Operational How-To Guide: NetApp Snapshot Management
67
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
3-76
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
What Ken Learned in this Module
I learned the terminology that is used for NetApp
replication technologies. I now understand use
cases for NetApp replication solutions. Now I
know how to design and configure peering
relationships between clusters and SVMs.
68
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHAT KEN LEARNED IN THIS MODULE
3-77
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Exercise
Module 3: NetApp Replication
Technologies
Time Estimate: 25 Minutes
69
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
3-78
Data ONTAP Data Protection Administration: NetApp Replication Technologies
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module 4
Using SnapMirror for Data
Protection
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE 4: USING SNAPMIRROR FOR DATA PROTECTION
4-1
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module Objectives
After this module, you should be able to:
Describe SnapMirror design criteria
Configure and implement SnapMirror relationships
Use SnapMirror technology to recover data
Use the Data ONTAP CLI to manage SnapMirror
relationships
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
4-2
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 1
SnapMirror Technology
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 1: SNAPMIRROR TECHNOLOGY
4-3
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Volume-Level Replication
Source
Volume
Snapshot
Copies
SnapMirror
Mirrored
Volume
WAN
SnapMirror
FlexClone
Volumes
Mirrored
Volume
Tape
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VOLUME-LEVEL REPLICATION
SnapMirror Uses and Benefits
SnapMirror technology in clustered Data ONTAP provides asynchronous volume-level replication based on a
configured replication update interval. SnapMirror technology uses NetApp Snapshot technology as part of
the replication process.
Clustered Data ONTAP 8.3 provides the following replication capabilities:
4-4
Data protection mirror copies: These copies provide replication to create a backup copy within the
same cluster (intracluster) or to create a disaster recovery copy in a different cluster (intercluster).
Load-sharing (LS) mirror copies: These copies provide replication from one volume to multiple
volumes in the same cluster to distribute a read-only workload across a cluster.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Replication Basics
When the scheduler triggers a replication update, the
following operations are performed:
1. A new Snapshot copy is created on the source volume.
2. The block-level difference between the new Snapshot
copy and the last replication Snapshot copy is determined
and then transferred to the destination volume.
3. When the transfer is complete, the new Snapshot copy
exists on the destination volume.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR REPLICATION BASICS
Basics of SnapMirror Replication
When the scheduler triggers a replication update, the following operations are performed:
1. A new Snapshot copy is created on the source volume.
2. The block-level difference between the new Snapshot copy and the last replication Snapshot copy is
determined and then transferred to the destination volume. This transfer includes other Snapshot copies
that were created between the last replication Snapshot copy and the new copy.
3. When the transfer is complete, the new Snapshot copy exists on the destination volume.
A SnapMirror destination volume is available for read-only access, if it is shared using the CIFS protocol and
is exported using the NFS protocol. A logical unit number (LUN) in the replicated volume can be made
available to a client that supports connection to read-only LUNs.
Replication occurs at the volume level. Qtrees can be created in clustered Data ONTAP and replicated with
the replicated volume; however, individual qtrees cannot be separately replicated.
4-5
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror and FlexClone Technology
1. Create an unscheduled
Snapshot copy at the
source.
FlexClone
Volume
Snapshot
Copies
2.
Perform a SnapMirror update to replicate the
unscheduled Snapshot copy to the destination.
3.
Use the unscheduled Snapshot
copy as the base for the FlexClone
volume.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR AND FLEXCLONE TECHNOLOGY
A NetApp FlexClone volume is a writable point-in-time clone of a FlexVol volume. A FlexClone volume
shares data blocks with the parent volume and stores only new data or changes that are made to the clone.
FlexClone technology also enables you to create a writable volume from a read-only SnapMirror destination
without interrupting the SnapMirror replication process or production operations.
4-6
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror and NetApp Storage Efficiency
If a SnapMirror source volume is in a deduplicated state, then
the destination volume is in a deduplicated state. SnapMirror
software does not inflate the deduplicated data during the
transfer.
Likewise, if a SnapMirror source volume is in a compressed
state, then the destination volume is in a compressed state.
SnapMirror does not uncompress the source data before or
during the transfer to the destination volume. Data is
replicated in a compressed state.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR AND NETAPP STORAGE EFFICIENCY
SnapMirror technology supports NetApp deduplication and compression storage efficiency technologies.
If a SnapMirror source volume is in a deduplicated state, then the destination volume is in a deduplicated
state. SnapMirror does not inflate the deduplicated data during the transfer.
If a SnapMirror source volume is in a compressed state, then the destination volume is in a compressed state.
SnapMirror does not uncompress the source data before or during the transfer to the destination volume. Data
is replicated in a compressed state.
4-7
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror and Volume Move
A data protection source or destination volume can be
moved nondisruptively to another node in the cluster. The
SnapMirror relationship does not have to be reconfigured
on either volume when the volume move is performed.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR AND VOLUME MOVE
You can move a data protection source or destination volume nondisruptively to another node in the cluster.
The SnapMirror relationship does not have to be reconfigured on either volume when the volume move is
performed.
4-8
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror and Volume Autosize
When volume autosize increases the size of the source
volume of a SnapMirror relationship, the destination
volume automatically increases in size. This feature is
available only with FlexVol volumes, not infinite volumes.
9
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR AND VOLUME AUTOSIZE
4-9
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Version-Flexible SnapMirror Relationships
Version-flexible SnapMirror technology allows relationships
to exist where the source and destination clusters are
running different major versions of Data ONTAP.
Version-flexible SnapMirror relationships allow disaster
recovery and additional retention on the same destination
volume, enabling you to save on the cost of additional
storage, network bandwidth, and management.
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
VERSION-FLEXIBLE SNAPMIRROR RELATIONSHIPS
Before you create version-independent SnapMirror relationships, consider these guidelines:
4-10
The schedule frequency for replicating volumes must be greater than 60 minutes.
Large to medium-sized file workloads are best suited for replication using version-independent
SnapMirror relationships.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 2
Implementing
SnapMirror Relationships
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: IMPLEMENTING SNAPMIRROR RELATIONSHIPS
4-11
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Intercluster Configuration
Typical Workflow to Create an Intercluster Configuration
Check for a SnapMirror license.
Create a destination volume.
Select an update schedule.
Select the mirror policy.
Initialize the SnapMirror relationship.
Monitor the SnapMirror relationship.
(This lesson demonstrates this workflow.)
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR INTERCLUSTER CONFIGURATION: TYPICAL WORKFLOW TO
CREATE AN INTERCLUSTER CONFIGURATION
4-12
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Intercluster Configuration
Check Licenses and Create a New Destination Volume
Check to see if the SnapMirror licenses are installed:
cluster1::> license show -package SnapMirror
Create a new destination volume, which must be type DP
(data protection):
cluster2::> volume create -vserver svm1_2 -volume
svm1_2_vol2 -aggregate aggr1 -size 200m -securitystyle ntfs -type dp
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR INTERCLUSTER CONFIGURATION: CHECK LICENSES AND CREATE
A NEW DESTINATION VOLUME
You can create a SnapMirror relationship between volumes on different clusters for disaster recovery. You
must create a new destination volume for creating a SnapMirror relationship.
Check to see if you have the SnapMirror licenses installed:
cluster1::> license show -package SnapMirror
Serial Number: 1-80-000099
Owner: cluster1
Package
Type
Description
Expiration
-----------------
-------
---------------------
-------------
SnapMirror
site
SnapMirror License
You can use a slightly different command to view the SnapMirror license on cluster2:
cluster2::> license show -instance -package SnapMirror
(system license show)
Serial Number: 1-80-000099
Package: SnapMirror
Owner: cluster2
Expiration Date: Description: SnapMirror License
4-13
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Type: site
Legacy: no
Customer ID: 1-82-0000000000000000000000000
The licenses are in place.
Create a new destination volume. The destination volume must be type DP:
cluster2::> volume create -vserver svm1_2 -volume svm1_2_vol2 -aggregate
aggr1 -size 200m -security-style ntfs -type dp
cluster2::> volume show -volume svm1_2_vol2
Vserver
Volume
Aggregate
State
Type Size
Available Used%
--------- ------------ ----------- -------- ---- ----- --------
-----
svm1_2
0%
4-14
svm1_2_vol2
aggr1
online
DP
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
200MB 199.88MB
SnapMirror Intercluster Configuration
Create a Data Protection Mirror Relationship
Create a data protection mirror relationship by using the 5min
job schedule:
cluster2::> snapmirror create -destination-path
svm1_2:svm1_2_vol2 -source-path svm1:svm1_vol3
-type DP -schedule 5min
Verify that the relationship was created:
cluster2::> snapmirror show
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR INTERCLUSTER CONFIGURATION: CREATE A DATA PROTECTION
MIRROR RELATIONSHIP
Create a data protection mirror relationship by using the snapmirror create command. Use the 5min
job schedule. Remember that cluster peering and storage virtual machine (SVM) peering were configured in
the previous module:
cluster2::> snapmirror create -destination-path svm1_2:svm1_2_vol2 source-path svm1:svm1_vol3 -type DP -schedule 5min
Operation succeeded: snapmirror create for the relationship with
destination "svm1_2:svm1_2_vol2".
Verify that the relationship was created:
cluster2::> snapmirror show
Source
Path
Progress
Destination
Type
Updated
Mirror
Path
------
--------
------- ----------
Relationship
State
Total
Status
Last
Progress
Healthy
-------
--------
-----------
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
Snapmirrored
Idle
4-15
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
true
svm1:svm1_vol3
DP
svm1_2:svm1_2_vol2
Uninitialized
Idle
2 entries were displayed.
4-16
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
true
SnapMirror Intercluster Configuration
Initialize the SnapMirror Relationship
Initialize the data protection mirror:
cluster2::> snapmirror initialize destination
-path svm1_2:svm1_2_vol2
Verify that the initialization occurred correctly:
cluster2::> snapmirror show
cluster2::> snapmirror show -instance
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR INTERCLUSTER CONFIGURATION: INITIALIZE THE SNAPMIRROR
RELATIONSHIP
Initialize the data protection mirror:
cluster2::> snapmirror initialize -destination-path svm1_2:svm1_2_vol2
Operation is queued: snapmirror initialize of destination
"svm1_2:svm1_2_vol2".
Verify that the initialization occurred correctly:
cluster2::> snapmirror show
Progress
Source
Destination
Mirror
Relationship
Total
Path
State
Status
Progress Healthy
Path
Type
Updated
------
-------- -----------
------- --------------
Last
-------
--------
true
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
Snapmirrored
Idle
4-17
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
svm1:svm1_vol3
DP
svm1_2:svm1_2_vol2
Snapmirrored
Idle
true
2 entries were displayed.
cluster2::> snapmirror show -instance
Source Path: svm1:svm1_vol3
Destination Path: svm1_2:svm1_2_vol2
Relationship Type: DP
Relationship Group Type: none
SnapMirror Schedule: 5min
SnapMirror Policy Type: async-mirror
SnapMirror Policy: DPDefault
Tries Limit: Throttle (KB/sec): unlimited
Mirror State: Snapmirrored
Relationship Status: Idle
File Restore File Count: File Restore File List: Transfer Snapshot: Snapshot Progress: Total Progress: Network Compression Ratio: Snapshot Checkpoint: Newest Snapshot: snapmirror.1383c700-4345-11e497f5-0050560140c1_2147484679.
2014-09-24_131000
Newest Snapshot Timestamp: 09/24 13:11:15
Exported Snapshot: snapmirror.1383c700-4345-11e497f5-0050560140c1_2147484679.
2014-09-24_131000
Exported Snapshot Timestamp: 09/24 13:11:15
Healthy: true
Unhealthy Reason: Constituent Relationship: false
Destination Volume Node: cluster2-01
Relationship ID: ff573bda-43ea-11e4-97f50050560140c1
Current Operation ID: 4-18
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Transfer Type: Transfer Error: Current Throttle: Current Transfer Priority: Last Transfer Type: update
Last Transfer Error: Last Transfer Size: 72KB
Last Transfer Network Compression Ratio: 1:1
Last Transfer Duration: 0:0:2
Last Transfer From: svm1:svm1_vol3
Last Transfer End Timestamp: 09/24 13:10:04
Progress Last Updated: Relationship Capability: 8.2 and above
Lag Time: 0:0:55
Number of Successful Updates: 1
Number of Failed Updates: 0
Number of Successful Resyncs: 0
Number of Failed Resyncs: 0
Number of Successful Breaks: 0
Number of Failed Breaks: 0
Total Transfer Bytes: 212992
Total Transfer Time in Seconds: 5
2 entries were displayed.
4-19
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror and Snapshot Copies
Check the Snapshot copies on the source and destination
volumes:
cluster1::> volume snapshot show -volume svm1_vol3
cluster2::> volume snapshot show volume
svm1_2_vol2
SnapMirror maintains a history of one SnapMirror
Snapshot copy on the source volume and two
copies on the destination volume.
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR AND SNAPSHOT COPIES
Best Practice:
Verify that SnapMirror updates are not scheduled to occur on the source volume at the same time as other
Snapshot copies.
Look at the Snapshot copies on the source and destination volumes:
cluster1::> volume snapshot show -volume svm1_vol3
---Blocks--Vserver
Volume
Used%
Snapshot
--------
--------
-------------------------
svm1
svm1_vol3
Size
----------
Total%
--------
snapmirror.1383c700-4345-11e4-97f5-2014-090050560140c1_2147484679.24_131500
32%
68KB
cluster2::> volume snapshot show -volume svm1_2_vol2
4-20
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
0%
---Blocks--Vserver
Volume
Used%
Snapshot
Size
--------
--------
----------------------- --------
svm1_2
svm1_2_vol2
Total%
--------
snapmirror.1383c700-4345-11e4-97f50050560140c1_2147484679.2014-09-24_131000
76KB
0%
35%
snapmirror.1383c700-4345-11e4-97f50050560140c1_2147484679.2014-09-24_131500
0B
0%
2 entries were displayed.
4-21
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
0%
Scheduling SnapMirror Updates
Create a New Cron Job Schedule
Create a new cron job schedule on the destination cluster:
cluster2::> job schedule cron create
Hourly_SnapMirror hour all minute 0
This job runs at the top of every hour.
Verify that the job was created correctly:
cluster2::> job schedule cron show
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SCHEDULING SNAPMIRROR UPDATES: CREATE A NEW CRON JOB SCHEDULE
SnapMirror updates are usually configured to run automatically. This example creates a schedule that is called
Hourly_SnapMirror, which runs at the top of every hour (on the zero minute of every hour):
cluster2::> job schedule cron create Hourly_SnapMirror -hour all -minute
0
Verify that the job was created correctly:
cluster2::> job schedule cron show
Name
Description
----------------
---------------------------------------------------
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
Hourly_SnapMirror
@:00
SnapVaultJob
@:10
daily
@0:10
hourly
@:05
weekly
Sun@0:15
7 entries were displayed.
4-22
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Scheduling SnapMirror Updates
Apply the New Schedule to the SnapMirror Relationship
Apply the Hourly_SnapMirror schedule to an existing
relationship:
cluster2::> snapmirror modify -destination-path
cluster2://svm1_2/svm1_2_vol2 -schedule
Hourly_SnapMirror
The SnapMirror jobs are now performed
hourly.
Verify that the schedule is applied to the relationship:
cluster2::> snapmirror show -destination-path
cluster2://svm1_2/svm1_2_vol2 -fields schedule
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SCHEDULING SNAPMIRROR UPDATES: APPLY THE NEW SCHEDULE TO THE
SNAPMIRROR RELATIONSHIP
The schedule can be applied to a SnapMirror relationship at the time of creation by using the schedule
option. The schedule can be applied to an existing relationship by using the snapmirror modify
command and the schedule option.
Apply the Hourly_SnapMirror schedule to an existing relationship:
cluster2::> snapmirror modify -destination-path
cluster2://svm1_2/svm1_2_vol2 -schedule Hourly_SnapMirror
Operation succeeded: snapmirror modify for the relationship with
destination "svm1_2:svm1_2_vol2".
cluster2::> snapmirror show -destination-path
cluster2://svm1_2/svm1_2_vol2 -fields schedule
source-path
destination-path
schedule
-------------- ------------------ ----------------svm1:svm1_vol3 svm1_2:svm1_2_vol2 Hourly_SnapMirror
SnapMirror updates are now performed hourly.
4-23
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Try This
Using cluster1on your lab kit:
Enter snapmirror set-options.
Are any of the options set?
Enter man snapmirror set-options.
What can you say about snapmirror options?
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
4-24
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
How should I deploy load-sharing mirror
relationships?
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
4-25
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Load-Sharing Mirror Relationships
Introduction
SnapMirror load-sharing mirror copies can support NAS only
(CIFS and NFSv3).
Load-sharing mirror copies do not support NFSv4 clients or
SAN client protocol connections (FC, FCoE, or iSCSI).
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR LOAD-SHARING MIRROR RELATIONSHIPS: INTRODUCTION
SnapMirror load-sharing mirror copies increase performance and availability for NAS clients by distributing
an SVM namespace root volume to other nodes in the same cluster and by distributing data volumes to other
nodes in the cluster, to improve performance for large read-only workloads.
NOTE: SnapMirror load-sharing mirror copies are capable of supporting NAS only (CIFS/NFSv3). Loadsharing mirror copies do not support NFSv4 clients or SAN client protocol connections (FC, FCoE, or iSCSI).
Data ONTAP routes NFSv4 clients to the source of the load-sharing mirror for direct read and write access.
4-26
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing Load-Sharing SnapMirror
Relationships
Create Load-Sharing Mirror Destination Volumes
Two volumes, which are named svm1_root_lsm1 and
svm1_root_lsm2, are created as load-sharing mirror destination
volumes for the SVM root volume named svm1_root:
cluster1::> volume create -vserver svm1 -volume
svm1_root_lsm1 -aggregate n1_aggr1 -size 20m -type
DP
cluster1::> volume create -vserver svm1 -volume
svm1_root_lsm2 -aggregate n1_aggr1 -size 20m -type
DP
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING LOAD-SHARING SNAPMIRROR RELATIONSHIPS: CREATE LOADSHARING MIRROR DESTINATION VOLUMES
Load-sharing mirror relationships can be managed only by the Data ONTAP CLI. Currently, load-sharing
mirror relationships cannot be managed by using OnCommand System Manager.
A group of load-sharing mirror destination volumes that replicate from the same source volume is called a
load-sharing mirror set.
When a load-sharing mirror set is created, each destination volume must be created in the appropriate
aggregate, which creates the destination volumes with a type of data protection.
In this example, two volumes named svm1_root_lsm1 and svm1_root_lsm2 are created as load-sharing mirror
destination volumes for the SVM root volume named svm1_root:
cluster1::> volume create -vserver svm1 -volume svm1_root_lsm1 -aggregate
n1_aggr1 -size 20m -type DP
cluster1::> volume create -vserver svm1 -volume svm1_root_lsm2 -aggregate
n1_aggr1 -size 20m -type DP
4-27
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing Load-Sharing SnapMirror
Relationships
Create Load-Sharing SnapMirror Relationships
A load-sharing SnapMirror relationship is created for each of
the destination volumes, vs1_ls_a and vs1_ls_b, with an hourly
update schedule:
cluster1::> snapmirror create -source-path
svm1:svm1_root -destination-path
svm1:svm1_root_lsm1 -type LS -schedule hourly
cluster1::> snapmirror create -source-path
svm1:svm1_root -destination-path
svm1:svm1_root_lsm1 -type LS -schedule hourly
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING LOAD-SHARING SNAPMIRROR RELATIONSHIPS: CREATE LOADSHARING SNAPMIRROR RELATIONSHIPS
After all load-sharing mirror destination volumes are created, each SnapMirror relationship can be created
with a type of LS. In this example, a load-sharing SnapMirror relationship is created for each of the
destination volumes, vs1_ls_a and vs1_ls_b, with an hourly update schedule.
cluster1::> snapmirror create -source-path svm1:svm1_root -destinationpath svm1:svm1_root_lsm1 -type LS -schedule hourly
[Job 117] Job is queued: snapmirror create for the relationship with
destination[Job 117] Job succeeded: SnapMirror: done
cluster1::> snapmirror create -source-path svm1:svm1_root -destinationpath svm1:svm1_root_lsm2 -type LS -schedule hourly
[Job 119] Job is queued: snapmirror create for the relationship with
destination[Job 119] Job succeeded: SnapMirror: done
4-28
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing Load-Sharing SnapMirror
Relationships
Initialize a Load-Sharing SnapMirror Relationship
Initialize a load-sharing SnapMirror relationship:
cluster1::> snapmirror initialize-ls-set -sourcepath cluster1://svm1/svm1_root
All destination volumes are initialized at once.
Verify that the initialization was performed:
cluster1::> snapmirror show
Manually update the load-sharing mirror relationship:
cluster1::> snapmirror update-ls-set -source-path
svm1:svm1_root
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING LOAD-SHARING SNAPMIRROR RELATIONSHIPS: INITIALIZE A
LOAD-SHARING SNAPMIRROR RELATIONSHIP
You can update load-sharing mirror relationships manually or by setting the desired schedule in the
schedule option. For load-sharing mirror relationships, you do this by setting the desired schedule on
any one of the destinations in the load-sharing mirror set. Data ONTAP automatically applies that
schedule to all destinations in that load-sharing mirror set.
A later change to the update schedule for any of the destination volumes in the load-sharing mirror set
applies the new schedule to all volumes in that load-sharing mirror set. Therefore, in the previous
example, the schedule option was used only in the creation of the last relationship, which applied the
schedule to both relationships.
Initialize the LS SnapMirror relationship:
cluster1::> snapmirror initialize-ls-set -source-path
cluster1://svm1/svm1_root [Job 120] Job is queued: snapmirror initializels-set for source "cluster1://svm1/svm1_root".
Verify that the initialization was performed:
cluster1::> snapmirror show
4-29
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Progress
Source
Path
Type
Updated
Destination
Path
Mirror Relationship Total
State Status
Progress
------------------- ------- ---------cluster1://svm1/svm1_root
LS
---------
Last
Healthy
-------
cluster1://svm1/svm1_root_lsm1
Snapmirrored
Transferring 696KB
false
cluster1://svm1/svm1_root_lsm2
Snapmirrored
Transferring 696KB
false
2 entries were displayed.
The initialize process is still transferring data.
cluster1::> snapmirror show
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
Last
Healthy
---------
-------
Idle
cluster1://svm1/svm1_root
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
true
cluster1://svm1/svm1_root_lsm2
Snapmirrored
Idle
true
2 entries were displayed.
You can update load-sharing mirror relationships on demand by using the snapmirror update-ls-set
command. Data ONTAP updates all destination volumes for the LS set in one operation.
cluster1::> snapmirror update-ls-set -source-path svm1:svm1_root
[Job 121] Job is queued: snapmirror update-ls-set for source
"cluster1://svm1/svm1_root".
4-30
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 3
SnapMirror Failover and
Resync
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 3: SNAPMIRROR FAILOVER AND RESYNC
4-31
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
Which steps should I take when a failure of the
source volume occurs?
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
4-32
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Initial Configuration
Clients
Cluster 2
Cluster 1
Source
Volume
27
Scheduled Copies
Destination
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR INITIAL CONFIGURATION
4-33
Client applications perform read/write actions only on the source volume. Data on the source volume is
mirrored to the destination volume. The destination volume is configured for data protection, which
makes the volume read-only, if clients are given access to it.
The process of failing over and resynchronizing a SnapMirror relationship involves three Data ONTAP
operations: break, reverse resync*, and update.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Failover and Resync
Volume Disaster Recovery Workflow
When a source volume becomes unavailable for read/write
access, you can perform a volume-level disaster recovery
failover and resynchronization.
Cluster 2
Cluster 1
Source
Volume
28
Scheduled Copies
Destination
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FAILOVER AND RESYNC: VOLUME DISASTER RECOVERY
WORKFLOW
4-34
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Disaster Recovery Workflow
Typical SnapMirror Disaster Recovery Workflow
Activate the destination volume:
Verify the source volume status.
Quiesce and break the SnapMirror relationship.
Verify the destination volume status.
Configure the destination volume for data access.
Reactivate the original source volume:
Resynchronize the source volume.
Update the source volume, if necessary.
Activate the source volume.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR DISASTER RECOVERY WORKFLOW: TYPICAL SNAPMIRROR
DISASTER RECOVERY WORKFLOW
Most of the configuration that is necessary for disaster recovery is performed prior to a failover. Thus, the
actual steps that are required to fail over during a disaster recovery scenario are greatly reduced.
Steps for a NAS environment:
1. Perform a SnapMirror break operation to fail over each volume. In clustered Data ONTAP, you can use
wildcards to perform a SnapMirror operation on multiple volumes by using one command. The following
example performs failover for all volumes in the destination SVM that is called vs5. Failover can be
restricted to certain volumes by using part of the volume name in the command:
cluster02::> snapmirror break -destination-path cluster02://vs5/*
2. If the volumes were mounted in the namespace, and CIFS shares and NFS export policies were created
and applied, then clients have read-write access to the NAS data.
3. Redirect clients to the recovered storage.
4-35
It is common practice for a disaster recovery system to have a different name than the source system.
In disaster recovery failover scenarios, it is typical to change DNS name resolution or use DNS
aliases to redirect clients to the names of the recovered storage systems. This enables CIFS shares to
be accessible using the same UNC path name. NFS clients can also access the expected path.
Alternatively, the failed source storage system might be removed from Active Directory. The
recovery storage system might be removed and added again to Active Directory by using the same
name as the source system. However, it can take time for this change to propagate through a large
Active Directory environment.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Postfailover volume configuration
Snapshot copy policies and NetApp storage efficiency policies cannot be assigned to volumes in a data
protection state, so they must be assigned after failover.
1. If you are using the Data ONTAP Snapshot copy schedule, assign a Snapshot copy policy to the
recovered volumes. In SAN environments, Snapshot copies are typically scheduled in the client.
2. If you are using NetApp storage efficiency technology, assign a storage efficiency policy to the recovered
volumes.
4-36
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Failover
Quiesce the SnapMirror Relationship
Verify the source volume status:
cluster1::> volume show -vserver svm1 -volume
svm1_vol2 fields state
vserver volume
state
------- --------- ------Perform this task
from the destination
svm1
svm1_vol2 offline
cluster.
Quiesce the SnapMirror relationship:
cluster2::> snapmirror quiesce -source-path
svm1:svm1_vol2
cluster2://svm1_2/svm1_svm1_vol2_mirror
Operation succeeded: snapmirror quiesce for
destination "svm1_2:svm1_svm1_vol2_mirror".
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FAILOVER: QUIESCE THE SNAPMIRROR RELATIONSHIP
Steps for performing a SnapMirror volume recovery:
1. Verify that the source volume is offline and unable to serve data.
2. Quiesce and break the SnapMirror relationship. After quiescing, future SnapMirror transfers are disabled.
NOTE: The SnapMirror quiesce process allows transfers in progress to complete, but it disables future
transfers for a mirror relationship.
4-37
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Topics for Discussion
What occurs when you use the snapmirror quiesce
command?
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TOPICS FOR DISCUSSION
4-38
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Failover
Break the SnapMirror Relationship
Break the SnapMirror relationship:
cluster2::> snapmirror break -source-path
svm1:svm1_vol2
cluster2://svm1_2/svm1_svm1_vol2_mirror
Verify the state of the SnapMirror relationship:
cluster2::> snapmirror show -source-path
svm1:svm1_vol2 -fields state
The mirror state should
be broken off.
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FAILOVER: BREAK THE SNAPMIRROR RELATIONSHIP
The snapmirror break command should be performed from the destination cluster.
4-39
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Failover
Check the Destination Volume
Verify the state of the destination volume:
cluster2::> volume show -volume
svm1_svm1_vol2_mirror fields state
vserver volume
state
------- --------------------- -----svm1_2 svm1_svm1_vol2_mirror online
This is almost ready for
client access.
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FAILOVER: CHECK THE DESTINATION VOLUME
4-40
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Failover
Configure the Destination Volume for Data Access
Verify that the destination volume has read/write access and
that the volume settings match the source volume settings:
Thin provisioning
Deduplication
Compression
Autogrow
Snapshot copy schedule
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FAILOVER: CONFIGURE THE DESTINATION VOLUME FOR DATA
ACCESS
4-41
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Failover
Configure the Destination Volume for Data Access (1 of 2)
In a NAS environment:
Mount the NAS volume into the namespace using the same
junction path as the source volume.
Apply the correct access control lists (ACLs) to CIFS shares.
Assign NFS export policies.
Apply quota rules, as necessary.
Redirect clients to the destination volume.
Remount NFS and CIFS shares on the clients.
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FAILOVER: CONFIGURE THE DESTINATION VOLUME FOR DATA
ACCESS (1 OF 2)
4-42
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Failover
Configure the Destination Volume for Data Access (2 of 2)
In a SAN environment:
Map the LUNs to the appropriate initiator group.
For iSCSI, create iSCSI sessions from the SAN host initiators
to the SAN logical interfaces (LIFs).
Perform a storage rescan on the host to detect the connected
LUNs.
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR FAILOVER: CONFIGURE THE DESTINATION VOLUME FOR DATA
ACCESS (2 OF 2)
4-43
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Resync
Reactivate the Original Source Volume
When the source volume comes back online, you must
resynchronize the latest data from the destination volume.
Cluster 2
Cluster 1
DP
RW
Resync
Destination
Volume
37
Source
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR RESYNC: REACTIVATE THE ORIGINAL SOURCE VOLUME
4-44
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Resync
Reactivate the Original Source Volume (1 of 4)
Initiate the snapmirror resync command from the
former source cluster:
cluster1::> snapmirror resync -source-path
svm1_2:svm1_svm1_vol2_mirror
cluster1://svm1/svm1_vol2
Verify that the mirror state is shown as Snapmirrored:
cluster1::> snapmirror show -source-path
svm1_2:svm1_svm1_vol2_mirror
38
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR RESYNC: REACTIVATE THE ORIGINAL SOURCE VOLUME (1 OF 4)
Perform the snapmirror resync operation from the former source cluster (which is now the destination
cluster):
cluster1::> snapmirror resync -source-path svm1_2:svm1_svm1_vol2_mirror
cluster1://svm1/svm1_vol2
Warning: All data newer than Snapshot copy snapmirror.db779627-503c-11e49bbc-123478563412_2147484681.2014-10-10_141000 on
volume svm1:svm1_vol2 will be deleted.
Do you want to continue? {y|n}: y
Operation is queued: initiate snapmirror resync to destination
"svm1:svm1_vol2".
Verify that the mirror state is shown as Snapmirrored:
cluster1::> snapmirror show -source-path svm1_2:svm1_svm1_vol2_mirror
4-45
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
Last
Healthy
---------
-------
Idle
svm1_2:svm1_svm1_vol2_mirror
DP
svm1:svm1_vol2
Snapmirrored
true
4-46
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Resync
Reactivate the Original Source Volume (2 of 4)
Check the current SnapMirror relationship:
cluster1::> snapmirror show -source-path
svm1_2:svm1_svm1_vol2_mirror -fields
schedule,policy
schedule policy
DPDefault
(This is deprecated output.)
Notice the policy and schedule settings.
At this point, the SnapMirror relationship is reversed from
the original configuration.
39
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR RESYNC: REACTIVATE THE ORIGINAL SOURCE VOLUME (2 OF 4)
Check the current SnapMirror relationship:
cluster1::> snapmirror show -source-path svm1_2:svm1_svm1_vol2_mirror fields schedule,policy
source-path
destination-path
schedule
policy
------------------
----------------
--------
---------
svm1_2:svm1_svm1_vol2_mirror
svm1:svm1_vol2
DPDefault
4-47
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Resync
Reactivate the Original Source Volume (3 of 4)
If you plan to run in this (reversed) SnapMirror relationship for
any length of time, consider specifying a SnapMirror policy and
schedule that match the protection configuration of the original
SnapMirror relationship.
40
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR RESYNC: REACTIVATE THE ORIGINAL SOURCE VOLUME (3 OF 4)
4-48
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapMirror Resync
Reactivate the Original Source Volume (4 of 4)
To return the SnapMirror relationship back to its original
state, you must perform the same steps that you performed
for the failover.
Cluster 1
Cluster 2
Quiesce and Break
RW
Destination
Volume
Cluster 2
Cluster 1
Resync
RW
Source
Volume
41
RW
Source
Volume
DP
Destination
Volume
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPMIRROR RESYNC: REACTIVATE THE ORIGINAL SOURCE VOLUME (4 OF 4)
To return the SnapMirror relationship to its original state, perform the same steps that you performed for the
failover.
Quiesce the SnapMirror transfers:
cluster1::> snapmirror quiesce -source-path svm1_2:svm1_svm1_vol2_mirror
-destination-path svm1:svm1_vol2
Operation succeeded: snapmirror quiesce for destination "svm1:svm1_vol2".
cluster1::> snapmirror show -source-path svm1_2:svm1_svm1_vol2_mirror
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
---------
Last
Healthy
-------
svm1_2:svm1_svm1_vol2_mirror
DP
svm1:svm1_vol2
Snapmirrored
Quiesced
true
Break the SnapMirror relationship:
4-49
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
cluster1::> snapmirror break -source-path svm1_2:svm1_svm1_vol2_mirror destination-path svm1:svm1_vol2
Operation succeeded: snapmirror break for destination "svm1:svm1_vol2".
cluster1::> snapmirror show -source-path svm1_2:svm1_svm1_vol2_mirror
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
Last
Healthy
---------
-------
Idle
svm1_2:svm1_svm1_vol2_mirror
DP
svm1:svm1_vol2
Broken-off
true
At this point, you can redirect the clients to the source volume. Ensure that the volume is in the namespace,
that NAS and SAN configurations are set up, and that the volume has all required settings.
Perform a snapmirror resync operation:
cluster2::> snapmirror resync -source-path svm1:svm1_vol2 -destinationpath svm1_2:svm1_svm1_vol2_mirror
Warning: All data newer than Snapshot copy snapmirror.67851b33-503b-11e4850e-123478563412_2147484675.2014-10-10_150854
on volume svm1_2:svm1_svm1_vol2_mirror will be deleted.
Do you want to continue? {y|n}: y
Operation is queued: initiate snapmirror resync to destination
"svm1_2:svm1_svm1_vol2_mirror".
cluster2::> snapmirror show -source-path svm1:svm1_vol2
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
---------
Last
Healthy
-------
svm1:svm1_vol2
DP
svm1_2:svm1_svm1_vol2_mirror
Snapmirrored
Idle
true
Finally, ensure that you have the required SnapMirror policy and update schedule.
4-50
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Fail Over Load-Sharing SnapMirror
Relationships
Check the LS SnapMirror relationship:
cluster1::> snapmirror show -type LS
Promote the LS destination volume:
cluster1::> snapmirror promote -destination-path
cluster1://svm1/svm1_root_lsm2
Verify that the volume is online and writeable:
cluster1::> volume show -volume svm1_root_lsm2
Notice that the svm1_root_lsm2 volume is now
read/write.
42
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAIL OVER LOAD-SHARING SNAPMIRROR RELATIONSHIPS
If the SVM root volume becomes unavailable, and you protected it with a set of load-sharing mirror copies,
you can promote one of the mirrored volumes, then rename it to take the place of the original source volume.
Check the LS SnapMirror relationship:
cluster1::> snapmirror show -type ls
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
Last
Healthy
---------
-------
Idle
cluster1://svm1/svm1_root
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
true
cluster1://svm1/svm1_root_lsm2
Snapmirrored
Idle
true
2 entries were displayed.
4-51
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Promote the LS destination volume:
cluster1::> snapmirror promote -destination-path
cluster1://svm1/svm1_root_lsm2
Warning: Promote will delete the read-write volume
cluster1://svm1/svm1_root
and replace it with cluster1://svm1/svm1_root_lsm2.
Do you want to continue? {y|n}: y
[Job 122] Job is queued: snapmirror promote of destination
"cluster1://svm1/svm1[Job 122] Job succeeded: SnapMirror: done
Verify that the volume is online and writeable:
cluster1::> volume show -volume svm1_root_lsm2
Vserver
Volume
Aggregate
State
Type Size
Available Used%
--------- --------- ------------ ---------- ---- ------ --------- ----svm1
svm1_root_lsm2
n1_aggr1
online
RW
20MB
18.85MB
5%
The svm1_root_lsm2 volume is now read/write.
The destination volume that is the target of the promote command is now the source volume for the loadsharing mirror set, and all NFS file handles and CIFS connections are not interrupted.
4-52
Remember that load-sharing mirror volumes are read-only and that all client access requests are directed
only to destination volumes. Thus, no read-only connections exist to the source volume that was removed
by the promote operation, except for connections that might access the read-write admin share.
NFS file handles and CIFS connections to the read/write admin share are nondisruptively transferred to
the new source volume.
Read-only connections to the promoted volume are nondisruptively transferred to other destination
volumes in the load-sharing mirror set.
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Fail Over Load-Sharing SnapMirror
Relationships
Rename the Source Volume
The promote operation also deletes the original source
volume, and the specific SnapMirror relationship for the
promoted destination volume is removed:
cluster1::> snapmirror show -type LS
To retain the name for the source load-sharing mirror set,
rename the volume:
cluster1::> volume rename -vserver svm1 -volume
svm1_root_lsm2 -newname svm1_root
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
FAIL OVER LOAD-SHARING SNAPMIRROR RELATIONSHIPS: RENAME THE
SOURCE VOLUME
The promote operation also deletes the original source volume, and the specific SnapMirror relationship for
the promoted destination volume is removed.
cluster1::> snapmirror show -type ls
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
Last
Healthy
---------
-------
true
cluster1://svm1/svm1_root_lsm2
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
Idle
Because the promoted volume would have a different volume name than the original source volume, the new
source volume can be renamed to retain that name for the source of the load-sharing mirror set, as shown in
the following example.
Rename the volume to retain the name for the source load-sharing mirror set:
4-53
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
cluster1::> volume rename -vserver svm1 -volume svm1_root_lsm2 -newname
svm1_root
[Job 123] Job succeeded: Successful
cluster1::> snapmirror show -type ls
Progress
Source
Path
-----
Type
Updated
----
Destination
Path
Mirror Relationship Total
State Status
Progress
------------ ------- ----------
---------
Last
Healthy
-------
cluster1://svm1/svm1_root
LS
cluster1://svm1/svm1_root_lsm1
Snapmirrored
Idle
true
The source volume has changed for the svm1_root_lsm1 volume.
Best practice
The promote operation deletes the original source volume; therefore, you might need to create another loadsharing mirror destination volume on the node where the current source volume was located.
4-54
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 4
SnapMirror Advanced Topics
44
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: SNAPMIRROR ADVANCED TOPICS
4-55
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Converting a SnapMirror Relationship to
a SnapVault Secondary
FlexVol (vs1P:vol1_vs1P)
Primary
WAN
Remote
(vs1R:vol1_vs1R) FlexVol
45
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONVERTING A SNAPMIRROR RELATIONSHIP TO A SNAPVAULT SECONDARY
Problem:
Consider this scenario: A customer who is using SnapMirror in clustered Data ONTAP 8.1 wants to use
SnapVault technology in clustered Data ONTAP 8.3, for longer retention. Thus, you need to convert an
existing SnapMirror relationship to a SnapVault relationship.
Solution:
Upgrade your source and destination clusters to clustered Data ONTAP 8.3.
Your existing SnapMirror relationships continue to remain cluster scope and behave as they did in
clustered Data ONTAP 8.1.
These SnapMirror relationships do not benefit from the scalability improvements, unless they are deleted
and recreated.
However, both clustered Data ONTAP 8.1 and clustered Data ONTAP 8.3 use the block-level engine for
mirrors, thus no rebaseline is required; only resync is required.
Refer to the Clustered Data ONTAP 8.3 Data Protection Guide for the exact steps to convert a SnapMirror
data protection mirror relationship to a SnapVault secondary.
4-56
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Intercluster SnapMirror Throttle
To limit the amount of bandwidth that is used by intercluster
SnapMirror transfers, apply a throttle to intercluster SnapMirror
relationships.
46
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INTERCLUSTER SNAPMIRROR THROTTLE
To limit the amount of bandwidth that is used by the intercluster SnapMirror transfers, apply a throttle to
intercluster SnapMirror relationships.
When creating a new relationship, you can set a throttle through the CLI by adding the throttle
option and a value in kilobytes, by modifying an existing relationship with the snapmirror modify
command.
NetApp OnCommand System Manager 3.0 does not currently support SnapMirror throttle management.
In this example, a 10 megabyte (MB) throttle is applied to an existing relationship by using the
snapmirror modify command.
cluster02::> snapmirror modify -destination-path cluster02://vs1/vol1
throttle 10240
To change the throttle of an active SnapMirror relationship, terminate the existing transfer and restart it, to use
the new value. The SnapMirror feature restarts the transfer from the last restart checkpoint by using the new
throttle value, rather than restarting from the beginning.
NOTE: Intracluster SnapMirror relationships, which use the cluster interconnect, do not allow a throttle to be
set. However, starting with clustered Data ONTAP 8.2.1, intracluster throttle is supported, and the process
works the same way as intercluster throttle works.
4-57
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
References
NetApp University courses:
Data ONTAP 8.3 Administration
NetApp Documentation:
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Infinite Volumes Management Guide
Clustered Data ONTAP File Access and Protocols Management
Guide
NetApp Technical Report:
TR-4015: SnapMirror Configuration Best Practices Guide for Clustered
Data ONTAP 8.2
47
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
4-58
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
What Ken Learned in this Module
Now I understand how to design and implement
a SnapMirror solution. More importantly, I
understand how to recover my data by using
SnapMirror software, in case a disaster
happens.
48
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHAT KEN LEARNED IN THIS MODULE
4-59
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Exercise
Module 4: Using SnapMirror
for Data Protection
Time Estimate: 60 Minutes
49
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
4-60
Data ONTAP Data Protection Administration: Using SnapMirror for Data Protection
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module 5
SnapVault Backup and
Recovery
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE 5: SNAPVAULT BACKUP AND RECOVERY
5-1
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module Objectives
After this module, you should be able to:
Describe SnapVault technology
Create, schedule, and monitor SnapVault replication
operations
Manage SnapVault backup and restore operations
Use SnapVault software to recover data
Understand monitoring and management tasks for SnapVault
and SnapMirror solutions
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
5-2
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 1
SnapVault Technology
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 1: SNAPVAULT TECHNOLOGY
5-3
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault Technology
The SnapVault backup solution provides long-term, storageefficient retention of backups.
SnapVault relationships enable you to back up selected
Snapshot copies of volumes to a destination volume and to
retain the backups.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT TECHNOLOGY
Snapshot technology is the foundation for SnapRestore, SnapManager, SnapDrive, SnapMirror, FlexClone,
and SnapVault operations. SnapVault technology is a NetApp disk-to-disk backup solution that is built into
the Data ONTAP operating system. To enable SnapVault software on your NetApp system, you install a
license key; no additional hardware or software must be installed. SnapVault software enables you to replicate
your data to a secondary volume and to retain the data for longer than you might retain data on your primary
volume.
A SnapVault backup is a collection of Snapshot copies on a FlexVol volume, from which you can restore data
if the primary data is not usable. Snapshot copies are created based on a Snapshot policy. The SnapVault
backup backs up Snapshot copies based on its schedule and on SnapVault policy rules.
You can create a SnapVault relationship between FlexVol volumes and assign a SnapVault policy to the
relationship to create a SnapVault backup. A SnapVault backup contains a set of read-only backup copies,
which are located on a secondary volume.
NOTE: SnapVault relationships are supported on clustered Data ONTAP 8.2 or later. SnapVault
relationships are not supported on infinite volumes.
An important architectural change is that SnapVault software in clustered Data ONTAP replicates at the
volume Level rather than at the qtree level, as was true in SnapVault for Data ONTAP operating in 7-Mode.
This means that the source of a SnapVault relationship must be a volume, and that volume must replicate to
its own volume on the SnapVault secondary.
5-4
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Clustered Data ONTAP Nondisruptive
Operations and SnapVault
SnapVault administrators can seamlessly rebalance
SnapVault primaries and secondaries for performance or
capacity needs.
You can move SnapVault primary and secondary volumes to
different aggregates or nodes within a cluster without
disrupting SnapVault operations.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CLUSTERED DATA ONTAP NONDISRUPTIVE OPERATIONS AND SNAPVAULT
SnapVault users can now take advantage of nondisruptive operations, which are essential to the architecture
of clustered Data ONTAP. SnapVault administrators can seamlessly rebalance SnapVault primaries and
secondaries for performance or capacity needs, because they can now move SnapVault primary and secondary
volumes to different aggregates or nodes within a cluster without disrupting SnapVault operations.
If a SnapVault transfer is in progress when a volume is moved by using the vol move operation, the
transfer may pause for a few minutes during the volume cutover phase. However, the transfer resumes from
the most recent transfer checkpoint after the vol move operation completes. Administrators never have to
reconfigure a SnapVault relationship just because a volume was moved to another node by using the vol
move operation.
5-5
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault Operations
Primary Volume
(Read/Write)
Secondary Volume
(Data Protection)
Snapshot Policy
Label = Svault
SnapVault Policy
Label = Svault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT OPERATIONS
You create SnapVault relationships to back up and restore volumes. You can select the Snapshot copies that
the SnapVault relationship uses to back up and restore volumes.
The Snapshot policy that is assigned to the source volume specifies when Snapshot copies are performed and
assigns a label to the Snapshot copy. The SnapVault policy that is assigned to the SnapVault relationship
specifies which source volume Snapshot copies are replicated to the SnapVault backup, by indicating the
Snapshot copy label.
Data that is not backed up to a SnapVault backup
If you back up an entire storage virtual machine (SVM) to a SnapVault backup by establishing a SnapVault
relationship for each volume in the SVM, namespace and root information is not backed up. To protect
namespace and root information for an SVM, you must manually create the namespace and root on the
SnapVault secondary volume.
5-6
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Topics for Discussion
When should I deploy a SnapVault relationship instead of
a SnapMirror relationship?
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TOPICS FOR DISCUSSION
5-7
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 2
Implementing SnapVault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: IMPLEMENTING SNAPVAULT
5-8
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Typical Workflow
Create a preconfiguration checklist.
Check the licensing requirements.
Check and create cluster and SVM peer relationships.
Use and create a SnapVault policy.
Use and create a Snapshot policy and Snapshot label.
Choose and create a destination volume.
Perform a baseline transfer.
Automate updates.
(This lesson will demonstrate this workflow.)
9
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: TYPICAL WORKFLOW
5-9
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault Preconfiguration Checks
Privileges
Peer relationships
A SnapVault policy
The snapmirror-label attribute
The amount of time that you need for the baseline transfer
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT PRECONFIGURATION CHECKS
5-10
You must have either cluster administrator privileges to perform this task for a cluster, or SVM
administrator privileges to perform this task for an SVM.
If the primary and secondary volumes are in different SVMs or clusters, peer relationships must exist.
A SnapVault policy must exist. You can either create one or accept the default SnapVault policy
(XDPDefault) that is automatically assigned. Only Snapshot copies with labels that are configured in the
SnapVault policy rules are replicated by SnapVault.
The Snapshot policy that is assigned to the primary volume must include the snapmirror-label
attribute. Snapshot copies on the primary volume without the snapmirror-label attribute are
ignored by the SnapVault software.
Depending on the amount of data on the primary volume and other factors, it might take a long time to
complete the baseline transfer.
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Check SnapVault Licenses
Check for the required licenses:
cluster1::> system license show
Owner: cluster1-01
Package
Expiration
Type
Description
----------------- ------- ----------------SnapVault
11
license SnapVault License
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: CHECK SNAPVAULT LICENSES
Check that you have the required licenses installed:
cluster1::> system license show
Serial Number: 1-80-000008
Owner: cluster1
Package
Type
Description
Expiration
----------------- ------- --------------------- -------------------Base
license Cluster Base License
Serial Number: 1-81-0000000000000004082368507
5-11
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Owner: cluster1-01
Package
Type
Description
Expiration
-----------------------
-------
---------------------
-------------
NFS
license
NFS License
CIFS
license
CIFS License
SnapRestore
license
SnapRestore License
SnapMirror
license
SnapMirror License
FlexClone
license
FlexClone License
SnapVault
license
SnapVault License
7 entries were displayed.
If necessary, perform this check on both source and destination clusters.
5-12
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Create a Peer SVM on the Destination Cluster
If necessary, create an SVM on cluster2 for SnapVault:
cluster2::> vserver create -vserver svm1_2
-rootvolume svm1_2_root -aggregate aggr1
-rootvolume-security-style ntfs
[Job 46] Job succeeded:
Vserver creation completed
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: CREATE A PEER SVM ON THE
DESTINATION CLUSTER
Create a peer SVM on cluster2:
cluster2::> vserver create -vserver svm1 -rootvolume svm1_root -aggregate
aggr1 -rootvolume-security-style ntfs
[Job 44] Job succeeded:
Vserver creation completed
5-13
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Create a New SnapVault Policy
Use either the default SnapMirror policy that is named
XDPDefault, or create a new policy.
Create a new SnapVault policy on the primary (source)
cluster:
cluster1::> snapmirror policy create -vserver svm1
-policy svm1-vault-policy
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: CREATE A NEW SNAPVAULT POLICY
There is a default policy that you can use, named XDPdefault, that protects Snapshot copies with the
daily and weekly SnapMirror labels. The default policy keeps seven daily Snapshot copies and 52 weekly
Snapshot copies.
Create a new SnapVault policy named svm1-vault-policy:
cluster1::> snapmirror policy create -vserver svm1 -policy svm1-vaultpolicy
NOTE: Many SnapMirror commands apply to SnapVault software.
5-14
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Add a SnapVault Policy Rule
Add the snapmirror-label attribute and a Snapshot copy
retention:
cluster1::> snapmirror policy add-rule -vserver
svm1 -policy svm1-vault-policy -snapmirror-label
SnapVault -keep 7 -preserve false
The policy keeps seven Snapshot copies on
the volume.
Verify that the rule is using the correct label:
cluster1::> snapmirror policy show
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: ADD A SNAPVAULT POLICY RULE
Add the snapmirror-label and a Snapshot copy retention:
cluster1::> snapmirror policy add-rule -vserver svm1 -policy svm1-vaultpolicy -snapmirror-label SnapVault -keep 7 -preserve false
Verify that the rule is using the correct label:
cluster1::> snapmirror policy show
SVM
Policy
Policy
Number
Transfer
Name
Name
Comment
Type
Of Rules
Tries
Priority
------svm1
-----------------svm1-vault-policy
-----vault
-------1
------8
-------normal
-
SnapMirror Label: SnapVault
Keep: 7
Total Keep:
7
The -preserve option allows you to keep any Snapshot copies that are more recent than the common
Snapshot copy on the SnapVault secondary volume, and that are not present on the primary volume.
5-15
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
The Snapshot Copy Policy
Check the Snapshot copy policy on the source volume to
ensure that it is using the snapmirror-label attribute.
The snapmirror-label attribute must match the
snapmirror-label attribute in the SnapVault policy.
You might decide to use a preconfigured Snapshot copy
policy or to create a new policy.
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: THE SNAPSHOT COPY POLICY
5-16
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Modify a Snapshot Copy Policy
Check the existing Snapshot copy policies:
cluster1::> volume snapshot policy show
Modify the 2Hour_Policy that was created previously:
cluster1::> volume snapshot policy modify -vserver
svm1 -policy 2Hour_Policy -snapmirror-labels
SnapVault
The SnapMirror label exactly matches the
SnapMirror label in the SnapVault policy.
Verify that the snapmirror-label attribute is correct:
cluster1::> volume snapshot policy show
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: MODIFY A SNAPSHOT COPY POLICY
Modify the Snapshot policy on the primary (source) volume so that it includes the snapmirror-label attribute:
cluster1::>volume snapshot policy show
SVM: svm1
Number of
Is
Policy Name
Schedules
Enabled
Comment
--------------------
---------
-------
-----------------------------
true
Takes a Snapshot Copy Every 2
Hours
2Hour_Policy
Schedule
Count
Prefix
SnapMirror Label
----------------
-----
----------------
-------------
2HourSnapshot
2HourSnapshot
84
Modify the 2Hour_Policy that you created earlier:
cluster1::> volume snapshot policy modify -vserver svm1 -policy
2Hour_Policy -snapmirror-labels SnapVault
5-17
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Verify that the snapmirror-label attribute is correct:
cluster1::> volume snapshot policy show
SVM: svm1
Number of
Is
Policy Name
Schedules
Enabled
Comment
---------------------
---------
-------
------------------------
true
Takes a Snapshot Copy
Every 2 Hours
2Hour_Policy
Schedule
Count
Prefix
SnapMirror Label
----------------
-----
----------------
-------------------
2HourSnapshot
84
2HourSnapshot
SnapVault
Notice that the SnapMirror label in the policy exactly matches the snapmirror-label attribute in the
SnapVault policy.
5-18
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Create a SnapVault Destination Volume
Create a new volume to be the recipient of the SnapVault
transfers:
cluster2::> volume create -vserver svm1_2 -volume
svm1_2_vol1 -aggregate aggr1 -size 200m -type DP
-security-style ntfs
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: CREATE A SNAPVAULT DESTINATION
VOLUME
When you create a FlexVol volume using the -type DP option, it is created with settings that reflect best
practices for destination volumes. These are different from the default settings that are used for RW volumes.
Space setting
RW volume
DP volume
space-guarantee
volume
volume
autosize
false
true
autosize-mode
off
grow_shrink
Percent
85 (percent)
85 (percent)
autosize-shrinkthreshold-Percent
50 (percent)
80 (percent; autosizegrowthreshold-percent -5)
min-autosize
Initial volume size
Initial volume size
max-autosize
120% of volume size
Maximum aggregate size
Snap reserve (percentsnapshot-space)
5 (percent)
0 (percent)
fractional-reserve
100 (percent)
0 (percent)
autosize-growthreshold-
5-19
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Create the volume:
cluster2::> volume create -vserver svm1_2 -volume svm1_2_vol1 -aggregate
aggr1 -size 200m -type DP -security-style ntfs
5-20
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Create a Cron Schedule for the Backup Strategy
Check the schedules that are currently available on the
destination cluster:
cluster2::> job schedule show
Create a new schedule:
cluster2::> job schedule cron create -name
SnapVaultJob -dayofweek all -hour all -minute 10
This job runs every day, every hour, at 10 minutes past the hour.
Verify that the new schedule was created correctly:
cluster2::> job schedule cron show
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: CREATE A CRON SCHEDULE FOR THE
BACKUP STRATEGY
On the destination cluster, review existing schedules to see whether any of them meet your requirements, by
using the job schedule show command. If an existing schedule meets your requirements, you do not
need to create a new schedule.
Check the schedules that are currently available on the destination cluster:
cluster2::> job schedule show
Name
Type
Description
-----------
---------
---------------------------------------------
5min
cron
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
cron
@2:15,10:15,18:15
Auto Balance Aggregate Scheduler
interval
Every 1h
RepositoryBalanceMonitorJobSchedule
interval
Every 10m
daily
cron
@0:10
hourly
cron
@:05
weekly
cron
Sun@0:15
7 entries were displayed.
5-21
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Create a new schedule by using the job schedule cron create command:
cluster2::> job schedule cron create -name SnapVaultJob -dayofweek all hour all -minute 10
This job will run every day of the week, every hour of the day, at ten minutes past the top of the hour.
Verify that the new schedule was created correctly:
cluster2::> job schedule cron show
Name
Description
----------------
--------------------------------------------------
5min
@:00,:05,:10,:15,:20,:25,:30,:35,:40,:45,:50,:55
8hour
@2:15,10:15,18:15
Hourly_SnapMirror
@:03
SnapVaultJob
@:10
daily
@0:10
hourly
@:05
weekly
Sun@0:15
7 entries were displayed.
5-22
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Implementing a SnapVault Solution
Create a SnapVault Policy on the Destination Cluster
Create a SnapVault policy:
cluster2::> snapmirror policy create -vserver
svm1_2 -policy svm1_2_vault-policy
Add the snapmirror-label attribute:
cluster2::> snapmirror policy add-rule -vserver
svm1_2 -policy svm1_2_vault-policy -snapmirrorlabel SnapVault -keep 20
The snapmirror label matches the source volume.
The retention is different from
the source volume.
Verify that the snapmirror label is correct:
cluster2::> snapmirror policy show -vserver svm1_2
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: CREATE A SNAPVAULT POLICY ON
THE DESTINATION CLUSTER
This task is performed from the destination cluster.
You can use a default policy that is named XDPdefault, which protects Snapshot copies with the daily
and weekly SnapMirror labels. The default policy keeps seven daily Snapshot copies and 52 weekly
Snapshot copies.
NOTE: Depending on how it is defined, a SnapVault policy can be available to a specific SVM or to the
entire cluster. SVM-wide policies can be configured by both SVM administrators and cluster administrators,
but a cluster-wide policy can be configured only by a cluster administrator.
For more information, refer to the Clustered Data ONTAP Data Protection Guide.
The example in this procedure creates an SVM-wide policy.
Create a SnapVault policy by using the snapmirror policy create command:
cluster2::> snapmirror policy create -vserver svm1_2 -policy
svm1_2_vault-policy
Add the snapmirror-label attribute and Snapshot copy retention:
cluster2::> snapmirror policy add-rule -vserver svm1_2 -policy
svm1_2_vault-policy -snapmirror-label SnapVault-Backup -keep 20
5-23
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Verify that the SnapMirror label is correct.
cluster2::> snapmirror policy show -vserver svm1_2
SVM
Policy
Policy Number
Name
Name
Type
Of Rules
Tries
------- ---------
------
--------
------
svm1_2
vault
5-24
svm1_2_vault-policy
Transfer
Priority
8
SnapMirror Label:
Keep: 20
SnapVault
Keep: 20
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
-------normal
Comment
------
Implementing a SnapVault Solution
Create a SnapVault Relationship
Create the SnapVault relationship:
cluster2::> snapmirror create -source-path
svm1:svm1_vol1 -destination-path
svm1_2:svm1_2_vol1 -type XDP -policy svm1_2_vaultpolicy -schedule SnapVaultJob
Start the baseline transfer:
cluster2::> snapmirror initialize -destinationpath cluster2://svm1_2/svm1_2_vol1
Verify the SnapVault status:
cluster2::> snapmirror show
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
IMPLEMENTING A SNAPVAULT SOLUTION: CREATE A SNAPVAULT RELATIONSHIP
This task is performed from the destination SVM.
On the destination SVM, create a SnapVault relationship, and assign an XDP policy by using the
snapmirror create command with the -type XDP parameter and the policy parameter:
cluster2::> snapmirror create -source-path svm1:svm1_vol1 -destinationpath svm1_2:svm1_2_vol1 -type XDP -policy svm1_2_vault-policy -schedule
SnapVaultJob
Initialize the relationship by using the snapmirror initialize command to start a baseline transfer.
The command creates a new Snapshot copy that is transferred to the destination volume and is used as a
baseline for subsequent incremental Snapshot copies. The command does not transfer any Snapshot copies
that currently exist on the source volume.
NOTE: Scheduled updates will not succeed until the SnapVault relationship completes initialization.
You do not have to initialize the SnapVault relationship when you create it. You can initialize the relationship
from the destination SVM at a later time that can better accommodate the baseline transfer.
Start the baseline transfer:
cluster2::> snapmirror initialize -destination-path
cluster2://svm1_2/svm1_2_vol1
5-25
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Verify the SnapVault status:
cluster2::> snapmirror show
Progress
Source
Destination
Relationship
Total
Type
Path
Mirror
Last
Path
State
Progress Healthy Updated
----------- -------------- ------------
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
true
-------
-------------------
------------
-------
--
Snapmirrored
Idle
Display more detail by using the instance parameter:
cluster2::> snapmirror show -instance
Source Path: svm1:svm1_vol1
Destination Path: svm1_2:svm1_2_vol1
Relationship Type: XDP
Relationship Group Type: none
SnapMirror Schedule: SnapVaultJob
SnapMirror Policy Type: vault
SnapMirror Policy: svm1_2_vault-policy
Tries Limit: Throttle (KB/sec): unlimited
Mirror State: Snapmirrored
Relationship Status: Idle
File Restore File Count: File Restore File List: Transfer Snapshot: Snapshot Progress: Total Progress: Network Compression Ratio: Snapshot Checkpoint: Newest Snapshot: snapmirror.1383c700-4345-11e497f5-0050
560140c1_2147484678.2014-0923_182150
Newest Snapshot Timestamp: 09/23 16:16:29
Exported Snapshot: snapmirror.1383c700-4345-11e497f5-0050
560140c1_2147484678.2014-0923_182150
5-26
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Exported Snapshot Timestamp: 09/23 16:16:29
Healthy: true
Unhealthy Reason: Constituent Relationship: false
Destination Volume Node: cluster2-01
Relationship ID: 466c0484-434e-11e4-97f50050560140c1
Current Operation ID: Transfer Type: Transfer Error: Current Throttle: Current Transfer Priority: Last Transfer Type: initialize
Last Transfer Error: Last Transfer Size: 21.31KB
Last Transfer Network Compression Ratio: 1:1
Last Transfer Duration: 0:0:19
Last Transfer From: svm1:svm1_vol1
Last Transfer End Timestamp: 09/23 18:22:09
Progress Last Updated: Relationship Capability: 8.2 and above
Lag Time: 2:9:8
Number of Successful Updates: 0
Number of Failed Updates: 0
Number of Successful Resyncs: 0
Number of Failed Resyncs: 0
Number of Successful Breaks: 0
Number of Failed Breaks: 0
Total Transfer Bytes: 21820
Total Transfer Time in Seconds: 19
5-27
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 3
Restoring Data with SnapVault
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 3: RESTORING DATA WITH SNAPVAULT
5-28
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
How do I restore my data with SnapVault
software?
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
5-29
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Restoring Data with SnapVault
Modifying and Removing SnapVault Policy Rules
You can use SnapVault software to restore data to these
volumes:
Original source volume
New, empty secondary volume
New secondary volume that already contains data
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORING DATA WITH SNAPVAULT: MODIFYING AND REMOVING SNAPVAULT
POLICY RULES
Guidelines for restoring the active file system
The restore operation from a SnapVault backup copies a single, specified Snapshot copy from a SnapVault
secondary volume to a specified volume. Restoring a volume from a SnapVault secondary volume changes
the view of the active file system but preserves all earlier Snapshot copies in the SnapVault backup.
Before restoring a volume, you must shut down any application that accesses data in a volume to which a
restore is writing data. Therefore, you must dismount the file system, shut down any database, and deactivate
and quiesce the local volume manager (LVM), if you are using an LVM. The restore operation is disruptive.
When the restore operation finishes, the cluster administrator or SVM administrator must remount the volume
and restart all applications that use the volume.
The restore destination volume must not be the destination of another mirror or the secondary of another
SnapVault relationship.
You can restore to the following volumes:
5-30
Original source volume: You can restore from a SnapVault secondary volume back to the original
SnapVault primary volume.
New, empty secondary volume: You can restore from a SnapVault secondary volume to a new, empty
secondary volume. You must first create the volume as a data protection volume.
New secondary volume that already contains data: You can restore from a SnapVault secondary volume
to a volume that is prepopulated with data. The volume must have a Snapshot copy in common with the
restore primary volume and must not be a data protection volume.
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Performing Restore Operations
A restore operation from a SnapVault backup consists of a series
of actions that are performed on a temporary restore relationship
and on the secondary volume:
A new temporary relationship is created from the restore source.
The restore destination might be the original volume or a new
volume.
During the restore operation, the destination volume is changed
to read-only.
When the restore operation finishes, the temporary relationship
is removed.
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
PERFORMING RESTORE OPERATIONS
A restore operation from a SnapVault backup consists of a series of actions that are performed on a temporary
restore relationship and on the secondary volume.
During a restore operation, the following actions occur:
5-31
A new temporary relationship is created from the restore source (which is the original SnapVault
relationship secondary volume) to the restore destination. The temporary relationship is a restore type
(RST). The snapmirror show command displays the RST type while the restore operation is in
progress.
The restore destination might be the original SnapVault primary volume or might be a new SnapVault
secondary volume.
During the restore process, the restore destination volume is changed to read-only.
When the restore operation finishes, the temporary relationship is removed, and the restore destination
volume is changed to read-write.
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Restoring a Volume from a SnapVault Backup
Restore a volume by using the snapmirror restore
command:
cluster1::> snapmirror restore -destination-path
svm1:svm1_vol1 -source-path svm1_2:svm1_2_vol1
-source-snapshot 5min.2014-09-23_2010
Choose exactly and carefully which
Snapshot copy to use in the restore
operation.
Verify the restore status:
cluster1::> snapmirror show-history
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORING A VOLUME FROM A SNAPVAULT BACKUP
If the data on a volume becomes unavailable, you can restore the volume to a specific time by copying a
Snapshot copy in the SnapVault backup. You can restore data to the same primary volume or to a new
location. This is a disruptive operation.
CIFS traffic must not be running on the SnapVault primary volume when a restore operation is running.
This task describes how to restore a whole volume from a SnapVault backup. To restore a single file or LUN,
you can restore the whole volume to a different, nonprimary volume, and then select the file or LUN, or you
can use the NetApp OnCommand management software online management tools.
If the volume to which you are restoring has compression enabled, and the secondary volume from which you
are restoring does not have compression enabled, disable compression. You disable compression to retain
storage efficiency during the restore.
Restore a volume by using the snapmirror restore command:
cluster1::> snapmirror restore -destination-path svm1:svm1_vol1 -sourcepath svm1_2:svm1_2_vol1 -source-snapshot 5min.2014-09-23_2010
Warning: All data newer than Snapshot copy 5min.2014-09-23_2010 on volume
svm1:svm1_vol1 will be deleted.
Export policies currently enforced on the qtrees of volume
"svm1:svm1_vol1" will not change during this operation. If the
currently enforced export policies are different from those in
Snapshot copy "5min.2014-09-23_2010", reassign the export
policies of the qtrees on this volume after this operation.
5-32
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Do you want to continue? {y|n}: y
[Job 104] Job is queued: snapmirror restore from source
"svm1_2:svm1_2_vol1" for the snapshot 5min.2014-09-23_2010.
Verify the restore status:
cluster1::> snapmirror show-history
Destination Source
Path
Path
----------- -----------
Start
End
Operation
Time
Time
---------
-----------
----------- --------
9/23/2014
9/23/2014
20:14:48
20:14:53
Result
svm1:svm1_vol1
svm1_2:svm1_2_vol1
restore
5-33
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
success
Restoring a Single File or LUN
You can restore a single file or LUN or a set of files or LUNs
from a Snapshot copy in a SnapVault secondary volume to
the active file system of a primary volume.
You can restart a failed or aborted single file or LUN restore
operation by reissuing the snapmirror restore
command.
For more information about restoring LUNs, see the Clustered Data ONTAP
8.3 SAN Administration Guide.
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORING A SINGLE FILE OR LUN
You can restore a single file or LUN or a set of files or LUNs from a Snapshot copy in a SnapVault secondary
volume to the active file system of a primary volume. To restart a failed or aborted single file or LUN restore
operation, reissue the snapmirror restore command.
5-34
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Topics for Discussion
What should you consider when restoring LUNs?
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TOPICS FOR DISCUSSION
5-35
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 4
SnapVault Advanced Topics
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: SNAPVAULT ADVANCED TOPICS
5-36
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
What can be done to prevent a baseline
transfer from using a lot of my network
bandwidth?
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
5-37
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault Advanced Topics
SnapVault tape seeding
Managing storage efficiency for SnapVault secondary
volumes
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT ADVANCED TOPICS
5-38
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault Advanced Topics
SnapVault Tape Seeding (1 of 2)
Typically, you create a prepopulated secondary volume when
you copy a primary volume to a secondary volume by using
tape. This process is called tape seeding.
Destination
Volume
Source
Volume
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT ADVANCED TOPICS: SNAPVAULT TAPE SEEDING (1 OF 2)
Tape seeding is an SMTape functionality that helps you initialize a destination FlexVol volume in a data
protection mirror relationship.
Tape seeding enables you to establish a data protection mirror relationship between a source system and a
destination system over a low-bandwidth connection. Incremental mirroring of Snapshot copies from the
source to the destination is feasible over a low-bandwidth connection. However, an initial mirroring of the
base Snapshot copy takes a long time over a low-bandwidth connection. In such a case, you can perform an
SMTape backup of the source volume to a tape and use the tape to transfer the initial base Snapshot copy to
the destination. You can then set up incremental SnapMirror updates to the destination system by using the
low-bandwidth connection.
Before creating a SnapVault relationship to a prepopulated secondary, implement these guidelines:
The primary and secondary volumes must have a common Snapshot copy.
Snapshot copies on the secondary volume that are newer than the common Snapshot copy are deleted.
When a SnapVault relationship is created, all Snapshot copies on the secondary volume that are more recent
than the common Snapshot copy and that are not present on the primary volume are deleted. Newer Snapshot
copies on the primary volume that match the configured SnapVault policy are transferred to the secondary
volume according to the SnapVault policy. You can use the -preserve option to keep any Snapshot
copies that are more recent than the common Snapshot copy on the SnapVault secondary volume and that are
not present on the primary volume.
5-39
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
When you use the -preserve option, data on the secondary volume is logically made the same as the
common Snapshot copy. All newer Snapshot copies on the primary volume that match the SnapVault policy
are transferred to the secondary volume. This option is useful when the latest common Snapshot copy is
deleted from the primary volume but another, older common Snapshot copy between the primary and
secondary volumes still exists.
For more information, refer to the Clustered Data ONTAP 8.3 Data Protection Tape Backup and Recovery
Guide and the Clustered Data ONTAP 8.3 Data Protection Guide.
5-40
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SnapVault Advanced Topics
SnapVault Tape Seeding (2 of 2)
After a tape seeding operation, convert a data protection
destination volume to a SnapVault secondary volume:
1. Break the data protection mirror relationship.
2. Delete the existing data protection mirror relationship.
3. Remove the relationship from the source SVM.
4. Create a SnapVault relationship using the type XDP
parameter.
5. Convert the destination volume from read-write to a
SnapVault volume, and establish the SnapVault relationship
by using the snapmirror resync command.
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPVAULT ADVANCED TOPICS: SNAPVAULT TAPE SEEDING (2 OF 2)
When you are tape seeding, after you transfer the data from the tape to the volume, the volume is a data
protection destination volume.
In the case of a SnapVault secondary volume to disaster protection volume cascade, if the SnapVault
secondary volume is lost, you can resume SnapVault protection by creating a direct relationship between the
SnapVault primary volume and the disaster protection destination volume. To do this, you must make the
disaster protection destination volume a SnapVault secondary volume.
1. Break the data protection mirror relationship by using the snapmirror break command. The
relationship is broken, and the disaster protection volume becomes a read-write volume.
2. If an existing data protection mirror relationship exists, use the snapmirror delete command to
delete the relationship.
3. Remove the relationship information from the source SVM by using the snapmirror release
command. This also deletes the Snapshot copies that were created by Data ONTAP from the source
volume.
4. Create a SnapVault relationship between the primary volume and the read-write volume by using the
snapmirror create command with the -type XDP parameter.
5. Convert the destination volume from a read-write volume to a SnapVault volume, and establish the
SnapVault relationship, by using the snapmirror resync command.
5-41
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Managing Storage Efficiency for SnapVault
Secondary Volumes
If the primary volume does not have storage efficiency enabled,
you can enable storage efficiency on a SnapVault secondary
volume by enabling storage efficiency on the volume:
To enable storage efficiency, use the volume efficiency
command with the -on parameter.
If the volume already has data that you want to make storage
efficient, use the volume efficiency command with the start and -scan-old-data parameters to start a scan of
the volume.
33
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGING STORAGE EFFICIENCY FOR SNAPVAULT SECONDARY VOLUMES
Guidelines for managing storage efficiency for SnapVault backups
If both the primary and secondary volumes in a SnapVault relationship have storage efficiency enabled, then
data transfers to the SnapVault secondary volume preserve storage efficiency. If the primary volume does not
have storage efficiency enabled, you might want to enable storage efficiency only on the secondary volume.
Because SnapVault secondary volumes typically contain a large amount of data, it is important to maximize
storage efficiency on SnapVault secondary volumes.
If storage efficiency is enabled on the primary volumes
If the primary volume in a SnapVault relationship is enabled for storage efficiency, all data backup operations
preserve the storage efficiency.
If storage efficiency is enabled only on the secondary volume
If the primary volume in a SnapVault relationship does not have storage efficiency enabled, you might want
to enable storage efficiency for the secondary volume, because it is likely to contain a large amount of data
over time.
You can use the volume efficiency command to start a scan on the volume, if data is already present
on the volume from transfers. If this is a new relationship with no transfers, then you do not need to run the
scan manually.
5-42
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Changes to the volume's efficiency schedule do not take effect for a SnapVault secondary volume. Instead,
when storage efficiency is enabled, the SnapVault relationship manages the schedule. When a data transfer
begins, the storage efficiency process automatically pauses until the transfer is finished and automatically
begins again after the data transfer is complete. Because data transfers to a SnapVault secondary volume
might include more than one Snapshot copy, the storage efficiency process is paused for the entire duration of
the update operation. After the transfer is finished, and the post-transfer storage efficiency process is
complete, the last Snapshot copy that was created in the secondary volume is replaced by a new, storageefficient Snapshot copy.
If the last Snapshot copy that is created in the secondary volume is locked before it can be replaced by a new,
storage-efficient Snapshot copy, then a new, storage-efficient Snapshot copy is still created, but the locked
Snapshot copy is not deleted. That Snapshot copy is deleted later during the storage-efficient cleanup process,
after a subsequent update to the SnapVault secondary volume and after the lock is released. A Snapshot copy
in a SnapVault secondary volume might be locked because the volume is the source in another relationship,
such as a data protection mirror relationship.
If the secondary volume has additional compression enabled, storage efficiency is not preserved.
Storage efficiency on all data transfers in SnapVault relationships is not preserved when the secondary
volume has additional compression enabled. Because of the loss of storage efficiency, a warning message is
displayed when you enable compression on a SnapVault secondary volume. After you enable compression on
the secondary volume, you can never have storage-efficient transfers.
5-43
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 5
Monitoring and Managing
SnapVault and SnapMirror
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 5: MONITORING AND MANAGING SNAPVAULT AND SNAPMIRROR
5-44
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Managing Replication Updates
If you want to do this
Use this command.
Get SnapVault status.
snapmirror show
Manually update a SnapVault relationship.
snapmirror update
Modify SnapVault relationship properties.
snapmirror modify
Modify a mirror policy or SnapVault policy.
snapmirror policy modify
Modify an existing rule in a SnapVault policy.
snapmirror policy
modify-rule
Remove a rule in a SnapVault policy.
snapmirror policy
remove-rule
Delete a mirror policy or SnapVault policy.
snapmirror policy delete
SnapMirror commands are used to manage SnapMirror and SnapVault
relationships.
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MANAGING REPLICATION UPDATES
Commands for managing mirror and SnapVault policies
Cluster administrators can use the snapmirror policy commands to create and manage all data
protection mirror and SnapVault policies. SVM administrators can use the same commands to create and
manage all data protection mirror and SnapVault policies within SVMs.
5-45
All policy-management commands (except for the snapmirror policy show command) must be
run on the SVM that contains the destination volume.
Commands for SnapVault policies are supported only by FlexVol volumes.
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Get the SnapVault or SnapMirror
Relationship Status
Use these commands on the destination cluster:
cluster2::> snapmirror show
Get more details by using the destination-path or the
instance (or fields) options:
cluster2::> snapmirror show -destination-path
svm1_2:svm1_2_vol1
To get more granular data, use the fields option.
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
GET THE SNAPVAULT OR SNAPMIRROR RELATIONSHIP STATUS
You can use the snapmirror show command to get various levels of detail about a SnapVault
relationship.
Use these commands on the destination cluster:
cluster2::> snapmirror show
Progress
Source
Path
Type
Updated
--------
----
Destination
Path
----------
Mirror
State
Relationship
Status
------- ------------
Total
Progress
Last
Healthy
---------
-------
svm1:svm1_vol1
XDP
svm1_2:svm1_2_vol1
Snapmirrored
Idle
true
Get more details by using the destination-path or the instance options:
cluster2::> snapmirror show -destination-path svm1_2:svm1_2_vol1
Source Path: svm1:svm1_vol1
Destination Path: svm1_2:svm1_2_vol1
Relationship Type: XDP
5-46
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Relationship Group Type: none
SnapMirror Schedule: SnapVaultJob
SnapMirror Policy Type: vault
SnapMirror Policy: svm1_2_vault-policy
Tries Limit: Throttle (KB/sec): unlimited
Mirror State: Snapmirrored
Relationship Status: Idle
File Restore File Count: File Restore File List: Transfer Snapshot: Snapshot Progress: Total Progress: Network Compression Ratio: Snapshot Checkpoint: Newest Snapshot: snapmirror.1383c700-4345-11e497f5-0050560140c1_2147484678.
2014-09-23_182150
Newest Snapshot Timestamp: 09/23 16:16:29
Exported Snapshot: snapmirror.1383c700-4345-11e497f5-0050560140c1_2147484678.
2014-09-23_182150
Exported Snapshot Timestamp: 09/23 16:16:29
Healthy: true
Unhealthy Reason: Constituent Relationship: false
Destination Volume Node: cluster2-01
Relationship ID: 466c0484-434e-11e4-97f50050560140c1
Current Operation ID: Transfer Type: Transfer Error: Current Throttle: Current Transfer Priority: Last Transfer Type: initialize
Last Transfer Error: Last Transfer Size: 21.31KB
Last Transfer Network Compression Ratio: 1:1
5-47
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Last Transfer Duration: 0:0:19
Last Transfer From: svm1:svm1_vol1
Last Transfer End Timestamp: 09/23 18:22:09
Progress Last Updated: Relationship Capability: 8.2 and above
Lag Time: 2:13:5
Number of Successful Updates: 0
Number of Failed Updates: 0
Number of Successful Resyncs: 0
Number of Failed Resyncs: 0
Number of Successful Breaks: 0
Number of Failed Breaks: 0
Total Transfer Bytes: 21820
Total Transfer Time in Seconds: 19
Use the fields option to get more granular data:
cluster2::> snapmirror show -fields ?
source-path
Source Path
source-cluster
Source Cluster
source-vserver
Source SVM
source-volume
Source Volume
destination-path
Destination Path
destination-cluster
Destination Cluster
destination-vserver
Destination SVM
destination-volume
Destination Volume
type
Relationship Type
relationship-group-type
Relationship Group Type
vserver
Managing SVM
schedule
SnapMirror Schedule
policy-type
SnapMirror Policy Type
policy
SnapMirror Policy
tries
Tries Limit
throttle
Throttle (KB/sec)
current-throttle
Throttle (KB/sec)
Current Transfer
state
Mirror State
status
Relationship Status
file-restore-file-count
File Restore File Count
5-48
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
file-restore-file-list
File Restore File List
transfer-snapshot
Transfer Snapshot
snapshot-progress
Snapshot Progress
total-progress
Total Progress
network-compression-ratio
Ratio
Network Compression
snapshot-checkpoint
Snapshot Checkpoint
newest-snapshot
Newest Snapshot
newest-snapshot-timestamp
Timestamp
Newest Snapshot
exported-snapshot
Exported Snapshot
exported-snapshot-timestamp
Timestamp
Exported Snapshot
healthy
Healthy
relationship-id
Relationship ID
current-operation-id
Current Operation ID
current-transfer-type
Transfer Type
current-transfer-error
Transfer Error
last-transfer-type
Last Transfer Type
last-transfer-error
Last Transfer Error
last-transfer-size
Last Transfer Size
last-transfer-network-compression-ratio
Compression Ratio
Last Transfer Network
last-transfer-duration
Last Transfer Duration
last-transfer-from
Last Transfer From
last-transfer-end-timestamp
Timestamp
Last Transfer End
unhealthy-reason
Unhealthy Reason
progress-last-updated
Progress Last Updated
relationship-capability
Relationship Capability
lag-time
Lag Time
current-transfer-priority
Priority
Current Transfer
is-smtape-op
SMTape Operation
is-constituent
Constituent Relationship
destination-volume-node
Name
asynchronous
5-49
Destination Volume Node
Synchronous/Asynchronous
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
identity-preserve
Identity Preserve SVM DR
update-succ-cnt
Updates
Number of Successful
update-fail-cnt
Number of Failed Updates
resync-succ-cnt
Resyncs
Number of Successful
resync-fail-cnt
Number of Failed Resyncs
break-succ-cnt
Breaks
Number of Successful
break-fail-cnt
Number of Failed Breaks
tot-trans-bytes
Total Transfer Bytes
tot-trans-time-secs
Total Transfer Time in
Seconds
5-50
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Perform a SnapVault Manual Update
The snapmirror update command must be used from the
destination cluster:
cluster2::> snapmirror update -source-path
svm1:svm1_vol1 -destination-path
svm1_2:svm1_2_vol1 -source-snapshot
Emergency_SnapVault_Update
You can choose exactly which Snapshot
copy on the source volume to use.
37
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
PERFORM A SNAPVAULT MANUAL UPDATE
If you need to perform a SnapVault update in between regularly scheduled updates or instead of scheduled
updates, use the snapmirror update command.
The snapmirror update command updates the destination volume of a SnapMirror relationship.
The snapmirror update command behaves differently for data protection, vault, and load-sharing
relationships.
For vault relationships, the snapmirror update does not take a Snapshot copy on the source volume
but transfers only selected Snapshot copies that are newer than the common Snapshot copy to the
destination volume. (Copies that are older than the common copy can be transferred by using the source-snapshot parameter.)
Snapshot copies are selected by matching the value of -snapmirror-label of a Snapshot copy with
the value of -snapmirror-label of one of the rules from the corresponding SnapMirror policy that
is associated with the SnapMirror relationship.
The snapmirror update command must be used from the destination cluster:
cluster2::> snapmirror update -source-path svm1:svm1_vol1 -destinationpath svm1_2:svm1_2_vol1 -source-snapshot Emergency_SnapVault_Update
5-51
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Modify a SnapVault Relationship
Use the snapmirror modify command to change an
existing SnapVault relationship.
Change the update schedule to use the 5min schedule:
cluster2::> snapmirror modify -destination-path
svm1_2:svm1_2_vol1 -schedule 5min
38
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODIFY A SNAPVAULT RELATIONSHIP
The snapmirror modify command enables you to change one or more properties of SnapMirror
relationships. The key parameter that identifies any SnapMirror relationship is the destination volume.
Changes that are made by the snapmirror modify command do not take effect until the next manual or
scheduled update of the SnapMirror relationship. Changes do not affect updates that are started but are not yet
finished.
Change the update schedule to use the 5min schedule.
cluster2::> snapmirror modify -destination-path svm1_2:svm1_2_vol1 schedule 5min
Operation succeeded: snapmirror modify for the relationship with
destination "svm1_2:svm1_2_vol1".
5-52
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Modify a SnapVault Policy
Use the snapmirror policy modify command to modify
the policy attributes:
-comment
-tries
-transfer-priority
-ignore-atime
-restart
39
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODIFY A SNAPVAULT POLICY
You can use the snapmirror policy modify command to modify the policy attributes:
-comment
Specify a text comment for the policy.
-tries
Specify the maximum number of times to attempt each manual or scheduled
transfer.
-transfer-priority
Normal or low, normal transfers are scheduled before low-priority transfers.
-ignore-atime
True or false. Ignores the file access time.
-restart
Always, never, or default. Applies only to data protection relationships. A
setting of default is interpreted the same as a setting of always. Vault
transfers always resume based on a restart checkpoint, if the source Snapshot
copy still exists.
5-53
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Modify and Remove SnapVault Policy Rules
40
-keep
This rule specifies the maximum number of Snapshot copies that are retained on
the SnapMirror vault destination volume for a rule.
-preserve
This rule can be true or false. It specifies the behavior when the Snapshot copy
retention count is reached on the SnapMirror vault destination for the rule. The
default value is false.
-warn
This rule specifies the warning threshold count for the rule. The default value is 0.
-vserver
This rule specifies the SVM for the SnapMirror policy.
-policy
This rule specifies the SnapMirror policy name.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODIFY AND REMOVE SNAPVAULT POLICY RULES
You can use the snapmirror policy modify-rule command to modify the retention count, preserve
setting, and warning threshold count for a rule in a SnapMirror policy. If you reduce the retention count or
disable the preserve setting for a rule in a SnapMirror policy, it might result in the deletion of Snapshot copies
on the vault destination when the next transfer by the snapmirror update command occurs.
-keep
Specifies the maximum number of Snapshot copies that are retained on the SnapMirror
vault destination volume for a rule. The total number of Snapshot copies that are retained
for all the rules in a policy cannot exceed 251.
-preserve
True or false. Specifies the behavior when the Snapshot copy retention count is reached on
the SnapMirror vault destination for the rule. The default value is false, which means that
the oldest Snapshot copy is deleted to make room for new copies, only if the number of
Snapshot copies has exceeded the retention count that is specified in the "keep" parameter.
When set to true, an incremental SnapMirror vault update will fail, when the Snapshot
copies reach the retention count.
-warn
Specifies the warning threshold count for the rule. The default value is 0. When set to a
value greater than zero, an event is generated after the number of Snapshot copies (for the
particular rule) that are retained on a SnapMirror vault destination reaches the specified
warn limit. The preserve parameter for the rule must be true, to set the warn parameter to a
value that is greater than zero.
5-54
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
The snapmirror policy remove-rule command removes a rule from a SnapMirror policy. On the
vault destination, all Snapshot copies with a SnapMirror label matching the rule are no longer processed by
the snapmirror update command and might need to be deleted manually. A SnapMirror policy that is
associated with a SnapMirror vault relationship must have at least one rule.
-vserver
Specifies the SVM for the SnapMirror policy.
-policy
Specifies the SnapMirror policy name.
5-55
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
References
NetApp University courses:
Data ONTAP 8.3 Administration
NetApp Documentation:
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Data Protection Tape Backup and
Recovery Guide
NetApp Technical Reports:
Operational How-To Guide: NetApp Snapshot Management TR-4210
NetApp Data Compression and Deduplication Deployment and
Implementation Guide TR-3966
41
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
5-56
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
What Ken Learned in this Module
Now I know the differences between SnapVault
and SnapMirror technology. I learned how to
design and implement a SnapVault solution. I
know how to recover my data using SnapVault
software, and I learned how to monitor and
manage my SnapVault and SnapMirror
relationships.
42
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHAT KEN LEARNED IN THIS MODULE
5-57
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Exercise
Module 5: SnapVault Backup
and Recovery
Time Estimate: 45 Minutes
43
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXERCISE
Please refer to your exercise guide.
5-58
Data ONTAP Data Protection Administration: SnapVault Backup and Recovery
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module 6
Data Protection Using NDMP
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE 6: DATA PROTECTION USING NDMP
6-1
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module Objectives
After this module, you should be able to:
Describe how clustered Data ONTAP uses the NDMP
protocol
Describe design criteria for NDMP solutions
Implement the NDMP protocol to back up clustered Data
ONTAP 8.3 storage systems
Monitor and manage NDMP-based operations from the
perspective of clustered Data ONTAP 8.3
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
6-2
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 1
NDMP Technology
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 1: NDMP TECHNOLOGY
6-3
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NDMP Technology
NDMP is an industry-standard protocol that can control backup,
recovery, and data transfer between primary and secondary
storage devices.
All communications occur over TCP/IP or TCP/IPv6.
NDMP provides low-level control of tape drives and medium
changers.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NDMP TECHNOLOGY
NDMP is an industry-standard protocol for controlling backup, recovery, and data transfer between primary
and secondary storage devices, including storage systems and tape libraries.
Enabling the NDMP protocol on a NetApp storage system enables that storage system to communicate with
NDMP-enabled backup applications.
6-4
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Ken Asks
I dont understand the NDMP
terminology. Can you explain it?
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
KEN ASKS
6-5
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NDMP Key Terms and Concepts
Data management application (DMA)
Direct access recovery (DAR)
Cluster Aware Backup (CAB) extension
Connection address extension (CAE)
Affinity
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NDMP KEY TERMS AND CONCEPTS
Data management application
In the context of the NDMP protocol, DMA refers to your backup application.
Direct access recovery
DAR enables quick access to the secondary media during a recovery operation. In Data ONTAP 8.3,
enhanced DAR functionality is enabled by default. Enhanced DAR allows for directory DAR and DAR of
files with NT streams. You can enable or disable enhanced DAR in both node-scoped and storage virtual
machine (SVM)-scoped NDMP modes.
CAB extension
The CAB extension is an NDMPv4 protocol extension. This extension enables the NDMP server to establish
a data connection on a node that owns a volume. This extension also enables the backup application to
determine whether volumes and tape devices are located on the same node in a cluster.
To enable the NDMP server to identify the node that owns a volume and to establish a data connection on
such a node, the backup application must support the CAB extension. The CAB extension requires the backup
application to inform the NDMP server about the volume to be backed up or restored, before establishing the
data connection. This requirement enables the NDMP server to determine which node hosts the volume and to
appropriately establish the data connection.
When the backup application supports the CAB extension, the NDMP server provides affinity information
about volumes and tape devices. Using this affinity information, the backup application can perform a local
backup instead of a three-way backup, if a volume and tape device are located on the same node in a cluster.
Connection address extension
The CAE is used for IPv6 support.
6-6
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Affinity
When the backup application supports the CAB extension, the NDMP server provides unique location
information about volumes and tape devices. Using this affinity information, the backup application can
perform a local backup instead of a three-way backup, if a volume and a tape device share the same affinity.
If the volume moves from Node 1 to Node 2, affinity information about the volume and tape device changes.
Hence, for a subsequent backup, the DMA performs a three-way NDMP backup operation. This ensures
continuity of the backup policy for the volume, irrespective of the node to which the volume is moved.
6-7
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NDMP Modes, Connections, and Variables
Node-scoped NDMP mode
SVM-scoped NDMP mode
NDMP control connection
NDMP data connection
NDMP environment variables
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NDMP MODES, CONNECTIONS, AND VARIABLES
Node-scoped NDMP mode
Node-scoped NDMP mode enables you to perform tape backup and restore operations at the node level. You
must establish the NDMP control connection on a logical interface (LIF) that is hosted on the node that owns
the volume or tape devices.
NOTE: Node-scoped NDMP mode is deprecated, and it will be removed in a future major release of Data
ONTAP.
SVM-scoped NDMP mode
SVM-scoped NDMP mode enables you to back up and restore all volumes that are hosted across different
nodes in an SVM, as long as the backup application supports the CAB extension. If your backup application
supports the CAB extension, and if a volume and tape device share the same affinity, then the backup
application can perform a local backup or restore operation instead of a three-way restore operation.
NOTE: The NDMP control connection can be established on a data or admin LIF only if the NDMP service
is enabled on the SVM that owns the LIF.
SVM-scoped NDMP mode and Data ONTAP upgrades or installations
An upgrade of Data ONTAP from 8.1 to 8.3 causes NDMP to follow the node-scoped behavior. You can
explicitly disable node-scoped NDMP mode, so that tape backup and restore operations are performed in
SVM-scoped NDMP mode.
A new installation of Data ONTAP 8.3 causes NDMP to follow SVM-scoped mode by default. You can
perform node-scoped NDMP operations if you explicitly enable node-scoped NDMP mode.
NDMP control connection
The NDMP control connection is used to manage NDMP backup and restore requests and replies.
6-8
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NDMP data connection
The NDMP data connection is used only to transfer data.
NDMP environment variables
NDMP environment variables are used to communicate information about a backup or restore operation
between an NDMP-enabled backup application and a storage system.
Typically, the backup application sets the environment variables automatically. However, to support unique
circumstances, the backup administrator can set some environment variables manually. A backup
administrator rarely specifies environment variables; however, you might want to change the value of an
environment variable in order to characterize or work around a functional or performance problem. Many
backup applications provide a means to override or modify environment variables or to specify additional
environment variables. For information, see your backup application documentation.
Data ONTAP supports environment variables that have an associated default value. However, you can
manually modify these default values.
For a complete list of environment variables that are supported for SMTape and dump operations, see the
Clustered Data ONTAP 8.3 Data Protection Tape Backup and Recovery Guide.
6-9
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Node-Scoped NDMP
Behaves much like NDMP in Data ONTAP operating in 7-Mode
Requires NDMP to be enabled and configured per node:
The NDMP user must be set and defined on each node.
Uses only physical resources and is not aware of other nodes or any
logical management:
Node-scoped NDMP uses clusters or SVMs.
Requires the DMA to use a LIF on the node that hosts the desired volume:
The DMA backup policy must be updated if the volume or LIF move to a different
node.
Cannot use the NDMP CAB extension
Node-scoped NDMP mode is deprecated, and it will be removed in a
future major release of Data ONTAP.
8
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NODE-SCOPED NDMP
6-10
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SVM-Scoped NDMP
NDMP is now enabled and configured per SVM:
NDMP is in the allowed protocols list by default.
Authentication is now integrated with role-based access control
(RBAC):
This can be a single cluster-wide user (like admin).
SVM-scoped NDMP introduces LIF limitations and restrictions:*
NDMP must use an appropriate LIF type for some resources.
Some resource limitations are negated by a CAB extension.
With CAB, NDMP can back up any volume on any node and use
any tape device in the entire cluster.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM-SCOPED NDMP
*Refer to NetApp KB ID: 1014598: How to identify which resources are available through NDMP based on
LIF type
6-11
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 2
Design Criteria for NDMP
Solutions
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: DESIGN CRITERIA FOR NDMP SOLUTIONS
6-12
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NDMP Design Considerations
File history
Firewall policy
LIF connections
CAB extension support
Format of the NDMP backup
path
Use of the ndmpcopy
command
Backup of SnapMirror
destination data
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NDMP DESIGN CONSIDERATIONS
When you start the NDMP service on the storage system, note the following design considerations.
File history
NDMP services can generate file history data at the request of NDMP backup applications. File history is
used by backup applications to enable optimized recovery of selected subsets of data from a backup image.
File history generation and processing might be time-consuming and CPU-intensive for both the storage
system and the backup application.
NOTE: SMTape does not support file history.
If your data protection is configured for disaster recoverywhere the entire backup image is recoveredyou
can disable file history generation to reduce backup time. See your backup application documentation to
determine if it is possible to disable NDMP file history generation.
Firewall policy
The firewall policy for NDMP is enabled by default on all LIF types. In node-scoped NDMP mode, to back
up a FlexVol volume, you must use the backup application to initiate a backup on a node that owns the
volume. However, you cannot back up a node root volume.
LIF connections
You can perform NDMP backup from any LIF, as permitted by the firewall policies. If you use a data LIF,
you must select a LIF that is not configured for failover. If a data LIF fails over during an NDMP operation,
the NDMP operation fails and must be rerun.
CAB extension support
In node-scoped NDMP mode and SVM-scoped NDMP mode with no CAB extension support, the NDMP
data connection uses the same LIF as the NDMP control connection.
6-13
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Format of the NDMP backup path
The NDMP backup path uses the format IP_address:/vserver_name/volume_name/path_name, where
path_name is the path of the directory, file, or Snapshot copy.
Using the ndmpcopy command
The ndmpcopy command transfers data between storage systems using the NDMP v4 protocol. Both full and
incremental data transfers can be performed. You can transfer full or partial volumes, qtrees, directories, or
individual files.
You can run ndmpcopy at the command line of the source or destination storage systems, or of a storage
system that is neither the source nor destination of the data transfer. You can also run ndmpcopy on a single
storage system that is both the source and destination of the data transfer.
For the syntax and examples of the ndmpcopy command, see the Clustered Data ONTAP 8.3 Data
Protection Tape Backup and Recovery Guide.
Backing up SnapMirror destination data
When a SnapMirror destination is backed up to tape, only the data on the volume is backed up. The
SnapMirror relationships and the associated metadata are not backed up to tape. Therefore, during restore,
only the data on that volume is restored; the associated SnapMirror relationships are not restored.
6-14
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
NDMP Backup Models
Clustered Data ONTAP supports three models for NDMP
backups:
Direct (local)
Indirect (remote)
Three-way
The backup model is important because it defines who is
responsible for what.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
NDMP BACKUP MODELS
6-15
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Local NDMP Backup
DMA
Control Connection
NDMP Control
Connection LIF
Tape and Data Service
Cluster
Node 1
Node 2
Data
Connection
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOCAL NDMP BACKUP
6-16
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Remote NDMP Backup
DMA
Data Connection
Control Connection
NDMP Control
Connection LIF
Tape and Data Service
Cluster
Node 1
14
Node 2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REMOTE NDMP BACKUP
6-17
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Three-Way NDMP Backup
DMA
Control Connection
Tape Service
Data Service
Cluster
NDMP Control
Connection LIF
Node 1
NDMP Data
Connection LIF
Node 2
Data Connection
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THREE-WAY NDMP BACKUP
6-18
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Supported NDMP Authentication Methods
Plaintext
Challenge
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SUPPORTED NDMP AUTHENTICATION METHODS
In node-scoped NDMP mode, both authentication methods are enabled by default: challenge and plaintext.
You can disable plaintext, but you cannot disable challenge. In the plaintext authentication method, the login
password is transmitted as clear text.
In SVM-scoped NDMP mode, the default authentication method is challenge; you can choose to enable or
disable plaintext or challenge. However, one authentication mode must be enabled.
6-19
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
User Authentication in SVM-Scoped
NDMP Mode
NIS
LDAP
NDMP Username and
Password
RBAC
17
SVM
Cluster
vsadmin
admin
vsadmin-backup
backup
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
USER AUTHENTICATION IN SVM-SCOPED NDMP MODE
In SVM-scoped NDMP mode, NDMP user authentication is integrated with RBAC. In the SVM context, the
NDMP user must have either the vsadmin or vsadmin-backup role. In a cluster context, the NDMP user
must have either the admin or backup role.
In SVM-scoped NDMP mode, you must generate an NDMP password for a given user account, which is
created based on RBAC roles. Cluster users in an admin or backup role can access a node-management LIF,
cluster-management LIF, or an intercluster LIF. Users in a vsadmin-backup or vsadmin role can access only
the data LIF for that SVM. Therefore, depending on the role of a user, the availability of volumes and tape
devices for backup and restore operations vary.
This mode also supports user authentication for Network Information Service (NIS) and Lightweight
Directory Access Protocol (LDAP) users. Therefore, NIS and LDAP users can access multiple SVMs with a
common user ID and password. However, NDMP authentication does not support Active Directory users.
In SVM-scoped NDMP mode, a user account must be associated with the Secure Shell (SSH) application and
the user password authentication method.
6-20
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Scalability Limits for NDMP Sessions
System Memory of a Storage
System
18
Maximum Number of NDMP
Sessions
Less than 16 gigabytes (GB)
Greater than or equal to 16 GB but
less than 24 GB
20
Greater than or equal to 24 GB
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SCALABILITY LIMITS FOR NDMP SESSIONS
You must be aware of the maximum number of NDMP sessions that can be established simultaneously on
storage systems of different system memory capacities. This maximum number depends on the system
memory of a storage system.
6-21
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 3
Managing Node-Scoped
NDMP
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 3: MANAGING NODE-SCOPED NDMP
6-22
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Commands for Managing Node-Scoped
NDMP Mode
Use This Command
To Do This Action
system services ndmp on*
Enable NDMP service.
system services ndmp off*
Disable NDMP service.
system services ndmp show
Display NDMP configuration.
system services ndmp modify
Modify NDMP configuration.
system services ndmp
version*
Display the default NDMP version.
system services ndmp status*
Display all the NDMP sessions.
cluster1::> system services ndmp version
Node
Version
*Commands that are marked with an
--------------------asterisk on this slide are deprecated
and will be removed in a future major
cluster1-01
4
release.
cluster1-02
4
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMMANDS FOR MANAGING NODE-SCOPED NDMP MODE
You can use the system services ndmp commands to manage NDMP at a node level. On the slide, the
commands with an asterisk are deprecated and will be removed in a future major release.
For more information, see the man pages for the system services ndmp commands.
6-23
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Commands for Node-Scoped NDMP Mode
Advanced Privilege Level
Use This Command
To Do This Action
system services ndmp terminate
Forcefully terminate all the NDMP
sessions.
system services ndmp start
Start the NDMP service daemon.
system services ndmp stop
Stop the NDMP service daemon.
system services ndmp log
start*
Start logging for the specified NDMP
session.
system services ndmp log stop*
Stop logging for the specified NDMP
session.
cluster1::*> system services ndmp start -node
cluster1-01
*Commands that are marked with an
asterisk on this slide are deprecated
and will be removed in a future major
release.
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMMANDS FOR NODE-SCOPED NDMP MODE: ADVANCED PRIVILEGE LEVEL
You can use the following NDMP commands only at the advanced privilege level:
system
system
system
system
system
services
services
services
services
services
ndmp
ndmp
ndmp
ndmp
ndmp
terminate
start
stop
log start
log stop
On the slide, the commands with an asterisk are deprecated and will be removed in a future major release.
For more information, see the man pages for the system services ndmp commands.
6-24
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Commands for Node-Scoped NDMP Mode
Use This Command
To Do This Action
system services ndmp probe*
system services ndmp kill-all*
Display detailed information about
all the NDMP sessions.
Terminate the specified NDMP
session.
Terminate all the NDMP sessions.
system services ndmp password*
Change the NDMP password.
system services ndmp node-scope-mode
on*
system services ndmp node-scope-mode
off*
system services ndmp node-scope-mode
status*
Enable node-scoped NDMP mode.
system services ndmp kill*
Disable node-scoped NDMP mode.
Display the node-scoped NDMP
mode status.
cluster1::*> system services ndmp node-scope-mode status
NDMP node-scope-mode is disabled.
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMMANDS FOR NODE-SCOPED NDMP MODE
The commands with an asterisk are deprecated and will be removed in a future major release.
For more information, see the man pages for the system services ndmp commands.
6-25
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 4
Managing SVM-Scoped
NDMP
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: MANAGING SVM-SCOPED NDMP
6-26
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
SVM-Aware NDMP
Remote NDMP
Server
CAB-Enabled
DMA
Data or Intercluster LIF
Control
Connection
Control
Connection
Data or Intercluster LIF
Data
Connection
Target
Volume
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SVM-AWARE NDMP
With Data ONTAP 8.3, you can choose to perform tape backup and restore operations at the SVM level.
For NDMP to be aware of an SVM, the NDMP data management application software must be enabled with
CAB extensions, and the NDMP service must be enabled on the SVM.
After the feature is enabled, you can back up and restore all volumes that are hosted across all nodes in the
SVM. An NDMP control connection can be established on different LIF types. An NDMP control connection
can be established on any data or intercluster LIF that is owned by an SVM that is enabled for NDMP and
that owns the target volume. If a volume and tape device share the same affinity, and if the data management
application supports the CAB extensions, then the backup application can perform a local backup or restore
operation. Therefore, you do not need to perform a three-way backup or restore operation.
6-27
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Commands for Managing SVM-Scoped
NDMP Mode
25
Use This Command
To Do This Action
vserver services ndmp on
Enable NDMP service.
vserver services ndmp off
Disable NDMP service.
vserver services ndmp show
Display NDMP configuration.
vserver services ndmp modify
Modify NDMP configuration.
vserver services ndmp version
Display the default NDMP version.
vserver services ndmp status
Display all NDMP sessions.
vserver services ndmp probe
Display detailed information about
all NDMP sessions.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMMANDS FOR MANAGING SVM-SCOPED NDMP MODE
You can manage NDMP on a per-SVM basis by using the NDMP options and commands. You can modify
the NDMP options by using the vserver services ndmp modify command. In SVM-scoped NDMP
mode, user authentication is integrated with the RBAC mechanism.
You can add NDMP in the allowed or disallowed protocols list by using the vserver modify command.
By default, NDMP is in the allowed protocols list. If NDMP is added to the disallowed protocols list, NDMP
sessions cannot be established.
You can control the LIF type on which an NDMP data connection is established by using the -preferredinterface-role option. During an NDMP data connection establishment, NDMP chooses an IP address
that belongs to the LIF type as specified by this option. If the IP addresses do not belong to any of these LIF
types, then the NDMP data connection cannot be established.
You can use the vserver services ndmp commands to manage NDMP on each SVM.
6-28
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Try This
In your lab kit, log in to cluster 1.
Enter: vserver services ndmp version
Which NDMP version does the cluster support?
Enter: vserver services ndmp show
Is NDMP enabled for the cluster?
What is the current authentication type?
Enter: system services ndmp
Why are many of these commands deprecated?
Enter: system services ndmp version
Why is this output different from the vserver command that was entered
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
TRY THIS
6-29
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
earlier?
Commands for Managing SVM-Scoped
NDMP Mode
cluster1::*> vserver add-protocols -vserver svm1
-protocols ndmp
Add the NDMP protocol to the SVM.
cluster1::*> vserver services ndmp on -vserver svm1
Enable the NDMP service for the SVM.
cluster1::*> vserver services ndmp show
VServer
Enabled
Authentication type
------------- --------- ------------------cluster1
false
challenge
Check that NDMP is
enabled for the SVM.
svm1
true
challenge
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMMANDS FOR MANAGING SVM-SCOPED NDMP MODE
6-30
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Commands for Managing SVM-Scoped
NDMP Mode (Cont.)
Use This Command
To Do This Action
vserver services ndmp kill
Terminate a specified NDMP session.
vserver services ndmp kill-all
Terminate all NDMP sessions.
vserver services ndmp generatepassword
Generate the NDMP password.
vserver services ndmp
extensions show (advanced)
Display the NDMP extension status.
vserver services ndmp
extensions modify (advanced)
Modify (enable or disable) the NDMP
extension status.
vserver services ndmp log start
(advanced)
Start logging for the specified NDMP
session.
vserver services ndmp log stop
(advanced)
Stop logging for the specified NDMP
session.
*Commands that are marked with an asterisk on this slide are available only at the advanced privilege level.
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COMMANDS FOR MANAGING SVM-SCOPED NDMP MODE (CONT.)
Commands that are marked as (advanced) on this slide are available only at the advanced privilege level.
6-31
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
References
NetApp University course:
Clustered Data ONTAP 8.3 Administration
NetApp Documentation:
Clustered Data ONTAP 8.3 Data Protection Guide
Clustered Data ONTAP 8.3 Data Protection Tape Backup and
Recovery Guide
NetApp KB ID: 1014598. How to identify which resources are
available through NDMP based on LIF type.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
6-32
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
What Ken Learned in this Module
I had no idea I could use the NDMP protocol in
so many useful ways. Im looking forward to
getting my applications set up for SVM-scoped
backup.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WHAT KEN LEARNED IN THIS MODULE
6-33
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Course Post-Test
Please take some time now to complete the course post-test.
Taking the same exam again measures how much you learned.
All scores will remain private.
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
COURSE POST-TEST
6-34
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Your Learning Journey Continues
Visit Regularly to Stay Informed
NetApp University
NetApp
NetApp University Overview
New to NetApp Support Webcast
Find the training you need.
Ensure a successful support experience.
Explore certification.
NetApp Support
Follow your learning map.
NetApp University Community
Join the discussion.
Customer Success Community
Engage with experts.
NetApp University Support
Welcome to Knowledgebase
Contact the support team.
32
Access downloads, tools, and
documentation.
Access a wealth of knowledge.
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
YOUR LEARNING JOURNEY CONTINUES: VISIT REGULARLY TO STAY INFORMED
The NetApp University Overview page is your front door to learning. Find training that fits your learning map
and your learning style, learn how to become certified, link to blogs and discussions, and subscribe to the
NetApp newsletter Tech OnTap.
http://www.netapp.com/us/services-support/university/index.aspx
The NetApp University Community page is a public forum for NetApp employees, partners, and customers.
NetApp University welcomes your questions and comments!
https://communities.netapp.com/community/netapp_university
The NetApp University Support page is a self-help tool that enables you to search for answers and to contact
the NetApp University support team. http://netappusupport.custhelp.com
Are you new to NetApp? If so, register for the New to NetApp Support Webcast to acquaint yourself with
facts and tips that ensure that you have a successful support experience.
http://www.netapp.com/us/forms/supportwebcastseries.aspx?REF_SOURCE=new2ntapwl-netappu
The NetApp Support page is your introduction to all product and solution support:
http://mysupport.netapp.com.
Use the Getting Started link (http://mysupport.netapp.com/info/web/ECMP1150550.html) to establish your
support account and hear from the NetApp CEO. Search for products, downloads, tools, and documentation,
or link to the NetApp Support Community
(http://community.netapp.com/t5/Products-and-Solutions/ct-p/products-and-solutions).
Join the Customer Success Community to ask support-related questions, share tips, and engage with other
users and experts.
https://forums.netapp.com/
6-35
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Search the NetApp Knowledgebase to leverage the accumulated knowledge of NetApp users and product
experts.
https://kb.netapp.com/support/index?page=home
6-36
Data ONTAP Data Protection Administration: Data Protection Using NDMP
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Appendix A
Open Systems SnapVault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
APPENDIX A: OPEN SYSTEMS SNAPVAULT
NetApp University - Do Not Distribute
Module Objectives
After this module, you should be able to:
Describe how Open Systems SnapVault integrates with Data
ONTAP SnapVault
Describe Open Systems SnapVault advanced features
Configure and administer Open Systems SnapVault
Perform Open Systems SnapVault backup and restore
operations
Troubleshoot and resolve Open Systems SnapVault transfer
failures
2
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE OBJECTIVES
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 1
Open Systems SnapVault
Fundamentals
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 1: OPEN SYSTEMS SNAPVAULT FUNDAMENTALS
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Open Systems SnapVault
The primary storage system is
a Microsoft Windows system or
a UNIX-based open system.
The Open Systems SnapVault
agent is installed on the
primary system. The agent
enables the system to back up
its data to the secondary
storage system.
The secondary system uses
Data ONTAP SnapVault
technology to back up the
primary system data.
4
ESX Server
iSCSI
Linux Server
Windows Server
UNIX Server
Primary Systems
Running
Open Systems
SnapVault
FC
SnapVault
Secondary
Storage System
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
OPEN SYSTEMS SNAPVAULT
Open Systems SnapVault is a disk-to-disk data protection solution that uses NetApp SnapVault technology to
protect data that resides on these platforms:
Microsoft Windows
Red Hat Enterprise Linux
Novell SUSE Linux Enterprise Server
Sun Solaris
IBM AIX
HP HP-UX
VMware ESX Server
For a complete list of currently supported versions of these platforms, refer to the Open Systems SnapVault
2.6 Installation and Administration Guide on the NetApp Support site.
The Open Systems SnapVault agent software module is installed on the primary storage system. The agent
enables the system to back up its data to the secondary storage system.
The secondary system is a NetApp storage appliance, such as a NearStore storage system. The secondary
system uses Data ONTAP SnapVault technology to back up the data from the primary storage system.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Theory of Operation
The directory is the basic unit of Open Systems SnapVault backup.
An incremental update is based on file modification time. If blocklevel incremental (BLI) backup is enabled, only changed blocks are
transferred.
Creation of the Snapshot copy for archiving takes place on the
SnapVault secondary storage system.
Primary Systems
Windows
Server
SnapVault Secondary
Storage System
C:\data
/vol/vol1
qtree_data
UNIX
Server
qtree_usr
/usr
Online and Writable
Volume
Read-Only Qtrees
Replica
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THEORY OF OPERATION
Each directory, file, or drive that you want to back up from a primary system is backed up to its own qtree on
the SnapVault secondary storage system.
For the first backup, you perform an initial baseline transfer of the identified directory or file. This transfer
establishes the SnapVault relationship between the Open Systems SnapVault primary directory or file and its
mapped SnapVault secondary qtree.
You can initiate subsequent transfers manually, or you can configure transfers for automatic scheduled
updates. Using the Data ONTAP snapvault command, you specify the schedules on the secondary
system. You can also use an NDMP-based management application, such as Protection Manager or a thirdparty NDMP-based application that is supported.
When an incremental update request occurs, the Open Systems SnapVault primary storage system determines
whether the directory or file changed since the last successful transfer. This determination is made by
examining the file modification time. If BLI is enabled (for Windows platforms only), Open Systems
SnapVault determines on which blocks data changed. Then, Open Systems SnapVault sends only those
modified blocks to the secondary system. After the secondary qtree is updated, SnapVault creates a Snapshot
copy of the volume for archiving.
If a directory or file data needs to be restored to the primary system, SnapVault retrieves the data from one
specified Snapshot copy and transfers the data back to the primary system that requests it.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Central Management
Use these NDMP-based applications to centrally manage Open
Systems SnapVault backup schedules, retention policies,
backup control, and monitoring:
NetApp OnCommand Unified Manager
BakBone NetVault
Syncsort Backup Express
CommVault Galaxy
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CENTRAL MANAGEMENT
Open Systems SnapVault can be managed from a variety of management applications. These applications use
the NDMP protocol and TCP port 10000 for communication between an Open Systems SnapVault client and
the storage systems, over a TCP/IP network. Backup schedules, retention policies, backup control, and
monitoring are centrally configured on applications such as NetApp SnapProtect management software,
NetApp OnCommand Unified Manager, or third-party management programs.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Integrated Backup and Disaster
Recovery Solution
You can use SnapMirror software to replicate SnapVault backup copies to
a disaster recovery site.
If the SnapVault secondary storage system becomes unusable, you can
redirect the subsequent Open Systems SnapVault transfers to the tertiary
storage system.
Data Center
Disaster
Recovery
Site
Primary Open Systems
SnapVault
Systems
SnapVault
Volume
SnapMirror
SnapVault
7
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INTEGRATED BACKUP AND DISASTER RECOVERY SOLUTION
The Open Systems SnapVault primary systems provide the same advantages as other primary systems provide
in a data protection and disaster recovery scenario.
You can use the SnapMirror feature to protect the SnapVault secondary system from disasters. To configure,
set up SnapMirror relationships from the volumes on the SnapVault secondary system to volumes on a remote
(tertiary) NetApp storage system, as shown.
If the SnapVault secondary system becomes unusable because of a disaster, you can manually redirect the
subsequent Open Systems SnapVault transfers to the tertiary system. In effect, the tertiary system becomes
the new SnapVault secondary system. The Open Systems SnapVault transfers use the most recent Snapshot
copy that is common to both the primary and tertiary storage systems.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 2
Open Systems
SnapVault Features
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 2: OPEN SYSTEMS SNAPVAULT FEATURES
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Snapshot Copy Management
Open Systems SnapVault can retain Snapshot copies.
Snapshot copy management commonly uses two possible
configurations:
MaxCPRestartWaitTime
Sets the maximum waiting time a Snapshot copy is retained after a
transfer failure; the default is 10 minutes
FailCPRestartOnNewSnapshot
If a Snapshot copy is not available during restart, the following occurs:
When set to FALSE, a new Snapshot copy is created, and the transfer
continues.
When set to TRUE, the transfer is aborted.
To change these values, use the svsetstanza command or edit
the snapvault.cfg file on the Open Systems SnapVault primary
system.
9
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SNAPSHOT COPY MANAGEMENT
Common Snapshot copy management ensures that the same Snapshot copy is used for backup.
In releases earlier than Open Systems SnapVault 2.5, whenever the transfer of files failed, the Snapshot copies
were deleted. A new Snapshot copy was created during the transfer restart.
Open Systems SnapVault 2.5 can retain old Snapshot copies and use them during subsequent transfer restarts.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Checkpoints for Restart
Enable a failed transfer (baseline or update) to resume from
the last valid recorded checkpoint
Are not used to resynchronize a broken relationship or to
resume operations after a restore
Support checkpoints at block levels inside files
Enable a failed transfer to restart even from the middle of a
file
Enable configuration of the checkpoint interval:
Default is 300 seconds (5 minutes).
Minimum is 60 seconds.
10
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CHECKPOINTS FOR RESTART
Checkpoints are recorded by the Open Systems SnapVault primary system when certain predetermined
conditions or periodic intervals are met. The Open Systems SnapVault primary system records the
checkpoints and sends the checkpoints to the SnapVault secondary system.
In releases earlier than Open Systems SnapVault 2.5, checkpoints were taken at five-minute intervals or at the
end of a file. If a transfer failure for a large file occurred, this configuration made it necessary to send all the
file data again.
Open Systems SnapVault 2.5 and later releases support the following improvements in the checkpoint
mechanism:
10
Checkpoints are enabled at block levels inside files: This enhancement is useful when the dataset contains
large files (greater than 100 megabytes [MB]).
Checkpoints are allowed inside files: Therefore, you can restart the transfer even from the middle of a
file.
Checkpoint interval configuration is enabled: You can configure the checkpoint interval by editing the
snapvault.cfg file on the Open Systems SnapVault primary system.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Block-Level Incremental Backup
From the information in the timestamp and checksum
algorithm, BLI backup recognizes that a file changed.
Name-based BLI backup creates file modification issues.
Open Systems SnapVault agents address known issues of
file modification.
11
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
BLOCK-LEVEL INCREMENTAL BACKUP
11
BLI backup determines exactly which blocks in the file are changed, then backs up only those blocks to
the SnapVault secondary system.
Checksum database files are stored in the internal database directory of Open Systems SnapVault. Each
Open Systems SnapVault relationship contains its own checksum file directory. Disk storage
requirements to maintain the computed checksum values on the primary storage system are expected to be
approximately 2% of the baseline backup size.
Name-based applications, such as Microsoft Word, Excel, and PowerPoint, modify files by inserting new
data blocks in the file and rewriting all subsequent data blocks in the file to new positions in the file.
Because the modified file is considered new, a backup of all the rewritten blocks and a recalculation of
checksum are required.
Open Systems SnapVault agents work around this issue by recognizing files by name and by the filesystem location. You can use the Open Systems SnapVault Configurator to disable BLI backups for
certain name-based applications.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Block-Level Incremental Modes
BLI backup operates in three possible modes:
OFF: No checksums are computed. Full files are transferred after
they are identified as changed files.
HIGH (default): Checksums are computed on the initial transfers
and incremental update.
LOW: Checksums are computed on the first and subsequent
incremental updates.
You can configure the BLI backup values in the Open
Systems SnapVault Configurator.
12
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
BLOCK-LEVEL INCREMENTAL MODES
12
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Exclusion Lists and Encrypted Files
Backup exclusion lists exclude specified files, directories,
subdirectories, and paths from backups.
Open Systems SnapVault can back up and restore Encrypted
File System (EFS) files on Windows platforms:
BLI backup does not support the backup of EFS files.
Sufficient free space must be available in the target volume to
restore EFS files.
13
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
EXCLUSION LISTS AND ENCRYPTED FILES
The Open Systems SnapVault agent uses backup exclusion lists to exclude specified files, directories,
subdirectories, and entire paths from backups.
Open Systems SnapVault supports two types of exclusion lists:
File exclusion list entries consist of single-path elements. A file or directory is excluded if the file name
or any path element matches a file exclusion entry in the list. The file exclusion list is in the
install_dir/etc/file-exclude.txt file.
Path exclusion list entries consist of complete file system paths to either a directory or a file. The path
exclusion list is in the install_dir/etc/path-exclude.txt file.
Refer to the Open Systems SnapVault Installation and Administration Guide for details on supported
characters and wildcards for those file entries.
EFS-encrypted file restore requires the Open Systems SnapVault agent to create a temporary file. The file
must be equal to or greater than the size of the EFS-encrypted file that is being replaced.
13
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Open Systems SnapVault Database
The Open Systems SnapVault database is a set of files that
describe the relationship between primary and secondary systems:
History file
BLI checksums file (if BLI transfer is enabled)
Checkpoint file (if a backup transfer has failed with a checkpoint)
On the primary system, the database resides in
install_dir\snapvault\db\QsmDatabase.
On the secondary system, database backup is stored under the
qtree root as OSSV_DATABASE_BACKUP.
14
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
OPEN SYSTEMS SNAPVAULT DATABASE
Three backup levels of the Open Systems SnapVault database:
14
BLI (default): Backs up the history file and its corresponding BLI checksum file
DB only: Backs up only the history file
NONE: Disables the automatic database backup
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Restoring the Open Systems
SnapVault Database
If the Open System SnapVault database becomes corrupt or
gets out of sync with the secondary system, data transfers
fail. If you have a valid backup, you can restore the database.
To restore the database, issue the snapvault restore
command from the Open Systems SnapVault primary system,
and include the file name Open Systems
SnapVault_DATABASE_BACKUP in the path.
The Open Systems SnapVault database can be restored
without the need to initiate a baseline transfer.
If the file system was modified between backup and restore,
you must resynchronize the relationship.
15
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORING THE OPEN SYSTEMS SNAPVAULT DATABASE
After a database file is restored, Open Systems SnapVault decompresses the database file and places the files
where Open Systems SnapVault database files are located for the relationship. Data transfers can be
performed from this point onward. However, if the file system was modified between the backup and the
restore operations, you must resynchronize the relationship.
15
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
System State and Event Log Backup
Open Systems SnapVault supports Windows 2000 Server,
Windows Server 2003, and Windows 2008 system state
backup and restore:
The system can be restored to an earlier state.
Subsequent backups use BLI, when it is enabled.
System state backup can include a Windows Event Log:
Logs can be used for troubleshooting problems or for capacity
planning.
Configurable backup options are Application, Security, and
System event log backup.
Incremental updates of Windows Event Log files are not
supported.
16
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
SYSTEM STATE AND EVENT LOG BACKUP
You can back up and restore various components of the Windows 2000 Server and Windows Server 2003
system state:
Registry
COM+ Class Registration database
System files and settings, including the boot files
Certificate Services database
IIS Metadirectory
System files that are under Windows file protection
Performance counters
System state data on domain controllers (Active Directory and SYSVOL data)
You can add backups of Windows system state data to existing Open Systems SnapVault backup schedules.
Then you can use the backups to restore a system to an earlier state. You can also use an Open Systems
SnapVault system state data backup along with complete file system backups. These backups can be part of a
disaster recovery plan.
With Open Systems SnapVault support for Windows Event Log, you can maintain the records of all the
events that occur in the system. Such record keeping helps you troubleshoot problems or do capacity
planning.
You can use Open System SnapVault Configurator to enable or disable support for Windows Event Log.
Application, Security, and System event log backups are configurable options.
Incremental updates of Windows Event Log files are not supported. Every update does a full backup of event
logs.
16
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Restoring Open Systems SnapVault
To restore a directory or a file, use these methods:
Use CIFS or NFS to copy the file or directory.
Use the snapvault restore command.
Use the OnCommand Unified Manager server.
To restore an entire primary system, an operating system
must reside on the disk.
To restore files to a primary system from tape, perform these
steps:
1.Restore the data from the tape to the secondary system.
2.Restore from that secondary system to the Open Systems
SnapVault primary system.
17
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORING OPEN SYSTEMS SNAPVAULT
If data loss or corruption occurs on the Open Systems SnapVault primary system, the administrator can
restore a directory or a file, the entire system, or files from a tape device.
Restoring a directory or a file
When you use NFS or CIFS to copy files from the secondary system to the primary system, some Windows
and UNIX attributes are not preserved, such as Windows sparse files, Windows EFS data, and UNIX access
control lists.
Use the snapvault restore command that is issued from the Open Systems SnapVault primary CLI:
snapvault restore s sv_snapshot S
sec_hostname:/vol/sec_vol/sec_qtree/file.doc prim_hostname:dirpath
You can also use the OnCommand Unified Manager restore wizard or supported NDMP management
software.
Restoring an entire primary system
To restore an entire primary system from a SnapVault secondary system, perform these steps:
1.
2.
3.
4.
Reinstall the operating system on the primary system.
Reformat the file system just as the original file system was formatted.
Install the Open Systems SnapVault agent.
(Optional) If you backed up the primary system, restore the Windows system state data of the Open
Systems SnapVault primary system.
5. Use the snapvault restore command to restore the backed-up directories.
17
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Restoring to a primary system from tape
To restore from tape to a primary system, perform these steps:
1. Mount the tape with the files that need to be restored on the secondary system.
2. Use the Data ONTAP restore command to restore from the tape to the SnapVault secondary system.
3. Use the snapvault restore command to restore the files from the secondary system to the NFS or
CIFS primary system.
18
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Restore Limitations
You cannot use the snapvault restore command to
restore files to a directory that is part of a SnapVault
relationship. To restore these files, do these steps:
1.Release the SnapVault backup relationship from the primary
system before you perform the restore to the same location.
2.Restore the files to a new location.
NTFS-compressed files and directories lose compressed
attributes when the files and directories are restored.
18
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESTORE LIMITATIONS
Restoring to a directory that is part of a SnapVault relationship
If you attempt to use the snapvault restore command to restore files to a directory that is involved in a
SnapVault relationship, the attempt fails, and you see this message:
Invalid Qtree/Snapshot requested
Directory in wrong phase
Error performing restore. Check snapvault log.
The following information is logged in the SnapVault log files:
Invalid Qtree/Snapshot requested
Directory in wrong phase
To restore to such a directory, first release the SnapVault backup relationship. To release the relationship, use
the snapvault release command that is issued from the primary system:
snapvault release pathname sec_hostname:/vol/sec_vol/sec_qtree
Alternatively, you can restore the files to a new location on the primary system.
Restoring NTFS-compressed files and directories
Open Systems SnapVault does not restore the compressed attribute on a Windows file if both of these
conditions are true:
19
The file has a compressed attribute set.
The file has a sparse or compressed alternate data stream that is attached.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Resynchronization
To resynchronize a broken relationship, use the snapvault
start r command. This command does not support
resynchronization of restored subdirectories and single files.
To resynchronize after you use snapvault restore,
perform these steps:
1.Select the Enable restart/resync on restore option on the
primary system before you perform the restore.
2.Use the snapvault start r command to resynchronize the
relationship.
19
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
RESYNCHRONIZATION
To be able to continue incremental backups, you must resynchronize the relationship when the Open Systems
SnapVault primary and secondary systems become unsynchronized.
An Open Systems SnapVault relationship can get out of sync in these cases:
When an older version of the Open Systems SnapVault database is restored to the Open Systems
SnapVault primary system
When data is restored by using the snapvault restore command
When the state of the destination qtree in an Open Systems SnapVault relationship is changed to readwritable (such an operation breaks the Open Systems SnapVault relationship)
Open Systems SnapVault resynchronization is supported from Data ONTAP 7.2 and Open Systems
SnapVault 2.2 and later releases.
Resynchronizing a broken relationship
To resynchronize a broken Open Systems SnapVault relationship, on the SnapVault secondary system, enter
this command:
Secondary> snapvault start -r -S
prim_hostname:dirpathsec_hostname:/vol/sec_vol/sec_qtree
NOTE: Open Systems SnapVault does not support resynchronizing restored subdirectories and single files.
20
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Resynchronizing after a SnapVault restore
To perform subsequent incremental backups from the restored location to the same qtree on the secondary
storage system, resynchronize the relationship by performing these steps:
1. Before you restore the data, select the Enable restart/resync on restore check box in the Open Systems
SnapVault Configurator. By default, this option is not selected.
2. If you selected this option before you performed the SnapVault restore, use the snapvault start
r command to resynchronize the SnapVault backup relationship after the restore is completed.
3. If you did not select this option before you performed the SnapVault restore, you must initialize the
relationship after the restore. Issue the snapvault start command from the SnapVault secondary
system.
21
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 3
Open Systems
SnapVault Deployment
20
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 3: OPEN SYSTEMS SNAPVAULT DEPLOYMENT
22
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Installing Open Systems SnapVault
Install the Open Systems SnapVault agent on Windows
systems or UNIX-based systems.
An automatic postinstallation check occurs at the end of the
installation: svinstallcheck.
Unattended installation requires minimal user intervention:
Is supported on all platforms on which Open Systems SnapVault
is supported
Uses svconfigpackager to create the install image
Open TCP ports 10000 and 10566 before installation.
21
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
INSTALLING OPEN SYSTEMS SNAPVAULT
You can install the Open Systems SnapVault agent from the CD-ROM or from the Download Software page
on the NetApp Support site. Refer to the Open Systems SnapVault Release Notes and the Installation and
Administration Guide for details on the installation process for Windows-based and UNIX-based systems.
The Open Systems SnapVault agent installation stores these components on the primary system:
Open Systems SnapVault database
A set of executables
Logs file
Exclude Lists files
On a Windows primary, the default installation path is the C:\Program Files directory. On UNIX systems, the
default installation location is the /usr directory. During the installation process, you are prompted to enter the
NDMP account to connect to the primary system. You are also prompted to enter the NDMP listening port
and the host name or IP address of the secondary system. At the end of the installation routine, the
svinstallcheck utility verifies successful installation and ensures that the services are running properly.
Unattended installation
23
Unattended installation enables you to install or upgrade Open Systems SnapVault software over a large
number of Open Systems platforms with minimal user intervention. To perform an unattended installation
of Open Systems SnapVault, an installation script and other supporting files are required.
A utility called svconfigpackager is available in the Open Systems SnapVault software. When you
run this utility on an Open Systems SnapVault primary system, the utility saves the current configuration
settings to a file. Also, this utility can create an installation script that performs unattended installations or
upgrades, in conjunction with the configuration settings file and other files.
Ensure that the TCP port 10000 (for central management using NDMP) and TCP port 10566
(QSMSERVER) are open before Open Systems SnapVault is installed. For NetApp Host Agent, HTTP
port 4092 and HTTPS port 4093 must be open as well.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Windows Server 2008 R2
Firewall Configuration
Windows Server 2008 R2 includes a built-in firewall that must
be configured to allow SnapVault traffic.
Create an inbound rule and
add the appropriate ports.
22
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
WINDOWS SERVER 2008 R2: FIREWALL CONFIGURATION
24
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Open Systems SnapVault Primary
Use the Open Systems
SnapVault Configurator UI to
verify and modify Open
Systems SnapVault
parameters.
Use the svsetstanza
command as an alternative
to the Open Systems
SnapVault Configurator
utility.
23
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
OPEN SYSTEMS SNAPVAULT PRIMARY
Use the Open Systems SnapVault Configurator utility to verify and modify the Open Systems SnapVault
configuration parameters.
The Configurator utility is automatically installed during the Open Systems SnapVault agent installation. The
utility can be invoked from the Windows > Start > Programs menu or from the CLI. The svconfigurator.exe
program is located in the Install_dir/bin directory.
From the Configurator, you can perform actions from these tabs:
Machine tab: Displays information about the version of Open Systems SnapVault agent software and
primary system machine information, such as the IP address and OS version
Service tab: Enables you to stop and start the Open Systems SnapVault services
General tab: Enables you to generate debugging files and to modify the default db, tmp, and trace
directory locations
Trace Level tab: Is used (with the General tab) to choose which process to take traces of and chooses the
trace level
SnapVault tab: Enables you to specify the SnapVault secondary hostname or IP address and to modify
important parameters such as the BLI level, Open File Manager (OFM), Volume Shadow Copy Service
(VSS), and NDMP parameters
Alternatively, you can use the svsetstanza utility from the primary system for configuration purposes
instead of using the Configurator. The svsetstanza command is located in the install_dir/util directory.
25
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Configuring SnapVault Secondary
SnapVault secondary configuration steps are identical to the
steps that are used in a SnapVault storage system deployment:
1. Install the required licenses (not on the primary system).
2. Enable the NDMP service.
3. Specify the Open Systems SnapVault primary systems to
back up.
4. Initialize the baseline transfer.
5. Schedule updates.
24
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONFIGURING SNAPVAULT SECONDARY
SnapVault secondary configuration steps:
1. Install the required licenses.
sec> license add <license_code>
2. Ensure that the NDMP service is enabled.
sec> options ndmpd.enable on
3. Specify the names or IP addresses of the Open Systems SnapVault primary systems to back up and
restore.
sec> options snapvault.access host=prim_host1, prim_host2
4. For each Open Systems SnapVault platform directory or file that you want to back up to the SnapVault
secondary, execute an initial baseline transfer.
sec> snapvault start -S prim_hostname:dirpath
sec_hostname:/vol/sec_vol/sec_qtree
5. Schedule incremental updates.
For example:
sec> snapvault snap sched -x vol1 sv_hourly 11@mon-fri@7-18
The -x parameter causes SnapVault to copy new or modified files from the Open Systems SnapVault
system directory or file to their associated qtrees on the secondary. After all the secondary qtrees on the
specified volume are updated, the SnapVault secondary creates a Snapshot copy of this volume for
archiving.
26
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Monitoring Transfers
Use the snapvault status command to monitor the transfer progress,
status, and lag.
C:\> snapvault status -l c:\data
Source:
W2K3-Client:c:\data
Destination:
system:/vol/vol1/backup-windows
Status:
Transferring
State:
Source
Lag:
Mirror Timestamp:
Base Snapshot:
Current Transfer Type:
Contents:
Last Transfer Type:
Last Transfer From:
Bytes transferred so far:
18 MB
Transfer Time Elapsed:
00:00:21
Total files to transfer:
12
Total files transferred:
7
Current File Size:
8323815
Current File Progress:
2097152
Current File Name:
c:\data\file1
Transfer Error ID:
Transfer Error Message:
-
25
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MONITORING TRANSFERS
Use the snapvault status command to verify these things:
Whether a transfer is in progress
The state of the destination
How long ago the last successful transfer took place
If the -l option is given, the output displays more detailed information. The information includes these
things:
The total files to transfer
How many files were transferred
Which file is currently transferring
The transfer error ID, if any error occurred
For details on the snapvault status command output and options, refer to the Data ONTAP Data
Protection Online Backup and Recovery Guide.
27
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Open Systems SnapVault Commands
The SnapVault commands that are available from the Open Systems
SnapVault primary CLI are identical to the commands that are
supported on a SnapVault storage primary system:
C:\Program Files\netapp\snapvault\bin> snapvault
The following commands are available; for more
information type "snapvault help <command>"
abort
destinations
help
release
restore
status
service
diag
NOTE: The service and diag commands are specific to Open
Systems SnapVault primary systems.
26
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
OPEN SYSTEMS SNAPVAULT COMMANDS
SnapVault commands are stored in the Install_dir/bin directory. Refer to the SnapVault module of this course
for details of SnapVault command syntax:
Use the status command to monitor the status of an Open Systems SnapVault backup or restore.
Issue the destinations command to list all the known destinations for this Open Systems SnapVault
primary system.
The abort command enables you to stop a restore transfer from the secondary to the primary system.
The release command enables you to release relationships that are stopped on the secondary system.
If data loss or corruption occurs on the primary system, use the restore command to restore the
affected file, directory, drive, or even the entire system.
Use the service command to manage the Open Systems SnapVault service.
Issue the diag command to display details of a given error number.
NOTE: The service and diag commands are specific to Open Systems SnapVault primary systems.
28
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Log Files
Open Systems SnapVault primary log files:
Windows primary system:
install_dir\netapp\snapvault\etc
UNIX-based primary system:
/usr/snapvault
A new file that is created daily at midnight:
Filename: snapvault.yyyymmdd
No extension for the current file
SnapVault secondary log files:
root volume: /etc/log/snapmirror
27
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LOG FILES
You can find the operational status and problem reports of the Open Systems SnapVault primary system in
the log file named snapvault.
On the Open Systems SnapVault primary, these log files are found:
On a Windows primary system, log files are in the C:\Program Files\netapp\snapvault\etc directory.
On a UNIX-based primary system,log files are in the /usr/snapvault directory.
A new file is created daily at midnight or as soon after midnight as the first subsequent activity on the system
takes place. The existing file is not archived until a new file is created.
The current file has no extension. The archived files use the .yyyymmdd extension, where yyyy is the year, mm
is the month, and dd is the date when the file was created.
The log file is created during the initial baseline transfer, not by the install process. Therefore, if you search
for the log file after you complete the installation, but before you back up data for the first time, you do not
find the log file.
29
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Lesson 4
Best Practices and
Troubleshooting
28
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
LESSON 4: BEST PRACTICES AND TROUBLESHOOTING
30
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Considerations
Open Systems SnapVault does not back up NFS mount points
and CIFS shares.
Open Systems SnapVault built-in databases require free space.
Use the Free Space Estimator utility.
OFM requires at least 15% disk space in the drive that is being
backed up.
Open Systems SnapVault supports a maximum of 16 concurrent
transfers.
The presence of a large number of small files can degrade
performance.
The application database must be dismounted before Open
Systems SnapVault backups are initiated.
29
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
CONSIDERATIONS
Open Systems SnapVault does not back up remote NFS or CIFS file systems that are mounted on or mapped
to UNIX or Windows primary systems.
The Open Systems SnapVault database space requirements depend on several things:
BLI level, the number of files
Average file size
Number of directories to back up
Use the Free Space Estimator utility to ensure that there is sufficient space on the Open Systems SnapVault
install drive to perform an incremental update. If OFM (Windows 2000 Server) is used, the file systems that
are being backed up must contain at least 15% of free disk space in the drive that is being backed up. If free
space is not available, disable OFM for those drives.
Open Systems SnapVault supports a maximum of 16 simultaneous transfers from a primary system. Plan your
backup schedules to ensure that 16 or fewer transfers occur at the same time.
When you use Open Systems SnapVault, some overhead is always transferred for the files in the Open
Systems SnapVault relationship that were modified. The Open Systems SnapVault primary system sends one
4-kilobyte (KB) header for every file and directory that exist in the relationship. In addition, for files and
directories that are larger than 2 MB, an additional 4-KB header is transferred for every 2 MB.
A large number of small files can degrade performance. A large number of files can result in a large amount
of overhead data. If a large number of files is not likely to be modified, consider changing the BLI level to
LOW.
Open Systems SnapVault is not integrated with any database backup APIs. The database files need to be
dismounted before you use Open Systems SnapVault to back up the files. To use the hot backup mode
method, users need to script the procedure and test the script to ensure that the procedure works reliably in
their environment.
31
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Error Messages
Collect error messages that are logged on the Open Systems
SnapVault primary and the SnapVault secondary:
snapvault status l
/etc/log/snapmirror
C:\Install_dir\snapvault\etc (Windows example)
On the primary, use the snapvault diag <err_num> to
display details for a given error number.
Error messages, causes, and actions are listed in the Open
Systems SnapVault Installation and Administration Guide.
30
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
ERROR MESSAGES
To diagnose and troubleshoot Open Systems SnapVault issues, collect and analyze the error messages that are
logged on these systems:
Open Systems SnapVault primary (Install_dir/snapvault)
SnapVault secondary (/etc/log/snapmirror) systems
On the Open Systems SnapVault primary CLI, use the snapvaultdiag <err_num> command to display
details for a snapvault status l given error code. The error code number is displayed in the
command output.
Example:
$ snapvaultdiag 3016
Type: Error
Message: A network error has occurred.
Possible cause: The network socket was closed unexpectedly or the
transfer was aborted by the user.
Possible action to take: Verify network connectivity between the Open
Systems SnapVault primary system and the secondary storage system.
Error codes ranges:
1000 to 1999: Information messages
2000 to 2999: Warning messages
3000 to 3999: Errors causing an abort of the transfer
Not all values in the range are used. A complete list of error codes, strings, causes, and actions is available in
the Open Systems SnapVault Installation and Administration Guide.
32
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Data Collection
Open Systems SnapVault INFO tool:
Collects a complete set of information, command outputs, and
(optionally) ChangeLog and trace files
Is packaged with the Open Systems SnapVault agent:
OSSVINFO.exe for W2K and W2K3
OSSVINFO.pl for Linux-based and UNIX-based systems
Generate debug information:
Traces are compressed into a .bin file.
31
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
DATA COLLECTION
When you contact the NetApp Support site, use either of two methods to provide information:
Provide a set of files and command outputs.
Run the Open Systems SnapVault INFO tool on the affected Open Systems SnapVault primary to collect
a complete set of information from the primary and the secondary systems.
The Open Systems SnapVault INFO tool is packaged with Open Systems SnapVault, and two versions are
available:
Open Systems SnapVault INFO.exe for Windows 2000 Server and Windows Server 2003 Open Systems
SnapVault primary systems
Open Systems SnapVault INFO.pl for Linux-based and UNIX-based Open Systems SnapVault primary
systems
The Open Systems SnapVault INFO tool writes the data to the output directory as a text file in a specific
format. Also, the tool collects the ChangeLog and trace files to this output directory if either the -q (for
Windows) or -all (for all platforms) option is given, as illustrated in this example:
Open Systems SnapVaultINFO.exe [ -s secondary ] [ -l username:password]
[-q qtreeid][-all] Output_Dir
The ChangeLog file captures duplicate inode issues and metadata corruption at run time. The ChangeLog
capture is enabled by default in the snapvault.cfg file.
NetApp technical support might ask you to enable Open Systems SnapVault debugging to troubleshoot the
issue. The traces that are collected are automatically compressed into a .bin extension file.
When you generate debug files, complete these actions:
33
Disable the generation of these files after you send a batch to technical support.
To minimize the impact on performance, delete the debug files from the system after you send the files to
technical support.
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Baseline Transfer Assistance
Open Systems SnapVault
Using a portable device, the logical replication utility (LREP)
initializes SnapVault or Open Systems SnapVault data
transfers over low-bandwidth connections.
Two utilities are used:
lrep_reader
lrep_writer
LREP supports Open Systems SnapVault data restore, data
compression, and encryption.
LREP 2.0 is packaged with Open Systems SnapVault 2.5 and
later releases and is downloadable from the NetApp Support
site.
32
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
BASELINE TRANSFER ASSISTANCE: OPEN SYSTEMS SNAPVAULT
The LREP tool uses a portable device to initialize Open Systems SnapVault data transfers without traversing
the network:
You ship the portable device to the location of the SnapVault secondary system.
Next, you move the data from the portable device to the secondary system.
After the relationship between the primary and secondary systems is established and modified,
incremental transfers can occur directly.
You can also use LREP to restore data from the secondary storage system to the primary system.
The LREP tool consists of two utilities:
lrep_reader: used at the remote office to write data from the Open Systems SnapVault primary system to
the portable device
lrep_writer: used at the location of the SnapVault secondary storage system to write data from the
portable device to the secondary storage system
Using a zlib library, LREP enables the compression of data. Compression of LREP data is done in the
memory, before the data is written to the disk.
The Advanced Encryption Standard algorithm is used to encrypt and decrypt the LREP data.
LREP 2.0 is packaged with Open Systems SnapVault 2.5 and later. You can also download the LREP tool
from the NetApp Support site. You run the tool on Windows 2000/2003, Linux-based, and UNIX-based
platforms.
For details on how to use LREP to back up and restore Open Systems SnapVault data, refer to the Logical
Replication (LREP) Tool 2.0 User Guide on the NetApp Support site.
34
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Baseline Transfer Assistance
SnapVault
Open Systems SnapVault and SnapVault primaries are
supported.
LREP can be downloaded from the NetApp Support site.
Data Center
Remote Office
1
lrep_reader
lrep_writer
6
Low-Bandwidth
FAS1
Connection
qtree1
qtree1
qtree1
qtree1
33
FAS2
SnapVault
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
BASELINE TRANSFER ASSISTANCE: SNAPVAULT
You can use the LREP tool with a portable device, such as tape or an external drive, to perform SnapVault
initial transfers without traversing the network. This process is often referred to as seeding the baseline
transfer. LREP applies only to SnapVault software. You can download the LREP tool set from the NetApp
Support site.
In the illustration, you see the configuration of a SnapVault baseline transfer from FAS1 (the source system at
the data center) to FAS2 (the destination system at the remote office). This configuration uses the LREP
utilities.
1. Install the lrep_reader utility on Client1 at the data center.
2. Run the lrep_reader utility from Client1 to snapmirror initialize from the source to the portable
media.
3. The portable media is then transferred to the remote office.
4. The lrep_writer utility is installed on Client2 at the remote office.
5. Run the lrep_writer utility from Client2 to reconstruct the replication streams by reading from files that
were created by the lrep_reader utility.
6. From the destination, run the snapmirror initialize command to read the logical replication
stream data from the lrep_writer utility. The SnapVault initial transfer completes. Edit the
snapmirror.conf file to reflect the correct source storage system.
The LREP tool is supported on the following operating systems:
35
Windows 2000, Windows Server 2003, and Windows Storage Server 2003 on x86 and x86-64/EM64T
platforms
Red Hat Enterprise Linux 4.0 for x86 and x86-64/EM64T
Red Hat Enterprise Linux 5.0 for x86 and x86-64/EM64T
SUSE Linux Enterprise Server 9 for x86 and x86-64/EM64T
SUSE Linux Enterprise Server 10 for x86 and x86-64/EM64T
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
36
Solaris 9 and 10 on UltraSPARC systems
AIX 5L 5.1, 5.2, and 5.3 on IBM PowerPC and IBM POWER processor-based systems
HP-UX 11.23 and HP-UX 11.31 on PA-RISC based systems
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
References
Open Systems SnapVault Installation and Administration
Guide
Open Systems SnapVault Release Notes
Enabling Rapid Recovery with SnapVault
http://media.netapp.com/documents/tr-3252.pdf
Open Systems SnapVault Best Practices Guide
http://media.netapp.com/documents/tr-3466.pdf
34
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
REFERENCES
For more information, see the NetApp Support site.
37
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
Module Summary
Now that you have completed this module, you should be able
to:
Describe how Open Systems SnapVault integrates with Data
ONTAP SnapVault
Describe Open Systems SnapVault advanced features
Configure and administer Open Systems SnapVault
Perform Open Systems SnapVault backup and restore
operations
Troubleshoot and resolve Open Systems SnapVault transfer
failures
35
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
MODULE SUMMARY
38
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute
36
2015 NetApp, Inc. All rights reserved. NetApp Proprietary Limited Use Only
THANK YOU
39
Appendix A: Open Systems SnapVault
2015 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University - Do Not Distribute