1 Data ONTAP 7.3 Storage Management Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA USA Telephone: +1 (408) Fax: +1 (408) Support telephone: +1 (888) 4-NETAPP Documentation comments: Information Web: Part number: _A0 Updated for Data ONTAP on 15 January 2010
3 Table of Contents 3 Contents Copyright information Trademark information About this guide Audience Accessing Data ONTAP man pages Terminology Where to enter commands Keyboard and formatting conventions Special messages How to send your comments Data ONTAP storage architecture overview How Data ONTAP works with disks What disk types Data ONTAP supports Disk connection architectures Fibre Channel Arbitrated Loop (FC-AL) disk connection architecture Serial attached SCSI (SAS) disk connection architecture Available disk capacity by disk size Disk speeds Disk formats Disk names Loop IDs for FC-AL connected disks RAID disk types How disk sanitization works Disk sanitization limitations What happens if disk sanitization is interrupted How selective disk sanitization works Commands to display disk and array LUN information Commands to display disk space information How Data ONTAP monitors disk performance and health When Data ONTAP takes disks offline temporarily How Data ONTAP reduces disk failures using Rapid RAID Recovery How the maintenance center works... 39
4 4 Data ONTAP 7.3 Storage Management Guide How Data ONTAP uses continuous media scrubbing to prevent media errors How Data ONTAP uses ACP to increase storage availability Enabling ACP The ACP subnet How ownership for disks and array LUNs works How software-based ownership works Why you assign ownership of disks and array LUNs What it means for Data ONTAP to own an array LUN Why you might assign array LUN ownership after installation How disks and array LUNs become available for use How ownership autoassignment works for disks Examples showing when Data ONTAP can use array LUNs How hardware-based disk ownership works Data ONTAP automatically recognizes and assigns disks for hardwarebased disk ownership How disks are assigned to spare pools when SyncMirror is enabled Storage system models that support hardware-based ownership or both types When a storage system uses software-based disk ownership Managing ownership for disks and array LUNs Guidelines for assigning ownership for disks Displaying ownership information Assigning ownership for disks and array LUNs Modifying assignment of spare disks or array LUNs How you use the wildcard character with the disk command Determining whether a system has hardware-based or software-based disk ownership Changing between hardware-based and software-based ownership Changing from hardware-based to software-based disk ownership nondisruptively Changing from hardware-based to software-based disk ownership using the standard method Changing from software-based to hardware-based disk ownership for stand-alone systems About changing from software-based to hardware-based disk ownership for active/active configurations... 65
5 Table of Contents 5 Reusing disks configured for software-based disk ownership Automatically erasing disk ownership information Manually erasing software-based disk ownership information Recovering from accidental conversion to software-based disk ownership Managing disks Adding disks to a storage system Replacing disks that are currently being used in an aggregate Converting a data disk to a hot spare Removing disks from a storage system Removing a failed disk Removing a hot spare disk Removing a data disk Removing data from disks using disk sanitization Removing data from disks using selective disk sanitization Stopping disk sanitization Managing array LUNs through Data ONTAP Array LUN name format Why you might change the checksum type of an array LUN Changing the checksum type of an array LUN Prerequisites to reconfiguring a LUN on the storage array Changing array LUN size or composition Removing one array LUN from use by Data ONTAP Removing a storage system using array LUNs from service Commands to display information about your storage Commands to display disk and array LUN information Commands to display disk space information Commands to display storage subsystem information Enabling or disabling a host adapter How Data ONTAP uses RAID to protect your data and data availability RAID protection levels for disks What RAID-DP protection is What RAID4 protection is RAID protection for third-party storage Protection provided by RAID and SyncMirror... 99
6 6 Data ONTAP 7.3 Storage Management Guide RAID disk types How Data ONTAP RAID groups work How RAID groups are named About RAID group size Considerations for sizing RAID groups for disks Considerations for Data ONTAP RAID groups for array LUNs Maximum number of RAID groups How Data ONTAP works with hot spare disks How many hot spares you should have What disks can be used as hot spares What a matching spare is What an appropriate hot spare is About degraded mode About low spare warnings How Data ONTAP handles a failed disk with a hot spare How Data ONTAP handles a failed disk that has no available hot spare How Data ONTAP handles media errors during reconstruction How RAID-level disk scrubs verify data integrity How you schedule automatic RAID-level scrubs How you run a manual RAID-level scrub Customizing the size of your RAID groups Controlling the impact of RAID operations on system performance Controlling the performance impact of RAID data reconstruction Controlling the performance impact of RAID-level scrubbing Controlling the performance impact of plex resynchronization Controlling the performance impact of mirror verification How aggregates work How unmirrored aggregates work How mirrored aggregates work Aggregate states and status How you can use disks with mixed speeds in the same aggregate How to control disk selection from heterogeneous storage Rules for mixing disk types in aggregates Rules for mixing array LUNs in an aggregate Checksum rules for adding storage to an aggregate What happens when you add larger disks to an aggregate
7 Table of Contents 7 Managing aggregates Creating an aggregate Increasing the size of an aggregate What happens when you add storage to an aggregate Forcibly adding disks to aggregates Taking an aggregate offline Bringing an aggregate online Putting an aggregate into restricted state Changing the RAID level of an aggregate Changing an aggregate's RAID level from RAID4 to RAID-DP Changing an aggregate's RAID level from RAID-DP to RAID Determining how the space in an aggregate is being used Destroying an aggregate Undestroying an aggregate Physically moving an aggregate composed of disks Moving an aggregate composed of array LUNs How volumes work How FlexVol volumes work How traditional volumes work Attributes you can set for volumes How volumes use the language attribute How file access protocols affect what language to use for your volumes How you manage duplicate volume names Volume states and status About the CIFS oplocks setting How security styles affect access to your data How UNIX permissions are affected when files are edited using Windows applications What the default security style is for new volumes and qtrees How Data ONTAP can automatically provide more free space for full volumes About the maximum number of files allowed on a volume The root volume Recommendations regarding the root volume Size requirement for root FlexVol volumes General volume operations Migrating from traditional volumes to FlexVol volumes
8 8 Data ONTAP 7.3 Storage Management Guide Preparing your destination volume Migrating your data Completing your migration Putting a volume into restricted state Taking a volume offline Bringing a volume online Renaming a volume Destroying a volume Changing the maximum number of files allowed in a volume Changing the language for a volume Changing the root volume FlexVol volume operations Creating a FlexVol volume Resizing a FlexVol volume Configuring a FlexVol volume to grow automatically Configuring automatic free space preservation for a FlexVol volume Displaying a FlexVol volume's containing aggregate Traditional volume operations Creating a traditional volume About FlexCache volumes FlexCache hardware and software requirements Limitations of FlexCache volumes Types of volumes you can use for FlexCache How the FlexCache Autogrow capability works How FlexCache volumes use space management How FlexCache volumes share space with other volumes How you display FlexCache statistics What happens when connectivity to the origin system is lost How the NFS export status of the origin volume affects FlexCache access How FlexCache caching works Files are the basic caching unit How cache consistency is achieved Cache hits and misses Typical FlexCache deployments WAN deployment LAN deployment
9 Table of Contents 9 About using LUNs in FlexCache volumes What FlexCache status messages mean How FlexCache volumes connect to their origin volume About SA systems FlexCache volume operations Creating FlexCache volumes Displaying free space for FlexCache volumes Configuring the FlexCache Autogrow capability Flushing files from FlexCache volumes Displaying FlexCache client statistics Displaying FlexCache server statistics Displaying FlexCache status About FlexClone volumes How FlexClone volumes work Operations not supported on FlexClone volumes or their parents FlexClone volumes and space guarantees FlexClone volumes and shared Snapshot copies How you can identify shared Snapshot copies in FlexClone volumes How you use volume SnapMirror replication with FlexClone volumes About creating a volume SnapMirror relationship using an existing FlexClone volume or its parent About creating a FlexClone volume from volumes currently in a SnapMirror relationship How splitting a FlexClone volume from its parent works FlexClone volumes and LUNs FlexClone volume operations Creating a FlexClone volume Splitting a FlexClone volume from its parent Determining the parent volume and base Snapshot copy for a FlexClone volume. 217 Determining the space used by a FlexClone volume About FlexClone files and FlexClone LUNs How FlexClone files and FlexClone LUNs work Collective usage of FlexClone at file, LUN, and volume level Uses of FlexClone files and FlexClone LUNs Considerations when planning FlexClone files or FlexClone LUNs Differences between FlexClone LUNs and LUN clones
10 10 Data ONTAP 7.3 Storage Management Guide Operational limits for FlexClone files and FlexClone LUNs What happens when clients write new data to parent or FlexClone files and FlexClone LUNs What happens when FlexClone files, FlexClone LUNs, or parents are deleted Space savings achieved by using FlexClone files and FlexClone LUNs What the FlexClone log file is Rapid Cloning Utility for VMware FlexClone file and FlexClone LUN interoperability with Data ONTAP features How Snapshot copies work with FlexClone files and FlexClone LUNs How volume SnapMirror works with FlexClone files and FlexClone LUNs How synchronous SnapMirror works with FlexClone files and FlexClone LUNs How qtree SnapMirror and SnapVault work with FlexClone files and FlexClone LUNs How deduplication works with FlexClone files and FlexClone LUNs How quotas work with FlexClone files and FlexClone LUNs How space reservation works with FlexClone files and FlexClone LUNs. 234 How MultiStore works with FlexClone files and FlexClone LUNs How NDMP and dump works with FlexClone files and FlexClone LUNs How single file SnapRestore works with FlexClone files and FlexClone LUNs How file folding works with FlexClone files and FlexClone LUNs How volume SnapRestore works with FlexClone files and FlexClone LUNs How volume autosize works with FlexClone files and FlexClone LUNs How volume-copy works with FlexClone files and FlexClone LUNs How volume clone works with FlexClone files and FlexClone LUNs How FlexClone files and FlexClone LUNs work when the system reboots How an active/active configuration works with FlexClone files and FlexClone LUNs How role-based access control lists work with FlexClone files and FlexClone LUNs
11 Table of Contents 11 How access control lists and streams work with FlexClone files and FlexClone LUNs How FlexShare works with FlexClone files and FlexClone LUNs FlexClone file and FlexClone LUN operations Creating a FlexClone file or FlexClone LUN Viewing the status of a FlexClone file or FlexClone LUN operation Stopping a FlexClone file or FlexClone LUN operation Clearing the status of a failed FlexClone file or FlexClone LUN operation Viewing the space savings due to FlexClone files and FlexClone LUNs Considerations when creating FlexClone files or FlexClone LUNs What happens when FlexClone file or LUN operation fails When a FlexClone file or LUN is moved or renamed during cloning operation Space savings with deduplication How deduplication works What deduplication metadata is Activating the deduplication license Guidelines for using deduplication Maximum volume size for different systems Performance considerations for deduplication Deduplication and read reallocation Deduplication and extents Deduplication schedules Default schedule for deduplication Creating a deduplication schedule Running deduplication manually on existing data When deduplication runs automatically Deduplication operations How deduplication works with other features and products Deduplication and Snapshot copies Deduplication and volume SnapMirror Deduplication and qtree SnapMirror Deduplication and SnapVault Deduplication and synchronous SnapMirror Deduplication and tape backups Deduplication and SnapRestore
12 12 Data ONTAP 7.3 Storage Management Guide Deduplication and SnapLock volumes Deduplication and MetroCluster Deduplication and DataFabric Manager Deduplication and volume copy Deduplication and FlexClone volumes Deduplication and an active/active configuration Deduplication and VMware Deduplication and MultiStore Common troubleshooting procedures for volumes with deduplication How space management works What kind of space management to use What space guarantees are What kind of space guarantee traditional volumes provide How you set space guarantees for new or existing volumes What space reservation is How Data ONTAP can automatically provide more free space for full volumes How aggregate overcommitment works Considerations for bringing a volume online in an overcommited aggregate About qtrees When you use qtrees How qtrees compare with volumes Qtree name restrictions Managing qtrees Creating a qtree Displaying qtree status Displaying qtree access statistics Converting a directory to a qtree Converting a directory to a qtree using a Windows client Converting a directory to a qtree using a UNIX client Deleting a qtree Renaming a qtree Managing CIFS oplocks About the CIFS oplocks setting Enabling or disabling CIFS oplocks for the entire storage system Enabling CIFS oplocks for a specific volume or qtree
13 Table of Contents 13 Disabling CIFS oplocks for a specific volume or qtree Changing security styles About quotas Why you use quotas Overview of the quota process About quota notifications Quota targets and types Special kinds of quotas How default quotas work How you use explicit quotas How derived quotas work How you use tracking quotas How quotas work with users and groups How you specify UNIX users for quotas How you specify Windows users for quotas How quotas are applied to the root user How quotas work with special Windows groups How quotas are applied to users with multiple IDs How Data ONTAP determines user IDs in a mixed environment How quotas with multiple users work How you link UNIX and Windows names for quotas How quotas work with qtrees How tree quotas work How user and group quotas work with qtrees When quotas are not inherited from volumes by qtrees Differences among hard, soft, and threshold quotas How the quotas file works The syntax of quota entries How Data ONTAP reads the quotas file What character encodings are supported by the quotas file Sample quotas file About activating or reinitializing quotas About modifying quotas When you can use resizing When a full quota reinitialization is required How qtree changes affect quotas
14 14 Data ONTAP 7.3 Storage Management Guide How deleting a qtree affects tree quotas How renaming a qtree affects quotas How changing the security style of a qtree affects user quotas How quotas work with vfiler units How quota reports work What fields quota reports contain How quota report options affect quota reports How the ID field is displayed in quota reports Progressive quota examples Managing quotas Activating quotas Reinitializing quotas Deactivating quotas Canceling quota initialization Resizing quotas Deleting quotas Deleting a quota by removing resource restrictions Deleting a quota by removing the quotas file entry Managing quota message logging Displaying a quota report Storage limits Abbreviations Index
15 Copyright information 15 Copyright information Copyright NetApp, Inc. All rights reserved. Printed in the U.S.A. No part of this document covered by copyright may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying, recording, taping, or storage in an electronic retrieval system without prior written permission of the copyright owner. Software derived from copyrighted NetApp material is subject to the following license and disclaimer: THIS SOFTWARE IS PROVIDED BY NETAPP "AS IS" AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WHICH ARE HEREBY DISCLAIMED. IN NO EVENT SHALL NETAPP BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. NetApp reserves the right to change any products described herein at any time, and without notice. NetApp assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of NetApp. The product described in this manual may be protected by one or more U.S.A. patents, foreign patents, or pending applications. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS (October 1988) and FAR (June 1987).
17 Trademark information 17 Trademark information All applicable trademark attribution is listed here. NetApp, the Network Appliance logo, the bolt design, NetApp-the Network Appliance Company, Cryptainer, Cryptoshred, DataFabric, DataFort, Data ONTAP, Decru, FAServer, FilerView, FlexClone, FlexVol, Manage ONTAP, MultiStore, NearStore, NetCache, NOW NetApp on the Web, SANscreen, SecureShare, SnapDrive, SnapLock, SnapManager, SnapMirror, SnapMover, SnapRestore, SnapValidator, SnapVault, Spinnaker Networks, SpinCluster, SpinFS, SpinHA, SpinMove, SpinServer, StoreVault, SyncMirror, Topio, VFM, and WAFL are registered trademarks of NetApp, Inc. in the U.S.A. and/or other countries. gfiler, Network Appliance, SnapCopy, Snapshot, and The evolution of storage are trademarks of NetApp, Inc. in the U.S.A. and/or other countries and registered trademarks in some other countries. The NetApp arch logo; the StoreVault logo; ApplianceWatch; BareMetal; Camera-to-Viewer; ComplianceClock; ComplianceJournal; ContentDirector; ContentFabric; Data Motion; EdgeFiler; FlexShare; FPolicy; Go Further, Faster; HyperSAN; InfoFabric; Lifetime Key Management, LockVault; NOW; ONTAPI; OpenKey, RAID- DP; ReplicatorX; RoboCache; RoboFiler; SecureAdmin; SecureView; Serving Data by Design; Shadow Tape; SharedStorage; Simplicore; Simulate ONTAP; Smart SAN; SnapCache; SnapDirector; SnapFilter; SnapMigrator; SnapSuite; SohoFiler; SpinMirror; SpinRestore; SpinShot; SpinStor; vfiler; VFM Virtual File Manager; VPolicy; and Web Filer are trademarks of NetApp, Inc. in the U.S.A. and other countries. NetApp Availability Assurance and NetApp ProTech Expert are service marks of NetApp, Inc. in the U.S.A. IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. A complete and current list of other IBM trademarks is available on the Web at Apple is a registered trademark and QuickTime is a trademark of Apple, Inc. in the U.S.A. and/or other countries. Microsoft is a registered trademark and Windows Media is a trademark of Microsoft Corporation in the U.S.A. and/or other countries. RealAudio, RealNetworks, RealPlayer, RealSystem, RealText, and RealVideo are registered trademarks and RealMedia, RealProxy, and SureStream are trademarks of RealNetworks, Inc. in the U.S.A. and/or other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. NetApp, Inc. is a licensee of the CompactFlash and CF Logo trademarks. NetCache is certified RealSystem compatible.
19 About this guide 19 About this guide You can use your product more effectively when you understand this document's intended audience and the conventions that this document uses to present information. This document describes how to configure, operate, and manage the storage resources for storage systems that run Data ONTAP software. It covers disks, RAID groups, plexes, and aggregates, and how file systems, or volumes, and qtrees are used to organize and manage data. Next topics Audience on page 19 Accessing Data ONTAP man pages on page 19 Terminology on page 20 Where to enter commands on page 21 Keyboard and formatting conventions on page 22 Special messages on page 23 How to send your comments on page 23 Audience This document is written with certain assumptions about your technical knowledge and experience. This document is for system administrators and service personnel who are familiar with storage system equipment and who need to perform the following tasks: Create and maintain aggregates and volumes Remove and replace disks Organize or limit access to storage space using qtrees and quotas Accessing Data ONTAP man pages You can use the Data ONTAP manual (man) pages to access technical information. About this task Data ONTAP manual pages are available for the following types of information. They are grouped into sections according to standard UNIX naming conventions.
20 20 Data ONTAP 7.3 Storage Management Guide Types of information Man page section Commands 1 Special files 4 File formats and conventions 5 System management and services 8 Step 1. View man pages in the following ways: Enter the following command at the storage system command line: man command_or_file_name Click the manual pages button on the main Data ONTAP navigational page in the FilerView user interface. Use the Commands: Manual Page Reference, Volumes 1 and 2 (which can be downloaded or ordered through the NOW site). Note: All Data ONTAP man pages are stored on the storage system in files whose names are prefixed with the string "na_" to distinguish them from client man pages. The prefixed names are used to distinguish storage system man pages from other man pages and sometimes appear in the NAME field of the man page, but the prefixes are not part of the command, file, or services. Terminology To understand the concepts in this document, you might need to know how certain terms are used. Storage terms array LUN LUN (logical unit number) native disk native disk shelf Refers to storage that third-party storage arrays provide to storage systems running Data ONTAP software. One array LUN is the equivalent of one disk on a native disk shelf. Refers to a logical unit of storage identified by a number. Refers to a disk that is sold as local storage for storage systems that run Data ONTAP software. Refers to a disk shelf that is sold as local storage for storage systems that run Data ONTAP software.
21 About this guide 21 storage controller storage system third-party storage Refers to the component of a storage system that runs the Data ONTAP operating system and controls its disk subsystem. Storage controllers are also sometimes called controllers, storage appliances, appliances, storage engines, heads, CPU modules, or controller modules. Refers to the hardware device running Data ONTAP that receives data from and sends data to native disk shelves, third-party storage, or both. Storage systems that run Data ONTAP are sometimes referred to as filers, appliances, storage appliances, V-Series systems, or systems. Refers to the back-end storage arrays, such as IBM, Hitachi Data Systems, and HP, that provide storage for storage systems running Data ONTAP. Cluster and high-availability terms active/active configuration cluster In the Data ONTAP 7.2 and 7.3 release families, refers to a pair of storage systems (sometimes called nodes) configured to serve data for each other if one of the two systems stops functioning. Also sometimes referred to as active/active pairs. In the Data ONTAP 7.1 release family and earlier releases, this functionality is referred to as a cluster. In the Data ONTAP 7.1 release family and earlier releases, refers to a pair of storage systems (sometimes called nodes) configured to serve data for each other if one of the two systems stops functioning. In the Data ONTAP 7.3 and 7.2 release families, this functionality is referred to as an active/active configuration. Where to enter commands You can use your product more effectively when you understand how this document uses command conventions to present information. You can perform common administrator tasks in one or more of the following ways: You can enter commands either at the system console or from any client computer that can obtain access to the storage system using a Telnet or Secure Shell (SSH) session. In examples that illustrate command execution, the command syntax and output shown might differ from what you enter or see displayed, depending on your version of the operating system. You can use the FilerView graphical user interface. For information about accessing your system with FilerView, see the Data ONTAP System Administration Guide. You can enter Windows, ESX, HP-UX, AIX, Linux, and Solaris commands at the applicable client console. In examples that illustrate command execution, the command syntax and output shown might differ from what you enter or see displayed, depending on your version of the operating system.
22 22 Data ONTAP 7.3 Storage Management Guide Keyboard and formatting conventions You can use your product more effectively when you understand how this document uses keyboard and formatting conventions to present information. Keyboard conventions Convention What it means The NOW site Refers to NetApp On the Web at Enter, enter Used to refer to the key that generates a carriage return; the key is named Return on some keyboards. Used to mean pressing one or more keys on the keyboard and then pressing the Enter key, or clicking in a field in a graphical interface and then typing information into the field. hyphen (-) type Used to separate individual keys. For example, Ctrl-D means holding down the Ctrl key while pressing the D key. Used to mean pressing one or more keys on the keyboard. Formatting conventions Convention What it means Italic font Words or characters that require special attention. Placeholders for information that you must supply. For example, if the guide says to enter the arp -d hostname command, you enter the characters "arp -d" followed by the actual name of the host. Book titles in cross-references. Monospaced font Command names, option names, keywords, and daemon names. Information displayed on the system console or other computer monitors. Contents of files. File, path, and directory names. Bold monospaced font Words or characters you type. What you type is always shown in lowercase letters, unless your program is case-sensitive and uppercase letters are necessary for it to work properly.
Front cover Using the IBM System Storage N Series with IBM Tivoli Storage Manager Backing up the IBM System Storage N series Configuring IBM Tivoli Storage Manager with the N series Taking NDMP operations
INR-410 INR-420 System Administrator s Manual For V3.0.06 Version 2013/11/20 About This Manual Target Audience This manual is intended for System Administrators who are responsible for installing and setting
CA ARCserve Backup for Windows NDMP NAS Option Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes
EMC NetWorker Snapshot Management for NAS Devices Version 8.2 SP1 Integration Guide 302-001-579 REV 01 Copyright 1990-2015 EMC Corporation. All rights reserved. Published in USA. Published January, 2015
CA ARCserve Backup for Windows NDMP NAS Option Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
BrightStor ARCserve Backup Storage Area Network (SAN) Option Guide r11.5 D01166-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end
CA ARCserve Backup for Windows Agent for Microsoft SQL Server Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
Basic System Administration ESX Server 3.0 and VirtualCenter 2.0 Basic System Administration Revision: 20090213 Item: VI-ENG-Q206-219 You can find the most up-to-date technical documentation at: http://www.vmware.com/support/pubs
HP StorageWorks Auto LUN XP user guide for the XP12000/XP10000 Part number: T1715-96006 Sixth edition: September 2007 Legal and notice information Copyright 2005, 2007 Hewlett-Packard Development Company,
Dell NetVault Backup 10.0.5 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Dell NetVault Backup Technical Overview A technical overview of NetVault Backup, including its architecture, benefits, key components and licensing options. Written by Dell Software Introduction NetVault
Front cover IBM XIV Storage System Business Continuity Functions Copy services and migration functions Multi-Site Mirroring Data migration scenarios Bertrand Dufrasne Christian Burns Wenzel Kalabza Sandor
Aberdeen Setup and Administration Guide Publication Date: February 11, 2011-1 - ABERDEEN LLC END USER LICENSE AGREEMENT This End User License Agreement ( Agreement ) is a legal agreement between Aberdeen
UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 n For the fiscal year ended
NVR 3.0 System Administrator s Manual For V3.0.02 Version 2013/03/21 About This Manual Target Audience This manual is intended for System Administrators who are responsible for installing and setting up
Copyright (c) 2000-2009 Acronis. All rights reserved. Copyright (c) 2009 Seagate Technology LLC. All Rights Reserved. Acronis, "Acronis Compute with Confidence" and the Acronis logo are trademarks of Acronis,
General Parallel File System Concepts, Planning, and Installation Guide Version 3 Release 2 GA76-0413-01 General Parallel File System Concepts, Planning, and Installation Guide Version 3 Release 2 GA76-0413-01
HPProLiantDL380G5DataProtectionStorage Server administration guide This guide provides hardware and software information for the HP ProLiant DL380 G5 Data Protection Storage Server running the Standard
Page 1 of 78 Features - NAS NDMP Client TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - NAS NDMP IDATAAGENT INSTALLATION Install the MediaAgent - Windows Install the MediaAgent - Windows -Clustered Environment
SWsoft, Inc. Virtuozzo for Windows User's Guide Version 3.5 (c) 1999-2005 ISBN: N/A SWsoft Inc 13755 Sunrise Valley Drive Suite 325 Herndon, VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703) 815 5675 Copyright
RocketRAID 3220 SATAII Host Adapter User s Guide Revision: 1.0 Date: June 2006 HighPoint Technologies, Inc. Copyright Copyright 2006 HighPoint Technologies, Inc. This document contains materials protected
NetVault, NDMP and Network Attached Storage Simplicity and power for NAS Written by Adrian Moir, Dell Scott Hetrick, Dell Abstract This technical brief explains how Network Data Management Protocol (NDMP)
Turbo NAS User Manual (Version: 3.1.2) Thank you for choosing QNAP products! This user manual provides detailed instructions of using the Turbo NAS. Please read carefully and start to enjoy the powerful
Red Hat Cluster Suite Overview Red Hat Cluster Suite for Red Hat Enterprise Linux 5.2 Cluster_Suite_Overview ISBN: N/A Publication date: May 2008 Red Hat Cluster Suite Overview Red Hat Cluster Suite Overview
CA ControlMinder Implementation Guide 12.7 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your