OnCommand Workflow Automation Workflows for the Storage as a Service
|
|
|
- Hillary Harrington
- 9 years ago
- Views:
Transcription
1 Technical Report OnCommand Workflow Automation Workflows for the Storage as a Service Rick Ehrhart and Ganesh Kamath, NetApp February 2014 TR-4272 Abstract This tech report walks through the storage-as-a-service workflows that were created by NetApp experts using NetApp OnCommand Workflow Automation (WFA). As of today, these workflows have been tested, but are not certified. The roadmap plan is to have these workflows certified in a future release of WFA.
2 TABLE OF CONTENTS 1 OnCommand Workflow Automation (WFA) Workflows for Storage as a Service (StaaS) Overview Storage Service Concepts Storage Service Components and Design... 7 Storage Domains... 8 Provisioning Policies... 8 Protection Policies... 9 Schedule Storage Services Consumer Information Storage Objects Environment Setup and Installation Day Zero Requirements Importing Workflows and Creating Playground Schema WFA Components and Workflows WFA Components Storage Service Catalog Package Building Storage Services Instantiating Consumer and Provisioning Storage with Storage Service Creating Storage Service Creating Consumer Viewing Storage Services Components View Consumer Objects View Provisioning Policy View Storage Domains View Storage Objects by Consumer View Storage Service Appendix Procedure to Call Workflows from External Orchestrator LIST OF TABLES Table 1) Gold service level technology attributes OnCommand Workflow Automation Workflows for Storage as a Service
3 Table 2) Silver service level technology attributes Table 3) Bronze service level technology attributes Table 4) Playground scheme tables Table 5) Workflow list LIST OF FIGURES Figure 1) Technical attributes to service levels Figure 2) Storage services Figure 3) Storage services technical attributes Figure 4) Scheme table relationships for storage services Figure 5) Restored playground scheme tables Figure 6) Importing the workflows Figure 7) Storage service catalog category after import Figure 8) Finders and filters filtered by playground scheme Figure 9) Instantiating a consumer with a storage service Figure 10) Data ONTAP cluster credentials in WFA Figure 11) Storage service catalog Figure 12) Executing the workflow Figure 13) Creating a storage domain (aggregates) Figure 14) Creating a provisioning policy Figure 15) Creating a schedule Figure 16) Creating a local protection policy Figure 17) Creating a remote protection policy (mirror) Figure 18) Creating a storage service Figure 19) Creating a consumer (tenant) Figure 20) Provisioning storage for a consumer (tenant) Figure 21) View consumer objects workflow Figure 22) View provisioning policy workflow Figure 23) View storage domain workflow Figure 24) View storage objects by consumer workflow Figure 25) View storage service workflow OnCommand Workflow Automation Workflows for Storage as a Service
4 1 OnCommand Workflow Automation (WFA) Workflows for Storage as a Service (StaaS) 1.1 Overview The workflows that are described in this tech report are the result of the OnCommand Workflow Automation workflows that were developed for a storage-as-a service project. The goal of this project is to have a few out-of-the-box constructs with which custom service-level WFA workflows can be built. The workflows use storage capabilities and features in clustered Data ONTAP for deploying generic usecase scenarios. These workflows can be used in a proof of concept (PoC) to demonstrate the value of a storage service catalog. They can also be modified and extended by customers to reflect the specifics of their storage environment and service-level requirements and to create a complete and customized storage service catalog for their business. Some example workflows to deploy multitier service levels based on different technology attributes could be: Performance-optimized storage with SSD and SAS drives (Flash Pool, thick provisioning, local data protection, and remote data protection) A midlevel tier with SAS drives that can host general-purpose applications, VDI workloads, or datastores for a virtualization environment (performance drives with storage efficiency features and local data protection) Cost-optimized storage provisioned on lower tier storage controllers with SATA (high density with dedupe, compression, thin provisioning, and thin replication) 1.2 Storage Service Concepts The goal is to differentiate storage services using different technology attributes for gold/silver/bronze deployments. For instance, a volume deployed using gold service will be space guaranteed with no deduplication and will also be protected with local Snapshot copies and SnapMirror (or SnapVault ), whereas a volume deployed using bronze service will be thin provisioned and deduplicated, and protection will be using local Snapshot copies only. Some of the key reasons to leverage WFA for our automation needs are its capabilities around workflows: A flexible set of commands to execute a workflow. The execution of these commands can be conditionally handled (example: create if not found, create based on a condition) Ability to have flexible resource selection in terms of filters and finders (resource selection criteria) Customizable workflows to fit our customers and partners unique requirements Figure 1 gives a representation of mapping technical attributes to service levels by using the various storage characteristics that form the core of clustered Data ONTAP. 4 OnCommand Workflow Automation Workflows for Storage as a Service
5 Figure 1) Technical attributes to service levels. Example technology attributes for gold, silver, and bronze workflows have been detailed in the following tables. These values should be customized to suit the customer s environment and requirements. Table 1) Gold service level technology attributes. Technology Attributes Attribute Definition Attribute Values FAS series Disk type Mount/map Controller models or storage arrays (FAS series 22xx, 32xx, 62xx) SSD, SAS, SATA, or a combination Access protocols Media failure (RAID type) RAID configuration on the aggregates FAS6290 SSD only or Flash Pool aggregates NFS3,SMB, iscsi, FC RAID-DP Local recovery Data protection using local Snapshot copies Snapshot schedules (23H + 6D + 1W) Mirroring and DR (SnapMirror) Data protection using SnapMirror Space guarantee Space guarantees for writes and reserves for Snapshot copies Deduplication Data deduplication for different data types (binary yes/no) Compression Data compression for different data types (binary yes/no) SnapMirror update schedules (hourly) Thick provisioned (volume guarantees) No No 5 OnCommand Workflow Automation Workflows for Storage as a Service
6 Autogrow Automatically provide space in the FlexVol volume when nearly full Autodelete Automatically provide space in the FlexVol volume when nearly full Yes (maximum size/increment size/grow threshold) No (volume/snap trigger, and order of deletion) Table 2) Silver service level technology attributes. Technology Attributes Attribute Definition Attribute Values FAS series Disk type Mount/map Controller models or storage arrays (FAS series 22xx, 32xx, 62xx) SSD, SAS, SATA or a combination Access protocols Media failure (RAID type) RAID configuration on the aggregates FAS3250 SAS aggregates. NFS3,SMB, iscsi, FC RAID-DP Local recovery Data protection using local Snapshot copies Mirroring and DR (SnapMirror) Data protection using SnapMirror Snapshot schedules (12H + 6D + 1W) SnapMirror update schedules (4hours) Space guarantee Space guarantees for writes and reserves for Snapshot copies Deduplication Data deduplication for different data types (binary yes/no) Compression Data compression for different data types (binary yes/no) Autogrow Automatically provide space in the FlexVol volume when nearly full Autodelete Automatically provide space in the FlexVol volume when nearly full Thick provisioned (volume guarantees) Yes No Yes (maximum size/increment size/grow threshold) Yes (volume/snap trigger, and order of deletion) Table 3) Bronze service level technology attributes. Technology Attributes Attribute Definition Attribute Values FAS series Disk type Mount/map Controller models or storage arrays (FAS series 22xx, 32xx, 62xx) SSD, SAS, SATA, or a combination Access protocols FAS22xx or 32xx or Data ONTAP Edge SAS/SATA or RAID 0 (edge) aggregates NFS3,SMB, iscsi, FC (no Data ONTAP Edge support for FC) 6 OnCommand Workflow Automation Workflows for Storage as a Service
7 Media failure (RAID type) RAID configuration on the aggregates RAID-DP Local recovery Data protection using local Snapshot copies Mirroring and DR (SnapMirror) Data protection using SnapMirror Space guarantee Space guarantees for writes and reserves for Snapshot copies Deduplication Data deduplication for different data types (binary yes/no) Compression Data compression for different data types (binary yes/no) Autogrow Automatically provide space in the FlexVol volume when nearly full Autodelete Automatically provide space in the FlexVol volume when nearly full Snapshot schedules (6H + 2D + 1W) SnapMirror update schedules (once a day) Thin provisioned and no snap reserves Yes No Yes (maximum size/increment size/grow threshold) Yes (volume/snap trigger, and order of deletion) 2 Storage Service Components and Design The storage services will be consumed by consumers or tenants that will subscribe to different storage service levels depending on their deployment needs. The storage administrator assigns the storage services to the consumer. The relationships between consumers, storage services, and other storage objects will be stored in a database that will be referenced during any consumer-related tasks. The tasks could be provisioning additional services, listing services, deleting services, or any other provisioning or protection tasks. The consumer mapping information will be updated in the database as necessary. The database that is used to store the storage service metadata information is the playground scheme of the WFA database, which is included in the OnCommand Workflow Automation (WFA) server installation. The playground scheme is part of a MySQL database to which schema and tables can be built to include custom information and relationship matrixes, subsequently used by filters and SQL Server queries. The tags or metadata can then be used along with the information in other WFA cache tables by WFA filters and user input queries. All the metadata regarding the relationships between the different entities that make up a consumer will be stored in the playground scheme tables of the WFA database. The tables can be seen in the dictionary section under the Designer tab. These tables will be referred to during workflow execution and also populated postexecution. For example, a consumer creation will populate the consumer table, and associated entities within the playground scheme. The playground scheme cannot be accessed using the WFA web portal. You can use a MySQL client, such as SQLyog, Toad for MySQL, and MySQL Workbench, or a command line interface (CLI), to directly access the database. The information stored in the playground scheme includes: Storage domains Provisioning policies 7 OnCommand Workflow Automation Workflows for Storage as a Service
8 Protection policies (local and remote; only SnapMirror and SnapVault not supported in this release) Storage services Schedules Consumer information Storage objects Storage Domains A storage domain consists of a set of aggregates. There will be separate storage domains for each controller node in the protection topology. The primary and secondary controller nodes will have storage domains associated with each of them. Each provisioning policy is associated with a storage domain. When creating a storage domain, a set of aggregates will be presented in the form of cluster name and aggregate name. Think of storage domains as resource pools that contain a set of aggregates grouped together by performance (storage type), geography (data centers and so on), or any other criteria. There can be a storage domain consisting of SSD and SAS disks, which can be associated with a provisioning node, and there can be another storage domain consisting of SATA disks, which can be associated with a protection node. This is up to the storage architect. For example, storage domains Dallas-SAS and Dallas-SATA could be created to divide the SAS and SATA storage in Dallas, or a storage domain Ft_Worth could be created to represent the entire Fort Worth data center. Provisioning Policies Provisioning policies are used for each node of the protection topology. For example, the primary would have thick provisioning, while the secondary would have thin. Provisioning policies include these attributes: Provisioning policy name Controller model RAID type Disk type Space guarantee Deduplication Compression Autogrow Autodelete Storage domains At provisioning policy creation, the storage domain is verified to match to the provision policy s characteristics. At least one aggregate in the storage domain must have the characteristics of the provisioning policy to allow the storage domain to be in the provisioning policy. A provisioning policy can include more than one storage domain. For example, a secondary provisioning policy could include two storage domains, Ft_Worth_SATA and Dallas_SATA. Basically, when the disk type is selected, the storage domains that qualify with the specified disk type will be filtered and shown. For example, if the disk type selected is SAS, only those storage domains with SAS disk types will be displayed during provisioning policy creation. When a provisioning policy is created, a list of storage domains that fit the provisioning policy s service levels (SAS, SATA, SSD, and so on) are shown. The storage domain will be verified that at least one aggregate in the storage domain qualifies for the service level specified. 8 OnCommand Workflow Automation Workflows for Storage as a Service
9 Protection Policies There are two types of protection policies, local and remote. Local protection policies determine how primary storage is protected on the local node, while remote protection policies determine how primary storage is protected remotely. Local Protection Policy A local protection policy contains the following attributes and one or more local protection rules: Name Description Local Protection Rule A local protection rule contains the following attributes: Schedule Retention count Prefix Remote protection label A local protection rule is a schedule that is assigned to a particular protection policy, and a single policy can have one or multiple schedules associated with it. For example, a local protection policy could have two different schedules: Snapshot copies daily at 8 p.m., and Snapshot copies every 4 hours, with different retention counts for each schedule. The schedules defined in the local protection policy will get instantiated on the storage controllers when storage is provisioned using the defined storage services that include this local protection policy. The following is an example of a local protection policy with two associated schedules: Vserver: testwfa Policy Name Schedules Enabled Comment primary 2 true - Schedule Count Prefix SnapMirror Label Daily at 8 p.m. 2 Daily at 8 p.m. - Every 2 hours 1 Every 2 hours - Remote Protection Policy A remote protection policy determines the protection attributes of remote protection, that is, replication using SnapMirror. Currently the workflows only support mirroring. Vaulting is not supported in this release. A remote protection policy contains the follow attributes: Name Description Schedule Type (mirror, vault) Transfer_priority 9 OnCommand Workflow Automation Workflows for Storage as a Service
10 Restart Tries Ignore_access_time Remote Protection Rule A remote protection rule is used for vaulting only, and it contains the link to a local protection schedule using the snapmirror_label. Vaulting is currently not supported in this release, so the remote protection rule table is not used by any of the current workflows. The attributes are: Snapmirror_label Keep Preserve Warn Remote Recovery_Policy Schedule Schedules will be instantiated in Data ONTAP at provisioning time. For example, a local recovery schedule will be checked for, and if not present, it will be created. The schedule is a cron schedule and follows the fields of a Data ONTAP cron schedule; therefore the attributes are: Name Description Days_of_month Days_of_week Months Hours Minutes Schedules are used in local protection policies and remote protection policies. Storage Services Storage services consist of provisioning policies and protection policies for each node in the topology (if a secondary exists). This includes the storage domain relationships, the protection relationship type, and schedules for each relationship. Currently only two nodes are supported in a cascade topology. The current implementation does not support tertiary or forked (two different secondaries for the same primary) relationships. Storage services will include: Storage service name Provisioning policy for the primary controller node Local protection policy (Snapshot copies) Provisioning policy for the secondary controller node Remote protection policy (only SnapMirror; SnapVault is not supported in this release) Figure 2 shows a pictorial representation of a storage service with local and remote protection, which means that the service has associated a primary storage domain with provisioning and local protection policies and a secondary storage domain with provisioning and remote protection policies. 10 OnCommand Workflow Automation Workflows for Storage as a Service
11 Figure 2) Storage services. Figure 3 shows the technical attributes that are used for creating differentiated storage services. Figure 3) Storage services technical attributes. 11 OnCommand Workflow Automation Workflows for Storage as a Service
12 Consumer Information Consumers, also known as tenants, provision, access, and decommission the provisioned storage. Each consumer can be associated with one more storage services. This association ties the consumer to a set of storage domains and eventually to a cluster and storage virtual machine (SVM). The consumer information will include: Consumer name Storage services Primary storage cluster Primary SVM Secondary storage cluster Secondary SVM Storage Objects A storage object is an NFS export, a LUN, or a CIFS share on a volume that will be provisioned in Data ONTAP. The storage object will be the primary volume and the secondary volume if the storage service has a mirror. Each storage object created needs to be associated with the consumer that created it and the storage service used to create it. This allows for a consumer to view the provisioned storage and provide showback or chargeback information. Each storage object created is associated with the storage service with which it was created. This association allows the storage administrator to assign a cost for the storage object based on the storage service and to see all consumers using a particular service. Each storage object created contains the primary volume and optional secondary volume where the storage object was created. This association allows the storage administrator to obtain capacity and performance of the storage object directly from Data ONTAP. The storage objects contain the following: Object name Object type (export, LUN, share) Storage service Consumer Creation timestamp Primary volume (<cluster>://<primary SVM>/<primary volume>) Secondary volume (<cluster>://secondary SVM>/secondary volume>) 12 OnCommand Workflow Automation Workflows for Storage as a Service
13 Figure 4) Scheme table relationships for storage services. 13 OnCommand Workflow Automation Workflows for Storage as a Service
14 3 Environment Setup and Installation Day Zero Requirements Some physical and logical preconfiguration must be in place before the workflows can be used; that is, the day zero configuration must have been completed. The following assumptions are made: Clusters will be created and all cluster nodes added and properly configured for cluster membership. All necessary physical cabling between the network and nodes meets best practices. Cluster interconnect switch and ports are properly configured, and the nodes are properly connected. Cluster management LIF is configured and connected to a VLAN that is accessible by WFA. Manage ONTAP SDKs are executable using the cluster management LIF. Clustered Data ONTAP version 8.2 has been installed. Cluster HA has been properly configured. Flash Cache is enabled. All required feature licenses have been installed on all nodes. 64-bit aggregates have been created on all the relevant clustered nodes (primary/secondary). The necessary storage virtual machines (SVMs), network port interface groups (ifgroups), logical interfaces (LIFs), routing groups, and VLANs have been created. Underlying network connectivity and configuration between potential cluster/svm peers have been established for SnapMirror and SnapVault relationship configuration, including intercluster LIFs and routing groups. SVM and cluster peering relationships will be created by WFA if they do not already exist. NetApp Workflow Automation (WFA) version 2.1 is installed in the environment and configured. OnCommand Unified Manager 6.0 is installed and configured as a data source in WFA. The relevant clustered Data ONTAP clusters (primary, secondary, and so on) should also be discovered and managed in Unified Manager. Make sure that all the credentials for the Data ONTAP clusters are also configured in WFA. Because the provided storage service workflows are written in Perl, a Perl distribution package must be installed on the WFA server. Refer to the WFA install and admin guide for instructions. Importing Workflows and Creating Playground Schema Download the workflows and the playground schema from the NetApp Community site: kflow-automation The first step is to populate the WFA playground database with all the metadata/tables used by the workflows. 1. Create the tables used by the workflows in the WFA playground database. 2. Copy/install the custom perl modules: a. ActiveRecord 0.34 b. DBD:mysql Import the.dar workflows. 4. Run the workflows. 14 OnCommand Workflow Automation Workflows for Storage as a Service
15 Creating Playground Scheme Tables The tables in the playground scheme are created by restoring the empty playground scheme table structure using the mysql command. Without these tables, the storage service workflows to be imported will not execute because the workflows expect the tables to exist for reference/updating. Any existing tables in the playground scheme will be not be modified or deleted. The following tables will get created in the playground scheme as part of this process. Table 4) Playground scheme tables. Tables consumer_storage_service consumers cron_schedule local_protection_policy local_protection_rule provisioning_policies provisioning_storage_domain remote_protection_policy remote_protection_rule storage_domain storage_domain_member storage_objects storage_services Description Consumers and subscribed storage services. List of consumers. The different schedules that can be used in local and remote protection policies. Local protection policy. Different schedules that are tied to a local protection policy. Provisioning policies and attributes. Provisioning policies and associated storage domains. Remote protection policy. Currently not being used because remote protection rules are for vaulting. Will be used in a future release when SnapVault support is added. Storage domains. Storage domain members: that is, list of aggregates that make up the storage domains. List of storage objects that are provisioned: exports, LUNs, shares, and associated services and consumers along with the primary and secondary association for these objects. Storage services and associated provisioning and protection policies. Restore the tables in the playground scheme using the following command: mysql u wfa p playground < c:\playground.sql The default password is Wfa123. Note: C:\playground.sql is the playground schema file that you downloaded from the NetApp Communities site. The playground db cannot be accessed using the WFA web portal. You can use a MySQL client, such as SQLyog, Toad for MySQL, and MySQL Workbench, or a command line interface (CLI) to access the WFA database and verify that the tables have been created in the playground scheme. A screenshot of the playground scheme and verifying that the table structure (no data) has been created, as shown in Figure OnCommand Workflow Automation Workflows for Storage as a Service
16 Figure 5) Restored playground scheme tables. Additional Perl Module Requirements for Workflows There are additional perl modules used by the workflows that need to be installed for the workflows to execute successfully. The specific versions that were tested and used with the workflows are: ActiveRecord::Simple Version 0.34 DBD::mysql Version Importing Workflows Import the.dar file that contains all the workflows. The.dar file is downloaded from the NetApp Community site. 1. Log in to the WFA portal and click Import under the Administration menu. 16 OnCommand Workflow Automation Workflows for Storage as a Service
17 Figure 6) Importing the workflows. 2. Select the.dar file and open it. You will see a notification box detailing all the new components that are being imported in green text. 3. Click Import. 4. The import should finish successfully. 5. All the imported workflows will show up as a new category (Storage Service Catalog) under the Portal tab. 17 OnCommand Workflow Automation Workflows for Storage as a Service
18 Figure 7) Storage service catalog category after import. The workflows are now ready for use. All the relevant filters, finders, dictionary items, and commands are also imported from the.dar file. 18 OnCommand Workflow Automation Workflows for Storage as a Service
19 4 WFA Components and Workflows WFA Components WFA has a number of types of building blocks to achieve the preceding automation goals. A short description of the same is provided here (more details in WFA product documentation): Data sources. A data source is a read-only data structure that serves as a connection to the data source object of specific data source type. One such required data source is a connection to an OnCommand Unified Manager 6.0 database. WFA collects resource information from the data sources and formats it for the caching scheme. Cache. WFA has an internal cache database, which it periodically refreshes from OnCommand Unified Manager. This contains information of the entire storage environment (clusters, SVMs, aggregates, volumes, LUNs, initiator groups, and so on). Filters. WFA provides a means to describe a specific resource selection criteria based on values of attributes of all supported object types (example: filter aggregates of RAID type RAID-DP). Finders. A finder is a combination of one or more filters that are used together to identify common results. You can use a finder in your workflows to select the required resources for workflow execution. Commands. A step in a workflow is called a command and generally carries out a meaningful granular step (example: create a volume, map a LUN). Templates. A template of values of various attributes of any supported object type can be created in WFA and used in workflow design (example: space guaranteed settings for a volume; this template can be used during the creation of a volume). A template is used as a blueprint for an object definition. Workflow. A repeatable process for achieving storage automation, which contains a set of commands, filters, templates, and other conditional execution logic such as loops and approval points. Dictionary entries. Dictionary entries represent object types and their relationships in your storage and storage-related environments. You can then use filters in workflows to return the value of the natural keys of the dictionary entries. A dictionary object consists of a list of attributes, which might be type checked. A dictionary object with complete values describes an object instance of a type. In addition, the reference attributes describe the relationship of the object with the environment; for example, a volume dictionary object has many attributes, such as name, size_mb, and volume_guarantee. In addition, the volume dictionary object includes references to the aggregate and the array containing the volume in the form of array_id and aggregate_id. Storage Service Catalog Package The Storage Service Catalog Package contains table definitions, workflows, commands, filters, finders, and functions. All these objects can be viewed under the Designer tab. To make life easier, filter on the playground scheme. The workflows in the Storage Service Catalog Package consist of provisioning and unprovisioning exports, LUNs, and shares as well as workflows to create and remove the storage service catalog objects discussed previously. The storage service catalog objects have commands that operate on the objects. All commands support create, update, and delete. Filters and finders allow the commands to find and filter objects in the playground scheme. These allow the commands to find the correct objects. These objects also help in the view workflows. Functions are provided to assist calculations or string parsing. 19 OnCommand Workflow Automation Workflows for Storage as a Service
20 Workflows The imported.dar file has the workflows described in Table 5. Table 5) Workflow list. Table Workflow Use Notes 1 Create a set of predefined schedules The set of predefined schedules can be used as examples to create new schedules or used just as they are. None. 2 Create schedule Creates a new schedule. None. 3 Create storage domain Groups aggregates for provisioning. 4 Create provisioning policy Groups storage object attributes and storage domains and creates a provisioning policy. 5 Create local protection policy Creates local protection attributes. 6 Create remote protection policy Creates remote protection attributes. 7 Create storage service Associates provisioning and protections policies to create a storage service. 8 Create consumer Creates a consumer and assigns storage services, clusters, and SVMs (primary and/or secondary). 9 View consumer objects View the consumer s associated objects. 10 View provisioning policy View the provisioning policy s associated objects. 11 View storage domains View the storage domains and associated members. 12 View storage services View the storage service s associated objects. None. None. None. None. None. A consumer can be associated with a single primary SVM and a single secondary SVM. There is a many:1 mapping between consumers and SVMs. A consumer can be mapped to only one SVM. but the SVM can be shared with other consumers. None. None. None. None. 13 View storage objects by consumer View the storage objects that are associated to a consumer. None. 14 Destroy schedule Removes a schedule. Storage service catalog schedule is removed, but the Data ONTAP schedule is not deleted. 15 Destroy storage domain Removes the association of aggregates to a storage domain. None. 20 OnCommand Workflow Automation Workflows for Storage as a Service
21 Table Workflow Use Notes 16 Destroy provisioning policy Remove a provisioning policy. None. 17 Destroy local protection policy Removes a local protection policy and its associated schedules. The local protection policy is deleted, but not the Data ONTAP Snapshot policy. 18 Destroy remote protection policy Removes a remote protection policy and its associated schedules. The remote protection policy is removed, but not the Data ONTAP SnapMirror policy. 19 Destroy storage service Removes the storage service and the associated provisioning and protection policies. None. 20 Destroy consumer Removes the consumer. None. 21 Provision export Provisions an export. In Data ONTAP, a volume is created with the provisioning policy attributes. An export policy, <consumer>_export_policy is created if it doesn t exist. Export rules are added from user input. Schedules and Snapshot and SnapMirror policies are created if they don t exist. When additional exports are created, the new rules are added to the <consumer>_export_policy. There is no method in the workflow to create a custom export policy. 22 Provision LUN Provisions one or more LUNs. In Data ONTAP, a volume is created with the provisioning policy attributes. LUNs are created and mapped using the LUN prefix in a new volume. Schedules and Snapshot and SnapMirror policies are created if they don t exist. An auto_igroup is created by default if no igroup is specified during provisioning, and the auto_igroup will be used during future provisioning as well if an igroup is not specified. 23 Provision share Provisions a share. In Data ONTAP, a volume is created with the provisioning policy attributes. A share is created for the new volume. Schedules and Snapshot and SnapMirror policies are created if they don t exist. 21 OnCommand Workflow Automation Workflows for Storage as a Service
22 Table Workflow Use Notes 24 Unprovision export Removes an export. In Data ONTAP, the primary and secondary volumes are removed. 25 Unprovision LUN Removes one or more LUNs starting with the LUN prefix. In Data ONTAP, the LUNs are unmapped and removed, and the associated primary and secondary volumes are removed. 26 Unprovision share Removes a share. In Data ONTAP, the share and associated primary and secondary volumes are removed. Commands The commands in the Storage Service Catalog Package operate on the WFA dictionary objects. All the commands have three actions: create, update, and delete. Table 6) Commands list. Commands Use Side Effects 1 Consumer operations Creates, updates, and deletes consumers. 2 Cron schedule operations Creates, updates, and deletes schedules. Operates on the Consumer_Storage_Service table. None. 3 Local protection policy operations Creates, updates, and deletes local protection policies. None. 4 Local protection rule operations Creates, updates, and deletes local protection rules. 5 No-op storage service Allows for finders to operate on storage service catalog objects for use in workflows. 6 Provisioning policy operations Creates, updates, and deletes provisioning policies. Requires a local protection policy database ID for creation. None. Operates on the provisioning storage domain table. 7 Remote protection policy operations 8 Remote protection rule operations Creates, updates, and deletes local protection policies. Creates, updates, and deletes local protection rules. None. Requires a remote protection policy database ID for creation. 9 Storage domain operations Creates, updates, and deletes storage domains. 10 Storage object operations Creates and deletes storage objects. 11 Storage service operations Creates, updates, and deletes storage services. Operates on the Storage_Domain_Members table. None. None. 22 OnCommand Workflow Automation Workflows for Storage as a Service
23 Filters and Finders WFA finders are a collection of one or more filters that specify return attributes. You can sort all the finders and filters used by the imported workflows by filtering on the playground scheme. Figure 8) Finders and filters filtered by playground scheme. The following filters are in the Storage Service Catalog Package: Filter consumers by name Filter cron schedules by local protection policy Filter cron schedules by remote protection policy Filter local protection policy by name Filter local protection rules by local protection policy Filter local protection rules by remote protection label Filter local protection rules by schedule Filter provisioning policies by name Filter provisioning policy by ID Filter remote protection policy by name Filter remote protection policy by ID Filter remote protection policy by remote protection label Filter remote protection rules by remote protection policy Filter storage domains by name Filter storage objects by consumer Filter storage objects by name Filter storage objects by type Filter storage objects similar to name Find cron schedule by name 23 OnCommand Workflow Automation Workflows for Storage as a Service
24 Find storage domains by disk type Find storage domains by RAID type Filter storage domains by technical SLCs This includes disk type, RAID type, and node controller model. The following finders are part of the Storage Service Catalog Package: Find a remote protection policy by ID Find a storage object by consumer, object type, and name Find consumer by name Fine local protection policy by name Find local protection rules by local protection policy Find local protection rules by local protection policy and schedule Find provisioning policy by name Fine provisioning policy by ID Find remote protection policy by name Find remote protection rule by remote protection policy and remote protection label Fine remote protection rules by remote protection policy Find schedule by name Find storage domain by name Find storage domains by provisioning policy SLCs Find storage objects by consumer and object type Find storage service by name Find storage services from attached consumer name Return cron schedules in local protection policy Return cron schedules in remote protection policy Functions Functions were added to aid in creating parameters for WFA commands. The follow functions were added: booleantostring(i). Converts a zero (0) to false and a one (1) to true. forge_export(string). Verifies the export name starts with a slash (/). Forge_vol_path(string). Creates a full path consisting of cluster://vserver/volume for logging. get_space_guarentee(string). Returns the Data ONTAP volume space guarantee from the provisioning policy space guarantee specification. getautodeleteoptions(string). Returns the Data ONTAP autodelete options from the autoshrink option in a provisioning policy. getmirrortype(string). Returns the Data ONTAP SnapMirror type from the remote protection policy. getwfauser(i). Returns the WFA database user name. If the WFA database user name is changed, then this function must be modified to return the new WFA database user name. Any integer can be passed as an input parameter, because it is not used. getwfapassword(i). Returns the WFA database password. If the WFA database password is changed, then this function must be modified to return the new WFA database password. Any integer can be passed as an input parameter, because it is not used. 24 OnCommand Workflow Automation Workflows for Storage as a Service
25 notnull(data). Returns zero (0) if the input parameter is null and a one (1) if the input parameter is not null. Used to skip a WFA workflow row in the loop construct. Note: Note: When creating a consumer, one or more storage services must be assigned to the consumer. The storage architect will be able to choose from a set of SVMs that are available to operate on the respective provisioning policy s storage domain. Basically SVMs will be chosen from a set of SVMs that can operate on the storage domain, or if none is found, then the aggregates in the storage domain should be added to the SVM list of allowed aggregates, or a new SVM should be created that can operate on the storage domains that have been created. A consumer can be mapped to a single SVM, but SVMs can be shared across multiple consumers. 5 Building Storage Services After the workflows have been imported, the methodology to build the storage services will be: Create storage domains Create one or more provisioning policies and associate them to the appropriate storage domains Create one or more schedules Create one or more local protection policies and associate with the appropriate schedules Create one or more remote protection policies (mirror) and associate with the appropriate schedules Create storage services with the appropriate primary/secondary provisioning and protection policies Create consumers and associate with storage services Create/provision exports/luns/shares for the consumers using the storage services There are also additional workflows to view the storage objects and to deprovision the storage objects. Instantiating Consumer and Provisioning Storage with Storage Service Figure 9 shows the flowchart for instantiating a consumer along with a storage service. The exact steps along with the screenshots are also provided in the subsequent section. After the consumer is instantiated, storage can then be provisioned for the consumer with a desired storage service. Figure 9) Instantiating a consumer with a storage service. 25 OnCommand Workflow Automation Workflows for Storage as a Service
26 Creating Storage Service Prerequisites 1. Confirm that the Data ONTAP cluster credentials are configured in WFA as shown in Figure 10. Figure 10) Data ONTAP cluster credentials in WFA. 2. The workflows can be filtered by clicking the storage service catalog category under the Portal tab to list all the custom workflows that have been imported. Figure 11) Storage service catalog. 26 OnCommand Workflow Automation Workflows for Storage as a Service
27 3. Execute the Create a set of Predefined schedules workflow by clicking the workflow. This workflow creates a set of predefined schedules that should suit most protection needs. If a custom schedule is desired, it can be created using the Create local protection policy workflow. Figure 12) Executing the workflow. Building Storage Service 1. The first step in building a storage service is to start with creation of storage domains. Execute the Create Storage Domain workflow. 27 OnCommand Workflow Automation Workflows for Storage as a Service
28 Figure 13) Creating a storage domain (aggregates). 28 OnCommand Workflow Automation Workflows for Storage as a Service
29 2. Create a provisioning policy and associate it with a storage domain. Storage efficiency parameters (thin provisioning, deduplication, compression, and so on) are specified here. Figure 14) Creating a provisioning policy. Note: The workflow also supports Data ONTAP Edge. If you want to create a storage domain with Data ONTAP Edge, select the RAID type to be Raid_0 in the drop-down menu for RAID type. One of the use cases would be to use Data ONTAP Edge as a mirror destination. 29 OnCommand Workflow Automation Workflows for Storage as a Service
30 3. Create a schedule if the preexisting schedules do not match the requirements. Figure 15) Creating a schedule. 30 OnCommand Workflow Automation Workflows for Storage as a Service
31 4. Create a local protection policy and associate the desired schedule. Figure 16) Creating a local protection policy. 31 OnCommand Workflow Automation Workflows for Storage as a Service
32 5. Create a remote protection policy that defines the replication characteristics. Figure 17) Creating a remote protection policy (mirror). 32 OnCommand Workflow Automation Workflows for Storage as a Service
33 6. Create a storage service and associate the previously created components to build the desired service. Associate the primary provisioning policy and the local protection policy to the storage service. If the storage service needs to have a secondary, then associate secondary provisioning policy and the remote protection policy to the service as well. This will also determine what the primary and the secondary SVMs/clusters are when creating a consumer in the subsequent steps. Figure 18) Creating a storage service. 33 OnCommand Workflow Automation Workflows for Storage as a Service
34 Creating Consumer 1. Create a consumer with the desired service levels. Select the storage service to associate with the consumer and the primary and the secondary clusters/svms. The secondary cluster/svm will be active only if the storage service that is selected has an associated secondary provisioning policy/storage domain. Figure 19) Creating a consumer (tenant). This is a critical step, because it defines the primary cluster and SVM and optionally the secondary cluster and SVM. Note: An important point to note here is that a consumer can ONLY be associated with one SVM: the SVM that is selected when creating the consumer. The consumer cannot be associated with multiple SVMs, but one SVM can share multiple consumers. You have an option to select up to three storage services when creating a consumer, and all the storage services will provision on the same primary SVM and the same secondary SVM. You have to make sure that the selected SVM is allowed to operate on the aggregates in the storage domain. The aggregates should be in the list of aggregates on which the SVM is allowed to operate; use the Data ONTAP CLI command vserver show vserver <Vserver name> -instance to verify. 34 OnCommand Workflow Automation Workflows for Storage as a Service
35 2. Provision storage for the consumer using a storage service. A consumer can have multiple storage services associated: gold, bronze, with protection, without protection, and so on. The provisioned storage will match the criteria specified in the storage service selected in this step. Figure 20) Provisioning storage for a consumer (tenant). Note: If a storage service is chosen that includes secondary protection, the mirror relationship will also be initialized. The SVM and cluster peering will be done by WFA, but it is recommended to manually check beforehand that network connectivity is properly configured (intercluster LIFs, routing groups, reachability between clusters, and so on). 6 Viewing Storage Services Components There are workflows that can be utilized for viewing the components that are created. These workflows help in verifying the storage services to which a consumer subscribes and the storage objects that are created for each consumer. You can also view the provisioning policies, storage domains, and storage services. 35 OnCommand Workflow Automation Workflows for Storage as a Service
36 Because WFA does not provide a way to list its objects, viewing workflows are provided. The viewing workflows allow the user to select a field and view the relevant information. For example, when viewing the consumer objects, the consumer is selected, and the list of objects will be displayed for the specific consumer. If the workflow is executed, nothing will be modified. Table 7) View workflows. View Workflows Description 1 View consumer objects Views the different storage services to which a consumer subscribes and the components that make up the storage service. 2 View provisioning policies Views the provisioning policies and storage domains associated with the provisioning policy. 3 View storage domains Views the storage domains and members. 4 View storage objects by consumer Views the storage objects created by consumers (primary volume, secondary volume, type of object: LUN/export/share). 5 View storage services Views the storage services and local and remote provisioning and protection policies and the consumers subscribing to that storage service. View Consumer Objects Figure 21 shows a screenshot of a view consumer objects workflow. View the storage service to which the consumer is subscribing, along with the primary cluster/svm and the local and remote provisioning and protection policies. 36 OnCommand Workflow Automation Workflows for Storage as a Service
37 Figure 21) View consumer objects workflow. 37 OnCommand Workflow Automation Workflows for Storage as a Service
38 View Provisioning Policy Figure 22 shows a screenshot of viewing provisioning policies and the storage domains with which each provisioning policy is associated. Figure 22) View provisioning policy workflow. View Storage Domains Figure 23 shows a screenshot of storage domains and its associated members using the view storage domain workflow. Figure 23) View storage domain workflow. 38 OnCommand Workflow Automation Workflows for Storage as a Service
39 View Storage Objects by Consumer Figure 24 shows a screenshot of viewing the storage objects for a particular consumer. It shows the primary and secondary volumes for the consumer and the type of object (LUN/export/share) along with the storage service used to create the objects. Figure 24) View storage objects by consumer workflow. View Storage Service Figure 25 is a screenshot of a view storage services workflow displaying the components that make up the storage service and the consumers subscribing to that storage service. Figure 25) View storage service workflow. 39 OnCommand Workflow Automation Workflows for Storage as a Service
40 Appendix Procedure to Call Workflows from External Orchestrator For detailed information about REST APIs, see the WFA web services primer for REST API on the Workflow Automation space within the OnCommand community: You can use the REST APIs provided by Workflow Automation (WFA) to invoke workflows from external portals and data center orchestration software. WFA allows external services to access various resource collections, such as workflows, users, filters, and finders, through URI paths. The external services can use HTTP methods such as GET, PUT, POST, and DELETE on these URIs to perform CRUD operations on the resources. You can perform several actions through the WFA REST APIs, including the following: Access workflow definitions and metadata Execute workflows and monitor their execution View users and roles and change passwords Execute and test resource selection filters Execute and test resource finders Manage credentials of storage or other data center objects View data sources and data source types Refer to the Interoperability Matrix Tool (IMT) on the NetApp Support site to validate that the exact product and feature versions described in this document are supported for your specific environment. The NetApp IMT defines the product components and versions that can be used to construct configurations that are supported by NetApp. Specific results depend on each customer's installation in accordance with published specifications. NetApp provides no representations or warranties regarding the accuracy, reliability, or serviceability of any information or recommendations provided in this publication, or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS, and the use of this information or the implementation of any recommendations or techniques herein is a customer s responsibility and depends on the customer s ability to evaluate and integrate them into the customer s operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc. Specifications are subject to change without notice. NetApp, the NetApp logo, Go further, faster, Data ONTAP, Flash Cache, Flash Pool, FlexVol, Manage ONTAP, OnCommand, RAID-DP, SnapMirror, Snapshot, and SnapVault are trademarks or registered 40 OnCommand Workflow trademarks Automation of NetApp, Workflows Inc. in the for United Storage States as a and/or Service other countries. SQL Server is a registered trademark of Microsoft Corporation. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. TR
OnCommand Workflow Automation 2.1
OnCommand Workflow Automation 2.1 Workflow Developer's Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
Clustered Data ONTAP 8.3 Administration and Data Protection Training
Clustered Data ONTAP 8.3 Administration and Data Protection Training Format: Duration: Classroom, Online 5 days Description This course uses lecture and hands-on exercises to teach basic administration
NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide
NetApp Storage System Plug-In 12.1.0.1.0 for Oracle Enterprise Manager 12c Installation and Administration Guide Sachin Maheshwari, Anand Ranganathan, NetApp October 2012 Abstract This document provides
My AutoSupport. User Guide. October 2013
System User Guide My AutoSupport October 2013 NetApp AutoSupport is an integrated, efficient monitoring and reporting technology that checks the health of your AutoSupport enabled NetApp systems on a continual
OnCommand Report 1.2. OnCommand Report User Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.
OnCommand Report 1.2 OnCommand Report User Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501 Support telephone: +1 (888) 463-8277 Web: www.netapp.com
SnapManager 1.0 for Virtual Infrastructure Best Practices
NETAPP TECHNICAL REPORT SnapManager 1.0 for Virtual Infrastructure Best Practices John Lockyer, NetApp January 2009 TR-3737 LEVERAGING NETAPP DATA ONTAP FOR VMWARE BACKUP, RESTORE, AND DISASTER RECOVERY
NetApp OnCommand Plug-in for VMware Backup and Recovery Administration Guide. For Use with Host Package 1.0
NetApp OnCommand Plug-in for VMware Backup and Recovery Administration Guide For Use with Host Package 1.0 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 USA Telephone: +1 (408) 822-6000 Fax: +1
Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
OnCommand Unified Manager 6.2
OnCommand Unified Manager 6.2 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
How To Use Vcenter Site Recovery Manager 5 With Netapp Fas/Vfs Storage System On A Vcenter Vcenter 5 Vcenter 4.5 Vcenter 3.5.5 (Vmware Vcenter) Vcenter 2.
Technical Report Deploying VMware vcenter Site Recovery Manager 5 with NetApp FAS/V-Series Storage Systems Larry Touchette and Julian Cates, NetApp June 2012 TR-4064 NetApp Best Practices for SRM5 This
Clustered Data ONTAP 8.3
Clustered Data ONTAP 8.3 SAN Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277 Web:
OnCommand Unified Manager
OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501
NetApp SnapProtect Management Software: Overview and Design Considerations
Technical Report NetApp SnapProtect Management Software: Overview and Design Considerations Shawn Preissner, NetApp February 2014 TR-3920 Rev 3.0 Summary NetApp SnapProtect management software is changing
Introduction to NetApp Infinite Volume
Technical Report Introduction to NetApp Infinite Volume Sandra Moulton, Reena Gupta, NetApp April 2013 TR-4037 Summary This document provides an overview of NetApp Infinite Volume, a new innovation in
Installing SQL Server 2012 on SMB Shares on NetApp Storage
Technical Report Installing SQL Server 2012 on SMB Shares on NetApp Storage Pat Sinthusan, NetApp November 2012 TR-4108 TABLE OF CONTENTS 1 Introduction... 3 2 Intended Audience... 3 3 Terminology... 3
Clustered Data ONTAP 8.3
Updated for 8.3.1 Clustered Data ONTAP 8.3 SAN Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)
SnapManager 7.1 for Microsoft SharePoint Platform Backup and Restore User s Guide
SnapManager 7.1 for Microsoft SharePoint Platform Backup and Restore User s Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 USA Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
OnCommand Cloud Manager 2.2 Storage System Management Guide
OnCommand Cloud Manager 2.2 Storage System Management Guide March 2016 215-10912_A0 [email protected] Table of Contents 3 Contents Deciding whether to use this guide... 5 Product overview... 6 Cloud
Maximize Storage Efficiency with NetApp Thin Provisioning and Symantec Thin Reclamation
White Paper Maximize Storage Efficiency with NetApp Thin Provisioning and Symantec Thin Reclamation Jeremy LeBlanc; Adam Mendoza; Mike McNamara, NetApp Ashish Yajnik; Rishi Manocha, Symantec September
SnapManager 3.4 for Oracle
SnapManager 3.4 for Oracle Installation and Setup Guide for UNIX For Clustered Data ONTAP NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
Clustered Data ONTAP 8.3
Updated for 8.3.1 Clustered Data ONTAP 8.3 Performance Monitoring Power Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
VMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster
#1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with MARCH 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the
OnCommand Insight 6.4
OnCommand Insight 6.4 OnCommand Insight Planning User Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501 Support telephone: +1(888) 4-NETAPP
Clustered Data ONTAP 8.3
Updated for 8.3.1 Clustered Data ONTAP 8.3 Performance Monitoring Express Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
OnCommand Unified Manager 6.3
OnCommand Unified Manager 6.3 Installation and Setup Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
Copy-Free Transition Guide
7-Mode Transition Tool 2.3 Copy-Free Transition Guide For Transitioning to Clustered Data ONTAP February 2016 215-10922_A0 [email protected] Table of Contents 3 Contents Storage transition using
Entry level solutions: - FAS 22x0 series - Ontap Edge. Christophe Danjou Technical Partner Manager
Entry level solutions: - FAS 22x0 series - Ontap Edge Christophe Danjou Technical Partner Manager FAS2200 Series More powerful, affordable, and flexible systems for midsized organizations and distributed
Cloud ONTAP 8.3 for Amazon Web Services
Cloud ONTAP 8.3 for Amazon Web Services Upgrade Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
FAQ. NetApp MAT4Shift. March 2015
i FAQ NetApp MAT4Shift March 2015 TABLE OF CONTENTS 1 General... 3 1.1 Solution Overview...3 What is NetApp MAT4Shift?... 3 What business needs does this solution address?... 3 What is the value of the
Workflow Automation Support and troubleshooting guide
NETAPP INTERNAL DOCUMENT Workflow Automation Support and troubleshooting guide Yaron Haimsohn, NetApp June 2011 DRAFT v 1.1 TABLE OF CONTENTS 1 PURPOSE... 3 2 GENERAL... 3 2.1 references... 3 2.2 Revisions...
Enterprise Manager. Version 6.2. Administrator s Guide
Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version
System Manager 1.1. Customer Presentation Feb 2010
System Manager 1.1 Customer Presentation Feb 2010 Agenda Overview IT challenges and solutions Business challenges and solutions Features and benefits Availability, licensing and requirements 2009 NetApp.
SnapManager 7.1 for Microsoft Exchange Server
SnapManager 7.1 for Microsoft Exchange Server Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)
Pricing - overview of available configurations
Pricing - overview of available configurations Bundle No System Heads Disks Disk Type Software End User EUR* Token ID Config Name Bundle 1 FAS2040 Single 6 x 1TB SATA Base 4.185 R809196-2040 EEM FAS2040
EMC ViPR Controller. Service Catalog Reference Guide. Version 2.3 XXX-XXX-XXX 01
EMC ViPR Controller Version 2.3 Service Catalog Reference Guide XXX-XXX-XXX 01 Copyright 2015- EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information
Arcserve Backup for Windows
Arcserve Backup for Windows Agent for Microsoft SharePoint Server Guide r16 Pre-release Document, only for reference This Documentation, which includes embedded help systems and electronically distributed
Data ONTAP 8.2. MultiStore Management Guide For 7-Mode. NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.
Data ONTAP 8.2 MultiStore Management Guide For 7-Mode NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501 Support telephone: +1(888) 4-NETAPP Web:
Implementing Microsoft SharePoint on NetApp Storage Systems Course MSSP; 5 Days, Instructor-led
Implementing Microsoft SharePoint on NetApp Storage Systems Course MSSP; 5 Days, Instructor-led Course Description Learn how to implement your Microsoft SharePoint solution on NetApp for maximum benefit.
OnCommand System Manager 3.1
OnCommand System Manager 3.1 Managing Clustered Data ONTAP Using the GUI Printable Online Help NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
EMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
OnCommand System Manager 3.1
OnCommand System Manager 3.1 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
Software Storage Platform Mixing Rules
ONTAP Software Storage Platform Mixing Rules June 2016 215-08964_A0 ur005 [email protected] Table of Contents 3 Contents ONTAP storage platform mixing rules... 4 Cluster configuration qualifications...
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
OnCommand Unified Manager 6.3
OnCommand Unified Manager 6.3 Installation and Setup Guide For Microsoft Windows NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
How To Integrate On Command Workflow Automation With Service Now With On Command
Create Home Directories on Storage Using On Command Workflow Automation and ServiceNow Integration Rutul Shah (GSDC), NetApp March 2015 Abstract The goal of this document is to provide IT administrators
SnapManager 3.0 for Oracle Best Practices
Technical Report Anand Ranganathan and Antonio Jose Rodrigues Neto, NetApp April 2009 TR-3761 LEVERAGING NETAPP DATA ONTAP 7G FOR ORACLE DATABASE BACKUP, RECOVERY, AND CLONE MANAGEMENT Backup, recovery,
Importing Custom Reports and Dashboard In OnCommand Report
Importing Custom Reports and Dashboard In OnCommand Report Yuvaraju.B, NetApp IMPORTING CUSTOM REPORTS AND DASHBOARD OnCommand Insight Report (also called OnCommand Report) provides comprehensive reporting
VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services
Continuous Availability for Business-Critical Data. MetroCluster Technical Overview
Continuous Availability for Business-Critical Data MetroCluster Technical Overview Agenda Causes of Downtime MetroCluster Overview MetroCluster Deployment Scenarios MetroCluster Failure Scenarios New Features
SnapManager 8 for Microsoft SharePoint Platform Backup and Restore User s Guide
SnapManager 8 for Microsoft SharePoint Platform Backup and Restore User s Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 USA Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone:
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Hitachi Data Migrator to Cloud Best Practices Guide
Hitachi Data Migrator to Cloud Best Practices Guide Global Solution Services Engineering April 2015 MK-92HNAS045-02 Notices and Disclaimer Copyright 2015 Corporation. All rights reserved. The performance
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
DocAve 6 Service Pack 1 Job Monitor
DocAve 6 Service Pack 1 Job Monitor Reference Guide Revision C Issued September 2012 1 Table of Contents About Job Monitor... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin... 5
Nondisruptive Operations and Clustered Data ONTAP
White Paper Nondisruptive Operations and Clustered Data ONTAP Arun Raman, Charlotte Brooks, NetApp January 2014 WP-7195 TABLE OF CONTENTS 1 Introduction... 3 2 Nondisruptive Operations (NDO) and Clustered
Single Mailbox Recovery 7.0 Administrative Server Administration Guide
Single Mailbox Recovery 7.0 Administrative Server Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1
Storage as a Service VMware vcloud Automation Center & NetApp
Storage as a Service VMware vcloud Automation Center & NetApp Table of Contents 1. Introduction... 1 2. System Pre-requisites... 2 3. Solution Details... 2 3.1 Create Service Blueprint... 2 3.2 Create
StreamServe Persuasion SP5 Control Center
StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents
OnCommand Performance Manager 2.0
OnCommand Performance Manager 2.0 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
SAN Implementation Course SANIW; 3 Days, Instructor-led
SAN Implementation Course SANIW; 3 Days, Instructor-led Course Description In this workshop course, you learn how to connect Windows, vsphere, and Linux hosts via Fibre Channel (FC) and iscsi protocols
Advanced Data Mobility To Power Your Hybrid Cloud
Advanced Data Mobility To Power Your Hybrid Cloud Jacint Juhasz Systems Engineer South Eastern Europe 1 Market Leading Portfolio of Innovation From data center to the hybrid cloud Shared Dedicated FlashRay
Clustered Data ONTAP 8.3
Clustered Data ONTAP 8.3 EMS Configuration Express Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277
NetApp FAS2000 Series
Systems NetApp FAS2000 Series Take control of your fast-growing data and maximize your shrinking budgets with an affordable, and easy-to-use storage system from NetApp KEY BENEFITS Experience value Acquire
Symantec Enterprise Vault And NetApp Better Together
Symantec Enterprise Vault And NetApp Better Together John Martin, Consulting Systems Engineer Information Archival with Symantec and NetApp Today s Customer Headaches Data is growing exponentially Scaling
The Nuts and Bolts of Autodesk Vault Replication Setup
The Nuts and Bolts of Autodesk Vault Replication Setup James McMullen Autodesk, Inc PL4700-V Has your company decided to move toward a replicated Autodesk Vault software environment? Does your company
Application Note 116: Gauntlet System High Availability Using Replication
Customer Service: 425-487-1515 Technical Support: 425-951-3390 Fax: 425-487-2288 Email: [email protected] [email protected] Website: www.teltone.com Application Note 116: Gauntlet System High Availability
Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201
Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table
Installing RMFT on an MS Cluster
Installing RMFT on an MS Cluster RMFT Software Version 2.4.3 Supported on: Windows Server 2003 Enterprise Edition Windows Server 2000 Advanced Windows Server 2003 Datacenter Edition Windows Server 2008
How To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco
HP IMC User Behavior Auditor
HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC
Moving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
Windows Azure Pack Installation and Initial Configuration
Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete
Frequently Asked Questions: EMC UnityVSA
Frequently Asked Questions: EMC UnityVSA 302-002-570 REV 01 Version 4.0 Overview... 3 What is UnityVSA?... 3 What are the specifications for UnityVSA?... 3 How do UnityVSA specifications compare to the
Orchestrating Document and Media Management using CMIS
Orchestrating Document and Media Management using CMIS Technical Note - Integrating ActiveVOS with Alfresco CMIS Services AN ACTIVE ENDPOINTS TECHNICAL NOTE 2009 Active Endpoints Inc. ActiveVOS is a trademark
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware
Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware Deploying Microsoft Exchange Server 2010 in a virtualized environment that leverages VMware virtualization and NetApp unified storage
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for
Acronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
StarWind Virtual SAN Installing & Configuring a SQL Server 2012 Failover Cluster
#1 HyperConverged Appliance for SMB and ROBO StarWind Virtual SAN Installing & Configuring a SQL Server 2012 Failover JANUARY 2015 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind
Using Additional Pollers with WhatsUp Gold v16.0 Learn how to install, configure, and manage pollers for load balancing on your WhatsUp Gold system
Using Additional Pollers with WhatsUp Gold v16.0 Learn how to install, configure, and manage pollers for load balancing on your WhatsUp Gold system Contents CHAPTER 1 Polling Overview WhatsUp Gold Polling
Navigating VSC 6.0 for VMware vsphere
Navigating VSC 6.0 for VMware vsphere Staring with version 5.0, Virtual Storage Console for VMware vsphere works with the VMware vsphere Web Client and has dropped support for the VMware Desktop Client.
Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
How to deploy OnCommand Unified Manager - Best Practices Guide
How to deploy OnCommand Unified Manager - Best Practices Guide NetApp August 2011 EXECUTIVE SUMMARY This paper presents best practices to follow when deploying NetApp OnCommand Unified Manager software.
Agenda. Importance of UCS Director in an ACI Environment Integration Overview and Key Concepts Use-Case Demonstrations Conclusion Q&A
Management and Automation of Application Centric Infrastructure with Cisco UCS Director Michael Zimmerman, Technical Marketing Engineer Shankar Varanasy, Product Manager BRKACI-2410 Agenda Importance of
System Center Virtual Machine Manager 2012 and NetApp Data ONTAP SMI-S Agent
Technical Report System Center Virtual Machine Manager 2012 and NetApp Data ONTAP SMI-S Agent Chris Lionetti, NetApp November2011 TR-3874 BEST PRACTICES AND PRESCRIPTIVE GUIDANCE FOR INCORPORATING NETAPP
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
Technical White Paper Integration of ETERNUS DX Storage Systems in VMware Environments
White Paper Integration of ETERNUS DX Storage Systems in ware Environments Technical White Paper Integration of ETERNUS DX Storage Systems in ware Environments Content The role of storage in virtual server
Acronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data
Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. Acronis and Acronis Secure Zone are registered
FlexArray Virtualization
Updated for 8.2.1 FlexArray Virtualization Installation Requirements and Reference Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support
