Академический Документы
Профессиональный Документы
Культура Документы
Ans: 1. Traditional
2. Flexvol
Volume important stuff:
The name of the volume
The size of the volume
A security style, which determines whether a volume can contain files
that use UNIX security, files that use NT file system (NTFS) file security,
or both types of files
Whether the volume uses CIFS oplocks (opportunistic locks)
The type of language supported
The level of space guarantees (for FlexVol volumes only)
Traditional volume
The smallest possible 2 disk raid4 3 disk raiddp
A traditional volume is contained by a single, dedicated,
aggregate.
The only way to increase the size of a traditional volume is to add entire
disks to
its containing aggregate
it is impossible to decrease the size of a traditional
volume.
Flexible volume (FlexVol):
Because the volume is managed separately from the aggregate,
FlexVol volumes give you a lot more options for managing the size of the
volume.
You can create FlexVol volumes in an aggregate nearly instantaneously.
They can be as small as 20 MB and as large as the volume capacity that
is
supported for your storage system
You can increase and decrease the size of a FlexVol in small increments
(as
small as 4 KB), nearly instantaneously
3.
Ans:Volume SnapMirror
Qtree SnapMirror
Synchronous or asynchronous
replication is supported for
volumes.
Logical replication
All the files and directories in the
source file system are created in the
destination file system. Therefore,
you can replicate data between
astorage system running an older
version of Data ONTAP and a storage
system running a newer version.
Hard zoning is done by the switches, disallowing certain WWNs (or ports) from talking by examining
source and destination information, regardless of knowledge of one another's existence. I compare
this to conventional IP firewalls (only certain IPs can talk to one another - I know Google's IP but I
still cannot reach it).
Soft zoning allows everything to reach everything else, but prevents discovery of everything in the
fabric by limiting what information the name server will respond with when a new HBA wants to know
what it can talk to. I compare this to a DNS server that provides different responses based on the
querying host - hosts can still talk if they know one another's IP address.
WWN and port-based zoning are unrelated to the above - they simply imply how you identify
members of a zone.
5.
Ans:Port
Full Name
Port Function
N-port network port Node port used to connect a node to a Fibre Channel
or node port switch
F-port
fabric port
L-port
loop port
NL-port network +
loop port
FL-port fabric + loop Switch port which connects to both loops and switches
port
E-port extender
port
7.
The Light Directory Access Protocol (LDAP) defines a standard method for
accessing and updating information in a directory (a database) either
locally or remotely in a client-server model.
14. What are the benefits of fibre channel SANs?
Ans:- Fibre Channel SANs are the de facto standard for storage
networking in the corporate data center because they provide exceptional
reliability, scalability, consolidation, and performance. Fibre Channel SANs
provide significant advantages over direct-attached storage through
improved storage utilization, higher data availability, reduced
management costs, and highly scalable capacity and performance.
15. What environment is most suitable for fibre channel SANs?
Ans:- Typically, Fibre Channel SANs are most suitable for large data
centers running business-critical data, as well as applications that require
high-bandwidth performance such as medical imaging, streaming media,
and large databases. Fibre Channel SAN solutions can easily scale to
meet the most demanding performance and availability requirements.
16. What customer problems do fibre channel SANs solve?
Ans:- The increased performance of Fibre Channel enables a highly
effective backup and recovery approach, including LAN-free and serverfree backup models. The result is a faster, more scalable, and more
reliable backup and recovery solution. By providing flexible connectivity
options and resource sharing, Fibre Channel SANs also greatly reduce the
number of physical devices and disparate systems that must be
purchased and managed, which can dramatically lower capital
expenditures. Heterogeneous SAN management provides a single point of
control for all devices on the SAN, lowering costs and freeing personnel to
do other tasks.
17. How long has fibre channel been around?
Ans:- Development started in 1988, ANSI standard approval occurred in
1994, and large deployments began in 1998. Fibre Channel is a mature,
safe, and widely deployed solution for high-speed (1 GB, 2 GB, 4 GB)
communications and is the foundation for the majority of SAN
installations throughout the world.
Whats the need for separate network for storage why LAN cannot be
used?
LAN hardware and operating systems are geared to user traffic, and LANs
are tuned for a fast user response to messaging requests.
With a SAN, the storage units can be secured separately from the servers
and totally apart from the user network enhancing storage access in data
blocks (bulk data transfers), advantageous for server-less backups.
23. What are the advantages of RAID?
Ans:- Redundant Array of Inexpensive Disks
Depending on how we configure the array, we can have the
- data mirrored [RAID 1] (duplicate copies on separate drives)
- striped [RAID 0] (interleaved across several drives), or
- parity protected [RAID 5](extra data written to identify errors).
These can be used in combination to deliver the balance of performance
and reliability that the user requires.
24. Define RAID? Which one you feel is good choice?
Ans: - RAID (Redundant array of Independent Disks) is a technology to
achieve redundancy with faster I/O. There are Many Levels of RAID to
meet different needs of the customer which are: R0, R1, R3, R4, R5, R10,
R6.
Generally customer chooses R5 to achieve better redundancy and speed
and it is cost effective.
R0 Striped set without parity/[Non-Redundant Array].
Provides improved performance and additional storage but no fault
tolerance. Any disk failure destroys the array, which becomes more likely
with more disks in the array. A single disk failure destroys the entire
array because when data is written to a RAID 0 drive, the data is broken
into fragments. The number of fragments is dictated by the number of
disks in the drive. The fragments are written to their respective disks
simultaneously on the same sector. This allows smaller sections of the
entire chunk of data to be read off the drive in parallel, giving this type of
arrangement huge bandwidth. RAID 0 does not implement error checking
levels are vulnerable to data loss until the failed drive is rebuilt: the
larger the drive, the longer the rebuild will take. Dual parity gives time to
rebuild the array without the data being at risk if one drive, but no more,
fails before the rebuild is complete.
25. What is the difference between RAID 0+1 and RAID 1+0?
Ans:- RAID 0+1 (Mirrored Stripped)
In this RAID level all the data is saved on stripped volumes which are in
turn mirrored, so any disk failure saves the data loss but it makes whole
stripe unavailable. The key difference from RAID 1+0 is that RAID 0+1
creates a second striped set to mirror a primary striped set. The array
continues to operate with one or more drives failed in the same mirror
set, but if drives fail on both sides of the mirror the data on the RAID
system is lost. In this RAID level if one disk is failed full mirror is marked
as inactive and data is saved only one stripped volume.
RAID 1+0 (Stripped Mirrored)
In this RAID level all the data is saved on mirrored volumes which are in
turn stripped, so any disk failure saves data loss. The key difference from
RAID 0+1 is that RAID 1+0 creates a striped set from a series of
mirrored drives. In a failed disk situation RAID 1+0 performs better
because all the remaining disks continue to be used. The array can
sustain multiple drive losses so long as no mirror loses both its drives.
This RAID level is most preferred for high performance and high data
protection because rebuilding of RAID 1+0 is less time consuming in
comparison to RAID 0+1.
26. When JBODs are used?
Ans:- Just a Bunch of Disks
It is a collection of disks that share a common connection to the server,
but dont include the mirroring,
striping, or parity facilities that RAID systems do, but these capabilities
are available with host-based software.
27. Differentiate RAID & JBOD?
Ans:- RAID: Redundant Array of Inexpensive Disks
Fault-tolerant grouping of disks that server sees as a single disk volume
debug port. With serial port debug connector cable you can collect the
debug information with hyper terminal software.
36B. SCENARIO 2: I am having an issue with a controller its
taking lot of time to boot and detect all the drives connected how
can I solve this.?
There are many possibilities that might cause this problem. One of the
reason might be you are using bad drives that cannot be repaired. In
those cases you replace the disks with working ones.
Another reason might be slots you connected your controller to a slot
which might not be supported.
Try to connect with other types of slots.
One more probable reason is if you have flashed the firmware for
different OEMs on the same hardware.
To get rid of this the flash utilities will be having option to erase all the
previous and EEPROM and boot block entry option. Use that option to
rectify the problem.
36C. SCENARIO 3: I am using tape drive series 700X, even the
vendor information on the Tape drive says 700X, but the POST
information while booting the server is showing as 500X what
could be the problem?
First you should make sure your hardware is of which series, you can find
out this in the product website.
Generally you can see this because in most of the testing companies they
use same hardware to test different series of same hardware type. What
they do is they flash the different series firmware. You can always flash
back to exact hardware type.
37. Which are the 4 types of SAN architecture types ?
Ans:- Core-edge.
Full-Mesh.
Partial-Mesh.
Cascade.
1. What is NVRAM..?
Ans:- Non-volatile battery-backed memory (NVRAM) is used for write caching.
2. Do you know how data is written to the disk in Netapp.? Please explain..?
Ans:- As soon as the write to NVRAM is confirmed, the storage appliance
acknowledges the write as completed to the client machine. At pre-determined
triggers, this buffered write data is processed from storage device memory
through the Write Anywhere File Layout (WAFL) and RAID layers and written to
disk.
3. What is SP/RLM/BMC..?
Ans:SP - Service processor
SP monitors the system temperatures, voltages, currents, and fan speeds. When
an environmental sensor has reached an abnormal condition, the SP logs the
abnormal readings, notifies Data ONTAP of the issue, and sends alerts and 'down
system' notifications as necessary through an AutoSupport message, regardless of
whether the storage system can send AutoSupport messages
RLM - Remote LAN Module
The RLM provides remote node management capabilities, including remote access,
monitoring, troubleshooting, logging, and alerting features
For NFS/CIFS instead of accessing from single interface, multi mode vif
can be configured to get better bandwidth and fault tolerance.
Create multiple loops and connect different types of shelf's to each loop
27. After creating LUN (iSCSI) & mapped the LUN to particular igroup, the
client not able to access the LUN. What are the trouble shooting steps you
take?
Check whether IQN number specified is correct
Check whether the created LUN is in restrict mode
Check the iscsi status
Un-map and map the LUN once again
Check Network connectivity communication
28. In CIFS how do you check who is using most?
cifs top
29. How to check cifs performance statistics.?
cifs stat
30. What do you do if a customer reports a particular CIFS share is responding
slow?
Check the r/w using "cifs stat" & "sysstat -x 1".
If disk & cpu utilization is more then problem is with filer side only.
CPU utilization will be high if more disk r/w time, i.e.,during tape backup & also
during scrub activities.
31. what is degraded mode? If you don't have parity for failed disks then?
If the spare disk is not added within 24hours,then filer will be shutdown
automatically to avoid further disk failures and data loss.
32. Did you ever do ontap upgrade? From which version to which version and
for what reason?
Yes i have done ontap upgrade from version 7.2.6.1 to 7.3.3 due to lot of bugs in
old version.
33. How do you create a lun ?
lun create -s <lunsize> -t <host type> <lunpath>
34. How do you monitor the filers?
Using DFM(Data Fabric Manager) or also using SNMP you can monitor the filer.
Using any monitoring systems like .i.e.Nagios
35. What are the prerequisites for a cluster?
cluster interconnect cable should be connected.
shelf connect should be properly done for both the controllers with Path1 and
Path2
cluster license should be enabled on both the nodes
Interfaces should be properly configured for fail over
cluster should be enabled
36. What is the diff bet cf takeover and cf force takeover?
If partner shelf power is off, if you try to takeover it will not take. if you do as
force using (-f) it will work
37. What is LIF.?
LIF ( Logical interface) :
As the name suggest its a logical interface which is created from physical interface
of NetApp controllers.
38. What is VServer..?
A Vserver is defined as logical container which holds the volumes. A 7 mode vfiler
is called as a vserver in Clustered mode .
39. What is junction path..?
This is a new term in cluster mode and this is used for mounting.Volume junctions
are a way to join individual volumes together into a single, logical namespace to
enable data access to NAS clients.
40. What is infinite volumes..?
NetApp Infinite Volume is a software abstraction hosted over clustered Data ONTAP