AD login on cluster management

Enabling Active Directory domain users to access the cluster To enable Active Directory domain users to access the cluster, you must set up an authentication tunnel through a CIFS-enabled Vserver. You must also create cluster user accounts for the domain users. This functionality requires that CIFS is licensed on the cluster. Steps If a tunnel for authenticating Active Directory domain users’ cluster access does not exist, complete the following steps: Note: The security login domain-tunnel show command displays the authentication tunnel if it has been set up. Create a CIFS server for a Vserver that you will use as an authentication tunnel by using the vserver cifs create command. You can use any data Vserver that hasRead More

Disk zeroing, how long?

Estimated Disk Zeroing Time  Capacity  Type Speed  Estimated Zeroing Time (hrs)  300GB FC 15k rpm  1.5  450GB  2.2  600GB  2.5  300GB SAS 15k rpm  1.5  450GB  2.2  600GB  2.5  450GB SAS 10k rpm  2.3  600GB  2.6  500GB SATA 7.2k rpm  2.5  1TB  4.3  2TB  5.6  3TB  7.0  4TB 12  

Disk Management

For most system configurations, you can use automatic assignment at stack or loop level; for smaller configurations, you can use automatic assignment at shelf level. The first automatic assignment occurs after 10 minutes. Use these guidelines for configuring automatic disk ownership at the stack or loop level: Always assign all disks on the same loop or stack to the same system. Always assign disks in the same multi-disk carrier to the same system. Use these guidelines for configuring automatic disk ownership at the shelf level: Always assign all disks on the same shelf to the same system. On storage systems that support two controllers but only a single stack, ifRead More

What is SVM DR?

    Storage Virtual Machines (SVMs) are essentially blades running Data ONTAP, more or less. They act as their own tenants in a cluster and could represent individual divisions, companies or test/prod environments. However, even with multiple SVMs, you still end up with a single point of failure – the storage system itself. If a meteor hit your datacenter, your cluster would be toast and your clients would be dead in the water, unless you planned for disaster recovery accordingly.   Steps: In this Post i am using two clusters 1. Cluster1 2. Cluster2 1. First check the intercluster role LIF is present in both the clusters.      Read More

Enabling Active Directory domain users to access the cluster

To enable Active Directory domain users to access the cluster, you must set up an authentication tunnel through a CIFS-enabled Vserver. You must also create cluster user accounts for the domain users. This functionality requires that CIFS is licensed on the cluster. 1. CIFS license is required. 2. Configure the cifs server for an existing vserver. 1. First create a security domain tunnel. 2. Create a cluster user, to access via ssh, http and ontapi. 3. Login with the new user, now authentication is done by the domain server. 4. Now create a role, to access the vserver vs1 only the paritcular volume called vol1. 5. Create a new userRead More