Search within this manual
Search all Support content
Data ONTAP® 8.2
Archive and Compliance Management Guide
For 7-Mode
Updated for 8.2.1
What SnapLock is
How SnapLock works
Hardware platforms supported for SnapLock
Comparison table of SnapLock Enterprise and SnapLock Compliance
Licensing SnapLock functionality
Enabling the SnapLock functionality
SnapLock and AutoSupport messages
What ComplianceClock is
What system ComplianceClock is
What volume ComplianceClock is
Initializing the system ComplianceClock
Viewing the system ComplianceClock and volume ComplianceClock time
Upgrade considerations for ComplianceClock
How the volume ComplianceClock impacts SnapLock operations
Operations that might affect volume ComplianceClock time
Creating SnapLock volumes
Creating SnapLock traditional volumes
Creating SnapLock aggregates and their flexible volumes
SnapLock Compliance write verification option
Using the SnapLock Compliance write verification option
What a WORM file is
How to manage WORM data
Transitioning data to the WORM state
Determining the WORM status of a file
Extending the retention date of a WORM file
What the WORM append file is
Creating a WORM append file
What retention period is
How the SnapLock volume retention period works
Viewing the retention period of a volume
What the minimum retention period is
Setting the minimum retention period
What the maximum retention period is
Setting the maximum retention period
What the default retention period is
Setting the default retention period
Committing files to WORM state automatically
How SnapLock autocommit feature works
Setting the autocommit period
Displaying the autocommit period of a SnapLock volume
What the privileged delete feature is
How privileged delete works
Limitations of the privileged delete functionality
Ensuring secure connection to the storage system
Enabling privileged delete functionality
Disabling or disallowing privileged delete functionality
Deleting a WORM file using privileged delete
How privileged delete affects mirroring interactions
Considerations when using the privileged delete feature
What SnapLock logging is
Types of SnapLock log files
What the SnapLock log file contains
Advantages of SnapLock logging
Limitations of SnapLock logging
Assigning a SnapLock log volume
How archiving a log file works
Archiving log files
Finding the status of the SnapLock log file
Upgrade and revert considerations for SnapLock logging
How Data ONTAP tracks the files on SnapLock volumes
Destroying a SnapLock volume
Destroying aggregates
How SnapLock uses fingerprints
How a fingerprint is calculated
Input parameters for the fingerprint operation
Calculating the fingerprint of a file
Output parameters for the fingerprint operation
SnapLock interaction with a vFiler unit
Creating the root of a vFiler unit from a SnapLock volume to a non-SnapLock volume
Limitations of vFiler units on SnapLock volumes
SnapLock interaction with HA configuration
SnapLock interaction with SyncMirror and MetroCluster configuration
SnapLock interaction with FlexClone volumes
Protecting your SnapLock volumes with SnapMirror
SnapLock qtree SnapMirror resynchronization restrictions
What the dump file is
Extracting files from the dump file after a qtree SnapMirror resynchronization
How to set an end-to-end SnapLock Compliance volume SnapMirror relationship
Limitations of the SnapMirror relationship
Creating a volume SnapMirror relationship for a FlexVol volume
Creating a volume SnapMirror relationship for a traditional volume
The SnapLock for SnapVault feature—secure SnapVault destination
Guidelines for using the SnapLock for SnapVault feature
Aspects of capacity planning
Guidelines for estimating SnapVault secondary storage system volume size
Estimating the log volume size
How to set up SnapVault backups
Configuring a primary storage system for SnapVault
Configuring a SnapVault secondary storage system
Scheduling SnapVault update backups on the primary storage system
Scheduling SnapVault update backups on the SnapVault secondary storage system
Scheduling SnapVault update backups on the SnapVault primary and secondary storage system schedules
Guidelines for scheduling SnapVault transfers
Management of WORM Snapshot copies by using SnapVault
How retention of Snapshot copies works on SnapLock volumes
How Snapshot copies are named on SnapLock volumes
Retention period for WORM Snapshot copies created by SnapVault
Default SnapVault settings for the WORM Snapshot copies retention period
Specifying retention period for WORM Snapshot copies
Extending the retention period of WORM Snapshot copies
Listing Snapshot copies on the WORM volume
Listing Snapshot copies and retention dates
Deleting expired WORM Snapshot copies
How to retain more than 255 SnapVault Snapshot copies
How to create a new volume to retain more Snapshot copies
Advantages of cloning Snapshot copies
Advantages of copying Snapshot copies
Creating a new volume for retaining Snapshot copies
Verifying the state of the old volume
Removing the SnapVault schedules for the old volume
Creating a volume clone to a new volume
Copying the appropriate Snapshot copy to a new volume
Checking or setting the retention period on the new volume
Checking volume options on the new volume
Restarting all SnapVault relationships in the new volume
Reconfiguring the SnapVault schedules in the new volume
Ensuring the migration of Snapshot copies
Stopping all SnapVault relationships in the old volume
Backup of the log volumes created by the SnapLock for SnapVault feature
Protecting a log volume of the SnapLock for SnapVault feature
Failing over to the standby system
Reestablishing standby protection
How to resynchronize a broken SnapVault relationship
Turning SnapVault off
Management of SnapVault log files
Regulatory compliance and SnapVault log files
How SnapVault maintains compliance
Operations log file
Files-transferred log files
Configuring the log volumes of the SnapLock for SnapVault feature
Where the log files are kept
What files-transferred log files contain
Types of log entries recorded
Log entry format
How log entries are created
How to provide backup and standby protection using SnapMirror
Setting up backup and standby protection for SnapVault
Reestablishing backup and standby protection for SnapVault
Returning to the original backup and standby configuration
Limitations to compliance backup and standby service
How to manage SnapLock through Data ONTAP APIs
What ONTAPI is
Setting up a client to use ONTAPI calls
Benefits of using the Data ONTAP API suite
List of SnapLock APIs
volume-create
file-get-snaplock-retention-time
file-get-snaplock-retention-time-list-info-max
file-set-snaplock-retention-time
file-snaplock-retention-time-list-info
snaplock-get-log-volume
snaplock-get-options
snaplock-log-archive
snaplock-log-status-list-info
snaplock-privileged-delete-file
snaplock-set-log-volume
snaplock-set-options
file-get-fingerprint
snaplock-get-system-compliance-clock
snaplock-get-volume-compliance-clock
What the extended date range mechanism is
Setting files to WORM state from an application
Using SnapLock volume defaults to set retention period
Using the SnapLock autocommit feature from an application
How to implement SnapLock features through Data ONTAP APIs
Using the SnapLock privileged delete feature from an application
Using the SnapLock logging feature from an application
What event-based retention is
What legal hold is
Implementation of event-based retention and the legal hold feature using SnapLock
Implementing event-based retention and legal hold
Deleting a record using the privileged delete feature
Examples for setting a file to WORM state using an application
Examples for setting the SnapLock volume defaults
Examples for setting the autocommit feature and time intervals
Examples for creating a compliance administrator
Examples for setting a SnapLock log volume
Examples for enabling the privileged delete feature
Examples for performing a privileged delete
Copyright information
Trademark information
How to send your comments