Search within this manual
Search all Support content
Clustered Data ONTAP® 8.2
System Administration Guide for Cluster Administrators
Updated for 8.2.2
Differences between cluster and SVM administrators
Data ONTAP management interface basics
Accessing the cluster by using the CLI
Accessing the cluster by using the serial port
Accessing the cluster by using SSH
Enabling Telnet or RSH access to the cluster
Accessing the cluster by using Telnet
Accessing the cluster by using RSH
Using the Data ONTAP command-line interface
Understanding the different shells for CLI commands
Displaying available nodeshell commands
Uses of the systemshell and the diagnostic account
Methods of navigating CLI command directories
Rules for specifying values in the CLI
Methods of viewing command history and reissuing commands
Keyboard shortcuts for editing CLI commands
Use of administrative privilege levels
Setting the privilege level in the CLI
Setting display preferences in the CLI
Methods of using query operators
Methods of using extended queries
Methods of customizing show command output by using fields
Methods of accessing Data ONTAP man pages
Managing CLI sessions
Managing records of CLI sessions
Recording a CLI session
Commands for managing records of CLI sessions
Managing the automatic timeout period of CLI sessions
Commands for managing the automatic timeout period of CLI sessions
Understanding OnCommand System Manager
Cluster management basics
What a cluster is
Considerations for single node clusters
What the cluster management server is
Understanding quorum and epsilon
What a cluster replication ring is
Displaying the nodes in a cluster
Displaying cluster attributes
Modifying cluster attributes
Reassigning epsilon to another node in the cluster
Displaying the status of cluster replication rings
Managing nodes
Displaying node attributes
Modifying node attributes
Renaming a node
Adding nodes to the cluster
Removing nodes from the cluster
Accessing a node's log, core dump, and MIB files by using a web browser
Rules governing node root volumes and root aggregates
Freeing up space on a node’s root volume
Starting or stopping a node
Rebooting a node at the system prompt
Booting Data ONTAP at the boot environment prompt
Rebooting a node remotely
Shutting down a node
Managing a node by using the boot menu
Recovering from a corrupted image of a node's boot device
Managing a node remotely
Managing a node remotely by using the Service Processor
Configuring the SP network
Accounts that can access the SP
Accessing the SP from an administration host
Accessing the SP from the serial console
Accessing the serial console from the SP
Relations among the SP CLI, SP console, and serial console sessions
Using online help at the SP CLI
Commands for managing a node at the SP admin privilege level
Commands for managing a node at the SP advanced privilege level
How to determine the status of a threshold-based SP sensor
Understanding the status of a discrete SP sensor
Troubleshooting a node by using the SP
Managing the SP with Data ONTAP
Methods of managing SP firmware updates
Restricting SP access to only the specified administration hosts
Configuring automatic logout of idle SSH connections to the SP
Data ONTAP commands for managing the SP
Disabling SNMP traps for only the SP
Managing a node remotely by using the Remote LAN Module
What the RLM does
Configuring the RLM network
Accounts that can access the RLM
Logging in to the RLM from an administration host
Accessing the serial console from the RLM
Relations among the RLM CLI, RLM console, and serial console sessions
Using online help at the RLM CLI
Commands for managing a node at the RLM admin privilege level
Commands for managing a node at the RLM advanced privilege level
Managing the RLM with Data ONTAP
Data ONTAP commands for managing the RLM
Restricting RLM access to only the specified administration hosts
Configuring automatic logout of idle SSH connections to the RLM
RLM and SNMP traps
Disabling SNMP traps for only the RLM
Troubleshooting a node by using the RLM
Troubleshooting RLM connection problems
Managing SVMs
What SVMs are
About SVMs root volumes
Types of SVMs
Why you use SVMs
Number of SVMs in a cluster
CreatingSVMs
List of language options
Language configurations
Completing the SVM setup worksheet
Creating SVMs by using the CLI wizard
Creating fully configured SVMs
Setting up a network interface
Provisioning storage by creating volumes
Configuring services
Configuring protocols
Creating SVMs with FlexVol volumes
Creating SVMs with Infinite Volume
Considerations for modifying SVMs
Modifying SVMs
Delegating administration to SVM administrators
Displaying information about SVMs
Renaming SVMs
Deleting SVMs
Administering SVMs from the SVM context
Starting SVMs
Stopping SVMs
Restoring the root volume ofan SVM
Promoting a load-sharing mirror copy
Promoting a data-protection mirror copy
Promoting a new FlexVol volume
Controlling and monitoring I/O performance to SVMs by using Storage QoS
Managing access to the cluster
Managing user accounts
Access methods for user accounts
Authentication methods for user accounts
Authentication behavior when methods include both public key and password
Enabling Active Directory domain users to access the cluster
Commands for managing user accounts
Managing access-control roles
Predefined roles for cluster administrators
Predefined roles for SVM administrators
Considerations for customizing an access-control role
Customizing an access-control role to restrict user access to specific commands
Managing rule settings for user names and passwords in an access-control role
Considerations for password rule settings
Commands for managing access-control roles
Managing firewall service and policies
Creating a firewall policy and assigning it to a LIF
Commands for managing firewall service and policies
Managing SSH security configurations
Commands for managing SSH security configurations
Managing public keys
Commands for managing public keys
Managing digital certificates for server or client authentication
Generating and installing a CA-signed digital certificate for server authentication
Installing a server intermediate certificate
Providing mutual authentication
Installing the root certificate of an SSL server
Commands for managing digital certificates
Managing access to web services
Managing the web protocol engine
Commands for managing the web protocol engine
Managing web services
Commands for managing web services
Commands for managing mount points on the nodes
Managing SSL
Commands for managing SSL
Configuring access to web services
Troubleshooting web service access problems
Managing audit settings
Commands for managing audit settings
Managing the cluster time
Commands for managing the cluster time
Managing licenses
License types and licensed method
Commands for managing licenses
Managing jobs and schedules
Job categories
Commands for managing jobs
Commands for managing job schedules
Backing up and restoring cluster configurations
What configuration backup files are
Managing configuration backups
How the node and cluster configurations are backed up automatically
Commands for managing configuration backup schedules
Commands for managing configuration backup files
Recovering a node configuration
Finding a configuration backup file to use for recovering a node
Restoring the node configuration using a configuration backup file
Recovering a cluster configuration
Finding a configuration to use for recovering a cluster
Restoring a cluster configuration from an existing configuration
Synchronizing a node with the cluster
Managing core dumps
Methods of segmenting core dump files
Commands for managing core dumps
Commands for managing core segmenting
Monitoring the storage system
Managing event messages
Setting up the Event Management System
Commands for managing events
Managing AutoSupport
When and where AutoSupport messages are sent
How AutoSupport creates and sends event-triggered messages
How AutoSupport On Demand obtains delivery instructions from technical support
Types of AutoSupport messages and their content
Structure of AutoSupport messages sent by email
AutoSupport severity types
Requirements for using AutoSupport
Setting up AutoSupport
Getting AutoSupport message descriptions
Commands for managing AutoSupport
Information included in the AutoSupport manifest
What My AutoSupport is
Troubleshooting AutoSupport
Troubleshooting AutoSupport when messages are not received
Troubleshooting AutoSupport over HTTP or HTTPS
Troubleshooting AutoSupport delivery over SMTP
Troubleshooting EMS events about rejected or failed SMTP attempts
Monitoring the health of your system
How health monitoring works
Ways to respond to system health alerts
System health alert customization
How health alerts trigger AutoSupport messages and events
What health monitors are available
Receiving system health alerts automatically
Responding to degraded system health
Example of responding to degraded system health
Configuring discovery of cluster and management network switches
Verifying the monitoring of cluster and management network switches
Commands for monitoring the health of your system
Using dashboards to display critical system information
Getting notified of dashboard alarms
Commands for managing dashboards
Monitoring cluster performance
What objects, instances, and counters are
Decisions to make before you view performance data
Viewing performance data for a time period
Viewing continuously updated performance data
Commands for monitoring cluster performance
Displaying environmental information
Managing system performance
Managing workload performance by using Storage QoS
How Storage QoS works
How the maximum throughput limit works
How throttling a workload can affect non-throttled workload requests from the same client
Rules for assigning storage objects to policy groups
How to monitor workload performance when using Storage QoS
Supported number of Storage QoS policy groups and workloads
Controlling and monitoring workload performance
Example: Isolating a workload
Example: Proactively setting a limit on non-critical workloads
Example: Proactively setting a limit on workloads in a shared storage infrastructure
Commands for controlling and monitoring workloads
Increasing WAFL cache memory
How Flash Pool aggregates and Flash Cache compare
Enabling and disabling WAFL external cache
Caching normal user data blocks
Caching low-priority user data blocks
Caching only system metadata
Displaying the WAFL external cache configuration
Displaying usage and access information for WAFL external cache
Preserving the cache in the Flash Cache family of modules
How cache rewarming works
Events that initiate cache rewarming
Events that do not initiate cache rewarming
Events that abort cache rewarming
Enabling and disabling cache rewarming
Improving read performance
What read reallocation is
Commands for managing read reallocation
Improving write performance
How free space reallocation optimizes free space
When to enable free space reallocation
When to use free space reallocation with other reallocation features
Types of aggregates that free space reallocation can and cannot optimize
Commands for managing free space reallocation
Managing peer relationships for data backup and recovery
Managing cluster peer relationships
What a cluster peer is
Connecting one cluster to another cluster in a peer relationship
Cluster peer network topologies
What cluster peer intercluster networking is
Cluster peer intercluster networking requirements
Considerations when sharing data ports
Considerations when using dedicated ports
Configuring intercluster LIFs to share data ports
Configuring intercluster LIFs to use dedicated intercluster ports
Creating the cluster peer relationship
Displaying a cluster peer relationship
Modifying a cluster peer relationship
Deleting a cluster peering relationship
Managing jobs on another cluster
Viewing jobs on another cluster
Monitoring progress of a job on another cluster
Pausing jobs on another cluster
Resuming jobs on another cluster
Stopping a job on another cluster
Deleting a job on another cluster
Managing SVM peer relationships
What an SVM peer relationship is
States of SVM peer relationships
Creating an SVM peer relationship
Creating an intercluster SVM peer relationship
Creating an intracluster SVM peer relationship
Accepting an SVM peer relationship
Rejecting an SVM peer relationship
Modifying an SVM peer relationship
Deleting an SVM peer relationship
Suspending an SVM peer relationship
Resuming an SVM peer relationship
Displaying information about SVM peer relationships
Glossary
Copyright information
Trademark information
How to send your comments