“NCSA - Hybrid Cloud: NS0-146” Exam Cram Notes

1) Storage Fundamentals

A StorageGrid is a good solution to ensure scalability.

Four factors that measure the performance of a storage system:
- Throughput
- Capacity
- Reliability
- Response time

Three factors that contribute to a cost-effective storage solution:
- High reliability
- Simple management
- High availability

Private cloud refers to cloud infrastructure and services that are maintained on a private network and operated solely for a single organization, whether managed internally or by a third-party. Private clouds offer the greatest level of security and control, but they require the company to purchase and maintain all the software and infrastructure. A private cloud is the best choice for organizations that:
- Rely heavily on their own data and applications
- Have a restricted data security and privacy requirement
- Can run a next-generation cloud data center efficiently and effectively on their own

A cloud is called a “public cloud” when the services and infrastructure are rendered off-site over the internet and are open for public use. Public clouds offer the greatest level of efficiency in shared resources. With public cloud services, users don’t need to purchase hardware, software, or supporting infrastructure because these resources are owned and managed by providers. However, public clouds are more vulnerable than private clouds in terms of security and reliability.

A hybrid cloud includes a variety of public and private options, with multiple providers offering the benefits of multiple deployment models. Users can keep each aspect of their business in the most efficient environment possible by spreading things out over the hybrid cloud’s options. The difficulty is that users have to keep track of multiple different security platforms and ensure that all aspects of their business can communicate with each other. A hybrid cloud can be the best choice for organizations that offer services that are tailored for different vertical markets, because the business can use a public cloud to interact with the client but keep their own data secured within a private cloud.

A small business runs the entire business using 10 desktop computers that run applications such as Microsoft Outlook, Word, Excel, PowerPoint, and Access. These computers and employees are located in the same office. The employees need to communicate via email and share files over the local workgroup. They don’t expect rapid data growth because they have to permanently delete their work files in a regular basis. The storage technology that is the best choice for this business:
- DAS

ABC is a storage provider that provides file-based storage services to multiple clients. The storage technology that is the best choice for this business:
- NAS

SAN provides block-level storage!

XYZ is an organization whose business heavily relies on their own data and applications. They have a restricted data security and privacy requirement. They have the ability to run a next-generation cloud data center efficiently and effectively on its own. The type of cloud deployment model that is the best choice for XYZ:
- Private cloud

2) Cloud Fundamentals

Cloud is not a clearly defined technology delivery mechanism!

NOT a consideration with cloud:
- Limited choice

Considerations with cloud:
- Performance
- Compliance
- Privacy
- Security and risk

IT as a Service (ITaaS) is an operational and organizational shift to running IT like a business and optimizing IT production for business consumption.

3) Flash Fundamentals

Write Amplification = Characteristic of flash memory, where a single write on the host results in multiple writes to the flash medium over time.
Garbage Collection = Identifies block erase candidates through monitoring page active and inactive states and monitoring cold data pages.
Wear-Leveling = Evenly distributes page write and block erase operations over the flash memory chips in a device.
Flash Translation Layer = Presents the flash device to the host OS as a logical block device.

The three major components of enterprise flash devices are:
- Flash memory
- DRAM
- Flash controller

Flash storage wear life is measured in:
- Device Writes Per Day (DWPD)
- Total Bytes Written (TBW)
- Program/Erase (P/E) Cycles

Two functions of the Flash Translation Layer:
- Managing component wear
- Mapping pages to logical blocks

4) ONTAP NAS Fundamentals

NAS = Provides file-level access to data on a storage system
SAN = Provides block-level access to data on a storage system
CIFS = Is a distributed file system that uses shares
NFS = Is a distributed file system that uses exports
Namespace = Is a logical grouping of volumes
SVM root volume = Provides an entry point to the namespace
Data volume = Is a logical container for client files

Q: A volume that is connected through a junction to the SVM root volume is on the first node of a four-node cluster. An NFS client accesses the volume through a LIF on the first node. What must be done to ensure client access if the volume is moved to the fourth node?
A: No action is required!

Image: NFS File Access: Name Services:
 
Image: UNIX File Permissions (example)
 
Three values that are valid for NFS client identifiers:
- host name
- IP address
- domain

Q: Which security type do you use to enable an anonymous user to access a volume?
A: none

Q: Why might a system administrator be unable to see the c$ share in File Explorer?
A: c$ is a hidden share

Q: Which share-permission level is default for the Everyone group?
A: Read

5) Technical Overview of AltaVault Technology

AltaVault Use Cases for Backup and Archive
Image: AltaVault Use Cases for Backup and Archive
 
AltaVault Use Cases for Disaster Recovery
Image: AltaVault Use Cases for Disaster Recovery
 
Key Processes:
Encoder = processes writes from a backup application to the AltaVault appliance
Decoder = processes reads from the AltaVault appliance to a backup application
Replicator = replicates to the cloud-storage target any write that is made to the AltaVault cache
Evictor = evicts localized slab data, based on least recently used (LRU) list or early eviction list, if enabled on specific shares
Garbage collector = deletes and reclaims space from the appliance cache and the cloud, upon user request

Key Data Structures:
Shell file = corresponds to the file-namespace entry that AltaVault receives
Data segment = is a segment of data that can vary in length
Slab = contains the data segments that represent the received files. Slabs are compressed and encrypted.
Labelmap = maps a file to the slabs that contain the data segments of the source file
Metadata = includes the access control list (ACL) and additional related data
Hash table = contains the deduplication information for all data segments that the AltaVault appliance manages

6) Technical Overview of OnCommand Management Solutions for Clustered Data ONTAP

Monitoring and Managing Storage Objects

Image: OnCommand Management Portfolio Details
 
Image: Example of Managing Annotation Rules in OnCommand Unified Manager
 
You can customize any standard OCUM report to meet your requirements.
Use the Eclipse Business Intelligence and Reporting Tools (or BIRT project - BIRT designer) to create reports and then import (see the OCUM manual.)

The storage administrator user has the privilege to import reports into the Unified Manager server.

Takeaways:
- The dashboard consists of two areas: the Quick Takes area and the Unresolved Incidents and Risks area.
- The annotation feature in Unified Manager helps to group the storage objects and associate metadata with them.
- When you apply global thresholds to objects, the default values of the objects are modified. However, global threshold modifications do no override changes to thresholds that are made at the object level.
- You can monitor the details of a storage object by clicking the Storage tab and navigating to the storage object.
- Reports are categorized as capacity utilization, operational, and inventory. You can customize any standard reports to meet your requirements.
- Reports that are created using the BIRT designer can be imported into Unified Manager.

Monitoring and Managing Protection Relationship Objects

Takeaways:
- When you pair Unified Manager and Workflow Automation, you can run protection jobs from Unified Manager.
- You can create a SnapMirror or SnapVault relationship for multiple volumes only if the volumes belong to the same cluster and the same SVM.
- You can perform up to 10 protection jobs simultaneously without any performance impact.
- You cannot restore data from more than one volume at a time.

Monitoring and Managing Performance Incidents

This statement correctly describes the time when an incident is generated:
Time is based on the time zone of the system on which you launched Performance Manager.

Automating Tasks with Workflow Automation

Image: Types of User Inputs
 
Section Assessment

Q: Ken is a storage administrator who is trying to modify a workflow to suit his organization’s requirements, but he is unable to modify an existing workflow. He tries to create a new workflow, but the system doesn’t allow him to do so. What does Ken need to do?
A: He should be assigned an architect role if he has to modify or create a new workflow.

Three roles in Workflow Automation that have permission to execute a workflow:
- Operator
- Administrator
- Architect

Q: Which functionality enables you to design a workflow in which the operator can decide how many volumes to create?
A: Repeat row functionality with dynamic number of iterations.

Q: Workflow Automation users can run workflows from external portals and from data center orchestration software?
A: True

Q: Which input type should a storage architect use to enable the workflow user to select an entry from a drop-down list?
A: Query

Two categories of information which are displayed on the volume details page:
- Protection details, annotation details, and events
- Capacity, storage efficiency details, configuration details

OnCommand System Manager is bundled with ONTAP 8.3 and enables direct management of NetApp storage systems at the device level.

The Filters Pane in Unified Manager enables you to set filters and customize the way information is displayed.

Q: As a storage administrator, you have edited the thresholds for some critical volumes. Then you edit the thresholds for all of the other volumes so they do not reflect the default threshold value and the configured global threshold. What is the impact of your changes on the critical volumes that have a different threshold?
A: There is no impact of the thresholds of the critical volumes

Q: Which Unified Manager page displays the MetroCluster configurations and replications in your environment?
A: Cluster details page

The following condition must exist to enable you to create a SnapMirror or SnapVault relationship for multiple volumes from the Volumes page:
- Volumes must belong to the same cluster and SVM

The following user can import reports into the Unified Manager server:
- Storage Administrator

Number if protection jobs you can simultaneously carry out without any performance impact = 10

Performance Manager uses the term shark for a user-defined workload with the highest usage of a cluster component compared to all workloads involved in an incident.

Three cluster components involved in the performance incidents that Performance Manager categorizes:
- network
- policy groups
- aggregates

A user-defined workload can be a victim, a bully, and a shark at the same time? True!

On the incident page you can access the suggested actions for a particular incident.

7) Technical Overview of OnCommand Insight

Image: Insight Product Suite
 
Image: Insight 7.1 Architecture and Workflow
 
Knowledge Bytes: NetApp Private Storage for Amazon Web Services

See here for more information:

OnCommand Cloud Manager and Cloud ONTAP Videos

See here for more information:

NCSA Hybrid Cloud Practice Exam

The following statement describes wear-leveling:
- Wear-leveling evenly distributes page writes and block erase operations over the flash memory chips in a device.

Three major components of enterprise flash devices:
- Flash controller
- DRAM
- Flash memory

Three advantages of NAS:
- It provides a high-speed, shared network between clients and storage servers
- The file services can be extended to hundreds of devices
- Clients running different operating systems can share the same files

The primary advantage of using SAN, rather than DAS or NAS:
- SAN provides direct access to large blocks of data

Q: In SAN, how does a LUN appear to a host operating system?
A: As a local hard disk

Q: Which Microsoft file-sharing protocol enables networked computers to share files?
A: SMB

Q: What maintains a history of connection activities in SMB?
A: The client and the server

Q: What is a characteristic of DAS?
A: The storage must be located in close proximity to the server

Q: Regarding system high availability, what is the reference used to determine reliability?
A: The number of nines; for example, five nines (99.999)...

iSCSI natively enables block-level access by a host to disk storage using a standard LAN.

Connectivity types associated with block-level access:
SAN and DAS

Two challenges applicable to virtualized environments:
- Increased data protection requirements
- Increased backup complexity

Three benefits to be realized through server virtualization:
- decreased operating cost
- faster implementation of new applications
- lower management cost

Q: What is server virtualization?
A: Server virtualization is an abstraction layer that decouples the physical hardware from the operating system to deliver higher IT utilization and flexibility.

Which NetApp technology optimizes a virtualized infrastructure? ASIS

Q: Cloud services are delivered consistently and they are available and accessible through standard and heterogeneous platforms. This is a description of which Cloud characteristic?
A: Broad-Accessibility

Q: Cloud consumers can provision and manage servers, systems and resources through a single portal or developer API. There is also an on-demand component which indicates that resources are always available to the customer. This is a description of which Cloud characteristic?
A: Self-Service

Q: Cloud resources are built specifically for an entity (group, organization, or company). Infrastructure can be hosted internally or externally and also managed internally or by a third party. Which Cloud deployment model is this?
A: Private

An advantage of server virtualization from a maintenance perspective:
- Virtual machines can be non-disruptively relocated to more powerful platforms, if required

Q: Which flash deployment is ideal for shared infrastructures?
A: Hybrid array

Q: Which flash deployment is ideal for environments that need extreme database performance?
A: All-flash array

Q: Your manager hands you an HBA adapter card for your ONTAP storage controller and tells you to install and configure the card. In this scenario which protocol would you use for this task?
A: FC

TRUE: An SVM can have multiple volumes.
FALSE: An SVM lives on one node in a cluster.

A Data Logical Interface (Data LIF) will transport CIFS requests between a CIFS client and ONTAP storage.

The epsilon flag provides tie-breaking if a node fails.

Advanced Drive Partitioning (ADP) allows for more efficient use of entry-level systems.

Q: In a NAS environment, what does NetApp recommend should be created to protect the SVM root volume?
A: A load-sharing mirror copy of the SVM root volume.

Q: Where would you create an export policy?
A: In an SVM.

Q: What would be another name for “asymmetrical logical unit access” (ALUA)?
A: Target port group support (TPGS)

iSCSI node names have the following two forms:
- IQN
- EUI

Q: A customer is setting up an AltaVault appliance with a backup application. The customer wants to know which protocols would be used when the backup application interacts with the AltaVault appliance.
A: SMB and NFS

Q: A customer is setting up an AltaVault appliance with a backup application running on Linux. The customer wants to know which protocols would be used when the backup application interacts with the AltaVault appliance.
A: NFS

What are two optional nodes in StorageGRID Webscale?
- Archive node
- API Gateway node

Q: A “volume nearly full alert” is sent for a volume. Upon investigation, it is noted that the threshold for the event is set at only 60%. After the threshold is changed to 95%, what happens to the alert that was generated?
A: The event is made obsolete.

Q: You have set up your new FAS system and you want to manage your storage from a GUI interface. Which OnCommand tool is bundled with ONTAP that will satisfy this request?
A: OnCommand System Manager

Q: Which node level command would you use to display complete hardware information of a NetApp storage controller and each installed expansion adapter?
A: sysconfig -v

Q: How is a FlexClone volume different than a snapshot?
A: A FlexClone volume is a writeable copy of a parent volume while a snapshot is read-only.

Q: You must display the configured interfaces on a clustered storage system. Which command would you use to accomplish this task?
A: network interface show

Q: There are 16 SAS disks available for creating the aggregate; you use 14 disks to create a RAID-DP aggregate. The RAID group size is 8 disks in a RAID group. Which statement is true?
A: You create 2 RAID groups, one containing 8 disks and other containing 6 disks.

When you create UNIX security style volumes:
- A CIFS client requires a name mapping
- ONTAP automatically assigns the default export policy to the new volume

Q: You are transitioning user-data storage to cloud-based storage because all of your organization’s remote data centers are being decommissioned to reduce costs. In this scenario, what would you use for storage?
A: Data that is stored remotely on an infrastructure hosted by another organization.

Q: A storage administrator creates two volumes, vol1 located in aggr1 and vol2 located in aggr2. Junction paths for both of them are /vol1 and /vol2. The administrator performs a “volume move” operation and moved vol1 from aggr1 to aggr2. Which statement is true?
A: The junction path does not change for vol1 and vol2.

Q: Consider three volumes eng_projects, hr_projects and vol1; their corresponding junction paths are as follows: /svm/eng_projects, /svm/hr_projects and /svm/eng_projects/vol1. From a Linux machine, when you mount root volume svm and run cd /mnt/svm and ls on this directory, which subdirectories would you expect to see?
A: eng_projects and hr_projects.

Q: Which statement describes the replicator process on an AltaVault appliance?
A: The replicator process on an AltaVault appliance replicates to the cloud-storage target any write that is made to the AltaVault appliance cache.

Q: Which statement describes the evictor process?
A: The evictor process evicts localized slab data, based on the least recently used (LRU) list or the early eviction list.

Q: Which statement describes the garbage collection process on an AltaVault appliance?
A: The garbage collection process on an AltaVault appliance deletes and reclaims space from the appliance cache and the cloud.

Q: What is ONTAP cloud?
A: Virtualized storage.

Q: Which deployment and administration tool would be used for ONTAP Cloud?
A: OnCommand Cloud Manager

Two features supported in ONTAP cloud?
- OnCommand System Manager
- SnapMirror

Q: You are the administrator for ONTAP Cloud. One of your users has changed the admin password for one of the ONTAP Cloud instances. How would you recover or reset the password?
A: Log in to the OnCommand Cloud Manager console and reset the user password.

Comments