1) Storage Fundamentals
A StorageGrid
is a good solution to ensure scalability.
Four factors that measure the performance of a storage
system:
- Throughput
- Capacity
- Reliability
- Response time
Three factors that contribute to a cost-effective storage
solution:
- High reliability
- Simple
management
- High
availability
Private cloud
refers to cloud infrastructure and services that are maintained on a private
network and operated solely for a single organization, whether managed
internally or by a third-party. Private clouds offer the greatest level of
security and control, but they require the company to purchase and maintain all
the software and infrastructure. A private cloud is the best choice for
organizations that:
- Rely heavily on
their own data and applications
- Have a
restricted data security and privacy requirement
- Can run a
next-generation cloud data center efficiently and effectively on their own
A cloud is called a “public
cloud” when the services and infrastructure are rendered off-site over the
internet and are open for public use. Public clouds offer the greatest level of
efficiency in shared resources. With public cloud services, users don’t need to
purchase hardware, software, or supporting infrastructure because these
resources are owned and managed by providers. However, public clouds are more
vulnerable than private clouds in terms of security and reliability.
A hybrid cloud includes
a variety of public and private options, with multiple providers offering the
benefits of multiple deployment models. Users can keep each aspect of their
business in the most efficient environment possible by spreading things out
over the hybrid cloud’s options. The difficulty is that users have to keep
track of multiple different security platforms and ensure that all aspects of
their business can communicate with each other. A hybrid cloud can be the best
choice for organizations that offer services that are tailored for different
vertical markets, because the business can use a public cloud to interact with
the client but keep their own data secured within a private cloud.
A small business runs the entire business using 10
desktop computers that run applications such as Microsoft Outlook, Word, Excel,
PowerPoint, and Access. These computers and employees are located in the same
office. The employees need to communicate via email and share files over the
local workgroup. They don’t expect rapid data growth because they have to
permanently delete their work files in a regular basis. The storage technology
that is the best choice for this business:
- DAS
ABC is a storage provider that provides file-based
storage services to multiple clients. The storage technology that is the best
choice for this business:
- NAS
SAN provides block-level storage!
XYZ is an organization whose business heavily relies on
their own data and applications. They have a restricted data security and
privacy requirement. They have the ability to run a next-generation cloud data
center efficiently and effectively on its own. The type of cloud deployment
model that is the best choice for XYZ:
- Private cloud
2) Cloud Fundamentals
Cloud is not
a clearly defined technology delivery mechanism!
NOT a
consideration with cloud:
- Limited choice
Considerations with cloud:
- Performance
- Compliance
- Privacy
- Security and
risk
IT as a Service (ITaaS) is an operational and
organizational shift to running IT like a business and optimizing IT production
for business consumption.
3) Flash Fundamentals
Write Amplification
= Characteristic of flash memory, where a single write on the host results in
multiple writes to the flash medium over time.
Garbage Collection
= Identifies block erase candidates through monitoring page active and inactive
states and monitoring cold data pages.
Wear-Leveling
= Evenly distributes page write and block erase operations over the flash
memory chips in a device.
Flash Translation
Layer = Presents the flash device to the host OS as a logical block device.
The three major components of enterprise flash devices
are:
- Flash memory
- DRAM
- Flash controller
Flash storage wear life is measured in:
- Device Writes
Per Day (DWPD)
- Total Bytes
Written (TBW)
- Program/Erase
(P/E) Cycles
Two functions of the Flash
Translation Layer:
- Managing component wear
- Mapping pages to logical blocks
4) ONTAP NAS Fundamentals
NAS = Provides
file-level access to data on a storage system
SAN = Provides
block-level access to data on a storage system
CIFS = Is a
distributed file system that uses shares
NFS = Is a
distributed file system that uses exports
Namespace = Is
a logical grouping of volumes
SVM root volume
= Provides an entry point to the namespace
Data volume =
Is a logical container for client files
Q: A volume that is connected through a junction to the
SVM root volume is on the first node of a four-node cluster. An NFS client
accesses the volume through a LIF on the first node. What must be done to
ensure client access if the volume is moved to the fourth node?
A: No action is required!
Image: NFS File
Access: Name Services:
Image: UNIX File
Permissions (example)
Three values that are valid for NFS client identifiers:
- host name
- IP address
- domain
Q: Which security type do you use to enable an anonymous
user to access a volume?
A: none
Q: Why might a system administrator be unable to see the
c$ share in File Explorer?
A: c$ is a hidden share
Q: Which share-permission level is default for the
Everyone group?
A: Read
5) Technical Overview of AltaVault Technology
AltaVault Use
Cases for Backup and Archive
Image: AltaVault
Use Cases for Backup and Archive
AltaVault Use
Cases for Disaster Recovery
Image: AltaVault
Use Cases for Disaster Recovery
Key Processes:
Encoder =
processes writes from a backup application to the AltaVault appliance
Decoder =
processes reads from the AltaVault appliance to a backup application
Replicator =
replicates to the cloud-storage target any write that is made to the AltaVault
cache
Evictor =
evicts localized slab data, based on least recently used (LRU) list or early
eviction list, if enabled on specific shares
Garbage collector
= deletes and reclaims space from the appliance cache and the cloud, upon user
request
Key Data
Structures:
Shell file =
corresponds to the file-namespace entry that AltaVault receives
Data segment =
is a segment of data that can vary in length
Slab =
contains the data segments that represent the received files. Slabs are
compressed and encrypted.
Labelmap =
maps a file to the slabs that contain the data segments of the source file
Metadata =
includes the access control list (ACL) and additional related data
Hash table =
contains the deduplication information for all data segments that the AltaVault
appliance manages
6) Technical Overview of OnCommand Management
Solutions for Clustered Data ONTAP
Monitoring and
Managing Storage Objects
Image: OnCommand
Management Portfolio Details
Image: Example of
Managing Annotation Rules in OnCommand Unified Manager
You can customize any standard OCUM report to meet your
requirements.
Use the Eclipse
Business Intelligence and Reporting Tools (or BIRT project - BIRT designer)
to create reports and then import (see the OCUM manual.)
The storage
administrator user has the privilege to import reports into the Unified
Manager server.
Takeaways:
- The dashboard consists of two areas: the Quick Takes
area and the Unresolved Incidents and Risks area.
- The annotation feature in Unified Manager helps to
group the storage objects and associate metadata with them.
- When you apply global thresholds to objects, the
default values of the objects are modified. However, global threshold
modifications do no override changes to thresholds that are made at the object
level.
- You can monitor the details of a storage object by
clicking the Storage tab and navigating to the storage object.
- Reports are categorized as capacity utilization,
operational, and inventory. You can customize any standard reports to meet your
requirements.
- Reports that are created using the BIRT designer can be
imported into Unified Manager.
Monitoring and
Managing Protection Relationship Objects
Takeaways:
- When you pair Unified Manager and Workflow Automation,
you can run protection jobs from Unified Manager.
- You can create a SnapMirror or SnapVault relationship
for multiple volumes only if the volumes belong to the same cluster and the
same SVM.
- You can perform up to 10 protection jobs simultaneously
without any performance impact.
- You cannot restore data from more than one volume at a
time.
Monitoring and
Managing Performance Incidents
This statement correctly describes the time when an
incident is generated:
Time is based on
the time zone of the system on which you launched Performance Manager.
Automating
Tasks with Workflow Automation
Image: Types of
User Inputs
Section
Assessment
Q: Ken is a storage administrator who is trying to modify
a workflow to suit his organization’s requirements, but he is unable to modify
an existing workflow. He tries to create a new workflow, but the system doesn’t
allow him to do so. What does Ken need to do?
A: He should be assigned an architect role if he has to modify or create a new workflow.
Three roles in Workflow Automation that have permission
to execute a workflow:
- Operator
- Administrator
- Architect
Q: Which functionality enables you to design a workflow
in which the operator can decide how many volumes to create?
A: Repeat row
functionality with dynamic number of iterations.
Q: Workflow Automation users can run workflows from
external portals and from data center orchestration software?
A: True
Q: Which input type should a storage architect use to
enable the workflow user to select an entry from a drop-down list?
A: Query
Two categories of information which are displayed on the
volume details page:
- Protection details, annotation details, and events
- Capacity, storage efficiency details, configuration
details
OnCommand System
Manager is bundled with ONTAP 8.3 and enables direct management of NetApp
storage systems at the device level.
The Filters Pane
in Unified Manager enables you to set filters and customize the way information
is displayed.
Q: As a storage administrator, you have edited the
thresholds for some critical volumes. Then you edit the thresholds for all of
the other volumes so they do not reflect the default threshold value and the
configured global threshold. What is the impact of your changes on the critical
volumes that have a different threshold?
A: There is no impact of the thresholds of the critical
volumes
Q: Which Unified Manager page displays the MetroCluster
configurations and replications in your environment?
A: Cluster details page
The following condition must exist to enable you to
create a SnapMirror or SnapVault relationship for multiple volumes from the
Volumes page:
- Volumes must belong to the same cluster and SVM
The following user can import reports into the Unified
Manager server:
- Storage
Administrator
Number if protection jobs you can simultaneously carry
out without any performance impact = 10
Performance Manager uses the term shark for a user-defined workload with the highest usage of a
cluster component compared to all workloads involved in an incident.
Three cluster components involved in the performance
incidents that Performance Manager categorizes:
- network
- policy groups
- aggregates
A user-defined workload can be a victim, a bully, and a
shark at the same time? True!
On the incident
page you can access the suggested actions for a particular incident.
7) Technical Overview of OnCommand Insight
Image: Insight
Product Suite
Image: Insight 7.1
Architecture and Workflow
Knowledge Bytes: NetApp Private Storage for Amazon Web
Services
See here for more information:
OnCommand Cloud Manager and Cloud ONTAP Videos
See here for more information:
NCSA Hybrid Cloud Practice Exam
The following statement describes wear-leveling:
- Wear-leveling evenly distributes page writes and block
erase operations over the flash memory chips in a device.
Three major components of enterprise flash devices:
- Flash controller
- DRAM
- Flash memory
Three advantages of NAS:
- It provides a
high-speed, shared network between clients and storage servers
- The file
services can be extended to hundreds of devices
- Clients running
different operating systems can share the same files
The primary advantage of using SAN, rather than DAS or
NAS:
- SAN provides
direct access to large blocks of data
Q: In SAN, how does a LUN appear to a host operating
system?
A: As a local hard
disk
Q: Which Microsoft file-sharing protocol enables networked
computers to share files?
A: SMB
Q: What maintains a history of connection activities in
SMB?
A: The client and
the server
Q: What is a characteristic of DAS?
A: The storage must be located in close proximity to the
server
Q: Regarding system high availability, what is the
reference used to determine reliability?
A: The number of nines; for example, five nines (99.999)...
iSCSI natively
enables block-level access by a host to disk storage using a standard LAN.
Connectivity types associated with block-level access:
SAN and DAS
Two challenges applicable to virtualized environments:
- Increased data
protection requirements
- Increased backup
complexity
Three benefits to be realized through server
virtualization:
- decreased
operating cost
- faster
implementation of new applications
- lower management
cost
Q: What is server virtualization?
A: Server virtualization is an abstraction layer that
decouples the physical hardware from the operating system to deliver higher IT
utilization and flexibility.
Which NetApp technology optimizes a virtualized
infrastructure? ASIS
Q: Cloud services are delivered consistently and they are
available and accessible through standard and heterogeneous platforms. This is
a description of which Cloud characteristic?
A: Broad-Accessibility
Q: Cloud consumers can provision and manage servers,
systems and resources through a single portal or developer API. There is also
an on-demand component which indicates that resources are always available to
the customer. This is a description of which Cloud characteristic?
A: Self-Service
Q: Cloud resources are built specifically for an entity
(group, organization, or company). Infrastructure can be hosted internally or
externally and also managed internally or by a third party. Which Cloud
deployment model is this?
A: Private
An advantage of server virtualization from a maintenance
perspective:
- Virtual machines can be non-disruptively relocated to
more powerful platforms, if required
Q: Which flash deployment is ideal for shared infrastructures?
A: Hybrid array
Q: Which flash deployment is ideal for environments that
need extreme database performance?
A: All-flash array
Q: Your manager hands you an HBA adapter card for your
ONTAP storage controller and tells you to install and configure the card. In
this scenario which protocol would you use for this task?
A: FC
TRUE: An SVM can have multiple volumes.
FALSE: An SVM lives on one node in a cluster.
A Data Logical Interface (Data LIF) will transport CIFS
requests between a CIFS client and ONTAP storage.
The epsilon flag
provides tie-breaking if a node fails.
Advanced Drive Partitioning (ADP) allows for more
efficient use of entry-level systems.
Q: In a NAS environment, what does NetApp recommend
should be created to protect the SVM root volume?
A: A load-sharing
mirror copy of the SVM root volume.
Q: Where would you create an export policy?
A: In an SVM.
Q: What would be another name for “asymmetrical logical
unit access” (ALUA)?
A: Target port
group support (TPGS)
iSCSI node names have the following two forms:
- IQN
- EUI
Q: A customer is setting up an AltaVault appliance with a
backup application. The customer wants to know which protocols would be used
when the backup application interacts with the AltaVault appliance.
A: SMB and NFS
Q: A customer is setting up an AltaVault appliance with a
backup application running on Linux. The customer wants to know which
protocols would be used when the backup application interacts with the
AltaVault appliance.
A: NFS
What are two optional nodes in StorageGRID Webscale?
- Archive node
- API Gateway node
Q: A “volume nearly full alert” is sent for a volume.
Upon investigation, it is noted that the threshold for the event is set at only
60%. After the threshold is changed to 95%, what happens to the alert that was
generated?
A: The event is made
obsolete.
Q: You have set up your new FAS system and you want to
manage your storage from a GUI interface. Which OnCommand tool is bundled with
ONTAP that will satisfy this request?
A: OnCommand System Manager
Q: Which node level command would you use to display
complete hardware information of a NetApp storage controller and each installed
expansion adapter?
A: sysconfig -v
Q: How is a FlexClone volume different than a snapshot?
A: A FlexClone volume is a writeable copy of a parent
volume while a snapshot is read-only.
Q: You must display the configured interfaces on a
clustered storage system. Which command would you use to accomplish this task?
A: network interface show
Q: There are 16 SAS disks available for creating the
aggregate; you use 14 disks to create a RAID-DP aggregate. The RAID group size
is 8 disks in a RAID group. Which statement is true?
A: You create 2 RAID groups, one containing 8 disks and
other containing 6 disks.
When you create UNIX security style volumes:
- A CIFS client requires a name mapping
- ONTAP automatically assigns the default export policy
to the new volume
Q: You are transitioning user-data storage to cloud-based
storage because all of your organization’s remote data centers are being
decommissioned to reduce costs. In this scenario, what would you use for
storage?
A: Data that is stored remotely on an infrastructure hosted
by another organization.
Q: A storage administrator creates two volumes, vol1
located in aggr1 and vol2 located in aggr2. Junction paths for both of them are
/vol1 and /vol2. The administrator performs a “volume move” operation and moved
vol1 from aggr1 to aggr2. Which statement is true?
A: The junction path does not change for vol1 and vol2.
Q: Consider three volumes eng_projects, hr_projects and
vol1; their corresponding junction paths are as follows: /svm/eng_projects, /svm/hr_projects
and /svm/eng_projects/vol1. From a
Linux machine, when you mount root volume svm and run cd /mnt/svm and ls on this directory, which
subdirectories would you expect to see?
A: eng_projects and hr_projects.
Q: Which statement describes the replicator process on an
AltaVault appliance?
A: The replicator process on an AltaVault appliance
replicates to the cloud-storage target any write that is made to the AltaVault
appliance cache.
Q: Which statement describes the evictor process?
A: The evictor process evicts localized slab data, based on
the least recently used (LRU) list or the early eviction list.
Q: Which statement describes the garbage collection
process on an AltaVault appliance?
A: The garbage collection process on an AltaVault
appliance deletes and reclaims space from the appliance cache and the cloud.
Q: What is ONTAP cloud?
A: Virtualized storage.
Q: Which deployment and administration tool would be used
for ONTAP Cloud?
A: OnCommand Cloud Manager
Two features supported in ONTAP cloud?
- OnCommand System Manager
- SnapMirror
Q: You are the administrator for ONTAP Cloud. One of your
users has changed the admin password for one of the ONTAP Cloud instances. How
would you recover or reset the password?
A: Log in to the OnCommand Cloud Manager console and
reset the user password.
Comments
Post a Comment