NetApp Cloud Insights Best Practice: Part 2 of 2: Observability and more

Carrying on from the previous post, with a slightly different format (the Part 1 format would demand more time which I don't have). Here taking section headings from the Cloud Insights documentation (netapp.com) and looking for Best Practices / Recommendations / Suggestions.

Observability
  • Creating Dashboards
    • Dashboard Best Practices
      • Best practice: Use the search feature in fields such as Filter by or places like the column selector to find what you are looking for. For example, searching for "cap" will show all metrics with "capacity" in their names, no matter where they occur in the list. You can then easily select the metrics you want from that shorter list.
      • Best practice: If you are filtering for a particular asset type that does not appear in the list, try building your query around an alternate asset type.
  • Working with Queries
    • Querying Assets
    • Querying Logs
  • Insights
    • Overview
      • The Reclaim ONTAP Cold Storage Insight provides data about cold capacity, potential cost/power savings and recommended action items for volumes on ONTAP systems.
    • Shared Resources Under Stress
      • There are a number of steps you can take to reduce or eliminate the chance of saturation in your environment. These are shown by expanding the +Show Recommendations link on the page.
        • Move high-IOPS consumers: Move the "greedy" workloads to less-saturated Storage Pools. It is recommended to assess the tier and capacity of these pools before moving the workloads, to avoid unnecessary costs or additional contentions.
        • Implement a quality of service (QoS) policy.
        • Add additional resources.
    • Kubernetes Namespaces Running Out of Space
      • Q: What can I do if I'm running out of space?
      • A: On the Insight page, click the +Show Recommendations to view possible solutions. The easiest option when running out of space is always to add more capacity, and Cloud Insights shows you the optimal capacity to add to increase time-to-full to a target 60-day prediction. Other recommendations are also shown.
    • Reclaim ONTAP Cold Storage
      • The Reclaim ONTAP Cold Storage Insight provides data about cold capacity, potential cost/power savings and recommended action items for volumes on ONTAP systems.
      • Selecting an Insight from the list opens a page showing more details, including recommendations to move data to the Cloud or cycle down unused disks, as well as estimated cost and power savings you could potentially realize from implementing those recommendations.
      • Recommendations
        • Move unused workloads (zombies) to a lower cost storage tier (HDD)
        • Delete unused workloads
        • Consider NetApp's Fabric Pool Solution
  • Monitors and Alerts
    • Creating Monitors
      • Security Best Practice: Cloud Insights alerts are designed to highlight data points and trends in your environment, and Cloud Insights allows you to enter any valid email address as an alert recipient. If you are working in a secure environment, be especially mindful of who is receiving the notification or otherwise has access to the alert.
    • Viewing and Managing Alerts
    • Configuring Notification Recipients
    • System-Defined Monitors
      • Note: These provide a lot of recommendations.
    • Webhook Notification
  • Working with Annotations
    • Defining Annotations
    • Using Annotations
    • Using Annotations Rules
    • Importing Annotations with API
  • Working with Applications
    • Application Concepts
    • Configuring Applications
  • Automatic Device Resolution
    • Device Resolution Overview
      • After data collector type devices have been configured, best practice is to leverage device resolution rules to help identify the remaining unknown devices in your environment.
    • Device Resolution Rules
    • Fibre Channel Device Resolution
      • Importing Fibre Channel device identification from a .CSV file: As a best practice, it is recommended to first export the Fibre Channel Identify information to a .CSV file, make your desired changes in that file, and then import the file back into Fibre Channel Identify. This ensures that the expected columns are present and in the proper order.
    • IP Device Resolution
      • Importing IP device identification from a .CSV file: As a best practice, it is recommended to first export the IP Address Identify information to a .CSV file, make your desired changes in that file, and then import the file back into IP Address Identify. This ensures that the expected columns are present and in the proper order.
    • Setting Device Resolution Preferences
    • Regular expression examples
  • Asset Page Information
    • Asset Page Overview
    • In-Context Filtering for Objects
    • Summary & Topology Sections
    • Expert View Section
    • User Data Section
    • Related Alerts Section
    • Storage Visualization
    • Hints and Tips to Search for Assets
  • Reporting
    • Reporting Overview
    • Reporting User Roles
    • Using Pre-Defined Reports
    • Storage Manager Dashboard
    • Creating an Example Report
    • Managing Reports
      • Be aware that editing files in their default location runs a risk of those reports being overwritten upon the next report catalog refresh. It is recommended to save the edited report under a new name or store it in a non-default location.
    • Custom Reports
    • Data Models
    • Reporting Database API
    • Data Retention
    • Schema Diagrams
    • Schema Tables
Kubernetes
  • Kubernetes Overview Page
  • Before Installing or Upgrading the Operator
  • Installing the Monitoring Operator
    • Check the time setting on the nodes of the K8S cluster. For accurate audit and data reporting, it is strongly recommended to synchronize the time on the Agent machine using Network Time Protocol (NTP) or Simple Network Time Protocol (SNTP).
  • Monitoring Operator Options
  • Kubernetes Cluster Page
  • Networking Monitoring and Map
    • Workload Labels: If the source is a pod: Recommended lables:
      • frontend, backend, database, cache, queue, kafka
  • Change Analytics

ONTAP Essentials
  • Overview (see image below)
  • Data  Protection
  • Security
    • The Security Dashboard gives you an instant view of your current security situation, showing charts for hardware and software volume encryption, anti-ransomware status, and cluster authentication methods. Security criteria is evaluated based on recommendations defined in the NetApp Security Hardening Guide for ONTAP 9: https://www.netapp.com/pdf.html?item=/media/10674-tr4569.pdf
  • Alerts
  • Infrastructure
  • Networking
  • Workloads


Admin and Other Tasks
  • Working with APIs
    • Your token will only be available for copying to the clipboard and saving during the creation process. Tokens can not be retrieved after they are created, so it is highly recommended to copy the token and save it in a secure location. You will be prompted to click the Copy API Access Token button before you can close the token creation screen.
  • Monitoring your Environment
    • Auditing Events
    • TTL and Downsampling
    • Active IQ

Workload Security
  • About Workload Security
  • Getting Started
  • Alerts
  • Forensics
  • Automated Response Policies
  • Allowed File Types Policies
  • ONTAP Autonomous Ransomware Protection Integration
  • ONTAP Access Denied Integration
  • Blocking User Access
  • Simulated a Ransomware Attack
  • Notifications
  • Workload Security API

Troubleshooting
  • General Troubleshooting
  • Troubleshooting Linux Acquisition Unit Problems
  • Troubleshooting Windows Acquisition Unit Problems
  • Researching Data Collector Errors

Data Collector Support Matrix

Reference & Support
  • Requesting Support
  • Data Collector Reference - Infrastructure
  • Data Collector Reference - Services
  • Object Icon Reference

Comments