Snapdrive for Windows Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

Snapdrive for Windows Administration Guide SnapDrive® 7.1 for Windows® Administration Guide For SAN Environments February 2019 | 215-08797_C0 [email protected] Table of Contents | 3 Contents SnapDrive overview .................................................................................... 10 New in SnapDrive 7.1.5 for Windows ....................................................................... 10 Automated storage provisioning and data management using SnapDrive for Windows .............................................................................................................. 10 List of current SnapDrive for Windows limitations .................................................. 11 Understanding SnapDrive for Windows components ............................................... 11 Understanding the Volume Shadow Copy Service .................................................... 12 Recommendations for using SnapDrive for Windows .............................................. 12 Establishing a connection to the storage system ...................................... 14 Managing iSCSI sessions .......................................................................................... 14 iSCSI Software Initiator node naming requirements .................................... 14 Establishing an iSCSI session to a target ...................................................... 14 Disconnecting an iSCSI target from a Windows host ................................... 16 Disconnecting a session to an iSCSI target ................................................... 16 Examining details of an iSCSI session .......................................................... 17 SnapDrive for Windows support for ESX iSCSI initiators ....................................... 17 ESX limitations ............................................................................................. 17 Enabling storage system HTTP communication with SnapDrive ............................. 18 Using SnapDrive in Microsoft environments ........................................... 19 Understanding Data ONTAP DSM support for Windows MPIO ............................. 19 Support for Microsoft Cluster Shared Volumes ........................................................ 19 Verifying the cluster group owner ................................................................. 19 Changing the cluster group owner ................................................................. 20 Creating LUNs .......................................................................................................... 20 Rules for creating LUNs ............................................................................... 20 What volume mount points are ..................................................................... 21 Creating a dedicated LUN ............................................................................. 21 Creating a shared LUN .................................................................................. 23 Windows Server failover cluster support ...................................................... 24 Configuring a Windows Server failover cluster witness disk ........................ 24 Support for creating disks on a SVM operating in clustered Data ONTAP .................................................................................................... 25 GPT partition support .................................................................................... 26 Configuring SnapDrive for Windows to create LUNs with virtual Fibre Channel .................................................................................................... 26 Managing LUNs ........................................................................................................ 26 How LUNs work ........................................................................................... 26 List of guidelines for connecting LUNs ........................................................ 27 Connecting to a LUN .................................................................................... 27 Making drive letter or path modifications to a LUN ..................................... 28 Guidelines for disconnecting or deleting LUNs ............................................ 29 4 | Administration Guide for SAN Environments Disconnecting a LUN .................................................................................... 29 Deleting a LUN ............................................................................................. 30 Deleting folders within volume mount points ............................................... 31 Guidelines for resizing disks ......................................................................... 31 Resizing a disk .............................................................................................. 32 Requirements for dynamically adding and removing pass-through disks on Hyper-V virtual machines .................................................................. 32 Managing Snapshot copies ........................................................................................ 34 Reasons for creating Snapshot copies ........................................................... 34 Restrictions on Snapshot copy creation ........................................................ 34 Creating a Snapshot copy .............................................................................. 34 Scheduling Snapshot copies .......................................................................... 35 Support for FlexClone volumes .................................................................... 36 Restrictions when working with Snapshot copies ......................................... 37 Connecting to a LUN in a Snapshot copy ..................................................... 37 Data protection through archiving and restoring Snapshot backup copies ... 38 Deleting a Snapshot copy .............................................................................. 41 Managing space on storage system volumes ............................................................. 42 What SnapDrive fractional space reservation monitoring does .................... 42 Configuring space reservation monitoring .................................................... 42 Using the storage access control tool to enable thinly provisioned LUNs .... 43 What Space Reclaimer does .......................................................................... 43 Using SnapDrive in VMware environments ............................................. 47 Supported VMware guest OS platforms ................................................................... 47 VMware ESX server-related limitations ....................................................... 47 Enabling and disabling vCenter or ESX login from SnapDrive for Windows MMC ....................................................................................... 47 Minimum vCenter privileges required for SnapDrive operations ................. 48 Creating LUNs in VMware environments ................................................................ 48 Creating an RDM LUN on a guest OS .......................................................... 49 Using FC RDM LUNs in a Microsoft cluster ............................................... 51 Managing LUNs in VMware environments .............................................................. 52 Connecting to an RDM LUN on a guest OS ................................................. 52 Guideline for managing RDM LUNs not created in SnapDrive ................... 53 Managing Snapshot backups in VMware environments ........................................... 53 Support requirements for performing Snapshot copy operations in VMDKs on NFS and VMFS datastores .................................................. 54 Snapshot copy support limitations on VMDKs ............................................. 54 Troubleshooting VMDKs .............................................................................. 54 Support requirements for space reclamation in VMDK files in NFS datastores ...... 56 Performing SnapVault and SnapMirror operations ............................... 57 Using SnapVault with SnapDrive .............................................................................. 57 Requirements for using SnapVault ................................................................ 57 Initiating SnapVault backup jobs from SnapDrive for Windows .................. 57 SnapVault operations supported in clustered Data ONTAP .......................... 58 Table of Contents | 5 Using SnapMirror with SnapDrive for Windows ...................................................... 58 SnapMirror overview ..................................................................................... 58 Types of SnapMirror replication ................................................................... 59 Requirements for using SnapMirror with SnapDrive for Windows .............. 60 Initiating replication manually ...................................................................... 61 Connecting to a LUN on a mirrored destination volume .............................. 62 Restoring a volume on a SnapMirror destination .......................................... 62 SnapDrive integration with OnCommand Unified Manager Core Package data protection capabilities .......................................................................................... 63 How SnapDrive for Windows integrates with OnCommand Unified Manager Core Package data protection capabilities ...............................
Recommended publications
  • Implementing IBM DB2 9.7 Enterprise Server Edition with Microsoft
    Implementing IBM® DB2® 9.7 Enterprise Server Edition with Microsoft Failover Clustering March 2012 Jeremy Brumer Michelle Chiu Aslam Nomani Lui Tang This document contains proprietary information of IBM. It is provided under a license agreement and is protected by copyright law. The information contained in this publication does not include any product warranties, and any statements provided in this document should not be interpreted as such. © Copyright International Business Machines Corporation 2012. All rights reserved. U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. 2 Notices, trademarks, service marks, and disclaimers IBM, the IBM logo, DB2, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. Microsoft and Windows are trademarks of Microsoft Corporation in the United States, other countries, or both. Other company, product or service names may be the trademarks or service marks of others. The furnishing of this document does not imply giving license to any IBM patents. References in this document to IBM products, Programs, or Services do not imply that IBM intends to make these available in all countries in which IBM operates. 3 Contents Abstract 5 Introduction
    [Show full text]
  • Microsoft Windows Server 2003. Server Clusters: Architecture
    Server Clusters : Architecture Overview For Windows Server 2003 Microsoft Corporation Published: March 2003 Abstract Server clusters are one of two Microsoft® Windows® clustering technologies available for the Microsoft Windows Server family of products. Windows Server 2003 clusters provide failover support for back-end applications and services that require high availability and data integrity. These back-end applications include enterprise applications such as database, file server, enterprise resource planning (ERP), and messaging systems. This white paper focuses on the architecture and features of the cluster service and describes its terminology, concepts, design goals, key components, and planned future directions. Microsoft® Windows® Server 2003 Technical Article The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document.
    [Show full text]
  • Backup Exec 20 - 20.X Software Compatibility List (SCL) Updated on June 15, 2020
    Backup Exec 20 - 20.x Software Compatibility List (SCL) Updated on June 15, 2020 Click here for the HTML version of this document. <https://download.veritas.com/resources/content/live/OSVC/100046000/100046610/en_US/be_20_scl.html> Copyright © 2020 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and Backup Exec are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Backup Exec™ 20 - 20.x SCL 2020-06-15 Introduction This document lists the available operating systems, platforms, and applications specifically supported by Veritas to be compatible with Backup Exec ™ 20. The following guidelines regarding this Software Compatibility List (SCL) should be understood: This release supports both Subscription and Perpetual licensing models. • Veritas support of 3rd party manufacturer products: Veritas will cooperate with 3rd party vendors and attempt to assist in the diagnosis of problems found between the 3rd party products and Veritas products. Veritas Technical Support, for the combination of Veritas and 3rd party products listed in this document, is conditional on the 3rd party product being supported by the original manufacturer or vendor. If the original vendor has ceased providing support for a version of their product, Veritas also will no longer be able to provide support on that product in combination with our products. • Minor update version support: The contents of this document including 3rd party applications, databases, operating systems, in combination with Veritas products represent what has been tested in Veritas labs, or in Veritas-supervised partner labs, but is not intended to be a complete list of supported products and versions.
    [Show full text]
  • EMC Recoverpoint/Cluster Enabler Plug-In Version 4.1 Product Guide Contents
    ® EMC RecoverPoint/Cluster Enabler Plug-in Version 4.1 Product Guide P/N 300-010-474 REV A03 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.EMC.com Copyright © 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up-to-date regulatory document for your product line, go to the Document/Whitepaper Library on EMC Powerlink. For the most up-to-date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. All other trademarks used herein are the property of their respective owners. 2 EMC RecoverPoint/Cluster Enabler Plug-in Version 4.1 Product Guide Contents Chapter 1 About Cluster Enabler Cluster Enabler overview ................................................................ 18 Cluster Enabler plug-in architecture........................................20 Cluster Enabler components.....................................................21 Cluster Enabler Manager interface................................................. 23 The
    [Show full text]
  • Netiq Appmanager for Microsoft Cluster Server Management Guide
    Management Guide NetIQ® AppManager® for Microsoft Cluster Server April 2019 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/. © 2019 NetIQ Corporation. All Rights Reserved. For information about NetIQ trademarks, see https://www.netiq.com/company/legal/. All third-party trademarks are the property of their respective owners. Contents About this Book and the Library 5 About NetIQ Corporation 7 1 Introducing AppManager for Microsoft Cluster Server 9 1.1 Understanding MSCS . 9 1.2 Why Monitor MSCS? . 10 1.3 How AppManager Can Help. 11 2 Installing AppManager for Microsoft Cluster Server 13 2.1 System Requirements . 13 2.2 Installing the Module . 14 2.3 Deploying the Module with Control Center. 15 2.4 Silently Installing the Module . 16 2.5 Permissions for Running MSCS Knowledge Scripts . 17 2.6 Post-installation Considerations. 17 2.7 Discovering Microsoft Cluster Server Resources. 17 2.8 Upgrading Knowledge Script Jobs . 18 3 MSCS Knowledge Scripts 21 3.1 EventLog . 22 3.2 GroupDown . 24 3.3 GroupOwnerChange . 25 3.4 HealthCheck. 26 3.5 NetInterfaceDown . 28 3.6 NetworkDown. 29 3.7 NodeDown . 30 3.8 ResourceDown. 30 3.9 ResourceOwnerChange. 31 A Monitoring Clustered Resources and Applications 33 A.1 Monitoring Clusters with AppManager . 33 A.2 Planning to Monitor Cluster Resources . 33 A.3 Installing on an Active Cluster Node . 34 A.4 Monitoring a Log File on a Shared Cluster Disk. 34 A.5 Monitoring Applications in an Active/Passive Cluster.
    [Show full text]
  • Analysis of Server Clustering Its Uses And
    Maksim Paderin ANALYSIS OF SERVER CLUSTERING ITS USES AND IMPLEMENTATION Bachelor’s thesis Information Technology 2017 Author (authors) Degree Time Maksim Paderin Information December 2017 Technology Title 73 pages Analysis of server clustering, its uses and implementation 0 pages of appendices Commissioned by South-Eastern University of Applied Sciences Supervisor Matti Juutilainen Abstract Clustering became an extremely important networking technology in the latter days. It perfectly coexists with other trending IT technologies and concepts such as virtualization, cloud computing and IoT. The goal of this study is to learn more about clustering as a concept, about co-existing technologies, and about operating systems which could help to form networks, and, specifically, clusters. Another goal of the study is to apply gained knowledge to practice and implement a working cluster. The practical part is targeted on the use of DigitalOcean and Amazon Web Services technologies in synergy with two very different operating systems, Linux and Windows. Keywords clustering, networking, servers, vmware, windows, linux, clouds, virtualization, docker, digitalocean, aws CONTENTS 1 INTRODUCTION .......................................................................................................... 6 2 SERVER CLUSTERING CONCEPTS .......................................................................... 7 2.1 Clusters as technology ........................................................................................... 7 2.2 Cluster roles and architecture
    [Show full text]
  • HP X3000 Network Storage Systems Product Overview
    QuickSpecs HP X3000 Network Storage Systems Product Overview IP-based gateway services for arrays/SANs and highly available shared storage solutions built on industry standards You made the decision to invest in a storage array, but now you've found that you still have file and application servers that aren't connected. So you're still spending time managing islands of storage and your array isn't meeting its full potential. Wouldn't it be nice to complete the consolidation to truly create one unified storage pool to expand and protect? HP X3000 Network Storage Systems boost the value of your array or SAN by adding Windows-powered IP-based gateway services to it. You'll spend less time and effort on maintenance and deliver a better return-on-investment for your array/SAN when you consolidate to a single, unified storage pool that can serve files to your clients and blocks to your servers via multiple protocols (FC/iSCSI or SAS/iSCSI). Industry-standards protect your investment by providing compatibility with your network and applications, and a Microsoft Cluster Server (MSCS) license is included to provide high availability and reduce downtime. What is an X3000 HP X3000 Network Storage Systems are enhanced Windows-powered gateway and shared storage Network Storage System? solutions for your medium business, workgroup, or datacenter environment. They are built on industry- standard HP ProLiant servers and come with the Microsoft® Windows Storage Server 2008 Enterprise operating system -- including cluster services -- pre-installed. They connect via Ethernet and add file, print, iSCSI, and management services to an array or SAN, or they can be used in conjunction with array storage to build an affordable and highly-available unified storage solution.
    [Show full text]
  • SQL Server Failover Effects on Applications Connected to the Cluster
    UNIVERSITY OF ALASKA ANCHORAGE CSCE A470 CAPSTONE PROJECT SQL Server Failover Effects on Applications Connected to the Cluster Author: James A. Tweet Supervisor Prof. Mock, PhD Anchorage AK, May 2016 © Copyright 2016 by James A. Tweet [email protected] Version 5.0 Table of Contents List of Figures ................................................................................................................................. ii Abstract ............................................................................................................................................ i Chapter 1 Introduction .................................................................................................................... 1 1.1 The SQL Server failover cluster ........................................................................................... 1 1.2 ADO.NET, ODBC, JDBC .................................................................................................... 2 1.3 Learning from the past .......................................................................................................... 2 1.4 The Plan ................................................................................................................................ 3 Chapter 2 ......................................................................................................................................... 5 2.1 Technologies ......................................................................................................................... 5 2.2
    [Show full text]
  • Backup Exec 16 Software Compatibility List (SCL) Updated on February 12, 2018
    Backup Exec 16 Software Compatibility List (SCL) Updated on February 12, 2018 Copyright © 2018 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and Backup Exec are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. Backup Exec™16 SCL 2018-02-12 Introduction This document lists the available operating systems, platforms, and applications specifically supported by Veritas to be compatible with Backup Exec ™ 16. The following guidelines regarding this Software Compatibility List (SCL) should be understood: • Veritas support of 3rd party manufacturer products: Veritas will cooperate with 3rd party vendors and attempt to assist in the diagnosis of problems found between the 3rd party products and Veritas products. Veritas Technical Support, for the combination of Veritas and 3rd party products listed in this document, is conditional on the 3rd party product being supported by the original manufacturer or vendor. If the original vendor has ceased providing support for a version of their product, Veritas also will no longer be able to provide support on that product in combination with our products. • Minor update version support: The contents of this document including 3rd party applications, databases, operating systems, in combination with Veritas products represent what has been tested in Veritas labs, or in Veritas-supervised partner labs, but is not intended to be a complete list of supported products and versions. Manufacturers of these products may frequently release minor version updates to their products as maintenance during their product's normal life cycle.
    [Show full text]
  • Oncommand Unified Manager 6.4 Installation and Setup Guide for Microsoft® Windows
    OnCommand® Uni®ed Manager 6.4 Installation and Setup Guide For Microsoft® Windows® February 2016 | 215-10949_A0 [email protected] Table of Contents | 3 Contents Unified Manager installation and setup on Windows ............................... 5 How Unified Manager works with Windows .............................................................. 5 System requirements for Unified Manager ................................................ 6 Installing Unified Manager .......................................................................... 8 Prerequisites for installing Unified Manager .............................................................. 8 Installing Unified Manager on Windows .................................................................. 10 Performing an unattended installation of Unified Manager ...................................... 11 Setting up Unified Manager in a failover clustering environment ......... 13 Requirements for Unified Manager in a failover clustering environment ................. 13 Installing Unified Manager on MSCS ....................................................................... 14 Configuring Unified Manager server with MSCS using configuration scripts ......... 14 Configuring after installation .................................................................... 17 Configuring your environment after initial setup ...................................................... 17 Configuring Unified Manager to send alert notifications .......................................... 17 Configuring notification
    [Show full text]
  • CLUSTER COMPUTING Introduction: a Computer Cluster Is a Group Of
    CLUSTER COMPUTING CLUSTER COMPUTING Introduction: A computer cluster is a group of linked computers, working together closely so that in many respects they form a single computer. The components of a cluster are commonly, but not always, connected to each other through fast local area networks. Clusters are usually deployed to improve performance and/or availability over that of a single computer, while typically being much more cost-effective than single computers of comparable speed or availability. The High Performance Computing (HPC) allows scientists and engineers to deal with very complex problems using fast computer hardware and specialized software. Since often these problems require hundreds or even thousands of processor hours to complete, an approach, based on the use of supercomputers, has been traditionally adopted. Recent tremendous increase in a speed of PC-type computers opens relatively cheap and scalable solution for HPC, using cluster technologies. The conventional MPP (Massively Parallel Processing) supercomputers are oriented on the very high-end of performance. As a result, they are relatively expensive and require special and also expensive maintenance support. Better understanding of applications and algorithms as well as a significant improvement in the communication network technologies and processors speed led to emerging of new class of systems, called clusters of SMP(symmetric multi processor) or networks of workstations (NOW), which are able to compete in performance with MPPs and have excellent price/performance ratios for special applications types. A cluster is a group of independent computers working together as a single system to ensure that mission-critical applications and resources are as highly available as possible.
    [Show full text]
  • Quickspecs RA4100 Hewlett Packard
    RETIRED: Retired products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models. ProLiant Cluster HA/F100 and HA/F200 for QuickSpecs RA4100 Hewlett Packard Overview Models ESA Building Blocks RA4100 (rack) (discontinued) 146013-001 RA4100 Rack to Tower Conversion Kit (discontinued) 154253-B21 RA4000 Redundant Controller (discontinued) 223187-B21 FC-AL Switch 8 (discontinued) 177862-B21 FC-AL Switch 3 Port Expansion Module (discontinued) 177863-B21 FC Switch 8 – EL (discontinued) 176219-B21 Fibre Channel SAN Switch 8-EL – Bundle (discontinued) 253723-001 FC Switch 16 – EL (discontinued) 212776-B21 Fibre Channel SAN Switch 16-EL – Bundle (discontinued) 253740-001 SAN Switch 8 (discontinued) 158222-B21 Fibre Channel SAN Switch/8 (supports Quickloop) – Bundle (discontinued) 253704-001 SAN Switch 16 (discontinued) 158223-B21 Fibre Channel SAN Switch/16 (supports Quickloop) – Bundle (discontinued) 253705-001 Fibre Channel Storage Hub 7 (discontinued) 234453-001 Fibre Channel Storage Hub-7 Rack Mounting Kit (discontinued) 136127-B21 64-bit/66-MHz Fibre Channel Host Adapter 120186-B21 Redundant Host Adapter Failover Software Kit for Windows® NT® 174681-B21 (single server, dual path) (discontinued) High Availability F100 Cluster (HA/F100) Kit for RA4100 (Microsoft® Windows NT 4.0EE, Windows 309816-B22/ 2000 Advanced Server, or Windows Server 2003) (dual server, single path) (discontinued) -292 (Japan) High Availability F200 Cluster (HA/F200) Kit for (Microsoft Windows NT 4.0EE, Windows 2000 380357-B24/ Advanced Server, or Windows Server 2003 -294 (Japan) (dual server, dual path) (discontinued) Secure Path for Windows 2000 V 3.1c (single server, dual path) Can only be purchased with the ProLiant Cluster HA/F200 for RA4100 Kit.
    [Show full text]