NFS in Netapp ONTAP Best Practice and Implementation Guide

Total Page:16

File Type:pdf, Size:1020Kb

NFS in Netapp ONTAP Best Practice and Implementation Guide Network File Systems (NFS) in Lenovo ONTAP Best Practices and Implementation Guide Abstract This document provides basic concepts, support information, configuration tips, and best practices for NFS in Lenovo® ONTAP®. This guide covers the latest available ONTAP versions for currency and length. In most cases, the commands and best practices listed in this guide apply to all ONTAP versions. Results can vary in older ONTAP versions. Consult the product documentation for your ONTAP version when necessary. First edition (March 2021) © Copyright Lenovo 2021. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant to a General Services Administration (GSA) contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925 TABLE OF CONTENTS 1 Basic NFS Concepts in Lenovo ONTAP ............................................................................................. 8 1.1 Intended Audience and Assumptions ..............................................................................................................8 1.2 Stated Support for NFS ...................................................................................................................................8 1.3 NFS Features 9 1.4 NFS Server Options ...................................................................................................................................... 10 1.5 Namespace Concepts ................................................................................................................................... 12 1.6 File Locking Concepts ................................................................................................................................... 20 1.7 Export Concepts ........................................................................................................................................... 22 1.8 The Anon User 29 1.9 The Root User 30 1.10 Limiting Access to the SVM Root Volume ..................................................................................................... 30 1.11 Mapping All UIDs to a Single UID (squash_all) ............................................................................................. 32 1.12 Special Character Considerations ................................................................................................................. 33 2 NFS Version Considerations ............................................................................................................. 34 2.1 NFSv3 Considerations .................................................................................................................................. 34 2.2 NFSv4.x Considerations ............................................................................................................................... 38 2.3 NFSv4.0 40 2.4 NFSv4.1 49 2.5 NFSv4.2 53 3 Name Services .................................................................................................................................... 53 3.1 Domain Name System (DNS) ....................................................................................................................... 53 3.2 Identity Management Name Services ........................................................................................................... 54 3.3 Local Files 54 4 Multiprotocol NAS .............................................................................................................................. 56 5 Nondisruptive Operations with NFS ................................................................................................. 60 5.1 Replay/Reply Cache ..................................................................................................................................... 60 5.2 File Locking 60 5.3 NFSv4.1 Sessions ........................................................................................................................................ 61 5.4 What Happens During LIF Migrations in NFSv4.x? ....................................................................................... 61 5.5 LIF Migrations with NFSv3 ............................................................................................................................ 61 5.6 Direct Connect NFS ...................................................................................................................................... 62 6 Volume Styles: FlexGroup or FlexVol? ............................................................................................ 63 7 NFS Auditing ....................................................................................................................................... 63 3 NFS in Lenovo ONTAP: Best Practices and Implementation Guide © 2021 Lenovo. All Rights Reserved. 7.1 NFS Audit Setup ........................................................................................................................................... 63 8 NFS Best Practices ............................................................................................................................. 64 8.1 General ONTAP Best Practices .................................................................................................................... 64 8.2 ONTAP Data LIF Best Practices with NFS Environments ............................................................................. 64 8.3 NFS Security Best Practices ......................................................................................................................... 68 8.4 Name Services Best Practices ...................................................................................................................... 74 8.5 NFS Client Best Practices ............................................................................................................................. 75 9 Logging, Monitoring and Statistics .................................................................................................. 80 9.1 Managing NFS Locks .................................................................................................................................... 80 9.2 NFS Events – Event Messaging System (EMS) ........................................................................................... 80 9.3 NFS Statistics 81 9.4 Determining What Type of Virtual Machine Is Hosted on NFS...................................................................... 81 9.5 Determining If Oracle Is in Use ..................................................................................................................... 82 9.6 Performance Monitoring Enhancements ....................................................................................................... 82 10 Advanced NFS Concepts ................................................................................................................... 85 10.1 Unmask 85 10.2 NFS User nfsnobody ..................................................................................................................................... 86 10.3 NFSv4.x – nobody:nobody ............................................................................................................................ 87 10.4 Hiding Snapshot Copies ............................................................................................................................... 89 10.5 Viewing and Managing NFS Credentials ...................................................................................................... 89 10.6 Using NFSv4.x ACLs with NFSv3 mounts .................................................................................................... 94 10.7 Dynamic NAS TCP Autotuning test ............................................................................................................... 96 10.8 Network Connection Concurrency: NFSv3 ................................................................................................... 97 10.9 NFSv4.x Client IDs/NFS4ERR_CLID_INUSE ............................................................................................. 101 10.10 NFS Silly Renames ........................................................................................................... 101 10.11 NAS Flow Control ............................................................................................................. 102 10.12 Using FlexClone to Quickly Change All UIDs/GIDs in a Volume ...................................... 102 10.13 Auxiliary GIDs – Addressing the 16 GID Limitation for NFS ............................................. 102 10.14 High File Count Considerations ........................................................................................ 104 11 NFS on Nontraditional Operating Systems .................................................................................... 113 11.1 NFS on Windows ........................................................................................................................................ 113 11.2 NFS Using Apple OS .................................................................................................................................. 114 Appendix A: Examples, Configuration Output, and Other Information ............................................ 115 Examples ............................................................................................................................................................. 115 4 NFS in Lenovo ONTAP: Best Practices
Recommended publications
  • Storage Administration Guide Storage Administration Guide SUSE Linux Enterprise Server 12 SP4
    SUSE Linux Enterprise Server 12 SP4 Storage Administration Guide Storage Administration Guide SUSE Linux Enterprise Server 12 SP4 Provides information about how to manage storage devices on a SUSE Linux Enterprise Server. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xii 2 Giving Feedback xiv 3 Documentation Conventions xiv 4 Product Life Cycle and Support xvi Support Statement for SUSE Linux Enterprise Server xvii • Technology Previews xviii I FILE SYSTEMS AND MOUNTING 1 1 Overview
    [Show full text]
  • Student Number: Surname: Given Name
    Computer Science 2211a Midterm Examination Sample Solutions 9 November 20XX 1 hour 40 minutes Student Number: Surname: Given name: Instructions/Notes: The examination has 35 questions on 9 pages, and a total of 110 marks. Put all answers on the question paper. This is a closed book exam. NO ELECTRONIC DEVICES OF ANY KIND ARE ALLOWED. 1. [4 marks] Which of the following Unix commands/utilities are filters? Correct answers are in blue. mkdir cd nl passwd grep cat chmod scriptfix mv 2. [1 mark] The Unix command echo HOME will print the contents of the environment variable whose name is HOME. True False 3. [1 mark] In C, the null character is another name for the null pointer. True False 4. [3 marks] The protection code for the file abc.dat is currently –rwxr--r-- . The command chmod a=x abc.dat is equivalent to the command: a. chmod 755 abc.dat b. chmod 711 abc.dat c. chmod 155 abc.dat d. chmod 111 abc.dat e. none of the above 5. [3 marks] The protection code for the file abc.dat is currently –rwxr--r-- . The command chmod ug+w abc.dat is equivalent to the command: a. chmod 766 abc.dat b. chmod 764 abc.dat c. chmod 754 abc.dat d. chmod 222 abc.dat e. none of the above 2 6. [3 marks] The protection code for def.dat is currently dr-xr--r-- , and the protection code for def.dat/ghi.dat is currently -r-xr--r-- . Give one or more chmod commands that will set the protections properly so that the owner of the two files will be able to delete ghi.dat using the command rm def.dat/ghi.dat chmod u+w def.dat or chmod –r u+w def.dat 7.
    [Show full text]
  • Netapp Cloud Volumes ONTAP Simple and Fast Data Management in the Cloud
    Datasheet NetApp Cloud Volumes ONTAP Simple and fast data management in the cloud Key Benefits The Challenge • NetApp® Cloud Volumes ONTAP® In today’s IT ecosystem, the cloud has become synonymous with flexibility and efficiency. software lets you control your public When you deploy new services or run applications with varying usage needs, the cloud cloud storage resources with industry- provides a level of infrastructure flexibility that allows you to pay for what you need, when leading data management. you need it. With virtual machines, the cloud has become a go-to deployment model for applications that have unpredictable cycles or variable usage patterns and need to be • Multiple storage consumption models spun up or spun down on demand. provide the flexibility that allows you to use just what you need, when you Applications with fixed usage patterns often continue to be deployed in a more need it. traditional fashion because of the economics in on-premises data centers. This situation • Rapid point-and-click deployment creates a hybrid cloud environment, employing the model that best fits each application. from NetApp Cloud Manager enables In this hybrid cloud environment, data is at the center. It is the only thing of lasting value. you to deploy advanced data It is the thing that needs to be shared and integrated across the hybrid cloud to deliver management systems on your choice business value. It is the thing that needs to be secured, protected, and managed. of cloud in minutes. You need to control what happens to your data no matter where it is.
    [Show full text]
  • Ontap 9.3 St
    NetApp, Inc. ONTAP® 9.3 Security Target Evaluation Assurance Level (EAL): EAL 2+ Document Version 1.2 30 July 2018 Prepared by: NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 United States of America Revision History Version Date Document Version History 1.0 2018-05-14 Initial draft. (Garrett Cooper) 1.1 2018-07-16 Update TOE reference in Section 1.3 to ONTAP 9.3 P4 (Mike Scanlin) 1.2 2018-07-30 Corrected Figures 2 and 4. Corrected ONTAP version references. (Garrett Cooper) Preface This document provides the basis for an evaluation of a specific Target of Evaluation (TOE), NetApp ONTAP 9.3. This Security Target (ST) defines a set of assumptions about the aspects of the environment, a list of threats that the product intends to counter, a set of security objectives, a set of security requirements, and the Information Technology (IT) Security Functions provided by the TOE which meet the set of requirements. 2 NetApp, Inc. ONTAP® 9.3 Security Target version 1.2 © 2018 NetApp, Inc. All rights reserved. TABLE OF CONTENTS 1 Introduction .............................................................................................................................................. 6 1.1 TOE Components ............................................................................................................................................ 6 1.2 Purpose ............................................................................................................................................................ 7 1.3 Security Target and TOE Reference
    [Show full text]
  • Using Red Hat Client with Netapp Storage Over NFS Bikash Roy Choudhury, Netapp October 2013 | TR-3183
    Technical Report Using Red Hat Client with NetApp Storage over NFS Bikash Roy Choudhury, NetApp October 2013 | TR-3183 Abstract This report helps you to get the best from your Linux® NFS clients when used in an environment that includes NetApp® storage. Most of the discussion revolves around Red Hat Enterprise (RHEL) clients. This document does not include best practices and recommendations for block protocols like FCP and iSCSI. The paper highlight some of the best practices and tuning parameters that would be required for running user home directories and regular UNIX® file systems. The paper describes various tuning options on RHEL clients and diagnoses performance and reliability problems. Every workload has a different access pattern and characterization; we recommend appropriate tuning on RHEL clients based on the workload characterization, which should not be treated as “one size fits all" for all workloads. Separate technical reports have been published for different applications that provide recommendations for specific workloads. In this paper you will learn where to look for more information when faced with problems that are d ifficult to diagnose. Storage tuning information specific to your application may be available in other NetApp technical reports and solution guides. TABLE OF CONTENTS 1 Introduction ..................................................................................................................................... 3 2 Which RHEL Linux NFS Client Is Right for Me? ............................................................................
    [Show full text]
  • En Rgy Tr Ls
    HTING LIG NAL SIO ES OF PR • • N O I T C E T O R P E G R U S • F O O R ENER P GY R C E O H N T A T E R W • O A L P S & S L O O P InTouch™ — The Centerpiece for Peaceful Living Z-wave™ makes reliable wireless home control possible. Several factors contribute to make Z-wave a breakthrough Intermatic makes it a reality with the InTouch™ series innovation. First is the “mesh” network, which basically of wireless controls. Until now home controls had only means that every line-powered device within the network acts two options — reliable controls that were too expensive or as a repeater to route signals among distant devices. Second is low cost controls that were unreliable. That’s all changed that Z-wave networks operate in the 900Mhz band, providing a with Intermatic’s InTouch wireless controls, which bring penetrating signal to deliver reliable communications between reliable controls together with low cost to deliver a home devices. Another factor is that with more than 4 billion unique solution everyone can enjoy. house codes, Z-wave provides a secure network with no fear of interference from neighboring systems. Finally, Z-wave Named the Best New Emerging Technology by CNET at has made the leap from theory to reality as more than 100 the 2006 Consumer Electronic Show, and recipient of the companies are working in the Z-wave Alliance to develop Electronic House Product of the Year Award, Z-wave is a actual products that benefit homeowners today and in the breakthrough technology that enables products from many near future.
    [Show full text]
  • ONTAP 9 Data Management Software Simplify Your Transition to the Modern Data Center
    Datasheet ONTAP 9 Data Management Software Simplify your transition to the modern data center Key Benefits The Challenge Simplify Deployment and Management Businesses today need to address competitive pressures by evolving into digital • Deploy new workloads in under 10 enterprises that speed innovation and enable better business decisions. They must minutes take a more modern approach to their data storage while integrating into their existing • Unify data management across flash, environment. Businesses must also manage data wherever it resides—on the premises disk, and cloud and in the cloud- while reducing costs and operating with existing IT sta. • Gain a global view of storage with a single management console The Solution Simplify your transition to a modern data center with NetApp® ONTAP® 9, the next Flexibly Support Changing Business generation of the industry’s leading enterprise data management software. It combines Needs new levels of simplicity and flexibility with powerful data management capabilities and • Deploy on engineered systems, storage eciencies. converged infrastructure, software- defined storage, and cloud With ONTAP 9, you can build a hybrid cloud that is the foundation of a Data Fabric • Support current and modern software that spans flash, disk, and cloud. Seamlessly manage your data as it flows to wherever platforms you need it most to make the best possible decisions for your organization. ONTAP 9 • Manage SAN and NAS workloads on a addresses the challenges that face your digital enterprise by: unified storage architecture • Simplifying deployment and data management Power Your Enterprise Applications • Flexibly supporting your changing business needs • Deliver rich data services with high • Powering your enterprise applications performance and consistent low latency You can simplify your storage environment with proven operational eciency.
    [Show full text]
  • TR Body Styles-Category Codes
    T & R BODY STYLES / CATEGORY CODES Revised 09/21/2018 Passenger Code Mobile Homes Code Ambulance AM Special SP Modular Building MB Convertible CV Station Wagon * SW includes SW Mobile Home MH body style for a Sport Utility Vehicle (SUV). Convertible 2 Dr 2DCV Station Wagon 2 Dr 2DSW Office Trailer OT Convertible 3 Dr 3DCV Station Wagon 3 Dr 3DSW Park Model Trailer PT Convertible 4 Dr 4DCV Station Wagon 4 Dr 4DSW Trailers Code Convertible 5 Dr 5DCV Station Wagon 5 Dr 5DSW Van Trailer VNTL Coupe CP Van 1/2 Ton 12VN Dump Trailer DPTL Dune Buggy DBUG Van 3/4 Ton 34VN Livestock Trailer LS Hardtop HT Trucks Code Logging Trailer LP Hardtop 2 Dr 2DHT Armored Truck AR Travel Trailer TV Hardtop 3 Dr 3DHT Auto Carrier AC Utility Trailer UT Hardtop 4 Dr 4DHT Beverage Rack BR Tank Trailer TNTL Hardtop 5 Dr 5DHT Bus BS Motorcycles Code Hatchback HB Cab & Chassis CB All Terrain Cycle ATC Hatchback 2 Dr 2DHB Concrete or Transit Mixer CM All Terrain Vehicle ATV Hatchback 3 Dr 3DHB Crane CR Golf Cart GC Hatchback 4 Dr 4DHB Drilling Truck DRTK MC with Unique Modifications MCSP Hatchback 5 Dr 5DHB Dump Truck DP Moped MP Hearse HR Fire Truck FT Motorcycle MC Jeep JP Flatbed or Platform FB Neighborhood Electric Vehicle NEV Liftback LB Garbage or Refuse GG Wheel Chair/ Motorcycle Vehicle WCMC Liftback 2 Dr 2DLB Glass Rack GR Liftback 3 Dr 3DLB Grain GN Liftback 4 Dr 4DLB Hopper HO Liftback 5 Dr 5DLB Lunch Wagon LW Limousine LM Open Seed Truck OS Motorized Home MHA Panel PN Motorized Home MHB Pickup 1 Ton 1TPU Motorized Home MHC Refrigerated Van RF Pickup PU
    [Show full text]
  • Mysql Backup and Restore Using Zmanda Recovery Manager and Netapp Snapshot Technology Karthikeyan Nagalingam, Product and Partner Engineer, Netapp K
    NETAPP TECHNICAL REPORT MySQL Backup and Restore Using Zmanda Recovery Manager and NetApp Snapshot Technology Karthikeyan Nagalingam, Product and Partner Engineer, NetApp K. K. George, Vice President, India Development Operations, Zmanda, Inc. March 2008 | TR-3656 TABLE OF CONTENTS 1 INTRODUCTION ......................................................................................................................... 3 1.1 INTENDED AUDIENCE.................................................................................................................................3 1.2 PURPOSE .....................................................................................................................................................3 2 BACKUP AND RECOVERY SOLUTION FOR MYSQL OVERVIEW ........................................ 3 2.1 CONSIDERATIONS AND BEST PRACTICES FOR MYSQL BACKUP SOLUTION...................................5 2.2 ZMANDA RECOVERY MANAGER FOR MYSQL ........................................................................................6 2.3 ZMANDA MANAGEMENT CONSOLE (ZMC) FOR MYSQL BACKUP .......................................................8 2.4 ZMANDA RECOVERY MANAGER FOR MYSQL CLUSTER EDITION......................................................9 2.5 USING SNAPSHOT TECHNOLOGY FOR BACKUP ...................................................................................9 2.6 ZRM WITH NETAPP PLUG-IN....................................................................................................................10 2.7 PREREQUISITES
    [Show full text]
  • How to Build a Search-Engine with Common Unix-Tools
    The Tenth International Conference on Advances in Databases, Knowledge, and Data Applications Mai 20 - 24, 2018 - Nice/France How to build a Search-Engine with Common Unix-Tools Andreas Schmidt (1) (2) Department of Informatics and Institute for Automation and Applied Informatics Business Information Systems Karlsruhe Institute of Technologie University of Applied Sciences Karlsruhe Germany Germany Andreas Schmidt DBKDA - 2018 1/66 Resources available http://www.smiffy.de/dbkda-2018/ 1 • Slideset • Exercises • Command refcard 1. all materials copyright, 2018 by andreas schmidt Andreas Schmidt DBKDA - 2018 2/66 Outlook • General Architecture of an IR-System • Naive Search + 2 hands on exercices • Boolean Search • Text analytics • Vector Space Model • Building an Inverted Index & • Inverted Index Query processing • Query Processing • Overview of useful Unix Tools • Implementation Aspects • Summary Andreas Schmidt DBKDA - 2018 3/66 What is Information Retrieval ? Information Retrieval (IR) is finding material (usually documents) of an unstructured nature (usually text) that satisfies an informa- tion need (usually a query) from within large collections (usually stored on computers). [Manning et al., 2008] Andreas Schmidt DBKDA - 2018 4/66 What is Information Retrieval ? need for query information representation how to match? document document collection representation Andreas Schmidt DBKDA - 2018 5/66 Keyword Search • Given: • Number of Keywords • Document collection • Result: • All documents in the collection, cotaining the keywords • (ranked by relevance) Andreas Schmidt DBKDA - 2018 6/66 Naive Approach • Iterate over all documents d in document collection • For each document d, iterate all words w and check, if all the given keywords appear in this document • if yes, add document to result set • Output result set • Extensions/Variants • Ranking see examples later ...
    [Show full text]
  • Unix, Standard I/O and Command Line Arguments Overview Redirection
    Unix, Standard I/O and command line arguments For any programming assignments I give you, I expect a program that reads and writes to standard input and output, taking any extra parameters from the command line. This handout explains how to do that. I have also appended a small appendix of useful Unix commands. I recommend that you go to a Unix terminal and type in and run all of the examples in the gray boxes. You can do this from the Terminal application on a MacIntosh, or from a terminal window in GNU/Linux or any Unix-like operating system, from Cygwin in Windows maybe, or by connecting to bingsuns using SSH. Overview Most programming languages feature “standard,” or default, input and output channels where I/O goes unless otherwise specified. In C, the functions scanf(), gets() and getchar() read from standard input, while printf(), puts() and putchar() write to standard output. In Tcl, the gets and puts commands read and write standard input and output. In awk and perl, you just sort of use the force and your program receives a line of input from somewhere. Letʼs stick with C for the time being.1 When a program runs from a terminal, standard input is usually the userʼs keyboard input, while standard output is displayed as text on-screen. Unix and Unix-like operating systems allow you to intercept the standard I/O channels of a program to redirect them into files or other programs. This gives you the ability to chain many simple programs to do something genuinely useful.
    [Show full text]
  • Freebsd Foundation February 2018 Update
    FreeBSD Foundation February 2018 Update Upcoming Events Message from the Executive Director Dear FreeBSD Community Member, AsiaBSDCon 2018 Welcome to our February Newsletter! In this newsletter you’ll read about FreeBSD Developers Summit conferences we participated in to promote and teach about FreeBSD, March 8-9, 2018 software development projects we are working on, why we need Tokyo, Japan funding, upcoming events, a release engineering update, and more. AsiaBSDCon 2018 Enjoy! March 8-11, 2018 Tokyo, Japan Deb SCALE 16x March 8-11, 2018 Pasadena, CA February 2018 Development Projects FOSSASIA 2018 March 22-25, 2018 Update: The Modern FreeBSD Tool Chain: Singapore, Singapore LLVM's LLD Linker As with other BSD distributions, FreeBSD has a base system that FreeBSD Journal is developed, tested and released by a single team. Included in the base system is the tool chain, the set of programs used to build, debug and test software. FreeBSD has relied on the GNU tool chain suite for most of its history. This includes the GNU Compiler Collection (GCC) compiler, and GNU binutils which include the GNU "bfd" linker. These tools served the FreeBSD project well from 1993 until 2007, when the GNU project migrated to releasing its software under the General Public License, version 3 (GPLv3). A number of FreeBSD developers and users objected to new restrictions included in GPLv3, and the GNU tool chain became increasingly outdated. The January/February issue of the FreeBSD Journal is now available. Don't miss articles on The FreeBSD project migrated to Clang/LLVM for the compiler in Tracing ifconfig Commands, Storage FreeBSD 10, and most of GNU binutils were replaced with the ELF Tool Multipathing, and more.
    [Show full text]