Professional Documents
Culture Documents
233 Po
3 16
As you can see in the diagram above, Cranfield breaks IT investments up into four quadrants: High Potential, Strategic, Key Operational and Support. We break them down in this order because it is not unusual for investments to move through the portfolio in this order. The quadrants are defined by contribution to the business future on the X axis with the higher future value being on top and then dependence on the current solution on the Y axis with higher current dependence on the left.
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 1/28
22/12/11
The idea is that you can take all of your IT investments and chart them against these two axes. You ll then get your own breakdown of IT investments. As an exercise, think about all the IT projects your team is working on. How would your business users chart those activities against the chart above? Are you working on mostly Key Operational tasks? Here s a hint: It s super hard to raise top line revenue if you are not working on the top half of this chart. Here s an example of how IT investments can work through this chart. Let s think about ATM s. At one time, long ago, ATM s were a futuristic technology. Large banks thought about investing in this new technology but they were not sure if customers would accept the idea of working with a machine to get their cash instead of talking to a person. This made them a High Potential technology because they had potential but their value was unproven. Then, over time ATM s became a bit more common and people really liked them. The banks who had aggressive ATM deployment programs gained significant business advantage over their rivals. Thus, the technology moved from High Potential to Strategic. The business became very dependent on the ATM s. Fast forward a few years and ATM s become ubiquitous. Every bank has one. You have to have an ATM to become a bank. Thus, ATM s become Key Operational. There is very little future business advantage to be had, but you were completely dependent on them to run your banking business. Fast forward a bit more and now we have the internet. Banks are repeating the same cycle with online banking which is now somewhere between Strategic and Key Operational for most banks. To some degree, this reduces their reliance on ATM networks. Some online banks (like ING here in the USA) have no physical presence at all. No ATM s. Thus, they become Support technologies. They re great if you need them but you may outsource the function if you can get it for cheaper someplace else. This is not to say that ATM s are in the Support box for every bank. For some, they are still Key Operational. These decisions are derived from the business, not from IT. If you work for a bank who s core strategy is growing their brick and mortar business you will probably answer this question differently than if you work for a bank that has zero physical footprint. Above the Line Sometimes the analysis of IT project portfolios comes down to a simple question: Are you operating above the line? That is to say, are you working on things that increase business advantage for your business in the future? Are you on the top half of the chart above? Naturally, IT is tasked with keeping the lights on and all of those other operational issues. I am not suggesting that an IT organization can survive completely above the line. Not at all. The goal here is balance. I m not even saying that it s 50/50. In my experience, 10% of IT spend above the line can produce huge results in the long term. What the heck does all of this have to do with cloud? Well, I ll tell you. The reality is that it s super difficult for a bunch of technical folks in IT to create projects above the line. Unless you re very lucky or very good, you probably don t have the business acumen to do this on your own. This means partnering with the business and pushing IT decision making down as far into the operational groups as you can manage. Naturally, this requires a robust platform that provides self-service, infinite scaling, rapid elasticity, etc. See where I m going? Private clouds provide the ideal platform for these types of out of the box or future looking activities. Because they re super flexible, they can easily support new applications, databases or requirements that are not well understood. In effect, your private cloud can become your strategic sandbox for all those above the line activities. Something to think about. No?
242 Visualizaes
0 Comentrios
Permalink
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
2/28
22/12/11
258 Visualizaes
0 Comentrios
Permalink
22/12/11
organizations to fundamentally transform their businesses through the use of cloud business models and architectures. However, this trend seems stuck in the huge potential column. As we have discussed, I have my theories about this. As I have stated previously, I feel that this is fundamentally an organizational change management problem. IT organizations who attempt to retain traditional organizational structures and processes struggle to implement successful private clouds. One aspect of this problem is sometimes referred to as the bottom line dilemma. If an IT organization is considered a cost center, it is very difficult for that organization to create the amount of change required to add value. If you are not adding value, you are a cost center by definition. It s a quandary. Let s start with the concept of value. If you want to create value in any organization, you must introduce change. Change is by definition a value precursor. Not all change creates value, but all value creation requires change. This is a tautology (a statement that is inherently true). Think about something simple like jewelry. If I give you a lump of gold, does that lump have value? Yep. Did I add any value by giving you the lump? Nope. What if I changed the lump into a ring? Ah, I have introduced physical change to the gold. This may have value to you. Unless the ring is really ugly. Then I d rather just have the gold. See where this is headed? Need more proof? How about this great study that CSC just published on cloud adoption: http://assets1.csc.com/newsroom/downloads/CSC_Cloud_Usage_Index_Report.pdf. There are some super interesting conclusions in this report. This is just one data point, but it s fascinating none the less. In their survey, they found that only 10% of organizations listed cost savings as their top motivation. Further into the survey, they find that 82% of respondents achieved cost savings. However, those savings were not very significant, with 35% of organizations reporting less than $20,000 in savings. So, why did they do the move? Mostly to support new demands from mobile and always on access: one-third of respondents cite their need to better connect employees who use a multitude of computing devices as the number one reason they adopt cloud. This is a very strange result to me since the availability of SSL VPN and other technologies like IPSec have pretty much eliminated any remaining barriers between mobile devices and internal resources. There is no technical reason why a cloud application would be more accessible to the mobile worker than a traditional application. However, it does speak to the change in business model. If customers are demanding services that IT cannot or will not give them (anywhere access for mobile devices) then the business will find another way. The only reason why you would move to cloud to get better mobile access is if the traditional IT gatekeepers are preventing access due to some policy that doesn t support the business requirement. Unfortunately, the survey does not attempt to assess success or failure of adoptions so there is no data allowing us to compare strategies that work and those that don t. So, if change is good (sometimes) how do we evaluate good change and compare that to bad change? One way that I really like is to use a technique called benefits management. (http://www.amazon.com/Benefits-Management-Delivering-InvestmentsInformation/dp/047009463X/ref=sr_1_4?ie=UTF8&qid=1322854300&sr=8-4) Developed by the folks at Cranfield School of Management in the UK, it provides a framework for managing the realization of benefits by IT organizations. I used to teach a two day class on this topic, but the short version is that in order to have benefit and IT activity must have underlying business metrics and those metrics must have a business owner. For example, back in the old days it was common to claim that PC s increased worker productivity. OK, great. How do I measure that? Either I produce x more widgets or I fire y people. That s it. You cannot say that task x takes 10 less seconds and is performed 10,000 times a day therefore you have saved 100,000 seconds a day. Saving 100,000 seconds is entirely theoretical until it is expressed into an actual benefit like reducing labor costs or increasing production. This is why IT organizations so rarely have this discussion. It s hard. This is especially true when discussing traditional IT benefits like saving time. This implies that the organization will fire someone which nobody wants to talk about. If you have the luxury of a quickly
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 4/28
22/12/11
growing company, this benefit can be expressed in terms of avoided new headcount, but not everyone has the benefit of a large, growing business that s constantly hiring. No, it s much more fun to talk about creating top line revenue. Increasing production, exploring new markets, increasing customer satisfaction. Those are always great IT projects. How to we use this principal to help us plan and deploy private clouds? One way is to think about the benefits that you think the platform will bring to the organization. Things like increased agility or reduced downtime or reduced IT labor costs. Make a list. Hopefully, it s a super long list. Then you need to categorize these into top-line items (increased agility) and bottom-line items (reduced IT costs). For each top line item, you need to identify exactly who will benefit within the organization (VP of Sales, COO, VP of Product Development) and figure out exactly how much this will help their organization and what metrics you can apply. Once you have your proposed metrics, you need to go to the business owner of that activity and get them to agree to your metric. For example, the VP of Sales may not be super happy that you re asking them to commit to an additional $1M of quota because you want to deploy a new sales productivity application. See how this gets complicated? You cannot claim a benefit unless those you claim to benefit agree. That may not always happen. As I said, you re hoping for a super long list. This lack of visibility and support for IT business improvement is at the heart of failed projects. IT says that things are better but the business either disagrees or simply doesn t care. Neither of these scenarios are good. In many cases, this technique will radically change IT s implementation priorities. The organizations that WANT IT services come up in priority. Those who are unhappy or uncaring drop down. Remember what I said about running a business? You need to provide a service that your customer wants. Your customers will tell you if you are doing the right thing or not. It is a similar exercise when you use benefits management to ensure that IT is actually creating value for the organization. This is true even if you choose not to do charge back and no money ever changes hands. Recommendation: Focus at least 10% if your total IT spend on projects that raise the company top line in ways that the business is willing to sign off on. This will help you balance your IT portfolio.
105 Visualizaes
0 Comentrios
Permalink
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
22/12/11
MSG_SMSQL_BACKUP_COMPLETE MSG_SMSQL_BACKUP_FAIL MSG_SMSQL_FULLBACKUP_FAIL MSG_SMSQL_LOGBACKUP_FAIL MSG_SMSQL_STREAMBACKUP_FAIL MSG_SMSQL_FULLBACKUP_COMPLETE MSG_SMSQL_LOGBACKUP_COMPLETE MSG_SMSQL_STREAMBACKUP_COMPLETE MSG_SMSQL_BACKUP_DBCC_ONEOK Verification (DBCC CHECKDB) of snapshot based full database backup named ' 1' for database ' 2' successfully completed on SQL Server ' 3')
MSG_SMSQL_BACKUP_DBCC_PERVDISK_ONEOK .Verification 380 (DBCC CHECKDB) of snapshot based full database backup named ' 1' on SQL Server ' 2' completed successfully.)
SnapManager for E change Event Description F F S S S T S S S S F S F S J J S S F S M VSS M M '' .
6/28
.L . .U M M M M M M (J ID=) E
()
. . , , , S .P .P M E E . . .M . .E .L P S :B S M :L N P :L :B L N :E S
.VSS_E_WRITERE
M M E . [] [] E . [] . ''.
. .
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
22/12/11
SnapManager remote database integrity verification failed on server ''. Please check the application event logs on se SnapManager for Sharepoint E ent Description General backup PRItemRestoreNew2007 PRWrapperBackup2007 PRWrapperRestore2007 PRItemRestore2010 Archiver SMSPCheckUser SMSPGetUserGroup SMSPFilerSDKTool SMSPUPProcProxy SMSPSMMOSSAgentSetup SMSPManagerUninstall SMSPAgentUninstall SMSPDiagnosticTools FileMigrator PFMigrator LotusNotesMigrator LotusNotesBrower LotusNotesStageBrower LotusNotesRestore2007 LotusNotesRestore2010 QuickPlaceMigrator QuickPlaceBackup QuickPlaceRestore2007 QuickPlaceRestore2010 eRoomMigrator ERMMigrator E ent ID 1000 1100 1200 1300 1400 2000 7000 7050 7100 7150 7250 7300 7350 7400 3000 4000 5000 5100 5150 5300 5400 5500 5600 5700 5800 6000 6500
SMSPSMMOSSManagerSetup 7200
Permalink 227 Visualizaes 2 Comentrios Rtulos: storage-efficiency, monitoring;tool;provisioning;management;ontap;manage;, monitoring, sql_snapmanager, sharepoint_management, sharepoint_server, snapmanager_for_exchange_6.0_with_exchange_2010, snapmanager_for_microsoft_sql, snapmanager_for_sharepoint, scom
22/12/11
Having to reseed a copy of the database in a DAG configuration with Exchange Server 2010 is painful enough that I actually have had nightmares involving reseed. Even though streaming online backup is deprecated in Exchange Server 2010, that code is utilized to perform a database reseed. Reseeding is notoriously slow, and doesn t scale very well. In a recent customer visit I could not achieve greater than 300MB/sec out of a source mailbox server, even with 40 concurrent database reseeds. This on a Friday was projected to take over 3 days and was painfully surprised to find on Monday that the jobs were done, but nothing had been copied. It turns out by default, after reseeding the database it will reseed the content index. The content index reseed failed, and rolled back the whole thing! If you use Exchange to reseed be sure to run with the database only switch and reseed the content index in a separate job. (update-mailboxdatabasecopy databaseonly) I found much faster throughput using a flat file copy, even eseutil (/y) can be utilized for this at the expense of requiring a dismounted source. The takeaway is that database reseeding is painful. If you utilize NetApp for your Exchange Server 2010 storage, a little disk space will save you from ever having to reseed a database. Most NetApp deployments of Exchange Server 2010 involve taking a full backup on one copy of the database utilizing SnapManager for Exchange and snapshots. Since NetApp doesn t use a copy on write snapshot scheme, there is no performance penalty to keeping multiple (hundreds) snapshots. Space is only consumed as changes are made. If you update a block, it is not touched, rather a new block is written and the pointer to the live file system is updated. Typical deployments in the 1-2GB mailbox range can expect a 1-3% daily change rate. If you have a 2% daily change rate, storing 7 days of snapshots will consume space equal to 14% of the dataset size. This is one of the points of efficiency NetApp excels at, as competing VSS solutions must at the very least copy the entire dataset and then house the changed blocks for a backup capacity cost of greater than 100% of the dataset size. Other copies of the database should run copy backup jobs that do not truncate logs. If space is at a premium, keep only enough space for one day s worth of snapshots. If you ever reboot, blue screen, or otherwise find failed database copies, you can: Suspend the failed copy Remove it Add it back with seeding postponed Restore a recent snapshot Resume the copy
At this point it will perform an incremental reseed copying just the transaction log files that are required to get up to date, a few megabytes. I'm running tests where you don't remove and then add the database copy back...you simply restore the LUN. However, depending on the timing this can throw up Exchange errors, which may not be acceptable depending on the monitoring strategy. Please click permalink below, or the title of this blog post above to see the attached AVI for a Video demonstration of our rapid reseed. We demonstrated this live at TechEd 2011 in Atlanta in less than 2 minutes. Please keep in mind most of the elapsed time in the video are pauses in the script so that I have time to talk about what actions are being performed. Thanks, Robert
Permalink 453 Visualizaes 0 Comentrios Rtulos: 2010, restore, snapshot, dag, netapp, exchange, reseed
22/12/11
available!
Postado por sadhanab 01/12/2011
The Best Practices Guide for OnCommand Plug-in 3.0 for Microsoft is now available at the following location. http://media.netapp.com/documents/tr-3 4.pdf The NetApp OnCommand plug-in 3.0 for Microsoft is the successor to ApplianceWatch PRO 2.1.1. Apart from a detailed section on the best practices for installing and configuring OCPM 3.0 with Microsoft System Center Operations Manager (SCOM) 200 R2 and System Center Virtual Machine Manager (SCVMM) 200 R2, the guide also includes new sections that cover the best practices around the following key features of OCPM 3.0. LUN and VHD misalignment detection alerts, reports, and PRO tips. Agentless monitoring and discovery functionality on Hyper-V hosts. Cluster shared volumes (CSVs) support for highly available VMs. MultiStore support. Rapid provisioning and cloning of VMs using PowerShell cmdlets or by using Microsoft Opalis. Disaster recovery across geographically dispersed sites and domains. There is also a troubleshooting section in the guide which covers some of the generic issues faced while working with OCPM and SCOM. The best tip for troubleshooting however is to enable OCPM debugging. The steps to enable debug logging for OCPM is covered in section . of the document.
Permalink
170 Visualiza es
0 Comentrios
22/12/11
Windows File Services describes Windows File Services infrastructure in Data ONTAP operating in Cluster Mode. It presents an overview of Server Message Block (SMB) functional modules, describes each SMB feature and configuration with best practices, and offers a selection of error diagnoses and SMB statistics. TR-3970 Cluster-Mode Onboard Antivirus McAfee Deployment Guide discusses the scanning configurations for McAfee VirusScan Enterprise (VSE) On-board for Data ONTAP operating in Cluster-Mode. It also discusses the best practices for deploying this solution.
155 Visualizaes
0 Comentrios
Permalink
http://media.netapp.com/documents/tr-3874.pdf
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 10/28
22/12/11
285 Visualizaes
0 Comentrios
Permalink
Data ONTAP PowerShell Toolkit 1.6: Windows volume and disk management.
Postado por sizemore 23/11/2011 One of our more ambitious goals for the Data ONTAP PowerShell Toolkit 1.6 was to simplify Volume and Disk management. Volume and Disk management in Windows is handled by the Virtual Disk Service (VDS), and has been open to developers since its inception. Administrators, were left in the dark with nothing but diskpart, and complicated parsing. As you ll soon see those dark days are in the past, as we ve made VDS a first class PowerShell citizen. It all starts with a new and improved Get-NaHostDisk, not only do we report any Disks attached to the system, but we also added an -DataOnTap, and -Uninitilized switch to the cmdlet to make finding new disks easier than ever. P C\ GtNHsDs S :> e-aotik HsDieah otrvPt -----------C\ : F\ : E\ : Ds ik --0 1 2 S eCnrlePt i otolrah -- -------- ------1. G 20 B 1. G Aol:vldmetln 00 B plo/o/sts/u1 1. G Aol:vldmetln 00 B plo/o/sts/u3
Now in my case I have a new LUN that isn t showing up just yet so I need to trigger a VDS rescan. P C\ SatNHsDsRsa S :> tr-aotikecn Unfortunately, the underlying VDS service offers no feedback, so there is no way of knowing when the scan is complete, but I ll offer a solution to that later. For now we see that our new LUN is found but uninitialized. P C\ GtNHsDs S :> e-aotik HsDieah otrvPt -----------C\ : F\ : E\ : Ds ik --0 1 2 3 S eCnrlePt i otolrah -- -------- ------1. G 20 B 1. G Aol:vldmetln 00 B plo/o/sts/u1 1. G Aol:vldmetln 00 B plo/o/sts/u3 1. G Aol:vldmetln 00 B plo/o/sts/u2
From here there are two choices, the easy way or the hard way. We know that 99% of the time you just want a regular GPT disk, with a single NTFS formatted volume the size of the LUN. With that in mind we have the easy way! P C\>GtNHsDs -nntaie S : e-aotik Uiiil d Mutons onPit Ds ik -----------G\ : 3 fa-10ac-05debf\ c71e-be015509 NwNHsVlm e-aotoue S eGiPts i udah -- ------ ---1. G \?Vlm e8cc00 B \\oue 528c
By default we will create a single partition the size of the volume with a 4k allocation size, and map it to the next available drive letter, but you can override any of those setting. The only thing we
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 11/28
22/12/11
won t let you do is create a partition that is unaligned. Meaning your allocation size must be divisible by 4k. Now if you really want to do it the hard way you can, and here you can get as in-depth as your heart s content. P C\ G -ao D k-nn il e S :> e NH i Uii ai d Iiil eNH D k n ai -ao i N -ao Vlm -ae "B"-ie5b-loainn S e6k e NH o e Lbl D1 S g Alc oUi i 4b F m -i * o a L D k i :3 GiP h da : \?Vlm e8cc-c71e-be \\o e 528cfa-10ac015509 \ 05debf V I d d :e235-fe4d-24d209c3 66f503-1281-059206 Lbl ae :D1 B M nPi o on : G\ : Wiah mP : \. o \i 2Wn2Vlm.eieD"\\ \\ o cm :i3_o eD cI=\\? \Vlm-. \o e.. S e i :56792 38010 D kne i Id :3 T aAlc inn o lloa oUi :899 11 Aalbeloainn ialAlc oUi :801 16 Alc inn S e loa oUi i :656 53 Ta iin ae n oS :Sal be Vllg oFa :Cn ed Cnhik I albe aE n, aS n, n lal, F N Spo e,P mnnD m nSpo e a o p d e ae i o p d FFa lg :Nn oe O c f o e o cna oj a l mnpl eei ig o m . F i ac ai a n l e o n ne mnpl iga o m ai a n l e iei a ipea aLNo FeVli OTP ml U l o n NA. P C\>G -ao Vlm -ahG\ S : e NH o e P : M nPi o on D k i -----------G\ : 3 fa-10ac-05debf\ c71e-be015509 S -ao VlmS e-ie8b e NH o ei S g S eGiP h i da -- ------ ---80G \?Vlm e8cc. B \\o e 528c
Mount point manipulation is also as easy, and surprisingly flexible. Flipping a drive from a drive letter to a Mount Point is a one liner. P C\ D m n-ao Vlm -onPi G\ S :> i o NH o e M on : M nPi C\B o on :D1 M nPi o on D k i -----------C\B :D1 3 fa-10ac-05debf\ c71e-be015509 M n-ao Vlm o NH o e
Or you could simply add an additional access path. Did you know you could even do that in NTFS? I didn t until we developed the new cmdlets. P C\ G -ao Vlm C\B S :> e NH o e :D1 M nPi o on ---------M n-ao Vlm -onPi J o NH o e M on : S eGiP h i da -- ------ ---12/28
D k i ---
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
22/12/11
80G \?V . B \\
528 8
We ve added some special sauce to volume deletion. Here by adding the -Reclaim switch, we ll actually leverage SCSI UNMAP to unallocated the blocks in WALF before we delete the volume. Customers using thin provisioned LUNs will then see the actual space reclaimed on the Controller. P C\ R S :> - H N V P J\: R
Finally you can simply reformat an existing volume; we again added the option to reclaim the actual space on the controller. P C\ F S :> - H V N P F\: L "B"D1 R M P D S G P ------------- ------ ---F\ : 1 1. G \?V 00 B \\ 19-11 2 -0 6666 \ 061 - 8 86 93
3 565 90-
Armed with this new functionality you can finally manage the entire lifecycle of a Data ONTAP LUN! For instance the following is an example script that will fully provision a LUN. P ( $ P L =' / / 1 / 5 ' , $ S L =1 0 , $ C =' A ' ) B (G ( M I M OTP NA )' D OTP) NA'
C P
- C N
$ C
-AS E
O N
#C LN U $ =N - L N P #G SS IN CI Q $ =G - H I N #F $G I W
$ P L
20 08 U
1 0
I G =G - I N O ( . $ I LN U P $ . P G $G I . I
)-
#M A - L M N I # S # W
O N
- H N
R ,
- H D N C N - H V N
L P
. P
$ C
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
13/28
22/12/11
As I stated earlier we set out with the goal to make Volume and Disk management in Windows as easy as Volume management is in Data ONTAP. I hope you ll join me in agreement that we hit that high mark.
22/12/11
Ttleod oaScns ----------2957 .838 P C\ MaueCmad NwNVrulik-ulaeG\00B-ie10G S :> esr-omn e-aitaDs FlNm :10G S 00B Slc-betTtleod eetOjc oaScns Ttleod oaScns ----------1.919 9064
As you can see we have simply removed the penalty traditional Fixed VHDs once had. Truthfully, VHD creation would have been enough, but we didn t stop there. We know what the real world is like, and also included the ability to resize a VHD while still maintaining our thin provisioning.
P C\ StNVrulikie-ulaeG\0Bvd-ie2g S :> e-aitaDsS FlNm :1G.h S 0b Md oe ----aLsWieie atrtTm -----------Lnt egh ----Nm ae --1G.h 0Bvd
It s important to note that we re not merely growing the file. We re actually reaching into the VHD and growing the file system within it as well. Of course growing is easy, shrinking is hard. Unfortunately we re limited by the rules of NTFS so we can only shrink a file to the minimum NTFS supports based on the disk initial geometry. With that in mind we made it easy, and added a minimum switch. P C\ StNVrulikie-ulaeG\0B-iiu S :> e-aitaDsS FlNm :1G Mnmm
Md oe ----aLsWieie atrtTm -----------1/521 1:3P 02/01 20 M Lnt egh ----1532 2844 Nm ae --1G.h 0Bvd
With a little scripting we can quickly reclaim all the free space within a group of offline VHDs.
GtCidtmG\-itr".h" e-hlIe : Fle *vd $ie=$.egh s _Lnt $ _ StNVrulikie-iiu -ofr:Fle e-aitaDsS Mnmm Cnim$as StNVrulikie-ie$ie-ofr:Fle e-aitaDsS S s Cnim$as FrahOjc oec-bet
We also included the necessary cmdlets for mounting/dismounting a VHD from the host system. This could be used for any number of things, for instance if your still provisioning Server 2003 it s a straight forward process to get the base VHD ready for loading.
NwNVrulik-ulaeG\i232gl.h -ie4g e-aitaDs FlNm :WnkR_odvd S 0b MutNVrulik on-aitaDs NwNHsVlm -oon e-aotoue NMut Dson-aitaDs -ofr:Fle imutNVrulik Cnim$as
And just like that we have a thinly provisioned property aligned partition to install windows onto. As if that wasn t enough to get you excited, we went the final mile, and brought sub-lun cloning to the toolkit as well. Copy-NaHostFile uses the same technology as OCPM, and as we ve shown it s simply the fastest VM provisioning possible.
P C\ mauecmad S :> esr-omn 1.0 FrahOjc .1 oEc-bet Cp-aotie-oreieG\i232gl.h -etntoFl o NHsFl SucFl :WnkR_odvd Dsiainie
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 15/28
22/12/11
G\M_vd :V$.h
That s 400GB of Virtual machines provisioned in less than four minutes. Simply incredible, and it s only going to get faster as we continue to tune the engine going forward. So what does this all mean? Everything I ve explained today was developed together. It s a suite of tools that enable you to get the absolute maximum savings out of your Hyper-V/NetApp environment. By combining our thin thick VHD creation with Sub-LUN cloning you start from a true thin architecture. Add on to that Dedupe, compression, FlashCache, and we re talking next generation storage efficiency!
22/12/11
and what it s good for. All of this goes back to your customer. Who is your customer? Suggestion: Your customer is anyone in the company directly involved in making money for the company. Full stop. When I was at Microsoft, they hired Kevin Turner to be the COO. He came from Wal-Mart and is a very no-nonsense guy. One thing he said that really sticks in my mind is At Microsoft, we do two things: we make software and we sell software. If you don t do one of those two things, you re overhead. You don t often get crystal clear guidance like that from leadership. Once you understand who exactly you re selling TO, you need to understand WHAT it is you are trying to sell them. Understanding what you re selling can be trickier than it seems. This is the difference between wholesale and retail. In the wholesale business, you sell to professionals. In the IT world, when I sell a SAN, or a Private Cloud to a well-run IT shop, we really focus on the bits and bytes. How does it work and how much will it cost. On the other hand, if you are selling to a business leader or and end user, these things are less important. Consumer electronics firms like Apple understand this. Apple products do not focus on the HOW but rather the WHAT. Steve Jobs was famous for saying that Apple products are magical and for being very short on details. This can frustrate a professional engineer but is exactly right for a consumer audience. The reality is that people don t buy features or products. They buy solutions. If I have a business pain, how do I make that go away? For private cloud, the selling proposition usually goes like this: If you deploy our private cloud solution, you will be able to help your internal customers deploy applications and solutions faster at a lower cost point than traditional solutions. Sound familiar? However, the goal of the IT organization is not to sell their internal private cloud product to other IT people. Usually the key audience is internal business users or perhaps business unit IT leadership. Those folks must sign off on the budget you are hoping to capture. Even if you are not doing charge-back you need to act as if you are. In the end, budget will need to be procured. Nothing simplifies the budget process like other departments screaming for your services, I can assure you. Suggestion: You are selling business agility, safety and reduced cost. Something like this: Our internal cloud allows business unit IT organizations to quickly respond to your departmental initiatives at a lower price point than traditional systems without the risk of placing business critical data outside the company s firewall. Or try out this tagline: Internal Cloud: We say YES. Faster.
259 Visualizaes
0 Comentrios
Permalink
22/12/11
So let s take a look at what we mean by greater manageability. For starters you can see the direct correlation between disks in Windows, and the actual controller information!
Drilling down into specific disk you see all the details of every path between both the Controller and the host.
Anyone who has ever troubleshot LUN connectivity instantly recognizes just how important this information is in a time of crisis, but this is not merely a reporting engine. Through the ONTAP DSM you can control every aspect of how the Controller and your Windows host interoperate, but none of that is really new. What is new is the addition of a PowerShell Snap-In management interface! Today marks a bit of a mile stone here at NetApp for this is the first in a series of releases aimed at improving our products integration, and extensibility for the Windows administrator by offering native PowerShell support, and by support we mean complete coverage. To get started we simply open a PowerShell prompt, and import the Snap-In.
P C\ AdPSai nam S :> d-Snpn tpp
Once loaded we can get, and set any of the ONTAP DSM configuration parameters, the defaults DSM uses when determining how to manage a new LUN.
P C\ GtOtpsprm S :> e-nadmaas PtVrfEald ahei nbe PtVrfctoPro aheiiaineid Rt Cut er on :0 :3 0 :6
Rt Itra er nevl :2 POeoeeid DRmvPro :10 3 DfutodaacPlc ealLaBlneoi :DQ LD SpotdodaacPlce :F,R,Rw,DQ,W,At upreLaBlneoiis O R RS LD P uo
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 18/28
22/12/11
I I R R R P P P
R T
C T R R R C I R T K C
:6 :2 :6 0 :2 0 :1 :00000000 ::::::: :6 :2 :1 :0
V V
E L L SSL CI P
he DSM
L L
Of co
P C\ G S :> S D I LNMID U PO M S --- -------- - ----------D U D U D U D U D U D U D U D U D U D S 4 2 2 0 3 1 6 0 9 2 1 3 0 7 0 8 1 5 3 0 0 I MI D PO MI D PO MI D PO MI D PO MI D PO S MI D PO S MI D PO S MI D PO S MI D PO MI D PO A S S N S L P --------- --- ------ ------3O K 0/ 1O K 0/ 2O K 0/ 5O K 1/ 8O K / 9O K / 6O K / 7O K / 4O K 0/ 0O K / D P I O / D N -----LP B P C
OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD OTPDMDQ NA S LD
P C\ G S :> S D I DM SI
T A T G I T P I --- ----- ------ -------- ----- ---- -------- --------- ----- ---- ---- --- -------------------------- -----D 4 0000 0000 A 3012 3013 E SS CI T 0 121..1/20UK 7.622836 N UK N D 4 0000 0000 A 3022 3023 121..1/20UK 7.632836 N E UK N SS CI T 0
ell a
a i ic
ha
ill p o e p icele
pa h.
19/28
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
22/12/11
P C\ GtSntt -ikds0 S :> e-asas Ds ik DsI PtI ikd ahd NmeORasNmeOWie NmeOBtsed ubrfed ubrfrts ubrf eRa
NmeOBtsrte NmeOIErr NmeOFiOesOttnigeuss ubrf eWitn ubrforos ubrfalvr usadnRqet --- ----- --- -------------- ------------------------ ------- -------- ----------------- -------------------------- -------- --------Ds0 0000 175 ik 2011 73 267 61 36848 7750 17972 9411 0 0 0 Ds0 0000 169 ik 1001 15 6289 5812 0 Ds0 0000 0 ik 1012 0 0 Ds0 0000 0 ik 2002 0 0 39 23 0 0 0 0 0 0 0 0 0 20370 5342 0
As we mentioned earlier this is a complete implementation. You have the abilit to change even the most minor details, but more importantl ou can control the big ones! For instance: Set the load balancing polic on particular disk:
P C\ StSnik-ikds4-boi R S :> e-ads Ds ik Lplc R
Adjust the weight of a given path, telling windows which link to use over others:
P C\ StSnah-ikds6-ah0000 -egt0 S :> e-apt Ds ik Pt 3013 Wih P C\ StSnah-ikds6-ah0000 -egt1 S :> e-apt Ds ik Pt 3023 Wih
Perhaps the best part of this particular implementation is that ever cmdlet supports remote management of other s stems ONTAP DSM.
P C\ GtSnah-ikds0-optraeHpr6-rdnil S :> e-apt Ds ik CmueNm eV Ceeta FSTAKOsgAmn ATRC\pMrdi DsI DMd ikd SI TreAatr agtdpe --- ----- -PtI ahd ----Oeainltt prtoaSae Amntt Pooo PeerdWih diSae rtcl rfre egt TreGopdTrePrI agtruI agtotd ------------------- ---- ------------ ---- ---- --Tu re Tu re Fle as Fle as 0 0 0 0
----------------------------- -----Ds0 0000 0000 Atv/piie ik 2010 2011 cieOtm d Eald nbe F C 5:A0:48:0D:0So:d 00 00:98:D3:D4 lt0 02 0000 0002 Ds0 0000 0000 Atv/piie ik 1000 1001 cieOtm d Eald nbe F C 5:A0:38:0D:0So:c 00 00:98:D3:D4 lt0 02 0000 0001 Ds0 0000 0000 Atv/o-piie Eald ik 1010 1012 cieNnOtm d nbe F C 5:A0:39:0D:0So:.c00 00:98:D3:D4 ltv0 03 0000 0011 Ds0 0000 0000 Atv/o-piie Eald ik 2000 2002 cieNnOtm d nbe F C 5:A0:49:0D:0So:.d00 00:98:D3:D4 ltv0 03 0000 0012
We chose to ship a Snap-In, and not a module for compatibilit reasons. In this initial offering we needed to support customers still running PowerShell V1. However if ou so desire there is nothing stopping ou from making it a module ourself, to do so simple run the following.
#Udt tepmdl pt pae h soue ah $n:Soueah='0;1'- $n:Soueah ':PormFlsNtp\PO evPMdlPt { { f evPMdlPt, C\rga ie\eApMI' #Gnrt amdl mnfs eeae oue aiet NwMdlMnfs -ashu` e-oueaiet PsTr -ah':PormFlsNtp\POnam.s1 ` Pt C\rga ie\eApMI\tpppd' -oueeso '.'` MdlVrin 35
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 20/28
22/12/11
-UD(gi]:eGi(.ud ` GI [ud:Nwud)gi) -uhr$n:srae` Ato evuenm -opnNm 'eAp ` Cmayae Ntp' -oyih 'oyih ()21 Ntp. Alrgt rsre. ` Cprgt Cprgt c 01 eAp l ihs eevd' -ecito 'aaOTPDM ` Dsrpin Dt NA S' -oeSeleso '.'` PwrhlVrin 20 -oNtrmwrVrin'.'` DteFaeokeso 35 -omtTPoes'tppFra.sxl ` Frasorcs nam.omtp1m' -etdoue 'tppdl ` NseMdls nam.l' -oueorcs ' ` MdlTPoes ' -yeTPoes@)` Tpsorcs ( -eurdsebis@)` RqieAsmle ( -ieit@) FlLs ( #Sehwyu mdl i nwlse e o or oue s o itd GtMdl LsAalbe e-oue itvial #Uei s t Ipr-ouenam motMdl tpp
In fact the resulting module can be xcopy deployed. Meaning, if you simply copy the C:\Program Files\NetApp\MPIO\ntapmp folder to a valid modules folder on your administrative system, you can remotely manage the ONTAP DSM without installing anything! Simply import the module and away you go. Anyone running a previous version of the DSM should head on over to NOW and get it while its hot, we hope youre as pleased with the manageability, and performance weve included in this most recent release.
Permalink 386 Visualizaes 0 Comentrios Rtulos: powershell, mpio, windows_mpio, dsm, data_ontap_dsm, netapp_data_ontap_dsm, automation
VHD file utilities Space reclamation Windows disk and volume management File cloning
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 21/28
22/12/11
*Data ONTAP 8.1 (Cluster-mode) SSH setup Vfiler migration More complete Data ONTAP (7-mode) coverage Ne cmdlets: Copyoffload (3 cmdlets) Fcp (2 cmdlets) Fpolicy (1 cmdlet) Lun (2 cmdlets) Nameservice (3 cmdlets) Net (2 cmdlets) Radius (8 cmdlets) Secureadmin (1 cmdlet) Snapmirror (3 cmdlets) Snapshot (1 cmdlet) Vfiler (4 cmdlets) Wafl (1 cmdlet) Host File (2 cmdlet) Host Volume (8 cmdlet) Virtual Disk (4 cmdlet) Host Disk (4 cmdlet) Enhancements The Toolkit now offers more standardized data size inputs that may be specified as bytes or as string-formatted values with units. Cmdlets which change data size values (i.e. Set-NaLunSize) all accept absolute size values, positive or negative size increments, and positive or negative percentages. Get-NaSystemLog offers several improvements: better performance when -StartTime parameter is specified, correct -Follow switch behavior through a log rotate, -EventType and -Severity parameters accept arrays, and the cmdlet supports the snapmirror log. Add-NaHostIscsiTargetPortal and Connect-NaHostIscsiTarget now include -RadiusGenerate and RadiusVerify switches. Set-NaVfilerAddress now allows IP addresses to be configured without requiring the user to create an IpbindingInfo object. The Toolkit reports connection timeouts more clearly. Fi es Enabled monitoring by Invoke-NaSysstat of LUNs owned by a vfiler. Add-NaNetVlan now works with 8.0.2. The -Gvrp switch can be used to enable GVRP on created VLAN interfaces. Minor documentation issues.
Permalink 575 Visualiza es 0 Comentrios Rtulos: virtulization, powershell, powershell_toolkit, automation, dataontap
22/12/11
OnCommand Plug-in 3.0 for Microsoft(OCPM), formerl known as ApplianceWatch PRO, is an enterprise-class storage monitoring application that provides integration with Microsoft System Center Operations Manager(SCOM) and System Center Virtual Machine Manager(SCVMM) and enables administrators to monitor and manage and NetApp Storage. The following is a quick start guide for OCPM 3.0. Before getting started with OCPM however, please ensure that Microsoft SCOM and SCVMM are installed and configured. Make sure all installation requirements have been fulfilled and confirm proper functionality prior to proceeding with OCPM installation. Refer to the Microsoft documentation for SCOM, SCVMM, or Reporting for more details(http://technet.microsoft.com/enus/library/bb309428.aspx).
1. Download OnCommand Plug-in 3.0 for Microsoft from
https://now.netapp.com/NOW/download/software/appwatch_scom/3.0/(Registration Required).
2. Install OnCommand Plug-in 3.0 for Microsoft: 1. Run OnCommand Plug-in 3.0 for Microsoft executable on SCOM server. 3. Discover Network Devices: 1. Open SCOM, Administration, click Discovery wizard and discover Network
devices.
2. Make sure SNMP isset up appropriately on SCOM server and NetApp storage prior
to running NetworkDevice Discovery. Please refer to OnCommand Plug-in 3.0 for Microsoft Installation and AdministrationGuide for configuring SNMP.
4. Add NetApp storage controller: 1. After Network Device Discovery is complete, go to Monitoring, Discovered
Inventory (make sure Discovered Inventory scope is set to Management Server), select Data ONTAP:Add Controller.
5. Add NetApp storage credentials: 1. Select DataONTAP: Manage Controller Credentials and provide the controller
credentials in the credentials manager. The getting started demo at http://www.youtube.com/embed/ykeU2IZIRpA illustrates the above steps to install OCPM and also to add and discover a NetApp storage controller. 6. Enable Discovery:
1. Go to Authoring,Rules, Filter & Look For: Data ONTAP: Discovery Rule under
Management Server (not Data ONTAP Management server). Enable PRO and MetroCluster discovery if installed and configured.
2. Right click rule, select Overrides, Override the Rule, For all objects of class:
ManagementServer, select Override for Enabled and set Override Value to True."Save all OnCommand Plug-in 3.0 for Microsoft overrides to a new Management Pack. The demonstration on enabling discovery is available here: "http://www.youtube.com/embed/s9W5RGMI-Sk". 7. PRO Environments:
1. Install OnCommand Plug-in 3.0 for Microsoft Agent on all Hyper-V Parent Nodes
managed by SCVMM if monitoring is required by OnCommand Plug-in 3.0 for Microsoft. 8. Enable PRO tips:
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 23/28
22/12/11
1. From SCVMM Console, Administration, General, PRO Settings, Enable PRO tips.
PRO tips are covered in the OCPM virtualization demo available here: "http://www.youtube.com/embed/b7QD2f8r7yY"
Permalink 341 Visualizaes 0 Comentrios Rtulos: ocpm, netaapp_ocpm_3.0, ocpm_getting_started, ocpm_demo, ocpm_pro_tips, ocpm_discovery
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
24/28
22/12/11
Now the real fun began as we needed to script the creation of the VMs that would ultimatel leverage our newl cloned VHDs. For this we turned to an old friend PowerCLI, and whipped up a PowerShell script to provision the actual guest VMs.
Prm aa( $Mae='MV' VNm SH3 , $MKah='vdt0 SH0/MV3vd' VDPt [maa] MV3SH0.mk , $xrOtos= Etapin @'oio.ita_xc=hrwr"'yevsrcudv''as' {mntrvrulee'"adae;hprio.pi.0=fle ) Poes rcs { $ofg=NwOjc Vwr.i.itaMcieofgpc-rpry@ cni e-bet MaeVmVrulahnCniSe Poet { 'ae =$Mae nm' VNm 'eso'="m-8 vrin vx0" 'usI'="idw7evr4us" getd wnosSre6Get 'ie'=NwOjc Vwr.i.itaMcieieno-rpry@ fls e-bet MaeVmVrulahnFlIf Poet { 'mahae =$MKahslt)0 vPtNm' VDPt.pi([] 'ol'=NwOjc Vwr.i.olCniIf -rpry@ tos e-bet MaeVmTosofgno Poet { 'fePwrn =$re atroeO' tu 'feRsm'=$re atreue tu 'eoeusSady =$re bfrGettnb' tu 'eoeusSudw'=$re bfrGethton tu 'eoeusRbo'=$re bfrGeteot tu 'uCU'=2 nmPs 'eoyB =89 mmrM' 12 'lg'=NwOjc Vwr.i.itaMcielgno-rpry@ fas e-bet MaeVmVrulahnFaIf Poet { 'itaMusg'="n vrulmUae o" 'itaEeUae ="vn vrulxcsg' hO" 'pFaueak =NwOjc Vwr.i.itaMciepIIfSe -rpry cuetrMs' e-bet MaeVmVrulahnCudnopc poet @ { 'prto'="dt oeain ei" 'no =NwOjc Vwr.i.otpIIf -rpry@ if' e-bet MaeVmHsCudno poet { 'ee'=1 lvl 'c'="----:----:----:----" ex --:----:----:---H:--
'xrcni'=Frah(Oto i $xrOtosGtnmrtr) { etaofg oec $pin n Etapin.eEueao() NwOjc Vwr.i.pinau -rpry@ e-bet MaeVmotovle Poet { 'e'=$pinKy Ky Oto.e 'au'=$pinVle Vle Oto.au
'eiehne =@ dvcCag' ( NwOjc Vwr.i.itaDvcCniSe -rpry@ e-bet MaeVmVruleieofgpc Poet { 'prto'="d" oeain ad
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 25/28
22/12/11
NwOjc Vwr.i.itaDvcCniSe -rpry@ e-bet MaeVmVruleieofgpc Poet { 'prto'="d" oeain ad 'eie =NwOjc Vwr.i.itaDs -rpry@ dvc' e-bet MaeVmVrulik Poet { 'e'=-000 ky 1000 'otolre'=-2 cnrleKy 2 'ntubr =0 uiNme' 'aaiynB =4934 cpctIK' 1400 'akn'=NwOjc Vwr.i.itaDsFaVrBcignobcig e-bet MaeVmVruliklte2aknIf Poet @ rpry { 'ieae =$MKah flNm' VDPt 'ikoe ="esset dsMd' pritn" 'hnrvsoe'=$re tiPoiind tu 'oncal'=NwOjc Vwr.i.itaDvcCnetno-rpry cnetbe e-bet MaeVmVruleieoncIf Poet @ { 'trCnetd =$re satonce' tu 'once'=$re cnetd tu
$e =-3 ky 2 frah(nci @"ulc,iCIA,iCIB,CV) oec $i n (Pbi""SS-""SS-""S") { NwOjc Vwr.i.itaDvcCniSe -rpry@ e-bet MaeVmVruleieofgpc Poet { 'prto'="d" oeain ad 'eie =NwOjc Vwr.i.itaVxe3-rpry@ dvc' e-bet MaeVmVrulmnt Poet { 'e'=$eky ky'akn'=NwOjc bcig e-bet Vwr.i.itaEhreCrNtokaknIf -rpry@ MaeVmVrultentadewrBcigno Poet { 'eieae =$i dvcNm' nc 'oncal'=NwOjc Vwr.i.itaDvcCnetnocnetbe e-bet MaeVmVruleieoncIf Poet @ rpry { 'trCnetd =$re satonce' tu 'loGetoto'=$re alwusCnrl tu 'once'=$re cnetd tu 'drsTp'="eeae" adesye gnrtd 'aenaEald =$re wkOLnnbe' tu
22/12/11
$odr=GtVe -d'odrh-odrv' Fle e-iw I Fle-afle-m $odrCetV_ak$ofg $ol $ul Fle.raeMTs(cni, po, nl) }
Provisioning complete, it was time to get everything running. Since we were using PowerShell this was a superbly simple task. Leveraging the VIX integration and the Invoke-VMScript PowerCLI cmdlet we renamed all the hosts, and enabled PowerShell remoting, and then added everything to the domain.
$otrd =GtCeeta hsCes e-rdnil $usCes=GtCeeta Getrd e-rdnil GtV |FrahOjc { e-M oEc-bet $omn ='edmrnmcmue %optrae /eNm:0 /oc cmad nto eaeoptr cmuenm% Nwae{} Fre sudw - - 0 - $.ae hton r t ' f _nm Ivk-Mcit-uAyc-M$ ` noeVSrp Rnsn V _ -otrdnil$otrd ` HsCeeta hsCes -usCeeta $usCes` Getrdnil Getrd -cityePwrhl ` SrpTp oeSel -citet"nbePRmtn -oc" SrpTx Eal-Seoig fre Ivk-Mcit-uAyc-M$ ` noeVSrp Rnsn V _ -otrdnil$otrd ` HsCeeta hsCes -usCeeta $usCes` Getrdnil Getrd -cityeBt` SrpTp a -citet$omn SrpTx Cmad } GtV |FrahOjc { e-M oEc-bet $omn ='edmji {}/oansat.eapcm/sr:diitao cmad nto on 0 dmi:e-mntp.o uedAmnsrtr /asod:asod/Eot - $.ae pswrdpswr RBo' f _nm Ivk-Mcit-uAyc-M$ ` noeVSrp Rnsn V _ -otrdnil$otrd ` HsCeeta hsCes -usCeeta $usCes` Getrdnil Getrd -cityeBt` SrpTp a -citet$omn SrpTx Cmad }
At this point we had 16 Hyper-V hosts running on ESX, and were able to use our existing processes and tools to configure the cluster, provision storage, and create test VMs. All in all it took a little over 2 hours to provision a full cluster, and all the software required for a test run. As you ll see in the coming months this ability will enable us to more rapidly evolve our product offerings in the Hyper-V space. We share this not to brag, but because we practice what we preach. To us storage efficiency, virtualization, and cloud are not buzzwords; they re a skill set, and our experience build real world solutions for our customers enables us leverage that collective
https://communities.netapp.com/community/netapp-blogs/msenviro/blog 27/28
22/12/11
knowledge as we continue to innovation. We would have preferred to use Hyper-V, and thus be able to fully utilize our hardware, but fortunately we have a very deep roster at NetApp and had no trouble with vSphere. In fact had vSphere not worked we had several other hypervisors to try out. That said it did work, and being honest vSphere s ability to host a third party embedded hypervisor is quite impressive, and works surprisingly well!
553 Visualizaes
0 Comentrios
Permalink
3 16
Anterior Prximo
Contact Us How To Buy Feedback Careers Disk Utilization - Performance metrics and Subscriptions Privacy Policy Follow @netappcomTweet m unit 2011 NetApp Curtir Share
Videos
https://communities.netapp.com/community/netapp-blogs/msenviro/blog
28/28