Professional Documents
Culture Documents
Overview
NetApp Confidential
MODULE 1: OVERVIEW
1-1
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Explain the primary benefits of Data ONTAP
clustering
Identify the scope of Data ONTAP concepts
such as node virtual storage servers
(Vservers), administrative Vservers, and data
Vservers
NetApp Confidential
MODULE OBJECTIVES
1-2
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Access control
Audit policies
File-level and storage systems
Data management
Information lifecycle management
NetApp Confidential
1-3
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
CIFS
FCoE
NFS
iSCSI
pNFS
Storage Efficiency
Scalability
Performance scaling
Capacity scaling
Deduplication
Compression
Cost and
Performance
Thin provisioning
Management and
Ecosystem Integration
Flash Cache
Unified management
Solid-state drives
Secure multi-tenancy
Flash Pool
Multivendor
virtualization
FlexCache
Cloning
Operational
scaling
NetApp Confidential
1-4
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
1-5
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Scalability
SCALABILITY
Clustered Data ONTAP solutions can scale from 1 to 24 nodes, and are mostly managed as one large system.
More importantly, to client systems, a cluster looks like a single file system. The performance of the cluster
scales linearly to multiple gigabytes per second of throughput, and capacity scales to petabytes.
Clusters are built for continuous operation; no single failure on a port, disk, card, or motherboard will cause
data to become inaccessible in a system. Clustered scaling and load balancing are both transparent.
Clusters provide a robust feature set, including data protection features such as Snapshot copies, intracluster
asynchronous mirroring, SnapVault backups, and NDMP backups.
Clusters are a fully integrated solution. This example shows a 20-node cluster that includes 10 FAS systems
with 6 disk shelves each, and 10 FAS systems with 5 disk shelves each. Each rack contains a high-availability
(HA) pair with storage failover (SFO) capabilities.
1-6
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
A
B
B
R
B
G
1-7
Volume B and root Volume R each have two read-only mirror relationships, which enables read requests
to be spread across multiple volumes and nodes (the B mirrors) rather than taxing one volume (and node)
with all read requests. High-performance computing (HPC) applications often require scaling of read
throughput well beyond the write throughput.
Volumes A, C, D, E, F, G, and H provide scaled performance when applications are accessing all six
nodes. Because the volumes are distributed across six nodes, processing is spread across those nodes, but
all of the nodes are in a single namespace. Volumes D and E are mounted to C through junctions.
Likewise, volumes G and H are mounted to F.
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Scalability: Capacity
The ability to rapidly and
seamlessly deploy new
storage or applications or
both
Projects
No required downtime
A1 A2 A3 B1 B2 C1 C2 C3
A
A1
A3
A2
C2 B2
C C3
C1
B1
NetApp Confidential
SCALABILITY: CAPACITY
In the example on this slide, more capacity is needed for project B. Follow these steps to scale the capacity:
1. Add two nodes to make a 10-node cluster with additional disks.
2. Transparently move some volumes to the new storage.
3. Expand volume B in place.
This movement and expansion is transparent to client machines.
1-8
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Real-Time
Self-Managing
Flash Cache
Storage-level RAID-protected
cache
The Virtual
Storage Tier
PCI-e modules
Capacities of up to 2 TB
Flash Pool
A RAID-protected aggregate
A solid-state drive (SSD) tier
that is used as cache
A hard disk tier that is used as
storage
Hard Disk Storage
NetApp Confidential
1-9
NetApp flash PCIe modules improve performance for workloads that are random-read-intensive, which
reduces latency by a factor of 10 or more compared to hard disks. Flash Cache modules are available in
capacities of up to 2 TB and provide controller-based caching.
NetApp Flash Pool enables the caching of random read and write operations through the automated use of
SSDs, which enables the use of capacity-optimized hard disk technology across the majority of
application workloads. Flash Pool enables the creation of a Data ONTAP RAID-protected aggregate that
consists of a combination of hard disks and SSDs.
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Projects
A1 A2 A3 B1 B2 C1 C2 C3
B1
A3
C1
A1
C
C2
C3
B2
A2
NetApp Confidential
10
Transparently move volumes that are not project-A volumes to free up processing power on other nodes
Give project A dedicated resources
Move volumes as needed when project A stops being critical or if another project becomes critical
1-10
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Nondisruptive Operation
DataMotion for Volumes
NAS logical interface (LIF) migration
Storage failover (SFO)
NetApp Confidential
11
NONDISRUPTIVE OPERATION
Nondisruptive operation is a key feature of Data ONTAP clustering. Three critical components of
nondisruptive operation include DataMotion for Volumes (volume move), logical interface (LIF) migration,
and SFO.
1-11
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Node Vservers
Represent each physical node
Are associated with cluster LIFs, node management LIFs, and
intercluster LIFS
Administrative Vserver
Represents the physical cluster
Is associated with the cluster management LIF
Data Vservers
Are a virtual representation of a physical data server
Are associated with data LIFs
NetApp Confidential
12
1-12
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cluster Resources
Data
Network
mg1
lif4
lif1
lif7
lif5
lif2
lif8
lif6
lif3
HA
Interconnect
cl1 cl2
cl1 cl2
Cluster
Interconnect
aggr2
aggr1
cmg
lif15 mg1 lif16
lif12 lif13 lif14
lif9 lif10 lif11
aggr4
aggr3
n1aggr0
n2aggr0
n1vol0
n2vol0
Data Vservers:
vserverA
vserverB
vserverC
NetApp Confidential
13
CLUSTER RESOURCES
The example on this slide shows many of the key resources in a cluster: three types of Vservers (node, data,
and administrative), plus nodes, aggregates, volumes, and data LIFs.
1-13
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Logical
Nodes
Disks
Aggregates
Network ports
FC ports
Tape devices
Clusters
Volumes
Snapshot copies
Mirror relationships
Vservers
LIFs
NetApp Confidential
14
1-14
Volumes, Snapshot copies, and mirror relationships are areas of storage that are divided from aggregates.
Clusters are groupings of physical nodes.
Vservers are virtual representations of resources or groups of resources.
A LIF is an IP address that is associated with a single network port.
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
15
1-15
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Administrative Vserver
Cluster
Management
LIF
cmg
NetApp Confidential
ADMINISTRATIVE VSERVER
1-16
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16
Node Vservers
Data
Network
Network Ports
mg1
mg1
Cluster LIFs
lif1 lif2
lif1 lif2
aggr1
Cluster
Interconnect
aggr2
Node
Management
LIFs
aggr4
aggr3
Network
Ports
n1aggr0
n2aggr0
n1vol0
Aggregates
n2vol0
NetApp Confidential
NODE VSERVERS
1-17
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17
Data Vservers
Data LIFs
lif4
lif1
lif7
lif5
lif2
lif8
lif6
lif3
lif15
lif16
lif12 lif13 lif14
lif9 lif10 lif11
Volumes
Data Vservers:
vserverA
vserverB
vserverC
NetApp Confidential
DATA VSERVERS
1-18
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
Namespace
Volumes
Data LIFs (for client access)
Protocol servers: NFS, CIFS, FC, FCoE, and
iSCSI
NetApp Confidential
19
1-19
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
lif8
lif6
lif3
lif1 lif2
lif1 lif2
Node Vserver
aggr1
cmg
lif15 mg1 lif16
lif12 lif13 lif14
lif9 lif10 lif11
HA
Interconnect
Cluster
Interconnect
aggr2
Node Vserver
aggr4
aggr3
n1aggr0
n2aggr0
n1vol0
n2vol0
Data Vservers:
vserverA
vserverB
vserverC
NetApp Confidential
1-20
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20
Module Summary
Now that you have completed this module, you
should be able to:
Explain the primary benefits of Data ONTAP
clustering
Identify the scope of Data ONTAP concepts
such as node virtual storage servers
(Vservers), administrative Vservers, and data
Vservers
NetApp Confidential
MODULE SUMMARY
1-21
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
Exercise
Module 1: Overview
Time Estimate: 10 Minutes
NetApp Confidential
EXERCISE
Please refer to your exercise guide.
1-22
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22