CP ILT NATSPDNS REV01 - StudentGuide PDF
CP ILT NATSPDNS REV01 - StudentGuide PDF
CP ILT NATSPDNS REV01 - StudentGuide PDF
NETAPP UNIVERSITY
ATTENTION
The information contained in this course is intended only for training. This course contains information and activities that,
while beneficial for the purposes of training in a closed, non-production environment, can result in downtime or other
severe consequences in a production environment. This course material is not a technical reference and should not,
under any circumstances, be used in production environments. To obtain reference materials, refer to the NetApp product
documentation that is located at http://now.netapp.com/.
COPYRIGHT
2014 NetApp, Inc. All rights reserved. Printed in the U.S.A. Specifications subject to change without notice.
No part of this document covered by copyright may be reproduced in any form or by any meansgraphic, electronic, or
mechanical, including photocopying, recording, taping, or storage in an electronic retrieval systemwithout prior written
permission of NetApp, Inc.
TRADEMARK INFORMATION
NetApp, the NetApp logo, Go Further, Faster, ASUP, AutoSupport, Campaign Express, Customer Fitness, CyberSnap,
Data ONTAP, DataFort, FilerView, Fitness, Flash Accel, Flash Cache, Flash Pool, FlashRay, FlexCache, FlexClone,
FlexPod, FlexScale, FlexShare, FlexVol, GetSuccessful, LockVault, Manage ONTAP, Mars, MetroCluster, MultiStore,
OnCommand, ONTAP, ONTAPI, RAID DP, SANtricity, SecureShare, Simplicity, Simulate ONTAP, Snap Creator,
SnapCopy, SnapDrive, SnapIntegrator, SnapLock, SnapManager, SnapMirror, SnapMover, SnapProtect, SnapRestore,
Snapshot, SnapValidator, SnapVault, StorageGRID, Tech OnTap, and WAFL are trademarks or registered trademarks of
NetApp, Inc. in the United States and/or other countries.
Other product and service names might be trademarks of NetApp or other companies. A current list of NetApp trademarks
is available on the Web at http://www.netapp.com/us/legal/netapptmlist.aspx.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
TABLE OF CONTENTS
WELCOME .......................................................................................................................................................... 1
MODULE 1: NETAPP SOLUTIONS FOR SYSTEM ENGINEERS ................................................................. 1-1
MODULE 2: NETAPP DATA ONTAP FOUNDATION TECHNOLOGY ......................................................... 2-1
MODULE 3: DATA ONTAP VALUE-ADDED TECHNOLOGIES ................................................................... 3-1
MODULE 4: DATA ONTAP IN THE DATA CENTER ..................................................................................... 4-1
MODULE 5: DATA ONTAP SERVER AND APPLICATION INTEGRATION ............................................... 5-1
MODULE 6: NETAPP MANAGEABILITY TOOLS ........................................................................................ 6-1
MODULE 7: STORAGEGRID ....................................................................................................................... 7-1
MODULE 8: E-SERIES AND EF-SERIES STORAGE SYSTEMS ................................................................. 8-1
MODULE 9: NETAPP ALL-FLASH ARRAY PORTFOLIO ............................................................................ 9-1
MODULE 10: BASIC DESIGN TOOLS ........................................................................................................ 10-1
MODULE 11: DETAILED DESIGN TOOLS ................................................................................................. 11-1
MODULE 12: DATA COLLECTION AND ANALYSIS ................................................................................. 12-1
MODULE 13: NEXT STEPS: TOOLS AND RESOURCES FOR NETAPP ACCREDITED TECHNICAL
SALES PROFESSIONALS ........................................................................................................................... 13-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Designing NetApp
Solutions
Course ID:
CP-ILT-NATSPDNS-REV01
NetApp Confidential
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Classroom Logistics
Schedule
Start time
Stop time
Break times
Safety
Alarm signal
Evacuation procedure
Electrical safety
guidelines
Facilities
Food and drinks
Restrooms
Phones
NetApp Confidential
CLASSROOM LOGISTICS
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Course Objectives
By the end of this course, you should be able to:
Describe the core NetApp technologies,
products, and solutions needed to design a
customer solution
Use the major NetApp field tools to design a
customer solution
Create an integrated business solution
Locate NetApp field resources
NetApp Confidential
COURSE OBJECTIVES
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Afternoon
Module 4: Data ONTAP in the Data Center
Module 5: Data ONTAP Server and Application
Integration
Module 6: NetApp Manageability Tools
NetApp Confidential
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Afternoon
Module 9: NetApp All-Flash Array Portfolio
NetApp Confidential
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Afternoon
Module 12: Data Collection and Analysis
Module 13: Next Steps: Tools and Resources
for NetApp Accredited Technical Sales
Professionals
NetApp Confidential
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp University
http://www.netapp.com/us/services/university/
10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 1
NetApp Solutions for System
Engineers
NetApp Confidential
1-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Describe the current business trends that
influence your customers buying decisions
Describe the solutions that the NetApp shared
storage and dedicated storage infrastructures
provide
NetApp Confidential
MODULE OBJECTIVES
After this module, you should be able to describe the current business trends that influence your customers
buying decisions and the solutions that the NetApp shared storage and dedicated storage infrastructures
provide.
1-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
Overview of the NetApp Portfolio
NetApp Confidential
1-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
1-4
Cloud services, rather than in-house company resources will deliver more IT.
The amount of data your customers manage is growing rapidly, and they are asking how to manage big
data. They want to apply integrated analytics to these vast stores of data. As new approaches are created,
traditional analytics-oriented approaches break down. The new approaches generate application-level
decisions with big implications for storage infrastructures.
Mobile, hand-held devices such as iPhones, iPads, and Android devices are proliferating, and employees
are bringing them to work. When it comes to mobility, expectations of corporate IT are rising. Your
customers users want access to all of their information and applications through any device at any time.
The bring your own device trend is changing the way people think about storage architectures.
Flash technology presents one of the biggest opportunities for IT and for you. Flash changes the way
performance can be delivered from storage systems to applications.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Corporate
Data Centers
Cloud
Data Centers
Flash Arrays
E-Series
StorageGRID
NetApp Confidential
1-5
Were revolutionizing shared virtual infrastructure with clustered Data ONTAP, offering a unified
platform for SAN and NAS.
Our flash portfolio offers a suite of all-flash and hybrid (flash accelerated) arrays for ultraperformance
when it is needed.
For dedicated SAN workloads, where the data management is built into the application, our E-Series
solution offers a excellent price/performance ratio and high-capacity characteristics.
And we continue to advance our presence in the emerging market of object storage with our StorageGrid
solution running on E-Series.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Messaging
VDI
Hypervisor
NetApp Confidential
1-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E2700
Flash integration
E5400
E5500
Automated management
NetApp Confidential
1-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
1-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlashRay
All-Flash
Arrays
Hybrid
Arrays
Server
Storage
Flash
Cache
Virtual
Storage
Tier
for FAS
Flash
Pool
Server
SSD
Cache
SSD
Cache
for
E-Series
CapacityOptimized
Drives
NetApp Confidential
1-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10
1-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
Unbound Cloud: The NetApp Cloud
Strategy
NetApp Confidential
11
1-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
1-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
13
1-13
The universal cloud data platform provides a common fabric for storage and data management across all
cloud resources. The foundation for this platform is clustered DATA ONTAP.
Dynamic data portability across clouds means that your customer can move data and workloads with ease
across all instances of Data ONTAP in a multicloud environment.
Your customer has a broad range of choices for technologies, applications, and public cloud service
providers. NetApp will continue to provide an extensive array of choices for hybrid cloud operations and
support all major cloud operating systems, virtualization frameworks, and application deployment
models.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14
1-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Private Clouds
Features
Dedicated hosting and
management
Customer Considerations
IT efficiencies and lower costs
Reduced downtime
Opportunities for more strategic
workloads
Partnership with major cloud
management platforms
NetApp Confidential
15
PRIVATE CLOUDS
Private clouds provide a dedicated infrastructure that hosts, manages, and stores data. These resources are
shared across departments in a company, but they arent shared with other companies. A private cloud is a
viable next step for organizations that have already begun virtualizing and consolidating their storage
infrastructures and other IT resources.
Customers that provide viable private cloud opportunities want to lower costs and increase IT efficiencies.
They want to reduce planned and unplanned downtime and increase the reliability and security of their data
infrastructures. Because private cloud solutions are hosted behind an organizations firewall, customers often
consider them for strategic workloads. NetApp has partnerships with all the major cloud management
platforms and offers solutions that can be implemented with most existing infrastructures.
1-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Public Clouds
Features
Shared facilities provided by a
service provider
Ready and available in the
market
Self-service, pay-as-you-go
model
Customer Considerations
Easiest transition to the cloud
Quick scaling to meet changing
requirements
Appropriate for less missioncritical applications
Does not compete with NetApp
NetApp Confidential
16
PUBLIC CLOUDS
Public clouds host your customers data in a shared facility that is managed by a service provider. These
service providers are readily available in the market, and they frequently offer self-service, pay-as-you-go
models. Because the infrastructure is off-site and is not owned directly by your customer, public clouds can
offer an easy transition to the cloud and can quickly scale to meet the customers changing requirements. This
solution is often suggested for applications that arent mission critical. NetApp doesnt provide cloud services
and isnt in competition with service providers.
1-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Hybrid Cloud
Offers flexibility for future growth
Requires integration and management across
infrastructures
NetApp Confidential
17
HYBRID CLOUD
The hybrid cloud model offers your customers great flexibility and is ideal for organizations that are planning
for future growth. Hybrid cloud solutions require integration and management across private (on-premises)
and public (off-site) infrastructures.
1-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
18
1-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Customer Benefits
Cost savings
Ease of management
19
CUSTOMER BENEFITS
With NetApp cloud solutions, your customers will save money by paying for only the services and software
they use. Your customers will eliminate some of the complexities that come from licensing and billing for the
software and services associated with their IT infrastructures. They wont need to worry about replacing
obsolete hardware or software. In some cases, there are no installation or maintenance contracts to manage, no
hardware or software upgrades to implement, and no software licensing issues. With the flexibility and
scalability that this model can provide, end users can increase storage capacity on demand, deploy and
implement new services or software as needed, and increase data accessibility. Your customers will notice an
increase in productivity, not only for their IT departments, but for their entire organizations.
1-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20
1-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
NetApp Cloud Solutions
NetApp Confidential
21
1-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
22
1-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Management
Applications
Compute Pool
Fabric Pool
Storage Pool
NetApp Confidential
23
1-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Service elasticity
Seamless scaling
Storage efficiency
Performance
Pooled capacity
Recoverability
Availability
Security
Service efficiency
Intelligent caching
Unified architecture and
shared virtualized storage
Integrated data protection
Nondisruptive operations
Storage encryption, antivirus,
and SMT protection
Service automation and
analytics
24
1-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
1-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25
NetApp Confidential
26
26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
27
1-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexPod Converged
Infrastructures
NetApp Confidential
1-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28
NetApp Confidential
29
1-30
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexPod
30
1-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexPod
DataCenter
(Traditional FlexPod
Reference
Architectures)
FlexPod Select
(E-Series and Big Data
FlexPod Reference
Architectures)
Environment
Midsize
business and
branch office
Enterprise and
service
provider class
Technical and
highperformance
computing
Typical
workloads
Microsoft
Hyper-V,
VMware
Shared
platform
Leading
business
applications:
Microsoft,
Oracle, SAP
Big data
analytics,
Hadoop,
dedicated
workloads
Scale
Hundreds of
users
Thousands of
users
Thousands of
users
NetApp Confidential
31
FlexPod Express replaces ExpressPod and is for the midmarket and branch offices.
FlexPod DataCenter, for enterprises and service providers, is typically used as a shared application
platform.
FlexPod Select is for high-performance or large data capacity workloads, including big data analytics.
FlexPod software maintains a consistent advantage with this approach because all categories share the same
storage vendor, compute components, network architecture, and support within the single platform.
1-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 4
The NetApp Flash Portfolio
NetApp Confidential
32
1-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
33
1-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
All-Flash Arrays
Hybrid Storage
Traditional Array
EF-Series
Flash Cache
Flash Pool
FAS/V-Series
FlashRay
SSD Cache
E-Series
NetApp Confidential
34
1-35
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Capacity
Flash Only
All-Flash Arrays
Fastest access
Lowest $/IOPS
Highest $/GB
Server Cache
Hybrid Array
Low latencies for cache hits
Leverages HDD for capacity
Medium $/IOPS and $/GB
Traditional Array
Lowest $/GB
Highest $/IOPS
Slowest access
NetApp Confidential
35
1-36
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
IT efficiency increases
Lower $/IOPS
Less space and power
NetApp Confidential
36
1-37
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Fastest access
Lowest $/GB
Lowest $/IOPS
Highest $/IOPS
Highest $/GB
Performance (Latency)
Slowest access
Capacity
NetApp Confidential
37
1-38
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 5
E-Series Solutions
NetApp Confidential
38
1-39
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E-Series Systems
E2700
E5400
E5500
NetApp Confidential
39
E-SERIES SYSTEMS
From entry-class up to big data, E-Series systems provide high-performance computing environments with a
superior price/performance ratio for SAN.
Modularity is a key design criterion, so E-Series systems offer three different controllers and three sizes of
disk shelves. Multiple drive types and I/O interfaces meet customer needs from iSCSI for the entry customer
to InfiniBand for high-end. With these tunable systems, customers can adjust cache block sizes, RAID levels,
RAID groups, and segment sizes. They can optimize streaming performance for sequential, high-bandwidth
workloads, or optimize for random-transaction performance.
SSD Cache is the E-Series version of Flash Cache in FAS. The Dynamic Disk Pools feature automatically
minimizes the impact of drive failures, and it immediately adapts up to eight times faster than traditional
RAID. NetApp has shipped over 650,000 systems. Our newest model, the EF550 system, is the current leader
in bandwidth performance.
1-40
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2U/24 drives
2U/12 drives
NetApp Confidential
40
1-41
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage Architecture
E-Series storage systems support two storage architectures: traditional
RAID with volume groups and Dynamic Disk Pools (DDP) technology.
Both architectures are fully integrated with the SANtricity feature set.
E-Series SANtricity
RAID
Controller
Controller
Controller
Controller
Volumes / LUNs
Volumes / LUNs
Volume Groups
Hard Disks
NetApp Confidential
41
STORAGE ARCHITECTURE
For even more flexibility, E-Series systems support two storage architectures. One incorporates RAID and
traditional volume groups, and the other uses dynamic disk pools. The SANtricity feature set fully supports
both architectures.
1-42
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Describe the current business trends that
influence your customers buying decisions
Describe the solutions that the NetApp shared
storage and dedicated storage infrastructures
provide
NetApp Confidential
42
MODULE SUMMARY
Now that you have completed this module, you should be able to describe the current business trends that
influence your customers buying decisions and the solutions that the NetApp shared storage and dedicated
storage infrastructures provide.
1-43
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Knowledge Check
Module 1: NetApp Solutions for
System Engineers
NetApp Confidential
KNOWLEDGE CHECK
1-44
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43
NetApp Confidential
1-45
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44
NetApp Confidential
1-46
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
45
Module 2
NetApp Data ONTAP Foundation
Technology
NetApp Confidential
2-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Identify features and benefits of the Data
ONTAP operating system
Describe the functionality of the Write
Anywhere File Layout (WAFL), NVRAM, and
RAID-DP features
Describe the features of Data ONTAP
Snapshot technology
Describe the technologies associated with the
Data ONTAP virtualization layer
NetApp Confidential
MODULE OBJECTIVES
After this module, you should be able to identify the features and benefits of the Data ONTAP operating
system and describe the functionality of the WAFL file system and the NVRAM and RAID-DP features. You
should also be able to describe the features of Data ONTAP Snapshot technology and the technologies
associated with the Data ONTAP virtualization layer.
2-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
Data ONTAP Core Capabilities:
WAFL, NVRAM, and RAID-DP
NetApp Confidential
2-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Traditional Storage
NetApp Confidential
TRADITIONAL STORAGE
Traditional storage infrastructures are typically composed of multiple incompatible, often complicated storage
architectures. Integration between disparate architectures proves to be expensive and complex, which results
in independent application silos. These silos often cause performance issues, and because silos are inflexible,
unused storage cannot be reallocated to an area that is overprovisioned. Traditional storage architectures are
unreliable, unable to scale, and unable to accommodate the ever-increasing demands of todays business
environment.
2-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Messaging
VDI
Hypervisor
NetApp Confidential
2-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
The WAFL file system optimizes data placement and write performance.
By using uninterruptable power supplies, batteries, and flash memory, NVRAM makes systems
impervious to data loss caused by power failure.
RAID-DP provides double disk protection in the event of a disk failure.
Snapshot technology provides instant point-in-time backups.
And FlexVol volumes can be moved and managed independently from the underlying storage to make
thin provisioning possible, eliminating wasted storage capacity.
2-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-8
Customers can perform lifecycle operations without interrupting applications and upgrade controllers in
place, without copying data.
The unified, multi-tenant clustered storage platform provides storage efficiency and quality of service for
SAN and NAS in entry-level, midpoint, and high-end systems. NetApp Data ONTAP storage-efficiency
features include deduplication, compression, thin provisioning, cloning, and thin replication.
NetApp systems scale seamlessly, from a terabyte to tens of petabytes, and the Virtual Storage Tier
speeds overall IT performance.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp (Dynamic)
MetaLUNs
LUNs and
Files
FlexVol
Volumes
Logical
Layer
Physical
Layer
LUNs
Aggregate
RAID
Groups
RAID
Groups
Hard
Disks
Hard
Disks
2-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10
NetApp Confidential
11
2-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
12
2-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
13
2-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Anywhere on disk
Most of disk
Metadata location
Anywhere on disk
(except root inode)
Dedicated regions
Updates to existing
data or metadata
File system
consistency
Guaranteed by design
Crash recovery
Reboot, ready to go
Snapshot copies or
versions
By design
NetApp Confidential
14
2-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15
NVRAM Operation
Client
Storage System
Operation
Main
Memory
Net
Net
N
V
R
A
M
Main
Memory
+
ack
BATT
NetApp Confidential
16
NVRAM OPERATION
Each FAS controller contains a special chunk of RAM called NVRAM. In this case, NV means nonvolatile. It
is nonvolatile because it has a battery. If a problem occurs, from a sudden disaster that strikes the system to a
janitor tripping over the power cords, the data stored in NVRAM is not lost.
When data gets to a NetApp storage system, it is treated in the exactly the same way whether it came through
a SAN or NAS connection. As I/O requests come into the system, they first go to RAM. The RAM on a
NetApp system is used as in any other system; it is where the Data ONTAP operating system does active
processing. As the write requests come in, the operating system also logs them into NVRAM.
NVRAM is logically divided into two halves. As soon as WAFL fills up one half of NVRAM, WAFL forces
a consistency point to occur, and it writes the contents of that half of NVRAM to the storage media. A fully
loaded system performs back-to-back consistency points as it fills and refills both halves of the NVRAM.
Upon receipt from the host, WAFL logs writes in NVRAM and immediately sends an acknowledgment back
to the host. At that point, from the hosts perspective, the data has been written to storage. But in fact, the data
might be held in NVRAM temporarily. The goal of the WAFL file system is to write data in full stripes across
the storage media. To do this, it holds write requests in NVRAM while it chooses the best location for the
data, does RAID calculations, parity calculations, and gathers enough data to write a full stripe across the
entire RAID group.
2-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Main
Memory
Net
Net
N
V
R
A
M
Main
Memory
+
-
BATT
NVRAM is zeroed.
NetApp Confidential
17
2-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
18
2-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19
NetApp Confidential
20
2-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RAID Groups
RAID-DP
Data
Disks
Parity Dual-Parity
Disk
Disk
NetApp Confidential
21
RAID GROUPS
All Data ONTAP disks are organized into RAID groups. RAID groups provide parity protection against data
loss. Each RAID group consists of data disks, a parity disk (RAID 4), and a dual-parity disk (RAID-DP). A
double-parity RAID group must have at least three disks: one or more data disks, a parity disk, and a doubleparity disk. You can add disks to your RAID groups to increase usable disk space; however, you cannot
remove disks to reduce disk space.
If a data disk failure occurs in a RAID group, Data ONTAP replaces the failed disk with a spare disk. Data
ONTAP automatically uses parity data to reconstruct the failed disk's data on the replacement disk.
Meanwhile, Data ONTAP continues to serve data to clients by reconstructing data from the parity disk while
the new data disk is under construction. If a parity or double-parity disk failure occurs in a RAID group, Data
ONTAP replaces the failed disk with a spare disk and reconstructs parity for the new disk.
2-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Write
Chain
RAID
Stripe
Parity Drive
22
2-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DP
4
3
RAID-DP technology
protects against
any double-disk
failure.
2
7
16
NetApp Confidential
2-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23
Disk Capacity
% Overhead Data Parity / Protection
12.5%
7
1
12.5%
7
1
12.5%
14
2
12.5%
14
2
50%
8
8
56.25%
14
NetApp Confidential
18
24
2-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
25
2-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
Snapshot Technology
NetApp Confidential
26
2-26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot Copies
A point-in-time image of the file
system:
Aggregate and volume levels
System-scheduled, manual, or
application-integrated
Foundation for many other NetApp
data protection technologies
Virtually zero performance impact
Up to 255 per volume
No license required; always
available on any Data ONTAP
system
NetApp Confidential
27
SNAPSHOT COPIES
NetApp Snapshot copies are a key technology that provides a wide range of savings in space and cost. In fact,
NetApp Snapshot copies are the most space-efficient snapshots in the industry. While other snapshot features
perform full copies of the data, NetApp Snapshot copies capture only the changes across the data, reducing
the need for a full copy. This translates into very significant savings in storage; in fact, Snapshot copies can
use 80 percent less capacity than competing products.
A Snapshot copy is a point-in-time image of the file system. Snapshot copies can be created at the aggregate
level and the volume level. Storage administrators can schedule for regularly occurring Snapshot copies or
manually create a Snapshot copy. Snapshot management is integrated in such products as SnapManager and
SnapDrive. Creating a Snapshot copy has almost zero performance impact. Data ONTAP supports up to 255
Snapshot copies per volume. Snapshot technology is the foundation of many other NetApp data protection
technologies.
2-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Blocks
on the Disk
A
A
B
B
C
C
Snapshot
Copy 1
NetApp Confidential
28
2-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
B1
Blocks in
LUN or File
Blocks
on the Disk
A
A
B1
B
C
C
C
B1
No data movement
Copies pointers only
A
B
C
Snapshot
Copy 1
Snapshot
Copy 2
NetApp Confidential
29
2-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
C2
Blocks in
LUN or File
Blocks
on the Disk
B1
C2
C
C
B1
C2
B1
Snapshot Snapshot
Copy 1
Copy 2
Create Snapshot 2.
Continue writing data.
Create Snapshot copy 3.
Simplicity of model:
Best disk utilization
Fastest performance
Snapshot
Copy 3
NetApp Confidential
30
2-30
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapRestore Software
Reverts an entire volume back to the
moment the Snapshot copy was made
Instantaneous
Consumes no additional storage space
Later Snapshot copies are lost
Most commonly used to restore an
NetApp Confidential
31
SNAPRESTORE SOFTWARE
SnapRestore software reverts an entire volume back to the moment that the Snapshot copy was made. This
operation is instantaneous and consumes no additional storage space. Any later Snapshot copies are lost. It is
as if you went back in time, when the later Snapshot copies have not yet happened. The most common use of
SnapRestore is to restore an entire volume. However, SnapRestore can be used to restore a single file.
Volume-level FlexClone is a transparent, writable layer that sits in front of a Snapshot copy. Like the
Snapshot on which it is based, the FlexClone volume simply points to any shared data in the source volume,
so the only new storage capacity needed is for unique changes stored for each cloned copy.
2-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
The Data ONTAP Virtualization
Layer
NetApp Confidential
32
2-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
RG 1
RG 2
33
2-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlexVol2
RG 1
FlexVol2
FlexVol1
RG 2
FlexVol2
FlexVol1
FlexVol1
NetApp Confidential
34
2-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
35
2-35
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Identify features and benefits of the Data
ONTAP operating system
Describe the functionality of WAFL, NVRAM,
and RAID-DP features
Describe the features of Data ONTAP
Snapshot technology
Describe the technologies associated with the
Data ONTAP virtualization layer
NetApp Confidential
36
MODULE SUMMARY
Now that you have completed this module, you should be able to identify the features and benefits of the Data
ONTAP operating system and describe the functionality of the WAFL file system and the NVRAM and
RAID-DP features. You should also be able to describe the features of Data ONTAP Snapshot technology
and the technologies associated with the Data ONTAP virtualization layer.
2-36
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Knowledge Check
Module 2: NetApp Data ONTAP
Foundation Technology
NetApp Confidential
KNOWLEDGE CHECK
2-37
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37
NetApp Confidential
2-38
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38
NetApp Confidential
2-39
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39
NetApp Confidential
2-40
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40
Module 3
Data ONTAP Value-Added
Technologies
NetApp Confidential
3-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Describe the pain points that each Data
ONTAP value-added technology addresses
Explain the benefits of each Data ONTAP
value-added technology
Describe the technical features and
functionality of each Data ONTAP valueadded technology
State the use cases for each Data ONTAP
value-added technology
NetApp Confidential
MODULE OBJECTIVES
By the end of this module, you should be able to explain the benefits of each Data ONTAP value-added
technology and describe the pain points that each Data ONTAP technology addresses. You should also be
able to describe the features and functionality of these technologies and state their use cases.
3-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
Data ONTAP Value-Added
Technologies for Storage Efficiency
NetApp Confidential
3-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Operating budgets
Power is expensive, with hard limits in many
locations.
Cooling is difficult with compact IT equipment such
as blade servers.
Enterprise data centers cost millions and require
years to build.
NetApp Confidential
3-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Software Efficiencies
Deduplication
Compression
FlexClone software
NetApp Confidential
SOFTWARE EFFICIENCIES
NetApp deduplication technology removes duplicate blocks on the disk to reduce physical space use. NetApp
compression technology replaces repeated patterns in data blocks with pointers to reduce physical space use.
NetApp FlexClone technology provides instantaneous point-in-time read/writable copies that consume space
only for changed blocks.
These technologies can be used individually or combined to reduce the cost of purchasing and maintaining
storage across application storage tiers.
3-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
3-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
3-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
3-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Traditional Approach
FlexClone Technology
NetApp Confidential
10
3-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data mining
Virtual server provisioning
Virtual desktop provisioning
VM VM VM
VM VM VM
NetApp Confidential
11
3-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
Data ONTAP Value-Added
Technologies for Performance
NetApp Confidential
12
3-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Performance Challenges
Continuously growing IT in the business world results in
short supply in the data center.
Power
Space
Cooling
NetApp Confidential
13
PERFORMANCE CHALLENGES
As IT continues to grow in the business world, three fundamental resources are in short supply in many data
centers: power, space, and cooling. Many workloads no longer require as many disks to satisfy capacity, but
instead, additional disks are required to guarantee performance. These additional disks create more space and
power requirementsand with more power, more cooling is required. This situation reinforces the need to
satisfy performance and capacity separately.
3-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
End-to-End Cache
SSD Cache
Server
Flash Pool
Storage
NetApp Confidential
14
3-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
15
3-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
+ Flash
Cache
Flash
Cache
Configure with FC
or SAS Disks Only
Inefficient use of
storage capacity, power,
and space
NetApp Confidential
16
3-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
17
3-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
High-capacity (SATA)
Performance (SAS)
NetApp Confidential
18
3-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Mission-critical applications
Read sequentially
Database applications
FAS22xx systems2
More cache per node than the
Flash Cache feature maximum is
needed.
Preserving PCIe slots for other
cards is important.
NetApp Confidential
19
3-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Flash Flash
Cache Pool Comment
Database Applications
Exchange 2010
SharePoint
Virtual Desktop
ASIC Design*
SW Development*
20
3-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
21
3-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
HA
SVM1
SVM2
22
3-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage objects
SVMs, volumes, LUNs, files
Policies
Behaviors to apply to a policy group
I/O or data throughput limits
Workload
Throughput (IOPS or MBps) to a storage
object
NetApp Confidential
23
3-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Set workload
performance by
file, volume, SVM,
or LUN
NetApp Confidential
24
3-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
Secure Multi-Tenancy
NetApp Confidential
25
3-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Secure Multi-Tenancy
Secure virtual partitions within a shared
physical storage environment
Tenants
Business Units
Customers
Applications
Departments
26
SECURE MULTI-TENANCY
The term tenant refers to an organizational unit within a shared infrastructure that is used to group objects
or entities with common requirements and administrative isolation.
Multi-tenancy refers to the ability of a computing, network, or storage infrastructure to support multiple
simultaneous users. These users, referred to as tenants, might actually be customers, business units,
departments within an organization, or individual applications.
Secure multi-tenancy (abbreviated as SMT) is the use of secure virtual partitions within a shared physical
storage environment for the purpose of sharing the physical environment among multiple distinct tenants. For
instance, a storage service provider might configure a storage array in such a way that each of three different
customers is provisioned a certain portion of the arrays disk capacity and network resources. In a secure
multi-tenant environment, each customer has access only to the resources that are explicitly provisioned to
that customer. The customer would not have access to other customers data or even be aware of the existence
of the other customers or the fact that they share a common physical array. Secure multi-tenant environments
should also provide a means to ensure that no single tenant consumes so much of the shared performance
capability as to affect the other tenants.
3-26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Reduced cost
Secure isolation
NetApp Confidential
27
3-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
VMware
VMware
Securely isolate
shared virtual server,
network, and storage
resources
Ensure consistent
QoS at each layer
Manage each
resource pool
independently as a
dynamic IT asset
HR BU APP
NetApp Confidential
28
NETAPP SECURE MULTI-TENANCY SOLUTION: JOINT SOLUTION WITH BEST -INCLASS TECHNOLOGY
NetApp, Cisco, and VMware built the industrys first end-to-end secure multi-tenancy solution. The result of
this initiative is an end-to-end solution that integrates all of the technology elements needed for a secure cloud
infrastructure. With secure isolation of server, network, and storage resources, customers can move with
confidence from the traditional approach of application silos to the fully virtualized and service-oriented
approach.
The individual components from each vendor represent best-in-class technology. More importantly, each
technology layer has been integrated to provide secure isolation and a consistent level of QoS while
maintaining all of the scalability and flexibility that each layer offers independently.
3-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
CRM
VDI
SQL
ERP
Tenant A
Sales
SVM
CRM
VDI
SQL
ERP
VDI
SQL
ERP
Tenant B
Tenant C
HR
SVM
Engineering
SVM
NetApp Confidential
29
3-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
30
3-30
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Business Benefit
Consolidation of
file services
Application
hosting
Data mobility
Data protection
and disaster
recovery
NetApp Confidential
31
3-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Describe the pain points that each Data ONTAP
value-added technology addresses
Explain the benefits of each Data ONTAP valueadded technology
Describe the technical features and functionality of
each Data ONTAP value-added technology
State the use cases for each Data ONTAP valueadded technology
NetApp Confidential
32
MODULE SUMMARY
Now that you have completed this module, you should be able to determine the pain points that are addressed
by each Data ONTAP value-added technology and explain the benefits of each Data ONTAP value-added
technology. You should also be able to describe the features and functionality of each Data ONTAP valueadded technology and state their use cases.
3-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Knowledge Check
Module 3: Shared Storage
Infrastructure: Value-Added
Technologies
NetApp Confidential
KNOWLEDGE CHECK
3-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33
NetApp Confidential
3-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34
NetApp Confidential
3-35
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
35
NetApp Confidential
3-36
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36
NetApp Confidential
3-37
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37
NetApp Confidential
3-38
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38
NetApp Confidential
3-39
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39
NetApp Confidential
3-40
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40
Module 4
Data ONTAP in the Data Center
NetApp Confidential
4-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Describe the features and functions of the FAS hardware
family
NetApp Confidential
MODULE OBJECTIVES
4-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
App
OS
Hypervisor
App
OS
Hosts
Network
Protocols
Protocols
Data
Management
Data Management
Data Layout
Data Layout
FAS
V-Series
Local V-Series
3rd Party
Disk
Disk
Remote
V-Series
FAS
Local Disk
Data ONTAP
Storage Services
Third-Party Disk
Storage Hardware
NetApp Confidential
4-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
4-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
NAS, SAN, and Hardware
NetApp Confidential
4-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NAS
Enterprise
SAN
Departmental
iSCSI
FC
Enterprise
NAS
Departmental
Corporate
Dedicated
Ethernet
SAN (Block)
LAN
NAS (File)
Data ONTAP
FAS
NAS
Two different methods are used to access dedicated storage systems: NAS and SAN. NAS devices are filestorage devices (such as Data ONTAP FAS or V-Series systems) that can be accessed through a network, so
multiple users can share files. Even if a server is down, users can access data in NAS devices. Data ONTAP
systems are easy to manage, easy to deploy and expand, and ideal for businesses with lots of file servers and
archived data. CIFs and NFS protocols access NAS data in individual files. NAS also supports a combination
of both protocols, which enables file sharing across Windows, Linux, and UNIX environments.
4-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SAN
Enterprise
SAN
Departmental
iSCSI
FC
Enterprise
NAS
Departmental
Corporate
Dedicated
Ethernet
SAN (Block)
LAN
NAS (File)
Data ONTAP
FAS
SAN
A SAN transfers data between computer systems and storage devices by using the same SCSI protocol that a
local disk would use. SAN data is accessed at the block level and presented in the form of a LUN, which
appears to the operating system as a direct-attached drive. With SAN, the SCSI protocol can move large
blocks of data from one place to another by using FC, FC over Ethernet, or iSCSI as its transport. A use case
would be a server application accessing its data, such as large databases or email applications.
4-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
4-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1,920 TB
480 Drives
6 TB
VST Flash
FAS2220
240 TB
60 Drives
800 GB
VST Flash
FAS2240
576 TB
144 Drives
800 GB
VST Flash
FAS/V3220
1,920 TB
480 Drives
1.6 TB
VST Flash
FAS8040
2,880 TB
720 Drives
12 TB
VST Flash
FAS/V3250
2,880 TB
720 Drives
4 TB
VST Flash
FAS8060
4,800 TB
1200 Drives
18 TB
VST Flash
FAS/V6220
4,800 TB
1,200 Drives
12 TB
VST Flash
FAS/V6250
5,760 TB
1,440 Drives
18 TB
VST Flash
FAS/V6290
5,760TB
1,440 Drives
24TB
VST Flash
Scale
NetApp Confidential
4-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10
4-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11
4-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
12
4-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
V-Series Systems
NetApp Confidential
13
V-SERIES SYSTEMS
V-Series systems, which match distributed enterprise systems, address the challenges of heterogeneous
customer environments. The systems provide a single data management architecture that a customer can use
to manage an entire environment. V-Series open storage controllers act as a front end for existing customer
storage assets, enabling customers to obtain the benefits of NetApp systems across their environments. VSeries systems also help customers maintain their investments in equipment from vendors such as IBM, HDS,
HP, and EMC by providing Data ONTAP features to third-party vendors. With V-Series systems, your
customers can build on their current storage investments as they expand their capabilities. Clustered Data
ONTAP supports FAS and V-Series in the same cluster.
4-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
14
4-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
Data ONTAP Data Protection and
Disaster Recovery
NetApp Confidential
15
4-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Disaster
Recovery
SnapMirror
Async
Availability
SnapVault
Software
Local
Backup
Snapshot
Copies
MetroCluster
Software *
SnapLock Software*
Operational
Backup
Compliance Offline
16
4-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault Software
NetApp Confidential
SNAPVAULT SOFTWARE
4-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17
SnapVault
18
4-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault Solution
Reliable Backups and Simple Restores
Fast, efficient backups
Block-level increments forever
Reliable restore
End-user browse and restore for specific data
Full-volume restore
Simplified management
Policy-based selective transfer of Snapshot copies
Integrated into OnCommand Unified Manager
Usable replicas
Read-only destinations or read-write, instantaneous,
space-efficient FlexClone volumes
NetApp Confidential
19
4-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Software
NetApp Confidential
SNAPMIRROR SOFTWARE
4-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20
Intercluster or intracluster
21
4-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
VM1 VM2
VM3
Site
Failure
SnapMirror
Data
Data
Data
Data
Data
Virtual
Storage
Partition
NetApp Confidential
Data
Virtual
Storage
Partition
22
4-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
VM1 VM2
VM1 VM2
VM3
Site
Failure
Design focused on
shared architectures:
secure multi-tenancy
across virtual storage
partitions
SnapMirror
Data
Data
Data
Data
Data
Virtual
Storage
Partition
Data
Virtual
Storage
Partition
NetApp Confidential
23
4-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapMirror Storage-Efficiency
Technologies
Minimizes network bandwidth consumption
Is configurable per SnapMirror relationship
Uses the industry standard gzip algorithm
Write
Network Traffic
Compressed
Network Traffic
Uncompressed
Compressed data
across the wire
NetApp Confidential
24
4-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapVault
Destination is read-only
End-user browse and restore for specific data
Selectively mirrors Snapshot copies based on policies
NetApp Confidential
25
SnapMirror destination volumes can be converted to writable volumes and into production systems.
SnapMirror source and destination volumes can be resynchronized in reverse direction. Reverse
resynchronization requires that both volumes have a common SnapMirror Snapshot copy.
SnapVault has a read-only destination. Customers who need disaster recovery capabilities can create a
FlexClone volume of the Snapshot copy on the SnapVault destination to gain read and write access to the
data.
With SnapVault, NFS and CIFS end users have browse and restore capability to mount backups and restore
files. Finally, SnapVault selectively mirrors Snapshot copies by using policy-based copies to the secondary
destination.
Why would your customer use SnapVault instead of SnapMirror?
SnapVault enables asymmetric Snapshot retention on both primary and secondary volumes for backups.
However, if your customer is looking for a disaster recovery solution, SnapMirror will be part of that solution.
4-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
MetroCluster
Software
NetApp Confidential
METROCLUSTER SOFTWARE
4-26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26
NetApp Confidential
27
4-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Fabric-Attached MetroCluster
Metropolitan-Area Distances
Up to 100 km *
NetApp Confidential
28
4-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you should be able to:
Describe the features and functions of the FAS hardware family
Describe the technical features of Data ONTAP data protection
and disaster recovery products such as SnapVault and
SnapMirror
NetApp Confidential
MODULE SUMMARY
4-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
29
Knowledge Check
Module 4: Data ONTAP in the Data
Center
NetApp Confidential
KNOWLEDGE CHECK
4-30
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30
NetApp Confidential
4-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31
NetApp Confidential
4-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32
4-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33
NetApp Confidential
4-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34
NetApp Confidential
35
4-35
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
App
OS
Hypervisor
App
OS
Hosts
Network
Protocols
Protocols
Data
Management
Data Management
Data Layout
Data Layout
FAS
V-Series
Local V-Series
3rd Party
Disk
Disk
Remote
V-Series
FAS
Local Disk
Data ONTAP
Storage Services
NetApp Confidential
36
4-36
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module 5
Data ONTAP Server and
Application Integration
NetApp Confidential
5-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Determine the customer challenges that can
be addressed by integrating NetApp
technologies with partner technologies
Describe the technical features and
functionality of each integration solution
NetApp Confidential
MODULE OBJECTIVES
5-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
5-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
5-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
NetApp Solutions for Server and
Desktop Virtualization
NetApp Confidential
5-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
5-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
5-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
5-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
5-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Recovery
Deduplication
Cloning
Disaster recovery
NetApp Confidential
10
5-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11
5-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
12
5-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
13
5-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Supported Hypervisors
NetApp Confidential
14
SUPPORTED HYPERVISORS
The most current list of supported hypervisors can be viewed by using the Interoperability Matrix tool.
5-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
SnapManager Manageability
Software
NetApp Confidential
15
5-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapManager Software
NetApp Confidential
16
SNAPMANAGER SOFTWARE
Products such as SnapManager software empower application administrators to perform day-to-day tasks
such as protecting and provisioning data without depending on the storage administrator for regular requests.
The integrated data management approach automates the underlying storage management processes and
integrates them into the job responsibilities of the data administrators, application administrators, database
administrators, and systems and backup administrators to enable true data management.
SnapManager software is available for several application environments: SnapManager for Exchange Server,
SnapManager for SharePoint Server, SnapManager for SQL Server, SnapManager for Oracle, and
SnapManager for SAP.
5-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
17
5-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Cloning for testing and development: SnapManager software is integrated with NetApp FlexClone
software. With FlexClone software, fast, automated, and space-efficient clones are created. These clones are
ideal for testing and development environments. They provide complete isolation from the production
environment and can be used for the secondary or disaster recovery site and for testing, developing, and
reporting. Because these clones are based on Snapshot technology, there is little to no impact on capacity and
performance.
Easy administration: With SnapManager software, productivity is improved through streamlined processes
and the automation of common administrative tasks. The easy-to-use UI mimics the familiar look and
functions of Windows tools.
Simplified backup and restores: NetApp SnapManager with Snapshot and SnapRestore technology enables
the backup and restore of data in minutes. For most versions of SnapManager software, an administrator can
back up and restore the entire database or restore only specific files. Backups and restores are automated from
the primary and secondary storage sites.
5-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
18
5-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
19
5-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
Data Protection: SnapProtect Unified
Backup Solution and Snap Creator
Framework Software
NetApp Confidential
20
5-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapProtect Unified
Backup Solution
NetApp Confidential
5-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
Microsoft Exchange
Microsoft SQL Server
DB2 (UNIX and Linux)
Oracle (UNIX and Linux)
SAP on Oracle (UNIX and Linux)
Microsoft Active Directory
Microsoft SharePoint
NetApp Confidential
22
5-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Backup
Catalog
VMware
Exchange
MS / SQL
SharePoint
NAS File
Services
Files on NAS,
host mount
LUNs, or VMDKs
SAP
DB2
Oracle
Hyper-V
Unified granular restores from Snapshot copies, SnapVault backup copies, or tape
Tape
Multi-Tiered Backup and Disaster Recovery
Non-NetApp to
NetApp for select
Support
hosts and apps
OC 5.x
NetApp
Snapshot
copies
OC 6.x
Block-level transfer to
7-Mode SnapVault
target
Thin Replication
NetApp
Storage
Efficiency
Tape Support
Thin Replication
NetApp Confidential
23
5-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SnapProtect
Server
SnapVault
SnapMirror
NAS Data
45 days
App Data
Replicated
Snapshot
Copies
Tape Copy
Management
App-Consistent
Snapshot Copies
Virtualization
Tape Library
NetApp Confidential
24
5-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
25
5-26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
5-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26
27
5-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
28
5-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Backup Management
of Entire Environment
Data Protection
Admin
App/Sys/Storage
Admins
SnapManager
Snap Creator
Framework
SnapProtect
D2D2T backup
Long-term retention
Centralized management
Production test/dev
Catalog, tape
Short-term retention
Controller-based licensing
NetApp to NetApp
CommVault
Symantec
IBM
Syncsort
Any to NetApp
NetApp Confidential
29
5-30
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Determine the customer challenges that can
be addressed by integrating NetApp
technologies with partner technologies
Describe the technical features and
functionality of each integration solution
NetApp Confidential
MODULE SUMMARY
5-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
30
Knowledge Check
Module 5: Data ONTAP Server and
Application Integration
NetApp Confidential
KNOWLEDGE CHECK
5-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
31
NetApp Confidential
5-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32
NetApp Confidential
5-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33
Module 6
NetApp Manageability Tools
NetApp Confidential
6-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
List the products in the OnCommand software
suite
Describe the features and capabilities of each
product in the OnCommand manageability
suite
Describe the features and capabilities of
AutoSupport and My AutoSupport
NetApp Confidential
MODULE OBJECTIVES
6-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
For multivendor
storage: Insight
System Manager
Unified Manager
Workflow Automation
Performance
Manager
Balance
NetApp Confidential
6-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Product Description
Licensing
System Manager
No cost
Unified Manager
No cost
Workflow
Automation
No cost
Performance
Manager
No cost
Balance
Controller-based
pricing
Capacity-based
pricing
Insight
NetApp Confidential
6-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
And OnCommand Performance Manager provides performance monitoring and root-cause analysis of
clustered Data ONTAP environments.
For customers who want to gain cross-domain visibility of the entire IT infrastructure (physical, virtual, and
cloud), NetApp offers OnCommand Insight. OnCommand Insight discovers all your customers assets,
including NetApp E-Series systems, Data ONTAP systems, and third-party storage. It correlates usage to
applications and business entities to provide complete application-to-storage mapping. Insight is a powerful
tool for configuration and change management. When changes are not in line with policies, customers are
alerted to the violation or potential vulnerabilities and can perform root-cause analysis to quickly resolve
issues and minimize downtime. Insight consists of four integrated modules that are priced independently.
6-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
Managing the Data ONTAP Storage
Infrastructure
NetApp Confidential
6-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand
System Manager
NetApp Confidential
6-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
6-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand
Unified Manager
How can customers simplify the complexity of managing multiple Data ONTAP systems?
Automated monitoring and alerting for Data ONTAP complex storage environments
NetApp Confidential
6-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
6-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Unified Manager
Advanced Monitoring and Alerting
Workflow monitoring:
Results:
Dashboard to summarize
and categorize capacity,
protection, and availability
issues
Guidance for
troubleshooting capacity
issues
Drill-down information for
a deeper understanding of
issues
Enhanced event and alert
functionality
NetApp Confidential
10
6-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11
6-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
How can my customers automate their manual storage processes without being
How can customers enable cloud services without adding more resources?
Challenge
OnCommand
Workflow
Automation
NetApp Confidential
12
6-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Workflow Automation
Delivering Automation and Flexibility
Key Features
UI
Automates manual,
repeatable processes
Flexibly executes storage
processes based on
customers needs
Enables storage experts to
define and adjust processes
Enables customized
resources to be selected and
integrated with other IT
systems
NetApp Confidential
13
6-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
14
6-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Easy-to-Use Portal
Key Features
Execute workflows easily
Select from workflows organized by categories
NetApp Confidential
15
EASY-TO-USE PORTAL
The OnCommand Workflow Automation portal provides a simple way for operators to execute workflow.
Little training is required. Users can preview workflows, then execute them immediately or schedule them for
later execution.
This is the portal from an operators point of view. The user can see if any step has failed and can take a
corrective action. On the Execution tab, the operator can access logs and verify the status of workflow
execution.
6-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Results
Provision, migrate, or
decommission storage
Set up a new virtualization
environment
Set up storage for an
application
Set up FlexPod software or
virtual desktops
Perform storage cloning
Conduct a centralized
activation of NetApp
SnapManager software
NetApp Confidential
16
6-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
17
6-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand
Balance
NetApp Confidential
18
6-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Results
Troubleshoot performance
with:
Automatic incident
detection
Root cause analysis
Alerting
Resolution advice
NetApp Confidential
19
6-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
20
6-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand
Balance
NetApp Confidential
21
6-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand Balance
Key Features
Results
VM
Troubleshoot issues
What is misaligned?
Server
Storage
App
Optimize performance
Predict problems
NetApp Confidential
22
ONCOMMAND BALANCE
OnCommand Balance provides information that administrators can use to proactively or reactively address
performance issues regarding virtualization, clusters, FlexPod hardware, and cloud environments.
Balance helps administrators troubleshoot issues. Like competitor products, Balance provides metering. But
Balance also provides actionable information. Balance can detect potential problems, alert the administrator to
the causes of the problems, and suggest how to fix them. For example, if Balance detects that SVM blocks are
misaligned across LUNs, it identifies the SVM workloads that are slowing down (called the "victims") and
the workloads that are monopolizing resources (called the "bullies").
Balance helps administrators optimize performance. Using key performance indicators, Balance provides
information about response time, performance health, and disk utilization. Balance helps users decide where
to put SVMs and applications for optimal performance and helps users troubleshoot performance problems in
minutes. The unique features of Balance span all domains: applications, servers, networking, and storage.
Balance helps users predict problems and troubleshoot failures quickly and accurately. Administrators can
analyze the causes of problems before they lead to failures.
6-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
23
6-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
OnCommand Insight for Multivendor
Storage
NetApp Confidential
24
6-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand
Insight
NetApp Confidential
25
6-26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand Insight
Discover
Assure
Perform
Plan
NetApp Confidential
26
ONCOMMAND INSIGHT
OnCommand Insight 100 percent agentless technology is composed of four modules on a single platform:
Discover, Assure, Perform, and Plan.
Each module addresses a specific customer need, and implementation of these modules requires a NetApp
Professional Services engagement.
Discover is a mandatory prerequisite for Assure, Perform, and Plan, and it is not offered on its own. All
modules are licensed by terabyte of raw capacity.
6-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand Insight
Discover
Key Features
Provides cross-domain
visibility to assets
Identifies your customers
entire inventory (including
NetApp FAS and
E-Series storage systems)
Integrates all of the
OnCommand Insight
elements
NetApp Confidential
27
6-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand Insight
Assure
Key Features
Results
NetApp Confidential
28
6-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand Insight
Perform
Insight Perform tracks
compliance with performance
service-level objectives.
Results
Disk Utilization
Response Time
and IOPS
Performance Impact
on Applications
NetApp Confidential
29
6-30
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
OnCommand Insight
Plan
Insight Plan automatically
calculates chargeback.
Results
NetApp Confidential
30
6-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Licensing Requirements
License required
Based on capacity for multivendor environments
NetApp Confidential
31
LICENSING REQUIREMENTS
OnCommand Insight does require a license. It is priced based on capacity by terabyte (for multivendor storage
environments).
6-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
AutoSupport
NetApp Confidential
LESSON 3: AUTOSUPPORT
6-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
32
My AutoSupport
NetApp Confidential
33
6-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Key Features
Phone-home
mechanism
NetApp Confidential
34
6-35
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
My AutoSupport
Key Features
View
Results
Timeline-based events
Health check
recommendations
Performance trends
Sends content to
NetApp
NetApp Confidential
35
MY AUTOSUPPORT
My AutoSupport is a web-based support tool that extends the capability of the AutoSupport system.
Customers can view timeline-based events, health-check recommendations, reference configuration
comparisons, and the AutoSupport message history for individual NetApp systems. Customers can also roll
up views for entire sites and entire organizations.
This example shows the configuration summary, fitness assessment, storage efficiency summary, and
performance trend analysis for multiple sites.
6-36
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
AutoSupport Usage
NetApp and Partner Usage
Customer
Environments
Assessment
and
Optimization
AutoSupport Messages
Weekly or Event-Driven
(HTTPS or Email)
NetApp Storage
System
Automatic
Case Creation
AutoSupport
Database
Customer
Messages
(Email)
Reports:
Technical
Global Advisor,
CTQ,
Engineering
NetApp
Synergy
(sizing and
modeling)
NetApp Confidential
36
AUTOSUPPORT USAGE
This chart shows AutoSupport usage. On the left side are customer systems. Messages about the health of a
system are triggered on a weekly basis. Events also trigger messages. Customers can receive email
notifications when automated support tool messages are generated. Messages to NetApp can be sent by
HTTPS or email SMTP. After NetApp receives a message, it processes and stores the message in a data
warehouse. Then cases are automatically created and parts are automatically dispatched (which has long been
popular with customers). NetApp also uses AutoSupport data to provide assessment and optimization services
to customers, for Technical Global Advisor and Critical to Quality reporting, and in the enterprise business
intelligence reporting system for analysis. The NetApp Synergy presales and post sales tool also uses
AutoSupport data for sizing and quoting. The My AutoSupport portal is the primary AutoSupport application.
Customers, partners, and internal users can access the portal from the NetApp Support site.
6-37
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Identify customer challenges that the NetApp
OnCommand software suite solves
List the products in the OnCommand software
suite
Describe the technical features and
capabilities of each OnCommand tool
NetApp Confidential
MODULE SUMMARY
6-38
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
37
Knowledge Check
Module 6: Manageability Tools
NetApp Confidential
KNOWLEDGE CHECK
6-39
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38
NetApp Confidential
6-40
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39
6-41
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40
Provision storage
Set up a new virtualization environment
Set up storage for an application
Set up reports to reflect chargeback
Set up service paths
NetApp Confidential
6-42
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41
6-43
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42
NetApp Confidential
6-44
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43
NetApp Confidential
6-45
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44
Module 7
StorageGRID
NetApp Confidential
MODULE 7: STORAGEGRID
This module introduces StorageGRID software and explains how it powers the NetApp Distributed Content
Repository solution. You learn the technical basics of StorageGRID software, the basic concepts involved in
the NetApp Distributed Content Repository solution design, and the resources for you to explore more about
StorageGRID and the NetApp Distributed Content Repository solution.
7-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Describe the challenges of distributed content
repositories
NetApp Confidential
MODULE OBJECTIVES
7-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Intelligent Management
Cost-Effective Infrastructure
Compliant Retention
NetApp Confidential
Intelligent management
Global access and effective retrieval
Reliable data protection
Cost-effective infrastructure
Compliant retention
Intelligent Management
IT teams serve different user groups that have unique requirements for access and reliability. To effectively
manage very large distributed repositories, IT teams need a storage infrastructure that intrinsically manages
content from multiple sources that is distributed across different geographies.
Global Access and Effective Retrieval
It is a complex enough task to manage billions of objects that were created over periods of years or decades.
However, finding the data that you need when you need it is a daunting task without effective tools. Content
distribution, global access control, and end-user performance become more difficult as content has to be
managed from multiple sources across different geographies.
7-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
Remote sites that use virtual machines or smaller systems to store minimal local data
Large datacenters that retain a full set of datasets
All management of these sites is done automatically with policies, metadata information, and intelligent
caching. No administrator intervention is required.
The StorageGRID solution uses metadata-based management for data classification and access:
Metadata-based access to data simplifies how applications interact with storage. You do not need to search
using a file name. You simply search for information such as:
7-5
Mortgage documents
Customer: John Doe
Account number 123456
And so forth
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SITE 1
SITE 1
SITE
APPLICATIONS
APPLICATIONS
APPLICATIONS
APPLICATIONS
CIFS
NFS
SGAPI1
CDMI 2
CIFS
NFS
SGAPI
CDMI
CIFS
NFS
SGAPI
CDMI
CIFS
NFS
SGAPI
CDMI
1. StorageGRID
Application
Programming
Interface
NetApp E-Series Storage Systems
Tape
2. Cloud Data
Management
Interface
Standard
NetApp Confidential
7-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Reliable Data Protection: StorageGRID provides business continuity, even in the event of disasters, through
multisite content federation, enabling users meet their SLAs with confidence. Configurations can be designed
for resilience against one or multiple simultaneous faults, even entire site losses and regional disasters.
StorageGRID is suitable for single data centers or multi-data-center deployments with many sites across the
globe. In addition, you can leverage StorageGRID features to associate rich metadata at the object level. You
can create highly granular storage policies to implement appropriate levels of recovery-time objectives and
recovery point objectives based on data value.
Cost-Effective Infrastructure: StorageGRID policy-driven storage management enables you to migrate data
onto the appropriate storage tier based on metadata, to store high-value, low-latency data on highperformance drives and migrate to lower-cost disks and (eventually) to tape, as business needs and policies
dictate. Integrated object-level encryption means that sensitive data can be protected through the entire
lifecycle, including storage on tape.
Compliant Retention: With StorageGRID, metadata can be used to promote policy decisions that affect
retention in ways that are not possible with traditional storage systems. The ability to add rich metadata to
nontextual objects, such as images and videos, enables sophisticated content movement and access controls.
In addition, StorageGRID integrates with NetApp storage systems to provide object-level encryption to
enhance overall security within a corporate environment as well as to support multi-tenant environments for
service providers.
7-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
Massively parallel transaction engine with: Integrated load balancing, transaction multi-thread pipelining
Global access: Local and remote access, NFS, CIFS file services interfaces, multiple file system shares
and multiple profiles per gateway, native HTTP object interface with API compression for reduced
bandwidth consumption
API services: Object store, retrieve, and query, object metadata attachment, comprehensive metadata
query
Versioned file recovery: Access to multiple previous versions of files; Can be enabled or disabled for
individual profiles; Full audit support for previous versions of files
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
7-9
Comprehensive performance feeds: Access throughput; Replication throughput; Time to first byte; Time
to policies achieved;
Support for synthetic transactions: Demonstrate SLAs; Measure transaction round-trip time; Separate
WAN, storage, gateway times
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Metadata-Based
Management
Business
Innovation
Support
StorageGRID
Always-On
Data
Availability
Federated
Storage
NetApp Confidential
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Healthcare Organizations
NetApp Confidential
Financial institutions process and archive financial transactions and millions of customer check and
deposit images every day.
Insurance companies manage large amounts of policy data and retain copies of insurance claims and
related photos for years to support litigation.
Telecommunication and cable companies store customer usage and billing records for long periods of
time and offer growing libraries of downloadable media content to their subscribers.
7-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NAS
Protocols
Object Ingest
and Retrieval
HTTP RESTful Protocol / CDMI*
Metadata Tagging and Query
Policy-Driven
Data Placement
7-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
CDMI Overview
Cloud Data Management Interface
What is CDMI?
CDMI is an interface for interoperable
transfer and management of data in a cloud storage
environment.
Site 1
Vendor1
Private
Vendor2
Public
Site 2
NetApp Confidential
10
7-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Resources
Netapp.com
Support.netapp.com
StorageGRID Documentation
StorageGRID Grid Primer
StorageGRID Administrator Guide
StorageGRID Documentation Map
NetApp Confidential
11
RESOURCES
You can find up-to-date resources for the NetApp Distributed Content Repository solution and StorageGRID
software on Netapp.com.
To learn more about StorageGRID software, download the StorageGRID Grid Primer and StorageGRID
Administrator Guide from the NetApp support site. From the support site, you can access the StorageGRID
Documentation Map, which provides a quick reference to determine which document contains the
information that you need.
For help with StorageGRID engagements, contact [email protected]
Reseller partners and customers might not have full access to these resources.
7-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you should
be able to:
Describe the challenges of distributed content
repositories
Describe how StorageGRID enables the NetApp
Distributed Content Repository solution to address
the challenges
List the key functionalities and benefits of
StorageGRID
Describe StorageGRID use cases
Access resources to help you use StorageGRID and
the NetApp Distributed Content Repository solution
NetApp Confidential
MODULE SUMMARY
7-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
Knowledge Check
Module 7: StorageGRID
NetApp Confidential
KNOWLEDGE CHECK
7-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13
NetApp Confidential
7-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14
NetApp Confidential
7-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15
Module 8
E-Series and EF-Series Storage
Systems
NetApp Confidential
8-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
NetApp Confidential
MODULE OBJECTIVES
8-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
E-Series Storage Systems
NetApp Confidential
8-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Corporate
Data Centers
Cloud
Data Centers
Flash Arrays
E-Series
StorageGRID
NetApp Confidential
To do this, NetApp offers a rich portfolio of solutions to address shared infrastructures and dedicated
workloads in both NAS and SAN environments.
8-4
The clustered Data ONTAP operating system revolutionizes shared virtual infrastructure and offers a
unified platform for SAN and NAS.
The NetApp flash portfolio provides a suite of all-flash and hybrid (in other words, flash-accelerated)
arrays for ultraperformance when it is needed.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Flash Arrays
E-Series
Clustered Data ONTAP
for Shared Infrastructure
StorageGRID
NetApp Confidential
8-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E-Series
Customer Challenges
Challenge
E-Series
How can they maintain flexibility to scale from small to enterprise environments?
The E-Series solution is a SAN option that delivers superb application uptime,
flexibility to scale, and proven performance.
NetApp Confidential
The E-Series solution was designed from the ground up to be a simple storage system. For customers with
scale-up SAN requirements, E-Series systems provide best-in-class price to performance value. The E-Series
solution also delivers enterprise-grade reliability and ease of use.
8-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E-Series
System Highlights
Entry-class through enterprise-class block storage
for superior price and performance for SAN, where
the application drives the data management
Easy installation, low maintenance, and affordability
Modular design: Choice of shelves, drives, and I/O
Tunable performance: IOPS and bandwidth
E2600
E2700
E5400
E5500
NetApp Confidential
8-7
E-Series systems are tunable: You can adjust cache block sizes, RAID levels, RAID groups, and segment
sizes.
E-Series systems optimize streaming performance for sequential, high-bandwidth workloads, or optimize
for random-transaction performance.
The NetApp Solid-state drive (SSD) Cache feature is the E-Series version of Flash Cache intelligent
caching in FAS.
Dynamic Disk Pools technology automatically minimizes the impact of drive failures, immediately
adapting up to eight times faster than traditional RAID.
More than 650,000 systems have shipped; the E5500 is the current leader in bandwidth performance.
The AutoSupport support tool is available for the E-Series product line.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Requires no services
Provides flexible
configurations that
enable iSCSI, FC, and
SAS
Uses Dynamic Disk
Pool technology
NetApp Confidential
8-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Offers integrated
management
Provides a full suite of
network connectivity
Enables you to set it
and forget it
NetApp Confidential
8-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10
8-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E2600
E2700
E5400
E5500
Interfaces (4)
DE1600
DE5600
DE6600
SAS
iSCSI
FC
InfiniBand
(IB)
Disks (3)
SSD
SAS
NL-SAS
NetApp Confidential
11
Entry-level
Workgroup
Departmental
Data center
High-performance
E-Series storage systems provide block-level storage. To provide file-level storage, customers combine
servers with E-Series storage systems.
8-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E-Series Controllers
24-GB cache memory
E5500
E5400
E2700
E2600
12
E-SERIES CONTROLLERS
The four E-Series controller models are the E5500, E5400, E2700, and E2600.
E5500
E5400
E2600
Is an entry-level controller
Has a 6-gigabit (Gb) SAS system
Targets small to medium-sized business markets and workloads
The entry-level E2700 controller offers more features and host interface ports than the E2600.
All four E-Series controllers (E2600, E2700, E5400, E5500) can be installed into any of the three disk
shelves, the 2U/12-drive (DE1600), 2U/24-drive (DE5600), or 4U/60-drive (DE6600). Guide your customer
by performance levels across the E-Series family and not physical size when choosing hardware.
8-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
DE5600
DE1600
4U/60 drives
2U/24 drives
2U/12 drives
Maximum shelf
bandwidth
NetApp Confidential
13
8-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
E-Series Modularity
Controllers:
Disk
Enclosures
E2600
E2700
E5400
E5500
DE1600
(2U/12 drive)
E2612
E2712
E5412
E5512
DE5600
(2U/24 drive)
E2624
E2724
E5424
E5524
DE6600
(4U/60 drive)
E2660
E2760
E5460
E5560
3.5 only
2.5 only
2.5 or 3.5
NetApp Confidential
14
E-SERIES MODULARITY
The table displays an overview of the NetApp Branded E-Series models. You can use the table to streamline
configurations and ordering and manufacturing operations. The systems handle an intermix of single drive
types and sizes (for example, the SSD Cache feature). The drive offerings are the same across the entire ESeries line (E2600, E2700, E5400, E5500). You should base the drive choices on the shelves (DEx600) and
not the controllers (Exx00).
The E-Series is a single-unit high-availability design. The robust E-Series design features dual controllers,
power supplies, cooling, and no single point of failure or service. E-Series supports remote mirroring to
protect against site failure.
8-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Target Workloads
High-Performance Computing
Workloads
General-Purpose Computing
Workloads (Small to Midsize)
Dedicated, application-driven
workloads
Simulation
Modeling
Research
High-performance file
systems
Bandwidth-intensive
streaming applications
Transaction-intensive
workloads
Distributed content
repositories
NetApp Confidential
15
TARGET WORKLOADS
E-Series storage systems address wide-ranging solution requirements. These storage systems support highperformance file systems and bandwidth-intensive streaming applications.
Three types of controller modules, three expansion shelves, and multiple drive types allow custom
configurations that are optimized to meet performance and capacity requirements.
E2600
Entry system
Scales to 192 drives, 768 terabytes (TB) (which is achievable only with 12-disk enclosures; the 4-TB disk
is 3.5 inches)
E2700
E5400
Midrange performance
Scales to 384 drives, 1.5 petabytes (PB)
E5500
8-15
HPC performance
Scales to 384 drives, 1.5 PB
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
8-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16
Server
SSD
Cache
CapacityOptimized
Drives
NetApp Confidential
17
8-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
SANtricity Features
NetApp Confidential
8-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
NetApp Confidential
8-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19
SANtricity Features
Enterprise-Class Features in Midsize Storage
Thin Provisioning
Storage utilization
improved up to 35% with
no overprovisioning
Enterprise Replication
Cost-effective enterprise-class
disaster recovery of data with
FC and IP replication
Enhanced Snapshot
References
More precise recovery point
objectives and faster
recovery
NetApp Confidential
20
SANTRICITY FEATURES
The SANtricity storage management software provides standard software features that support storage system
operation.
These features require users to set up and configure details before use. The features that are displayed here are
managed features in that they require user input to be effective. Some features (such as enhanced Snapshot
references and enterprise replication) require significant user interaction, and some features (such as Dynamic
Disk Pool technology) require very little interaction. However, all of the managed features require the user to
perform some additional action to fully implement the feature.
Managed features may also limit the number of objects that the features support, such as the available number
of partitions, Snapshot references, or volume copies, which vary by storage system model.
8-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
24-drive pool
NetApp Confidential
21
DDP simplifies protection by removing the complexity of configuring RAID groups and allocating hot
spares.
Utilization is improved by dynamically spreading data, parity, and spare capacity across all drives in a
pool, which reduces performance bottlenecks due to hot-spots.
If a drive failure occurs, DDP enables a return to an optimal state significantly faster than RAID6, while
reducing the performance impact during the reconstruction of a failed drive.
DDP offers greater protection from multiple drive failures by prioritizing the reconstruction of the most
critical segments.
Seven patents have been submitted for this technology.
NOTE: DDP is an optional configuration that may be used alongside existing RAID configurations. This
enables users to select the best RAID level for the workload.
8-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23 24-drive pool
NetApp Confidential
8-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22
24 23-drive pool
NetApp Confidential
8-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23
Maintain business
SLAs despite
a drive120
failure.
100
Optimal
Acceptable
DDP
RAID 6
Business
Impact
Performance
Business Impact
RAID
Time
DDP
2.5
Days
60
20
Hours
96 Minutes
99% Exposure
Improvement
1.3
Days
40
More than 4
Days
80
(Estimated)
300GB Drive 900-GB Drive
2-TB Drive
3-TB Drive
NetApp Confidential
24
8-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SSD Cache
Is easy to set up and requires
no management
Server
Application Dataset
Improves application
response time
Reduces cost, power, and
footprint
Enables you to start with one
SSD and grow as needed
CapacityOptimized
Disks
Storage
Array
NetApp Confidential
25
SSD CACHE
SSD Cache is a system-wide resource that uses solid-state drives (SSDs) as a level-two read cache. SSD
Cache is easy to set up and requires no management:
You specify the SSDs and identify which volumes can have their data staged onto the SSDs.
From there, the controllers move the data into and out of the SSD disks.
Data from the selected volumes is copied (in other words, promoted) to the Intelligent Cache Tiering
(ICT) SSDs as they are accessed from the host.
Over time, more read requests are serviced by ICT, greatly improving application response times.
Using SSDs in this manner also significantly reduces the cost of deploying SSD arrays.
SSD Cache enables you to start with one SSD and add more SSDs, to a maximum of 5 terabytes worth of
SSDs. SANtricity software provides built-in tools to help you determine the potential benefits of ITC and
define the optimal number of SSDs to use for your application and environment.
SSD Cache is easy to use
The controllers use an intelligent algorithm to promote data to the SSDs. Solutions from other vendors require
you to make a decision when pinning data into the SSD. With ICT, the intelligence in the array
automatically decides how much data to store in the SSDs, based on usage.
ICT is efficient and flexible
Data does not move back and forth between tiers. Data is promoted only when it is hot, and data is not
demoted when it is cold. This process is managed by the controllers.
8-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SSD Cache
Improves Application Response
IOP Performance
8/3/2012
Profile 3
With SSD
Steady
Cache
Profile 2
No SSD
Baseline
Cache
Profile 1
0
500
1000 1500
IOPS
NetApp Confidential
2000
2500
26
8-26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Logical (No
Actual Disk
Snapshot Group Capacity)
Base
Volume
Write to Base
Original Data
Repository
Physical Disk
Capacity
Physical Disk
Capacity
NetApp Confidential
27
8-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Copy-on-Write Example
A
Base Volume
Snapshot
Repository
NetApp Confidential
28
COPY-ON-WRITE EXAMPLE
After the original data block is copied to the repository, the block is overwritten on the base volume. The
actual Snapshot image is created by combining the repository and the base volume.
When the repository of a Snapshot volume is nearing the fill point, an alert is issued to the storage system. By
default, this alert is issued when the repository is 75% full; however, you can adjust this level as needed. You
can increase the capacity of the repository when you receive the alert. You can configure each Snapshot
volume independently.
8-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Base
Volume
Snapshot
Image
Snapshot
Volume
Snapshot
Image
Repository
Repository
NetApp Confidential
29
8-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Consistency Groups
Snapshot Images of Multiple Volumes
A consistency group:
Is a collection of
base volumes
Enables
simultaneous
Snapshot images of
multiple volumes
Supports
applications that
span multiple
volumes
NetApp Confidential
30
8-30
A consistency group is a collection of base volumes in your storage system. These base volumes, which
are the source of a Snapshot image, are called member volumes of a consistency group.
A consistency group creates simultaneous Snapshot images of multiple volumes. This guarantees
consistent copies of a collection of volumes at a particular point in time. For example, you can create a
consistency group to make a synchronized Snapshot image of several volumes that are in different
volume groups or disk pools in a storage system.
The consistency group mechanism is ideal for applications that span multiple volumes, for example, a
database application with the logs on one volume and the database on another volume.
A member volume is either a thin volume in a disk pool or a standard volume in a disk pool or volume
group.
When you add a member volume to a consistency group, the system automatically creates an associated
member repository and a Snapshot group for the member volume.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Thin Provisioning
Problem and Solution
Problems:
Guessing how much storage applications really need
Purchasing disks based on overprovisioning estimates
Emergency out-of-space activities
Stranded storage
Free
Allocated
Used
Used =
Allocated
C
B
A
NetApp Confidential
Savings
31
8-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Data
Provisioned
Capacity
(4 GB to 64 TB)
Provisioned
Capacity
Quota
NetApp Confidential
Warning
Threshold
32
8-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
8-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
33
SANtricity Replication
Volume Copy
A volume copy is a full copy of a base volume to another within a
disk system. (A volume copy is also known as a clone.)
The primary uses of a volume copy are:
Consists of a full PiT data set:
Is available for analysis,
mining, or testing
Production
Server
Analysis
Server
Original
PiT
Clone
Copy
NetApp Confidential
34
8-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SANtricity Replication
Remote Volume Mirroring
Storage-based data replication that is designed to
provide ongoing replication of a volume from one
system to another
Two mirroring modes:
Synchronous
Asynchronous
Mirror over FC or IP
Primary uses:
Perform disaster recovery
Centralize backup data
Centralize data
mining and analysis
SAN and
WAN
Volume
A
Mirror
A
Cross
Mirroring
Mirror
B
NetApp Confidential
Volume
B
35
8-35
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Synchronous Mirroring
Write operations are sent to the remote system
before the status is returned to the host.
Synchronous mirroring:
Guarantees that data matches at all times
Requires a fast link between sites
1. A write
comes in
from a host.
3. The status is
returned to
the host.
Local
Remote
2. The write is copied to a
remote system.
NetApp Confidential
36
SYNCHRONOUS MIRRORING
In its main mode, synchronous mirroring sends new data to the remote system before returning the status of
any incoming write operation. In this manner, data at the two sites is always exactly the same. If the local
system is unable to complete the transfer, the local system can either break the mirror relationship or reject the
I/Os, based on the users choice. To maintain the mirror without unduly slowing down the local I/O,
synchronous mirroring requires a very fast connection between storage systems.
8-36
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Asynchronous Mirroring
Write operations are sent to the remote
system at scheduled intervals.
Asynchronous mirroring:
Can use lower-speed connections
Makes data differences predictable
1. A write
comes in
from a host.
Remote
4. Changed data is sent to a
remote system at a
scheduled time.
NetApp Confidential
37
ASYNCHRONOUS MIRRORING
The asynchronous mirroring feature operates differently. All changes on the local volume are logged and
tracked. After a certain time, all the changes are sent to the remote system as a background process. Because
this transfer is not tied to the local I/O, it never impacts application performance. Therefore, the feature can
use much slower or longer connections between storage systems, such as iSCSI.
Although the local and remote volumes almost never are perfectly matched, the differences between the
volumes are a function of the time interval between transfers. Thus the differences are consistent and
predictable.
8-37
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Drive Encryption
Data is made secure at the basic level (the hard drive) and
is protected throughout the drives lifecycle:
Covers most data exposures and vulnerabilities all at once
NetApp Confidential
38
DRIVE ENCRYPTION
Drive Encryption is the only premium feature that is available at an additional charge to E-Series customers.
Users often are unable to control the security of disk drives, which can be misplaced, sent off-site for service
or repair, or disposed of. The SANtricity Drive Encryption feature combines local key management and drivelevel encryption for comprehensive data security. Data is protected throughout the drives lifecycle without
affecting storage system performance or ease of use.
Drive Encryption prevents unauthorized access to the data on a full-disk encryption (FDE)capable drive that
is physically removed from a storage array. Controllers in the storage array use a shared security key, and
secure drives provide access to data only through a controller with the correct security key. Drive security is a
premium feature of the storage management software, and it must be enabled by using a premium feature key
attained from NetApp.
The drive security feature enables FDE-capable drives to encrypt data during writes and to decrypt data
during reads. When a secure volume group or a Dynamic Disk Pool (DDP) is created from security-capable
drives, the drives in that volume group or pool become security enabled. When a security-capable drive has
been security enabled, the drive requires the correct security key from a controller to read or write the data.
All drives and controllers in a storage array share the same security key for read/write access.
8-38
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
EF-Series Storage Systems
NetApp Confidential
8-39
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
39
EF-Series
Customer Challenges
Challenge
EF-Series
How can customers drive greater speed and responsiveness from their applications?
NetApp Confidential
40
8-40
Matches the performance of two full racks of hard drives, or 1,000 spinning disk
Requires just two rack units, thus reducing footprint, power, and cooling requirements by up to 95%
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
I/O offload
Shared storage provides tremendous economic value to customers. The NetApp offering of FAS and the Data
ONTAP OS is the best in the market. Yet sometimes I/O-intensive workloads negatively affect shared storage
environments by consuming valuable compute resources. In many cases, these are temporary workflows (such
as scratch space or swap space); they dont require the efficiency and protection features that are provided by
shared storage. The EF-Series enables you to offload the I/O-intensive workloads that affect latency and user
experience the most. The resulting combined solution delivers improved performance and responsiveness
with headroom on the shared storage platform, enabling additional growth.
8-41
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
EF-Series
NetApp Flash Array Highlights
Enterprise-class storage that is designed for
performance-driven applications with
submillisecond latency requirements
NetApp Confidential
41
8-42
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
EF550
NetApp Confidential
42
EF550
The EF550 is available for customer purchase. The specifications are displayed in the table.
The EF-Series all-flash array is ideal for enterprise accounts that want to drive greater speed and
responsiveness from the I/O-intensive workloads that control key business operations, such as OLTP, OLAP,
business intelligence, and virtualization.
For instance, the EF-Series platform currently supports:
8-43
Fast databases
Virtual desktop environments
Genomic research
Accelerated HPC metadata
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
I/O Offload
Free core storage of I/O-intensive workloads
that consume valuable shared resources
2 Racks
Down
to 2U
Overprovisioning Takeout
Elimination of overprovisioning through IOPS
density to dramatically reduce costs
NetApp Confidential
8-44
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43
Module Summary
Now that you have completed this module, you
should be able to:
MODULE SUMMARY
8-45
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44
Knowledge Check
Module 8: E-Series and EF-Series
Storage Systems
NetApp Confidential
KNOWLEDGE CHECK
8-46
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
45
NetApp Confidential
8-47
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
46
E2600
E2700
Descriptor
Entry-level
6-Gb SAS
system
E5400
Midrange
performance
NetApp Confidential
8-48
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
47
NetApp Confidential
8-49
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
48
NetApp Confidential
8-50
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
49
NetApp Confidential
8-51
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
50
NetApp Confidential
8-52
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
51
Module 9
NetApp All-Flash Array Portfolio
NetApp Confidential
9-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
List the components of the NetApp all-flash array
portfolio
MODULE OBJECTIVES
9-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
FlashRay
Is a completely new architecture
Offers new hardware and new software
Targets the version 1 release for mid2014
NetApp Confidential
Ultra-high performance
Sustained low latency
Enterprise Reliability, Availability, Security (RAS)
Worldwide support
The AutoSupport support tool
The EF-Series leverages high-performance E-Series controller technology and streamlined SANtricity storage
OS. This combination, which has been proven in the worlds most demanding and complex computing
environments, brings together extreme performance and enterprise-grade reliability to create a system
optimized for database-driven applications where responsiveness is critical. And its SANtricity software
combines streamlined firmware, extensive configuration flexibility, custom performance tuning, online
administration and complete control over data placement to power a system designed to deliver consistent,
low latency performance.
FlashRay is a new architecture that utilizes new hardware and new software. The version 1 release of
FlashRay is targeted for mid-2014.
9-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
EF-Series
Performance-Optimized Platform
Optimized software:
Streamlined OS that is ideally suited for flash
Highly efficient with minimal instructions per I/O
Optimized hardware:
Fast and wide internal bus
Hardware-based parity calculations
Proprietary target and initiator drivers
9-4
Its speed enables it to manage large numbers of small transactions, and its width enables it to manage
large sequential I/O.
The hardware-based RAID parity engines enable efficient completion of compute-intensive tasks.
The target and initiator drivers are generally developed within the organization as opposed to standard
Linux or Windows, which helps your customers optimize performance from the architecture.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
9-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
EF-Series Configuration
NetApp EF550 Flash Array
Front View
Rear View
NetApp Confidential
EF-SERIES CONFIGURATION
The EF550 is available in two fixed configurations that are based on 800-gigabyte (GB) SSDs in a 2U/24
shelf: 9.6 terabytes (TB) (12 drives) and 19.2 TB (24 drives).
9-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
I/O
Interface
Options
NetApp Confidential
A 2U/24-drive shelf
Two EF550 controllers
24 GB of controller cache (12 GB per controller)
(12) or (24) 800-GB or 1.6-TB SSDs, (which are scheduled for release in 2014)
SANtricity storage manager software
For the EF550, you must specify a host interface at time of order.
Choices are:
9-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
EF-Series Performance
Consistent, sustainable, low-latency
EF550 Performance
Burst IOPS from controller cache (512-byte
I/O)
900,000
Over
450,000
12 gigabytes
per second
(GBps)
NetApp Confidential
EF-SERIES PERFORMANCE
NetApp brings years of focused development and experience supporting tier-one database environments to its
development of the EF-Series platform. The EF-Series platform delivers consistent, sustainable, low-latency
performance under varying workloads and conditions. The table displays the highlights of the EF550 flash
array.
9-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Extreme
Performance
Maximum IT
Efficiency
Advanced Data
Recovery
Enterprise
Reliability
Enterprise Proven
Platform and Support
NetApp Confidential
9-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Enterprise Reliability
The fully redundant HA architecture of the EF-Series platform provides advanced management, data
protection, and diagnostic features that keep business operations running with field-proven, enterprise-class
reliability, availability, and protection.
Advanced Data Recovery
The EF-Series platform provides Snapshot references and replication to full-flash, hybrid, or spinning disk
storage, which enables leading recovery time and cost flexibility.
Enterprise Proven Platform & Support
The NetApp EF550 flash array is designed to work in the most demanding environments. It was built on 20
years of experience across 650,000 systems.
9-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10
9-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Administration with
Oracle ASM
Oracle Fail
Group 1
Oracle Fail
Group 2
Oracle ASM
Mirroring
No performance impact
FlexClone
EF-Series
Snapshot
Backup
FAS System
TR-4145
NetApp Confidential
11
9-12
Customers can create application-consistent backups instantaneously with the NetApp Snap Creator
Framework, which creates Snapshot copies on the NetApp FAS storage array, where the second Oracle
ASM fail group is configured.
You can quickly perform database recovery by means of a NetApp SnapRestore operation. The
application can run temporarily on the second Oracle ASM fail group, while the rebalancing takes place
on the primary fail group, which is on the EF550 all-flash array.
You can use SnapMirror or SnapVault to configure NetApp FAS storage to replicate data to a remote
location. Also, you can use FlexClone volumes to create database copies on the FAS storage array, to
provision development and test environments.
The solution is simple and uses standard Oracle ASM mirroring that is easily managed by database
administrators.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Sybase ASE
Replication
Server
Sybase
Replication
Primary
Database
Secondary
Database
FlexClone
Snapshot
Backup
EF-Series
FAS System
TR-4126
NetApp Confidential
12
9-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Snapshot
Backup
EF-Series
FAS System
Citrix (PVS)
NetApp Confidential
13
9-14
Profile management
User home directories
Mobile data access
Sharing:
NetApp Connect
VMware Horizon Workspace
Citrix ShareFile
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Atlantis ILIO
Persistent
VDI 4.1
Application
I/O Processing
Analysis
Inline
Deduplication
system s (PACS)
Benefits:
Easy to deploy and manage
Hypervisor
Hosts
NetApp Confidential
14
No user experienced degradation upon one storage controller failure. This was validated by having one
storage controller run the 100K IOPS workload for all 2,000 users.
Atlantis ILIO offloaded 60% IOPS and capacity deduplication at the host layer, so that the 2U EF with
6.7 TB of usable storage supported 2,000 users with 30 GB per user.
9-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
EF-Series
Beating the Competition
NetApp enterprise-class reliability and availability leveraging experience
from over 715,000 deployments
NetApp global support providing 24/7, four-hour replacement
The NetApp history of proven performance leadership supporting the
worlds most demanding and complex computing environments
Real-world performance supporting a wide variety of workload
requirements
Fully redundant, highly available architecture that is designed to
eliminate downtime
A complete product offering stack: NetApp FAS hybrid systems, all-flash
arrays (EF550), and the E-Series hybrid system
Complete data protection capabilities, including Snapshot copies and
synchronous and asynchronous replication to meet the broadest set of
service-level objectives and recovery needs
NetApp Confidential
15
An all-flash array for real-life performance in the enterprise must be designed to work optimally outside
the engineering or benchmarking lab. The EF-Series platform is built on NetApps longstanding heritage
of performance leadership and enterprise-class RAS.
NetApp has 30 years of experience in designing high-performance storage for production environments,
including the most demanding tier-one database environments. The result is a resilient and highly
efficient design that is ideally suited for the extreme demands of latency-sensitive workloads.
The EF-Series architecture is field-proven to deliver consistent, sustainable, low-latency performance.
Because the applications that an all-flash array is designed to support are often the heart of a corporations
business processes, the EF-Series was built with enterprise robustness in mind. The EF-Series flash array is
architected to provide the highest levels of RAS, with features such as:
A fully redundant I/O path with automated failover and hot-swappable components
Advanced monitoring and diagnostic features
Nondisruptive serviceability.
More importantly, the EF-Series is backed by the worldwide NetApp support organization.
The NetApp SANtricity management interface is both intuitive and powerful, enabling storage administrators
to achieve maximum performance and utilization of their EF-Series systems. SANtricity offers plug-ins and
providers for tight integration with VMware, Oracle, and Microsoft applications.
All in all, the EF-Series offers a collection of features that very few competitors can match.
Competitive one-page summaries that cover Violin Memory, IBM TMS, and Nimbus Data are available on
the NetApp Field Portal.
9-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Seamless scalability
Built-in efficiencies
Enterprise-class capabilities
Rich set of data management features
Worldwide support
NetApp Confidential
16
9-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Benefits of FlashRay
Performance
Storage Efficiency
Write optimized
High IOPS
Consistent latency
Global inline
deduplication
Inline compression
Snapshot copies and
clones
Enterprise-Class
Capabilities
Scalability
Scale-out
architecture
with auto balancing
Multi-tenancy
Replication
Multi-protocol
App integration
NetApp Confidential
17
BENEFITS OF FLASHRAY
Performance: Delivering consistent low latency is a key differentiator from hybrid solutions (including
server flash), which attempt to optimize average latency. However, when there is a cache miss, hybrid
solutions incur a HDD latency penalty. FlashRay delivers consistent low latencies in the range of lower than
half-a-millisecond, which improves application performance in a variety of enterprise workloads.
Storage Efficiency: FlashRay architecture is designed for write optimized stack operations, which are
essential to ensure that flash has enough write life. Global inline deduplication and compression are critical to
achieve the required storage efficiency to make all-flash arrays economically attractive. FlashRay is
architected to ensure that turning on deduplication and compression does not result in performance
degradation.
Scalability: All-flash arrays offer no room for scale-up, since the controller unit often cannot match the IOPS
delivery capability of the flash. All-flash array architectures must be easy and seamless for customers to scale.
The scale-out capability of FlashRay architecture allows NetApp to differentiate from competitive flash array
offerings.
9-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Enterprise-class RAS capabilities: NetApp is building an enterprise-class solution with a rich set of data
management features that enterprises have come to expect for mission-critical workloads. Key capabilities of
the FlashRay design include:
QoS: FlashRay is architected to host multiple workloads, utilizing software mechanisms to define latency and
IOPS targets. The system uses system partitioning to allocate resources to meet these targets.
9-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Positioning
FlashRay*
EF-Series
FlashRay*
Scalability
Protocols
OS
Efficiency
Density
NetApp Confidential
18
9-20
Multiprotocol support
Secure multi-tenancy
Scale-out with auto-balancing
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you should be able to:
List the components of the NetApp all-flash array portfolio
Describe the key functionalities of EF-Series systems
NetApp Confidential
MODULE SUMMARY
9-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19
Knowledge Check
Module 9: NetApp All-Flash Array
Portfolio
NetApp Confidential
KNOWLEDGE CHECK
9-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20
NetApp Confidential
9-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
NetApp Confidential
9-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22
Module 10
Basic Design Tools
NetApp Confidential
10-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Use Hardware Universe to find system
specifications
Use the Interoperability Matrix Tool (IMT) to
ensure that your customers environment is
compatible with NetApp solutions
Use ConfigEdge to align solutions with your
customers budget
NetApp Confidential
MODULE OBJECTIVES
10-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
Hardware Universe
NetApp Confidential
10-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Hardware Universe
What and Why
What is it?
NetApp Confidential
System capacity
Memory size
Maximum spindle count
Other features
10-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Hardware Universe
When and How
When does an SE use it in the sales cycle?
NetApp Confidential
10-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Hardware Universe
Input
NetApp Confidential
10-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Hardware Universe
Output
NetApp Confidential
10-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Learning Activity
Lesson 1: Hardware Universe
NetApp Confidential
10-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10-9
What is the marketing capacity of the largest disk drive that is available for a Data ONTAP system?
What is the part number of the largest disk drive?
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10-10
What is the greatest total throughput available from a single add-on card?
What is the connection technology of this card?
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
10
NetApp Confidential
11
10-11
Which currently available FAS controller generates the least heat, worst case, in an HA pair?
In a worst-case scenario, how many watts does this HA pair consume?
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 2
The Interoperability Matrix Tool
NetApp Confidential
10-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
13
10-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
14
10-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15
NetApp Confidential
16
10-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
17
10-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Learning Activity
Lesson 2: Interoperability Matrix Tool
NetApp Confidential
18
10-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19
NetApp Confidential
20
10-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 3
ConfigEdge
NetApp Confidential
LESSON 3: CONFIGEDGE
10-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
ConfigEdge
What and Why
What is it?
NetApp Confidential
22
Model and manage configurations with pricing estimates without having to create a quote or opportunity
Use the Manage Configurations landing page to organize your configurations:
Maintain and manage configurations
Make configurations easy to search and edit
10-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ConfigEdge
When and How
When does an SE use it in the sales cycle?
Use ConfigEdge early in the sales cycle to ensure
that proposed solutions align with the customers
budget.
Use ConfigEdge late in the sales cycle to build the
Bill of Materials*.
NetApp Confidential
23
10-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ConfigEdge
Input
NetApp Confidential
24
CONFIGEDGE: INPUT
ConfigEdge provides drop-down lists and option buttons for data input. All required fields are marked with a
red asterisk. This example shows the Cluster Advisor tool, which you use to configure Data ONTAP clusters
from one to many nodes.
10-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ConfigEdge
Output
25
CONFIGEDGE: OUTPUT
The List Price and Extended List Price columns contain the actual price for each component. This list price is
for reference only; it may not be the final price to the customer.
10-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
ConfigEdge
Sharing Reusable Configurations
NetApp Confidential
26
10-26
You can view only the reusable configurations that you created and saved.
If you need access to a reusable configuration that was created by another user, you must enter the token
ID to access the reusable configuration.
For token-based sharing, when you create a reusable configuration, a unique token is generated. You can
share this token with other users through email. Any user with access to the token can add this
configuration to the quote.
Reusable configurations are also restricted based on product visibility rules.
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Use the Hardware Universe to find system
specifications
Use the Interoperability Matrix Tool (IMT) to
ensure that your customers configuration is
compatible with NetApp solutions
Align solutions with a customer budget by
using ConfigEdge
NetApp Confidential
MODULE SUMMARY
10-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
27
Module 11
Detailed Design Tools
NetApp Confidential
11-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Use System Performance Modeler (SPM) to
identify hardware configurations that support
customer performance requirements
Identify the components of the Synergy tool
Use Quick Platform Selector to find the systems
that support a given usable capacity
Use Storage WorkBench to quickly build a
storage configuration with controllers, shelves,
and disks
Use Storage Design Studio to validate design
details
Use Synergy to create solution review materials
NetApp Confidential
MODULE OBJECTIVES
11-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
System Performance Modeler
NetApp Confidential
11-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Architecture Planning
System Performance Modeler
Qualification
Architecture
Planning
Technical
Planning
Solution
Design
NetApp Confidential
ARCHITECTURE PLANNING
11-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Solution
Review
What is it?
A web-based application that models
performance characteristics for system and
workload sizing
NetApp Confidential
11-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Performance Sizing
Accurate system sizing is not built solely on
storage capacity. Performance considerations
frequently outweigh capacity requirements.
FC, SAS, SATA, and solid-state disks offer
significantly different I/O performance curves.
Learn your customers application workloads,
requirements, and storage environments, and
obtain data directly from existing systems when
you can.
Remember the GIGO rule: garbage in, garbage
out.
NetApp Confidential
PERFORMANCE SIZING
To do performance sizing, you need to gather more information than just the amount of storage capacity for a
system. The more accurate the information is that you collect, the more accurately your results reflect reality.
When possible, use tools such as PerfMon, iostat, and Perfstat to determine actual metrics such as throughput,
latency, read:write ratio, and random:sequential ratio.
11-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SPM Features
Data ONTAP Sizing Workflows:
Forward sizing: Suggest configuration
Reverse sizing: Estimate performance
NetApp Confidential
SPM FEATURES
Use the forward sizing workflow to suggest a hardware configuration to support a given workload.
Forward sizing is most commonly used for new NetApp customers.
Use the reverse sizing workflow to determine the available headroom for a given system and a given set
of workloads. Headroom refers to the storage and processing power that remains available for new
workloads while maintaining high performance. Reverse sizing is most commonly used for existing
NetApp customers.
The E-Series Performance Sizing tool is under development. The beta version is available and is linked from
the SPM.
11-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
1.
2.
3.
4.
NetApp Confidential
11-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Open the .pdf file within the browser, or email the file to yourself.
NetApp Confidential
10
11-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11
11-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SPM Features
NetApp Confidential
12
SPM FEATURES
System Performance Modeler saves all sizing scenarios, which you can then reuse or share with colleagues.
11-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
SPM Resources
These resources are linked from the SPM Help
menu:
FAQ
The NetApp Sizers community
User Guide
Feedback
Training videos
NetApp Confidential
SPM RESOURCES
11-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
13
Lesson Exercise
Module 11: Detailed Design Tools
System Performance Modeler
NetApp Confidential
LESSON EXERCISE
Please refer to your exercise guide.
11-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14
Lesson 2
NetApp Synergy
NetApp Confidential
11-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15
NetApp Synergy
What and Why
What is it?
NetApp Confidential
16
11-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Synergy
When and How
When does an SE use it in the sales cycle?
Throughout the entire sales lifecycle
NetApp Confidential
11-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17
18
11-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Technical Planning
The Quick Platform Selector
Qualification
Technical
Planning
Architecture
Planning
Solution
Design
NetApp Confidential
TECHNICAL PLANNING
11-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Solution
Review
19
NetApp Confidential
11-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20
NetApp Confidential
21
11-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Optional
NetApp Confidential
11-22
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
22
NetApp Confidential
23
11-23
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Report:
Summary results
Simple Bill of Materials (BOM)
NetApp Confidential
24
11-24
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
25
11-25
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
26
11-26
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Architecture Planning
Storage WorkBench
Qualification
Architecture
Planning
Technical
Planning
Solution
Design
NetApp Confidential
ARCHITECTURE PLANNING
11-27
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Solution
Review
27
Storage WorkBench
What
What is it?
It is a capacity sizing tool for more detailed system
NetApp Confidential
11-28
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
28
Storage WorkBench
Why, When, How
NetApp Confidential
29
11-29
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage WorkBench
Inputs
Optional
Aggregate configuration (for Data ONTAP) or
volume group configuration (for SANtricity)
SAN switches
NetApp Confidential
30
11-30
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage WorkBench
Input Example
NetApp Confidential
31
11-31
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage WorkBench
Output Results Summary
NetApp Confidential
32
11-32
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Storage WorkBench
Output Allocation Chart
NetApp Confidential
33
11-33
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson Exercise
Module 11: Detailed Design Tools
Storage WorkBench
NetApp Confidential
LESSON EXERCISE
Please refer to your exercise guide.
11-34
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
34
Solution Design
Storage Design Studio
Qualification
Technical
Planning
Architecture
Planning
Solution
Design
NetApp Confidential
SOLUTION DESIGN
11-35
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Solution
Review
35
NetApp Confidential
11-36
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
36
NetApp Confidential
37
11-37
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11-38
Storage systems
Hosts
The physical and logical network
Sites
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
38
NetApp Confidential
39
11-39
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11-40
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
40
NetApp Confidential
11-41
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
41
Parts List
NetApp Confidential
11-42
Environmental summary
Modular document engine
CLI scripts
RDS discovery questionnaire
Pre-sales summary PowerPoint presentation
Parts list report
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
42
Module Summary
Now that you have completed this module, you
should be able to:
Use SPM to identify hardware configurations that
support customer performance requirements
Identify the components of the Synergy tool
Use Quick Platform Selector to find the systems
that support a given usable capacity
Use Storage WorkBench to quickly build a
storage configuration with controllers, shelves,
and disks
Use Storage Design Studio to validate design
details
Use Synergy to create solution review materials
NetApp Confidential
MODULE SUMMARY
11-43
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
43
Lesson Exercise
Module 11: Detailed Design Tools
Storage Design Studio
NetApp Confidential
LESSON EXERCISE
Please refer to your exercise guide.
11-44
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
44
Module 12
Data Collection and Analysis
NetApp Confidential
12-1
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Identify customer use cases for the
complimentary NetApp Infrastructure
Assessment Service
Use the AutoSupport tool and the Assessment
Tools Portal to analyze customer
environments
NetApp Confidential
MODULE OBJECTIVES
12-2
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Lesson 1
NetApp Infrastructure Assessment
Service
NetApp Confidential
12-3
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Dollars
Closed
$8.2M
12-4
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Performance collection of
arrays, VMs, and switches
Bottlenecks and risk issues
Orphaned assets and unused
capacity resources
Efficiency gaps and potential
savings
Launch an
Assessment.
Deliver
key findings.
NetApp Hardware
Opportunities
OnCommand
Insight Software
Opportunities
Upsell Opportunities
to Uncover
Professional services
Hardware upgrades
Technology refreshes
NetApp Confidential
12-5
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
12-6
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12-7
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
12-8
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Delivering an Assessment
Day 1
10 Minutes
Registering the
Assessment
Declined:
Conflict
with an
Existing
Opportunity
Day 2
15 to 20 Minutes
Day 3
2 to 3 Hours
Day 10
2 to 3 Hours
Day 11
30 to 60 Minutes
Pre-Call
with
Prospect
Installation
and
Discovery
via WebEx
Analysis
and
Summary
of
Findings
Presentation
of Key
Findings to
the Partner
NetApp Confidential
Proof of
Concept or
Evaluation
for Qualified
Opportunities
DELIVERING AN ASSESSMENT
The registration process is the most important step in delivering an assessment. NetApp works to minimize
channel conflict. Registration guarantees that the same customer site is not targeted by multiple partners or
NetApp internal representatives at the same time.
The timeframes that are displayed are based on a typical assessment process. Timeframes may vary.
Day 1: The account team or Partner requests a Storage Efficiency Assessment via the web link.
Day 2: The account team or Partner forwards preinstall and predeployment documents to the prospect for
completion:
The Partner has a pre-call with the prospect and reviews the prerequisite documents.
The account team or Partner assists the prospect with completing the site survey prior to the install.
Day 10: The assessment team generates reports and delivers them to the account team or Partner.
Day 11: The assessment team presents its findings to the account team.
In some instances, the assessment team makes a call to validate data with the customer.
If the customer wishes to evaluate the productand has qualified use cases and the budget to do soyou
may work with the overlay OnCommand Insight or OnCommand Balance sales teams to position the product
with your customer or prospect. The sales teams leverage the assessment database to display use cases for the
product.
12-9
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10
12-10
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Assessment Dashboard
Raid overhead of 35%, high violations on CLARiiON, 97 datastores on other storage
Are these
systems at risk?
NetApp Confidential
ASSESSMENT DASHBOARD
The slide displays sample assessment outputs.
12-11
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11
329
300
250
200
189
175
# of Volumes
Capacity TB
150
88.3
81.6
100
46
32.6
50
47.0
16
19.2
2.3
1-10
11-100
101-250
251-750
751-2000
NetApp Confidential
12-12
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
Savings
Notes
Deduplication
151.7 TB
Data Compression
35.9 TB
Thin Provisioning
41.1 TB
RAID-DP upgrade
34.1 TB
Efficient Snapshot
19.5 TB
Virtual Cloning
10.0 TB
Total Savings
NetApp Confidential
13
12-13
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
250
217
191
200
150
> 1 MBps
114
90
100
100
Underutilized
99
Total # of ports
50
10
26
15
1
0
Host to Fabric
Storage to Fabric
Unknown Device
Type
Total
NetApp Confidential
12-14
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
14
Lesson 2
The Assessment Tools Portal
NetApp Confidential
12-15
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
15
16
12-16
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Step 1
Step 2
Step 3
After data has collected for one month, go into the ATP and
request a report.
NetApp Confidential
12-17
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
17
Click Submit.
18
You can enter a customer name or search by customer or site names. As you start entering a customer or site
name, you are presented with a shrinking list of customers or sites that meet your criteria. For NetApp
partners, only those customers and sites that are associated with your company (because they use products
that are sold by or supported by your company) are displayed.
After you select the customer or site that you want to view, click the magnifying glass icon to create a list of
systems that are associated with that company or site. You can now view any of the systems that are displayed
in the list and include them in the report.
You can repeat this process for many different customers or sites to create a customized list of serial numbers
for your assessment.
Select the number of weeks of performance data to trend. At the most, you can display 53 weeks (that is, one
year of performance data). Typically, no more than 26 weeks of performance data is required. If you are not
concerned about performance data, you can reduce the weeks of performance data to two weeks for a faster
turnaround of your reports.
12-18
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Description
CMPG Excel
(.xlsx)
Processing Log
(.xlsx)
NetApp Confidential
12-19
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
19
ATP Resources
Assessment Tools Portal URL:
https://atp.netapp.com/
Assessment Tools Portal communities:
https://communities.netapp.com/
community/netapp_partners_network/
assessandconsult
NetApp Confidential
ATP RESOURCES
12-20
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
20
Module Summary
Now that you have completed this module, you
should be able to:
Identify customer use cases for the
complimentary NetApp Infrastructure
Assessment Service
Use the AutoSupport tool and the ATP to
analyze customer environments
NetApp Confidential
MODULE SUMMARY
12-21
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
21
Module 13
Next Steps: Tools and Resources
for NetApp Accredited Technical
Sales Professionals
NetApp Confidential
MODULE 13: NEXT STEPS: TOOLS AND RESOURCES FOR NETAPP ACCREDITED
TECHNICAL SALES PROFESSIONALS
13-1
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Identify the appropriate NetApp training
courses for your role
Identify the tools and resources that are
available to update you on current NetApp
solutions
NetApp Confidential
MODULE OBJECTIVES
13-2
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
13-3
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Training Resources
NetApp Confidential
TRAINING RESOURCES
On the Field Portal main page, click the Training tab. This tab lists the learning maps, programs, events, and
other communications that help you to learn more about NetApp. You can click each heading to access the
types of training resources that are available. For example, under the Featured heading, you find links to the
most recent training resources, which often pertain to recent product launches and other significant NetApp
announcements.
13-4
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
13-5
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
The GetSuccessful
Partner Enablement Program
NetApp Confidential
13-6
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Architecture
Business Value
Competitive Advantage
13-7
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
13-8
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
13-9
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
10
13-10
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
11
13-11
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Identify the appropriate NetApp training
courses for your role
Identify the tools and resources that are
available to update you on current NetApp
solutions
NetApp Confidential
12
MODULE SUMMARY
13-12
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Course Summary
Now that you have completed this course, you
should be able to:
Describe the core NetApp technologies,
products, and solutions needed to design a
customer solution
Use the major NetApp field tools to design a
customer solution
Create an integrated business solution
Locate NetApp field resources
NetApp Confidential
13
COURSE SUMMARY
13-13
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
14
THANK YOU
13-14
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Accreditation Exam
NetApp Confidential
15
ACCREDITATION EXAM
13-15
Designing NetApp Solutions: Next Steps: Tools and Resources for NetApp Accredited Technical Sales Professionals
2014 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.