Escolar Documentos
Profissional Documentos
Cultura Documentos
NetApp Confidential
2-1
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Objectives
After this module, you should be able to:
Configure nodes and install the operating
system
Create a cluster
to the Expand a cluster two nodes
Set the dates, times, and time zones of the
nodes in the cluster
NetApp Confidential
MODULE OBJECTIVES
2-2
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-3
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Hardware Setup
Connect:
Controllers to disk shelves
High-availability (HA) interconnect
Controllers to the networks
Any tape devices
Controllers and disk shelves to power
NetApp Confidential
HARDWARE SETUP
2-4
Connect controllers to disk shelves. Verify that shelf IDs are set properly.
If required for your controller type, connect nonvolatile RAM (NVRAM) high-availability (HA) cable
between partners. The connections can be 10-GbE or InfiniBand, depending on your storage controllers.
Connect controllers to the networks.
If present, connect any tape devices. This task can be performed later.
Connect controllers and disk shelves to power.
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Communication Connections
Console connection (using ANSI-9600-8N1)
Remote management device connection,
dependent on model
Service Processor (SP)
Remote LAN Module (RLM)
NetApp Confidential
COMMUNICATION CONNECTIONS
Each controller should have a console connection, which is required to get to the firmware and to get to the
Boot menu (for the setup, installation, and initialization options, for example). A remote management device
connection, although not required, is helpful in the event that you cannot get to the UI or console. Remote
management enables remote booting, the forcing of core dumps, and other actions.
Each node must have two connections to the dedicated cluster network. Each node should have at least one
data connection, although these data connections are necessary only for client access. Because the nodes are
clustered together, its possible to have a node that participates in the cluster with its storage and other
resources but doesnt field client requests. Typically, however, each node has data connections.
The cluster connections must be on a network that is dedicated to cluster traffic. The data and management
connections must be on a network that is distinct from the cluster network.
2-5
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Disk Cabling
node1
node2
node3
node4
NVRAM* Interconnect
FC or SAS (simplified)
NetApp Confidential
DISK CABLING
A large amount of cabling must be done with a Data ONTAP cluster. Each node has NVRAM
interconnections to its HA partner. Each node has FC or SAS connections to its disk shelves and to those of
its HA partner.
In a multipath high-availability (MPHA) cabling strategy, each storage controller has multiple ways to
connect to a disk. An I/O module failure does not require a controller failover. This method is the most
resilient and preferred method of shelf cabling.
Ethernet cabling for alternate control path (ACP) requires one connection to each controller, connected in a
series through all shelves. First you connect stack to stack. Then you connect between I/O modules from top
to bottom in each stack.
2-6
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Network Cabling
1 of 2
Cluster Interconnect
Cluster Interconnect
Management
Data
Management
Network
Data Network
NETWORK CABLING: 1 OF 2
For customers with strict security requirements, management ports can be connected to a network that is
separate from the data network. In that case, management ports must have a role of management, and network
failover cannot occur between data and management interfaces.
2-7
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Network Cabling
2 of 2
Cluster Interconnect
Cluster Interconnect
Management
Data
Data and
Management
Network
NETWORK CABLING: 2 OF 2
When you cable the network connections, consider the following:
2-8
Each node is connected to at least two distinct networks: one for management (the UI) and data access
(clients) and one for intracluster communication. NetApp supports two 10-GbE cluster connections to
each node to create redundancy and improve cluster traffic flow.
The cluster can be created without data network connections but not without cluster network connections.
Having more than one data network connection to each node creates redundancy and improves client
traffic flow.
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-9
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Firmware
Use LOADER firmware.
Press any key to enter the firmware.
Two boot device images exist: flash0a and
flash0b.
Use printenv to show the firmware
environment variables.
Use setenv to set the firmware environment
variables, for example, setenv AUTOBOOT
true
NetApp Confidential
10
FIRMWARE
1.
2.
3.
4.
CompactFlash
USB flash
2-10
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-11
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
11
8. Reboot node.
Selection (1-8)?
NetApp Confidential
2-12
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
12
NetApp Confidential
13
2-13
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Initializing a Node
From the Boot menu, select option 4:
Initialization clears the three disks that the system
uses for the first aggregate that it creates.
NOTE: This action requires time, depending on disk size.
NetApp Confidential
14
INITIALIZING A NODE
Because all disks are initialized parallel to each other, the time that is required to initialize the disks is based
on the size of the largest disk that is attached to the node, not on the sum capacity of the disks. After the disks
are initialized, the nodes first aggregate and its vol0 volume are automatically created.
2-14
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
15
2-15
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
16
2-16
The cluster name. The wizard automatically names the node clustername-0x, where x is the order in
which the node joins the cluster. The node that creates the cluster is 01, the next node to join the cluster is
02, and so on.
Cluster network ports. On a private, nonroutable cluster network, the wizard automatically assigns cluster
IP addresses.
The cluster base license key. Additional license keys can be added here.
The cluster management interface port, IP address, network mask, default gateway, and home port
The node management interface port, IP address, network mask, default gateway, and home port
DNS domain name
IP addresses of the DNS server
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
17
2-17
Cluster network ports. On a private, nonroutable cluster network, the wizard automatically assigns cluster
IP addresses.
The node management interface port, IP address, network mask, default gateway, and home port
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
2-18
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
18
NetApp Confidential
19
2-19
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
20
2-20
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
21
2-21
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
22
2-22
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
NetApp Confidential
2-23
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
23
Transition
NetApp Confidential
24
2-24
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
Module Summary
Now that you have completed this module, you
should be able to:
Configure nodes and install the operating
system
Create a cluster
to the Expand a cluster two nodes
Set the dates, times, and time zones of the
nodes in the cluster
NetApp Confidential
MODULE SUMMARY
2-25
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
25
Exercise
Module 2:
Installation and Configuration
NetApp Confidential
EXERCISE
Please refer to your exercise guide.
2-26
2013 NetApp, Inc. This material is intended only for training. Reproduction is not authorized.
26