Get Started PDF
Get Started PDF
Get Started PDF
SANtricity 11.7
NetApp
August 24, 2022
• System Manager — a web-based interface used for managing one controller in a storage array.
• Unified Manager — a web-based interface used for viewing and managing all storage arrays in your
network.
EF600 and EF300 storage arrays do not support mirroring, thin volumes, or SSD Cache
features.
Performance
Storage
Data protection
1
Notify administrators about important events occurring
on the storage array. Alerts can be sent through
email, SNMP traps, and syslog.
Alerts
System Settings
Unified Manager is installed on a management server along with the Web Services Proxy. To access Unified
Manager, you open a browser and enter the URL pointing to the server where the Web Services Proxy is
installed.
Launch
2
Configure asynchronous or synchronous mirrored
pairs between two storage arrays.
Mirroring
Manage Groups
Upgrade Center
Browsers
The following browsers and versions are supported.
Mozilla Firefox 70
Safari 12
Microsoft Edge 79
3
For Unified Manager, the Web Services Proxy must be installed and available to the browser.
For more information, see SANtricity Web Services Proxy overview
Operating systems
The following operating systems and versions are supported.
Steps
1. From your browser, enter the following URL: https://<IPAddress>
The first time System Manager is opened on an array that has not been configured, the Set Administrator
4
Password prompt appears.
2. Enter the System Manager password for the admin role in the Set Administrator Password and Confirm
Password fields, and then click Set Password.
For more information on the Setup Wizard, see Setup Wizard overview.
First-time setup
When you open System Manager for the first time, the Setup wizard launches. The Setup wizard prompts you
to perform basic configuration tasks, such as naming your storage array, configuring your hosts, selecting
applications, and creating pools of storage.
If you cancel the wizard, you cannot manually relaunch it. The wizard automatically relaunches when you open
System Manager or refresh your browser and at least one of the following conditions is met:
Terminology
Term Description
Application An application is a software program, such as Microsoft SQL Server or Microsoft
Exchange.
Alert Alerts notify administrators about important events that occur on the storage
arrays. Alerts can be sent via email, SNMP traps, or syslog.
5
Term Description
AutoSupport The AutoSupport feature monitors the health of a storage array and sends
automatic dispatches to technical support.
Hardware The storage system hardware includes storage arrays, controllers, and drives.
Object An object is any logical or physical storage component. Logical objects include
volume groups, pools, and volumes. Physical objects include the storage array,
array controllers, hosts, and drives.
Pool A pool is a set of drives that is logically grouped. You can use a pool to create one
or more volumes accessible to a host. (You create volumes from either a pool or a
volume group.)
Volume A volume is a container in which applications, databases, and file systems store
data. It is the logical component created for the host to access storage on the
storage array.
Volume group A volume group is a container for volumes with shared characteristics. A volume
group has a defined capacity and RAID level. You can use a volume group to
create one or more volumes accessible to a host. (You create volumes from either
a volume group or a pool.)
Workload A workload is a storage object that supports an application. You can define one or
more workloads, or instances, per application. For some applications, the system
configures the workload to contain volumes with similar underlying volume
characteristics. These volume characteristics are optimized based on the type of
application the workload supports. For example, if you create a workload that
supports a Microsoft SQL Server application and then subsequently create
volumes for that workload, the underlying volume characteristics are optimized to
support Microsoft SQL Server.
FAQs
If you do not see all your hardware components on the Verify Hardware dialog box, it
could mean that a drive shelf is not connected correctly, or that an incompatible shelf is
installed in the storage array.
Verify that all drive shelves are connected correctly. If you are uncertain about which drive shelves are
compatible, contact technical support.
6
What if I don’t see all of my hosts?
If you do not see your connected hosts, then automatic detection has failed, the hosts are
improperly connected, or no hosts are currently connected.
You can configure hosts later, once you are done with the setup. You can create hosts either automatically or
manually as follows:
• If you installed the Host Context Agent (HCA) on your hosts, the HCA pushes the host configuration
information to the storage array. System Manager automatically configures these hosts and displays them
in the Initial Setup wizard. (HCA does not apply to NVMe over Fabrics hosts.)
• You can manually create hosts and associate the appropriate host port identifiers by going to Storage ›
Hosts. Hosts that have been created manually also display in the Initial Setup wizard.
• The target and host must be configured for the host port type (for example, iSCSI or NVMe over RoCE),
and a session to the storage established before automatic detection will work.
What is a workload?
For some applications in your network, such as SQL Server or Exchange, you can define
a workload that optimizes storage for that application.
A workload is a storage object that supports an application. You can define one or more workloads, or
instances, per application. For some applications, the system configures the workload to contain volumes with
similar underlying volume characteristics. These volume characteristics are optimized based on the type of
application the workload supports. For example, if you create a workload that supports a Microsoft SQL Server
application and then subsequently create volumes for that workload, the underlying volume characteristics are
optimized to support Microsoft SQL Server.
During volume creation, the system prompts you to answer questions about a workload’s use. For example, if
you are creating volumes for Microsoft Exchange, you are asked how many mailboxes you need, what your
average mailbox capacity requirements are, and how many copies of the database you want. The system uses
this information to create an optimal volume configuration for you, which can be edited as needed.
7
How do I know if I should accept the recommended pool configuration?
Whether you accept the recommended pool configuration depends on a few factors.
Determine the type of storage that is best for your requirements by answering the following questions:
• Do you prefer multiple pools of smaller capacities, rather than the largest pools possible?
• Do you prefer RAID volume groups over pools?
• Do you prefer to manually provision your drives, rather than having a configuration recommended for you?
If you answered Yes to any of these questions, consider rejecting the recommended pool configuration.
If you do not see your connected hosts, then automatic detection has failed, the hosts are
improperly connected, or no hosts are currently connected.
You can configure hosts later, once you are done with the setup. You can create hosts either automatically or
manually as follows:
• If you installed the Host Context Agent (HCA) on your hosts, the HCA pushes the host configuration
information to the storage array. System Manager automatically configures these hosts and displays them
in the Initial Setup wizard. (HCA does not apply to NVMe over Fabrics hosts.)
• You can manually create hosts and associate the appropriate host port identifiers by going to Storage ›
Hosts. Hosts that have been created manually also display in the Initial Setup wizard.
• The target and host must be configured for the host port type (for example, iSCSI or NVMe over RoCE),
and a session to the storage established before automatic detection will work.
Steps
8
1. Open a browser and enter the following URL:
http[s]://<server>:<port>/um
In this URL, <server> represents the IP address or FQDN of the server where the Web Services Proxy is
installed, and <port> represents the listening port number (defaults to 8080 for HTTP or 8443 for HTTPS).
2. For first-time login, enter admin for the user name, and then set and confirm a password for the admin
user.
For further information about users and passwords, see How Access Management works.
9
Copyright Information
Copyright © 2022 NetApp, Inc. All rights reserved. Printed in the U.S. No part of this document covered by
copyright may be reproduced in any form or by any means-graphic, electronic, or mechanical, including
photocopying, recording, taping, or storage in an electronic retrieval system- without prior written permission of
the copyright owner.
Software derived from copyrighted NetApp material is subject to the following license and disclaimer:
THIS SOFTWARE IS PROVIDED BY NETAPP “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE, WHICH ARE HEREBY DISCLAIMED. IN NO EVENT SHALL
NETAPP BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
NetApp reserves the right to change any products described herein at any time, and without notice. NetApp
assumes no responsibility or liability arising from the use of products described herein, except as expressly
agreed to in writing by NetApp. The use or purchase of this product does not convey a license under any
patent rights, trademark rights, or any other intellectual property rights of NetApp.
The product described in this manual may be protected by one or more U.S. patents, foreign patents, or
pending applications.
RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions
as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.277-7103 (October 1988) and FAR 52-227-19 (June 1987).
Trademark Information
NETAPP, the NETAPP logo, and the marks listed at http://www.netapp.com/TM are trademarks of NetApp, Inc.
Other company and product names may be trademarks of their respective owners.
10