Release notes
  Unified Manager
  Workflow Automation
  SnapCenter Software
  Unified Manager
  Workflow Automation
  SnapCenter Software
Installation and configuration
  Installing Unified Manager
    Introduction to OnCommand Unified Manager
      What the Unified Manager server does
      OnCommand Unified Manager product documentation
      Overview of the installation sequence
    Requirements for installing Unified Manager
      Virtual infrastructure or hardware system requirements
      VMware software and installation requirements
      Red Hat software and installation requirements
      Windows software and installation requirements
      Supported browsers
      Protocol and port requirements
      Completing the worksheet
    Installing, upgrading, and removing Unified Manager software on VMware vSphere
      Overview of the deployment process on VMware
      Deploying Unified Manager
        Downloading Unified Manager
        Deploying the Unified Manager virtual appliance
      Upgrading Unified Manager on VMware
        Downloading the Unified Manager 7.2 ISO image
        Upgrading the Unified Manager virtual appliance
      Restarting the Unified Manager virtual machine
      Removing Unified Manager from VMware
    Installing, upgrading, and removing Unified Manager software on Red Hat Enterprise Linux
      Overview of the installation process on Red Hat
      Setting up required software repositories
        Manually configuring the EPEL repository
        Manually configuring the MySQL repository
        Manually configuring the Third Party Oracle Java repository
      Installing Unified Manager on Red Hat Enterprise Linux
        Creating a custom user home directory and umadmin password prior to installation
        Downloading Unified Manager for Red Hat Enterprise Linux
        Installing Unified Manager on a Red Hat Enterprise Linux system
        Users created during Unified Manager installation
        Changing the JBoss password
      Setting up Unified Manager for high availability
        Requirements for Unified Manager in VCS
        Installing Unified Manager on VCS
        Configuring Unified Manager with VCS using configuration scripts
        Unified Manager service resources for VCS configuration
        Updating an existing Unified Manager setup for high availability
      Upgrading Unified Manager on Red Hat Enterprise Linux
        Upgrading Unified Manager on Red Hat Enterprise Linux
        Upgrading the host OS from Red Hat Enterprise Linux 6.x to 7.x
      Restarting Unified Manager in Red Hat Enterprise Linux
      Removing Unified Manager from the Red Hat Enterprise Linux host
      Removing the custom umadmin user and maintenance group
    Installing, upgrading, and removing Unified Manager software on Windows
      Overview of the installation process on Windows
      Installing Unified Manager on Windows
        Installing Unified Manager on a Windows system
        Performing an unattended installation of Unified Manager on Windows
      Setting up Unified Manager in a failover clustering environment
        Requirements for Unified Manager in a failover clustering environment
        Installing Unified Manager on MSCS
        Configuring Unified Manager server with MSCS using configuration scripts
      Upgrading Unified Manager on Windows
      Restarting Unified Manager on Windows
      Uninstalling Unified Manager from Windows
    Configuring Unified Manager
      Overview of the configuration sequence
      Accessing the Unified Manager web UI
      Performing the initial setup of the Unified Manager web UI
  Installing Workflow Automation on a Linux host
    Overview of OnCommand Workflow Automation
      OnCommand Workflow Automation deployment architecture
      OnCommand Workflow Automation installation and setup overview
      Known limitations for OnCommand Workflow Automation
    System requirements for installing OnCommand Workflow Automation
      Ports required for Workflow Automation
    Prerequisites for installing Workflow Automation
    Installing OnCommand Workflow Automation on Linux
    Managing high availability
      Setting up Workflow Automation in VCS for high availability
        Configuring VCS to install OnCommand Workflow Automation
        Installing OnCommand Workflow Automation on Linux
        Configuring Workflow Automation in VCS
      Configuring an earlier version of OnCommand Workflow Automation for high availability
      Uninstalling Workflow Automation in a VCS environment
      Backing up and restoring the OnCommand Workflow Automation database and configurations on Linux
    Setting up OnCommand Workflow Automation
      Accessing OnCommand Workflow Automation
      OnCommand Workflow Automation data sources
        Configuring a database user on OnCommand Unified Manager
          Configuring a database user by running ocsetup on Windows
          Configuring a database user by running ocsetup on Linux
        Setting up a data source
        Adding an upgraded Unified Manager server as a data source
      Setting up OnCommand Workflow Automation using the Setup Wizard
      Creating local users
      Configuring the credentials of a target system
      Configuring OnCommand Workflow Automation
        Configuring AutoSupport
        Configuring authentication settings
          Adding Active Directory groups
        Configuring email notifications
        Configuring SNMP
        Configuring Syslog
        Configuring protocols for connecting to remote systems
      Disabling the default password policy
      Modifying the default password policy
      Enabling or disabling remote access to the OnCommand Workflow Automation database
      Modifying the transaction timeout setting of OnCommand Workflow Automation
      Enabling or disabling HTTP access to OnCommand Workflow Automation
    Upgrading from OnCommand Workflow Automation 3.1 or later
      Pack identification during upgrade
    Backing up the OnCommand Workflow Automation database
      Backing up the WFA database from the web portal
      Backing up the WFA database using the CLI
        Backing up (full) the WFA database using the CLI
        Backing up (regular) the WFA database using the CLI
      Backing up the WFA database using REST APIs
        Performing a full backup of the WFA database using REST APIs
        Performing a regular backup of the WFA database using REST APIs
    Restoring the OnCommand Workflow Automation database
      Restoring the WFA database
      Restoring the WFA database using the CLI
        Restoring (full) the WFA database using the CLI
        Restoring (regular) the WFA database using the CLI
      Restoring the WFA database using REST APIs
        Restoring (full) the WFA database using REST APIs
        Restoring (regular) the WFA database using REST APIs
    Resetting the admin password created during installation
    Importing OnCommand Workflow Automation content
      Considerations while importing OnCommand Workflow Automation content
    Migrating the OnCommand Workflow Automation installation
    Uninstalling OnCommand Workflow Automation
    Managing OnCommand Workflow Automation SSL certificate
      Replacing the default Workflow Automation SSL certificate
      Creating a certificate signing request for Workflow Automation
    Managing Perl and Perl modules
      Configuring your preferred Perl distribution
    Troubleshooting installation and configuration issues
      Cannot view Performance Advisor data in WFA
      Creating a support case for OnCommand Workflow Automation
    Related documentation for OnCommand Workflow Automation
  Installing Workflow Automation on a Windows host
    Overview of OnCommand Workflow Automation
      OnCommand Workflow Automation deployment architecture
      OnCommand Workflow Automation installation and setup overview
    System requirements for installing OnCommand Workflow Automation
      Ports required for Workflow Automation
    Prerequisites for installing Workflow Automation
    Installing OnCommand Workflow Automation on Windows
    Managing high availability
      Setting up Workflow Automation in MSCS for high availability
        Configuring MSCS to install Workflow Automation
        Installing OnCommand Workflow Automation on Windows
        Configuring Workflow Automation with MSCS
      Configuring earlier versions of OnCommand Workflow Automation for high availability
      Uninstalling Workflow Automation in an MSCS environment
      Backing up and restoring the OnCommand Workflow Automation database and configurations on Windows
    Setting up OnCommand Workflow Automation
      Accessing OnCommand Workflow Automation
      OnCommand Workflow Automation data sources
        Configuring a database user on OnCommand Unified Manager
          Configuring a database user by running ocsetup on Windows
          Configuring a database user by running ocsetup on Linux
        Setting up a data source
        Adding an upgraded Unified Manager server as a data source
      Setting up OnCommand Workflow Automation using the Setup Wizard
      Creating local users
      Configuring the credentials of a target system
      Configuring OnCommand Workflow Automation
        Configuring AutoSupport
        Configuring authentication settings
          Adding Active Directory groups
        Configuring email notifications
        Configuring SNMP
        Configuring Syslog
        Configuring protocols for connecting to remote systems
      Disabling the default password policy
      Modifying the default password policy for Windows
      Enabling remote access to the OnCommand Workflow Automation database on Windows
      Restricting access rights of OnCommand Workflow Automation on the host
      Modifying the transaction timeout setting of OnCommand Workflow Automation
      Enabling or disabling HTTP access to OnCommand Workflow Automation
    Upgrading OnCommand Workflow Automation
      Upgrading from OnCommand Workflow Automation 3.1 on Windows
        Pack identification during upgrade
    Backing up the OnCommand Workflow Automation database
      Backing up the WFA database from the web portal
      Backing up the WFA database using the PowerShell script
      Backing up the WFA database using the CLI
        Backing up (full) the WFA database using the CLI
        Backing up (regular) the WFA database using the CLI
      Backing up the WFA database using REST APIs
        Performing a full backup of the WFA database using REST APIs
        Performing a regular backup of the WFA database using REST APIs
    Restoring the OnCommand Workflow Automation database
      Restoring the WFA database
      Restoring the WFA database using the CLI
        Restoring (full) WFA database using the CLI
        Restoring (regular) WFA database using the CLI
      Restoring the WFA database using REST APIs
        Restoring (full) the WFA database using REST APIs
        Restoring (regular) the WFA database using REST APIs
    Resetting the admin password created during installation
    Importing OnCommand Workflow Automation content
      Considerations while importing OnCommand Workflow Automation content
    Migrating the OnCommand Workflow Automation installation
    Uninstalling OnCommand Workflow Automation
    Managing OnCommand Workflow Automation SSL certificate
      Replacing the default Workflow Automation SSL certificate
      Creating a certificate signing request for Workflow Automation
    Managing Perl and Perl modules
      Configuring your preferred Perl distribution
      Managing site-specific Perl modules
      Repairing the ActivePerl installation
    Troubleshooting installation and configuration issues
      Cannot open the OnCommand Workflow Automation login page
      Cannot view Performance Advisor data in WFA
      OnCommand Workflow Automation (WFA) displays a blank page on Windows 2012
      Creating a support case for OnCommand Workflow Automation
    Related documentation for OnCommand Workflow Automation
  Installing and setting up SnapCenter
    Deciding whether to read this information
    SnapCenter overview
      SnapCenter features
      SnapCenter components
      SnapCenter security features
      How resources, resource groups, and policies are used in data protection
    Installation workflow for new users
    Installation workflow for SnapManager users
    Preparing for the installation
      Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
      Storage types supported by SnapCenter Plug-in for Oracle Database
      Storage types supported by SnapCenter Plug-in for VMware vSphere
      Host requirements
        Domain requirements
        Space and sizing requirements
        Supported operating systems
        SAN host requirements
      Supported storage systems and applications
      Supported browsers
      Support for virtualized applications and virtual machines
      Using SnapCenter Plug-in for VMware vSphere with vCenter Servers in Linked Mode
      Connection and port requirements
      SnapCenter licensing requirements
      SnapCenter repository identification
      Network Load Balancing and Application Request Routing options
        Application Request Routing requirements
      Support for MySQL replication for high availability
      SnapCenter installation worksheet
    Installing SnapCenter and the plug-in packages
      Installing the SnapCenter Server
      Logging in to SnapCenter
      Modifying the SnapCenter default GUI session timeout
      Configuring role-based access control for SnapCenter users
        Types of role-based access control in SnapCenter
        Role-based access control permissions and roles
        Pre-defined SnapCenter roles and permissions
        Pre-defined SCV roles and permissions
        Adding a user to a role
        Assigning users access to assets
      Authentication and user management with vCenter RBAC and ONTAP RBAC
        Components of vCenter Server permissions
        Predefined roles packaged with SnapCenter Plug-in for VMware vSphere
        Product-level privilege required by SnapCenter Plug-in for VMware vSphere
        ONTAP RBAC features in SnapCenter Plug-in for VMware vSphere
        How to configure ONTAP RBAC for SnapCenter Plug-in for VMware vSphere
      Adding SnapCenter capacity licenses
        Types of SnapCenter licenses
        How SnapCenter calculates capacity usage
        Adding SnapCenter capacity licenses
      Setting up storage system connections
      Setting up Run As credentials
        Authentication methods for your Run As credentials
        Setting up your Run As credentials
      Installing plug-in packages
        Prerequisites to adding hosts and installing plug-in packages
          Configuring sudo privileges for non-root user
        SnapCenter plug-in deployment checklist
        Adding hosts and installing plug-in packages on remote hosts
          Modifying plug-in ports
        Installing plug-ins on multiple remote hosts using cmdlets
        Increasing the remote plug-in installation process timeout
        Monitoring SnapCenter plug-in package installation status
        Configuring the host log directory and verification server for SQL Server
        Identifying available resources
        Adding resources to SnapCenter Custom Plug-ins
        Adding databases to SnapCenter Plug-in for SAP HANA Database
        Managing the SnapCenter Plug-in Loader service for Linux
    Preparing storage systems for SnapMirror and SnapVault replication
      Understanding the differences between SnapMirror and SnapVault
      Preparing storage systems for SnapMirror replication
      Preparing storage systems for SnapVault replication
    Provisioning storage on Windows hosts
      Configuring LUN storage
        Establishing an iSCSI session
        Disconnecting an iSCSI session
        Creating and managing igroups
          Creating an igroup
          Renaming an igroup
          Modifying an igroup
          Deleting an igroup
        Creating and managing disks
          Viewing the disks on a host
          Creating FC-connected or iSCSI-connected LUNs or disks
          Resizing a disk
          Connecting a disk
          Disconnecting a disk
          Deleting a disk
      Creating and managing SMB shares
        Creating an SMB share
        Deleting an SMB share
      Reclaiming space on the storage system
      Using the SnapCenter Plug-in for Microsoft Windows in VMware environments
        Supported VMware guest OS platforms
          VMware ESX server-related limitations
          Minimum vCenter privileges required for SnapCenter RDM operations
        Using FC RDM LUNs in a Microsoft cluster
          Requirements for using FC RDM LUNs in a Microsoft cluster
          Microsoft cluster support limitations when using FC RDM LUNs
          Creating a shared FC RDM LUN
        Troubleshooting RDM LUN creation
      SnapCenter Plug-in for Microsoft Windows cmdlets
    Setting up protection for virtualized resources
      Updating hypervisor configuration settings
      Updating vCenter or SnapCenter information in the SnapCenter Plug-in for VMware vSphere
    Upgrading SnapCenter and SnapCenter plug-in packages
      Configuring SnapCenter to check for available updates
      Supported MySQL upgrade scenarios
      SnapCenter upgrade limitations
      Upgrading SnapCenter
      Upgrading your plug-in packages
    Migrating VSC hosts
      Prerequisites for migrating VSC hosts
      Migrating a VSC host using the SnapCenter GUI
      Migrating a VSC host using the vCenter GUI
      Post-migration tasks after migrating a VSC host
      Restarting the vSphere web client service
        Restarting the vSphere web client service in Windows
        Restarting the vSphere web client service in Linux
    Uninstalling SnapCenter plug-ins and plug-in packages
      Uninstalling plug-ins from a host using the SnapCenter GUI
      Uninstalling Windows plug-ins using the command-line interface on the SnapCenter Server host
      Uninstalling plug-ins locally on a host
      Uninstalling SnapCenter Plug-ins Package for Linux using the command-line interface
      Removing a host from SnapCenter Server
        Prerequisites to remove a host
        Removing a host
      Uninstalling SnapCenter
    Installing plug-ins independently
      Installing the SnapCenter Plug-in for Microsoft Windows independently
        Preparation to install the SnapCenter Plug-in for Microsoft Windows
        Installing the SnapCenter Plug-in for Microsoft Windows silently from the command line
      Installing SnapCenter Plug-in for Microsoft SQL Server independently
        Preparation to install the SnapCenter Plug-in for Microsoft SQL Server
        Installing the SnapCenter Plug-in for Microsoft SQL Server silently from the command line
      Installing SnapCenter Plug-in for Oracle Database independently
        Preparation to install the SnapCenter Plug-in for Oracle Database
        Installing the SnapCenter Plug-in for Oracle Database interactively
        Installing the SnapCenter Plug-in for Oracle Database using command-line interface
      Installing SnapCenter Plug-in for VMware vSphere independently
        Installing SnapCenter Plug-in for VMware vSphere independently on a Windows host
        Installing SnapCenter Plug-in for VMware vSphere in vCenter
    Troubleshooting
      SnapCenter installation fails to create DB with the error Invalid username/password, please try again
      Enabling AutoSupport email notifications
      Unable to create SSL or TLS secure channel
      SnapCenter Plug-in Package for Microsoft Windows or SnapCenter Plug-in for Microsoft SQL Server upgrade might fail on hosts with SQL databases on VMDK
      HTTP error 503. The service is unavailable.
      Unable to display SnapCenter web login page on local host
      SnapCenter Plug-ins Package for Linux installation fails due to an incorrect Java version
      SnapCenter Plug-ins Package for Linux installation fails due to improper uninstallation
      SnapCenter Plug-ins Package for Linux installation fails
      SnapCenter Plug-in for NAS File Services installation on the catalog server might fail while installing or upgrading SnapCenter
      Reinstalling SnapCenter Plug-ins for Linux does not update spl.properties file with new values
      SnapCenter Server is unable to communicate with the host
      SnapCenter plug-in loader fails with an error
      SnapCenter plug-in loader does not start automatically when the host is restarted
      Registering vCenter details task displays a warning
      Unable to access cluster IP address from outside network
      Unable to upgrade to SnapCenter 3.0 because communication with MySQL Server fails
      Unable to add storage systems after upgrading SnapCenter Server
      Failed to uninstall SnapCenter Server
      Uninstall does not remove plug-in from vCenter
    Appendixes
      Adding an ONTAP RBAC role using security login commands
      Minimum recommended RBAC roles for SnapCenter Plug-in for VMware vSphere
      Minimum ONTAP privileges required
      ONTAP CLI commands for creating SVM roles
      Features enabled on your Windows host during installation
    Copyright information
    Trademark information
    How to send comments about documentation and receive update notifications
  Importing SnapManager data into SnapCenter
    Deciding on whether to read this information
    Importing archived backups from SnapManager for Microsoft SQL Server to SnapCenter
      Limitations related to import feature
      Importing archived backups
      Viewing the imported backups in SnapCenter Server
    Importing data from SnapManager for Oracle and SnapManager for SAP to SnapCenter
      Configurations supported for importing data
        What gets imported to SnapCenter
        What does not get imported to SnapCenter
      Preparing to import data
      Importing data
      Cancelling an import operation
      Troubleshooting an import operation
  Installing Unified Manager
    Introduction to OnCommand Unified Manager
      What the Unified Manager server does
      OnCommand Unified Manager product documentation
      Overview of the installation sequence
    Requirements for installing Unified Manager
      Virtual infrastructure or hardware system requirements
      VMware software and installation requirements
      Red Hat software and installation requirements
      Windows software and installation requirements
      Supported browsers
      Protocol and port requirements
      Completing the worksheet
    Installing, upgrading, and removing Unified Manager software on VMware vSphere
      Overview of the deployment process on VMware
      Deploying Unified Manager
        Downloading Unified Manager
        Deploying the Unified Manager virtual appliance
      Upgrading Unified Manager on VMware
        Downloading the Unified Manager 7.2 ISO image
        Upgrading the Unified Manager virtual appliance
      Restarting the Unified Manager virtual machine
      Removing Unified Manager from VMware
    Installing, upgrading, and removing Unified Manager software on Red Hat Enterprise Linux
      Overview of the installation process on Red Hat
      Setting up required software repositories
        Manually configuring the EPEL repository
        Manually configuring the MySQL repository
        Manually configuring the Third Party Oracle Java repository
      Installing Unified Manager on Red Hat Enterprise Linux
        Creating a custom user home directory and umadmin password prior to installation
        Downloading Unified Manager for Red Hat Enterprise Linux
        Installing Unified Manager on a Red Hat Enterprise Linux system
        Users created during Unified Manager installation
        Changing the JBoss password
      Setting up Unified Manager for high availability
        Requirements for Unified Manager in VCS
        Installing Unified Manager on VCS
        Configuring Unified Manager with VCS using configuration scripts
        Unified Manager service resources for VCS configuration
        Updating an existing Unified Manager setup for high availability
      Upgrading Unified Manager on Red Hat Enterprise Linux
        Upgrading Unified Manager on Red Hat Enterprise Linux
        Upgrading the host OS from Red Hat Enterprise Linux 6.x to 7.x
      Restarting Unified Manager in Red Hat Enterprise Linux
      Removing Unified Manager from the Red Hat Enterprise Linux host
      Removing the custom umadmin user and maintenance group
    Installing, upgrading, and removing Unified Manager software on Windows
      Overview of the installation process on Windows
      Installing Unified Manager on Windows
        Installing Unified Manager on a Windows system
        Performing an unattended installation of Unified Manager on Windows
      Setting up Unified Manager in a failover clustering environment
        Requirements for Unified Manager in a failover clustering environment
        Installing Unified Manager on MSCS
        Configuring Unified Manager server with MSCS using configuration scripts
      Upgrading Unified Manager on Windows
      Restarting Unified Manager on Windows
      Uninstalling Unified Manager from Windows
    Configuring Unified Manager
      Overview of the configuration sequence
      Accessing the Unified Manager web UI
      Performing the initial setup of the Unified Manager web UI
  Installing Workflow Automation on a Linux host
    Overview of OnCommand Workflow Automation
      OnCommand Workflow Automation deployment architecture
      OnCommand Workflow Automation installation and setup overview
      Known limitations for OnCommand Workflow Automation
    System requirements for installing OnCommand Workflow Automation
      Ports required for Workflow Automation
    Prerequisites for installing Workflow Automation
    Installing OnCommand Workflow Automation on Linux
    Managing high availability
      Setting up Workflow Automation in VCS for high availability
        Configuring VCS to install OnCommand Workflow Automation
        Installing OnCommand Workflow Automation on Linux
        Configuring Workflow Automation in VCS
      Configuring an earlier version of OnCommand Workflow Automation for high availability
      Uninstalling Workflow Automation in a VCS environment
      Backing up and restoring the OnCommand Workflow Automation database and configurations on Linux
    Setting up OnCommand Workflow Automation
      Accessing OnCommand Workflow Automation
      OnCommand Workflow Automation data sources
        Configuring a database user on OnCommand Unified Manager
          Configuring a database user by running ocsetup on Windows
          Configuring a database user by running ocsetup on Linux
        Setting up a data source
        Adding an upgraded Unified Manager server as a data source
      Setting up OnCommand Workflow Automation using the Setup Wizard
      Creating local users
      Configuring the credentials of a target system
      Configuring OnCommand Workflow Automation
        Configuring AutoSupport
        Configuring authentication settings
          Adding Active Directory groups
        Configuring email notifications
        Configuring SNMP
        Configuring Syslog
        Configuring protocols for connecting to remote systems
      Disabling the default password policy
      Modifying the default password policy
      Enabling or disabling remote access to the OnCommand Workflow Automation database
      Modifying the transaction timeout setting of OnCommand Workflow Automation
      Enabling or disabling HTTP access to OnCommand Workflow Automation
    Upgrading from OnCommand Workflow Automation 3.1 or later
      Pack identification during upgrade
    Backing up the OnCommand Workflow Automation database
      Backing up the WFA database from the web portal
      Backing up the WFA database using the CLI
        Backing up (full) the WFA database using the CLI
        Backing up (regular) the WFA database using the CLI
      Backing up the WFA database using REST APIs
        Performing a full backup of the WFA database using REST APIs
        Performing a regular backup of the WFA database using REST APIs
    Restoring the OnCommand Workflow Automation database
      Restoring the WFA database
      Restoring the WFA database using the CLI
        Restoring (full) the WFA database using the CLI
        Restoring (regular) the WFA database using the CLI
      Restoring the WFA database using REST APIs
        Restoring (full) the WFA database using REST APIs
        Restoring (regular) the WFA database using REST APIs
    Resetting the admin password created during installation
    Importing OnCommand Workflow Automation content
      Considerations while importing OnCommand Workflow Automation content
    Migrating the OnCommand Workflow Automation installation
    Uninstalling OnCommand Workflow Automation
    Managing OnCommand Workflow Automation SSL certificate
      Replacing the default Workflow Automation SSL certificate
      Creating a certificate signing request for Workflow Automation
    Managing Perl and Perl modules
      Configuring your preferred Perl distribution
    Troubleshooting installation and configuration issues
      Cannot view Performance Advisor data in WFA
      Creating a support case for OnCommand Workflow Automation
    Related documentation for OnCommand Workflow Automation
  Installing Workflow Automation on a Windows host
    Overview of OnCommand Workflow Automation
      OnCommand Workflow Automation deployment architecture
      OnCommand Workflow Automation installation and setup overview
    System requirements for installing OnCommand Workflow Automation
      Ports required for Workflow Automation
    Prerequisites for installing Workflow Automation
    Installing OnCommand Workflow Automation on Windows
    Managing high availability
      Setting up Workflow Automation in MSCS for high availability
        Configuring MSCS to install Workflow Automation
        Installing OnCommand Workflow Automation on Windows
        Configuring Workflow Automation with MSCS
      Configuring earlier versions of OnCommand Workflow Automation for high availability
      Uninstalling Workflow Automation in an MSCS environment
      Backing up and restoring the OnCommand Workflow Automation database and configurations on Windows
    Setting up OnCommand Workflow Automation
      Accessing OnCommand Workflow Automation
      OnCommand Workflow Automation data sources
        Configuring a database user on OnCommand Unified Manager
          Configuring a database user by running ocsetup on Windows
          Configuring a database user by running ocsetup on Linux
        Setting up a data source
        Adding an upgraded Unified Manager server as a data source
      Setting up OnCommand Workflow Automation using the Setup Wizard
      Creating local users
      Configuring the credentials of a target system
      Configuring OnCommand Workflow Automation
        Configuring AutoSupport
        Configuring authentication settings
          Adding Active Directory groups
        Configuring email notifications
        Configuring SNMP
        Configuring Syslog
        Configuring protocols for connecting to remote systems
      Disabling the default password policy
      Modifying the default password policy for Windows
      Enabling remote access to the OnCommand Workflow Automation database on Windows
      Restricting access rights of OnCommand Workflow Automation on the host
      Modifying the transaction timeout setting of OnCommand Workflow Automation
      Enabling or disabling HTTP access to OnCommand Workflow Automation
    Upgrading OnCommand Workflow Automation
      Upgrading from OnCommand Workflow Automation 3.1 on Windows
        Pack identification during upgrade
    Backing up the OnCommand Workflow Automation database
      Backing up the WFA database from the web portal
      Backing up the WFA database using the PowerShell script
      Backing up the WFA database using the CLI
        Backing up (full) the WFA database using the CLI
        Backing up (regular) the WFA database using the CLI
      Backing up the WFA database using REST APIs
        Performing a full backup of the WFA database using REST APIs
        Performing a regular backup of the WFA database using REST APIs
    Restoring the OnCommand Workflow Automation database
      Restoring the WFA database
      Restoring the WFA database using the CLI
        Restoring (full) WFA database using the CLI
        Restoring (regular) WFA database using the CLI
      Restoring the WFA database using REST APIs
        Restoring (full) the WFA database using REST APIs
        Restoring (regular) the WFA database using REST APIs
    Resetting the admin password created during installation
    Importing OnCommand Workflow Automation content
      Considerations while importing OnCommand Workflow Automation content
    Migrating the OnCommand Workflow Automation installation
    Uninstalling OnCommand Workflow Automation
    Managing OnCommand Workflow Automation SSL certificate
      Replacing the default Workflow Automation SSL certificate
      Creating a certificate signing request for Workflow Automation
    Managing Perl and Perl modules
      Configuring your preferred Perl distribution
      Managing site-specific Perl modules
      Repairing the ActivePerl installation
    Troubleshooting installation and configuration issues
      Cannot open the OnCommand Workflow Automation login page
      Cannot view Performance Advisor data in WFA
      OnCommand Workflow Automation (WFA) displays a blank page on Windows 2012
      Creating a support case for OnCommand Workflow Automation
    Related documentation for OnCommand Workflow Automation
  Installing and setting up SnapCenter
    Deciding whether to read this information
    SnapCenter overview
      SnapCenter features
      SnapCenter components
      SnapCenter security features
      How resources, resource groups, and policies are used in data protection
    Installation workflow for new users
    Installation workflow for SnapManager users
    Preparing for the installation
      Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
      Storage types supported by SnapCenter Plug-in for Oracle Database
      Storage types supported by SnapCenter Plug-in for VMware vSphere
      Host requirements
        Domain requirements
        Space and sizing requirements
        Supported operating systems
        SAN host requirements
      Supported storage systems and applications
      Supported browsers
      Support for virtualized applications and virtual machines
      Using SnapCenter Plug-in for VMware vSphere with vCenter Servers in Linked Mode
      Connection and port requirements
      SnapCenter licensing requirements
      SnapCenter repository identification
      Network Load Balancing and Application Request Routing options
        Application Request Routing requirements
      Support for MySQL replication for high availability
      SnapCenter installation worksheet
    Installing SnapCenter and the plug-in packages
      Installing the SnapCenter Server
      Logging in to SnapCenter
      Modifying the SnapCenter default GUI session timeout
      Configuring role-based access control for SnapCenter users
        Types of role-based access control in SnapCenter
        Role-based access control permissions and roles
        Pre-defined SnapCenter roles and permissions
        Pre-defined SCV roles and permissions
        Adding a user to a role
        Assigning users access to assets
      Authentication and user management with vCenter RBAC and ONTAP RBAC
        Components of vCenter Server permissions
        Predefined roles packaged with SnapCenter Plug-in for VMware vSphere
        Product-level privilege required by SnapCenter Plug-in for VMware vSphere
        ONTAP RBAC features in SnapCenter Plug-in for VMware vSphere
        How to configure ONTAP RBAC for SnapCenter Plug-in for VMware vSphere
      Adding SnapCenter capacity licenses
        Types of SnapCenter licenses
        How SnapCenter calculates capacity usage
        Adding SnapCenter capacity licenses
      Setting up storage system connections
      Setting up Run As credentials
        Authentication methods for your Run As credentials
        Setting up your Run As credentials
      Installing plug-in packages
        Prerequisites to adding hosts and installing plug-in packages
          Configuring sudo privileges for non-root user
        SnapCenter plug-in deployment checklist
        Adding hosts and installing plug-in packages on remote hosts
          Modifying plug-in ports
        Installing plug-ins on multiple remote hosts using cmdlets
        Increasing the remote plug-in installation process timeout
        Monitoring SnapCenter plug-in package installation status
        Configuring the host log directory and verification server for SQL Server
        Identifying available resources
        Adding resources to SnapCenter Custom Plug-ins
        Adding databases to SnapCenter Plug-in for SAP HANA Database
        Managing the SnapCenter Plug-in Loader service for Linux
    Preparing storage systems for SnapMirror and SnapVault replication
      Understanding the differences between SnapMirror and SnapVault
      Preparing storage systems for SnapMirror replication
      Preparing storage systems for SnapVault replication
    Provisioning storage on Windows hosts
      Configuring LUN storage
        Establishing an iSCSI session
        Disconnecting an iSCSI session
        Creating and managing igroups
          Creating an igroup
          Renaming an igroup
          Modifying an igroup
          Deleting an igroup
        Creating and managing disks
          Viewing the disks on a host
          Creating FC-connected or iSCSI-connected LUNs or disks
          Resizing a disk
          Connecting a disk
          Disconnecting a disk
          Deleting a disk
      Creating and managing SMB shares
        Creating an SMB share
        Deleting an SMB share
      Reclaiming space on the storage system
      Using the SnapCenter Plug-in for Microsoft Windows in VMware environments
        Supported VMware guest OS platforms
          VMware ESX server-related limitations
          Minimum vCenter privileges required for SnapCenter RDM operations
        Using FC RDM LUNs in a Microsoft cluster
          Requirements for using FC RDM LUNs in a Microsoft cluster
          Microsoft cluster support limitations when using FC RDM LUNs
          Creating a shared FC RDM LUN
        Troubleshooting RDM LUN creation
      SnapCenter Plug-in for Microsoft Windows cmdlets
    Setting up protection for virtualized resources
      Updating hypervisor configuration settings
      Updating vCenter or SnapCenter information in the SnapCenter Plug-in for VMware vSphere
    Upgrading SnapCenter and SnapCenter plug-in packages
      Configuring SnapCenter to check for available updates
      Supported MySQL upgrade scenarios
      SnapCenter upgrade limitations
      Upgrading SnapCenter
      Upgrading your plug-in packages
    Migrating VSC hosts
      Prerequisites for migrating VSC hosts
      Migrating a VSC host using the SnapCenter GUI
      Migrating a VSC host using the vCenter GUI
      Post-migration tasks after migrating a VSC host
      Restarting the vSphere web client service
        Restarting the vSphere web client service in Windows
        Restarting the vSphere web client service in Linux
    Uninstalling SnapCenter plug-ins and plug-in packages
      Uninstalling plug-ins from a host using the SnapCenter GUI
      Uninstalling Windows plug-ins using the command-line interface on the SnapCenter Server host
      Uninstalling plug-ins locally on a host
      Uninstalling SnapCenter Plug-ins Package for Linux using the command-line interface
      Removing a host from SnapCenter Server
        Prerequisites to remove a host
        Removing a host
      Uninstalling SnapCenter
    Installing plug-ins independently
      Installing the SnapCenter Plug-in for Microsoft Windows independently
        Preparation to install the SnapCenter Plug-in for Microsoft Windows
        Installing the SnapCenter Plug-in for Microsoft Windows silently from the command line
      Installing SnapCenter Plug-in for Microsoft SQL Server independently
        Preparation to install the SnapCenter Plug-in for Microsoft SQL Server
        Installing the SnapCenter Plug-in for Microsoft SQL Server silently from the command line
      Installing SnapCenter Plug-in for Oracle Database independently
        Preparation to install the SnapCenter Plug-in for Oracle Database
        Installing the SnapCenter Plug-in for Oracle Database interactively
        Installing the SnapCenter Plug-in for Oracle Database using command-line interface
      Installing SnapCenter Plug-in for VMware vSphere independently
        Installing SnapCenter Plug-in for VMware vSphere independently on a Windows host
        Installing SnapCenter Plug-in for VMware vSphere in vCenter
    Troubleshooting
      SnapCenter installation fails to create DB with the error Invalid username/password, please try again
      Enabling AutoSupport email notifications
      Unable to create SSL or TLS secure channel
      SnapCenter Plug-in Package for Microsoft Windows or SnapCenter Plug-in for Microsoft SQL Server upgrade might fail on hosts with SQL databases on VMDK
      HTTP error 503. The service is unavailable.
      Unable to display SnapCenter web login page on local host
      SnapCenter Plug-ins Package for Linux installation fails due to an incorrect Java version
      SnapCenter Plug-ins Package for Linux installation fails due to improper uninstallation
      SnapCenter Plug-ins Package for Linux installation fails
      SnapCenter Plug-in for NAS File Services installation on the catalog server might fail while installing or upgrading SnapCenter
      Reinstalling SnapCenter Plug-ins for Linux does not update spl.properties file with new values
      SnapCenter Server is unable to communicate with the host
      SnapCenter plug-in loader fails with an error
      SnapCenter plug-in loader does not start automatically when the host is restarted
      Registering vCenter details task displays a warning
      Unable to access cluster IP address from outside network
      Unable to upgrade to SnapCenter 3.0 because communication with MySQL Server fails
      Unable to add storage systems after upgrading SnapCenter Server
      Failed to uninstall SnapCenter Server
      Uninstall does not remove plug-in from vCenter
    Appendixes
      Adding an ONTAP RBAC role using security login commands
      Minimum recommended RBAC roles for SnapCenter Plug-in for VMware vSphere
      Minimum ONTAP privileges required
      ONTAP CLI commands for creating SVM roles
      Features enabled on your Windows host during installation
    Copyright information
    Trademark information
    How to send comments about documentation and receive update notifications
  Importing SnapManager data into SnapCenter
    Deciding on whether to read this information
    Importing archived backups from SnapManager for Microsoft SQL Server to SnapCenter
      Limitations related to import feature
      Importing archived backups
      Viewing the imported backups in SnapCenter Server
    Importing data from SnapManager for Oracle and SnapManager for SAP to SnapCenter
      Configurations supported for importing data
        What gets imported to SnapCenter
        What does not get imported to SnapCenter
      Preparing to import data
      Importing data
      Cancelling an import operation
      Troubleshooting an import operation
Storage management
  Cluster management using System Manager
    Welcome to OnCommand System Manager Help
      Access to your favorite topics
    Understanding System Manager
    Icons used in the application interface
    Window layout customization
    Supportability Dashboard
    Where to find additional ONTAP information
    Setting up your cluster environment
      Setting up the cluster by using OnCommand System Manager
        Setting up a cluster by using the template file
        Setting up the cluster manually
          Creating a cluster
          Setting up a network
            Setting up a network when an IP address range is enabled
            Setting up a network when an IP address range is disabled
          Setting up a support page
          Reviewing storage recommendations
          Creating an SVM
      Accessing a cluster by using OnCommand System Manager browser-based graphic interface
      Configuring System Manager options
      Viewing OnCommand System Manager log files
        How system logging works
      Configuring a cluster by using System Manager
        Accessing a cluster by using OnCommand System Manager browser-based graphic interface
        Setting up the cluster
          Updating the cluster name
          Changing the cluster password
          Editing DNS configurations
          Creating a cluster-management interface
          Editing the node name
          Creating a node-management interface
          Editing AutoSupport settings
          Adding licenses
          Setting the time for a cluster
          Monitoring HA pairs
        Setting up the network
          Creating IPspaces
          Creating broadcast domains
          Creating subnets
        Setting up physical storage
          Assigning disks to nodes
          Zeroing spare disks
          Provisioning storage through aggregates
            Provisioning storage by creating an aggregate
            Provisioning storage by creating a Flash Pool aggregate
            Provisioning storage by creating a SnapLock aggregate
            Provisioning storage by creating a FabricPool
        Setting up logical storage
          Creating SVMs
            Configuring CIFS and NFS protocols on an SVM
            Configuring iSCSI protocol on SVMs
            Configuring FC and FCoE protocols on SVMs
            Delegating administration to SVM administrators
            Assigning aggregates to SVMs
          Creating FlexVol volumes
          Creating an Infinite Volume
          Creating SnapLock volumes
    Managing clusters
      What a cluster is
      Understanding quorum and epsilon
      What a node in the cluster is
      Dashboard window
        Monitoring a cluster using the dashboard
      Applications
      Configuration update
        Configuring the administration details of an SVM
        Configuration Updates window
      Service Processors
        Assigning IP addresses to Service Processors
        Editing Service Processor settings
        Understanding the Service Processor
        Service Processors window
      Cluster peers
        Prerequisites for cluster peering
        Creating cluster peer relationships
        Modifying the cluster peer passphrase
        Modifying the peer network parameters
        Deleting cluster peer relationships
        What a cluster peer is
        What cluster peer intercluster connectivity is
        Connecting one cluster to another cluster in a peer relationship
        Peers window
      High availability
        Understanding HA pairs
        High Availability window
      Licenses
        Deleting licenses
        Managing licenses
        License types and entitlement risk
        Licenses window
      Cluster Expansion
        Adding nodes to a cluster
        Configuring the network details of the nodes
      Cluster update
        Updating the cluster nondisruptively
          Obtaining ONTAP software images
        How you update a cluster nondisruptively
        Cluster Update window
      Date and time
        Managing the cluster time
        Date and Time window
      SNMP
        Enabling or disabling SNMP
        Setting SNMP information
        Enabling or disabling SNMP traps
        Testing the trap host configuration
        Options to use when configuring SNMP
        Managing SNMP on the cluster
        SNMP window
      LDAP
        Viewing the LDAP client configuration
        Using LDAP services
        LDAP window
      Users
        Adding a cluster user account
        Editing a cluster user account
        Changing passwords for cluster user accounts
        Locking or unlocking cluster user accounts
        User accounts (cluster administrators only)
        Roles
        Users window
      Roles
        Adding roles
        Editing roles
        Roles and permissions
        Predefined roles for cluster administrators
        Roles window
    Managing the network
      IPspaces
        Editing IPspaces
        Deleting IPspaces
        Configuring IPspaces
        Standard properties of IPspaces
      Broadcast domains
        Editing broadcast domains
        Deleting broadcast domains
        Configuring broadcast domains
      Subnets
        Editing subnets
        Deleting subnets
      Network interfaces
        Creating network interfaces
        Editing network interfaces
        Deleting network interfaces
        Migrating a LIF
        What LIFs are
        Roles for LIFs
        Guidelines for creating LIFs
      Ethernet ports
        Creating interface groups
        Creating VLAN interfaces
        Editing Ethernet port settings
        Editing interface group settings
        Editing the MTU size of a VLAN
        Deleting VLANs
        Ports and adapters
        Types of network ports
        How VLANs work
      FC/FCoE adapters
        Editing the FC/FCoE adapter speed
        Configuring subnets
      Network window
    Managing physical storage
      Storage Tiers
        Adding an external capacity tier
        Attaching an aggregate to external capacity tier
        Deleting an external capacity tier
        Editing an external capacity tier
        Editing aggregates
        Deleting aggregates
        Changing the RAID configuration when creating an aggregate
        Provisioning cache by adding SSDs
          Provisioning cache to aggregates by adding SSDs
          Increasing the cache for Flash Pool aggregates by adding SSDs
        Adding capacity disks
        Changing the RAID group when adding capacity disks
        Moving FlexVol volumes
        Mirroring aggregates
        Viewing aggregate information
        Understanding aggregates
        Installing a CA certificate if you use StorageGRID Webscale
        How RAID groups are named
        How moving a FlexVol volume works
        How Flash Pool aggregates work
        How you can use effective ONTAP disk type for mixing HDDs
        What compatible spare disks are
        How System Manager works with hot spares
        Rules for displaying disk types and disk RPM
        Aggregate requirements for Infinite Volumes
          What a namespace constituent is
          Aggregate requirements for destination Infinite Volumes
        How mirrored aggregates work
        What external capacity tiers and tiering policies are
        What a FabricPool is
        Storage Tiers window
      Aggregates
        Aggregates window
      Storage pools
        Creating a storage pool
        Adding disks to a storage pool
        Deleting storage pools
        How you use SSD storage pools
        How Flash Pool SSD partitioning increases cache allocation flexibility for Flash Pool aggregates
        Requirements and best practices for using SSD storage pools
        Considerations for when to use SSD storage pools
        Considerations for adding SSDs to an existing storage pool versus creating a new one
        Why you add disks to storage pools
        How storage pool works
        Storage Pools window
      Disks
        Reassigning disks to nodes
        Viewing disk information
        Understanding RAID drive types
        How ONTAP reports disk types
        How hot spare disks work
        RAID protection for array LUNs
        Minimum number of hot spares you should have
        Spare requirements for multi-disk carrier disks
        Shelf configuration requirements for multi-disk carrier storage shelves
        How to determine when it is safe to remove a multi-disk carrier
        Considerations for sizing RAID groups
        Considerations for ONTAP RAID groups for array LUNs
        Disks window
      Array LUNs
        Assigning array LUNs
        Reassigning spare array LUNs to nodes
        Zeroing spare array LUNs
        About disks and array LUNs
        How disks and array LUNs become available for use
        Rules for mixing array LUNs in an aggregate
        Array LUNs window
      Nodes
        Initializing the ComplianceClock time
        Nodes window
      Flash Cache
        Enabling or disabling Flash Cache
        How Flash Cache works
        Flash Cache window
      Events
        Events window
      System alerts
        Monitoring the health of your system
        Acknowledging system health alerts
        Suppressing system health alerts
        Deleting system health alerts
        Available cluster health monitors
        Ways to respond to system health alerts
        System Alerts window
      AutoSupport notifications
        Setting up AutoSupport notifications
        Enabling or disabling AutoSupport settings
        Adding AutoSupport email recipients
        Testing AutoSupport settings
        Generating AutoSupport data
        Viewing AutoSupport summary
        AutoSupport severity types
        AutoSupport window
      Jobs
        Jobs
        Job window
      Flash Pool statistics
        Flash Pool aggregate Statistics window
    Managing logical storage
      Storage Virtual Machines
        SVM Dashboard window
        Monitoring SVMs
        Editing SVM settings
        Deleting SVMs
        Starting SVMs
        Stopping SVMs
        What SVMs are
        Managing SVMs
        Types of SVMs
        Why you use SVMs
        How ONTAP name service switch configuration works
        Storage Virtual Machines window
      Volumes
        Editing the volume properties
        Editing data protection volumes
        Deleting volumes
        Creating FlexClone volumes
        Creating FlexClone files
        Splitting a FlexClone volume from its parent volume
        Viewing the FlexClone volume hierarchy
        Changing the status of a volume
        Viewing the Snapshot copies
        Creating Snapshot copies
        Setting the Snapshot copy reserve
        Hiding the Snapshot copy directory
        Scheduling automatic Snapshot copies
        Restoring a volume from a Snapshot copy
        Extending the expiry date of Snapshot copies
        Renaming Snapshot copies
        Deleting Snapshot copies
        Resizing volumes
        Enabling storage efficiency on a volume
        Changing the deduplication schedule
        Running deduplication operations
        Moving FlexVol volumes between aggregates or nodes
          Manually triggering the cutover for volume move
        Assigning volumes to Storage QoS
        Creating a mirror relationship from a source SVM
        Creating a vault relationship from a source SVM
        Creating a mirror and vault relationship from a source SVM
        Creating an NFS datastore for VMware
        Changing the tiering policy of a volume
        Creating FlexGroup volumes
        Editing FlexGroup volumes
        Resizing FlexGroup volumes
        Changing the status of a FlexGroup volume
        Deleting FlexGroup volumes
        Viewing FlexGroup volume information
        What volume granular encryption is
        How FlexVol volumes work
        What an Infinite Volume is
        Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
        Snapshot configuration
        Guidelines for working with Snapshot copies of Infinite Volumes
        When Snapshot copies of Infinite Volumes are accessible
        How volume guarantees work for FlexVol volumes
        How incremental tape backup uses SnapDiff and Snapshot copies
          What SnapDiff is
        FlexClone volumes and space guarantees
        Thin provisioning for greater efficiencies using FlexVol volumes
        Using space reservations with FlexVol volumes
        Considerations when using thin provisioning with Infinite Volumes
        Benefits of storage efficiency
        Data compression and deduplication
        Guidelines for using deduplication
        Options for resizing volumes
        Considerations when moving volumes
        How moving a FlexVol volume works
        Volumes window
      Namespace
        Mounting volumes
        Unmounting FlexVol volumes
        Changing export policies
        Namespace window
      Shares
        Creating a CIFS share
        Stopping share access
        Creating home directory shares
        Editing share settings
        How ONTAP enables dynamic home directories
        Shares window
      LUNs
        Creating FC SAN optimized LUNs
        Application-specific LUN settings
        Creating LUNs
        Deleting LUNs
        Creating initiator groups
        Deleting initiator groups
        Adding initiators
        Deleting initiators from an initiator group
        Creating port sets
        Deleting port sets
        Cloning LUNs
        Editing LUNs
        Bringing LUNs online
        Taking LUNs offline
        Moving LUNs
        Assigning LUNs to Storage QoS
        Editing initiator groups
        Editing initiators
        Editing port sets
        Viewing LUN information
        Viewing initiator groups
        Guidelines for working with FlexVol volumes that contain LUNs
        LUN size and type
        Understanding space reservations for LUNs
        Guidelines for using LUN multiprotocol type
        Understanding LUN clones
        Resizing a LUN
        Initiator hosts
        VMware RDM
        What igroups are
        Required information for creating igroups
        igroup name
        igroup type
        igroup ostype
        Ways to limit LUN access with port sets and igroups
        LUNs window
      Qtrees
        Creating qtrees
        Deleting qtrees
        Editing qtrees
        Assigning export policies to qtrees
        Viewing qtree information
        What a qtree is
        Qtree options
        Security styles
        Qtrees window
      Quotas
        Creating quotas
        Deleting quotas
        Editing quota limits
        Activating or deactivating quotas
        Resizing quotas
        Viewing quota information
        Types of quotas
        Quota limits
        Quota management
        How qtree changes affect quotas
        How changing the security style of a qtree affects user quotas
        How quotas work with users and groups
        Quotas window
      CIFS protocol
        Setting up CIFS
        Editing the general properties for CIFS
        Adding home directory paths
        Deleting home directory paths
        Resetting CIFS domain controllers
        Updating the CIFS group policy configuration
        Enabling or disabling a CIFS group policy configuration
        Reloading CIFS group policy
        Setting up BranchCache
        Modifying the BranchCache settings
        Deleting the BranchCache configuration
        Adding preferred domain controllers
        Editing preferred domain controllers
        Deleting preferred domain controllers
        Viewing CIFS domain information
        SMB concepts
        How ONTAP enables you to provide SMB client access to UNIX symbolic links
        Using BranchCache to cache SMB share content at a branch office
        What happens when you delete the BranchCache configuration
        CIFS window
      NFS protocol
        Editing NFS settings
        How ONTAP handles NFS client authentication
        NFS window
      iSCSI protocol
        Creating iSCSI aliases
        Enabling or disabling the iSCSI service on storage system interfaces
        Adding the security method for iSCSI initiators
        Editing default security settings
        Editing initiator security
        Changing the default iSCSI initiator authentication method
        Setting the default security for iSCSI initiators
        Starting or stopping the iSCSI service
        Viewing initiator security information
        What iSCSI is
        What iSCSI nodes are
        Initiator security
        What CHAP authentication is
        iSCSI window
      FC/FCoE protocol
        Starting or stopping the FC or FCoE service
        Changing an FC or FCoE node name
        What FC is
        What FC nodes are
        The FCoE protocol
        FC/FCoE window
      Export policies
        Creating an export policy
        Renaming export policies
        Deleting export policies
        Adding rules to an export policy
        Modifying export policy rules
        Deleting export policy rules
        How export policies control client access to volumes or qtrees
        Export Policies window
      Efficiency policies
        Adding efficiency policies
        Editing efficiency policies
        Deleting efficiency policies
        Enabling or disabling efficiency policies
        What an efficiency policy is
        Understanding predefined efficiency policies
        Efficiency Policies window
      Protection policies
        Creating protection policies
        Deleting protection policies
        Editing protection policies
        Configuring SnapMirror policies
        Protection Policies window
      QoS policy groups
        Creating QoS policy groups
        Deleting QoS policy groups
        Editing QoS policy groups
        Managing workload performance by using Storage QoS
        How Storage QoS works
        How the maximum throughput limit works
        Rules for assigning storage objects to policy groups
        QoS Policy Groups window
      NIS services
        Adding NIS domains
        Editing NIS domains
        Managing NIS domains
        NIS window
      LDAP client services
        Adding an LDAP client configuration
        Deleting an LDAP client configuration
        Editing an LDAP client configuration
        LDAP Client window
      LDAP configuration services
        Editing active LDAP clients
        Deleting active LDAP clients
        LDAP Configuration window
      Kerberos realm services
        Creating a Kerberos realm configuration
        Editing a Kerberos realm configuration
        Deleting Kerberos realm configurations
        Using Kerberos with NFS for strong security
        Kerberos authentication for CIFS
        Kerberos Realm window
      Kerberos interface services
        Editing Kerberos configuration
        Kerberos Interface window
      DNS/DDNS Services
        Enabling or disabling DNS and DDNS
        Editing DNS and DDNS settings
        DNS/DDNS Services window
      Users
        Adding SVM user accounts
        Changing the password for SVM user accounts
        Editing SVM user accounts
        Locking or unlocking SVM user accounts
        Users window
      Roles
        Adding roles
        Editing roles
        Predefined roles for SVM administrators
        Roles window
      UNIX
        UNIX window
      Windows
        Creating a local Windows group
        Editing local Windows group properties
        Adding user accounts to a Windows local group
        Renaming a local Windows group
        Deleting a local Windows group
        Creating a local Windows user account
        Editing the local Windows user properties
        Assigning group memberships to a user account
        Renaming a local Windows user
        Resetting the password of a Windows local user
        Deleting a local Windows user account
        Using local users and groups for authentication and authorization
        Local users and groups concepts
        Reasons for creating local users and local groups
        What local privileges are
        List of supported privileges
        Predefined BUILTIN groups and default privileges
        Windows window
      Name mapping
        Configuring name mappings
        How name mapping works
        Name mapping conversion rules
        How group mapping supports multiprotocol access to Infinite Volumes
        Name Mapping window
    Managing data protection
      Mirror relationships
        Creating a mirror relationship from a destination SVM
        Deleting mirror relationships
        Editing mirror relationships
        Initializing mirror relationships
        Updating mirror relationships
        Quiescing mirror relationships
        Resuming mirror relationships
        Breaking SnapMirror relationships
        Resynchronizing mirror relationships
        Reverse resynchronizing mirror relationships
        Aborting a mirror transfer
        Restoring a volume in a mirror relationship
        Components of a mirror relationship
        How SnapMirror works
        Uses for data protection mirror copies
        Providing disaster recovery on Infinite Volumes using mirroring technology
      Vault relationships
        Creating a vault relationship from a destination SVM
        Deleting vault relationships
        Editing vault relationships
        Initializing a vault relationship
        Updating a vault relationship
        Quiescing a vault relationship
        Resuming a vault relationship
        Aborting a Snapshot copy transfer
        Restoring a volume in a vault relationship
        What a SnapVault backup is
        How a SnapVault backup works
        Which data gets backed up and restored from a SnapVault backup
        How SnapVault backups work with data compression
        SnapVault backup limitations
        Guidelines for planning Snapshot copy schedule and retention for SnapVault backups
        Data protection for SVM namespace and root information
      Mirror and vault relationships
        Creating a mirror and vault relationship from a destination SVM
        Deleting mirror and vault relationships
        Editing mirror and vault relationships
        Initializing mirror and vault relationships
        Updating mirror and vault relationships
        Quiescing mirror and vault relationships
        Resuming mirror and vault relationships
        Breaking mirror and vault relationships
        Resynchronizing mirror and vault relationships
        Reverse resynchronizing mirror and vault relationships
        Aborting mirror and vault relationships
        Restoring a volume in a mirror and vault relationship
      What lag time is
      Types of data protection relationships
      Protection window
      Snapshot policies
        Creating Snapshot policies
        Editing Snapshot policies
        Deleting Snapshot policies
        About Snapshot policies
        Snapshot Policies window
      Schedules
        Creating schedules
        Editing schedules
        Deleting schedules
        Schedules
        Schedules window
  Cluster management workflows using System Manager
    OnCommand System Manager workflows
    Setting up a cluster by using OnCommand System Manager
      Setting up a cluster by using the template file
      Setting up the cluster manually
        Creating a cluster
        Setting up a network
          Setting up a network when an IP address range is enabled
          Setting up a network when an IP address range is disabled
        Setting up a support page
        Reviewing storage recommendations
        Creating an SVM
    Performing a nondisruptive cluster update
      Obtaining ONTAP software images
      Updating the cluster nondisruptively
    Setting up the network
      Creating VLAN interfaces
      Creating interface groups
      Creating broadcast domains
      Creating subnets
      Creating network interfaces
    Assigning disks or array LUNs to nodes
      Assigning disks to nodes
      Zeroing spare disks
      Assigning array LUNs
      Zeroing spare array LUNs
    Managing storage tiers by using FabricPool
      Adding an external capacity tier
      Attaching an aggregate to external capacity tier
      Provisioning storage by creating a FabricPool
      Changing the tiering policy of a volume
    Managing FlexGroup volumes using System Manager
      Creating FlexGroup volumes
    Resizing FlexGroup volumes using System Manager
      Resizing FlexGroup volumes
    Assigning disks to existing aggregates
      Adding capacity disks
      Provisioning cache to aggregates by adding SSDs
      Creating a storage pool
    Provisioning cache through Flash Pool aggregates
      Provisioning cache to aggregates by adding SSDs
      Increasing the cache for Flash Pool aggregates by adding SSDs
      Creating a storage pool
    Providing data resiliency by mirroring aggregates
      Provisioning storage through aggregates
        Provisioning storage by creating an aggregate
        Provisioning storage by creating a Flash Pool aggregate
      Mirroring aggregates
    Providing data access to qtrees using export policies
      Creating qtrees
      Assigning export policies to qtrees
      Creating an export policy
      Adding rules to an export policy
    Configuring a Service Processor
      Assigning IP addresses to Service Processors
      Editing Service Processor settings
    Setting up a BranchCache configuration
      Setting up CIFS
      Setting up BranchCache
      Editing share settings
    Protecting data using mirror and vault relationship
      Creating a mirror and vault relationship from a source SVM
      Creating a mirror and vault relationship from a destination SVM
    Protecting data using SnapLock
      Adding licenses
      Provisioning storage by creating a SnapLock aggregate
      Creating SnapLock volumes
      Mounting volumes
      Creating a mirror or vault relationship from a source or destination SVM
        Creating a mirror relationship from a source SVM
        Creating a mirror relationship from a destination SVM
        Creating a vault relationship from a source SVM
        Creating a vault relationship from a destination SVM
  Cluster management using System Manager
    Welcome to OnCommand System Manager Help
      Access to your favorite topics
    Understanding System Manager
    Icons used in the application interface
    Window layout customization
    Supportability Dashboard
    Where to find additional ONTAP information
    Setting up your cluster environment
      Setting up the cluster by using OnCommand System Manager
        Setting up a cluster by using the template file
        Setting up the cluster manually
          Creating a cluster
          Setting up a network
            Setting up a network when an IP address range is enabled
            Setting up a network when an IP address range is disabled
          Setting up a support page
          Reviewing storage recommendations
          Creating an SVM
      Accessing a cluster by using OnCommand System Manager browser-based graphic interface
      Configuring System Manager options
      Viewing OnCommand System Manager log files
        How system logging works
      Configuring a cluster by using System Manager
        Accessing a cluster by using OnCommand System Manager browser-based graphic interface
        Setting up the cluster
          Updating the cluster name
          Changing the cluster password
          Editing DNS configurations
          Creating a cluster-management interface
          Editing the node name
          Creating a node-management interface
          Editing AutoSupport settings
          Adding licenses
          Setting the time for a cluster
          Monitoring HA pairs
        Setting up the network
          Creating IPspaces
          Creating broadcast domains
          Creating subnets
        Setting up physical storage
          Assigning disks to nodes
          Zeroing spare disks
          Provisioning storage through aggregates
            Provisioning storage by creating an aggregate
            Provisioning storage by creating a Flash Pool aggregate
            Provisioning storage by creating a SnapLock aggregate
            Provisioning storage by creating a FabricPool
        Setting up logical storage
          Creating SVMs
            Configuring CIFS and NFS protocols on an SVM
            Configuring iSCSI protocol on SVMs
            Configuring FC and FCoE protocols on SVMs
            Delegating administration to SVM administrators
            Assigning aggregates to SVMs
          Creating FlexVol volumes
          Creating an Infinite Volume
          Creating SnapLock volumes
    Managing clusters
      What a cluster is
      Understanding quorum and epsilon
      What a node in the cluster is
      Dashboard window
        Monitoring a cluster using the dashboard
      Applications
      Configuration update
        Configuring the administration details of an SVM
        Configuration Updates window
      Service Processors
        Assigning IP addresses to Service Processors
        Editing Service Processor settings
        Understanding the Service Processor
        Service Processors window
      Cluster peers
        Prerequisites for cluster peering
        Creating cluster peer relationships
        Modifying the cluster peer passphrase
        Modifying the peer network parameters
        Deleting cluster peer relationships
        What a cluster peer is
        What cluster peer intercluster connectivity is
        Connecting one cluster to another cluster in a peer relationship
        Peers window
      High availability
        Understanding HA pairs
        High Availability window
      Licenses
        Deleting licenses
        Managing licenses
        License types and entitlement risk
        Licenses window
      Cluster Expansion
        Adding nodes to a cluster
        Configuring the network details of the nodes
      Cluster update
        Updating the cluster nondisruptively
          Obtaining ONTAP software images
        How you update a cluster nondisruptively
        Cluster Update window
      Date and time
        Managing the cluster time
        Date and Time window
      SNMP
        Enabling or disabling SNMP
        Setting SNMP information
        Enabling or disabling SNMP traps
        Testing the trap host configuration
        Options to use when configuring SNMP
        Managing SNMP on the cluster
        SNMP window
      LDAP
        Viewing the LDAP client configuration
        Using LDAP services
        LDAP window
      Users
        Adding a cluster user account
        Editing a cluster user account
        Changing passwords for cluster user accounts
        Locking or unlocking cluster user accounts
        User accounts (cluster administrators only)
        Roles
        Users window
      Roles
        Adding roles
        Editing roles
        Roles and permissions
        Predefined roles for cluster administrators
        Roles window
    Managing the network
      IPspaces
        Editing IPspaces
        Deleting IPspaces
        Configuring IPspaces
        Standard properties of IPspaces
      Broadcast domains
        Editing broadcast domains
        Deleting broadcast domains
        Configuring broadcast domains
      Subnets
        Editing subnets
        Deleting subnets
      Network interfaces
        Creating network interfaces
        Editing network interfaces
        Deleting network interfaces
        Migrating a LIF
        What LIFs are
        Roles for LIFs
        Guidelines for creating LIFs
      Ethernet ports
        Creating interface groups
        Creating VLAN interfaces
        Editing Ethernet port settings
        Editing interface group settings
        Editing the MTU size of a VLAN
        Deleting VLANs
        Ports and adapters
        Types of network ports
        How VLANs work
      FC/FCoE adapters
        Editing the FC/FCoE adapter speed
        Configuring subnets
      Network window
    Managing physical storage
      Storage Tiers
        Adding an external capacity tier
        Attaching an aggregate to external capacity tier
        Deleting an external capacity tier
        Editing an external capacity tier
        Editing aggregates
        Deleting aggregates
        Changing the RAID configuration when creating an aggregate
        Provisioning cache by adding SSDs
          Provisioning cache to aggregates by adding SSDs
          Increasing the cache for Flash Pool aggregates by adding SSDs
        Adding capacity disks
        Changing the RAID group when adding capacity disks
        Moving FlexVol volumes
        Mirroring aggregates
        Viewing aggregate information
        Understanding aggregates
        Installing a CA certificate if you use StorageGRID Webscale
        How RAID groups are named
        How moving a FlexVol volume works
        How Flash Pool aggregates work
        How you can use effective ONTAP disk type for mixing HDDs
        What compatible spare disks are
        How System Manager works with hot spares
        Rules for displaying disk types and disk RPM
        Aggregate requirements for Infinite Volumes
          What a namespace constituent is
          Aggregate requirements for destination Infinite Volumes
        How mirrored aggregates work
        What external capacity tiers and tiering policies are
        What a FabricPool is
        Storage Tiers window
      Aggregates
        Aggregates window
      Storage pools
        Creating a storage pool
        Adding disks to a storage pool
        Deleting storage pools
        How you use SSD storage pools
        How Flash Pool SSD partitioning increases cache allocation flexibility for Flash Pool aggregates
        Requirements and best practices for using SSD storage pools
        Considerations for when to use SSD storage pools
        Considerations for adding SSDs to an existing storage pool versus creating a new one
        Why you add disks to storage pools
        How storage pool works
        Storage Pools window
      Disks
        Reassigning disks to nodes
        Viewing disk information
        Understanding RAID drive types
        How ONTAP reports disk types
        How hot spare disks work
        RAID protection for array LUNs
        Minimum number of hot spares you should have
        Spare requirements for multi-disk carrier disks
        Shelf configuration requirements for multi-disk carrier storage shelves
        How to determine when it is safe to remove a multi-disk carrier
        Considerations for sizing RAID groups
        Considerations for ONTAP RAID groups for array LUNs
        Disks window
      Array LUNs
        Assigning array LUNs
        Reassigning spare array LUNs to nodes
        Zeroing spare array LUNs
        About disks and array LUNs
        How disks and array LUNs become available for use
        Rules for mixing array LUNs in an aggregate
        Array LUNs window
      Nodes
        Initializing the ComplianceClock time
        Nodes window
      Flash Cache
        Enabling or disabling Flash Cache
        How Flash Cache works
        Flash Cache window
      Events
        Events window
      System alerts
        Monitoring the health of your system
        Acknowledging system health alerts
        Suppressing system health alerts
        Deleting system health alerts
        Available cluster health monitors
        Ways to respond to system health alerts
        System Alerts window
      AutoSupport notifications
        Setting up AutoSupport notifications
        Enabling or disabling AutoSupport settings
        Adding AutoSupport email recipients
        Testing AutoSupport settings
        Generating AutoSupport data
        Viewing AutoSupport summary
        AutoSupport severity types
        AutoSupport window
      Jobs
        Jobs
        Job window
      Flash Pool statistics
        Flash Pool aggregate Statistics window
    Managing logical storage
      Storage Virtual Machines
        SVM Dashboard window
        Monitoring SVMs
        Editing SVM settings
        Deleting SVMs
        Starting SVMs
        Stopping SVMs
        What SVMs are
        Managing SVMs
        Types of SVMs
        Why you use SVMs
        How ONTAP name service switch configuration works
        Storage Virtual Machines window
      Volumes
        Editing the volume properties
        Editing data protection volumes
        Deleting volumes
        Creating FlexClone volumes
        Creating FlexClone files
        Splitting a FlexClone volume from its parent volume
        Viewing the FlexClone volume hierarchy
        Changing the status of a volume
        Viewing the Snapshot copies
        Creating Snapshot copies
        Setting the Snapshot copy reserve
        Hiding the Snapshot copy directory
        Scheduling automatic Snapshot copies
        Restoring a volume from a Snapshot copy
        Extending the expiry date of Snapshot copies
        Renaming Snapshot copies
        Deleting Snapshot copies
        Resizing volumes
        Enabling storage efficiency on a volume
        Changing the deduplication schedule
        Running deduplication operations
        Moving FlexVol volumes between aggregates or nodes
          Manually triggering the cutover for volume move
        Assigning volumes to Storage QoS
        Creating a mirror relationship from a source SVM
        Creating a vault relationship from a source SVM
        Creating a mirror and vault relationship from a source SVM
        Creating an NFS datastore for VMware
        Changing the tiering policy of a volume
        Creating FlexGroup volumes
        Editing FlexGroup volumes
        Resizing FlexGroup volumes
        Changing the status of a FlexGroup volume
        Deleting FlexGroup volumes
        Viewing FlexGroup volume information
        What volume granular encryption is
        How FlexVol volumes work
        What an Infinite Volume is
        Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
        Snapshot configuration
        Guidelines for working with Snapshot copies of Infinite Volumes
        When Snapshot copies of Infinite Volumes are accessible
        How volume guarantees work for FlexVol volumes
        How incremental tape backup uses SnapDiff and Snapshot copies
          What SnapDiff is
        FlexClone volumes and space guarantees
        Thin provisioning for greater efficiencies using FlexVol volumes
        Using space reservations with FlexVol volumes
        Considerations when using thin provisioning with Infinite Volumes
        Benefits of storage efficiency
        Data compression and deduplication
        Guidelines for using deduplication
        Options for resizing volumes
        Considerations when moving volumes
        How moving a FlexVol volume works
        Volumes window
      Namespace
        Mounting volumes
        Unmounting FlexVol volumes
        Changing export policies
        Namespace window
      Shares
        Creating a CIFS share
        Stopping share access
        Creating home directory shares
        Editing share settings
        How ONTAP enables dynamic home directories
        Shares window
      LUNs
        Creating FC SAN optimized LUNs
        Application-specific LUN settings
        Creating LUNs
        Deleting LUNs
        Creating initiator groups
        Deleting initiator groups
        Adding initiators
        Deleting initiators from an initiator group
        Creating port sets
        Deleting port sets
        Cloning LUNs
        Editing LUNs
        Bringing LUNs online
        Taking LUNs offline
        Moving LUNs
        Assigning LUNs to Storage QoS
        Editing initiator groups
        Editing initiators
        Editing port sets
        Viewing LUN information
        Viewing initiator groups
        Guidelines for working with FlexVol volumes that contain LUNs
        LUN size and type
        Understanding space reservations for LUNs
        Guidelines for using LUN multiprotocol type
        Understanding LUN clones
        Resizing a LUN
        Initiator hosts
        VMware RDM
        What igroups are
        Required information for creating igroups
        igroup name
        igroup type
        igroup ostype
        Ways to limit LUN access with port sets and igroups
        LUNs window
      Qtrees
        Creating qtrees
        Deleting qtrees
        Editing qtrees
        Assigning export policies to qtrees
        Viewing qtree information
        What a qtree is
        Qtree options
        Security styles
        Qtrees window
      Quotas
        Creating quotas
        Deleting quotas
        Editing quota limits
        Activating or deactivating quotas
        Resizing quotas
        Viewing quota information
        Types of quotas
        Quota limits
        Quota management
        How qtree changes affect quotas
        How changing the security style of a qtree affects user quotas
        How quotas work with users and groups
        Quotas window
      CIFS protocol
        Setting up CIFS
        Editing the general properties for CIFS
        Adding home directory paths
        Deleting home directory paths
        Resetting CIFS domain controllers
        Updating the CIFS group policy configuration
        Enabling or disabling a CIFS group policy configuration
        Reloading CIFS group policy
        Setting up BranchCache
        Modifying the BranchCache settings
        Deleting the BranchCache configuration
        Adding preferred domain controllers
        Editing preferred domain controllers
        Deleting preferred domain controllers
        Viewing CIFS domain information
        SMB concepts
        How ONTAP enables you to provide SMB client access to UNIX symbolic links
        Using BranchCache to cache SMB share content at a branch office
        What happens when you delete the BranchCache configuration
        CIFS window
      NFS protocol
        Editing NFS settings
        How ONTAP handles NFS client authentication
        NFS window
      iSCSI protocol
        Creating iSCSI aliases
        Enabling or disabling the iSCSI service on storage system interfaces
        Adding the security method for iSCSI initiators
        Editing default security settings
        Editing initiator security
        Changing the default iSCSI initiator authentication method
        Setting the default security for iSCSI initiators
        Starting or stopping the iSCSI service
        Viewing initiator security information
        What iSCSI is
        What iSCSI nodes are
        Initiator security
        What CHAP authentication is
        iSCSI window
      FC/FCoE protocol
        Starting or stopping the FC or FCoE service
        Changing an FC or FCoE node name
        What FC is
        What FC nodes are
        The FCoE protocol
        FC/FCoE window
      Export policies
        Creating an export policy
        Renaming export policies
        Deleting export policies
        Adding rules to an export policy
        Modifying export policy rules
        Deleting export policy rules
        How export policies control client access to volumes or qtrees
        Export Policies window
      Efficiency policies
        Adding efficiency policies
        Editing efficiency policies
        Deleting efficiency policies
        Enabling or disabling efficiency policies
        What an efficiency policy is
        Understanding predefined efficiency policies
        Efficiency Policies window
      Protection policies
        Creating protection policies
        Deleting protection policies
        Editing protection policies
        Configuring SnapMirror policies
        Protection Policies window
      QoS policy groups
        Creating QoS policy groups
        Deleting QoS policy groups
        Editing QoS policy groups
        Managing workload performance by using Storage QoS
        How Storage QoS works
        How the maximum throughput limit works
        Rules for assigning storage objects to policy groups
        QoS Policy Groups window
      NIS services
        Adding NIS domains
        Editing NIS domains
        Managing NIS domains
        NIS window
      LDAP client services
        Adding an LDAP client configuration
        Deleting an LDAP client configuration
        Editing an LDAP client configuration
        LDAP Client window
      LDAP configuration services
        Editing active LDAP clients
        Deleting active LDAP clients
        LDAP Configuration window
      Kerberos realm services
        Creating a Kerberos realm configuration
        Editing a Kerberos realm configuration
        Deleting Kerberos realm configurations
        Using Kerberos with NFS for strong security
        Kerberos authentication for CIFS
        Kerberos Realm window
      Kerberos interface services
        Editing Kerberos configuration
        Kerberos Interface window
      DNS/DDNS Services
        Enabling or disabling DNS and DDNS
        Editing DNS and DDNS settings
        DNS/DDNS Services window
      Users
        Adding SVM user accounts
        Changing the password for SVM user accounts
        Editing SVM user accounts
        Locking or unlocking SVM user accounts
        Users window
      Roles
        Adding roles
        Editing roles
        Predefined roles for SVM administrators
        Roles window
      UNIX
        UNIX window
      Windows
        Creating a local Windows group
        Editing local Windows group properties
        Adding user accounts to a Windows local group
        Renaming a local Windows group
        Deleting a local Windows group
        Creating a local Windows user account
        Editing the local Windows user properties
        Assigning group memberships to a user account
        Renaming a local Windows user
        Resetting the password of a Windows local user
        Deleting a local Windows user account
        Using local users and groups for authentication and authorization
        Local users and groups concepts
        Reasons for creating local users and local groups
        What local privileges are
        List of supported privileges
        Predefined BUILTIN groups and default privileges
        Windows window
      Name mapping
        Configuring name mappings
        How name mapping works
        Name mapping conversion rules
        How group mapping supports multiprotocol access to Infinite Volumes
        Name Mapping window
    Managing data protection
      Mirror relationships
        Creating a mirror relationship from a destination SVM
        Deleting mirror relationships
        Editing mirror relationships
        Initializing mirror relationships
        Updating mirror relationships
        Quiescing mirror relationships
        Resuming mirror relationships
        Breaking SnapMirror relationships
        Resynchronizing mirror relationships
        Reverse resynchronizing mirror relationships
        Aborting a mirror transfer
        Restoring a volume in a mirror relationship
        Components of a mirror relationship
        How SnapMirror works
        Uses for data protection mirror copies
        Providing disaster recovery on Infinite Volumes using mirroring technology
      Vault relationships
        Creating a vault relationship from a destination SVM
        Deleting vault relationships
        Editing vault relationships
        Initializing a vault relationship
        Updating a vault relationship
        Quiescing a vault relationship
        Resuming a vault relationship
        Aborting a Snapshot copy transfer
        Restoring a volume in a vault relationship
        What a SnapVault backup is
        How a SnapVault backup works
        Which data gets backed up and restored from a SnapVault backup
        How SnapVault backups work with data compression
        SnapVault backup limitations
        Guidelines for planning Snapshot copy schedule and retention for SnapVault backups
        Data protection for SVM namespace and root information
      Mirror and vault relationships
        Creating a mirror and vault relationship from a destination SVM
        Deleting mirror and vault relationships
        Editing mirror and vault relationships
        Initializing mirror and vault relationships
        Updating mirror and vault relationships
        Quiescing mirror and vault relationships
        Resuming mirror and vault relationships
        Breaking mirror and vault relationships
        Resynchronizing mirror and vault relationships
        Reverse resynchronizing mirror and vault relationships
        Aborting mirror and vault relationships
        Restoring a volume in a mirror and vault relationship
      What lag time is
      Types of data protection relationships
      Protection window
      Snapshot policies
        Creating Snapshot policies
        Editing Snapshot policies
        Deleting Snapshot policies
        About Snapshot policies
        Snapshot Policies window
      Schedules
        Creating schedules
        Editing schedules
        Deleting schedules
        Schedules
        Schedules window
  Cluster management workflows using System Manager
    OnCommand System Manager workflows
    Setting up a cluster by using OnCommand System Manager
      Setting up a cluster by using the template file
      Setting up the cluster manually
        Creating a cluster
        Setting up a network
          Setting up a network when an IP address range is enabled
          Setting up a network when an IP address range is disabled
        Setting up a support page
        Reviewing storage recommendations
        Creating an SVM
    Performing a nondisruptive cluster update
      Obtaining ONTAP software images
      Updating the cluster nondisruptively
    Setting up the network
      Creating VLAN interfaces
      Creating interface groups
      Creating broadcast domains
      Creating subnets
      Creating network interfaces
    Assigning disks or array LUNs to nodes
      Assigning disks to nodes
      Zeroing spare disks
      Assigning array LUNs
      Zeroing spare array LUNs
    Managing storage tiers by using FabricPool
      Adding an external capacity tier
      Attaching an aggregate to external capacity tier
      Provisioning storage by creating a FabricPool
      Changing the tiering policy of a volume
    Managing FlexGroup volumes using System Manager
      Creating FlexGroup volumes
    Resizing FlexGroup volumes using System Manager
      Resizing FlexGroup volumes
    Assigning disks to existing aggregates
      Adding capacity disks
      Provisioning cache to aggregates by adding SSDs
      Creating a storage pool
    Provisioning cache through Flash Pool aggregates
      Provisioning cache to aggregates by adding SSDs
      Increasing the cache for Flash Pool aggregates by adding SSDs
      Creating a storage pool
    Providing data resiliency by mirroring aggregates
      Provisioning storage through aggregates
        Provisioning storage by creating an aggregate
        Provisioning storage by creating a Flash Pool aggregate
      Mirroring aggregates
    Providing data access to qtrees using export policies
      Creating qtrees
      Assigning export policies to qtrees
      Creating an export policy
      Adding rules to an export policy
    Configuring a Service Processor
      Assigning IP addresses to Service Processors
      Editing Service Processor settings
    Setting up a BranchCache configuration
      Setting up CIFS
      Setting up BranchCache
      Editing share settings
    Protecting data using mirror and vault relationship
      Creating a mirror and vault relationship from a source SVM
      Creating a mirror and vault relationship from a destination SVM
    Protecting data using SnapLock
      Adding licenses
      Provisioning storage by creating a SnapLock aggregate
      Creating SnapLock volumes
      Mounting volumes
      Creating a mirror or vault relationship from a source or destination SVM
        Creating a mirror relationship from a source SVM
        Creating a mirror relationship from a destination SVM
        Creating a vault relationship from a source SVM
        Creating a vault relationship from a destination SVM
Storage monitoring and reporting
  Managing cluster health using Unified Manager
    Introduction to OnCommand Unified Manager health monitoring
      Unified Manager health monitoring features
      Unified Manager interfaces used to manage storage system health
      OnCommand Unified Manager product documentation
    Common Unified Manager health workflows and tasks
      Configuring your environment after deployment
        Changing the Unified Manager virtual appliance host name
          Generating an HTTPS security certificate
          Restarting the Unified Manager virtual machine
        Changing the Unified Manager host name in Red Hat Enterprise Linux
        Adding clusters
        Configuring Unified Manager to send alert notifications
          Configuring event notification settings
          Enabling remote authentication
          Disabling nested groups from remote authentication
          Adding authentication servers
          Testing the configuration of authentication servers
          Configuring global health threshold settings
            Configuring global aggregate health threshold values
            Configuring global volume health threshold values
            Editing lag health threshold settings for unmanaged protection relationships
          Adding users
          Subscribing to ONTAP EMS events
          Adding alerts
        Configuring database backup settings
        Changing the local user password
      Monitoring and troubleshooting data availability
        Resolving a flash card offline condition
          Performing corrective action for a flash card offline
        Scanning for and resolving storage failover interconnect link down conditions
          Performing corrective action for storage failover interconnect links down
        Resolving volume offline issues
          Performing diagnostic actions for volume offline conditions
            Determining if a volume is offline because its host node is down
            Determining if a volume is offline and its SVM is stopped because a node is down
            Determining if a volume is offline because of broken disks in an aggregate
      Resolving capacity issues
        Performing suggested remedial actions for a full volume
      Creating, monitoring, and troubleshooting protection relationships
        Setting up protection relationships in Unified Manager
          Configuring a connection between Workflow Automation and Unified Manager
          Verifying Unified Manager data source caching in Workflow Automation
          Creating a SnapMirror protection relationship from the Health/Volume details page
          Creating a SnapVault protection relationship from the Health/Volume details page
          Creating a SnapVault policy to maximize transfer efficiency
          Creating a SnapMirror policy to maximize transfer efficiency
          Creating SnapMirror and SnapVault schedules
        Performing a protection relationship failover and failback
          Breaking a SnapMirror relationship from the Health/Volume details page
          Reversing protection relationships from the Health/Volume details page
          Removing a protection relationship from the Health/Volume details page
          Resynchronizing protection relationships from the Health/Volume details page
        Resolving a protection job failure
          Identifying the problem and performing corrective actions for a failed protection job
        Resolving lag issues
      Restoring data from Snapshot copies
        Restoring data using the Health/Volume details page
        Restoring data using the Health/Volumes inventory page
      Managing scripts
        How scripts work with alerts
        Adding scripts
        Deleting scripts
        Testing script execution
      Managing and monitoring groups
        Understanding groups
          What a group is
          How group rules work for groups
          How group actions work on storage objects
        Adding groups
        Editing groups
        Deleting groups
        Adding group rules
        Editing group rules
        Deleting group rules
        Adding group actions
        Editing group actions
        Configuring volume health thresholds for groups
        Deleting group actions
        Reordering group actions
      Prioritizing storage object events using annotations
        Understanding more about annotations
          What annotations are
          How annotation rules work in Unified Manager
          Description of predefined annotation values
        Adding annotations dynamically
        Adding values to annotations
        Deleting annotations
        Viewing the annotation list and details
        Deleting values from annotations
        Creating annotation rules
        Adding annotations manually to individual storage objects
        Editing annotation rules
        Configuring conditions for annotation rules
        Deleting annotation rules
        Reordering annotation rules
      Configuring backup and restore operations
        What database backup is
        Configuring database backup settings
        What a database restore is
        Restoring a database backup on a virtual machine
        Restoring a database backup on Red Hat Enterprise Linux
        Restoring a database backup on Windows
      Managing storage objects using the Favorites option
        Adding to, and removing storage objects from, the Favorites list
        Cluster favorite card
        Aggregate favorite card
        Volume favorite card
      Creating and importing reports into Unified Manager
        Downloading and installing MySQL Connector/J
        Creating a database user
        Downloading the Eclipse Business Intelligence and Reporting Tools (BIRT)
        Creating a project using BIRT
        Creating a new report using BIRT
        Creating a JDBC data source using BIRT
        Creating a new MySQL data set using BIRT
        Importing reports
      Setting up and monitoring an SVM with Infinite Volume without storage classes
        Editing the Infinite Volume threshold settings
      Managing your Infinite Volume with storage classes and data policies
        Editing the threshold settings of storage classes
        Adding alerts
        Creating rules
          Creating rules using templates
          Creating custom rules
        Exporting a data policy configuration
      Sending a Unified Manager support bundle to technical support
        Accessing the maintenance console
        Generating a support bundle
        Retrieving the support bundle using a Windows client
        Retrieving the support bundle using a UNIX or Linux client
        Sending a support bundle to technical support
      Related tasks and reference information
        Adding and reviewing notes about an event
        Assigning events
        Resolving events
        Event details page
        Description of event severity types
        Description of event impact levels
        Description of event impact areas
        Health/Volume details page
        Health/Storage Virtual Machine details page
        Health/Cluster details page
        Health/Aggregate details page
        Protection/Job details page
        Definitions of user roles in Unified Manager
        Definitions of user types
        Unified Manager roles and capabilities
        Unified Manager CLI commands
    Using the maintenance console
      What functionality the maintenance console provides
      What the maintenance user does
      Diagnostic user capabilities
      Accessing the maintenance console
      Accessing the maintenance console using the vSphere VM console
      Maintenance console menus
        Network Configuration menu
        System Configuration menu
        Support and Diagnostics menu
        Additional menu options
      Changing the maintenance user password on Windows
      Changing the umadmin password on Red Hat Enterprise Linux
      Adding network interfaces
      Adding disk space to the Unified Manager database directory
        Adding space to the data directory of the Red Hat Enterprise Linux host
        Adding space to the data disk of the VMware virtual machine
        Adding space to the logical drive of the Microsoft Windows server
  Managing cluster performance using Unified Manager
    Introduction to OnCommand Unified Manager performance monitoring
      Unified Manager performance monitoring features
      Unified Manager interfaces used to manage storage system performance
      OnCommand Unified Manager product documentation
      Cluster configuration and performance data collection activity
      What a data continuity collection cycle is
      What the timestamp means in collected data and events
    Navigating performance workflows in the Unified Manager GUI
      Logging in to the UI
      Graphical interface and navigational paths
        Monitor cluster object navigation
        Monitor cluster performance navigation
        Event investigation navigation
        Unified Manager administration navigation
      Searching for storage objects
      Filtering performance inventory page content
      Accessing OnCommand System Manager from the Unified Manager interface
      Adding to, and removing storage objects from, the Favorites list
      Bookmarking frequently viewed product pages
      Bookmarking your favorite Help topics
    Understanding performance events and alerts
      Sources of performance events
      Performance event severity types
      Configuration changes detected by Unified Manager
      What happens when an event is received
      What information is contained in an alert email
      Adding alerts
      Adding alerts for performance events
      Types of system-defined performance threshold policies
    Managing performance thresholds
      How user-defined performance threshold policies work
      What happens when a performance threshold policy is breached
      What performance counters can be tracked using thresholds
      What objects and counters can be used in combination threshold policies
      Creating user-defined performance threshold policies
      Assigning performance threshold policies to storage objects
      Viewing performance threshold policies
      Editing user-defined performance threshold policies
      Removing performance threshold policies from storage objects
      What happens when a performance threshold policy is changed
      What happens to performance threshold policies when an object is moved
    Monitoring cluster performance from the Performance Dashboard
      Understanding the Performance dashboard
      Performance Dashboard cluster banner messages and descriptions
      Changing the performance statistics collection interval
    Monitoring cluster performance from the Performance Cluster Landing page
      Understanding the Performance Cluster Landing page
      Performance Cluster Landing page
        Performance Cluster Summary page
          Cluster performance events pane
          Managed Objects pane
        Top Performers page
    Monitoring performance using the Performance Inventory pages
      Object monitoring using the Performance object inventory pages
      Refining Performance inventory page contents
        Searching on Object Inventory Performance pages
        Sorting on the Object Inventory Performance pages
        Filtering data in the Object Inventory Performance pages
    Monitoring performance using the Performance Explorer pages
      Understanding the root object
      Apply filtering to reduce the list of correlated objects in the grid
      Specifying a time range for correlated objects
        Selecting a predefined time range
        Specifying a custom time range
      Defining the list of correlated objects for comparison graphing
      Understanding counter charts
      Types of performance counter charts
      Selecting performance charts to display
      Expanding the Counter Charts pane
      Changing the Counter Charts focus to a shorter period of time
      Viewing event details in the Events Timeline
      Counter Charts Zoom View
        Displaying the Counter Charts Zoom View
        Specifying the time range in Zoom View
        Selecting performance thresholds in Counter Charts Zoom View
      Viewing workload QoS minimum and maximum settings
      Viewing volume latency by cluster component
      Viewing SVM IOPS traffic by protocol
      Components of the Object Landing pages
        Summary page
        Components of the Performance Explorer page
    Managing performance using performance capacity and available IOPS information
      What performance capacity used is
      What the performance capacity used value means
      What available IOPS is
      Viewing node and aggregate performance capacity used values
      Viewing node and aggregate available IOPS values
      Viewing performance capacity counter charts to identify issues
      Performance capacity used performance threshold conditions
      Using the performance capacity used counter to manage performance
    Understanding and using the Node Failover Planning page
      Using the Node Failover Planning page to determine corrective actions
      Components of the Node Failover Planning page
      Using a threshold policy with the Node Failover Planning page
      Using the Performance Capacity Used (Advanced) chart for failover planning
    Setting up a connection between a Unified Manager server and an external data provider
      Performance data that can be sent to an external server
      Setting up Graphite to receive performance data from Unified Manager
      Configuring a connection from a Unified Manager server to an external data provider
    Collecting data and monitoring workload performance
      Types of workloads monitored by Unified Manager
      Workload performance measurement values
      What the expected range of performance is
      How the expected range is used in performance analysis
      How Unified Manager uses workload latency to identify performance issues
      How cluster operations can affect workload latency
      Performance monitoring of MetroCluster configurations
        Volume behavior during switchover and switchback
      What performance events are
        Performance event analysis and notification
        How Unified Manager determines the performance impact for an event
        Cluster components and why they can be in contention
        Roles of workloads involved in a performance event
    Analyzing workload performance
      Determining whether a workload has a performance issue
      Investigating a perceived slow response time for a workload
      Identifying trends of I/O response time on cluster components
      Analyzing the performance improvements achieved from moving a volume
        How moving a FlexVol volume works
      Performance/Volume Details page
        Performance statistics displayed in the data breakdown charts
        How graphs of performance data work
    Analyzing performance events
      Displaying information about performance events
      Analyzing events from user-defined performance thresholds
        Responding to user-defined performance threshold events
      Analyzing events from system-defined performance thresholds
        Responding to system-defined performance threshold events
      Analyzing events from dynamic performance thresholds
        Identifying victim workloads involved in a performance event
        Identifying bully workloads involved in a performance event
        Identifying shark workloads involved in a performance event
        Performance event analysis for a MetroCluster configuration
          Analyzing a performance event on a cluster in a MetroCluster configuration
          Analyzing a performance event for a remote cluster on a MetroCluster configuration
        Responding to a performance event caused by QoS policy group throttling
        Responding to a performance event caused by a disk failure
        Responding to a performance event caused by HA takeover
  Managing cluster health using Unified Manager
    Introduction to OnCommand Unified Manager health monitoring
      Unified Manager health monitoring features
      Unified Manager interfaces used to manage storage system health
      OnCommand Unified Manager product documentation
    Common Unified Manager health workflows and tasks
      Configuring your environment after deployment
        Changing the Unified Manager virtual appliance host name
          Generating an HTTPS security certificate
          Restarting the Unified Manager virtual machine
        Changing the Unified Manager host name in Red Hat Enterprise Linux
        Adding clusters
        Configuring Unified Manager to send alert notifications
          Configuring event notification settings
          Enabling remote authentication
          Disabling nested groups from remote authentication
          Adding authentication servers
          Testing the configuration of authentication servers
          Configuring global health threshold settings
            Configuring global aggregate health threshold values
            Configuring global volume health threshold values
            Editing lag health threshold settings for unmanaged protection relationships
          Adding users
          Subscribing to ONTAP EMS events
          Adding alerts
        Configuring database backup settings
        Changing the local user password
      Monitoring and troubleshooting data availability
        Resolving a flash card offline condition
          Performing corrective action for a flash card offline
        Scanning for and resolving storage failover interconnect link down conditions
          Performing corrective action for storage failover interconnect links down
        Resolving volume offline issues
          Performing diagnostic actions for volume offline conditions
            Determining if a volume is offline because its host node is down
            Determining if a volume is offline and its SVM is stopped because a node is down
            Determining if a volume is offline because of broken disks in an aggregate
      Resolving capacity issues
        Performing suggested remedial actions for a full volume
      Creating, monitoring, and troubleshooting protection relationships
        Setting up protection relationships in Unified Manager
          Configuring a connection between Workflow Automation and Unified Manager
          Verifying Unified Manager data source caching in Workflow Automation
          Creating a SnapMirror protection relationship from the Health/Volume details page
          Creating a SnapVault protection relationship from the Health/Volume details page
          Creating a SnapVault policy to maximize transfer efficiency
          Creating a SnapMirror policy to maximize transfer efficiency
          Creating SnapMirror and SnapVault schedules
        Performing a protection relationship failover and failback
          Breaking a SnapMirror relationship from the Health/Volume details page
          Reversing protection relationships from the Health/Volume details page
          Removing a protection relationship from the Health/Volume details page
          Resynchronizing protection relationships from the Health/Volume details page
        Resolving a protection job failure
          Identifying the problem and performing corrective actions for a failed protection job
        Resolving lag issues
      Restoring data from Snapshot copies
        Restoring data using the Health/Volume details page
        Restoring data using the Health/Volumes inventory page
      Managing scripts
        How scripts work with alerts
        Adding scripts
        Deleting scripts
        Testing script execution
      Managing and monitoring groups
        Understanding groups
          What a group is
          How group rules work for groups
          How group actions work on storage objects
        Adding groups
        Editing groups
        Deleting groups
        Adding group rules
        Editing group rules
        Deleting group rules
        Adding group actions
        Editing group actions
        Configuring volume health thresholds for groups
        Deleting group actions
        Reordering group actions
      Prioritizing storage object events using annotations
        Understanding more about annotations
          What annotations are
          How annotation rules work in Unified Manager
          Description of predefined annotation values
        Adding annotations dynamically
        Adding values to annotations
        Deleting annotations
        Viewing the annotation list and details
        Deleting values from annotations
        Creating annotation rules
        Adding annotations manually to individual storage objects
        Editing annotation rules
        Configuring conditions for annotation rules
        Deleting annotation rules
        Reordering annotation rules
      Configuring backup and restore operations
        What database backup is
        Configuring database backup settings
        What a database restore is
        Restoring a database backup on a virtual machine
        Restoring a database backup on Red Hat Enterprise Linux
        Restoring a database backup on Windows
      Managing storage objects using the Favorites option
        Adding to, and removing storage objects from, the Favorites list
        Cluster favorite card
        Aggregate favorite card
        Volume favorite card
      Creating and importing reports into Unified Manager
        Downloading and installing MySQL Connector/J
        Creating a database user
        Downloading the Eclipse Business Intelligence and Reporting Tools (BIRT)
        Creating a project using BIRT
        Creating a new report using BIRT
        Creating a JDBC data source using BIRT
        Creating a new MySQL data set using BIRT
        Importing reports
      Setting up and monitoring an SVM with Infinite Volume without storage classes
        Editing the Infinite Volume threshold settings
      Managing your Infinite Volume with storage classes and data policies
        Editing the threshold settings of storage classes
        Adding alerts
        Creating rules
          Creating rules using templates
          Creating custom rules
        Exporting a data policy configuration
      Sending a Unified Manager support bundle to technical support
        Accessing the maintenance console
        Generating a support bundle
        Retrieving the support bundle using a Windows client
        Retrieving the support bundle using a UNIX or Linux client
        Sending a support bundle to technical support
      Related tasks and reference information
        Adding and reviewing notes about an event
        Assigning events
        Resolving events
        Event details page
        Description of event severity types
        Description of event impact levels
        Description of event impact areas
        Health/Volume details page
        Health/Storage Virtual Machine details page
        Health/Cluster details page
        Health/Aggregate details page
        Protection/Job details page
        Definitions of user roles in Unified Manager
        Definitions of user types
        Unified Manager roles and capabilities
        Unified Manager CLI commands
    Using the maintenance console
      What functionality the maintenance console provides
      What the maintenance user does
      Diagnostic user capabilities
      Accessing the maintenance console
      Accessing the maintenance console using the vSphere VM console
      Maintenance console menus
        Network Configuration menu
        System Configuration menu
        Support and Diagnostics menu
        Additional menu options
      Changing the maintenance user password on Windows
      Changing the umadmin password on Red Hat Enterprise Linux
      Adding network interfaces
      Adding disk space to the Unified Manager database directory
        Adding space to the data directory of the Red Hat Enterprise Linux host
        Adding space to the data disk of the VMware virtual machine
        Adding space to the logical drive of the Microsoft Windows server
  Managing cluster performance using Unified Manager
    Introduction to OnCommand Unified Manager performance monitoring
      Unified Manager performance monitoring features
      Unified Manager interfaces used to manage storage system performance
      OnCommand Unified Manager product documentation
      Cluster configuration and performance data collection activity
      What a data continuity collection cycle is
      What the timestamp means in collected data and events
    Navigating performance workflows in the Unified Manager GUI
      Logging in to the UI
      Graphical interface and navigational paths
        Monitor cluster object navigation
        Monitor cluster performance navigation
        Event investigation navigation
        Unified Manager administration navigation
      Searching for storage objects
      Filtering performance inventory page content
      Accessing OnCommand System Manager from the Unified Manager interface
      Adding to, and removing storage objects from, the Favorites list
      Bookmarking frequently viewed product pages
      Bookmarking your favorite Help topics
    Understanding performance events and alerts
      Sources of performance events
      Performance event severity types
      Configuration changes detected by Unified Manager
      What happens when an event is received
      What information is contained in an alert email
      Adding alerts
      Adding alerts for performance events
      Types of system-defined performance threshold policies
    Managing performance thresholds
      How user-defined performance threshold policies work
      What happens when a performance threshold policy is breached
      What performance counters can be tracked using thresholds
      What objects and counters can be used in combination threshold policies
      Creating user-defined performance threshold policies
      Assigning performance threshold policies to storage objects
      Viewing performance threshold policies
      Editing user-defined performance threshold policies
      Removing performance threshold policies from storage objects
      What happens when a performance threshold policy is changed
      What happens to performance threshold policies when an object is moved
    Monitoring cluster performance from the Performance Dashboard
      Understanding the Performance dashboard
      Performance Dashboard cluster banner messages and descriptions
      Changing the performance statistics collection interval
    Monitoring cluster performance from the Performance Cluster Landing page
      Understanding the Performance Cluster Landing page
      Performance Cluster Landing page
        Performance Cluster Summary page
          Cluster performance events pane
          Managed Objects pane
        Top Performers page
    Monitoring performance using the Performance Inventory pages
      Object monitoring using the Performance object inventory pages
      Refining Performance inventory page contents
        Searching on Object Inventory Performance pages
        Sorting on the Object Inventory Performance pages
        Filtering data in the Object Inventory Performance pages
    Monitoring performance using the Performance Explorer pages
      Understanding the root object
      Apply filtering to reduce the list of correlated objects in the grid
      Specifying a time range for correlated objects
        Selecting a predefined time range
        Specifying a custom time range
      Defining the list of correlated objects for comparison graphing
      Understanding counter charts
      Types of performance counter charts
      Selecting performance charts to display
      Expanding the Counter Charts pane
      Changing the Counter Charts focus to a shorter period of time
      Viewing event details in the Events Timeline
      Counter Charts Zoom View
        Displaying the Counter Charts Zoom View
        Specifying the time range in Zoom View
        Selecting performance thresholds in Counter Charts Zoom View
      Viewing workload QoS minimum and maximum settings
      Viewing volume latency by cluster component
      Viewing SVM IOPS traffic by protocol
      Components of the Object Landing pages
        Summary page
        Components of the Performance Explorer page
    Managing performance using performance capacity and available IOPS information
      What performance capacity used is
      What the performance capacity used value means
      What available IOPS is
      Viewing node and aggregate performance capacity used values
      Viewing node and aggregate available IOPS values
      Viewing performance capacity counter charts to identify issues
      Performance capacity used performance threshold conditions
      Using the performance capacity used counter to manage performance
    Understanding and using the Node Failover Planning page
      Using the Node Failover Planning page to determine corrective actions
      Components of the Node Failover Planning page
      Using a threshold policy with the Node Failover Planning page
      Using the Performance Capacity Used (Advanced) chart for failover planning
    Setting up a connection between a Unified Manager server and an external data provider
      Performance data that can be sent to an external server
      Setting up Graphite to receive performance data from Unified Manager
      Configuring a connection from a Unified Manager server to an external data provider
    Collecting data and monitoring workload performance
      Types of workloads monitored by Unified Manager
      Workload performance measurement values
      What the expected range of performance is
      How the expected range is used in performance analysis
      How Unified Manager uses workload latency to identify performance issues
      How cluster operations can affect workload latency
      Performance monitoring of MetroCluster configurations
        Volume behavior during switchover and switchback
      What performance events are
        Performance event analysis and notification
        How Unified Manager determines the performance impact for an event
        Cluster components and why they can be in contention
        Roles of workloads involved in a performance event
    Analyzing workload performance
      Determining whether a workload has a performance issue
      Investigating a perceived slow response time for a workload
      Identifying trends of I/O response time on cluster components
      Analyzing the performance improvements achieved from moving a volume
        How moving a FlexVol volume works
      Performance/Volume Details page
        Performance statistics displayed in the data breakdown charts
        How graphs of performance data work
    Analyzing performance events
      Displaying information about performance events
      Analyzing events from user-defined performance thresholds
        Responding to user-defined performance threshold events
      Analyzing events from system-defined performance thresholds
        Responding to system-defined performance threshold events
      Analyzing events from dynamic performance thresholds
        Identifying victim workloads involved in a performance event
        Identifying bully workloads involved in a performance event
        Identifying shark workloads involved in a performance event
        Performance event analysis for a MetroCluster configuration
          Analyzing a performance event on a cluster in a MetroCluster configuration
          Analyzing a performance event for a remote cluster on a MetroCluster configuration
        Responding to a performance event caused by QoS policy group throttling
        Responding to a performance event caused by a disk failure
        Responding to a performance event caused by HA takeover
Storage management automation
  Building and managing workflows using Workflow Automation
    Overview of OnCommand Workflow Automation
    Understanding Workflow Automation designer
      Working with the building blocks in OnCommand Workflow Automation
        What data sources are
        What dictionary entries are
        How commands work
        What filters are
        What finders are
        What functions are
        What schemes are
        What remote system types are
        How you use templates
        How you use categories
        How entity versioning works
      What a playground database is
    Managing workflows
      Customizing predefined workflows
        Customizing the Create a Volume and a CIFS Share workflow
      Creating workflows
        Tasks involved in creating workflows
        How you define workflows
        How user inputs are defined
        How you map command parameters
        How you define constants
        How repeat row works
        How resource selection works
        How reservation works
        What incremental naming is
        What conditional execution is
        How return parameters work
        What approval points are
        How you execute custom REST end points
        How continue on failure works
        Sample workflow requirements checklist
        Creating a workflow
          Creating workflow help content
      Creating WFA workflow packs
        Adding entities to WFA workflow packs
        Deleting OnCommand Workflow Automation packs
        Exporting OnCommand Workflow Automation content
        Importing OnCommand Workflow Automation content
        Importing WFA workflow packs
        Considerations while importing OnCommand Workflow Automation content
        Pack identification during upgrade
      Integrating WFA workflow packs with the SCM repository
        Checking in a new workflow pack to SCM
        Checking in a new version of a WFA workflow pack
        Updating WFA workflow packs from the SCM server
        Checking in existing WFA workflow packs to the SCM server
        Removing WFA workflow packs from entities
        Rolling back a WFA workflow pack to its previous version in SCM
    Creating building blocks for workflows
      Creating a data source type
      Creating a command
        Testing the reservation script for commands
      Creating a finder
      Creating a filter
      Creating a dictionary entry
      Creating a function
      Creating a template
      Creating a cache query
      Creating recurring schedules
      Defining filter rules
      Adding approval points
    Coding guidelines for WFA
      Guidelines for variables
      Guidelines for indentation
      Guidelines for comments
      Guidelines for logging
      Guidelines for error handling
      General PowerShell and Perl conventions for WFA
        Perl modules bundled with Windows
      Considerations for adding custom PowerShell and Perl modules
      WFA cmdlets and functions
      PowerShell and Perl WFA modules
      Considerations while converting PowerShell commands to Perl
      Guidelines for WFA building blocks
        Guidelines for SQL in WFA
        Guidelines for WFA functions
        Guidelines for WFA dictionary entries
        Guidelines for commands
        Guidelines for workflows
        Guidelines for creating validation scripts for remote system types
        Guidelines for creating data source types
    Reserved words
    How you use REST APIs
    References to learning material
    Related documentation for OnCommand Workflow Automation
  Building and managing workflows using Workflow Automation
    Overview of OnCommand Workflow Automation
    Understanding Workflow Automation designer
      Working with the building blocks in OnCommand Workflow Automation
        What data sources are
        What dictionary entries are
        How commands work
        What filters are
        What finders are
        What functions are
        What schemes are
        What remote system types are
        How you use templates
        How you use categories
        How entity versioning works
      What a playground database is
    Managing workflows
      Customizing predefined workflows
        Customizing the Create a Volume and a CIFS Share workflow
      Creating workflows
        Tasks involved in creating workflows
        How you define workflows
        How user inputs are defined
        How you map command parameters
        How you define constants
        How repeat row works
        How resource selection works
        How reservation works
        What incremental naming is
        What conditional execution is
        How return parameters work
        What approval points are
        How you execute custom REST end points
        How continue on failure works
        Sample workflow requirements checklist
        Creating a workflow
          Creating workflow help content
      Creating WFA workflow packs
        Adding entities to WFA workflow packs
        Deleting OnCommand Workflow Automation packs
        Exporting OnCommand Workflow Automation content
        Importing OnCommand Workflow Automation content
        Importing WFA workflow packs
        Considerations while importing OnCommand Workflow Automation content
        Pack identification during upgrade
      Integrating WFA workflow packs with the SCM repository
        Checking in a new workflow pack to SCM
        Checking in a new version of a WFA workflow pack
        Updating WFA workflow packs from the SCM server
        Checking in existing WFA workflow packs to the SCM server
        Removing WFA workflow packs from entities
        Rolling back a WFA workflow pack to its previous version in SCM
    Creating building blocks for workflows
      Creating a data source type
      Creating a command
        Testing the reservation script for commands
      Creating a finder
      Creating a filter
      Creating a dictionary entry
      Creating a function
      Creating a template
      Creating a cache query
      Creating recurring schedules
      Defining filter rules
      Adding approval points
    Coding guidelines for WFA
      Guidelines for variables
      Guidelines for indentation
      Guidelines for comments
      Guidelines for logging
      Guidelines for error handling
      General PowerShell and Perl conventions for WFA
        Perl modules bundled with Windows
      Considerations for adding custom PowerShell and Perl modules
      WFA cmdlets and functions
      PowerShell and Perl WFA modules
      Considerations while converting PowerShell commands to Perl
      Guidelines for WFA building blocks
        Guidelines for SQL in WFA
        Guidelines for WFA functions
        Guidelines for WFA dictionary entries
        Guidelines for commands
        Guidelines for workflows
        Guidelines for creating validation scripts for remote system types
        Guidelines for creating data source types
    Reserved words
    How you use REST APIs
    References to learning material
    Related documentation for OnCommand Workflow Automation
Data protection
  Performing administrative tasks with SnapCenter
    Deciding whether to read this information
    SnapCenter overview
      SnapCenter features
      SnapCenter components
      SnapCenter security features
      How resources, resource groups, and policies are used in data protection
    Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
    Storage types supported by SnapCenter Plug-in for Oracle Database
    Logging in to SnapCenter
    Managing SnapCenter Standard and Advanced capacity licenses
      Adding SnapCenter capacity licenses
      Viewing SnapCenter Standard and Advanced capacity license details
      Modifying SnapCenter Standard or Advanced capacity licenses
      Deleting SnapCenter Standard or Advanced capacity licenses
    Managing your storage system connections
      What SVMs are
      Setting up storage system connections
      Modifying your storage system connections
      Deleting your storage system connections
      Viewing storage controller SnapManager Suite license status
    Managing virtualization plug-ins
      Updating vCenter or SnapCenter information in the SnapCenter Plug-in for VMware vSphere
    Using role-based access control
      Types of role-based access control in SnapCenter
      SnapCenter role-based access control
        Role-based access control permissions and roles
        Pre-defined SnapCenter roles and permissions
        Adding a user to a role
        Creating a new role
        Assigning users access to assets
        Modifying a role
      Application-level role-based access control
        Authentication methods for your Run As credentials
        Setting up your Run As credentials
        Configuring Run As account credentials for an individual SQL Server resource
        Configuring Run As account credentials for an Oracle database
    Using Application Request Routing and Network Load Balancing
      Application Request Routing requirements
      Determining load balancing status and Application Request Routing enablement
    Provisioning storage on Windows hosts
      Configuring LUN storage
        Establishing an iSCSI session
        Disconnecting an iSCSI session
        Creating and managing igroups
          Creating an igroup
          Renaming an igroup
          Modifying an igroup
          Deleting an igroup
        Creating and managing disks
          Viewing the disks on a host
          Creating FC-connected or iSCSI-connected LUNs or disks
          Resizing a disk
          Connecting a disk
          Disconnecting a disk
          Deleting a disk
      Creating and managing SMB shares
        Creating an SMB share
        Deleting an SMB share
      Reclaiming space on the storage system
      Using the SnapCenter Plug-in for Microsoft Windows in VMware environments
        Supported VMware guest OS platforms
          VMware ESX server-related limitations
          Minimum vCenter privileges required for SnapCenter RDM operations
        Using FC RDM LUNs in a Microsoft cluster
          Requirements for using FC RDM LUNs in a Microsoft cluster
          Microsoft cluster support limitations when using FC RDM LUNs
          Creating a shared FC RDM LUN
        Troubleshooting RDM LUN creation
      SnapCenter Plug-in for Microsoft Windows cmdlets
    Working with managed hosts
      Viewing details about managed hosts
      Modifying hosts and plug-ins
      Refreshing virtual machine information
      Starting and restarting plug-in services
      Suspending schedules on hosts to place them in maintenance mode
      Removing a host from SnapCenter Server
        Prerequisites to remove a host
        Removing a host
      Verifying the supported configurations for SnapCenter Plug-ins Package for Linux
    Managing the SnapCenter Server repository
      Prerequisites for protecting the SnapCenter repository
      Configuring the SnapCenter repository for protection
      Getting backups of the SnapCenter database
      Restoring the SnapCenter database backup
      Migrating the SnapCenter repository
    Using SnapCenter reporting capabilities
      Centralized reporting options
      Information provided in Dashboard reports
      Requesting job status reports from the Dashboard
      Configuring your dashboard
      Types of reports
      Configuring your reports
      Exporting or printing reports
      Setting the SMTP server for email notifications using Global Settings
      Configuring the option to email reports
    Monitoring jobs, schedules, events, and logs
      Monitoring SnapCenter jobs
        Monitoring backup operations
        Stopping a scheduled job
        Canceling queued jobs
      Monitoring SnapCenter schedules
      Monitoring SnapCenter events
      Monitoring SnapCenter logs
        Types of SnapCenter logs
        Event log locations
        Using Microsoft Windows Installer log files
        Using the SnapCenter version.exe/debug log
        Exporting logs
      Removing jobs and logs from SnapCenter
    Administering EMS data collection
      Stopping EMS data collection
      Starting EMS data collection
      Changing EMS data collection schedule and target SVM
      Monitoring EMS data collection status
    Using SnapCenter REST APIs
      Accessing REST APIs using the Swagger API web page
      List of available REST APIs
      Troubleshooting REST APIs
  Protecting custom applications with SnapCenter
    Deciding on whether to read this information
    Data protection using SnapCenter Custom Plug-ins
      What you can do with the SnapCenter Custom Plug-ins
      SnapCenter Custom Plug-ins features
      List of SnapCenter components
    Data protection workflow for SnapCenter Custom Plug-ins resources
    Preparing for data protection
      Prerequisites for using the SnapCenter Custom Plug-ins
      Storage types supported by SnapCenter Custom Plug-ins
      How resources, resource groups, and policies are used for protecting custom plug-in resources
    Logging in to SnapCenter
    Backing up custom plug-in resources
      Defining a backup strategy
        Backup schedules of custom plug-in resources
        Number of backup jobs needed
        Backup naming conventions
        How SnapCenter Plug-in for SAP HANA Database uses consistency group Snapshot copies?
        How SnapCenter works with SnapMirror and SnapVault technologies
        How SnapCenter uses prescripts and postscripts
      Adding resources to SnapCenter Custom Plug-ins
      Creating policies for custom plug-in resources
      Backing up individual custom plug-in resources
      Creating resource groups and attaching policies
      Backing up resource groups of custom plug-in resources
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing custom plug-in resource related backups and clones in the Topology page
    Restoring custom plug-in resources
      Types of restore strategies
      Restoring a resource backup
      Monitoring restore operations
    Cloning custom plug-in resource backups
      Cloning from a backup
      Monitoring clone operations from the Jobs page
    Troubleshooting data protection operations
      Custom plug-in installation fails
    Backing up, restoring, and cloning using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets
      Backing up resources using PowerShell cmdlets
      Restoring resources using PowerShell cmdlets
      Cloning backups using PowerShell cmdlets
  Protecting Microsoft SQL Server databases with SnapCenter
    Deciding on whether to read this information
    SnapCenter Plug-in for Microsoft SQL Server overview
      What you can do with the SnapCenter Plug-in for Microsoft SQL Server
      SnapCenter Plug-in for Microsoft SQL Server features
      List of SnapCenter components
      Support for Asymmetric LUN Mapping (ALM) in Windows clusters
    SnapCenter Plug-in for Microsoft SQL Server data protection workflow
    Preparing for data protection
      Prerequisites for using SnapCenter Plug-in for Microsoft SQL Server
      Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
      Storage layout recommendations for SnapCenter Plug-in for Microsoft SQL Server
      How resources, resource groups, and policies are used for protecting SQL Server
    Logging in to SnapCenter
    Backing up SQL Server resources
      Defining a backup strategy for SQL Server resources
        Type of backups supported
        Backup schedules for database plug-ins
        Number of backup jobs needed for databases
        Backup naming conventions
        Backup retention options
        How long to retain transaction log backups on the source storage system
        Can you put all databases on the same volume
        Backup copy verification using the primary or secondary storage volume
        When to schedule verification jobs
        How SnapCenter works with SnapMirror and SnapVault technologies
        Support for prescripts and postscripts
      Configuring Run As account credentials for an individual SQL Server resource
      Configuring log directory and verification server
      Determining whether resources are available for backup
      Migrating resources to NetApp storage system
      Creating backup policies for SQL Server databases
      Creating resource groups and attaching policies for SQL Server
      Backing up SQL resources
      Backing up SQL Server resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing SQL Server backups and clones in the Topology page
    Restoring SQL Server resources
      Defining a restoration strategy for SQL Server
        Sources and destinations for a restore operation
        Requirements for restoring a database
        SQL Server recovery models supported by SnapCenter
        Types of restore operations
      Restoring SQL Server databases
      Restoring a SQL Server database from secondary storage
      Reseeding Availability Group databases
      Monitoring restore operations
    Cloning SQL Server database resources
      Defining a cloning strategy for SQL Server
        Limitations related to clone operations
        Types of clone operations
      Cloning from a SQL Server database backup
      Performing Clone Lifecycle
      Monitoring clone operations
    Troubleshooting data protection operations
      Backup fails with Windows scheduler error
      Backup fails with error: Discover resource enumeration returns null or empty
      Unable to find Snapshot copy after successfully creating the backup
      SnapCenter log on and operations fail with error underlying provider failed to open
      Clone operation will fail due to inaccessible virtual device
      Clone operation fails as mounted clone drive is not found
      Clone operation might fail or take longer time to complete with default TCP_TIMEOUT value
      Verification and clone operation of a SQL database fails on bit-locker enabled drive
      Restore operation might timeout if the database size is in terabyte
      Restoring Availability Group fails
      Quiesce or grouping resources operations fail
      Backup operation initiated by an active directory user fails
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Managing backups
      Renaming backups
      Deleting backups
    Managing clones
      Deleting clones
    Backing up, restoring, cloning, and removing backups using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets
      Backing up resources using PowerShell cmdlets
      Restoring and recovering resources using PowerShell cmdlets
      Cloning backups using PowerShell cmdlets
      Removing backups using PowerShell cmdlets
      Cleaning up the secondary backup count using PowerShell cmdlets
  Protecting NAS file services data with SnapCenter
    Deciding whether to read this information
    SnapCenter Plug-in for NAS File Services overview
      What you can do with SnapCenter Plug-in for NAS File Services
      SnapCenter Plug-in for NAS File Services features
      List of SnapCenter components
    Installation and configuration workflow
    Preparing for the SnapCenter Plug-in for NAS File Services deployment
      ONTAP requirements
      SnapCenter host requirements
      SnapCenter file catalog requirements
      Supported browsers
      Licensing requirements
      Connection and port requirements
      Credential requirements
    Preparing the ONTAP environment
      Installing or upgrading ONTAP
      Adding appropriate ONTAP licenses
      Establishing cluster peering
        Prerequisites for cluster peering
        Preparing each cluster
        Configuring intercluster interfaces on all nodes
        Creating peer relationships among clusters
    Preparing the SnapCenter Linux file catalog server
      Installing Linux catalog servers
      Configuring SnapCenter file catalog ports
      Configuring sudo privileges for the non-root user
      Verifying the Java runtime environment
      Ensuring the Linux server is accessible for NAS file services file catalog
    Installing the SnapCenter Server
      Installing the SnapCenter Server with catalog servers
      Checking the status of NAS File Services components after SnapCenter installation
    Configuring SnapCenter for NAS File Services
      Logging in to SnapCenter
      Adding SnapCenter capacity licenses
      Setting up storage system connections
      Setting up your CIFS servers Run As credentials for NAS file services
      Configuring CIFS servers
      Protecting the SnapCenter file catalog and the repository
        Preparing the PowerShell environment
        Protecting the file catalog and SnapCenter repository with PowerShell cmdlets
    Backing up NAS file services data to secondary storage and restoring it with SnapCenter
      Using policies to protect NAS file services
        Modifying policies for NAS file services data
      Backing up NAS file services data to storage
        Viewing NAS file services resources and their protection status
        Backing up NAS file services to storage using SnapCenter
        Monitoring data protection progress in the SnapCenter Activity pane
        Monitoring backup operations
        Removing protection from a NAS file services resource
      Restoring NAS file services data from storage using SnapCenter
        Restore locations and access control list
        Searching through multiple volumes using the file catalog to restore a file or directory
        Browsing the Snapshot copy of a volume to restore a file
        Monitoring restore operations
    Viewing data protection reports for NAS file services
    Troubleshooting Plug-in for NAS File Services issues
      SnapCenter plug-in loader does not start automatically when the Linux catalog server is restarted
      SnapCenter Plug-in for NAS File Services installation on the catalog server might fail while installing or upgrading SnapCenter
      Reinstalling SnapCenter Server does not update spl.properties file with new values
      The file catalog servers fail to start
      Backup fails with error: Discover resource enumeration returns null or empty
      Failed to catalog NAS file services
      Restore operation fails due to Service Level Manager or Catalog service not running
  Protecting NAS file services data using Data Fabric Solution for Cloud Backup and SnapCenter
    Deciding whether to read this information
    Data Fabric Solution for Cloud Backup overview
      Data Fabric Solution for Cloud Backup components
      Data Fabric Solution for Cloud Backup features
      What you can do with Data Fabric Solution for Cloud Backup
    Installation and configuration workflow with SnapCenter data protection management
    Preparing for the Data Fabric Solution for Cloud Backup deployment
      ONTAP requirements
      SnapCenter host requirements
      SnapCenter file catalog requirements
      AltaVault requirements
      Supported browsers
      Licensing requirements
      Connection and port requirements
      Credential requirements
    Installing the Data Fabric Solution for Cloud Backup
      Preparing the ONTAP environment
        Installing or upgrading ONTAP
        Adding appropriate ONTAP licenses
        Establishing cluster peering
          Prerequisites for cluster peering
          Preparing each cluster
          Configuring intercluster interfaces on all nodes
          Creating peer relationships among clusters
      Preparing the SnapCenter Linux file catalog server
        Installing Linux catalog servers
        Configuring SnapCenter file catalog ports
        Configuring sudo privileges for the non-root user
        Verifying the Java runtime environment
        Ensuring the Linux server is accessible for NAS file services file catalog
      Installing the SnapCenter Server
        Installing the SnapCenter Server with catalog servers
        Checking the status of NAS File Services components after SnapCenter installation
      Installing or upgrading AltaVault
    Configuring the AltaVault appliance
      Logging in to AltaVault
      Configuring basics in AltaVault
      Configuring AltaVault using the GUI
        Enabling the SnapMirror service and configuring whitelist IP connections using the AltaVault GUI
        Long-term retention of Snapshot copies
        Enabling SnapMirror long-term retention mode in AltaVault
        Enabling SnapCenter access to AltaVault
        Adding a SnapCenter role-based user account to enable SnapCenter storage connections to an AltaVault appliance
        Starting the AltaVault Storage Optimization Service
      Configuring AltaVault using the AltaVault CLI
        Enabling the SnapMirror service using the AltaVault CLI
        Enabling access to SnapCenter using the AltaVault CLI
        Adding a SnapCenter role-based user account to enable storage connections to an AltaVault appliance
        Starting the AltaVault Optimization Service using the AltaVault CLI
    Configuring SnapCenter for Data Fabric Solution for Cloud Backup
      Logging in to SnapCenter
      Adding SnapCenter capacity licenses
      Setting up storage system connections
      Setting up your CIFS servers Run As credentials for NAS file services
      Configuring CIFS servers
      Protecting the SnapCenter file catalog and the repository
        Preparing the PowerShell environment
        Protecting the file catalog and SnapCenter repository with PowerShell cmdlets
    Backing up NAS file services data to the cloud and restoring it with SnapCenter
      Using policies to protect NAS file services
        Modifying policies for NAS file services data
      Backing up NAS file services data to the cloud
        Viewing NAS file services resources and their protection status
        Backing up NAS file services to the cloud using SnapCenter and AltaVault
        Monitoring data protection progress in the SnapCenter Activity pane
        Monitoring backup operations
        Verifying backup to the cloud completion on AltaVault (optional)
          Verifying backup to the cloud completion using AltaVault CLI (optional)
        Removing protection from a NAS file services resource
      Restoring NAS file services data from the cloud using SnapCenter
        Restore locations and access control list
        Searching through multiple volumes using the file catalog to restore a file or directory
        Browsing the Snapshot copy of a volume to restore a file
        Monitoring restore operations
      Managing SnapMirror shares using the AltaVault CLI
    Viewing data protection reports for NAS file services
      Viewing data protection reports in AltaVault
    Troubleshooting Plug-in for NAS File Services issues
      SnapCenter plug-in loader does not start automatically when the Linux catalog server is restarted
      SnapCenter Plug-in for NAS File Services installation on the catalog server might fail while installing or upgrading SnapCenter
      Reinstalling SnapCenter Server does not update spl.properties file with new values
      Backup fails with error: Discover resource enumeration returns null or empty
      The file catalog servers fail to start
      Failed to remove protection from a NAS file services resource
      Failed to catalog NAS file services
      Restore operation fails due to Service Level Manager or Catalog service not running
  Protecting NAS file services data using Data Fabric Solution for Cloud Backup and ONTAP commands
    Deciding whether to read this information
    Data Fabric Solution for Cloud Backup overview
      Data Fabric Solution for Cloud Backup components
      Data Fabric Solution for Cloud Backup features
      What you can do with Data Fabric Solution for Cloud Backup
    Installation and configuration workflow With ONTAP CLI data protection management
    Preparing for the Data Fabric Solution for Cloud Backup deployment
      ONTAP requirements
      AltaVault requirements
      Supported browsers
      Licensing requirements
      Connection and port requirements
      Credential requirements
    Installing the Data Fabric Solution for Cloud Backup
      Preparing the ONTAP environment
        Installing or upgrading ONTAP
        Adding appropriate ONTAP licenses
        Establishing cluster peering
          Prerequisites for cluster peering
          Preparing each cluster
          Configuring intercluster interfaces on all nodes
          Creating peer relationships among clusters
      Installing or upgrading AltaVault
    Configuring the AltaVault appliance
      Logging in to AltaVault
      Configuring basics in AltaVault
      Configuring AltaVault using the GUI
        Enabling the SnapMirror service and configuring whitelist IP connections using the AltaVault GUI
        Long-term retention of Snapshot copies
        Enabling SnapMirror long-term retention mode in AltaVault
        Starting the AltaVault Storage Optimization Service
      Configuring AltaVault using the AltaVault CLI
        Enabling the SnapMirror service using the AltaVault CLI
        Configuring a whitelist of IP connections using the AltaVault CLI
        Enabling SnapMirror long-term retention mode using the AltaVault CLI
        Starting the AltaVault Optimization Service using the AltaVault CLI
    Backing up NAS file services data to the cloud and restoring it using ONTAP commands
      Creating a SnapMirror protection relationship
        Reviewing volume status and contents
        Creating and initializing a SnapMirror protection relationship
      Backing up NAS file services data to the cloud using ONTAP commands
        Performing an incremental backup from ONTAP to the cloud using the ONTAP CLI
        Monitoring backup progress using the ONTAP CLI
      Restoring NAS file services from AltaVault using ONTAP commands
        Restoring a full backup from AltaVault using the ONTAP CLI
        Restoring a single file from AltaVault to ONTAP using the ONTAP CLI
    Viewing data protection reports in AltaVault
  Protecting Oracle databases with SnapCenter
    Deciding whether to read this information
    Data protection using SnapCenter Plug-in for Oracle Database
      What you can do with the SnapCenter Plug-in for Oracle Database
      SnapCenter Plug-in for Oracle Database features
      List of SnapCenter components
    Data protection workflow for Oracle databases
    Preparing for data protection
      Prerequisites for using the SnapCenter Plug-in for Oracle Database
      Storage types supported by SnapCenter Plug-in for Oracle Database
      How resources, resource groups, and policies are used for protecting Oracle databases
    Logging in to SnapCenter
    Backing up Oracle databases
      Defining a backup strategy for Oracle databases
        Supported Oracle database configurations for backups
        Types of backup supported
        Why to specify preferred nodes in RAC setup
        Backup cataloging with Oracle Recovery Manager
        Backup schedules for database plug-ins
        Backup naming conventions
        Backup retention options
        Backup copy verification using the primary or secondary storage volume
        Supported prescripts and postscripts
        How SnapCenter works with SnapMirror and SnapVault technologies
      Configuring Run As account credentials for an Oracle database
      Determining whether Oracle databases are available for backup
      Creating backup policies for Oracle databases
      Creating resource groups and attaching policies for Oracle databases
      Backing up Oracle resources
      Backing up Oracle database resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing Oracle database backups and clones in the Topology page
    Mounting and unmounting database backups
      Mounting a database backup
      Unmounting a database backup
    Restoring Oracle databases
      Defining a restore and recovery strategy for Oracle databases
        Backups supported for restore and recovery operations
        Types of restore methods supported for Oracle databases
        Types of restore operations supported for Oracle databases
        Types of recovery operations supported for Oracle databases
        Limitations related to restore and recovery operations
        Sources and destinations for restore operations
      Restoring an Oracle database
      Monitoring restore operations
    Cloning Oracle database backups
      Defining a clone strategy for Oracle databases
        Backups supported for cloning
        Types of cloning supported
        Clone naming conventions
        Limitations related to clone operations
      Cloning an Oracle database backup
      Monitoring clone operations
    Troubleshooting data protection operations
      Discovery operation takes long time to complete
      Unable to add Linux host to SnapCenter
      Scanning of host bus adapters takes long time to complete
      Backup fails during the discovery of file system on a VM
      Backup operation fails during the storage discovery process
      Backup operation fails if database query is timed out
      Backup operation might fail when the OS group ID of the Oracle database administrator is changed
      Backup fails with error: Discover resource enumeration returns null or empty
      Cataloging and uncataloging with Oracle RMAN will fail if the execution time is beyond the timeout value
      Registering backup activity fails during the backup operation
      Unable to find Snapshot copy after successfully creating the backup
      ASM backup verification fails
      Backup verification fails when files are not accessible
      Disk paths are not included in the asm_diskstring database parameter
      Unable to change the database state from shutdown to mount
      Restore operation of datafiles and control files fail
      Restore from a secondary SnapMirror or SnapVault location fails
      Restore operation might fail if the database size is in terabytes
      Clone operation will fail if multipath is disabled on the plug-in host
      Cloning operation will fail when you reuse the SID of an immediately deleted clone
      Cloning operation will fail in SAN environments on OL 7 or later or RHEL 7 or later
      Clone operation will fail due to inaccessible virtual device
      Clone operation might fail or take longer time to complete with default TCP_TIMEOUT value
      Clone operation might fail if you are using Oracle databases 11.2.0.3 or later
      Recovery of a cloned database fails
      File system is not deleted during the clone delete operation
      Backup and clone operations fail if stale entries of the cloned disk group exists
      Operations fail when there is insufficient space to create Snapshot copies
      Operations are not executed due to insufficient space in the root file system
      Data protection operation fails if operational lock file is not deleted
      Operations that require backup to be mounted might fail
      Messages in the log file display incorrect time zone
      Operations fail with command execution timeout error
      Data protection operation fails in a non-multipath environment in RHEL 7 and later
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Managing backups
      Renaming backups
      Deleting backups
    Managing clones
      Deleting clones
    Backing up, restoring, and cloning using Linux commands
      Backing up Oracle databases using Linux commands
      Restoring and recovering Oracle databases using Linux commands
      Cloning Oracle database backups using Linux commands
  Protecting SAP HANA databases with SnapCenter
    Deciding on whether to read this information
    Data protection using SnapCenter Plug-in for SAP HANA Database
      Tasks you can perform using the SnapCenter Plug-in for SAP HANA Database
      SnapCenter Plug-in for SAP HANA Database features
      List of SnapCenter components
    Data protection workflow for SAP HANA databases
    Preparing for data protection
      Prerequisites for using the SnapCenter Plug-in for SAP HANA Database
      Storage types supported by SnapCenter Plug-in for SAP HANA Database
      How resources, resource groups, and policies are used in data protection of SAP HANA databases
    Logging in to SnapCenter
    Backing up SAP HANA databases
      Defining a backup strategy for SAP HANA databases
        Type of backups supported
        How SnapCenter Plug-in for SAP HANA Database uses consistency group Snapshot copies?
        How SnapCenter manages housekeeping of log and data backups
        Considerations for determining backup schedules for SAP HANA database
        Number of backup jobs needed for SAP HANA databases
        Backup naming conventions
        How SnapCenter works with SnapMirror and SnapVault technologies
        Supported prescripts and postscripts
      Adding databases to SnapCenter Plug-in for SAP HANA Database
      Creating backup policies for SAP HANA databases
      Creating resource groups and attaching policies
      Backing up SAP HANA databases
      Backing up resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing SAP HANA database backups and clones in the Topology page
    Restoring SAP HANA databases
      Types of restore strategies
      Restoring a database backup
      Monitoring restore operations
    Cloning SAP HANA database backups
      Cloning a SAP HANA database backup
      Monitoring clone operations from the Jobs page
    Troubleshooting data protection operations
      User store key not found
      Invalid user store key
      Unable to access SAP HANA system
      Unable to access tenant database
      File-Based Backup workflow fails
      Unable to find Snapshot copy after successfully creating the backup
      Catalog entries are not deleted after volume based restore operation
      Invalid HDBSQL OS username
      Backup operation fails
      Backup fails with error: Discover resource enumeration returns null or empty
      Cannot enable SAP HANA
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Deleting SAP HANA database backups
    Deleting SAP HANA database clones
    Backing up, restoring, and cloning using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets for SAP HANA database
      Backing up databases using PowerShell cmdlets
      Restoring SAP HANA database using PowerShell cmdlets
      Cloning SAP HANA database backups using PowerShell cmdlets
  Protecting VMs and Datastores with the SnapCenter Plug-in for VMware vSphere
    Deciding whether to read this information
    SnapCenter Plug-in for VMware vSphere overview
      What you can do with SnapCenter Plug-in for VMware vSphere
      SnapCenter Plug-in for VMware vSphere features in vCenter
      List of SnapCenter components
    Accessing the SnapCenter Plug-in for VMware vSphere in vCenter
    Dashboard and job monitor
      Dashboard
      Monitoring jobs and downloading job logs
    Preparing for data protection for VMs and datastores
      Prerequisites for using SnapCenter Plug-in for VMware vSphere
      Storage types supported by SnapCenter Plug-in for VMware vSphere
      How virtual resources, resource groups, and policies are used in data protection
      Configuring SnapCenter Plug-in for VMware vSphere for email alerts
    Defining a backup strategy for VMs and datastores
      Backup schedules for VMs and datastores
      Number of backups needed
      Backup naming conventions
      Backup retention options
      How SnapCenter works with SnapMirror and SnapVault technologies
    Backing up VMs and datastores
      Viewing backups
      Creating backup policies
      Support for prescripts and postscripts
      Creating resource groups
      Adding a single VM or datastore to a resource group
      Adding multiple VMs and datastores to a resource group
      Backing up resource groups on demand
    Restoring VMs from backups
      Considerations for restore operations using data that was backed up with failed VMware consistency snapshots
      Searching for backups
      Restoring data from backups
      Attaching a virtual disk to restore a file
      Detaching a virtual disk
    Mounting and unmounting datastores
      Mounting a datastore backup
      Unmounting a datastore backup
    Managing SVMs in the SnapCenter Plug-in for VMware vSphere inventory
      Adding SVMs using the SnapCenter Plug-in for VMware vSphere GUI
      Modifying SVMs using the SnapCenter Plug-in for VMware vSphere GUI
      Removing SVMs using the SnapCenter Plug-in for VMware vSphere GUI
    Managing resource groups for VMs and datastores
      Suspending and resuming operations on resource groups
      Modifying resource groups
      Deleting resource groups
    Managing policies for VMs and datastores
      Detaching policies
      Modifying policies
      Deleting policies
    Managing backups of VMs and datastores
      Renaming backups
      Deleting backups
    Troubleshooting
      vCenter GUI not correct for SnapCenter Plug-in for VMware vSphere
        Restarting the vSphere web client service in Windows
        Restarting the vSphere web client service in Linux
      You may have reached the maximum number of NFS volumes configured in the vCenter
      Unable to discover datastores on an SVM without a management LIF
      VMware vSphere does not remove snapshot delta disks during restore
      SnapCenter compatibility check fails
      Backup fails with error: Discover resource enumeration returns null or empty
      Unable to find Snapshot copy after successfully creating the backup
    Appendixes
      Overrides for customizing or retrying backup operations
      Minimum recommended RBAC roles for SnapCenter Plug-in for VMware vSphere
      Minimum ONTAP privileges required
  Protecting Windows file systems with SnapCenter
    Deciding whether to read this information
    SnapCenter Plug-in for Windows file systems overview
      What you can do with the SnapCenter Plug-in for Microsoft Windows
      SnapCenter Plug-in for Windows features
      List of SnapCenter components
    SnapCenter Plug-in for Windows file systems data protection workflow
    Preparing for data protection
      Prerequisites for using SnapCenter Plug-in for Microsoft Windows
      Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
      Storage layout requirements for SnapCenter Plug-in for Microsoft Windows
      How resources, resource groups, and policies are used in data protection
    Defining a backup strategy for Windows file systems
      Backup schedules for Windows file systems
      Number of backups needed for Windows file systems
      Backup naming convention
      Backup retention options
      How SnapCenter works with SnapMirror and SnapVault technologies
    Logging in to SnapCenter
    Backing up Windows file systems
      Determining resource availability
      Viewing related backups and clones in the Topology page
      Creating backup policies for Windows file systems
      Support for prescripts and postscripts
      Creating resource groups for Windows file systems
      Backing up resources
        Backing up a single resource on demand
        Backing up resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
    Restoring Windows file systems
      Defining a restoration strategy for Windows file system
      Restoring Windows file system backups
      Monitoring restore operations
    Cloning Windows file system backups
      Defining a cloning strategy for Windows file systems
        Limitations related to cloning operations for Windows file systems
        Sources and destinations of clones for Windows file systems
      Cloning from a Windows file system backup
      Monitoring clone operations
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing backups
      Renaming backups
      Deleting backups
    Managing clones
      Deleting clones
    Backing up, restoring, cloning, and removing backups using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets
      Backing up resources using PowerShell cmdlets
      Restoring and recovering resources using PowerShell cmdlets
      Cloning backups using PowerShell cmdlets
      Removing backups using PowerShell cmdlets
      Cleaning up the secondary backup count using PowerShell cmdlets
    Troubleshooting data protection operations
      Backup fails with error: Discover resource enumeration returns null or empty
      Unable to find Snapshot copy after successfully creating the backup
      Scheduled backups fail due to task limit
      Clone operation will fail due to inaccessible virtual device
  Performing administrative tasks with SnapCenter
    Deciding whether to read this information
    SnapCenter overview
      SnapCenter features
      SnapCenter components
      SnapCenter security features
      How resources, resource groups, and policies are used in data protection
    Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
    Storage types supported by SnapCenter Plug-in for Oracle Database
    Logging in to SnapCenter
    Managing SnapCenter Standard and Advanced capacity licenses
      Adding SnapCenter capacity licenses
      Viewing SnapCenter Standard and Advanced capacity license details
      Modifying SnapCenter Standard or Advanced capacity licenses
      Deleting SnapCenter Standard or Advanced capacity licenses
    Managing your storage system connections
      What SVMs are
      Setting up storage system connections
      Modifying your storage system connections
      Deleting your storage system connections
      Viewing storage controller SnapManager Suite license status
    Managing virtualization plug-ins
      Updating vCenter or SnapCenter information in the SnapCenter Plug-in for VMware vSphere
    Using role-based access control
      Types of role-based access control in SnapCenter
      SnapCenter role-based access control
        Role-based access control permissions and roles
        Pre-defined SnapCenter roles and permissions
        Adding a user to a role
        Creating a new role
        Assigning users access to assets
        Modifying a role
      Application-level role-based access control
        Authentication methods for your Run As credentials
        Setting up your Run As credentials
        Configuring Run As account credentials for an individual SQL Server resource
        Configuring Run As account credentials for an Oracle database
    Using Application Request Routing and Network Load Balancing
      Application Request Routing requirements
      Determining load balancing status and Application Request Routing enablement
    Provisioning storage on Windows hosts
      Configuring LUN storage
        Establishing an iSCSI session
        Disconnecting an iSCSI session
        Creating and managing igroups
          Creating an igroup
          Renaming an igroup
          Modifying an igroup
          Deleting an igroup
        Creating and managing disks
          Viewing the disks on a host
          Creating FC-connected or iSCSI-connected LUNs or disks
          Resizing a disk
          Connecting a disk
          Disconnecting a disk
          Deleting a disk
      Creating and managing SMB shares
        Creating an SMB share
        Deleting an SMB share
      Reclaiming space on the storage system
      Using the SnapCenter Plug-in for Microsoft Windows in VMware environments
        Supported VMware guest OS platforms
          VMware ESX server-related limitations
          Minimum vCenter privileges required for SnapCenter RDM operations
        Using FC RDM LUNs in a Microsoft cluster
          Requirements for using FC RDM LUNs in a Microsoft cluster
          Microsoft cluster support limitations when using FC RDM LUNs
          Creating a shared FC RDM LUN
        Troubleshooting RDM LUN creation
      SnapCenter Plug-in for Microsoft Windows cmdlets
    Working with managed hosts
      Viewing details about managed hosts
      Modifying hosts and plug-ins
      Refreshing virtual machine information
      Starting and restarting plug-in services
      Suspending schedules on hosts to place them in maintenance mode
      Removing a host from SnapCenter Server
        Prerequisites to remove a host
        Removing a host
      Verifying the supported configurations for SnapCenter Plug-ins Package for Linux
    Managing the SnapCenter Server repository
      Prerequisites for protecting the SnapCenter repository
      Configuring the SnapCenter repository for protection
      Getting backups of the SnapCenter database
      Restoring the SnapCenter database backup
      Migrating the SnapCenter repository
    Using SnapCenter reporting capabilities
      Centralized reporting options
      Information provided in Dashboard reports
      Requesting job status reports from the Dashboard
      Configuring your dashboard
      Types of reports
      Configuring your reports
      Exporting or printing reports
      Setting the SMTP server for email notifications using Global Settings
      Configuring the option to email reports
    Monitoring jobs, schedules, events, and logs
      Monitoring SnapCenter jobs
        Monitoring backup operations
        Stopping a scheduled job
        Canceling queued jobs
      Monitoring SnapCenter schedules
      Monitoring SnapCenter events
      Monitoring SnapCenter logs
        Types of SnapCenter logs
        Event log locations
        Using Microsoft Windows Installer log files
        Using the SnapCenter version.exe/debug log
        Exporting logs
      Removing jobs and logs from SnapCenter
    Administering EMS data collection
      Stopping EMS data collection
      Starting EMS data collection
      Changing EMS data collection schedule and target SVM
      Monitoring EMS data collection status
    Using SnapCenter REST APIs
      Accessing REST APIs using the Swagger API web page
      List of available REST APIs
      Troubleshooting REST APIs
  Protecting custom applications with SnapCenter
    Deciding on whether to read this information
    Data protection using SnapCenter Custom Plug-ins
      What you can do with the SnapCenter Custom Plug-ins
      SnapCenter Custom Plug-ins features
      List of SnapCenter components
    Data protection workflow for SnapCenter Custom Plug-ins resources
    Preparing for data protection
      Prerequisites for using the SnapCenter Custom Plug-ins
      Storage types supported by SnapCenter Custom Plug-ins
      How resources, resource groups, and policies are used for protecting custom plug-in resources
    Logging in to SnapCenter
    Backing up custom plug-in resources
      Defining a backup strategy
        Backup schedules of custom plug-in resources
        Number of backup jobs needed
        Backup naming conventions
        How SnapCenter Plug-in for SAP HANA Database uses consistency group Snapshot copies?
        How SnapCenter works with SnapMirror and SnapVault technologies
        How SnapCenter uses prescripts and postscripts
      Adding resources to SnapCenter Custom Plug-ins
      Creating policies for custom plug-in resources
      Backing up individual custom plug-in resources
      Creating resource groups and attaching policies
      Backing up resource groups of custom plug-in resources
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing custom plug-in resource related backups and clones in the Topology page
    Restoring custom plug-in resources
      Types of restore strategies
      Restoring a resource backup
      Monitoring restore operations
    Cloning custom plug-in resource backups
      Cloning from a backup
      Monitoring clone operations from the Jobs page
    Troubleshooting data protection operations
      Custom plug-in installation fails
    Backing up, restoring, and cloning using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets
      Backing up resources using PowerShell cmdlets
      Restoring resources using PowerShell cmdlets
      Cloning backups using PowerShell cmdlets
  Protecting Microsoft SQL Server databases with SnapCenter
    Deciding on whether to read this information
    SnapCenter Plug-in for Microsoft SQL Server overview
      What you can do with the SnapCenter Plug-in for Microsoft SQL Server
      SnapCenter Plug-in for Microsoft SQL Server features
      List of SnapCenter components
      Support for Asymmetric LUN Mapping (ALM) in Windows clusters
    SnapCenter Plug-in for Microsoft SQL Server data protection workflow
    Preparing for data protection
      Prerequisites for using SnapCenter Plug-in for Microsoft SQL Server
      Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
      Storage layout recommendations for SnapCenter Plug-in for Microsoft SQL Server
      How resources, resource groups, and policies are used for protecting SQL Server
    Logging in to SnapCenter
    Backing up SQL Server resources
      Defining a backup strategy for SQL Server resources
        Type of backups supported
        Backup schedules for database plug-ins
        Number of backup jobs needed for databases
        Backup naming conventions
        Backup retention options
        How long to retain transaction log backups on the source storage system
        Can you put all databases on the same volume
        Backup copy verification using the primary or secondary storage volume
        When to schedule verification jobs
        How SnapCenter works with SnapMirror and SnapVault technologies
        Support for prescripts and postscripts
      Configuring Run As account credentials for an individual SQL Server resource
      Configuring log directory and verification server
      Determining whether resources are available for backup
      Migrating resources to NetApp storage system
      Creating backup policies for SQL Server databases
      Creating resource groups and attaching policies for SQL Server
      Backing up SQL resources
      Backing up SQL Server resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing SQL Server backups and clones in the Topology page
    Restoring SQL Server resources
      Defining a restoration strategy for SQL Server
        Sources and destinations for a restore operation
        Requirements for restoring a database
        SQL Server recovery models supported by SnapCenter
        Types of restore operations
      Restoring SQL Server databases
      Restoring a SQL Server database from secondary storage
      Reseeding Availability Group databases
      Monitoring restore operations
    Cloning SQL Server database resources
      Defining a cloning strategy for SQL Server
        Limitations related to clone operations
        Types of clone operations
      Cloning from a SQL Server database backup
      Performing Clone Lifecycle
      Monitoring clone operations
    Troubleshooting data protection operations
      Backup fails with Windows scheduler error
      Backup fails with error: Discover resource enumeration returns null or empty
      Unable to find Snapshot copy after successfully creating the backup
      SnapCenter log on and operations fail with error underlying provider failed to open
      Clone operation will fail due to inaccessible virtual device
      Clone operation fails as mounted clone drive is not found
      Clone operation might fail or take longer time to complete with default TCP_TIMEOUT value
      Verification and clone operation of a SQL database fails on bit-locker enabled drive
      Restore operation might timeout if the database size is in terabyte
      Restoring Availability Group fails
      Quiesce or grouping resources operations fail
      Backup operation initiated by an active directory user fails
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Managing backups
      Renaming backups
      Deleting backups
    Managing clones
      Deleting clones
    Backing up, restoring, cloning, and removing backups using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets
      Backing up resources using PowerShell cmdlets
      Restoring and recovering resources using PowerShell cmdlets
      Cloning backups using PowerShell cmdlets
      Removing backups using PowerShell cmdlets
      Cleaning up the secondary backup count using PowerShell cmdlets
  Protecting NAS file services data with SnapCenter
    Deciding whether to read this information
    SnapCenter Plug-in for NAS File Services overview
      What you can do with SnapCenter Plug-in for NAS File Services
      SnapCenter Plug-in for NAS File Services features
      List of SnapCenter components
    Installation and configuration workflow
    Preparing for the SnapCenter Plug-in for NAS File Services deployment
      ONTAP requirements
      SnapCenter host requirements
      SnapCenter file catalog requirements
      Supported browsers
      Licensing requirements
      Connection and port requirements
      Credential requirements
    Preparing the ONTAP environment
      Installing or upgrading ONTAP
      Adding appropriate ONTAP licenses
      Establishing cluster peering
        Prerequisites for cluster peering
        Preparing each cluster
        Configuring intercluster interfaces on all nodes
        Creating peer relationships among clusters
    Preparing the SnapCenter Linux file catalog server
      Installing Linux catalog servers
      Configuring SnapCenter file catalog ports
      Configuring sudo privileges for the non-root user
      Verifying the Java runtime environment
      Ensuring the Linux server is accessible for NAS file services file catalog
    Installing the SnapCenter Server
      Installing the SnapCenter Server with catalog servers
      Checking the status of NAS File Services components after SnapCenter installation
    Configuring SnapCenter for NAS File Services
      Logging in to SnapCenter
      Adding SnapCenter capacity licenses
      Setting up storage system connections
      Setting up your CIFS servers Run As credentials for NAS file services
      Configuring CIFS servers
      Protecting the SnapCenter file catalog and the repository
        Preparing the PowerShell environment
        Protecting the file catalog and SnapCenter repository with PowerShell cmdlets
    Backing up NAS file services data to secondary storage and restoring it with SnapCenter
      Using policies to protect NAS file services
        Modifying policies for NAS file services data
      Backing up NAS file services data to storage
        Viewing NAS file services resources and their protection status
        Backing up NAS file services to storage using SnapCenter
        Monitoring data protection progress in the SnapCenter Activity pane
        Monitoring backup operations
        Removing protection from a NAS file services resource
      Restoring NAS file services data from storage using SnapCenter
        Restore locations and access control list
        Searching through multiple volumes using the file catalog to restore a file or directory
        Browsing the Snapshot copy of a volume to restore a file
        Monitoring restore operations
    Viewing data protection reports for NAS file services
    Troubleshooting Plug-in for NAS File Services issues
      SnapCenter plug-in loader does not start automatically when the Linux catalog server is restarted
      SnapCenter Plug-in for NAS File Services installation on the catalog server might fail while installing or upgrading SnapCenter
      Reinstalling SnapCenter Server does not update spl.properties file with new values
      The file catalog servers fail to start
      Backup fails with error: Discover resource enumeration returns null or empty
      Failed to catalog NAS file services
      Restore operation fails due to Service Level Manager or Catalog service not running
  Protecting NAS file services data using Data Fabric Solution for Cloud Backup and SnapCenter
    Deciding whether to read this information
    Data Fabric Solution for Cloud Backup overview
      Data Fabric Solution for Cloud Backup components
      Data Fabric Solution for Cloud Backup features
      What you can do with Data Fabric Solution for Cloud Backup
    Installation and configuration workflow with SnapCenter data protection management
    Preparing for the Data Fabric Solution for Cloud Backup deployment
      ONTAP requirements
      SnapCenter host requirements
      SnapCenter file catalog requirements
      AltaVault requirements
      Supported browsers
      Licensing requirements
      Connection and port requirements
      Credential requirements
    Installing the Data Fabric Solution for Cloud Backup
      Preparing the ONTAP environment
        Installing or upgrading ONTAP
        Adding appropriate ONTAP licenses
        Establishing cluster peering
          Prerequisites for cluster peering
          Preparing each cluster
          Configuring intercluster interfaces on all nodes
          Creating peer relationships among clusters
      Preparing the SnapCenter Linux file catalog server
        Installing Linux catalog servers
        Configuring SnapCenter file catalog ports
        Configuring sudo privileges for the non-root user
        Verifying the Java runtime environment
        Ensuring the Linux server is accessible for NAS file services file catalog
      Installing the SnapCenter Server
        Installing the SnapCenter Server with catalog servers
        Checking the status of NAS File Services components after SnapCenter installation
      Installing or upgrading AltaVault
    Configuring the AltaVault appliance
      Logging in to AltaVault
      Configuring basics in AltaVault
      Configuring AltaVault using the GUI
        Enabling the SnapMirror service and configuring whitelist IP connections using the AltaVault GUI
        Long-term retention of Snapshot copies
        Enabling SnapMirror long-term retention mode in AltaVault
        Enabling SnapCenter access to AltaVault
        Adding a SnapCenter role-based user account to enable SnapCenter storage connections to an AltaVault appliance
        Starting the AltaVault Storage Optimization Service
      Configuring AltaVault using the AltaVault CLI
        Enabling the SnapMirror service using the AltaVault CLI
        Enabling access to SnapCenter using the AltaVault CLI
        Adding a SnapCenter role-based user account to enable storage connections to an AltaVault appliance
        Starting the AltaVault Optimization Service using the AltaVault CLI
    Configuring SnapCenter for Data Fabric Solution for Cloud Backup
      Logging in to SnapCenter
      Adding SnapCenter capacity licenses
      Setting up storage system connections
      Setting up your CIFS servers Run As credentials for NAS file services
      Configuring CIFS servers
      Protecting the SnapCenter file catalog and the repository
        Preparing the PowerShell environment
        Protecting the file catalog and SnapCenter repository with PowerShell cmdlets
    Backing up NAS file services data to the cloud and restoring it with SnapCenter
      Using policies to protect NAS file services
        Modifying policies for NAS file services data
      Backing up NAS file services data to the cloud
        Viewing NAS file services resources and their protection status
        Backing up NAS file services to the cloud using SnapCenter and AltaVault
        Monitoring data protection progress in the SnapCenter Activity pane
        Monitoring backup operations
        Verifying backup to the cloud completion on AltaVault (optional)
          Verifying backup to the cloud completion using AltaVault CLI (optional)
        Removing protection from a NAS file services resource
      Restoring NAS file services data from the cloud using SnapCenter
        Restore locations and access control list
        Searching through multiple volumes using the file catalog to restore a file or directory
        Browsing the Snapshot copy of a volume to restore a file
        Monitoring restore operations
      Managing SnapMirror shares using the AltaVault CLI
    Viewing data protection reports for NAS file services
      Viewing data protection reports in AltaVault
    Troubleshooting Plug-in for NAS File Services issues
      SnapCenter plug-in loader does not start automatically when the Linux catalog server is restarted
      SnapCenter Plug-in for NAS File Services installation on the catalog server might fail while installing or upgrading SnapCenter
      Reinstalling SnapCenter Server does not update spl.properties file with new values
      Backup fails with error: Discover resource enumeration returns null or empty
      The file catalog servers fail to start
      Failed to remove protection from a NAS file services resource
      Failed to catalog NAS file services
      Restore operation fails due to Service Level Manager or Catalog service not running
  Protecting NAS file services data using Data Fabric Solution for Cloud Backup and ONTAP commands
    Deciding whether to read this information
    Data Fabric Solution for Cloud Backup overview
      Data Fabric Solution for Cloud Backup components
      Data Fabric Solution for Cloud Backup features
      What you can do with Data Fabric Solution for Cloud Backup
    Installation and configuration workflow With ONTAP CLI data protection management
    Preparing for the Data Fabric Solution for Cloud Backup deployment
      ONTAP requirements
      AltaVault requirements
      Supported browsers
      Licensing requirements
      Connection and port requirements
      Credential requirements
    Installing the Data Fabric Solution for Cloud Backup
      Preparing the ONTAP environment
        Installing or upgrading ONTAP
        Adding appropriate ONTAP licenses
        Establishing cluster peering
          Prerequisites for cluster peering
          Preparing each cluster
          Configuring intercluster interfaces on all nodes
          Creating peer relationships among clusters
      Installing or upgrading AltaVault
    Configuring the AltaVault appliance
      Logging in to AltaVault
      Configuring basics in AltaVault
      Configuring AltaVault using the GUI
        Enabling the SnapMirror service and configuring whitelist IP connections using the AltaVault GUI
        Long-term retention of Snapshot copies
        Enabling SnapMirror long-term retention mode in AltaVault
        Starting the AltaVault Storage Optimization Service
      Configuring AltaVault using the AltaVault CLI
        Enabling the SnapMirror service using the AltaVault CLI
        Configuring a whitelist of IP connections using the AltaVault CLI
        Enabling SnapMirror long-term retention mode using the AltaVault CLI
        Starting the AltaVault Optimization Service using the AltaVault CLI
    Backing up NAS file services data to the cloud and restoring it using ONTAP commands
      Creating a SnapMirror protection relationship
        Reviewing volume status and contents
        Creating and initializing a SnapMirror protection relationship
      Backing up NAS file services data to the cloud using ONTAP commands
        Performing an incremental backup from ONTAP to the cloud using the ONTAP CLI
        Monitoring backup progress using the ONTAP CLI
      Restoring NAS file services from AltaVault using ONTAP commands
        Restoring a full backup from AltaVault using the ONTAP CLI
        Restoring a single file from AltaVault to ONTAP using the ONTAP CLI
    Viewing data protection reports in AltaVault
  Protecting Oracle databases with SnapCenter
    Deciding whether to read this information
    Data protection using SnapCenter Plug-in for Oracle Database
      What you can do with the SnapCenter Plug-in for Oracle Database
      SnapCenter Plug-in for Oracle Database features
      List of SnapCenter components
    Data protection workflow for Oracle databases
    Preparing for data protection
      Prerequisites for using the SnapCenter Plug-in for Oracle Database
      Storage types supported by SnapCenter Plug-in for Oracle Database
      How resources, resource groups, and policies are used for protecting Oracle databases
    Logging in to SnapCenter
    Backing up Oracle databases
      Defining a backup strategy for Oracle databases
        Supported Oracle database configurations for backups
        Types of backup supported
        Why to specify preferred nodes in RAC setup
        Backup cataloging with Oracle Recovery Manager
        Backup schedules for database plug-ins
        Backup naming conventions
        Backup retention options
        Backup copy verification using the primary or secondary storage volume
        Supported prescripts and postscripts
        How SnapCenter works with SnapMirror and SnapVault technologies
      Configuring Run As account credentials for an Oracle database
      Determining whether Oracle databases are available for backup
      Creating backup policies for Oracle databases
      Creating resource groups and attaching policies for Oracle databases
      Backing up Oracle resources
      Backing up Oracle database resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing Oracle database backups and clones in the Topology page
    Mounting and unmounting database backups
      Mounting a database backup
      Unmounting a database backup
    Restoring Oracle databases
      Defining a restore and recovery strategy for Oracle databases
        Backups supported for restore and recovery operations
        Types of restore methods supported for Oracle databases
        Types of restore operations supported for Oracle databases
        Types of recovery operations supported for Oracle databases
        Limitations related to restore and recovery operations
        Sources and destinations for restore operations
      Restoring an Oracle database
      Monitoring restore operations
    Cloning Oracle database backups
      Defining a clone strategy for Oracle databases
        Backups supported for cloning
        Types of cloning supported
        Clone naming conventions
        Limitations related to clone operations
      Cloning an Oracle database backup
      Monitoring clone operations
    Troubleshooting data protection operations
      Discovery operation takes long time to complete
      Unable to add Linux host to SnapCenter
      Scanning of host bus adapters takes long time to complete
      Backup fails during the discovery of file system on a VM
      Backup operation fails during the storage discovery process
      Backup operation fails if database query is timed out
      Backup operation might fail when the OS group ID of the Oracle database administrator is changed
      Backup fails with error: Discover resource enumeration returns null or empty
      Cataloging and uncataloging with Oracle RMAN will fail if the execution time is beyond the timeout value
      Registering backup activity fails during the backup operation
      Unable to find Snapshot copy after successfully creating the backup
      ASM backup verification fails
      Backup verification fails when files are not accessible
      Disk paths are not included in the asm_diskstring database parameter
      Unable to change the database state from shutdown to mount
      Restore operation of datafiles and control files fail
      Restore from a secondary SnapMirror or SnapVault location fails
      Restore operation might fail if the database size is in terabytes
      Clone operation will fail if multipath is disabled on the plug-in host
      Cloning operation will fail when you reuse the SID of an immediately deleted clone
      Cloning operation will fail in SAN environments on OL 7 or later or RHEL 7 or later
      Clone operation will fail due to inaccessible virtual device
      Clone operation might fail or take longer time to complete with default TCP_TIMEOUT value
      Clone operation might fail if you are using Oracle databases 11.2.0.3 or later
      Recovery of a cloned database fails
      File system is not deleted during the clone delete operation
      Backup and clone operations fail if stale entries of the cloned disk group exists
      Operations fail when there is insufficient space to create Snapshot copies
      Operations are not executed due to insufficient space in the root file system
      Data protection operation fails if operational lock file is not deleted
      Operations that require backup to be mounted might fail
      Messages in the log file display incorrect time zone
      Operations fail with command execution timeout error
      Data protection operation fails in a non-multipath environment in RHEL 7 and later
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Managing backups
      Renaming backups
      Deleting backups
    Managing clones
      Deleting clones
    Backing up, restoring, and cloning using Linux commands
      Backing up Oracle databases using Linux commands
      Restoring and recovering Oracle databases using Linux commands
      Cloning Oracle database backups using Linux commands
  Protecting SAP HANA databases with SnapCenter
    Deciding on whether to read this information
    Data protection using SnapCenter Plug-in for SAP HANA Database
      Tasks you can perform using the SnapCenter Plug-in for SAP HANA Database
      SnapCenter Plug-in for SAP HANA Database features
      List of SnapCenter components
    Data protection workflow for SAP HANA databases
    Preparing for data protection
      Prerequisites for using the SnapCenter Plug-in for SAP HANA Database
      Storage types supported by SnapCenter Plug-in for SAP HANA Database
      How resources, resource groups, and policies are used in data protection of SAP HANA databases
    Logging in to SnapCenter
    Backing up SAP HANA databases
      Defining a backup strategy for SAP HANA databases
        Type of backups supported
        How SnapCenter Plug-in for SAP HANA Database uses consistency group Snapshot copies?
        How SnapCenter manages housekeeping of log and data backups
        Considerations for determining backup schedules for SAP HANA database
        Number of backup jobs needed for SAP HANA databases
        Backup naming conventions
        How SnapCenter works with SnapMirror and SnapVault technologies
        Supported prescripts and postscripts
      Adding databases to SnapCenter Plug-in for SAP HANA Database
      Creating backup policies for SAP HANA databases
      Creating resource groups and attaching policies
      Backing up SAP HANA databases
      Backing up resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
      Viewing SAP HANA database backups and clones in the Topology page
    Restoring SAP HANA databases
      Types of restore strategies
      Restoring a database backup
      Monitoring restore operations
    Cloning SAP HANA database backups
      Cloning a SAP HANA database backup
      Monitoring clone operations from the Jobs page
    Troubleshooting data protection operations
      User store key not found
      Invalid user store key
      Unable to access SAP HANA system
      Unable to access tenant database
      File-Based Backup workflow fails
      Unable to find Snapshot copy after successfully creating the backup
      Catalog entries are not deleted after volume based restore operation
      Invalid HDBSQL OS username
      Backup operation fails
      Backup fails with error: Discover resource enumeration returns null or empty
      Cannot enable SAP HANA
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Deleting SAP HANA database backups
    Deleting SAP HANA database clones
    Backing up, restoring, and cloning using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets for SAP HANA database
      Backing up databases using PowerShell cmdlets
      Restoring SAP HANA database using PowerShell cmdlets
      Cloning SAP HANA database backups using PowerShell cmdlets
  Protecting VMs and Datastores with the SnapCenter Plug-in for VMware vSphere
    Deciding whether to read this information
    SnapCenter Plug-in for VMware vSphere overview
      What you can do with SnapCenter Plug-in for VMware vSphere
      SnapCenter Plug-in for VMware vSphere features in vCenter
      List of SnapCenter components
    Accessing the SnapCenter Plug-in for VMware vSphere in vCenter
    Dashboard and job monitor
      Dashboard
      Monitoring jobs and downloading job logs
    Preparing for data protection for VMs and datastores
      Prerequisites for using SnapCenter Plug-in for VMware vSphere
      Storage types supported by SnapCenter Plug-in for VMware vSphere
      How virtual resources, resource groups, and policies are used in data protection
      Configuring SnapCenter Plug-in for VMware vSphere for email alerts
    Defining a backup strategy for VMs and datastores
      Backup schedules for VMs and datastores
      Number of backups needed
      Backup naming conventions
      Backup retention options
      How SnapCenter works with SnapMirror and SnapVault technologies
    Backing up VMs and datastores
      Viewing backups
      Creating backup policies
      Support for prescripts and postscripts
      Creating resource groups
      Adding a single VM or datastore to a resource group
      Adding multiple VMs and datastores to a resource group
      Backing up resource groups on demand
    Restoring VMs from backups
      Considerations for restore operations using data that was backed up with failed VMware consistency snapshots
      Searching for backups
      Restoring data from backups
      Attaching a virtual disk to restore a file
      Detaching a virtual disk
    Mounting and unmounting datastores
      Mounting a datastore backup
      Unmounting a datastore backup
    Managing SVMs in the SnapCenter Plug-in for VMware vSphere inventory
      Adding SVMs using the SnapCenter Plug-in for VMware vSphere GUI
      Modifying SVMs using the SnapCenter Plug-in for VMware vSphere GUI
      Removing SVMs using the SnapCenter Plug-in for VMware vSphere GUI
    Managing resource groups for VMs and datastores
      Suspending and resuming operations on resource groups
      Modifying resource groups
      Deleting resource groups
    Managing policies for VMs and datastores
      Detaching policies
      Modifying policies
      Deleting policies
    Managing backups of VMs and datastores
      Renaming backups
      Deleting backups
    Troubleshooting
      vCenter GUI not correct for SnapCenter Plug-in for VMware vSphere
        Restarting the vSphere web client service in Windows
        Restarting the vSphere web client service in Linux
      You may have reached the maximum number of NFS volumes configured in the vCenter
      Unable to discover datastores on an SVM without a management LIF
      VMware vSphere does not remove snapshot delta disks during restore
      SnapCenter compatibility check fails
      Backup fails with error: Discover resource enumeration returns null or empty
      Unable to find Snapshot copy after successfully creating the backup
    Appendixes
      Overrides for customizing or retrying backup operations
      Minimum recommended RBAC roles for SnapCenter Plug-in for VMware vSphere
      Minimum ONTAP privileges required
  Protecting Windows file systems with SnapCenter
    Deciding whether to read this information
    SnapCenter Plug-in for Windows file systems overview
      What you can do with the SnapCenter Plug-in for Microsoft Windows
      SnapCenter Plug-in for Windows features
      List of SnapCenter components
    SnapCenter Plug-in for Windows file systems data protection workflow
    Preparing for data protection
      Prerequisites for using SnapCenter Plug-in for Microsoft Windows
      Storage types supported by SnapCenter Plug-ins for Microsoft Windows and for Microsoft SQL Server
      Storage layout requirements for SnapCenter Plug-in for Microsoft Windows
      How resources, resource groups, and policies are used in data protection
    Defining a backup strategy for Windows file systems
      Backup schedules for Windows file systems
      Number of backups needed for Windows file systems
      Backup naming convention
      Backup retention options
      How SnapCenter works with SnapMirror and SnapVault technologies
    Logging in to SnapCenter
    Backing up Windows file systems
      Determining resource availability
      Viewing related backups and clones in the Topology page
      Creating backup policies for Windows file systems
      Support for prescripts and postscripts
      Creating resource groups for Windows file systems
      Backing up resources
        Backing up a single resource on demand
        Backing up resource groups
      Monitoring backup operations
        Monitoring operations in the Activity pane
    Restoring Windows file systems
      Defining a restoration strategy for Windows file system
      Restoring Windows file system backups
      Monitoring restore operations
    Cloning Windows file system backups
      Defining a cloning strategy for Windows file systems
        Limitations related to cloning operations for Windows file systems
        Sources and destinations of clones for Windows file systems
      Cloning from a Windows file system backup
      Monitoring clone operations
    Managing resource groups
      Stopping and resuming operations on resource groups
      Deleting resource groups
    Managing policies
      Detaching policies
      Modifying policies
      Deleting policies
    Managing backups
      Renaming backups
      Deleting backups
    Managing clones
      Deleting clones
    Backing up, restoring, cloning, and removing backups using PowerShell cmdlets
      Creating a storage system connection and a Run As account using PowerShell cmdlets
      Backing up resources using PowerShell cmdlets
      Restoring and recovering resources using PowerShell cmdlets
      Cloning backups using PowerShell cmdlets
      Removing backups using PowerShell cmdlets
      Cleaning up the secondary backup count using PowerShell cmdlets
    Troubleshooting data protection operations
      Backup fails with error: Discover resource enumeration returns null or empty
      Unable to find Snapshot copy after successfully creating the backup
      Scheduled backups fail due to task limit
      Clone operation will fail due to inaccessible virtual device
Using this Documentation Center
  Tour
  Help
    Searching for content
    Applying a filter
    Printing content
    Using the index
    Saving and sharing links
    Providing feedback
  Tips
    Better search results
    Mobile devices
    Mixed-language environment
  Tour
  Help
    Searching for content
    Applying a filter
    Printing content
    Using the index
    Saving and sharing links
    Providing feedback
  Tips
    Better search results
    Mobile devices
    Mixed-language environment
Copyright, trademarks, and notices
  Copyright and trademark information
    Copyright information
    Trademark information
  Notices
    OnCommand Unified Manager
    OnCommand Workflow Automation
    SnapCenter Software
  Copyright and trademark information
    Copyright information
    Trademark information
  Notices
    OnCommand Unified Manager
    OnCommand Workflow Automation
    SnapCenter Software