2015-02-27 10_37_36-Remote Desktop Manager Free [APUTIL02]

NetApp & Powershell – Snapshot Report

This post follows on from my last, where I created a script to send an email report when running dedupe operations were detected.

Utilizing the same script, I made some quick modifications to have it send an email report of volume snapshots and their sizes/creation date. Here’s what it looks like.

2015-02-27 10_36_20-NetApp Volume Snapshot Report - Message (HTML)

The syntax for the report is pretty much the same as the last script.

.\NetApp-SnapshotReport.ps1 -Controller controller1,controller2 -Username <user> -Password <pass> -SMTPServer <server> -MailFrom <Email From> -MailTo <Email To>

Download the script here. I currently have it configured as a scheduled task running every morning so we have a daily report of current volume snapshots, and it works well.

Enjoy!

 

2015-02-24 16_54_23-Remote Desktop Manager Free [APUTIL02]

NetApp & Powershell – Report on running dedupe tasks

Hi all,

Recently ran across a misbehaving NetApp where it’s deduplication process would be triggered on a Saturday morning, and still be running come the Monday. It wouldn’t happen on every scheduled run, but when it did, it hurt storage performance significantly. We’re working on the usual tasks, there’s a lot of misaligned data on the volume. But in the meantime, I used the NetApp Data ONTAP PowerShell Module to create a little script that will shoot an email if it detects a running SIS process.

Configure it as a scheduled task on a system that has the DataONTAP powershell module installed. Here’s an example of the command line parameters:

.\NetApp-ActiveDedupeAlert.ps1 -Controller controller1,controller2 -Username <user> -Password <"pass"> -SMTPServer <server> -MailFrom <Email From> -MailTo <Email To>

If the script detects any running SIS processes, it’ll shoot off an email that looks like this:

Dedup Alert Email

You can grab the code here, or click the ‘Read More’ button to see the code.

(more…)

2015-01-22 19_14_28-192.168.0.104 - Remote Desktop Connection

Tintri 3.1.1.4 and SCVMM integration – Access Denied

With the release of Tintri OS 3.1.1.4, Tintri introduced their support for SCVMM and Hyper-V integration.

After upgrading to the new release, you’ll be able to add Hyper-V hosts into the Tintri UI settings screen – allowing the Tintri to grab details of running VMs. A SMI-S interface is also available after the upgrade, that you can use with SCVMM to create and manage SMB3 file shares, including setting quotas and applying a storage classification.

As with all new feature releases in the history of everything, there’s some problems. You might find – after configuring your SCVMM install and Hyper-V hosts according to the documentation (available on the support site) – that your hosts don’t have access to the share. You’ll be unable to create new VMs on the new share, or even remove the share through SCVMM.

Here’s how to avoid these problems and get those file shares working.

  1. In the Tintri UI, open ‘Settings’, and open the ‘Management Access’ panel
  2. Remove the entry for your SMI-S Run-As Account group (the one you created while following through the documentation)
  3. Save the settings, and then re-open the ‘Settings’ window
  4. Go back to the ‘Management Access’ panel, and re-add the SMI-S Run-As Account group with Super admin access
  5. Save settings
  6. On a host that has access to your Tintri’s data IP, while logged in as a domain user that has Super admin privileges on the Tintri, open a command prompt or powershell window
  7. Enter the following command, substituting for your share path and Hyper-V host group name:
    2015-01-22 18_26_28-192.168.0.10 - Remote Desktop Connection
  8. Go ahead and try to create a new VM, it should work

Tintri are aware of this and there’s apparently an internal bug ticket for it – hopefully it’s resolved in the next code release.

Hope this helps.