Solved

Cifs shares on a Netapp mirrored set

Posted on 2011-03-04
4
1,304 Views
Last Modified: 2012-06-27
This question is asked from someone who is VERY new to NetApp.

I have a NetApp filer with several volumes for my CIFS shares.  The volumes have been configured with mirrored sets to a second NetApp filer.  I have also defined all of my CIFS shares on the primary.....so all is good.

My question....do I also need to setup the shares on the mirrored NetApp.  I know these volumes are read only, but not being familiar with the process of reverting to the mirred sets, I dont know if the shares have to be pre-configured.

Thanks
0
Comment
Question by:sagdoc
  • 2
4 Comments
 
LVL 21

Accepted Solution

by:
robocat earned 334 total points
ID: 35036359

The CIFS shares need to be created exactly the same way you do it on the primary system. You can connect to those shares as "read only". When you break the mirror, the shares will be read/write.
0
 
LVL 42

Assisted Solution

by:paulsolov
paulsolov earned 166 total points
ID: 35036543
If you break the mirror and do any time of changes you will need to reinitialize the snapmirror and sync from scratch.  Once you break the mirror you can perform a flexclone and and do anything with volume for testing.

If you want to bring over the share permissions you will need to copy the "cifs share config" sp?  file from /etc$.  This will avoid redoing all the permissions
0
 

Author Comment

by:sagdoc
ID: 35059630
Thanks for the information.  One thing I noticed, however, when I created the shares on the mirrored sets, it looked like from a security prospective, I would be able to modify the files under that share.  I know that the mirrored sets are read only so is it safe to assume I still would not be able to modify those files regardless.

Thanks
jn
0
 
LVL 21

Assisted Solution

by:robocat
robocat earned 334 total points
ID: 35061201

You will not be able to modify the files until the mirror is broken.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes the best way to deal with an infected computer is to boot from external media and run your tools from there.  The reason you may wish to do this really depends on the infection.  Some malware is so recalcitrant that no matter what you do i…
I have written before on the benefits of using a Boot media other than your HDD when it has become infected.   The article I wrote about creating a bootable CD/DVD/USB (http://e-e.com/A_2343.html) was mainly concerned with building a UBCD4Win on CD …
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now