Solved

Cifs shares on a Netapp mirrored set

Posted on 2011-03-04
4
1,305 Views
Last Modified: 2012-06-27
This question is asked from someone who is VERY new to NetApp.

I have a NetApp filer with several volumes for my CIFS shares.  The volumes have been configured with mirrored sets to a second NetApp filer.  I have also defined all of my CIFS shares on the primary.....so all is good.

My question....do I also need to setup the shares on the mirrored NetApp.  I know these volumes are read only, but not being familiar with the process of reverting to the mirred sets, I dont know if the shares have to be pre-configured.

Thanks
0
Comment
Question by:sagdoc
  • 2
4 Comments
 
LVL 21

Accepted Solution

by:
robocat earned 334 total points
ID: 35036359

The CIFS shares need to be created exactly the same way you do it on the primary system. You can connect to those shares as "read only". When you break the mirror, the shares will be read/write.
0
 
LVL 42

Assisted Solution

by:paulsolov
paulsolov earned 166 total points
ID: 35036543
If you break the mirror and do any time of changes you will need to reinitialize the snapmirror and sync from scratch.  Once you break the mirror you can perform a flexclone and and do anything with volume for testing.

If you want to bring over the share permissions you will need to copy the "cifs share config" sp?  file from /etc$.  This will avoid redoing all the permissions
0
 

Author Comment

by:sagdoc
ID: 35059630
Thanks for the information.  One thing I noticed, however, when I created the shares on the mirrored sets, it looked like from a security prospective, I would be able to modify the files under that share.  I know that the mirrored sets are read only so is it safe to assume I still would not be able to modify those files regardless.

Thanks
jn
0
 
LVL 21

Assisted Solution

by:robocat
robocat earned 334 total points
ID: 35061201

You will not be able to modify the files until the mirror is broken.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Solid State Drive Performance Tips: Solid state storage technology is now a standard.  After testing and using several different brands and revisions of SSD's over the years I have put together a collection of tips,tools and suggestions that I ha…
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question