Solved

NetApp: Clone a SnapMirrored volume

Posted on 2014-03-06
8
587 Views
Last Modified: 2014-04-01
We are trying to run a DR test. Are we allowed to create a clone of a volume while it's Snapmirror'ed?

If so how?
0
Comment
Question by:pzozulka
  • 4
  • 4
8 Comments
 
LVL 42

Expert Comment

by:paulsolov
ID: 39911193
Sure.  Do you have a Flex-Clone license?
0
 
LVL 8

Author Comment

by:pzozulka
ID: 39911228
We do.
0
 
LVL 42

Accepted Solution

by:
paulsolov earned 500 total points
ID: 39911264
you can right click and "clone" in Netapp System Manager and then "Volume"  From there you can pick a snapshot to clone from or create a new snapshot.  Then you have to mount the volume and perhaps LUN if that is associated with the volume.

What type of volume is this.

Here's a bit about flex clone and use cases

https://communities.netapp.com/docs/DOC-10323
0
 
LVL 8

Author Comment

by:pzozulka
ID: 39911276
These are NFS volumes (I believe FlexVols, but not 100% sure). Also, Thin Provisioned.
0
Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

 
LVL 42

Assisted Solution

by:paulsolov
paulsolov earned 500 total points
ID: 39911290
So you would create a flex clone then it essentially acts like a normal volume.  Create exports and add ACLs and you're all set.  When done offline flexclone volume and destroy.
0
 
LVL 8

Author Comment

by:pzozulka
ID: 39929962
Do you FlexClone from volumes or from snapshots?
0
 
LVL 42

Expert Comment

by:paulsolov
ID: 39930691
Typically from a snapshot, if you do it from volume it will create a new snapshots but you have to remember to delete it once you're done.
0
 
LVL 8

Author Comment

by:pzozulka
ID: 39971279
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Solid State Drive Performance Tips: Solid state storage technology is now a standard.  After testing and using several different brands and revisions of SSD's over the years I have put together a collection of tips,tools and suggestions that I ha…
Having issues meeting security compliance criteria because of those pesky USB drives? Then I can help you! This article will explain how to disable USB Mass Storage devices in Windows Server 2008 R2.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now