Data ONTAP 7.3 Archive and Compliance Management Guide
Copyright information
Trademark information
About this guide
Audience
Accessing Data ONTAP man pages
Terminology
FilerView as an alternative to the command-line interface
Command, keyboard, and typographic conventions
Special messages
What SnapLock is
What SnapLock volumes are
How SnapLock works
Issues in reverting to Data ONTAP 7.3 if you have SnapLock volumes
Recovering from the halt caused by SnapLock
Hardware platforms supported for SnapLock
How to license SnapLock
Licensing SnapLock functionality
SnapLock support for AutoSupport
Creating SnapLock volumes
Creating SnapLock traditional volumes
Creating SnapLock aggregates and their flexible volumes
SnapLock Compliance write verification option
Using the SnapLock Compliance write verification option
How SnapLock Compliance meets WORM data requirements
What the ComplianceClock is
When to use the ComplianceClock
Initializing the ComplianceClock feature
Viewing the ComplianceClock time
How the ComplianceClock stays synchronized with the system clock
SnapLock ComplianceClock considerations with qtree SnapMirror
How a WORM file works
How to manage WORM data
Transitioning data to the WORM state and setting the retention date
Extending the retention date of a WORM file
Determining the WORM status of a file
What the WORM append file is
Creating a WORM append file
How SnapLock automatically commits files to WORM state
Setting the time delay before automatically committing to the WORM state
Displaying the time delay before files are automatically committed
What the retention period is
How the SnapLock volume retention period works
Viewing the retention period of a volume
What the minimum retention period is
Setting the minimum retention period
What the maximum retention period is
Setting the maximum retention period
What the default retention period is
Setting the default retention period
What the privileged delete feature is
How privileged delete works
Limitations of the privileged delete functionality
Ensuring secure connection to the storage system
Enabling privileged delete functionality
Disabling privileged delete functionality
Deleting a WORM file using privileged delete
How privileged delete affects mirroring interactions
What SnapLock logging is
Types of SnapLock log files
Advantages of SnapLock logging
Limitations of SnapLock logging
Assigning a SnapLock log volume
How archiving a log file works
Archiving log files
Finding the status of the SnapLock log file
What the SnapLock log file contains
Upgrade and revert considerations for SnapLock logging
How Data ONTAP tracks the deleted files on SnapLock volumes
Destroying SnapLock volumes
Destroying aggregates
How SnapLock uses fingerprints
How a fingerprint is calculated
Input parameters for the fingerprint operation
Calculating the fingerprint of a file
Output parameters for the fingerprint operation
SnapLock interaction with a vFiler unit
Creating the root of a vFiler unit from a SnapLock volume to a non-SnapLock volume
Limitations of vFiler units on SnapLock volumes
SnapLock interaction with active/active configuration
Protecting your SnapLock volumes with SnapMirror
SnapLock qtree SnapMirror resynchronization restrictions
What the dump file is
Extracting files from the dump file after a qtree SnapMirror resynchronization
How to set an end-to-end SnapLock Compliance volume SnapMirror relationship
Limitations of the SnapMirror relationship
Creating a volume SnapMirror relationship for a FlexVol volume
Creating a volume SnapMirror relationship for a traditional volume
Creating a SnapLock Compliance SnapMirror relationship
The SnapLock for SnapVault feature—secure SnapVault destination
Upgrade and revert issue related to the SnapLock for SnapVault feature
Guidelines for using the SnapLock for SnapVault feature
Aspects of capacity planning
Guidelines for estimating SnapVault secondary storage system volume size
Estimating the log volume size
How to set up SnapVault backups
Configuring a primary storage system for SnapVault
Configuring a SnapVault secondary storage system
Scheduling SnapVault update backups on the primary storage system
Scheduling SnapVault update backups on the SnapVault secondary storage system
Scheduling SnapVault update backups on the SnapVault primary and secondary storage system schedules
Guidelines to back up qtrees to a volume using SnapVault
Guidelines for scheduling SnapVault transfer
Management of WORM Snapshot copies by using SnapVault
How Snapshot copies retention works on SnapLock volumes
How Snapshot copies are named on SnapLock volumes
Retention period for WORM Snapshot copies created by SnapVault
Default SnapVault settings for the WORM Snapshot copies retention period
Specifying retention periods for WORM Snapshot copies
Extending the retention period of WORM Snapshot copies
Listing Snapshot copies on the WORM volume
Listing Snapshot copies and retention dates
Deleting expired WORM Snapshot copies
How to retain more than 255 SnapVault Snapshot copies
How to create a new volume to retain more Snapshot copies
Advantages of cloning Snapshot copies
Advantages of copying Snapshot copies
Creating a new volume for Snapshot copies retention
Verifying the state of the old volume
Removing the SnapVault schedules for the old volume
Creating a volume clone to a new volume
Copying the appropriate Snapshot copy to a new volume
Checking or setting the retention periods on the new volume
Checking volume options on the new volume
Restarting all SnapVault relationships in the new volume
Reconfiguring the SnapVault schedules in the new volume
Ensuring the migration of Snapshot copies
Stopping all SnapVault relationships in the old volume
Backup of the log volumes created by the SnapLock for SnapVault feature
Protecting a log volume of the SnapLock for SnapVault feature
Failing over to the standby system
Reestablishing standby protection
How to resynchronize a broken SnapVault relationship
Turning SnapVault off
Management of SnapVault log files
Regulatory compliance and SnapVault log files
How SnapVault maintains compliance
Operations log file
Files-transferred log files
Configuring the log volumes of the SnapLock for SnapVault feature
Where the log files are kept
What files-transferred log files contains
Types of log entries recorded
Log entry format
How log entries are created
How to provide backup and standby protection using SnapMirror
Setting up backup and standby protection for SnapVault
Reestablishing backup and standby protection for SnapVault
Returning to the original backup and standby configuration
Limitations to compliance backup and standby service
Data ONTAP command-line interface commands in SnapLock
Frequently asked questions
General FAQs related to SnapLock
FAQs related to SnapLock volumes
FAQs related to tampering scenarios
FAQs related to dump, NDMP, and WAFL
SnapLock error messages