FileFly 3.1 Community Edition

FileFly 3.1 Community Edition

1  Introduction

This guide pertains to FileFly Community Edition only. The full Administration Guide should be consulted for details of features that may be present in other product editions.

1.1  What is Caringo FileFly™?

Caringo FileFly is a heterogeneous Data Management System. It automates and manages the movement of data from primary storage locations to Caringo Swarm or CloudScaler object storage.

Files are migrated from primary storage locations to the object store. Files are demigrated transparently when accessed by a user or application.

What is Migration?

File migration can be summarized as follows: first, the file content and corresponding metadata are copied to secondary storage as an MWI file/object. Next, the original file is marked as a ‘stub’ and truncated to zero physical size (while retaining the original logical size for the benefit of users and the correct operation of applications). The resulting stub file will remain on primary storage in this state until such time as a user or application requests access to the file content, at which point the data will be automatically returned to primary storage.

Each stub encapsulates the location of the corresponding MWI data on secondary storage, without the need for a database or other centralized component.

1.2  Conventions used in this Book

References to labels, values and literals in the software are in ‘quoted italics’.

References to actions, such as clicking buttons, are in bold.

References to commands and text typed in are in fixed font.

Notes are denoted: Note: This is a note.

Important notes are denoted: Important: Important point here.

1.3  System Components

Figure 1.1 provides an overview of a FileFly system. All communication between FileFly components is secured with Transport Layer Security (TLS). The individual components are described below.


Figure 1.1: FileFly System Overview

Caringo FileFly Admin Portal

FileFly Admin Portal is the system’s policy manager. It provides a centralized web-based configuration interface, and is responsible for task scheduling, policy simulation, server monitoring and file reporting. It lies outside the data path for file transfers.

Caringo FileFly Agent

Caringo FileFly Agent performs file operations as directed by Admin Portal Policies.

FileFly Agent is also responsible for retrieving file data from secondary storage upon

user/application access.

Data is streamed directly between agents and storage without any intermediary staging on disk.

When installed in a Gateway configuration, FileFly Agent does not allow migration of files from that server.

Optionally, Gateways can be configured for High-Availability (HA).

Caringo FileFly FPolicy Server

FileFly FPolicy Server provides migration support for NetApp filers via the NetApp FPolicy protocol. This component is the equivalent of Caringo FileFly Agent for NetApp filers.

FileFly FPolicy Server may also be configured for High-Availability (HA).

Caringo FileFly DrTool

Caringo FileFly DrTool is an additional application that assists in Disaster Recovery scenarios.

Note: This functionality is not included with Community Edition licenses.

2  Deployment

This chapter will cover:

  • Installing Caringo FileFly Tools

  • Installing Caringo FileFly Agent on file servers

  • Installing Caringo FileFly Gateways as required

  • Getting started with FileFly policies

  • Production readiness

Refer to these instructions during initial deployment and when adding new components. For upgrade instructions, please refer to Chapter 8 instead.

For further details and usage instructions for each platform, refer to Chapter 4.

2.1  DNS Best Practice

In a production deployment, Fully Qualified Domain Names (FQDNs) should always be used in preference to bare IP addresses.

Storage locations in Caringo FileFly are referred to by URI. Relationships between files must be maintained over a long period of time. It is therefore advisable to take steps to ensure the FQDNs used in these URIs are valid long-term, even as individual server roles are changed or consolidated.

Create DNS aliases for each logical storage role for each server. Use different DNS aliases when storing your finance department’s data as opposed to your engineering department’s data – even if they initially reside on the same server.

2.2  Installing FileFly Tools

The Caringo FileFly Tools package consists of the FileFly Admin Portal and the FileFly DrTool application (not licensed for Community Edition users). The FileFly Admin Portal provides central management of policy execution while the FileFly DrTool is used in disaster recovery situations.

FileFly Tools must be installed before any other components.

2.2.1  System Requirements

  • A dedicated server with a supported operating system:

  • Windows Server 2016

  • Windows Server 2012 R2 (Apr 2014 update rollup)

  • Windows Server 2012

  • Windows Server 2008 R2 SP1

  • Minimum 4GB RAM

  • Minimum 2GB disk space for log files

  • Active clock synchronization (e.g. via NTP)

Internet Explorer 11 or higher (possibly on a separate workstation) will be required to access the FileFly Admin Portal web interface.

2.2.2  Setup

  1. Run Caringo FileFly Tools.exe

  2. Follow the instructions on screen

FileFly Tools is configured in the Admin Portal web interface after completing the installation process. The FileFly Admin Portal will be opened automatically and can be found later via the Start Menu.

The interface will lead you through the process for installing your license.

For production licensed installations, a ‘Backup & Scrub Grace Period’ setup page will be displayed. Please read the text carefully and set the minimum grace period as appropriate and after consulting with your backup plan – see also §7.2. This value may be revised later via the ‘Settings’ page.

2.3  Installing FileFly Agents

Proceed to install DataCore FileFly Agents as described below once the FileFly Tools installation completes. FileFly Agents perform file operations as directed by Admin Portal Policies. Also, in the case of user/application initiated demigration, agents retrieve the file data from secondary storage autonomously.

2.3.1  FileFly Agent Server Roles

Each FileFly Agent server may fulfill one of two roles, selected at installation time.

In the ‘FileFly Agent for migration’ role, an agent assists the operating system to migrate and demigrate files. It is essential for the agent to be installed on all machines from which files will be migrated.

The agent provides access to CloudScaler and Swarm destinations in the Gateway role.

2.3.2  High-Availability Gateway Configuration

A high-availability gateway configuration is recommended. Such FileFly Gateways must be activated as ‘High-Availability FileFly Gateways’.

High-Availability Gateway DNS Setup

At least two FileFly Gateways are required for High-Availability.

  1. Add each FileFly Gateway server to DNS

  2. Create a single alias that maps to each of the IP addresses

  3. Use this alias in FileFly destination URIs, do not use for individual nodes:

Note: The servers that form the High-Availability Gateway cluster must NOT be members of a Windows failover cluster.

For further DNS recommendations, refer to §2.1.

2.3.3  Installing FileFly Agent for Windows Servers

System Requirements

  • Supported Windows Server operating system:

  • Windows Server 2016

  • Windows Server 2012 R2 (Apr 2014 update rollup)

  • Windows Server 2012

  • Windows Server 2008 R2 SP1

  • Minimum 4GB RAM

  • Minimum 2GB disk space for log files

  • Active clock synchronization (e.g. via NTP)

Note: When installed in the Gateway role, a dedicated server is required, unless it is to be co-located on the FileFly Tools server. When co-locating, create separate DNS aliases to refer to the Gateway and the FileFly Admin Portal web interface.

Setup

  1. Run the Caringo FileFly Agent.exe

  2. Select install location

  3. Select migration or Gateway role as appropriate, refer to 2.3.1

  4. If installing a FileFly Gateway, select the desired plugins

  5. Follow the instructions to activate the agent via FileFly Admin Portal

Activation
  • If no clustering is required, activate as a ‘Standalone Server’

  • If installing the FileFly Gateway for High-Availability, activate as a High-Availability FileFly Gateway

  • If the server is part of a Windows failover cluster, and this clustered resource is to be used as a FileFly Source, activate as a Windows failover cluster node

For further information see §5.3.1.

Important: If any type of clustering is used, ensure that FileFly Agent for Windows is installed on ALL cluster nodes.

2.3.4  Installing Caringo FileFly FPolicy Server for NetApp Filers

A Caringo FileFly FPolicy Server provides migration support for one or more NetApp

Filers through the FPolicy protocol. This component is the equivalent of Caringo FileFly Agent for NetApp Filers. Typically, FileFly FPolicy Servers are installed in a High Availability configuration.

System Requirements

  • A dedicated server with a supported operating system:

  • Windows Server 2016

  • Windows Server 2012 R2 (Apr 2014 update rollup)

  • Windows Server 2012

  • Windows Server 2008 R2 SP1

  • Minimum 4GB RAM

  • Minimum 2GB disk space for log files

  • Active clock synchronization (e.g. via NTP)

Setup

Installation of the FileFly FPolicy Server software requires careful preparation of the NetApp Filer and the FileFly FPolicy Server machines. Instructions are provided in §4.2.

Note: Legacy 7-Mode Filers require a different procedure at FileFly FPolicy Server installation time – see §4.3.

2.4  Installing Config Tools

In addition to the components described above, it may also be necessary to install one or more Config Tools. Full details are provided where required for each storage platform in Chapter 4.

2.5  Getting Started

2.5.1  Analyzing Volumes

The first step in a new DataCore deployment is to analyze the characteristics of the primary storage volumes once the software is installed. The following steps describe how to generate file statistics reports for each volume.

In the FileFly Admin Portal web interface (see Chapter 5 for full documentation):

  1. Create Sources for each volume to analyze

  2. Create a ‘Gather Statistics’ Policy and select all defined Sources

  3. Create a Task for the ‘Gather Statistics’ Policy 4. On the ‘Overview’ tab, click Quick Run

  4. Click on the Task’s name to run it immediately

  5. When the Task has finished, expand the details by clicking on the Task name under ‘Recent Task History’

  6. Click Go to Task to go to the ‘Task Details’ page

  7. Access the report by clicking on View Last Stats

Pay particular attention to the ‘Last Modified % by size’ graph. This graph will help identify how much data would be affected by a migration policy based on the age of files.

Examine ‘File types by size’ to see if the data profile matches the expected usage of the volume.

2.5.2  Preparing for Migration

Using the information from the reports, create tasks to migrate files:

  1. Prepare a destination for migrated files – see Create a Destination in FileFly Admin Portal

  2. Create a Rule and a Migration Policy

    • A typical rule might limit migrations to files modified more than six months ago – do not use an ‘all files’ rule

    • To avoid unnecessary migration of active files, be conservative with your first Migration Policy

  3. Create a Task for the new Policy

    • For now, disable the schedule

  4. Save the task, then click on its name to open the ‘Task Details’ page

  5. Click Simulate Now to run a Task simulation

  6. Examine the resultant reports (view the Task and click View Last Stats)

If the results of simulation differ from expectations, it may be necessary to modify the rules and re-run the simulation.

Note: The simulation reports created above show details of the subset of files matched by the rules in the policies only.

Note: Reports are generated for simulations only – a real Task run will log each file operation, but will not generate a statistics report.

2.5.3  Running and Scheduling Migration

Use Quick Run on the ‘Overview’ tab to run the migration Task immediately.

Migration is typically performed periodically: configure a schedule on the migration Task’s details page.

2.5.4  Next Steps

Chapter 3 describes all FileFly Policy Operations in detail and will help you to get the most out of FileFly.

The remainder of this chapter gives guidance on using FileFly in a production environment.

2.6  Production Readiness Checklist

Backup

Refer to Chapter 6 for details of how to backup FileFly configuration.

Test the backup and restore software respects stubs appropriately.

  1. Review the backup and restore procedures described in Check backup software can backup stubs without triggering demigration

  2. Check backup software restores stubs and they can be demigrated

Antivirus

Generally, antivirus software will not cause demigrations during normal file access. However, some antivirus software will demigrate files when performing scheduled file system scans.

Prior to production deployment, always check that installed antivirus software does not cause unwanted demigrations. Some software must be configured to skip offline files to avoid these inappropriate demigrations. Consult the antivirus software documentation for further details.

If the antivirus software does not provide an option to skip offline files during a scan, Caringo FileFly Agent may be configured to deny demigration rights to the antivirus software. Refer to §D.5 for more information.

It may be necessary for some antivirus products to exempt the Caringo FileFly Agent process from real-time protection (scan-on-access). Using Microsoft Security Essentials (MSE), it is necessary to add e.g. C:\Program Files\Caringo FileFly\ FileFly Agent\<version>\mwiclmb.exe to the ‘Excluded Processes’ list. Update the exclusion whenever FileFly is upgraded.

Other System-wide Applications

Check for other applications that open all the files on the whole volume. Audit scheduled processes on the file server – if such processes cause unwanted demigration, it may be possible to block them (see §D.5).

Monitoring and Notification

To facilitate proactive monitoring, Best practice is to configure one or both of the following mechanisms:

  1. Configure email notifications to monitor system health and Task activity – see 5.10

  2. Enable syslog on agents – see D.1

Platform Considerations

For further information on platform-specific interoperability considerations, please refer to the appropriates sections of Chapter 4.

2.7  Policy Tuning

Periodically re-assess file distribution and access behavior:

  1. Run ‘Gather Statistics’ Policies

  2. Examine reports

  3. Examine Server statistics – see 5.3

  4. For more detail, examine demigrates in file server agent.log files

Consider:

  1. Are there unexpected peaks in demigration activity?

  2. Are there any file types that should not be migrated?

  3. Should different rules be applied to different file types?

  4. Is the Migration Policy migrating regularly accessed data?

  5. Are the Rules aggressive enough or too aggressive?

  6. What is the data growth rate on primary and secondary storage?

  7. Are there subtrees on the source file system that should be addressed by separate policies or excluded from the source entirely?

3  Policy Operations

This chapter describes the various operations that may be performed on selected files by FileFly Admin Portal policies when using a Community Edition license.

User interface operation is further detailed in Chapter 5.

3.1  Gather Statistics Operation

Requires: Source(s)

Generate statistics report(s) for file sets at the selected Source(s). Optionally include statistics by file owner. Owner statistics are omitted which generally results in a faster policy run by default. Additionally, rules may be used to specify a subset of files on which to report rather than the whole source.

Statistics reports can be retrieved from FileFly Admin Portal – see §5.8.6.

3.2  Migrate Operation

Requires: Source(s), Rule(s), Destination

Migrate file data from selected Sources(s) to a Destination. Stub files remain at the Source location as placeholders until files are demigrated. File content will be transparently demigrated (returned to primary storage) when accessed by a user or application. Stub files retain the original logical size and file metadata. Files containing no data will not be migrated.

Each Migrate operation will be logged as a Migrate, Remigrate, or Quick-Remigrate.

A Remigrate is the same as a Migrate except it explicitly recognizes a previous version of the file had been migrated in the past and that stored data pertaining to that previous version is no longer required and so is eligible for removal via a Scrub policy.

A Quick-Remigrate occurs when a file has been demigrated and NOT modified. In this case it is not necessary to retransfer the data to secondary storage so the operation can be performed very quickly. Quick-remigration does not change the secondary storage location of the migrated data.

Optionally, quick-remigration of files demigrated within a specified number of days may be skipped. This option can be used to avoid quick-remigrations occurring in an overly aggressive fashion.

Additionally, this policy may be configured to pause during the globally configured work hours.

Migrates and Remigrates (but not Quick-remigrates) consume capacity license quota.

3.3  Quick-Remigrate Operation

Requires: Source(s), Rule(s)

Quick-Remigrate demigrated files not requiring data transfer, enabling space to be reclaimed quickly. This operation acts only on files that have not been altered since the last migration.

Optionally, files demigrated within a specified number of days may be skipped. This option can be used to avoid quick-remigrations occurring in an overly aggressive fashion.

Additionally, this policy may be configured to pause during the globally configured work hours.

Capacity license quota is not consumed.

3.4  Scrub Destination Operation

Requires: Destination (non-WORM)

Remove unnecessary stored file content from a migration destination. This is a maintenance policy that should be scheduled regularly to reclaim space (and license quota).

A grace period must be specified which is sufficient to cover the time from when a backup is taken to when the restore and corresponding Post-Restore Revalidate policy would complete. The grace period effectively delays the removal of data sufficiently to accommodate the effects of restoring primary storage from backup to an earlier state.

Use of scrub is usually desirable to maximize storage efficiency. To maximize performance benefits from quick-remigration, it is advisable to schedule migration / quick-remigration policies more frequently than the grace period.

To avoid interactions with migration policies, Scrub tasks are automatically paused while migration-related tasks are in progress.

Important: Source(s) MUST be backed up within the grace period.

3.5  Post-Restore Revalidate Operation

Requires: Source(s)

Scan all stubs present on a given Source, revalidating the relationship between the stubs and the corresponding files on secondary storage. This operation is required following a restore from backup and should be performed on the root of the restored source volume.

If only Write Once Read Many (WORM) destinations are in use, this policy is not required.

Important: This revalidation operation MUST be integrated into backup/restore procedures, see §7.2.

3.6  Demigrate Operation

Requires: Source(s), Rule(s)

Demigrate file data back to the selected Source(s). This is useful when a large batch of files must be demigrated in advance.

Prior to running a Demigrate policy, be sure that there is sufficient primary storage available to accommodate the demigrated data.

3.7  Advanced Demigrate Operation

Requires: Source(s), Rule(s)

Demigrates files with advanced options:

  • Disconnect files from destination – remove destination information from demigrated files (both files demigrated by this policy and files that have already been demigrated); it will no longer be possible to quick-remigrate these files

  • A Destination Filter may optionally be specified to demigrate/disconnect files migrated to a particular destination

Prior to running an Advanced Demigrate policy, be sure that there is sufficient primary storage available to accommodate the demigrated data.

3.8  Simple Premigrate Operation

Requires: Source(s), Rule(s), Destination

Premigrate file data from selected Source(s) to a Destination in preparation for migration. Files on primary storage will not be converted to stubs until a Migrate or QuickRemigrate Policy is run. Files containing no data will not be premigrated.

This can assist with:

  • a requirement to delay the stubbing process until secondary storage backup or replication has occurred

  • reduction of excessive demigrations while still allowing an aggressive Migration Policy.

Premigration is, as the name suggests, intended to be followed by full migration/quickremigration. If this is not done, a large number of files in the premigrated state may slow down further premigration policies, as the same files are rechecked each time.

Files already premigrated to another destination are skipped when encountered during a premigrate policy by default.

This policy may also be configured to pause during the globally configured work hours. Capacity license quota is consumed.

Note: Most deployments will not use this operation, but will use a combination of Migrate and Quick-Remigrate instead.

3.9  Erase Cached Data Operation

Requires: Source(s), Rule(s)

Erases cached data associated with files by the Partial Demigrate feature (NetAppSources only).

Important: The Erase Cached Data operation is not enabled by default. It must be enabled in the advanced section on the Admin Portal ‘Settings’ page.

4  Sources and Destinations

The following pages describe the characteristics of the Sources and Destinations supported by Caringo FileFly Community Edition – other editions may contain support for additional technologies. Planning, setup, usage and maintenance considerations are outlined for each storage platform.

IMPORTANT: Read any relevant sections of this chapter prior to deploying FileFly in a production environment.

4.1  Microsoft Windows

4.1.1  Migration Support

Windows NTFS volumes may be used as migration sources. On Windows Server 2016, ReFS volumes are supported as migration sources.

Windows stub files can be identified by the ‘O’ (Offline) attribute in Explorer. Depending on the version of Windows, files with this flag may be displayed with an overlay icon.

4.1.2  Planning

Prerequisites

  • A license that includes an appropriate entitlement for Windows

When creating a production deployment plan, please refer to §2.6.

Cluster Support

Clustered volumes managed by Windows failover clusters are supported. However, the

Cluster Shared Volume (CSVFS) feature is NOT supported. On Windows Server 2012 and above, when configuring a ‘File Server’ role in the Failover Cluster Manager, ‘File Server for general use’ is the only supported File Server Type. The ‘Scale-Out File Server for application data’ File Server Type is NOT supported.

When using clustered volumes in FileFly URIs, ensure the resource FQDN appropriate to the volume is specified rather than the FQDN of any individual node.

4.1.3  Setup

Installation

See Installing FileFly Agent for Windows §2.3.3

4.1.4  Usage

URI Format

win://{servername}/{drive letter}/[{path}]

Where:

  • servername – Server FQDN or Windows Failover File Server Resource FQDN

  • drive letter – Windows volume drive letter

Examples:

win://fs1.example.com/d/projects

win://fs2.example.com/e/

Note: Share names and mapped drives are not supported. 

4.1.5  Interoperability

This section describes Windows-specific considerations only and should be read in conjunction with §2.6.

Microsoft DFS Namespaces (DFSN)

DFSN is supported. FileFly Sources must be configured to access volumes on individual servers directly rather than through a DFS namespace. Users and applications may continue to access files and stubs via DFS namespaces as normal.

Microsoft DFS Replication (DFSR)

DFSR is supported for:

  • Windows Server 2016

  • Windows Server 2012 R2

  • Windows Server 2008 R2

FileFly Agents must be installed (selecting the migration role during installation) on EACH member server of a DFS Replication Group prior to running migration tasks on any group Replication Folder.

If adding a new member server to an existing Replication Group where FileFly is already in use, FileFly Agent must be installed on the new server first.

When running policies on a Replicated Folder, sources should be defined such that each policy acts upon only one replica. DFSR will replicate the changes to the other members as usual.

Read-only (one-way) replicated folders are NOT supported. However, read-only CIFS shares can be used to prevent users from writing to a particular replica as an alternative.

Due to the way DFSR is implemented, care should be taken to avoid writing to stub files concurrently being accessed from another replica.

In the rare event that DFSR-replicated data is restored to a member from backup, ensure that DFSR services on all members are running and that replication is fully up-to-date (check for the DFSR ‘finished initial replication’ Windows Event Log message), then run a Post-Restore Revalidate Policy using the same source used for migration.

Note: No additional capacity license quota is consumed when stubs are replicated by DFSR.

Retiring a DFSR Replica

Retiring a replica effectively creates two independent copies of each stub, without updating secondary storage. To avoid any potential loss of data:

  1. Delete the contents of the retired replica (preferably by formatting the disk, or at least disable Stub Deletion Monitoring during the deletion)

  2. Run a Post-Restore Revalidate Policy on the remaining copy of the data

If it is strictly necessary to keep both, independent, copies of the data and stubs, run a Post-Restore Revalidate Policy on both copies separately (not concurrently).

Preseeding a DFSR Replicated Folder Using Robocopy

The most common use of Robocopy with FileFly stubs is to preseed or stage initial synchronization. When performing such a preseeding operation:

  • for new Replicated Folders, ensure the ‘Primary member’ is set to be the original server, not the preseeded copy

  • both servers must have FileFly Agent installed before preseeding

  • add a “Process Exclusion” to Windows Defender for robocopy.exe (allow a while for the setting to take effect)

  • on the source server, preseed by running robocopy with the /b flag (to copy stubs as-is to the new server)

  • once preseeding is complete and replication is fully up-to-date (check for the DFSR ‘finished initial replication’ Windows Event Log message), Best practice is to run a Post-Restore Revalidate Policy on the original FileFly Source

Note: If the process above is aborted, delete all preseeded files and stubs (preferably by formatting the disk, or at least disable Stub Deletion Monitoring during the deletion) and then run a Post-Restore Revalidate Policy on the original FileFly Source.

Robocopy (Other Uses)

Robocopy will, by default, demigrate stubs as copied. This is the same behavior as Explorer copy-paste, xcopy, etc.

Robocopy with the /b flag (backup mode – must be performed as an administrator) will copy stubs as-is.

Robocopy /b is not recommended. If stubs are copied in this fashion, the following must be considered:

  • for a copy from one server to another, both servers must have Caringo FileFly Agent installed

  • this operation is essentially a backup and restore in one step, and thus inappropriately duplicates stubs which are intended to be unique

  • after the duplication, one copy of the stubs should be deleted immediately

  • run a Post-Restore Revalidate policy on the remaining copy

  • this process will render the corresponding secondary storage files unscrubbable, even after demigrated

  • to prevent Windows Defender triggering demigrations when the stubs are accessed in this fashion:

  • always run the robocopy from the source end (the file server with the stubs)

  • add a “Process Exclusion” to Windows Defender for robocopy.exe (allow a while for the setting to take effect)

Windows Data Deduplication

If a Windows source server is configured to use migration policies and Windows Data Deduplication, it should be noted a given file can either be deduplicated or migrated, but not both at the same time. FileFly migration policies will automatically skip files already deduplicated. Windows skips FileFly stubs when deduplicating.

When using both technologies, Best practice is to configure Data Deduplication and Migration based on file type such that the most efficacious strategy is chosen for each type of file.

Note: Microsoft’s legacy Single Instance Storage (SIS) feature is not supported. Do not use SIS on the same server as Caringo FileFly Agent.

Windows Shadow Copy

Windows Shadow Copy – also known as Volume Snapshot Service (VSS) – allows previous versions of files to be restored, e.g. from Windows Explorer. This mechanism cannot be used to restore a stub. Restore stubs from backup instead – see Chapter 7.

4.1.6  Behavioral Notes

Junction Points & Symlinks

With the exception of volume mount points, junction points will be skipped during traversal of the file system. Symlinks are also skipped. This ensures that files are not seen – and thus acted upon – multiple times during a single execution of a given policy. If it is intended a policy should apply to files within a directory referred to by a junction point, either ensure the Source encompasses the real location at the junction point’s destination, or specify the junction point itself as the Source.

Mount-DiskImage

On Windows 8 or above, VHD and ISO images may be mounted as normal drives using the PowerShell Mount-DiskImage cmdlet. This functionality can also be accessed via the Explorer context menu for an image file.

A known limitation of this cmdlet is it does not permit sparse files to be mounted (see Microsoft KB2993573). Since migrated image files are always sparse, they must be demigrated prior to mounting. This can be achieved either by copying the file or by removing the sparse flag with the following command:

fsutil sparse setflag <file name> 0

4.1.7  Stub Deletion Monitoring

On Windows, the FileFly Agent can monitor stub deletions to identify secondary storage files no longer referenced to maximize the usefulness of Scrub Policies. This feature extends not only to stubs directly deleted by the user, but to other cases of stub file destruction such as overwriting a stub or renaming a different file over the top of a stub.

Stub Deletion Monitoring is disabled by default. To enable it, please refer to §D.2.

4.2  NetApp Filer (Cluster-mode)

This section describes support for ‘Cluster-mode’ NetApp Filers. For ‘7-mode’ Filers (7.x Filers and 8.x Filers operating in ‘7-mode’), see §4.3.

4.2.1  Migration Support

Migration support for sources on NetApp Vservers (Storage Virtual Machines) is provided via NetApp FPolicy. This requires the use of a Caringo FileFly FPolicy Server. Client demigrations can be triggered via CIFS or NFS client access.

Note: NetApp Filers currently support FPolicy for Vservers with FlexVol volumes but not Infinite volumes.

When accessed via CIFS on a Windows client, NetApp stub files can be identified by the ‘O’ (Offline) attribute in Explorer. Files with this flag may be displayed with an overlay icon. The icon may vary depending on the version of Windows on the client workstation.

4.2.2  Planning

Prerequisites

  • NetApp Filer(s) must be licensed for the particular protocol(s) to be used (FPolicy requires a CIFS license)

  • A FileFly license that includes an entitlement for FileFly NetApp FPolicy Server

Caringo FileFly FPolicy Servers require EXCLUSIVE use of CIFS connections to the associated NetApp Vservers. Do not open Explorer windows, map disks, and do not access UNC paths to the filer from the FileFly FPolicy Server machine. Failure to observe this restriction will result in unpredictable FPolicy disconnections and interrupted service.

When creating a production deployment plan, please refer to §2.6.

Filer System Requirements

Caringo FileFly FPolicy Server requires the Filer is running:

  • Data ONTAP version 9.0 – 9.4

Network

Each FileFly FPolicy Server should have exactly one IP address.

Place the FPolicy Servers on the same subnet and same switch as the corresponding Vservers to minimize latency.

Antivirus Considerations

Ensure that Windows Defender or any other antivirus product installed on FileFly FPolicy Server machines is configured to omit scanning/screening NetApp shares.

Antivirus access to NetApp files will interfere with the correct operation of the FileFly FPolicy Server software. Antivirus protection should still be provided on client machines and/or the NetApp Vservers themselves as normal.

High-Availability for FileFly FPolicy Servers

It is strongly recommended to install Caringo FileFly FPolicy Servers in a High-Availability configuration. This configuration requires the installation of Caringo FileFly FPolicy Server on a group of machines which are addressed by a single FQDN. This provides High-Availability for migration and demigration operations on the associated Vservers.

A pair of FileFly FPolicy Servers operating in HA service all Vservers on a NetApp cluster.

Note: The servers that form the High-Availability FileFly FPolicy Server configuration must not be members of a Windows failover cluster.

DNS Configuration

All Active Directory Servers, Caringo FileFly FPolicy Servers, and NetApp Filers, must have both forward and reverse records in DNS.

All hostnames used in Filer and FileFly FPolicy Server configuration must be FQDNs.

4.2.3  Setup

Setup Parameters

© DataCore Software Corporation. · https://www.datacore.com · All rights reserved.