Specifications

NetApp Deduplication for FAS and V-Series Deployment and Implementation Guide
2
TABLE OF CONTENTS
1 INTRODUCTION AND OVERVIEW OF DEDUPLICATION ....................................................... 4
1.1 HOW DEDUPLICATION FOR FAS WORKS ............................................................................................... 4
1.2 DEDUPLICATED VOLUMES ....................................................................................................................... 5
1.3 DEDUPLICATION METADATA ................................................................................................................... 5
1.4 GENERAL DEDUPLICATION FEATURES .................................................................................................. 7
2 CONFIGURATION AND OPERATION ....................................................................................... 7
2.1 REQUIREMENTS OVERVIEW .................................................................................................................... 7
2.2 INSTALLING AND LICENSING DEDUPLICATION ..................................................................................... 8
2.3 COMMAND SUMMARY ............................................................................................................................... 9
2.4 DEDUPLICATION QUICK START GUIDE ................................................................................................. 10
2.5 END-TO-END DEDUPLICATION CONFIGURATION EXAMPLE .............................................................. 10
2.6 CONFIGURING DEDUPLICATION SCHEDULES ..................................................................................... 12
3 SIZING FOR PERFORMANCE AND SPACE EFFICIENCY .................................................... 13
3.1 DEDUPLICATION GENERAL BEST PRACTICES .................................................................................... 13
3.2 DEDUPLICATION PERFORMANCE ......................................................................................................... 14
3.3 DEDUPLICATION STORAGE SAVINGS................................................................................................... 16
3.4 SPACE SAVINGS ESTIMATION TOOL (SSET) ........................................................................................ 17
3.5 DEDUPLICATION LIMITATIONS .............................................................................................................. 18
4 DEDUPLICATION WITH OTHER NETAPP FEATURES ......................................................... 20
4.1 DEDUPLICATION AND SNAPSHOT COPIES .......................................................................................... 20
4.2 DEDUPLICATION AND SNAPRESTORE ................................................................................................. 21
4.3 DEDUPLICATION AND THE VOL COPY COMMAND .............................................................................. 21
4.4 DEDUPLICATION AND READ REALLOCATION (REALLOC) ................................................................. 21
4.5 DEDUPLICATION AND FLEXCLONE VOLUMES .................................................................................... 21
4.6 DEDUPLICATION AND ACTIVE-ACTIVE CONFIGURATION ................................................................... 22
4.7 DEDUPLICATION AND V-SERIES ............................................................................................................ 22
4.8 DEDUPLICATION AND SNAPMIRROR REPLICATION ........................................................................... 23
4.9 DEDUPLICATION AND SNAPVAULT ....................................................................................................... 27
4.10 DEDUPLICATION AND SNAPVAULT FOR NETBACKUP ....................................................................... 27
4.11 DEDUPLICATION AND MULTISTORE (VFILER) ..................................................................................... 28
4.12 DEDUPLICATION AND SNAPLOCK ........................................................................................................ 28
4.13 DEDUPLICATION AND METROCLUSTER ............................................................................................... 28
4.14 DEDUPLICATION AND DATAFORT ENCRYPTION ................................................................................. 29
4.15 DEDUPLICATION AND LUNS................................................................................................................... 29