im not sure to start this discussion on the right place. I havent found trident mariadb container does not start mariabdb service while dockerhost have a public ip, everything else looks good. The volume is visible the volume is mapped into the container to /var/lib/mysql. Data is accessible. Rights are correct. Volume is read write. the container is running only the mariadb service doenst come up. Changing the dokerhost IP back to internal ip the mariadb service starts without any issues. we are not using kubernetes only docker, docker-compose with trident plugin Trident version: latest from this month Container runtime: 20.10.24+dfsg1, build 297e128 docker-compose version: version 1.29.2, build unknown OS: Debian12 NetApp backend types: Netapp AFF A400 To Reproduce changing dockerhost to public ip trident config { "version": 1, "storageDriverName": "ontap-nas-economy", "storagePrefix": "trident_eco_prod_labs_", "managementLIF": "172.16.21.100", "dataLIF": "172.16.21.31", "svm": "corp_trident", "username": "USER", "password": "PASSWORD", "aggregate": "n01_aggr1", "limitVolumeSize": "300g", "log-level": "debug", "debug": true } docker-compose.yml --- services: guacd: image: guacamole/guacd networks: - local guac-serve: image: guacamole/guacamole links: - guacd:guacd - mariadb:mysql ports: - 8080:8080 environment: - MYSQL_LOG_CONSOLE=true - MYSQL_HOSTNAME=mariadb - MYSQL_DATABASE=guacamole - MYSQL_USER=guacamole - MYSQL_PASSWORD=PASSWORD - GUACD_HOSTNAME=guacd - GUACD_PORT=4822 networks: - local mariadb: image: mariadb:11.5 environment: - TZ=Europe/Berlin - MYSQL_ROOT_PASSWORD=PASSWORD - MYSQL_DATABASE=guacamole - MYSQL_USER=guacamole - MYSQL_PASSWORD=PASWORD volumes: - debian12_guacamole:/var/lib/mysql networks: - local volumes: debian12_guacamole: driver: trident_eco:latest # Ensure this matches your plugin name # driver_opts: # size: "30G" networks: local: driver: bridge
... View more
I'm using C-mode Ontap 9.3 (soon to be 9.12!) and I have a volume that houses 300 CIFS shares. in total there are ~ 40 million files/folders on this volume I have a requirement to create the following: - An ADDS group that has list access to all directories - An ADDS group that has read access to all files/directories If I share out the root of this volume and add an NTFS ACL for this purpose it's taking over 60 hrs and counting to complete! This is because doing this over the CIFS protocol is incredibly inefficient. Is there anyway I can set/modify/add NTFS permissions on this volume from the Filer1/vServer itself? I found the following article but it's not clear to me if this destroys existing NTFS permissions Configure NTFS file permissions using the ONTAP CLI (netapp.com)
... View more
Hello Experts, We recently purchase a hybrid FAS2750 controller with 12 960GB SSDs and two DS212C shelves with 12 10TB drives each. We want use the SSDs aggr0 and the rest for vSphere esxi. The 24 HDDs (one large aggr) for CIFS. Is it possible to use the SSD (maybe RAID4 to minimize the number of disks) for aggr0? Netapp documentation says aggr0 will use SSDs only if the entire system (controller & shelves) contain SSDs only. Otherwise root aggregate will use HDDs. I don't mind to use HDDs but it seems I will be wasting a lot of disk space for just aggr0. I know you use use ADP for root aggregate but agg0 is created automatically, how do I setup ADP before agg0 is created? We also want to use the leftover SSDs for caching of the HDDs. Any advices on best way to get going? I am fairly familiar with the Netapp OnTap software except on creating aggr0. Any advices will be greatly appreciated. Thank you very much for your help!
... View more
Customer is asking the following : Is this possible to restore a data that has been saved with ONTAP 9.11.1P11 via NDMP to a FAS2552 running 8.2.5P5? Could you help us to confirm this to customer?
... View more
We typically use ssh key-based authentication in our environment for the increased security over password auth. I'm looking into setting up Multi-admin verification for things like volume deletes. However in testing, I noticed that any admin can change any others' public keys, and therefore log in as any other MAV admin. By default, MAV creates a rule to restrict "security login password", but not to restrict "security login publickey", and you can't add such a rule either: > security multi-admin-verify rule create -operation "security login publickey" -query "-multi-admin-approver true -different-user true"
Error: command failed: Operation "security login publickey" is not supported by this feature. This seems like a huge hole, or am I misunderstanding something here?
... View more