Applies to Product Security Incident Response Team (PSIRT) DO NOT share this with the customer Use it to assist in troubleshooting suspected vulnerabilities Security and vulnerability cases should be ...Applies to Product Security Incident Response Team (PSIRT) DO NOT share this with the customer Use it to assist in troubleshooting suspected vulnerabilities Security and vulnerability cases should be treated with special care as security teams could force removal of software and/or equipment from the customer network. Do not admit that an undocumented vulnerability exists within NetApp code unless specifically directed to do so after confirming with PSIRT email (ng-psirt) or Security Kx.
This article describes how to check if the SAS ports are being saturated and if extra latency is being introduced by the saturated SAS ports. Expected disk latency is usually hard to tell, it has to b...This article describes how to check if the SAS ports are being saturated and if extra latency is being introduced by the saturated SAS ports. Expected disk latency is usually hard to tell, it has to be based on the comparison with the disks in the same aggregate, or disks from other aggregates with a similar workload. The saturated SAS ports would add extra latency to the front-end operations, and it would be manifested as the disk layer latency.