Skip to main content
NetApp Knowledge Base

Search

  • Filter results by:
    • View attachments
    Searching in
    About 6 results
    • https://kb.netapp.com/on-prem/ontap/Ontap_OS/FS_Issues/CONTAP-357894
      Issue This request for enhancement represents some customers' request to engineering to tone the following ARW alert down, which was modified via bug: CONTAP-105091: The meaning of the EMS event “call...Issue This request for enhancement represents some customers' request to engineering to tone the following ARW alert down, which was modified via bug: CONTAP-105091: The meaning of the EMS event “callhome.arw.activity.seen” is unclear Current alert format: ALERT callhome.arw.activity.seen: Call home message for POSSIBLE RANSOMWARE ACTIVITY DETECTED, Volume: testvol_2 (UUID: df60d07f-f6f9-11ee-bea9-0050568ecb34) in Vserver: vs_1 (UUID: adaa988b-f6f9-11ee-bea9-0050568ecb34)
    • https://kb.netapp.com/on-prem/ontap/Ontap_OS/FS_Issues/CONTAP-305239
      Issue Request for enhancement for ONTAP in order to improve its handling of quota changes in environments with high user churn rate, UNIX to Windows user mapping, and intense use of user quotas. Curre...Issue Request for enhancement for ONTAP in order to improve its handling of quota changes in environments with high user churn rate, UNIX to Windows user mapping, and intense use of user quotas. Currently, when a user with working name mapping and no SECD errors experiences quota changes, it triggers a 'quota.parse.error' messages.
    • https://kb.netapp.com/on-prem/ontap/Ontap_OS/OS-Issues/CONTAP-241957
      Issue IPSEC alert is coming in for ipsec.ib.no.lookup after the connection is between established. Customer enhancement put in lower priority of EMS from Alert to [Debug or Informational]
    • https://kb.netapp.com/on-prem/ontap/da/NAS/NAS-Issues/CONTAP-291847
      Issue Request for enhancement for an option that allow RQUOTA requests (that are not Kerberized) on clients, where they only permit mounts via Kerberos. Currently, only mounts via Kerberos are permitt...Issue Request for enhancement for an option that allow RQUOTA requests (that are not Kerberized) on clients, where they only permit mounts via Kerberos. Currently, only mounts via Kerberos are permitted. Target is to allow RQUOTA requests without requiring Kerberos authentication.
    • https://kb.netapp.com/on-prem/ontap/mc/mc-Issues/CONTAP-80508
      Console Output displays the following during boot: [MCC DR state... [enter Ctrl-C(resume), S(status), L(link)]] SKtrace logs display the following: [2024-07-12T09:43:04Z 3008216395674004 [6:0] BSD_RLI...Console Output displays the following during boot: [MCC DR state... [enter Ctrl-C(resume), S(status), L(link)]] SKtrace logs display the following: [2024-07-12T09:43:04Z 3008216395674004 [6:0] BSD_RLIB_ERR: rlib_cma_event_handler: conn err cma event 8, qp=hb[CONN_HA:1:e0b],cm_id=0xfffff8116d1fd000, err=-61 2024-07-12T09:43:04Z 3008216395678716 [6:0] MCC_IP_WARN: ulp_conn_handler: (999) conn received error upcall for hb for role 1 err -61] [2024-07-12T09:43:04Z 3008216395970302 [14:0] BSD_RLIB_E…
    • https://kb.netapp.com/on-prem/ontap/Ontap_OS/FS_Issues/CONTAP-358932
      Issue When trying to disable anti-ransomware on MDV_audit volumes, it fails as below: ::*> anti-ransomware volume disable -volume MDV_aud_71d83aaf5bcd4ffe92de71fa2efc1bdb -vserver cluster1 (security a...Issue When trying to disable anti-ransomware on MDV_audit volumes, it fails as below: ::*> anti-ransomware volume disable -volume MDV_aud_71d83aaf5bcd4ffe92de71fa2efc1bdb -vserver cluster1 (security anti-ransomware volume disable) Error: command failed: Failed to disable anti-ransomware on volume "MDV_aud_71d83aaf5bcd4ffe92de71fa2efc1bdb" in Vserver "cluster1". Reason: Cannot disable anti-ransomware on volume "MDV_aud_71d83aaf5bcd4ffe92de71fa2efc1bdb" in Vserver "cluster1" because there is no j…