Skip to main content
NetApp Knowledge Base

Tamper-proof Snapshot are not created when SnapMirror policy uses Long-Term Retention Snapshots

Views:
1,079
Visibility:
Public
Votes:
1
Category:
ontap-9
Specialty:
dp
Last Updated:

Applies to

  • ONTAP 9.13.1 and earlier
  • Tamper-proof snapshots
  • Long Term Retention Snapshots
  • SnapLock

Issue

  • Tamperproof Snapshot are not created when SnapMirror policy rules use a local schedule, also known as Long-Term Retention Snapshots
  • There were no error messages while applying retention period to the snapshots created through the Long-Term Retention Snapshots schedule
  • Example: 

dest-Cluster::> snapmirror policy show -policy sv_snapM_18days_local -instance

                      Vserver:
dest-naclsv02
       SnapMirror Policy Name: sv_snapM_18days_loca
       SnapMirror Policy Type: mirror-vault

Policy Owner: cluster-admin
                  Tries Limit: 8
            Transfer Priority: normal
    Ignore accesstime Enabled:
false
      Transfer Restartability: always
  Network Compression Enabled: false
              Create Snapshot: true

       Comment: -
        Total Number of Rules: 2
                   Total Keep: 19
       Transfer Schedule Name: -

       Throttle: unlimited

 Rules:
 SnapMirror Label       Keep Preserve Warn Schedule Prefix     Retention Period

---------------------- ---- -------- ---- -------- ---------- ----------------
 sm_created                1 false       0 -
-                         -
 sv_local_daily           18 false       0 daily    sv_local_daily       18days
 sv_daily                 18 false       0 -        -                    18days

  • The Highlighted rule gets added without giving error however it does not work. 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.