Skip to main content
NetApp Knowledge Base

Cloud Insights Workload Security  Fpolicy Best Practice and Recommendations

Views:
559
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
nas
Last Updated:

Applies to

  • CIFS
  • NFS
  • Cloud Secure
  • FPolicy

Answer

What are some Best Practices and Recommendations pertaining to Cloud Secure Fpolicy Deployments?
Cloud Secure Specific Recommendations:
  • Configuring the ONTAP SVM Data Collector - follow the Before you Begin section for Cloud Insight\Cloud Secure Data Collector Best Practices
  • For optimal performance, you should configure the FPolicy server to be on the same subnet as the storage system.
NetApp Specific Recommendations:
  • For Cloud Secure External Engines, set send-buffer-size  to 1MB or greater

    • via the Cloud Secure UI, there is an option to set "Set ONTAP Send Buffer size" (1MB to 6MB)

  • To lessen the potential impact of latency, set abort timeout lower, for example: 5s.

If there is a large amount of latency between the Collector and the SVM, it can cause a delay in the TCP acknowledgements, and potential impact to latency in very rare occasions.

To decrease end-user latency in cases where there are connection issues or CPU starvation on the collector, it is recommended to lower the "Timeout for Aborting a Request" from 40 to 5 seconds.

Please NOTE this value is automatically set by Cloud Secure.

General Recommendations:

 

 

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.