What’s new in Cloud Manager 3.8 Edit on GitHub Request doc changes

Contributors netapp-bcammett

RSS Subscribe

Cloud Manager typically introduces a new release every month to bring you new features, enhancements, and bug fixes.

Cloud Manager 3.8.1 update (16 Feb 2020)

We released a few enhancements to Cloud Manager 3.8.1.

Backup to S3 enhancements

  • Backup copies are now stored in an S3 bucket that Cloud Manager creates in your AWS account, with one bucket per Cloud Volumes ONTAP working environment.

  • In addition to read-write volumes, you can now back up data protection volumes.

  • Backup to S3 is now supported in all AWS regions where Cloud Volumes ONTAP is supported.

  • You can set the backup schedule to daily, weekly, or monthly.

  • Cloud Manager no longer needs to set up interface VPC endpoints to the Backup to S3 service.

Additional S3 permissions are required for these enhancements. The IAM role that provides Cloud Manager with permissions must include permissions from the latest Cloud Manager policy.

AWS updates

We’ve introduced support for new EC2 instances and a change in the number of supported data disks for Cloud Volumes ONTAP 9.6 and 9.7. Check out the changes in the Cloud Volumes ONTAP Release Notes.

Cloud Manager 3.8.1 (2 Feb 2020)

Cloud Compliance enhancements

The following enhancements are now available for Cloud Compliance.

  • Support for Azure NetApp Files

    We’re pleased to announce that Cloud Compliance can now scan Azure NetApp Files to identify personal and sensitive data that resides on volumes.

  • Scan status

    Cloud Compliance now shows you a scan status for each CIFS and NFS volume, including error messages that you can use to correct any issues.

    screenshot cloud compliance status

  • Filter dashboard by working environment

    You can now filter the contents of the Cloud Compliance dashboard to see compliance data for specific working environments.

    screenshot cloud compliance filter

  • New personal data type

    Cloud Compliance can now identify a California Driver’s License when scanning data.

  • Support for additional categories

    Three additional categories are supported: Application data, logs, and database and index files.

Enhancements to accounts and subscriptions

We’ve made it easier to select an AWS account or GCP project and an associated marketplace subscription for a pay-as-you-go Cloud Volumes ONTAP system. These enhancements help to ensure that you’re paying from the right account or project.

For example, when you create a system in AWS, click Edit Credentials if you don’t want to use the default account and subscription:

A screenshot of the Details & Credentials page in the working environment wizard that shows the Edit Credentials button.

From there, you can choose the account credentials that you want to use and the associated AWS marketplace subscription. You can even add a marketplace subscription, if you need to.

A screenshot of the Edit Account and Add Subscription dialog box. This dialog box enables you to choose a subscription and associate the credentials with a subscription.

And if you manage multiple AWS subscriptions, you can assign each one of them to different AWS credentials from the Credentials page in the settings:

A screenshot of the Credentials page where you can add a subscription to AWS credentials from the menu.

Timeline enhancements

The Timeline was enhanced to provide you with more information about the NetApp cloud services that you use.

  • The Timeline now shows actions for all Cloud Manager systems within the same Cloud Central account

  • You can now find information more easily by filtering, searching, and adding and removing columns

  • You can now download the timeline data in CSV format

  • In the future, the Timeline will show actions for each NetApp cloud service that you use (but you can filter the information down to a single service)

A screenshot of the Timeline that appears in Cloud Manager. The Timeline shows details about the actions that have taken place in Cloud Manager.

Cloud Manager 3.8 (8 Jan 2020)

HA enhancements in Azure

The following enhancements are now available for Cloud Volumes ONTAP HA pairs in Azure.

  • Override CIFS locks for Cloud Volumes ONTAP HA in Azure

    You can now enable a setting in Cloud Manager that prevents issues with Cloud Volumes ONTAP storage failover during Azure maintenance events. When you enable this setting, Cloud Volumes ONTAP vetoes CIFS locks and resets active CIFS sessions. Learn more.

  • HTTPS connection from Cloud Volumes ONTAP to storage accounts

    You can now enable an HTTPS connection from a Cloud Volumes ONTAP 9.7 HA pair to Azure storage accounts when creating a working environment. Note that enabling this option can impact write performance. You can’t change the setting after you create the working environment.

  • Support for Azure general-purpose v2 storage accounts

    The storage accounts that Cloud Manager creates for Cloud Volumes ONTAP 9.7 HA pairs are now general-purpose v2 storage accounts.

Data tiering enhancements in GCP

The following enhancements are available for Cloud Volumes ONTAP data tiering in GCP.

  • Google Cloud storage classes for data tiering

    You can now choose a storage class for data that Cloud Volumes ONTAP tiers to Google Cloud Storage:

  • Data tiering using a service account

    Starting with the 9.7 release, Cloud Manager now sets a service account on the Cloud Volumes ONTAP instance. This service account provides permissions for data tiering to a Google Cloud Storage bucket. This change provides more security and requires less setup. For step-by-step instructions when deploying a new system, see step 3 on this page.

    The following image shows the Working Environment wizard where you can select a storage class and service account:

    screenshot data tiering gcp

Cloud Manager requires the following GCP permissions for these enhancements, as shown in the latest Cloud Manager policy for GCP.

- storage.buckets.update
- compute.instances.setServiceAccount
- iam.serviceAccounts.getIamPolicy
- iam.serviceAccounts.list