You run the command "isi get -DD /ifs/data/foo.txt" on a 4 node cluster. The displayed results indicate a protection level of 6+2/2. What statement best describes 6+2/2?
A. Protection level of N+2:1; Contains 6 data stripes units and 2 FEC stripe units; Written to 2 drives per node
B. Protection level of N+2:1; Contains 8 data stripe units and 2 FEC stripe units; Written to 2 drives per node
C. Protection level of N+2: Contains 8 data stripe units and 2 FEC stripe units; Written to 1 drive per node
D. Protection level of N+1: Contains 6 data stripe units and 1 FEC stripe unit; Written to 1 drive per node
When are non-path based file pool policies applied to files which have been written to the cluster?
A. Whenever the SmartPools job runs
B. Only at 22:00 Hrs
C. Upon Ingress or at 22:00 Hrs
D. Whenever the policies get updated via an edit.
What is an important consideration when upgrading a cluster from OneFS 6.5.x.x to OneFS 7.0.x.x?
A. The node model must be supported.
B. SmartConnect may need to be reconfigured.
C. SnapshotIQ must be reconfigured.
D. SmartQuotas may need to be reset.
A customer needs to upgrade their 6 node Isilon cluster from OneFS 7.0 to OneFS 7.1 with minimal disruption.
What would be the best way to upgrade the cluster?
A. Perform a simultaneous upgrade of all nodes
B. Perform a rolling upgrade of all nodes
C. Perform a simultaneous upgrade of 1 node at a time
D. Perform a rolling upgrade of 2 nodes at a time
Your customer comes to you with a sysctl command that they found on the Internet. They want to apply
this to their cluster.
What should you do?
A. Consult with Isilon support to understand the effects and risks to the customer's system.
B. Check the knowledge base to make sure the command is documented, and if so, apply it.
C. Apply the sysctl command to a single node to gauge the effect.
D. Warn the customer that this is not a supported command.
What description best fits sysctl on Isilon nodes?
A. It is a dangerous tool that can severely affect cluster operations and should only be used with great care.
B. It has no chance of harming the cluster, so it can be used freely by any operator.
C. It is dangerous, but parameters do not change from version to version and are safe to modify based on prior knowledge.
D. It can be safely used as long as only local node parameters are altered, rather than network parameters.
What resource(s) are available to explain event types by code?
A. OneFS Event Reference guide and web administration interface help
B. OneFS Event Reference guide only
C. main pages and web administration interface help
D. isi events show command
Which condition could make it necessary to reset the CELOG DB?
A. /var partition is >95% full
B. Always required as part of an upgrade from OneFS 6.0 to 7.x
C. The LNN rebooted causing the master coalescer function to move
D. The master coalescer nodes ext-2 interface was added to a different subnet.
What would the "tracert" command help determine when troubleshooting client connection issues?
A. Identify whether multiple paths exist and if one is down
B. Can measure RTT and Whois information
C. Tests IP connectivity and Dead Gateway Detection D. The current TCP/IP configuration from the client
Which characteristic is present in dynamic pool configuration?
A. Best for NFSv2 and NFSv3 clients
B. Best for SMB and NFSv4 clients
C. IP addresses do not failover if node is lost
D. Only allocates a single IP address per NIC