Skip to main content

NetApp Insight 2018 Trip Report, Part 2



Welcome back to the continuation of my trip out to NetApp Insight 2018 (read Part 1 if you haven't yet)! I'm going to pick back up at the beginning of the third day of the conference, which began with the morning General Session.

Day 3

Similar to Tuesday, there was a Wednesday morning General Session that featured some interesting customer stories as well as several product demos. The ones that stood out to me in particular were the NetApp Kubernetes Service announcement which likely comes as a result of the StackPoint acquisition and the demo of NetApp Data Availability Services (NDAS). Again, I won't go into super deep detail about the Wednesday General Session since you can watch it on YouTube here, but it was really cool to see how easy it was to deploy applications and services from Cloud Central.


I had one of my Tweets show up on the big screen before the General Session; I think I'm famous now

I thought Dave Hitz's speech at the end of the session was a nice cap to the second General Session of the conference too. His speaking style makes it hard to not get excited about whatever he is talking about. My favorite quote? "Graphical user interfaces are for WIMPS!" Haha, sorry NetApp UX designers!



I was a little lighter on sessions on Wednesday because I spent more time at Insight Central hanging out at the Social Media Hub and talking to some vendors and folks at the NetApp booths. I also sat the NetApp Certified Support Engineer - ONTAP Specialist exam on Wednesday afternoon, which I passed! Passing the certification allowed me access into the Tech Elite Meetup that happened immediately before the Customer Appreciation Event, which was a really good time too.


  Final Thoughts

If I leave a conference feeling mentally exhausted after being bombarded with new information for days on end, I consider that a good experience. Being around groups of incredibly smart people always refreshes my motivation to learn more and be a better engineer. Not to diminish the sessions because they were responsible for feeding me lots of new knowledge, but the people I had the privilege to meet (too numerous to list here) had the bigger impact.

Finally, I want to give a big thank you to NetApp United for creating a community that I am proud to be a part of, and it was great to meet fellow members!

Thanks for reading and I'll be back to Insight in 2019!

Popular posts from this blog

How To: Unjoin NetApp Nodes from a Cluster

Let me paint you a word picture:

You've upgraded to a shiny new AFF - it's all racked, stacked, cabled and ready to rock. You've moved your volumes onto the new storage and your workloads are performing beautifully (of course) and it's time to put your old NetApp gear out to pasture.

We're going to learn how to unjoin nodes from an existing cluster. But wait! There are several prerequisites that must be met before the actual cluster unjoin can be done.


Ensure that you have either moved volumes to your new aggregates or offlined and deleted any unused volumes.Offline and delete aggregates from old nodes.Re-home data LIFs or disable/delete if they are not in use.Disable and delete intercluster LIFs for the old nodes (and remove them from any Cluster Peering relationships)Remove the old node's ports from any Broadcast Domains or Failover Groups that they may be a member of.Move epsilon to one of the new nodes (let's assume nodes 3 and 4 are the new nodes, in th…

ONTAP Configuration Compliance Auditing with PowerShell and Pester

I have been looking for a way to validate NetApp cluster configuration settings (once a configuration setting is set, I want to validate that it was set properly in a programmatic fashion) and prevent configuration drift (if a setting is different than its expected value, I want to know about it). I needed it to be able to scale out to dozens of clusters as well, so it needed to be something that I could run both automatically and on an ad-hoc basis if necessary.

NetApp PowerShell Toolkit

The core of the solution is the NetApp PowerShell Toolkit, without which this would likely not be possible. It contains 2300+ cmdlets for provisioning and managing NetApp storage components. It can be downloaded from the ToolChest on the NetApp MySupport site (with a valid login). You'll find exhaustive documentation there as well for each of the cmdlets along with syntax examples and sample code. It is a fantastic and easy way to automate common storage tasks - we use it in our environment for e…

Step up your HTTP security header game with NetScaler Rewrite Policies

There are a number of HTTP response headers that exist to increase web site security. If set properly, they can ensure that your site is less exposed to many common web vulnerabilities. By no means are these descriptions exhaustive, so I have included some references that can provide a more in-depth explanation at the bottom of each section. I'd also like to give a shout-out to the OWASP Secure Headers Project and Scott Helme of securityheaders.com - thank you!

Note: Screenshots are from a NetScaler VPX 12.1 - if you are running a different version, the screenshots may look different, but the logic is the same. So that I have something to bind these policies to, I've also already created a load-balancing virtual server named lb_web_ssl and a Service Group for two TurnKey LAMP servers on the back-end.

X-Frame-Options
The X-Frame-Options header is designed to guard against clickjacking (an attack where malicious content is hidden beneath a clickable button or element on a web si…