SlideShare une entreprise Scribd logo
1  sur  7
Ocwen Financial Corporation
Netapp Volume Full
Version 1
Document Owner: ETIS Storage & Backup Support Team
Approved:
Approved by:
Reference #:
Tier 4 Procedure Page 1 of 7 Next Review: No Review Date
Printed versions are for reference only. Please refer to the electronic copy for the latest version.
NetAPP Volume Full , v1
APPROVED: 08/22/2015
APPROVED By:
REFERENCE #: 6998
Tier 4 Procedure Page 2 of 7 Next Review: No Review Date
Printed versions are for reference only. Please refer to the electronic copy for the latest version.
TABLE OF CONTENTS
I. PURPOSE OF THIS PROCEDURE.........................................................................3
II. SCOPE OF THIS PROCEDURE……………………………………………………. 3
III.ROLES AND RESPONSIBILITIES…………………………………………………..3
IV. DOCUMENTPROCEDURE…………………………………………………………….4
V. DESCRIPTION OFUSES………………………………………………………………4
VI. PROCEDURE OWNER AND PARTICIPANT……………………………………4
VII.PROCESS WORK FLOW……………………………………………………………4
NetAPP Volume Full , v1
APPROVED: 08/22/2015
APPROVED By:
REFERENCE #: 6998
Tier 4 Procedure Page 3 of 7 Next Review: No Review Date
Printed versions are for reference only. Please refer to the electronic copy for the latest version.
I. PURPOSE OFTHIS PROCEDURE
The purpose of this policy is as follows:
 To safeguard the information assets of Ocwen
 To prevent the loss of data in the case of an accidental deletion or corruption of
data, system failure, or disaster.
 To perform the expansion/addition of storage in case of volume full threshold
breach
II. SCOPE OF THIS PROCEDURE
 This Procedure applies to entire ETIS Storage Operations team involved in the
processes and activities documented therein. For questions regarding the scope
of this Procedure, always consult the Document Owner.
 This policy applies to all legacy and servers and storage in the new data centers
located across all Ocwen Backup Infrastructure.
 This Procedure applies to all Ocwen personnel and contractors involved in the
processes and activities documented therein. For questions regarding the scope
of this Procedure, always consult the Document Group Owner.
III.ROLES AND RESPONSIBILITIES
The Storage and Backup Team implements, maintains and administers this Procedure. Senior
management of each affected department or Business Unit (“BU”) is responsible for enforcing the
standards and practices under this Procedure, including communicating compliance
expectations, throughout the BU. Whenapplicable, Corporate Compliance oversees and monitors
adherence to the requirements set in this Procedure. For questions regarding the responsibilities
for this Procedure, always consult the Document Owner.
IV. DOCUMENT PROCEDURE
This document outlines the standard expectation regarding Storage Standard process of
systems updates.
NetAPP Volume Full , v1
APPROVED: 08/22/2015
APPROVED By:
REFERENCE #: 6998
Tier 4 Procedure Page 4 of 7 Next Review: No Review Date
Printed versions are for reference only. Please refer to the electronic copy for the latest version.
V. DESCRIPTION OFUSES
Storage & Backup Team resources use this document to train employees to the expected
conduct in the listed situations.
VI. PROCEDURE OWNER ANDPARTICIPANTS
OWNER: Storage and Backup Team
PARTICIPANTS: Storage and Backup Team
VII.PROCESS WORK FLOW
This section is mandatory and contains the procedure to perform when the volume/s gets full that
is crosses 95%. The trigger can be an email alert or real time monitoring.
SSH Command Line
1) Login to filer and run filer>df –g to see the volume space
2) Login to Unisphere, search for specific volume and see growth trend
3) Validate if vol is being replicated
TXIRVNAPSTG01::> snapmirror show <vol_name>
4) Validate if room in aggregate where vol is
GAATLNAPSTG01::> vol show <volume name>
GAATLNAPSTG01::> aggr show -aggregate <Aggr name> -fields size,percent-
used,usedsize
5) Increase vol by 5%
GAATLNAPSTG01::> vol modify -vserver <Vserver name> -volume <volume
name> -size Total GB
If vol is being replicated, performon the DR vol first
Note: If the volume size to be increased is not more than 300 GB (increment up to 300 GB),
there is no formal approval required. However, we need to have an incident opened in SNOW.
NetAPP Volume Full , v1
APPROVED: 08/22/2015
APPROVED By:
REFERENCE #: 6998
Tier 4 Procedure Page 5 of 7 Next Review: No Review Date
Printed versions are for reference only. Please refer to the electronic copy for the latest version.
CHANGE RECORD
Date Author Version Change Reference
12/17/2018 Nitanjali Paul 2
Sachin Prabhugaonkar 1
REVIEWERS
Date Name Position
MM/DD/YYYY Prashant Acharya Sr. Manager
DISTRIBUTION
No Name Location
1
2
APPROVERS
Date Name Version Sign Off
NetAPP Volume Full , v1
APPROVED: 08/22/2015
APPROVED By:
REFERENCE #: 6998
Tier 4 Procedure Page 6 of 7 Next Review: No Review Date
Printed versions are for reference only. Please refer to the electronic copy for the latest version.
Ocwen Procedures Template (Tier4), v1
APPROVED: 08/22/2015
APPROVED BY: Risk Management Control Director
REFERENCE #: 6998
PROPERTIESSUMMARY
ORIGINAL CREATION DATE: 08/18/20157
APPROVAL DATE: Not Approved Yet
SUPERSEDES: Not Set
LAST REVIEW DATE: No Review Date
NEXT REVIEW DATE: No Review Date
LAST MODIFIED DATE: 08/27/20158
DEPARTMENT(S): Storage and Backup
BUSINESS UNIT:
DOCUMENT TYPE: Process and ProcedureTier 4 Procedure
KEYWORDS: Not Set
CUSTOM MARKERS: Subcategories of Custom Markers not selected.
Tier 4 Procedure Page 7 of 7 Next Review: No Review Date
Printed versions are for reference only. Please refer to the electronic copy for the latest version.

Contenu connexe

Similaire à Infrastructure_Storage_Volume_Full.docx

Design and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk IntegrationDesign and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk IntegrationMary Joy Sabal
 
Quick guide to plan and execute a load test
Quick guide to plan and execute a load testQuick guide to plan and execute a load test
Quick guide to plan and execute a load testduke.kalra
 
P6 Team Member – Implementation Stories
P6 Team Member – Implementation StoriesP6 Team Member – Implementation Stories
P6 Team Member – Implementation StoriesLuka Novosel, M.EE, PMP
 
Agile Project Management Procedures
Agile Project Management ProceduresAgile Project Management Procedures
Agile Project Management ProceduresGlen Alleman
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1waqar younas
 
Performance Testing using LoadRunner
Performance Testing using LoadRunnerPerformance Testing using LoadRunner
Performance Testing using LoadRunnerKumar Gupta
 
Incident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsIncident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsEdward Paul Pagsanhan
 
My Project on Rational Performance Testing
My Project on Rational Performance TestingMy Project on Rational Performance Testing
My Project on Rational Performance TestingGanesh Pachankar
 
NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITILmbmobile
 
On-Demand Image Resizing Extended - External Meet-up
On-Demand Image Resizing Extended - External Meet-upOn-Demand Image Resizing Extended - External Meet-up
On-Demand Image Resizing Extended - External Meet-upJonathan Lee
 
Vnv kumar performance testing
Vnv kumar performance testingVnv kumar performance testing
Vnv kumar performance testingVinay Kumar
 
Training Webinar: Detect Performance Bottlenecks of Applications
Training Webinar: Detect Performance Bottlenecks of ApplicationsTraining Webinar: Detect Performance Bottlenecks of Applications
Training Webinar: Detect Performance Bottlenecks of ApplicationsOutSystems
 
Refresh your project vision with Report Portal
Refresh your project vision with Report PortalRefresh your project vision with Report Portal
Refresh your project vision with Report PortalCOMAQA.BY
 
Early watch report
Early watch reportEarly watch report
Early watch reportcecileekove
 
Have you been stalking your servers?
Have you been stalking your servers?Have you been stalking your servers?
Have you been stalking your servers?Martin Marji Cermak
 

Similaire à Infrastructure_Storage_Volume_Full.docx (20)

Design and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk IntegrationDesign and Implementation Anypoint Platform Audit Logs Splunk Integration
Design and Implementation Anypoint Platform Audit Logs Splunk Integration
 
leucht_http2
leucht_http2leucht_http2
leucht_http2
 
load_testing.ppt.pptx
load_testing.ppt.pptxload_testing.ppt.pptx
load_testing.ppt.pptx
 
Quick guide to plan and execute a load test
Quick guide to plan and execute a load testQuick guide to plan and execute a load test
Quick guide to plan and execute a load test
 
P6 Team Member – Implementation Stories
P6 Team Member – Implementation StoriesP6 Team Member – Implementation Stories
P6 Team Member – Implementation Stories
 
Agile Project Management Procedures
Agile Project Management ProceduresAgile Project Management Procedures
Agile Project Management Procedures
 
FINAL PROJECT REPORT1
FINAL PROJECT REPORT1FINAL PROJECT REPORT1
FINAL PROJECT REPORT1
 
Performance Testing using LoadRunner
Performance Testing using LoadRunnerPerformance Testing using LoadRunner
Performance Testing using LoadRunner
 
Lec-9.ppt
Lec-9.pptLec-9.ppt
Lec-9.ppt
 
White Paper_RIAB
White Paper_RIABWhite Paper_RIAB
White Paper_RIAB
 
Incident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand StandardsIncident Mgmt Process Guideand Standards
Incident Mgmt Process Guideand Standards
 
My Project on Rational Performance Testing
My Project on Rational Performance TestingMy Project on Rational Performance Testing
My Project on Rational Performance Testing
 
NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITIL
 
On-Demand Image Resizing Extended - External Meet-up
On-Demand Image Resizing Extended - External Meet-upOn-Demand Image Resizing Extended - External Meet-up
On-Demand Image Resizing Extended - External Meet-up
 
Vnv kumar performance testing
Vnv kumar performance testingVnv kumar performance testing
Vnv kumar performance testing
 
Training Webinar: Detect Performance Bottlenecks of Applications
Training Webinar: Detect Performance Bottlenecks of ApplicationsTraining Webinar: Detect Performance Bottlenecks of Applications
Training Webinar: Detect Performance Bottlenecks of Applications
 
Upgrade_Planning-R13-enterprise.pdf
Upgrade_Planning-R13-enterprise.pdfUpgrade_Planning-R13-enterprise.pdf
Upgrade_Planning-R13-enterprise.pdf
 
Refresh your project vision with Report Portal
Refresh your project vision with Report PortalRefresh your project vision with Report Portal
Refresh your project vision with Report Portal
 
Early watch report
Early watch reportEarly watch report
Early watch report
 
Have you been stalking your servers?
Have you been stalking your servers?Have you been stalking your servers?
Have you been stalking your servers?
 

Plus de ssuser2dbaee

AZ900-AzureFundamentals-part-11.pdf
AZ900-AzureFundamentals-part-11.pdfAZ900-AzureFundamentals-part-11.pdf
AZ900-AzureFundamentals-part-11.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-5.pdf
AZ900-AzureFundamentals-part-5.pdfAZ900-AzureFundamentals-part-5.pdf
AZ900-AzureFundamentals-part-5.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-7.pdf
AZ900-AzureFundamentals-part-7.pdfAZ900-AzureFundamentals-part-7.pdf
AZ900-AzureFundamentals-part-7.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-8.pdf
AZ900-AzureFundamentals-part-8.pdfAZ900-AzureFundamentals-part-8.pdf
AZ900-AzureFundamentals-part-8.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-6.pdf
AZ900-AzureFundamentals-part-6.pdfAZ900-AzureFundamentals-part-6.pdf
AZ900-AzureFundamentals-part-6.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-2.pdf
AZ900-AzureFundamentals-part-2.pdfAZ900-AzureFundamentals-part-2.pdf
AZ900-AzureFundamentals-part-2.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-9.pdf
AZ900-AzureFundamentals-part-9.pdfAZ900-AzureFundamentals-part-9.pdf
AZ900-AzureFundamentals-part-9.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-3.pdf
AZ900-AzureFundamentals-part-3.pdfAZ900-AzureFundamentals-part-3.pdf
AZ900-AzureFundamentals-part-3.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-10.pdf
AZ900-AzureFundamentals-part-10.pdfAZ900-AzureFundamentals-part-10.pdf
AZ900-AzureFundamentals-part-10.pdfssuser2dbaee
 
AZ900-AzureFundamentals-part-4.pdf
AZ900-AzureFundamentals-part-4.pdfAZ900-AzureFundamentals-part-4.pdf
AZ900-AzureFundamentals-part-4.pdfssuser2dbaee
 
NetApp CIFS Audit.docx
NetApp CIFS Audit.docxNetApp CIFS Audit.docx
NetApp CIFS Audit.docxssuser2dbaee
 
Netapp_Aggregates.docx
Netapp_Aggregates.docxNetapp_Aggregates.docx
Netapp_Aggregates.docxssuser2dbaee
 

Plus de ssuser2dbaee (12)

AZ900-AzureFundamentals-part-11.pdf
AZ900-AzureFundamentals-part-11.pdfAZ900-AzureFundamentals-part-11.pdf
AZ900-AzureFundamentals-part-11.pdf
 
AZ900-AzureFundamentals-part-5.pdf
AZ900-AzureFundamentals-part-5.pdfAZ900-AzureFundamentals-part-5.pdf
AZ900-AzureFundamentals-part-5.pdf
 
AZ900-AzureFundamentals-part-7.pdf
AZ900-AzureFundamentals-part-7.pdfAZ900-AzureFundamentals-part-7.pdf
AZ900-AzureFundamentals-part-7.pdf
 
AZ900-AzureFundamentals-part-8.pdf
AZ900-AzureFundamentals-part-8.pdfAZ900-AzureFundamentals-part-8.pdf
AZ900-AzureFundamentals-part-8.pdf
 
AZ900-AzureFundamentals-part-6.pdf
AZ900-AzureFundamentals-part-6.pdfAZ900-AzureFundamentals-part-6.pdf
AZ900-AzureFundamentals-part-6.pdf
 
AZ900-AzureFundamentals-part-2.pdf
AZ900-AzureFundamentals-part-2.pdfAZ900-AzureFundamentals-part-2.pdf
AZ900-AzureFundamentals-part-2.pdf
 
AZ900-AzureFundamentals-part-9.pdf
AZ900-AzureFundamentals-part-9.pdfAZ900-AzureFundamentals-part-9.pdf
AZ900-AzureFundamentals-part-9.pdf
 
AZ900-AzureFundamentals-part-3.pdf
AZ900-AzureFundamentals-part-3.pdfAZ900-AzureFundamentals-part-3.pdf
AZ900-AzureFundamentals-part-3.pdf
 
AZ900-AzureFundamentals-part-10.pdf
AZ900-AzureFundamentals-part-10.pdfAZ900-AzureFundamentals-part-10.pdf
AZ900-AzureFundamentals-part-10.pdf
 
AZ900-AzureFundamentals-part-4.pdf
AZ900-AzureFundamentals-part-4.pdfAZ900-AzureFundamentals-part-4.pdf
AZ900-AzureFundamentals-part-4.pdf
 
NetApp CIFS Audit.docx
NetApp CIFS Audit.docxNetApp CIFS Audit.docx
NetApp CIFS Audit.docx
 
Netapp_Aggregates.docx
Netapp_Aggregates.docxNetapp_Aggregates.docx
Netapp_Aggregates.docx
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Infrastructure_Storage_Volume_Full.docx

  • 1. Ocwen Financial Corporation Netapp Volume Full Version 1 Document Owner: ETIS Storage & Backup Support Team Approved: Approved by: Reference #: Tier 4 Procedure Page 1 of 7 Next Review: No Review Date Printed versions are for reference only. Please refer to the electronic copy for the latest version.
  • 2. NetAPP Volume Full , v1 APPROVED: 08/22/2015 APPROVED By: REFERENCE #: 6998 Tier 4 Procedure Page 2 of 7 Next Review: No Review Date Printed versions are for reference only. Please refer to the electronic copy for the latest version. TABLE OF CONTENTS I. PURPOSE OF THIS PROCEDURE.........................................................................3 II. SCOPE OF THIS PROCEDURE……………………………………………………. 3 III.ROLES AND RESPONSIBILITIES…………………………………………………..3 IV. DOCUMENTPROCEDURE…………………………………………………………….4 V. DESCRIPTION OFUSES………………………………………………………………4 VI. PROCEDURE OWNER AND PARTICIPANT……………………………………4 VII.PROCESS WORK FLOW……………………………………………………………4
  • 3. NetAPP Volume Full , v1 APPROVED: 08/22/2015 APPROVED By: REFERENCE #: 6998 Tier 4 Procedure Page 3 of 7 Next Review: No Review Date Printed versions are for reference only. Please refer to the electronic copy for the latest version. I. PURPOSE OFTHIS PROCEDURE The purpose of this policy is as follows:  To safeguard the information assets of Ocwen  To prevent the loss of data in the case of an accidental deletion or corruption of data, system failure, or disaster.  To perform the expansion/addition of storage in case of volume full threshold breach II. SCOPE OF THIS PROCEDURE  This Procedure applies to entire ETIS Storage Operations team involved in the processes and activities documented therein. For questions regarding the scope of this Procedure, always consult the Document Owner.  This policy applies to all legacy and servers and storage in the new data centers located across all Ocwen Backup Infrastructure.  This Procedure applies to all Ocwen personnel and contractors involved in the processes and activities documented therein. For questions regarding the scope of this Procedure, always consult the Document Group Owner. III.ROLES AND RESPONSIBILITIES The Storage and Backup Team implements, maintains and administers this Procedure. Senior management of each affected department or Business Unit (“BU”) is responsible for enforcing the standards and practices under this Procedure, including communicating compliance expectations, throughout the BU. Whenapplicable, Corporate Compliance oversees and monitors adherence to the requirements set in this Procedure. For questions regarding the responsibilities for this Procedure, always consult the Document Owner. IV. DOCUMENT PROCEDURE This document outlines the standard expectation regarding Storage Standard process of systems updates.
  • 4. NetAPP Volume Full , v1 APPROVED: 08/22/2015 APPROVED By: REFERENCE #: 6998 Tier 4 Procedure Page 4 of 7 Next Review: No Review Date Printed versions are for reference only. Please refer to the electronic copy for the latest version. V. DESCRIPTION OFUSES Storage & Backup Team resources use this document to train employees to the expected conduct in the listed situations. VI. PROCEDURE OWNER ANDPARTICIPANTS OWNER: Storage and Backup Team PARTICIPANTS: Storage and Backup Team VII.PROCESS WORK FLOW This section is mandatory and contains the procedure to perform when the volume/s gets full that is crosses 95%. The trigger can be an email alert or real time monitoring. SSH Command Line 1) Login to filer and run filer>df –g to see the volume space 2) Login to Unisphere, search for specific volume and see growth trend 3) Validate if vol is being replicated TXIRVNAPSTG01::> snapmirror show <vol_name> 4) Validate if room in aggregate where vol is GAATLNAPSTG01::> vol show <volume name> GAATLNAPSTG01::> aggr show -aggregate <Aggr name> -fields size,percent- used,usedsize 5) Increase vol by 5% GAATLNAPSTG01::> vol modify -vserver <Vserver name> -volume <volume name> -size Total GB If vol is being replicated, performon the DR vol first Note: If the volume size to be increased is not more than 300 GB (increment up to 300 GB), there is no formal approval required. However, we need to have an incident opened in SNOW.
  • 5. NetAPP Volume Full , v1 APPROVED: 08/22/2015 APPROVED By: REFERENCE #: 6998 Tier 4 Procedure Page 5 of 7 Next Review: No Review Date Printed versions are for reference only. Please refer to the electronic copy for the latest version. CHANGE RECORD Date Author Version Change Reference 12/17/2018 Nitanjali Paul 2 Sachin Prabhugaonkar 1 REVIEWERS Date Name Position MM/DD/YYYY Prashant Acharya Sr. Manager DISTRIBUTION No Name Location 1 2 APPROVERS Date Name Version Sign Off
  • 6. NetAPP Volume Full , v1 APPROVED: 08/22/2015 APPROVED By: REFERENCE #: 6998 Tier 4 Procedure Page 6 of 7 Next Review: No Review Date Printed versions are for reference only. Please refer to the electronic copy for the latest version.
  • 7. Ocwen Procedures Template (Tier4), v1 APPROVED: 08/22/2015 APPROVED BY: Risk Management Control Director REFERENCE #: 6998 PROPERTIESSUMMARY ORIGINAL CREATION DATE: 08/18/20157 APPROVAL DATE: Not Approved Yet SUPERSEDES: Not Set LAST REVIEW DATE: No Review Date NEXT REVIEW DATE: No Review Date LAST MODIFIED DATE: 08/27/20158 DEPARTMENT(S): Storage and Backup BUSINESS UNIT: DOCUMENT TYPE: Process and ProcedureTier 4 Procedure KEYWORDS: Not Set CUSTOM MARKERS: Subcategories of Custom Markers not selected. Tier 4 Procedure Page 7 of 7 Next Review: No Review Date Printed versions are for reference only. Please refer to the electronic copy for the latest version.