Step-by-Step Guide to NAS (NFS) Failover over a LAN (with unicast) Supported ...open-e
The document provides step-by-step instructions for configuring NAS (NFS) failover over a LAN using Open-E DSS. It describes setting up two servers with mirrored volumes, so that if the primary server fails, operations can fail over to the secondary server. The steps include 1) configuring the network interfaces and bonding on each server, 2) creating mirrored volumes and configuring replication on the primary and secondary servers, and 3) enabling NFS and sharing the volume to allow access from clients. This configuration provides data redundancy and high availability over a local network.
The document provides instructions for backing up data from a DSS V6 server to an attached tape library. The 4-step process includes: 1) configuring hardware and logical volumes, 2) creating NAS shares and snapshots, 3) configuring backup tasks and schedules to alternate between tape pools on odd and even weeks, and 4) setting up a restore task to recover data from backup tapes. When completed, the backup and restore processes are automated to run on a weekly schedule and maintain multiple versions of backed up data on tapes.
Open-E DSS Synchronous Volume Replication over a WANopen-e
This document provides a step-by-step guide to setting up synchronous volume replication over a WAN between two systems using Open-E DSS. It requires configuring hardware including two servers connected over a WAN. It then outlines 6 steps to set up the replication including 1) hardware configuration, 2) configuring DSS servers on the WAN, 3) configuring the destination node, 4) configuring the source node, 5) creating the replication task, and 6) checking replication status. Diagrams and explanations of each step in the configuration process are provided.
Open-E DSS V6 How to Setup iSCSI Failover with XenServeropen-e
The document provides instructions for setting up DSS V6 iSCSI failover with XenServer using multipath, which includes configuring hardware settings and IP addresses on both nodes, creating volumes and targets on the primary and secondary nodes, setting up volume replication between the nodes, and configuring multipath on the XenServer storage client. Key steps are configuring the secondary node as the replication destination, then the primary node as the replication source, and setting up iSCSI failover and a virtual IP for the replicated volume.
Improve Parts Claim Acceptance Performance at Store 41 (Trakindo Makassar Bra...Raden Darma
This is my second project assignment at PT. Trakindo Utama Makassar Branch. Purpose of this project is to improve parts claim acceptance KPI’s at store 41 (Makassar Branch) to increase the value of claim accepted and credit value of PRA from Caterpillar
Step-by-Step Guide to NAS (NFS) Failover over a LAN (with unicast) Supported ...open-e
The document provides step-by-step instructions for configuring NAS (NFS) failover over a LAN using Open-E DSS. It describes setting up two servers with mirrored volumes, so that if the primary server fails, operations can fail over to the secondary server. The steps include 1) configuring the network interfaces and bonding on each server, 2) creating mirrored volumes and configuring replication on the primary and secondary servers, and 3) enabling NFS and sharing the volume to allow access from clients. This configuration provides data redundancy and high availability over a local network.
The document provides instructions for backing up data from a DSS V6 server to an attached tape library. The 4-step process includes: 1) configuring hardware and logical volumes, 2) creating NAS shares and snapshots, 3) configuring backup tasks and schedules to alternate between tape pools on odd and even weeks, and 4) setting up a restore task to recover data from backup tapes. When completed, the backup and restore processes are automated to run on a weekly schedule and maintain multiple versions of backed up data on tapes.
Open-E DSS Synchronous Volume Replication over a WANopen-e
This document provides a step-by-step guide to setting up synchronous volume replication over a WAN between two systems using Open-E DSS. It requires configuring hardware including two servers connected over a WAN. It then outlines 6 steps to set up the replication including 1) hardware configuration, 2) configuring DSS servers on the WAN, 3) configuring the destination node, 4) configuring the source node, 5) creating the replication task, and 6) checking replication status. Diagrams and explanations of each step in the configuration process are provided.
Open-E DSS V6 How to Setup iSCSI Failover with XenServeropen-e
The document provides instructions for setting up DSS V6 iSCSI failover with XenServer using multipath, which includes configuring hardware settings and IP addresses on both nodes, creating volumes and targets on the primary and secondary nodes, setting up volume replication between the nodes, and configuring multipath on the XenServer storage client. Key steps are configuring the secondary node as the replication destination, then the primary node as the replication source, and setting up iSCSI failover and a virtual IP for the replicated volume.
Improve Parts Claim Acceptance Performance at Store 41 (Trakindo Makassar Bra...Raden Darma
This is my second project assignment at PT. Trakindo Utama Makassar Branch. Purpose of this project is to improve parts claim acceptance KPI’s at store 41 (Makassar Branch) to increase the value of claim accepted and credit value of PRA from Caterpillar
Open-E DSS V7 Synchronous Volume Replication over a LANopen-e
The document provides step-by-step instructions for setting up synchronous volume replication between two Open-E DSS servers over a local area network. It involves configuring hardware, networking, creating logical volumes on the source and destination nodes, setting up replication between the volumes, and creating a replication task to synchronize data from the source to destination volume. The status of replication can be monitored by checking the replication tasks in the DSS management interface.
This document provides a step-by-step guide for setting up active-passive iSCSI failover between two Open-E DSS V7 nodes (node-a and node-b). The steps include: 1) configuring the hardware and network settings for each node; 2) creating volume groups and iSCSI volumes for data replication on each node; 3) configuring volume replication between the nodes; 4) creating iSCSI targets on each node; 5) configuring failover settings; and 6) testing the failover functionality. Key aspects involve replicating iSCSI volumes from the active node-a to the passive node-b, and configuring virtual IP addresses and targets on each node for seamless failover
The document provides step-by-step instructions for setting up an active-active load balanced iSCSI high availability cluster without bonding between two Open-E DSS V7 nodes (node-a and node-b). The key steps include:
1. Configuring the hardware for each node including network interfaces and IP addresses.
2. Configuring volumes, volume replication between each node's volumes to enable data synchronization, and starting the replication tasks.
3. Creating iSCSI targets on each node to expose the replicated volumes and enable failover.
This document provides steps to configure multipath I/O (MPIO) on an Open-E DSS V6 system with VMware ESXi 4.x and a Windows 2008 virtual machine. It requires two network cards in both systems connected to a switch. The steps include configuring the DSS V6 as an iSCSI target with two IP addresses, creating two vmkernel ports on the ESXi host connected to different network cards, adding the DSS as two iSCSI targets, enabling round robin path selection, and installing the Windows VM to test I/O performance using Iometer.
The document provides information on how snapshots work in Open-E software. Snapshots allow creating an exact copy of a logical volume at a point in time, while the original data continues to be available. The snapshot is implemented using copy-on-write, where changed blocks are copied to reserved space before being overwritten. This allows mounting snapshots read-only to access past versions of data. The document discusses snapshot configuration, advantages like non-disruptive backups, and disadvantages like decreased write speeds with many active snapshots.
The document provides instructions for setting up a backup from a DSS V6 data server to an attached tape drive. The key steps include: 1) Configuring hardware and volume groups, 2) Creating NAS volumes and snapshots, 3) Configuring the backup to use the tape drive by defining pools, tasks, and schedules, and 4) Performing backups that store data from network shares on labeled tapes according to the defined configuration.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Open-E DSS V7 Synchronous Volume Replication over a LANopen-e
The document provides step-by-step instructions for setting up synchronous volume replication between two Open-E DSS servers over a local area network. It involves configuring hardware, networking, creating logical volumes on the source and destination nodes, setting up replication between the volumes, and creating a replication task to synchronize data from the source to destination volume. The status of replication can be monitored by checking the replication tasks in the DSS management interface.
This document provides a step-by-step guide for setting up active-passive iSCSI failover between two Open-E DSS V7 nodes (node-a and node-b). The steps include: 1) configuring the hardware and network settings for each node; 2) creating volume groups and iSCSI volumes for data replication on each node; 3) configuring volume replication between the nodes; 4) creating iSCSI targets on each node; 5) configuring failover settings; and 6) testing the failover functionality. Key aspects involve replicating iSCSI volumes from the active node-a to the passive node-b, and configuring virtual IP addresses and targets on each node for seamless failover
The document provides step-by-step instructions for setting up an active-active load balanced iSCSI high availability cluster without bonding between two Open-E DSS V7 nodes (node-a and node-b). The key steps include:
1. Configuring the hardware for each node including network interfaces and IP addresses.
2. Configuring volumes, volume replication between each node's volumes to enable data synchronization, and starting the replication tasks.
3. Creating iSCSI targets on each node to expose the replicated volumes and enable failover.
This document provides steps to configure multipath I/O (MPIO) on an Open-E DSS V6 system with VMware ESXi 4.x and a Windows 2008 virtual machine. It requires two network cards in both systems connected to a switch. The steps include configuring the DSS V6 as an iSCSI target with two IP addresses, creating two vmkernel ports on the ESXi host connected to different network cards, adding the DSS as two iSCSI targets, enabling round robin path selection, and installing the Windows VM to test I/O performance using Iometer.
The document provides information on how snapshots work in Open-E software. Snapshots allow creating an exact copy of a logical volume at a point in time, while the original data continues to be available. The snapshot is implemented using copy-on-write, where changed blocks are copied to reserved space before being overwritten. This allows mounting snapshots read-only to access past versions of data. The document discusses snapshot configuration, advantages like non-disruptive backups, and disadvantages like decreased write speeds with many active snapshots.
The document provides instructions for setting up a backup from a DSS V6 data server to an attached tape drive. The key steps include: 1) Configuring hardware and volume groups, 2) Creating NAS volumes and snapshots, 3) Configuring the backup to use the tape drive by defining pools, tasks, and schedules, and 4) Performing backups that store data from network shares on labeled tapes according to the defined configuration.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
National Security Agency - NSA mobile device best practices
Multipath with Virtual Iron and Open-E DSS V6
1. Multipath with
Virtual Iron and
Open-E ® DSS V6
Configured and verified by Massimo Strina,
Share Distribuzione SRL (Italy)
Software Version: DSS ver. 6.00 up50
Presentation updated: July 2010
2. Multipath with Virtual Iron and Data Storage Server
TO SET UP MULTIPATH WITH VIRTUAL IRON AND OPEN-E
DSS, PERFORM THE FOLLOWING STEPS:
1. Hardware Configuration
2. Automatic Failover Configuration on the both Data Storage Servers
3. Edit multipath.conf file
4. Edit iscsi.conf file
5. iSCSI and Ethernet Tunning
6. Starting up Node Servers
7. Edit iscsi_portal_list.xml and network_config_directives.xml files
8. Starting Automatic Failover end restart Virtual Center Nodes
www.open-e.com 2
3. Multipath with Virtual Iron and Data Storage Server
1. Hardware Configuration
Virtual Center
Public LAN
Node 1 Node 2
Switch GbE Switch GbE
iSCSI
Failover/Volume
Replication
www.open-e.com 3
4. Multipath with Virtual Iron and Data Storage Server
2. Automatic Failover Configuration on the both Data Storage Servers
Configuration of the Secondary Server
• Create a Volume Group and iSCSI Volume
• Set Volume Replication mode as destination mode and set mirror IP address
Configuration of the Primary Server
• Create a Volume Group and iSCSI Volume
• Set Volume Replication mode as source mode and settings mirror IP address,
• Create Volume Replication task and start the replication task.
Create new target on Secondary Server
Create new target on Primary Server
Configure Auxiliary connections and set Virtual IP for all Port . For example:
• 172.16.0.1
• 172.16.1.1
• 172.16.2.1
• 172.16.3.1
NOTE:
In this moment do not start Automatic Failover!
Detailed describes of Automatic Failover Configuration please find in product presentation:
Synchronous Volume Replication with Failover over a LAN with broadcast.pdf
www.open-e.com 4
5. Multipath with Virtual Iron and Data Storage Server
3. Edit multipath.conf file
• Open folder C:Program FileVirtualIronVirtualizationManagerbootfilesboottemplates
• Edit multipath.conf and uncomment the following line:
selector "round-robin 0"
• Then insert multipath device definition for DSS:
#
#
# SHARE OpenStor powered by OPEN-E :: Active-Active
# Verified @ Massimo Strina, Share Distribuzione SRL (Italy)
#
device
{
vendor "iSCSI"
product "*"
path_grouping_policy multibus
path_checker tur
features "1 queue_if_no_path"
failback immediate
rr_min_io 100
}
www.open-e.com 5
6. Multipath with Virtual Iron and Data Storage Server
3. …Continue
• Next, paste under device section after "ATA" vendor following script:
devices {
# Local non-SCSI drives (SATA and IDE) need a code page 0x80 to include the
# serial number in the uid, otherwise duplicate model drives won't be unique.
device {
vendor "ATA*"
product "*"
getuid_callout "/sbin/vi_scsi_id --scsi_id_args -p 0x80 -g -u -s /block/%n"
}
# SHARE OpenStor powered by OPEN-E :: Active-Active
# Verified @ Massimo Strina, Share Distribuzione SRL (Italy)
device {
vendor "iSCSI"
product "*"
path_grouping_policy multibus
path_checker tur
features "1 queue_if_no_path"
failback immediate
rr_min_io 100
}
# Adaptec RAID controller
• Save multipath.conf file.
www.open-e.com 6
7. Multipath with Virtual Iron and Data Storage Server
4. Edit iscsi.conf file
• Edit iscsid.conf file and modify the parameters as follow:
node.session.iscsi.FirstBurstLength = 524288
node.session.iscsi.MaxBurstLength = 16776192
node.conn[0].iscsi.MaxRecvDataSegmentLength = 262144
discovery.sendtargets.iscsi.MaxRecvDataSegmentLength = 262144
• Save iscsid.conf
www.open-e.com 7
8. Multipath with Virtual Iron and Data Storage Server
5. iSCSI and Ethernet Tunning
• On the DSS console press hot-hey ctrl-alt-w then select Tuning Options -> iSCSI deamon option -> Target
option -> (for all targets):
MaxRecvDataSegmentLength = 262144
MaxBurstLength = 16776192
MaxXmitDataSegmentLength = 262144
FirstBurstLength = 524288
InitialR2T = No
ImmediateData = Yes
• Then go to Hardware Configuration Menu -> Tuning options ->Jumbo Frames config
• Please set Jumbo Frames value to 4200 for all ports.
NOTE:
4200 is optimized for this example system. Some other Switches can work better with Jumbo Frame set to
6000 or 9000.
www.open-e.com 8
9. Multipath with Virtual Iron and Data Storage Server
6. Starting up Node Servers
• Start up both node servers when discovery is complete, create iSCSI Network in Resource Center ->
Network Tab,
• Assign ONLY the first Ethernet port of both nodes and configure IP as follow:
172.16.0.2 for node 1
172.16.0.3 for node 2
• The Virtual Iron wizard step ask you to configure target and you must put ONLY the IP of the first port
of the storage (first virtual IP) as follow:
172.16.0.1
• After this both nodes prompts Yellow Warning state and request reboot.
NOTE:
Do not reboot nodes !
www.open-e.com 9
10. Multipath with Virtual Iron and Data Storage Server
7. Edit iscsi_portal_list.xml and network_config_directives.xml files.
• Open folder C:Program FileVirtualIronVirtualizationManagerbootfilesboot and you can find 2 new
directories named with Mac address of both nodes,
• Open the first folder named for example 00-30-48-66-CE-6E,
• Edit iscsi_portal_list.xml file, you will find this configuration:
<?xml version="1.0" encoding="UTF-8"?>
<ISCSIportalList>
<ISCSIportal>172.16.0.1:3260</ISCSIportal>
</ISCSIportalList>
• Please add following lines:
<?xml version="1.0" encoding="UTF-8"?>
<ISCSIportalList>
<ISCSIportal>172.16.0.1:3260</ISCSIportal>
<ISCSIportal>172.16.1.1:3260</ISCSIportal>
<ISCSIportal>172.16.2.1:3260</ISCSIportal>
<ISCSIportal>172.16.3.1:3260</ISCSIportal>
</ISCSIportalList>
• Edit the network_config_directives.xml file,
• You will find this configuration:
<?xml version="1.0" encoding="UTF-8"?>
<NetworkCfgDirectives>
<CfgNICmtu>00:15:17:63:75:A5|4200</CfgNICmtu>
<CfgNICstatic>
<Interface>00:15:17:63:75:A5</Interface>
<StaticIP>172.16.0.2</StaticIP>
<StaticIPmask>255.255.255.0</StaticIPmask>
</CfgNICstatic>
</NetworkCfgDirectives>
www.open-e.com 10
11. Multipath with Virtual Iron and Data Storage Server
7. …Continue
• Copy the section from <CfgNICmtu> to </CfgNICstatic> and paste it 3 times,
• Then modify MAC address and IP addres accordingly.
• You will find the Mac address in Virtual Center -> Hardware -> Managed Nodes -> Specific Node ->
Ethernet Port.
<?xml version="1.0" encoding="UTF-8"?>
<NetworkCfgDirectives>
<CfgNICmtu>00:15:17:63:75:A5|4200</CfgNICmtu>
<CfgNICstatic>
<Interface>00:15:17:63:75:A5</Interface>
<StaticIP>172.16.0.2</StaticIP>
<StaticIPmask>255.255.255.0</StaticIPmask>
</CfgNICstatic>
<CfgNICmtu>00:15:17:63:75:A4|4200</CfgNICmtu>
<CfgNICstatic>
<Interface>00:15:17:63:75:A4</Interface>
<StaticIP>172.16.1.2</StaticIP>
<StaticIPmask>255.255.255.0</StaticIPmask>
</CfgNICstatic>
<CfgNICmtu>00:15:17:63:75:A7|4200</CfgNICmtu>
<CfgNICstatic>
<Interface>00:15:17:63:75:A7</Interface>
<StaticIP>172.16.2.2</StaticIP>
<StaticIPmask>255.255.255.0</StaticIPmask>
</CfgNICstatic>
<CfgNICmtu>00:15:17:63:75:A6|4200</CfgNICmtu>
<CfgNICstatic>
<Interface>00:15:17:63:75:A6</Interface>
<StaticIP>172.16.3.2</StaticIP>
<StaticIPmask>255.255.255.0</StaticIPmask>
</CfgNICstatic>
</NetworkCfgDirectives>
www.open-e.com 11
12. Multipath with Virtual Iron and Data Storage Server
7. …Continue
• Now , open the second folder named with second node MAC address name under
C:Program FileVirtualIronVirtualizationManagerbootfilesboot
and repeat the above procedure accordingly.
8. Starting Automatic Failover end restart Virtual Center Nodes
• On the WEB console Data Storage Server, choose „SETUP” and network from the menu, and select
iSCSI Failover
• Next, in the Failover manager function, click on „start” button to start the Automatic Failover on the
Primary Data Storage Server
• In Virtual Center Restart Nodes.
The configuration Multipath with Virtual Iron and Data Storage Server is now complete.
www.open-e.com 12