10. Copyright 1
• The contents of this course and all its modules and related materials, including handouts to audience members,
are Copyright O 2011 Red Hat, Inc.
• No part of this publication may be stored in a retrieval system, transmitted or reproduced in any way, including,
but not limited to, photocopy, photograph, magnetic, electronic or other record, without the prior written
permission of Red Hat, Inc.
• This instructional program, including all material provided herein, is supplied without any guarantees from
Red Hat, Inc. Red Hat, Inc. assumes no liability for damages or legal action arising from the use or misuse of
contents or details contained herein.
• If you believe Red Hat training materials are being used, copied, or otherwise improperly distributed please
email training@redhat.com or phone toll-free (USA) +1 866 626 2994 or +1 919 754 3700.
For use only by a student enrolled in a Red Hat training course taught by Red Hat, Inc. or a Red HM Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior mitren consent of Red HM, Inc. ff you believe Red HM training materiats are being improperly used,
copied, or distributed pisase email <trainingeredhat. coa, or phone toll-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright @ 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 216f53f8
13. Red Hat Enterprise Linux Variants 4
• Red Hat Enterprise Linux Advanced Platform
• Unlimited server size and virtualization support
• HA clusters and cluster file system
• Red Hat Enterprise Linux
Basic server solution for smaller non-mission-critical servers
• Virtualization support included
• Red Hat Enterprise Linux Desktop
• Productivity desktop environment
• Workstation option adds tools for software and network service development
• Multi-OS option for virtualization
Currently, on the x86 and x86-64 architectures, the product family includes:
Red Hat Enterprise Linux Advanced Platform: the most cost-effective server solution, this product includes
support for the largest x86-compatible servers, unlimited virtualized guest operating systems, storage
virtualization, high-availability application and guest fail-over clusters, and the highest levels of technical
support.
Red Hat Enterprise Linux: the basic server solution, supporting servers with up to two CPU sockets and up
to four virtualized guest operating systems.
Red Hat Enterprise Linux Desktop: a general-purpose client solution, offering desktop applications such
as the OpenOffice.org office suite and Evolution mail client. Add-on options provide support for high-end
technical and development workstations and for running multiple operating systems simultaneously through
virtualization.
Two standard installation media kits are used to distribute variants of the operating system. Red Hat
Enterprise Linux Advanced Platform and Red Hat Enterprise Linux are shipped on the Server media kit.
Red Hat Enterprise Linux Desktop and its add-on options are shipped on the Client media kit. Media kits
may be downloaded as ISO 9660 CD-ROM file system images from Red Hat Network or may be provided
in a boxed set on DVD-ROMs.
Please visit http : / /www . redhat . com/rhel/ for more information about the Red Hat Enterprise Linux
product family. Other related products include realtime kernel support in Red Hat Enterprise MRG, the thin
hypervisor node in Red Hat Enterprise Virtualization, and so on.
For use only by a student enrollad in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. 11 you believe Red Hat training material. are being Improperly usad,
copiad, or distributed please email <training@redhat . coz> or phone toll-free (USA) +1 (866) 626 2994 or +1 (919)754 3700.
Copyright 02011 Red Hat, Inc. RH436-RHEL5u4-en-17-201 10428 / 47a77a3d
.•
17. Red Hat Services and Products 8
• Red Hat supports software products and services beyond Red Hat Enterprise Linux
• JBoss Enterprise Middleware
• Systems and Identity Management
• Infrastructure products and distributed computing
• Training, consulting, and extended support
• http://www.redhat.com/products/
Red Hat offers a number of additional open source application products and operating system
enhancements which may be added to the standard Red Hat Enterprise Linux operating system. As with
Red Hat Enterprise Linux, Red Hat provides a range of maintenance and support services for these add-
on products. Installation media and software updates are provided through the same Red Hat Network
interface used to manage Red Hat Enterprise Linux systems.
For additional information, see the following web pages:
• General product information: http: //www.redhat .com/products/
• Red Hat Solutions Guide: http: //www.redhat .com/solutions/guide/
For use only by a student enrolled in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. If you believe Red Hat training materials are being improperly used,
copied, or distributed please amad <trainingeredhat . con» or phone to1I-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright O 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 64968772
18. Fedora and EPEL 9
• Open source projects sponsored by Red Hat
• Fedora distribution is focused on latest open source technology
• Rapid six month release cycle
• Available as free download from the Internet
• EPEL provides add-on software for Red Hat Enterprise Linux
• Open, community-supported proving grounds for technologies which may be used
in upcoming enterprise products
• Red Hat does not provide formal support
Fedora is a rapidly evolving, technology-driven Linux distribution with an open, highly scalable development
and distribution model. It is sponsored by Red Hat but created by the Fedora Project, a partnership of free
software community members from around the globe. It is designed to be a fully-operational, innovative
operating system which also is an incubator and test bed for new technologies that may be used in later
Red Hat enterprise products. The Fedora distribution is available for free download from the Internet.
The Fedora Project produces releases of Fedora on a short, roughly six month release cycle, to bring the
latest innovations of open source technology to the community. This may make it attractive for power users
and developers who want access to cutting-edge technology and can handle the risks of adopting rapidly
changing new technology. Red Hat does not provide formal support for Fedora.
The Fedora Project also supports EPEL, Extra Packages for Enterprise Linux. EPEL is a volunteer-based
community effort to create a repository of high-quality add-on packages which can be used with Red
Hat Enterprise Linux and compatible derivatives. It accepts legally-unencumbered free and open source
software which does not conflict with packages in Red Hat Enterprise Linux or Red Hat add-on products.
EPEL packages are built for a particular major release of Red Hat Enterprise Linux and will be updated by
EPEL for the standard support lifetime of that major release.
Red Hat does not provide commercial support or service level agreements for EPEL packages. While
not supported officially by Red Hat, EPEL provides a useful way to reduce support costs for unsupported
packages which your enterprise wishes to use with Red Hat Enterprise Linux. EPEL allows you to distribute
support work you would need to do by yourself across other organizations which share your desire to
use this open source software in RHEL. The software packages themselves go through the same review
process as Fedora packages, meaning that experienced Linux developers have examined the packages for
issues. As EPEL does not replace or conflict with software packages shipped in RHEL, you can use EPEL
with confidence that it will not cause problems with your normal software packages.
For developers who wish to see their open source software become part of Red Hat Enterprise Linux, often
a first stage is to sponsor it in EPEL so that RHEL users have the opportunity to use it, and so experience is
gained with managing the package for a Red Hat distribution.
Visit http: / / fedoraproj ect .org/ for more information about the Fedora Project.
Visit http: //fedoraproject.org/wiki/EPEL/ for more information about EPEL.
For use only by a student enroIled in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. If you believe Red Hat training materials are being improperty used,
copied, or chstributed piense email <trainiagerecthat • coa> or phone toII-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
RH436-RHEL5u4-en-17-20110428 / 8744dbe2Copyright 2011 Red Hat, Inc.
. . .
20. Networks 11
• 192.168.0.0/24
• classroom network
• instructor.example.com eth0 192.168.0.254
• stationX.example.com eth0 192.168.0.X
• 172.16.0.0/16
• public application network
• bridged to classroom net
• Instructor: instructor.example.com eth0:1 172.16.255.254
• Workstatíon: cXn5.example.com eth0:0 172.16.50.X5
• Virtual Nodes: cXnN example.com eth0 172.16.50. XN
• 172.17.X.0/24
• prívate cluster network
• intemal bridge on workstations
• Workstation: dom0.clusterX.example.com cluster 172.17.X.254
• Virtual Nodes: nodeN.clusterX.example.com ethl 172.17. X.N
• 172.17.100+X.0/24
• first iscsi network
• intemal bridge on workstations
• Workstation: storagel.clusterX.example.com storagel 172.17.100+X.254
• Virtual Nodes: nodeN-storagel.clusterX.example.com eth2 172.17. 100+X.N
• 172.17.200+X.0/24
• second iscsi network
• intemal bridge on workstations
• Workstation: storage2.clusterX.example.com storage2 172.17. 200+X. 254
• Virtual Nodes: nodeN-storage2.clusterX.example.com eth3 172.17. 200+X. N
For use only by a student enrolled in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red HM, Inc. tt you believe Red Hat training meteríais are being improperly usad,
copiad, or clkstributed pisase email <trainingersdhat COZ> or phone toll-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
RH436-RHEL5u4-en-17-20110428 / 0e761625Copyright @ 2011 Red Hat, Inc.
. .
22. mer. aoút 19 17:29:12 CDT 2009
Subsequent commands will reved to using the system's default language for output. The locale command
can be used to check the current value of LANG and other related environment variables.
SCIM (Smart Common Input Method) can be used to input text in various languages under X if the
appropriate language support packages are installed. Type Ctrl-Space to switch input methods.
For use only by a student enrollad in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be photocopied,
duplicated, atorad in a retrievaI system, or otherwise reproduced without prior written consent of Red Hat, Inc. ff you believe Red Hat trainíng materias are being improperly used,
copiad, or cfistributed pisase email <traiairrgdzedhat . coa> or phone toII-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 8a224f80
25. Data Storage Considerations 1 -2
• Is it represented elsewhere?
• Is it private or public?
• Is it nostalgic or pertinent?
• Is it expensive or inexpensive?
• Is it specific or generic?
Is the data unique, or are there readily-accessible copies of ít elsewhere?
Does the data need to be secured, or is it available to anyone who requests it?
Is the data stored for historical purposes, or are old and new data being accessed just as frequently?
Was the data difficult or expensíve to obtain? Could it just be calculated from other already-available data,
or is it one of a kind?
Is the data specific to a particular architecture or OS type? Is it specific to one application, or one version of
one application?
For use only by a student enrollad in a Red Hat training course taught by Red Hat, Inc. or a Red HM Certifled Training Partner. No pan of this publícation may be photocopied,
duplicated, stored in a retrieval system, or othenvise reproduced without prior written consent of Red HM, Inc. It you believe Red HM training materials are being impropedy usad,
copiad, or cfistributed please email <training@redhat.coa> or phone toll-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 9864cabd
27. Planning for the Future 1 -4
• Few data requirements ever diminish
• Reduce complexity
• Increase fiexibility
• Storage integrity
Few data requirements ever diminish: the number of users, the size of stored data, the frequency of access,
etc.... What mechanisms are in place to aid this growth?
A reduction in complexity often means a simpler mechanism for its management, which often leads to less
error-prone tools and methods.
For use only by a student enrollad in a Red Hat training course taught by Red HM, Inc. or a Red HM Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red HM, Inc. H you believe Red HM training materials are being improperly usad,
copiad, or cHstributed pisase email <traiaing•reclhat . coa, or phone toil-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 18fa55f5
29. Volume Management 1-6
• A volume defines some forro of block aggregation
• Many devices may be combined as one
• Optimized through low-Ievel device configuration (often in hardware)
• Striping, Concatenation, Parity
• Consistent name space
• LUN
• UUID
A volume is a some forro of block aggregation that describes the physical bounds of data. These bounds
represent physical constraints of hardware and its abstraction or virtualization. Device capabilities,
connectivity and reliabílity all influence the availability of this data "container." Data cannot exceed these
bounds; therefore, block aggregation must be flexible.
Often times, volumes are made highly available or are optimized at the hardware level. For example,
specialty hardware may provide RAID 5 "behind the scenes" but present simple virtual SCSI devices to be
used by the administrator for any purpose, such as creating logical volumes.
If the RAID controller has multi-LUN support (is able to simulate multiple SCSI devices from a single one
or aggregation), larger storage volumes can be carved finto smaller pieces, each of which is assigned a
unique SCSI Logical Unit Number (LUN). A LUN is simply a SCSI address used to reference a particular
volume on the SCSI bus. LUNs can be masked, which provides the ability to exclusively assign a LUN to
one or more host connections. LUN masking does not use any special type of connection, it simply hides
unassigned LUNs from specific hosts (similar to an unlisted telephone number).
The Universally Unique IDentifier (UUID) is a reasonably guaranteed-to-be-unique 128 bit number used
to uniquely identify objects within a distributed system (such as a shared LUN, physical volume, volume
group, or logical volume).
UUIDs may be viewed using the blkid command:
# blkid
/dev/mapper/VolGroup0O-LogVo101: TYPE="swap"
/dev/mapper/VolGroup0O-LogVo100: UUID="9924e91b-le5c-44e2-bd3c-dlfbc82ce488" Ié
SEC_TYPE="ext2" TYPE="ext3"
/dev/sdal: LABEL="/boot" UUID="e000084b-26b9-4289-b1d9-efae190c22f5" SEC_TYPE="ext2" be
TYPE="ext3"
/dev/VolGroup0O/LogVo101: TYPE="swap"
/dev/sdbl: UUID="111a7953-85a5-4b28-9cff-b622316b789b" SEC_TYPE="ext2" TYPE="ext3"
For use only by a student enrollad in a Red Hat training course taught by Red HM, Inc. or a Red HM Certified Training Partner. No part of this publicano(' may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red HM, Inc. if you betieve Red HM training materials are being improperly used,
copiad, or cfistributed please ornan ctrainiageredhat . con> or phone ton-free (USA) +1 (1366) 626 2994 or +1 (919) 754 3700.
Copyright(?) 2011 Red Hat, Inc.
. .
RH436-RHEL5u4-en-17-20110428 / b3f8d9b5
7
30. SAN versus NAS 1 -7
• Two shared storage technologies trying to accomplish the same thing -- data
delivery
• Network Attached Storage (NAS)
• The members are defined by the network
• Scope of domain defined by IP domain
• NFS/CIFS/HTTP over TCP/IP
Delivers file data blocks
• Storage Area Network (SAN)
• The network is defined by its members
• Scope of domain defined by members
• Encapsulated SCSI over fibre channel
Delivers volume data blocks
Often used one for the other, Storage Area Network(SAN) and Network Accessed Storage (NAS) differ.
NAS is best described as IP network access to File/Record data. A SAN represents a collection of
hardware components which, when combined, present the disk blocks comprising a volume over a fibre
channel network. The iSCSI-SCSI layer communication over IP also satisfies this definition: the delivery of
low-level device blocks to one or more systems equally.
NAS servers generally run some form of a highly optimized embedded OS designed for file sharing. The
NAS box has direct attached storage, and clients connect to the NAS server just like a regular file server,
over a TCP/IP network connection. NAS deals with files/records.
Contrast this with most SAN implementations in which Fibre-channel (FC) adapters provide the
physical connectivity between servers and disk. Fibre-channel uses the SCSI command set to handle
communications between the computer and the disks; done properly, every computer connected to the disk
view it as if it were direct attached storage. SANs deal with disk blocks.
A SAN essentially becomes a secondary LAN, dedicated to interconnecting computers and storage
devices. The advantages are that SCSI is optimized for transferring large chunks of data across a reliable
connection, and having a second network can off-load much of the traffic from the LAN, freeing up capacity
for other uses.
For use only by a student enrolled in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be photocopied,
duplicated, *torrad in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. If you believe Red Hat training material* are being improperly usad,
copied, or distributed please email < training*redhat com> or phone toll-free (USA) +1 (866) 628 2994 or +1 (919) 754 3700.
Copyright 02011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 631 ba8c2
31. SAN Technologies 1 -8
• Different mechanisms of connecting storage devices to machines over a network
• Used to emulate a SCSI device by providing transparent delivery of SCSI protocol
to a storage device
• Provide the illusion of locally-attached storage
• Fibre Channel
• Networking protocol and hardware for transporting SCSI protocol across fiber optic equipment
• Internet SCSI (iSCSI)
• Network protocol that allows the use of the SCSI protocol over TCP/IP networks
• "SAN via IP"
• Global Network Block Device (GNBD)
• Client/Server kernel modules that provide block-level storage access over an Ethernet LAN
• Deprecated by iSCSI, included for compatibility only,
Most storage devices use the SCSI (Small Computer System Interface) command set to communicate.
This is the same command set that was developed to control storage devices attached to a SCSI parallel
bus. The SCSI command set is not tied to the originally-used bus and is now commonly used for all storage
devices with all types of connections, including fibre channel. The command set is still referred to as the
SCSI command set.
The LUN on a SCSI parallel bus is actually used to electrically address the various devices. The concept of
a LUN has been adapted to fibre channel devices to allow multiple SCSI devices to appear on a single fibre
channel connection.
It is important to distinguish between a SCSI device and a fibre channel (or iSCSI, or GNBD) device. A fibre
channel device is a abstract device that emulates one or more SCSI devices at the lowest leve) of storage
virtualization. There is not an actual SCSI device, but one is emulated by responding appropriately to the
SCSI protocol.
SCSI over fibre channel is similar to speaking a language over a telephone connection. The low level
connection (fibre channel) is used to transpon the conversation's language (SCSI command set).
For use only by a student enrolled in a Red HM training course taught by Red HM, Inc. or a Red HM Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red HM, Inc. tf you believe Red HM training material are being improperly used,
copiad, or cfistributed pelase email ctrainiageredhat . coa> or phone to1I-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright O 2011 . Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 4ddab820
32. Fibre Channel 1-9
Common enterprise-class network connection to storage technology
• Major components:
• Fiber optic cable
• Interface card (Host Bus Adaptor)
• Fibre Channel switching technology
Fibre Channel is a storage networking technology that provides flexible connectivity options to storage
using specialized network switches, fiber optic cabling, and optic connectors.
While a common connecting cable for fibre channel is fiber-optic, it can also be enabled over twisted pair
copper wire, despite the implied limitation of the technology's name. Transmitting the data via light signals,
however, allows the cabling lengths to far exceed that of normal copper wiring and be far more resistant to
electrical interference.
The Host Bus Adaptor (HBA), in its many forms, is used to convert the light signals transmitted over the
fiber-optic cables to electrical signals (and vice-versa) for interpretation by the endpoint host and storage
technologies.
The fibre channel switch is the foundation of a fibre channel network, defining the topology of how the
network ports are arranged and the data path's resistance to failure.
For use only by a student enrolled in a Red HM training course taught by Red Het, Inc. or e Red Hat Certified Training Partner. No part of this publication mey be photocopied,
duplicated, stored in e retrievel system, or otherwise reproduced without prior written consent of Red Het, Inc. If you believe Red Het training meteriale ere being improperly used,
copied, or distributed please emeil < t reining0redhat com> or phone toIl-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 78crif51
33. Host Bus Adapter (HBA) 1-10
• Used to connect hosts to the fibre channel network
• Appears as a SCSI adapter
• Relieves the host microprocessor of data I/O tasks
• Multipathing capable
An HBA is simply the hardware on the host machine that connects it to, for example, a fibre channel
networked device. The hardware can be a PCI, Sbus, or motherboard-embedded IC that transiates signals
on the local computer to frames on the fibre channel network.
An operating system treats an HBA exactly like it does a SCSI adapter. The HBA takes the SCSI
commands it was sent and transiates them into the fiber channel protocol, adding network headers and
error handling. The HBA then makes sure the host operating system gets return information and status
back from the storage device across the network, just like a SCSI adapter would.
Some HBAs offer more than one physical pathway to the fibre channel network. This is referred to as
multipathing.
While the analogy can be drawn to NICs and their purpose, HBAs tend to be far more intelligent: switch
negotiation, tracking devices on the network, I/O processing offloading, network configuration monitoring,
load balancing, and failover management. Critica! to the HBA is the driver that controls it and communicates
with the host operating system.
In the case of iSCSI-like technologies, TCP Offloading Engine (TOE) cards can be used instead of ordinary
NICs for performance enhancement.
For use onty by a student enrollad in a Red HM training course taught by Red HM, Inc. or a Red HM Certified Training Partner. No pan of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red HM, Inc. If you believe Red HM training materials are being improperly usad,
copied, or cfistributed pisase email ctrainingaredhat coa> or phone tdt-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright (?) 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 2dbdf27c
• •
34. Fibre Channel Switch
• Foundation of a Fibre channel SAN, providing:
• High-speed non-blocking interconnect between devices
• Fabric services
• Additional ports for scalability
• Linking capability of the SAN over a wide distance
• Switch topologies
• Point-to-Point - A simple two-device connection
• Arbitrated loop - All devices are arranged in a loop connection
• Switched fabric - All devices are connected to one or more interconnected Fibre Channel switches,
and the switches manage the resulting "fabric" of communication channels
The fibre channel fabric refers to one or more interconnected switches that can communicate with each
other independently instead of having to share the bandwidth, such as in a looped network connection.
Additional fiber channel switches can be combined into a variety of increasingly complex wired connection
patterns to provide total redundancy so that failure of any one switch will not harm the fabric connection and
still provide maximum scalability.
Fibre channel switches can provide fabric services. The services provided are conceptually distributed
(independent of direct switch attachment) and include a login server (fabric device authentication), name
server (a distributed database that registers all devices on a fabric and responds to requests for address
information), time server (so devices can maintain system time with each other), alias server (like a name
server for multicast groups), and others.
Fibre channel is capable of communicating up to 100km.
For use only by a student enrollad in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No part of this publication may be photocopied,
duplicated, atorad in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. If you believe Red Hat training materials are being improperly used,
copied, or distributed please email < t redningeradhat . coa> or phone toll-f res (USA) +1 (855) 826 2994 or +1 (919) 754 3700.
Copyright O 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 2c3a168e
36. End of Lecture 1
• Questions and Answers
• Summary
• How best to manage your data
• Describe Red Hat Storage Model
• Explain Common Storage Hardware
For use only by a student enrolled in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No parí of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. If you betieve Red Hat training material. are being improperly usad,
copied, or distributed please email <training.redhat . coxa> or phone toll-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright O 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-201 10428 / 6f0a110d
- •
38. 10. What does data unavailability "cost" your organization?
11. What percentage of your data storage is archived, or "copied" to other media to preserve its
state at a point in time? Why do you archive data? What types of data would you never archive,
and why? How often do you archive your data?
12. What is the least important data store of your entire computing environment? What makes it
unimportant?
r,nnvrinht n 9(111 Pori Hat Inr n, 1A 17 nni i nAno I
41. Lecture 2
iSCSI Configuration
Upon completion of this unit, you should be able to:
• Describe the iSCSI Mechanism
• Define iSCSI Initiators and Targets
• Explain iSCSI Configuration and Tools
For use only by a student enrollad in a Red HM training course taught by Red HM, Inc. or a Red HM Certified Training Partner. No part of this publication may be photocopied,
duplicated, stored in a retrieval system, or otherwise reproduced without prior written consent of Red HM, Inc. 1f you betieve Red HM training materiMs are being improperly usad,
copiad, or distributed piense email <trainingeredhat. coa> or phone toll-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
Copyright 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 2276845b
47. Configuring iSCSI Targets 2-6
• Install scsi-target-utils package
• Modify letc/tgt/targets . conf
• Start the tgtd service
• Verify configuration with tgt-admin -s
• Reprocess the configuration with tgt-admin --update
• Changing parameters of a 'busy' target is not possible this way
• Use tgtadm instead
Support for configuring a Linux server as an iSCSI target is supported in RHEL 5.3 onwards, based on the
scsi-target-utils package (developed at http : //stgt.berlios.de/).
After installing the package, the userspace tgtd service must be started and configured to start at boot.
Then new targets and LUNs can be defined using /etc/tgt/targets.conf. Targets have an iSCSI
name associated with them that is universally unique and which serves the same purpose as the SCSI ID
number on a traditional SCSI bus. These names are set by the organization creating the target, with the
iqn method defined in RFC 3721 being the most commonly used.
/etc/tgt/targets.conf:
Parameter
backing-store device
direct-store device
initiator-address address
íncominguser username password
outgoinguser username password
Example:
Description
defines a virtual device on the target.
creates a device that with the same VENDORID
and SERIAL_NUM as the underlying storage
Limits access to only the specified IP address.
Defaults to all
Only specified user can connect.
Target will use this user to authenticate against the
initiator.
<target iqn.2009-10.com.example.cluster20:iscsi>
# List of files to export as LUNs
backing-store /dev/volO/iscsi
initiator-address 172.17.120.1
initiator-address 172.17.120.2
initiator-address 172.17.120.3
</target>
For use only by a student enrollad in a Red Hat training course taught by Red HM, Inc. or a Red HM Certified Training Partner. No pan of this publication may be photocopied,
duplicated, stored in a relievel system, or otherwise reproduced without prior written consent of Red HM, Inc. ff you believe Red HM training material are being improperly used,
copiad, or cfistributed pleese email ctrainingOredhat . coa> or phone toil-free (USA) +1 (866) 626 2994 or +1 (919) 754 3700.
RH436-RHEL5u4-en-17-20110428 / bfd4c00eCopyright @ 2011 Red Hat, Inc.
... . . . nc
53. Managing an iSCSI Target Connection 2-12
To disconnect from an iSCSI target:
• Discontinue usage
• Log out of the target session:
• # iscsiadm -m node -T iqn.2007-01.com.example:storage.disk1 -p 172.16.36.1:3260 -u
To later reconnect to an iSCSI target:
• Log in to the target session
• # iscsiadm -m node -T iqn.2007-01.com.example:storage.disk1 -p 172.16.36.1:3260 -1
or restart the iscsi service
• # service iscsi restart
The iSCSI initiator "remembers" previously-discovered targets. Because of this, the iSCSI initiator will
automatically Iog finto the aforementioned target(s) at boot time or when the iscsi service is restarted.
For use only by a student enrollad in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Cerlified Training Partner. No part of this publication may be photocopied,
duplicated, atorad in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. If you believe Red Hat training materials are being improperly usad,
copiad, or distributed please email <training•redhat . coa> or phone toil-free (USA) +1 (666) 626 2994 or +1 (919) 754 3700.
Copyright e 2011 Red Hat, Inc. RH436-RHEL5u4-en-17-20110428 / 16c7ae1c
... . , . , ni
55. End of Lecture 2
• Questions and Answers
• Summary
• Describe the iSCSI Mechanism
• Define iSCSI Initiators and Targets
• Explain iSCSI Configuration and Tools
For use ordy by a student enrolled in a Red Hat training course taught by Red Hat, Inc. or a Red Hat Certified Training Partner. No para of this publication may be photocopied,
duplicated, atorad in a retrieval system, or otherwise reproduced without prior written consent of Red Hat, Inc. H you believe Red Hat training material* are being improperly usad,
copied, or distributed picase email ctrainingWredhat . coa> or phone toll-free (USA) +1 (866)626 2994 or +1 (919) 754 3700.
RH436-RHEL5u4-en-17-20110428 / 2276845bCopyright 2011 Red Hat, Inc.
. . . 00