Creating SAN storage between 2 servers in the same LUN

Posted on 2007-10-15
Last Modified: 2013-11-14
Hi experts, I've just created a storage partition on the SAN with the intention to let both Windows servers to see the SAN partition at the same time. I'm pretty new to SAN. After I've created the partition from the storage and mapped it accordingly to enable the 2 servers to "see" it, i tried adding data on Server A's SAN drive. However on Server B, I can't see the data that I've added in Server A. Is that normal? Can I let both server "see" exactly the same thing?
Question by:totallypatrick
    LVL 55

    Accepted Solution

    You should see the same data from both servers but you cannot have tow Windows servers accessing the same partition since there is no distributed lock manager to stop both trying to modify the same file simultaneously. What you need to do is set up a cluster, then one server will have active use of the data and the other will be in standby mode incase the first server dies. There are a number of webcasts on how to do this, and enter cluster webcast in the search box.

    Why do you want both servers accessing the same partition?
    LVL 30

    Assisted Solution

    by:Duncan Meyers

    The inevitable result of connecting two servers to the same SAN LUN is data corruption and tears. The simplest way to achieve shared storage between two servers is to use a CIFS (Windows) share. As andyalder says, your only alternative is to use a cluster.
    LVL 55

    Expert Comment

    If you don't want a traditional active/passive cluster you can buy something like PolyServe Matrix Server, this has it's own file system and distributed lock manager that sit on top of Windows and allow dozens of fileservers to access the same SAN data. Only really valid for large corporates though.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Should I Do With This Threat Intelligence?

    Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

    Sometimes the best way to deal with an infected computer is to boot from external media and run your tools from there.  The reason you may wish to do this really depends on the infection.  Some malware is so recalcitrant that no matter what you do i…
    We all have limited time to study long and complicated information about RAID theories, but you may be interested as to how RAID 5 works. We made it simple for you by providing the shortest and easiest explanation ever.   First we need to remind …
    This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
    This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now