Linux iSCSI Target LUNs

Posted on 2010-09-07
Last Modified: 2012-05-10

I've got a quick question:

Is there a way to provision LUNs on a Linux iSCSI target server as files on a volume rather than as a partition of a device? NetApp does it this way and I'm just wondering if it's possible to do this on Linux.

Question by:Pugglewuggle
  • 2
  • 2
LVL 11

Expert Comment

ID: 33624143
Dear Pugglewuggle,

can you provide more details of the scenario you wish to have?

Kind regards,
LVL 12

Author Comment

ID: 33626913
Well, I just have a Linux server with a multi terabyte RAID array. Instead of partitioning the array and then sharing the partitions as LUNs, is there a way to just have one [big] partition and just have LUNs exist as files on that partition (so they can be expanded/resized without having to repartition the array)? This is how NetApp does it... files that are shared as LUNs are put directly on the partition/volume as a file that is x size equaling the reserved space for the LUN.
LVL 11

Accepted Solution

slemmesmi earned 500 total points
ID: 33628346
Dear Pugglewuggle,

I assume you wish to do this as a "test environment" or?
You can then eventually benefit from the NetApp ONTAP Simulator, which you can obtain for free as a customer of NetApp (which I assume you are due to your knowledge of NetApp).
With the simulator (which is built for Linux), you can simulate NetApp FAS' (even a cluster!), and you can create LUNs etc. perfectly available via iSCSI or NFS.

Go to NOW.NetApp.Com and Login.
When logged in, select the "Utility ToolChest" (in the Download section), and click the "74. Simulate ONTAP" link.
This will take you to a page where you can download different versions of the simulator.
You can find a lot of useful information about the simulator in the NetApp communities and forums.

Kind regards,
LVL 12

Author Comment

ID: 33744106

I suppose I want to use this for "production." Any tips? And what kind of hardware can I run this on?

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Having issues meeting security compliance criteria because of those pesky USB drives? Then I can help you! This article will explain how to disable USB Mass Storage devices in Windows Server 2008 R2.
AWS Glacier is Amazons cheapest storage option and is their answer to a ‘Cold’ storage service.  Customers primarily use this service for archival purposes and storage of infrastructure backups.  Its unlimited storage potential and low storage cost …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now