Solved

Connecting 2 servers to an iSCSI MSA2012i

Posted on 2011-03-16
4
837 Views
Last Modified: 2013-11-14
I have 2 computers running an app called Call Copy and one MSA2012i, I use VLAN on the switch for connectivity (iSCSI).  Can I connect 2 servers to one MSA2012i and write to it at the same time?
0
Comment
Question by:Mhorrocks1962
4 Comments
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 350 total points
Comment Utility
You cannot have two Windows servers connected to the same volume and have them both write to the same volume at the same time. They will corrupt the volume. You can have multiple servers connected to the volume in a failover cluster, but only one server will access the volume at a time. There are specialized 3rd party add ons that will allow you to do it, but in general the answer is no.

If you are connecting to NAS storage using CIFS or NFS, the two file sharing protocols, then no problem. I don't know if you can have server A connected via iSCSI and them have server A share that and then have server B write to a network share.
0
 
LVL 42

Assisted Solution

by:paulsolov
paulsolov earned 150 total points
Comment Utility
Beyond what is stated above you can create two LUNs and create each server to an indivual volume.

You could also install VMWare vSphere on two hosts.  On the hosts attach LUNs from the MSA and create a virtual machine.  Since the virtual machine is on shared storage you can have HA (if a vSphere host crashes, the second host will boot the VM on it).  
0
 

Author Closing Comment

by:Mhorrocks1962
Comment Utility
It is what I thought, but needed to know for sure.  Thanks for your answers
0
 
LVL 55

Expert Comment

by:andyalder
Comment Utility
Or you could use a shared filesystem such as Quantum's StorNext or RedHat GFS.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

We wanted to provide an in-depth explanation of the Ping Node offering clarifications on its function and usage. Incorrect Ping Node configuration and functionality can cause problems with HA clusters. The importance of this article is critical for …
We all have limited time to study long and complicated information about RAID theories, but you may be interested as to how RAID 5 works. We made it simple for you by providing the shortest and easiest explanation ever.   First we need to remind …
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now