Solved

Configuring a file server on Windows 2008 R2 using a SAN and ISCSI

Posted on 2011-09-17
5
1,284 Views
Last Modified: 2012-06-27
I configured two servers using Windows 2008 R2 enterprise and configured each to connect to my SAN via ISCSI. I can see two volumes on each of the servers, one that's 10GB (for the cluster DB) and one that's 18TB (for my file share data). I assigned drive letters to these volumes on each server (F: and G:). The two volumes are supposed to be shared across the servers.

However, I noticed that if I copy a file to the F: on server1 and then I go to server2 and look at the F:, I do not see the file. My assumption was that since these volumes are shared across the two servers that I should see  the file on the F: from either server. Is something wrong? I want to make sure I get it right before I install the failover cluster components.

Thank you in advance for your help.
0
Comment
Question by:Julian123
  • 2
  • 2
5 Comments
 
LVL 9

Accepted Solution

by:
Lester_Clayton earned 500 total points
Comment Utility
The reason you're seeing a discrepancy is because the OS on the second server was not notified of the file addition - what you're seeing is the cached version of the drive, and not the actual drive.

While Clustering relies heavily on shared storage, you cannot use the shared storage as simply as mounting it on both servers.  Despite it being shared, only one server actively reads and writes to the volume - the other only knows about it.

My suggestion would be to continue the process of creating your cluster.

Here's a tip though - make all your shared volumes GPT - do not use MBR or Dynamic disks.  This includes Cluster Shared Volumes as well as Disk Volumes.
0
 
LVL 12

Author Comment

by:Julian123
Comment Utility
Thanks. I noticed I'm also getting a "recycle bin is corrupted, do you want to empty it". I'm getting this on both servers for the shared volumes. Should both servers be giving a drive letter to the shared volumes (if not please let me know how they should be configured) Or is something else up?



Thanks.
0
 
LVL 55

Expert Comment

by:andyalder
Comment Utility
orrupt recycle bin is same as corrupt and unseen files, should be OK once clustering is set up properly.
0
 
LVL 9

Expert Comment

by:Lester_Clayton
Comment Utility
You should avoid asigning drive letters to shared volumes - do not mount then as either a drive letter or as a junction point.

There is 1 exception to this - and this is the quorum disk.   The quorum disk (not recommended for an even number of Cluster Nodes) will be on a (tiny) disk which will needs to be formatted, and Cluster Manager will automatically assign a drive letter to it.  The quorum disk is visible and write able on all nodes.

Corrupt Recycle bins are just a cosmetic error - feel free to say Yes (need administrator rights).  Corrupt Recycle bins happen all the time, especially when drives are added and removed on a sever.
0
 
LVL 12

Author Closing Comment

by:Julian123
Comment Utility
Thanks so much!
0

Featured Post

Wish Marketing would stop bothering you?

Is your marketing department constantly asking for new email signature updates? Are they requesting a different design for every department? Do they need yet another banner added? Don’t let it get you down! There is an easy way to manage all of these requests...

Join & Write a Comment

The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
Possible fixes for Windows 7 and Windows Server 2008 updating problem. Solutions mentioned are from Microsoft themselves. I started a case with them from our Microsoft Silver Partner option to open a case and get direct support from Microsoft. If s…
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now