Solved

How to check LUNs mappings are still intact/mounted after maintenance

Posted on 2014-01-18
4
432 Views
Last Modified: 2014-01-19
We have hundreds of LUNs being mapped to numerous
ESXi hosts (running Windows, Redhat & Solaris x86) VMs.
I heard from my old-time colleague we have Redhat KVM
(I suppose this is a hypervisor) too.

After one of the monthly maintenance to upgrade firmware
of Brocade encrypted switches, a number of LUNs went
missing (or no more mounted by the hosts).  I don't quite
know the details but I heard about 30% of the LUNs were
no more mounted by the hosts & need to be manually
re-mapped (or LUNs re-presented)

Is there a quick way to verify?  Just by issuing a brocade
command (we have 8 Brocade switches) before the
maintenance & after the maintenance & then compare?
What's the FOS Brocade command?  (configshow or
supportshow or ?)

We'll need this quick check for the long run
0
Comment
Question by:sunhux
  • 2
4 Comments
 
LVL 119

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 190 total points
ID: 39790525
On ESXi, you can issuse an esxcfg-mpath command to check the LUNs attached.

You can also use fabricshow on a brocade switch to show associated WWNN, which will be the FC HBA WWNN in your servers.

you can also check the brocade servers using show flogi database.

or nsallshow or nscamshow (depends on switch and firmware version)
0
 
LVL 55

Assisted Solution

by:andyalder
andyalder earned 310 total points
ID: 39790836
With normal switches I don't think there's much LUN level information but with the encryption ones there is, cryptocfg --show -LUN <target>. configupload might also list the whole thing out for you.

Note I haven't played with the encryption switches so I'm guessing a bit, they scare me since if you make any mistakes you can end up sending a mix of encrypted and unencrypted data to the LUN which corrupts it beyond recovery.
0
 

Author Comment

by:sunhux
ID: 39790958
Thanks Andrew & Andy.

What's the exact command or commands below (was not too clear in Andy's post):
>cryptocfg --show -LUN <target>. configupload
0
 
LVL 55

Accepted Solution

by:
andyalder earned 310 total points
ID: 39790982
Try the configUpload first, you don't need any parameters for that and hopefully it will list the cryptographic info which will have all the encrypted LUNs listed.
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
In this article, I will show you HOW TO: Install VMware Tools for Windows on a VMware Windows virtual machine on a VMware vSphere Hypervisor 6.5 (ESXi 6.5) Host Server, using the VMware Host Client. The virtual machine has Windows Server 2016 instal…
Teach the user how to edit .vmx files to add advanced configuration options Open vSphere Web Client: Edit Settings for a VM: Choose VM Options -> Advanced: Add Configuration Parameters:
Teach the user how to install log collectors and how to configure ESXi 5.5 for remote logging Open console session and mount vCenter Server installer: Install vSphere Core Dump Collector: Install vSphere Syslog Collector: Open vSphere Client: Config…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question