Solved

How to check LUNs mappings are still intact/mounted after maintenance

Posted on 2014-01-18
4
430 Views
Last Modified: 2014-01-19
We have hundreds of LUNs being mapped to numerous
ESXi hosts (running Windows, Redhat & Solaris x86) VMs.
I heard from my old-time colleague we have Redhat KVM
(I suppose this is a hypervisor) too.

After one of the monthly maintenance to upgrade firmware
of Brocade encrypted switches, a number of LUNs went
missing (or no more mounted by the hosts).  I don't quite
know the details but I heard about 30% of the LUNs were
no more mounted by the hosts & need to be manually
re-mapped (or LUNs re-presented)

Is there a quick way to verify?  Just by issuing a brocade
command (we have 8 Brocade switches) before the
maintenance & after the maintenance & then compare?
What's the FOS Brocade command?  (configshow or
supportshow or ?)

We'll need this quick check for the long run
0
Comment
Question by:sunhux
  • 2
4 Comments
 
LVL 117

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE)
Andrew Hancock (VMware vExpert / EE MVE) earned 190 total points
ID: 39790525
On ESXi, you can issuse an esxcfg-mpath command to check the LUNs attached.

You can also use fabricshow on a brocade switch to show associated WWNN, which will be the FC HBA WWNN in your servers.

you can also check the brocade servers using show flogi database.

or nsallshow or nscamshow (depends on switch and firmware version)
0
 
LVL 55

Assisted Solution

by:andyalder
andyalder earned 310 total points
ID: 39790836
With normal switches I don't think there's much LUN level information but with the encryption ones there is, cryptocfg --show -LUN <target>. configupload might also list the whole thing out for you.

Note I haven't played with the encryption switches so I'm guessing a bit, they scare me since if you make any mistakes you can end up sending a mix of encrypted and unencrypted data to the LUN which corrupts it beyond recovery.
0
 

Author Comment

by:sunhux
ID: 39790958
Thanks Andrew & Andy.

What's the exact command or commands below (was not too clear in Andy's post):
>cryptocfg --show -LUN <target>. configupload
0
 
LVL 55

Accepted Solution

by:
andyalder earned 310 total points
ID: 39790982
Try the configUpload first, you don't need any parameters for that and hopefully it will list the cryptographic info which will have all the encrypted LUNs listed.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
Teach the user how to join ESXi hosts to Active Directory domains Open vSphere Client: Join ESXi host to AD domain: Verify ESXi computer account in AD: Configure permissions for domain user in ESXi: Test domain user login to ESXi host:
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now