Solved

HP server HBA with Compellent SAN

Posted on 2014-07-22
3
749 Views
Last Modified: 2016-11-23
Hello Experts,

We have planning to implement new SAN (Compellent SC8000). We will connect Dell ESXi servers R620 to this SAN via FC.

Now we have some existing HP Servers (DL380G7) , which are planning to Add it to the NEW San. IN order to do that we need to add new HBA Cards to the server. We are planning to buy new HBA  Cards HP 82Q (HP Part Number AJ764A).

Now , my question is

Is this cards HP 82Q (HP Part Number AJ764A) compatible with Compellent SAN SC8000?

Please Advise.

Thanks,

-Prashant Girennavar.
0
Comment
Question by:Prashant Girennavar
  • 2
3 Comments
 
LVL 117

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE)
Andrew Hancock (VMware vExpert / EE MVE) earned 500 total points
Comment Utility
You need to check two lists

Check the VMware Hardware Compatability Lists HCL here

The VMware Hardware Compatibility List is the detailed lists showing actual vendor devices that are either physically tested or are similar to the devices tested by VMware or VMware partners. Items on the list are tested with VMware products and are known to operate correctly.Devices which are not on the list may function, but will not be supported by VMware.

http://www.vmware.com/go/hcl

and also ensure you check the firmware levels, and card with Dell.
0
 
LVL 10

Author Comment

by:Prashant Girennavar
Comment Utility
Thanks for the input Hancock.

It helped me , I found this card is supported. http://partnerweb.vmware.com/comp_guide2/detail.php?deviceCategory=io&productid=12687&vcl=true

Now , how do we make sure , if we use this HBA in HP server it will work with SC8000 Compellent box.?

Please suggest.

Thanks,

-Prashant Girennavar.
0
 
LVL 117

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE) earned 500 total points
Comment Utility
Discuss with Dell Support.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Storage devices are generally used to save the data or sometime transfer the data from one computer system to another system. However, sometimes user accidentally erased their important data from the Storage devices. Users have to know how data reco…
When we have a dead host and we lose all connections to the ESXi, and we need to find a way to move all VMs from that dead ESXi host.
Teach the user how to convert virtaul disk file formats and how to rename virtual machine files on datastores. Open vSphere Web Client: Review VM disk settings: Migrate VM to new datastore with a thick provisioned (lazy zeroed) disk format: Rename a…
This Micro Tutorial steps you through the configuration steps to configure your ESXi host Management Network settings and test the management network, ensure the host is recognized by the DNS Server, configure a new password, and the troubleshooting…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now