Solved

How does HA iSCSI work?

Posted on 2014-12-02
4
336 Views
Last Modified: 2014-12-02
I have been setting up a test environment with Starwind SAN software and trying to figure out how the high availability would work if one of the storage servers fails.

In the test environment there are 2 windows 2012 servers with the starwind san software loaded.  I can setup the iscsi targets on the san and also set them up as high availability with a partner pointing to the other 2012 server.   In the test environment I have a vmware server that is accessing the iscsi targets on the 2 physical servers.   I have one vm setup on the vmware host with the disk pointing to one of the iscsi datastores.

My question is if one of the starwind servers fails, how does vmware or starwind adjust with this to make the vm not lose the disk ?   It seems like I am missing something with how this process would work.

Thanks.
0
Comment
Question by:tiptechs
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 121

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 500 total points
ID: 40476240
Basically, you've got a single or many iSCSI Targets, and the storage is mirrored between servers on the back-end.
0
 

Author Comment

by:tiptechs
ID: 40476284
So the vmware server will always see the same iSCSI IQN and the starwind software would handle that?   When you create the HA within Starwind it will create an IQN and then have a different IQN for the "partner" image.
0
 
LVL 121
ID: 40476292
Correct, VMware vSphere does not have to do anything, it connects to the same IP Address.

all the HA is handled in the background using the Starwind software.

It's the same with many "Clustered" Mirrored/Storage solutions.
0
 

Author Comment

by:tiptechs
ID: 40476304
Thanks Andrew.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
Concerto Cloud Services, a provider of fully managed private, public and hybrid cloud solutions, announced today it was named to the 20 Coolest Cloud Infrastructure Vendors Of The 2017 Cloud  (http://www.concertocloud.com/about/in-the-news/2017/02/0…
Teach the user how to edit .vmx files to add advanced configuration options Open vSphere Web Client: Edit Settings for a VM: Choose VM Options -> Advanced: Add Configuration Parameters:
Teach the user how to install log collectors and how to configure ESXi 5.5 for remote logging Open console session and mount vCenter Server installer: Install vSphere Core Dump Collector: Install vSphere Syslog Collector: Open vSphere Client: Config…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question