Académique Documents
Professionnel Documents
Culture Documents
Abstract
This guide provides technical help for end users who want to configure Microsoft iSCSI Software Target on their storage appliance. iSCSI Software Target creates iSCSI targets and virtual disks that you can manage through the Microsoft iSCSI Software Target console.
Copyright information
This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. 2010-2011 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Windows, Windows Server, and Windows Vista are trademarks of the Microsoft group of companies. All other trademarks are property of their respective owners.
Contents
Microsoft iSCSI Software Target 3.3 Getting Started Guide............................................................1 Abstract.................................................................................................................................... 1 Copyright information...................................................................................................................... 2 Contents.......................................................................................................................................... 3 Microsoft iSCSI Software Target 3.3 Getting Started Guide............................................................4 iSCSI overview............................................................................................................................ 4 iSCSI network components...................................................................................................... 4 iSCSI Software Target components.......................................................................................... 5 In this guide................................................................................................................................. 5 Configuring Windows Firewall......................................................................................................... 6 Installing the Microsoft iSCSI Software Target................................................................................6 Installing the Microsoft iSCSI Software Target Providers................................................................7 About Virtual Disks and Snapshots...............................................................................................10 Virtual disks............................................................................................................................... 10 Snapshots.................................................................................................................................. 11 Using hardware providers.......................................................................................................... 12 Command line tools for VDS Hardware Provider...................................................................12 Command line tools for VSS Hardware Provider ...................................................................12 Multipath I/O Support.................................................................................................................... 13 Failover Clustering Support (Enterprise Edition Only)...................................................................13 Supported failover cluster configurations...............................................................................14 Requirements for iSCSI storage failover clustering................................................................14 Creating a failover cluster....................................................................................................... 15 Interoperability with Non-Microsoft iSCSI Initiators.......................................................................15 Version and platform supportability............................................................................................15 Support...................................................................................................................................... 16
iSCSI overview
Several protocols, such as Serial Attached SCSI (SAS) and Serial ATA (SATA or Serial Advanced Technology Attachment), are available so that a disk controller can communicate with the disk drives. These protocols are predefined standards that determine how commands, such as read and write requests, are packaged and sent between the controller and disk drive. The iSCSI protocol extends the SCSI standards by encapsulating SCSI commands in TCP/IP packets. These commands are sent over a TCP/IP network, so that servers can access storage on a storage area network (SAN). This facilitates implementing and centrally managing the consolidated storage, including centralized backup and remote system recovery.
The iSCSI target provides storage, similar to the hard disk drives of locally attached storage, but this storage is accessed over a network instead of locally. This functionality is provided in Windows Server 2008 R2 and Windows Storage Server 2008 R2 by iSCSI Software Target. iSCSI initiator The iSCSI initiator is sometimes referred to as the client. The iSCSI target provides the storage to the iSCSI initiator, which acts as a disk controller for the disks that are hosted by the target. All versions of Windows Server include the iSCSI initiator so that the client computer can connect to an iSCSI target. The iSCSI Initiator is also included in the Windows Vista and Windows 7 operating systems. Storage fabric This is an IP-based network that connects the iSCSI target to the iSCSI initiator. The storage fabric is typically a gigabit local area network (LAN).
from a Windows
In this guide
Configuring Windows Firewall Installing the Microsoft iSCSI Software Target Installing the Microsoft iSCSI Software Target Providers About Virtual Disks and Snapshots Multipath I/O Support Failover Clustering Support (Enterprise Edition Only) Interoperability with Non-Microsoft iSCSI Initiators
%windir%\System32\Wtvds.exe
1. In Server Manager, expand Configuration, expand Windows Firewall with Advanced Security, and then click Inbound Rules. 2. In the Actions pane, click New Rule. 3. Under What type of rule would you like to create, click Program, and then click Next. 4. Click Browse, browse to the %windir%\System32 folder, and then click Wintarget.exe. Click Open, and then click Next. 5. Click Allow the connection, and then click Next. 6. Select the network locations that should be bound to this rule (the default is Domain, Private, and Public). Click Next. 7. Under Name, type a descriptive name for the rule. For example, type Microsoft iSCSI Software Target Service for the program rule for Wintarget.exe. Click Finish.
Option
Description
Quiet mode, no user interface is displayed during installation. Unattended mode, only a progress bar is displayed. Sets user interface level: n No UI b Basic UI r Reduced UI f Full UI (default)
Description
TARGETDIR
Note any computer from which you will use VDS-aware management applications to manage the storage appliance. Microsoft iSCSI Software Target Volume Shadow Copy Service Hardware Provider A Microsoft iSCSI Software Target VSS Hardware Provider is required to create transportable snapshots of iSCSI virtual disks and create application consistent snapshots from iSCSI initiators. iSCSI snapshots are created by using the Volume Shadow Copy Service in conjunction with a disk storage array. You install this hardware provider on the same iSCSI initiator server that you use to perform backups. The backup software you use must support transporting snapshots. Microsoft iSCSI Software Target High Performance Computing (HPC) Provider A Microsoft iSCSI Software Target HPC Provider enables provisioning of iSCSI startup disks for Microsoft High Performance Computing (HPC) servers. The iSCSI target creates snapshots to backup and restore virtual disks that are file system consistent, and which support restoration at the file system level. For a virtual disk to be restored in a way that is application consistent, so that the server application recovers completely, the snapshots should be made from the iSCSI initiator. This functionality in the iSCSI initiator requires the use of the iSCSI initiator VSS Hardware Provider on the iSCSI initiator server. Except as noted, the Microsoft iSCSI Software Target Providers can be installed on the following operating systems: Windows Server 2003 SP2 x86 Windows Server 2003 SP2 x64 Windows Server 2008 (SP1) x86 Windows Server 2008 (SP1) x64 Windows Server 2008 (SP2) x86 Windows Server 2008 (SP2) x64 Windows Server 2008 x64 Windows Server 2008 R2 x64
The Microsoft iSCSI Target High Performance Computing (HPC) provider is only supported on 64-bit Windows platforms. The Microsoft iSCSI Software Target Providers require that the computer on which they are installed is in a Windows domain, and that the computer is in the same domain as the Microsoft iSCSI Software target that they are connecting to. Install the Microsoft iSCSI Software Target Providers The Microsoft iSCSI Software Target Providers are distributed as Windows Installer files. Open the Index.htm file to access the installation links, or double click the applicable iscsitargetClient.msi file. Alternatively, you can also enter the following commands from a Windows command prompt to perform the installation.
Note iSCSI Target Client Setup will prompt you to enter user account credentials that have local administrative permissions on the iSCSI target computer when installing the VDS or VSS hardware provider. This is not required if installing the HPC provider only. To install the Microsoft iSCSI Software Target Providers From a command prompt, type the following: msiexec /i iscsitargetClient.msi <options> ALLUSERS=1 [PROPERTY=PropertyValue] To uninstall the Microsoft iSCSI Software Target Hardware Providers From a command prompt, type the following: msiexec /x iscsitargetClient.msi <options> The following options are available:
Option Description
Quiet mode, no user interface is displayed during installation. Unattended mode, only a progress bar is displayed. Sets user interface level: n No UI b Basic UI r Reduced UI f Full UI (default)
/L*v <logfile>
ADDLOCAL
Specifies which features to install. Available features include: ALL: Install all features (default) VSSProvFeature: Install the VSS Hardware Provider VDSProvFeature: Install the VDS Hardware Provider HPCiSCSIProvFeature: Install the HPC Provider
TARGETDIR
SERVICEUSERNAME SERVICEPASSWORD
The VSS and VDS service account user name. The VSS and VDS service account password.
1. Uninstall previous versions of the applicable providers. 2. Right-click the iscsitargetClient.msi file for iSCSI initiator 3.32 and select Run as Administrator. 3. Follow the steps in the wizard.
Virtual disks
iSCSI virtual disks are files in the virtual hard disk (VHD) format. iSCSI virtual disks are assigned to specific iSCSI targets, and only the iSCSI virtual disks assigned to an iSCSI target are available to an iSCSI initiator. After the iSCSI initiator logs on to the iSCSI target, these virtual disks appear as locally-attached hard disks. These disks can be locally mounted to support backup and recovery operations. With Microsoft iSCSI Software Target, you can provide effective and efficient backup and recovery for virtual disks on the iSCSI target without stopping applications or closing files. You can then transport data to a central server for LAN-free and server-free backup. This eliminates the backup window that is needed for traditional backup solutions, and it allows application servers to continue running without disruption to clients. The primary functionality that is provided in iSCSI Software Target to support data backup and recovery includes the following: Snapshots A snapshot is a point-in-time, read-only copy of an iSCSI virtual disk that can be used for fast system recovery in the event of data corruption from a virus attack, system security compromise, or an inadvertent user deletion. These are especially useful for interim backups of data that has changed since the previous regular backup because they are differential copies. Local disk access
10
Local access to data on virtual disks can be set up by mounting a read-only snapshot of an iSCSI virtual disk or mounting a virtual disk as a read-write disk on the local computer. This makes it possible to use other backup software to perform regular backups. Rollback The rollback functionality in iSCSI Software Target makes it possible to roll back a virtual disk to a snapshot. Using backup software requires appropriate coordination of actions between the backup software and iSCSI Software Target; for example, setting up appropriate schedules and configurations for creating and mounting snapshots, and including the locally mounted snapshots in routine backups.
Snapshots
Snapshots are useful for backup and recovery operations and for data mining. You can create a snapshot manually or set up automatic snapshots to be taken at specific times. Snapshots offer the following advantages: Can be scheduled to be created automatically. Offer space-efficiency because they are differential copies.
Provide fast system recovery of files and volumes if data is accidentally deleted by a user, overwritten, or corrupted by a malicious program. Can be mounted locally or exported to facilitate backup and recovery operations. Do not require that you close files or stop programs when you create them, so application servers can continue servicing clients without disruption. iSCSI snapshots are created by using the Volume Shadow Copy Service and a storage array with a hardware provider that is designed for use with the Volume Shadow Copy Service. Snapshots that are created on the iSCSI target server are crash consistent. This means that if the iSCSI initiator computer stops responding, the state of the snapshot will be the same as the state of the virtual disk. Most modern file systems can recover from this state. To enable crash consistent snapshots, the Microsoft iSCSI Software Target VSS Hardware Provider, which is available as an option in iSCSI Software Target, must be installed on the iSCSI initiator computer. The hardware provider coordinates with the local Volume Shadow Copy Service to create a consistent image of the volume that can be transported to a central backup server. With Microsoft iSCSI Software Target, you can make a snapshot available on remote computers by using the Export Snapshot Wizard. You can use the wizard to export the snapshot to one or more iSCSI targets. After you export a snapshot, it appears on the iSCSI initiator as a local disk with read-only access, and it can be mounted by using a drive letter. This is useful for making files available to users for a short period of time, such as might be required for search and recovery of a specific file. With Microsoft iSCSI Software Target, you can roll back an iSCSI virtual disk to a previous snapshot. A rollback of the disk requires the use of a temporary directory (such as C:\WINDOWS\Temp). This directory must contain sufficient space to store the differential data. If there is insufficient space, the rollback will stop, and the virtual disk content will not change. 11
12
Note
To install MPIO
The following procedure explains how to install MPIO as an additional feature through Server Manager. 1. To open Server Manager, click Start, and then click Server Manager. 2. Click Features, and then click Add Features. 3. Under Features, select Multipath I/O, and then click Next. 4. Click Install.
In an iSCSI-based cluster environment, the iSCSI virtual disk must reside on a shared cluster disk, and an existing iSCSI virtual disk can only be added to an iSCSI target that belongs to the same resource group. Microsoft iSCSI Software Target must be installed on every node in the cluster to provide failover support for iSCSI resources.
Each node that will participate in the failover cluster passes all cluster validation tests in the Failover Cluster Management console. The Failover Cluster feature is installed on each node and is configured to use a shared storage back-end such as iSCSI, Fibre Channel, or SAS interconnect. There is at least one cluster disk listed in Available Storage in the Failover Cluster Management console. The network adapters are configured to support separate subnets for storage and client access.
14
15
Note Microsoft iSCSI Software Target versions 3.1, 3.2, and 3.3 are interoperable with iSCSI initiators that comply with the standard iSCSI protocol. (For details of known issues, see Microsoft iSCSI Software Target 3.3 Implementation Notes. At the request of certain OEMs, Microsoft has tested discovery, log-on and log-off, and I/O of the following non-Microsoft iSCSI initiators to determine interoperability with Microsoft iSCSI Software Target: SUSE Linux Enterprise Server 10 Red Hat Enterprise Linux 5 QLogic QLE4062C-SP, firmware 3.00.01.24 Microsoft conducted these interoperability tests at the request of certain OEMs. Microsoft has not approved any of the iSCSI initiators listed through a formal Microsoft logo or certification program. This testing should not be construed to represent promotion or support by Microsoft of the iSCSI initiators listed.
Support
The OEM is the customers primary contact for the resolution of all iSCSI initiator and iSCSI target interoperability issues. Microsoft is committed to working with OEMs to resolve interoperability issues that involve Microsoft iSCSI Software Target, but Microsoft is not responsible for resolving any issues that are caused by non-Microsoft iSCSI initiators. The following policy governs how Microsoft will work to reproduce and resolve issues that involve Microsoft iSCSI Software Target: Interoperability issues that involve the non-Microsoft iSCSI initiators that are previously listed Microsoft will work with the OEM to reproduce interoperability issues that involve the nonMicrosoft initiators previously listed, and to resolve only those issues directly caused by Microsoft iSCSI Software Target. Microsoft will not resolve interoperability issues caused by non-Microsoft iSCSI initiators. Interoperability issues that involve non-Microsoft iSCSI initiators that are not previously listed Microsoft is committed to working with OEMs to resolve interoperability issues that involve non-Microsoft iSCSI initiators that are not previously listed. However, each OEM is solely responsible for reproducing interoperability issues on its premises and allowing Microsoft to perform remote analysis. Moreover, Microsoft will resolve only interoperability issues that are directly caused by Microsoft iSCSI Software Target.
16