0% found this document useful (0 votes)
54 views38 pages

2-Day 6 5 Integration Training Lab Manual

Uploaded by

Weimin Chen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views38 pages

2-Day 6 5 Integration Training Lab Manual

Uploaded by

Weimin Chen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Isilon IQ Integration Lab Guide

for OneFS v6.5


January 2012

EMC Education Service


Copyright
Copyright © 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011 EMC
Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its
publication date. The information is subject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.

Use, copying, and distribution of any EMC software described in this publication requires an
applicable software license.

EMC2, EMC, Data Domain, RSA, EMC Centera, EMC ControlCenter, EMC LifeLine, EMC OnCourse, EMC
Proven, EMC Snap, EMC SourceOne, EMC Storage Administrator, Acartus, Access Logix, AdvantEdge,
AlphaStor, ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated
Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Captiva, Catalog Solution, C-Clip,
Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, ClaimPack, ClaimsEditor, CLARiiON,
ClientPak, Codebook Correlation Technology, Common Information Model, Configuration Intelligence,
Configuresoft, Connectrix, CopyCross, CopyPoint, Dantz, DatabaseXtender, Direct Matrix Architecture,
DiskXtender, DiskXtender 2000, Document Sciences, Documentum, elnput, E-Lab, EmailXaminer,
EmailXtender, Enginuity, eRoom, Event Explorer, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony,
Global File Virtualization, Graphic Visualization, Greenplum, HighRoad, HomeBase, InfoMover,
Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, ISIS, Max Retriever, MediaStor,
MirrorView, Navisphere, NetWorker, nLayers, OnAlert, OpenScale, PixTools, Powerlink, PowerPath,
PowerSnap, QuickScan, Rainfinity, RepliCare, RepliStor, ResourcePak, Retrospect, RSA, the RSA logo,
SafeLine, SAN Advisor, SAN Copy, SAN Manager, Smarts, SnapImage, SnapSure, SnapView, SRDF,
StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX,
TimeFinder, UltraFlex, UltraPoint, UltraScale, Unisphere, VMAX, Vblock, Viewlets, Virtual Matrix, Virtual
Matrix Architecture, Virtual Provisioning, VisualSAN, VisualSRM, Voyence, VPLEX, VSAM-Assist,
WebXtender, xPression, xPresso, YottaYotta, the EMC logo, and where information lives, are registered
trademarks or trademarks of EMC Corporation in the United States and other countries.

All other trademarks used herein are the property of their respective owners.

© Copyright 2011 EMC Corporation. All rights reserved. Published in the USA.

1
Table of Contents
COPYRIGHT ............................................................................................................ 1

LAB CONFIGURATION ............................................................................................. 4

TERMINAL EMULATION SOFTWARE .............................................................................. 4


DEMO CONTENT ......................................................................................................... 4
USER ACCOUNTS AND ACCESS ......................................................................................... 4
IP ADDRESSES .............................................................................................................. 4

LAB 0.1: ACCESS THE VDC ....................................................................................... 5

INTRODUCTION ............................................................................................................. 5
OBTAIN LOGIN INFORMATION ......................................................................................... 5
LOG INTO VDC AND THE VMWARE VCENTER ..................................................................... 5
CLONE VM TEMPLATE COPY ........................................................................................... 6

LAB 0.2: CONFIGURE THE LAB ENVIRONMENT ....................................................... 7

TASK 1: JOIN THE CLUSTER TO ACTIVE DIRECTORY ............................................................... 7


TASK 2: CHECK THE DOMAIN JOIN STATUS .......................................................................... 7
TASK 3: JOIN YOUR NODES AND CONFIGURE SMARTCONNECT ................................................ 8
TASK 4: CREATE AN INDIVIDUAL IP ADDRESS POOL ............................................................... 8
TASK 4: CREATE NEEDED DNS RECORDS ............................................................................ 9
TASK 6: VERIFY THE SMARTCONNECT SERVICE IP ADDRESS ................................................. 10

LAB 4.1 CONFIGURE ISCSI CLUSTER STORAGE ....................................................... 11

TASK 1: ENABLE THE ISCSI SERVICE ON THE CLUSTER.......................................................... 11


TASK 2: CONFIGURE THE ISNS CLIENT SERVICE .................................................................. 12
TASK 3: CREATE AN ISCSI TARGET .................................................................................. 12
TASK 4: CREATE A LOGICAL UNIT .................................................................................... 13
TASK 5: CONFIGURE ACCESS CONTROL SETTINGS ............................................................... 14

LAB 4.2: CONFIGURE MICROSOFT ISCSI INITIATOR ............................................... 15

TASK 1: ENABLE THE ISCSI SERVICE ON THE CLUSTER.......................................................... 15


TASK 2: CREATE A MICROSOFT LOGICAL UNIT ................................................................... 16
TASK 3: BIND THE TARGET ............................................................................................ 16
TASK 4 ADD INITIATORS TO THE INITIATOR ACCESS LIST ON THE CLUSTER ............................... 16

LAB 5.1: VIEWING MAC BASED ALTERNATE DATA STREAMS (ADS)....................... 18

TASK 1: LOG INTO THE DATA CLUSTER ............................................................................. 18


TASK 2: VIEW THE DATA FILES ON THE CLUSTER ................................................................. 20

LAB 6.1: CONFIGURE INSIGHTIQ ........................................................................... 21

TASK 1: ACTIVATE INSIGHTIQ VIA COMMAND LINE ............................................................ 21


TASK 2: CONFIGURE THE LOCAL INSIGHTIQ USER ACCOUNT ................................................. 21
TASK 3: CONFIGURE THE INSIGHTIQ ADMINISTRATOR ACCOUNT ........................................... 22
TASK 4: CONFIGURE NETWORK SETTINGS ........................................................................ 22

2
TASK 5: LOGIN AND ACCEPT THE END USER AGREEMENT .................................................... 23
TASK 6: CONFIGURE THE INSIGHTIQ DATA STORE .............................................................. 24
TASK 7: ADD A CLUSTER ............................................................................................... 25
TASK 8: ENABLE AND CONFIGURE FSA ............................................................................ 25

LAB 6.1 MONITORING WITH INSIGHTIQ ............................................................... 27

TASK 1: INITIATE A CONNECTION TO THE INSIGHTIQ VIRTUAL APPLIANCE ................................ 27


TASK 2: MOST ACTIVE CLIENTS....................................................................................... 27
TASK 3: NETWORK TRAFFIC ........................................................................................... 27
TASK 4: DISK MONITORING .......................................................................................... 28
TASK 5: DATA USAGE .................................................................................................. 28
STUDY QUESTIONS ...................................................................................................... 29

CASE STUDY 1: SMARTCONNECT & SMARTPOOLS ................................................ 30

CASE SUMMARY ......................................................................................................... 30


SUPPORT MATERIALS – ADMIN CLASS............................................................................. 30
TASKS TO BE PERFORMED:............................................................................................. 30

CASE STUDY 2: DISASTER RECOVERY .................................................................... 34

CASE SUMMARY ......................................................................................................... 34


SUPPORT MATERIALS – ADMIN CLASS............................................................................. 34
TASKS TO BE PERFORMED:............................................................................................. 34

CASE STUDY 3: VIRTUALIZATION ON STORAGE EXPANSION ................................. 36

CASE SUMMARY ......................................................................................................... 36


SUPPORT MATERIALS – ADMIN CLASS............................................................................. 36
CONSIDERATIONS AND DISCUSSION ................................................................................ 36

3
Lab Configuration
This lab manual contains the information and instructions needed to perform the lab tasks during this class.

Terminal Emulation Software


The labs require each client PC to have terminal emulation software installed—for example, Windows HyperTerm,
PuTTY, or SecureCRT. If you do not have this software, the instructor can provide it.

Demo Content
Some of the labs require demonstration files, which you will use for doing sample reads and writes on the cluster.
These files are on the desktop in the Demo Content folder.

User Accounts and Access


The following table contains a full list of the user accounts and passwords that are used by the students during class
using remote login

Username Password
root or admin (Isilon cluster web user Isilon2
interface)
root (Isilon cluster SSH interface) Isilon2
administrator (Windows server—this is both Isilon2!
local and domain login)
root (Linux server) Isilon2
Win Client\student Isilon2

IP Addresses
Use the following IP addresses for these labs and Domain name of Isilon.training.com.

Computer IP Address
WinServer 192.168.0.201
Linux Server 192.168.0.202
WinClient 192.168.0.211
Linux Client 192.168.0.212
Node external IP addresses 192.168.0.11-16
SmartConnect Service IP 192.168.0.100
Insight IQ Client (Live) 192.168.0.221
Insight IQ Demo 192.168.0.222

4
Lab 0.1: Access the VDC
Introduction
You perform Isilon Administration Training labs in the EMC Virtual Data Center (VDC) using Windows and Linux virtual
machines (VMs). VMs emulate client PCs and backup servers.

Note: Use Internet Explorer® (IE) as your browser for these labs.

Obtain Login Information


From your instructor, obtain the following information if you haven’t already received it:

 VDC username and password: __________________________________


 VM configuration name: __________________________________
 Lab information sheet: __________________________________

Log into VDC and the VMware vCenter


Step Action

1 Open Internet Explorer. In the address bar, type https://vdc.emc.com.

2 a. In the EMC2 Education Services Virtual Data Center page, in the User Name box,
type your assigned VDC user name.
b. In the Password box, type the password for the VDC account, and then click Login.
3 Click Virtual Lab Manager. The VMware vCenter Lab Manager 4.0 displays.

4 a. If this is the first time you are running the lab, click Yes to accept the Citrix License
Agreement.
b. Allow the Citrix Web client installation to continue until the Security Warning
dialog box displays, and then click Install.
5 a. In the User name box, type your assigned VDC user name.
b. In the Password box, type the password for the VDC account.
c. Click Login.

5
Clone VM Template Copy
Step Action

1 In the VMware vCenter Lab Manager, in the left-hand navigation pane, under Build and Deploy,
click Library.
2 Hover over the configuration name assigned by your instructor, and then click Clone to
Workspace.
3 In the Clone to Workspace dialog box, click New Configuration.

4 a. In the Name box type your name then append VM to the end of your name. For example, type
JohnSmithVM.
b. Leave the other options at their default settings.
5 In the Create a Linked Clone of section, click Selected Virtual Machines.

6 On the list of available virtual machines, select the LinuxClient and WinClient checkboxes and
then click OK. The configuration is cloned and displays in your workspace.
7 On the left side navigation pane, click Workspace to view your cloned VMs.

8 Under Consoles, hover the mouse over the configuration name of your VM, and then click Deploy
with defaults.
9 After status changes to Deployed, click the WinClient console.

10 On the top of the page, click Remote Desktop.

11 In the File Download dialog box, click Open.

12 Within the Remote Desktop Console connection, at the Windows login screen, click Other User.

13 a. In the Username box, type student.


b. In the Password box, type Isilon2, and then click the login (right arrow) button.

6
Lab 0.2: Configure the Lab Environment
In this lab you configure the basic settings you need to complete the remaining labs in this course. You join the cluster
to a Windows 2008 Active Directory (AD) domain and join the WinClient computer to the domain. You also configure
SmartConnect to provide name resolution for your cluster .

Task 1: Join the cluster to Active Directory


Only one student per cluster can perform this task.

Step Action
1 Open a web browser and type the web administration interface URL for your cluster.
2 In the User name box, type Admin. In the Password box, type Isilon.
3 Expand the File Sharing menu, point to Authentication Sources, and then click Active Directory.

4 In the Server Mode section, click Domain Mode.


5 In the DNS domain box, type in Isilon.training.com.

6 In the Domain account username box, type administrator.


7 In the Domain account password box, type Isilon2.
8 Click Submit.
A Join Active Directory Domain window displays. Joining the domain may take several minutes.
When your node has successfully joined the domain, a message displays SUCCESS: Domain join
complete.
9 Click OK. Minimize the web administration interface window.

Task 2: Check the domain join status


Each student can perform these steps. It may take up to 10 minutes for the join process to complete.

Step Action
1 On the desktop, double-click PuTTY.
2 In the Host Name field, type 192.168.0.11 (the IP address of Node 1 of your cluster), and then click
Open.
3 If needed, at the PuTTY Security Alert, click Yes.
4 At the login as prompt, type root, and then press ENTER.
At the password prompt, type Isilon, and then press ENTER.
5 To verify you have joined the domain, type isi auth ads status and then press ENTER.
6 In the output of the command, verify that the ADS status is reported as online. Additional
information that tells you the cluster is properly joined to the domain includes the display of the
domain controller.

7
Task 3: Join your nodes and configure SmartConnect
Choose one student per cluster to complete this task.

Action

1 Open the web administration interface using the root account.


Note that on the Status page, all the nodes are preconfigured on this cluster.
2 Expand the Cluster menu, and then click Networking.
3 On the Networking page, in the Subnets section, click subnet0.
4 Next to Settings, click Edit.
5 In the SmartConnect service IP box, type 192.168.0.100.
6 Click Submit.

Task 4: Create an individual IP address pool


The student will create two SmartConnect Zones named Lab1pool and Lab2pool, one for SMB connectivity, the other
for NFS connectivity, each with a different IP address range.

Step Action

1 Open the web administration interface and log on using the admin account.
2 Expand the Cluster menu, and then click Networking.
3 In the Subnets section, click subnet0.
4 On the Edit Subnet page of subnet0, in the IP Address Pools section, next to SmartConnect
settings, click Edit.
5 In the SmartConnect Basic section, in the Zone name box, type cluster.isilon.training.com.
6 In the Description box, type a useful description for this pool.
7 In the Connection policy box, leave the default setting of Round Robin.
8 Expand the SmartConnect service subnet list, and then click subnet0.
9 In the SmartConnect Advanced section, in the IP allocation method box, leave the default
value of Static. The Rebalance policy and the IP failover policy are not available.
10 Click Submit

8
Task 4: Create needed DNS records
In this task, you create two DNS records on a Microsoft DNS server, a host record for the SmartConnect
Service and an NS (Delegation) record that defines what you want to call your cluster.

Step Action
1 From Virtual Lab Manager, in your workspace, open the Windows Server VM,
1

2 a. In the Windows Security dialog box, click Use another account.


b. To log into the domain, in the User name box, type Isilon\administrator.
c. In the Password box, type Isilon.
3 On the desktop of the Windows Server, click Start, click Administrative Tools, and then click
DNS.
4 A small tree view displays in the left hand pane.
Expand WINSERVER and then expand Forward Lookup Zones.
5• Click isilon.training.com to display DNS information in the right side details pane.
6 In the right side details pane, right-click, and then click New Host.
7 In the New Host dialog box, in the Name box, type sip.
8 In the IP address box, type the SmartConnect Service IP address, 192.168.0.100, and then
click Add Host.
9 A message displays confirming that the new hast record was successfully created. Click OK,
and then click Done.
10 In the right side details pane of the isilon.training.com, right-click, and then click New
Delegation.
11 In the New Delegation Wizard, click Next.
12 In the Delegated Domain box, type cluster, and then click Next.
13 Below the Name Servers box, click Add, and then click OK.
14 Click Next on the Name Servers page, and then click Finish.

9
Task 6: Verify the SmartConnect Service IP address
Let’s complete this task.

Step Action

1 To open a command prompt, on the WinClient desktop, click Start, click All Programs, click
Accessories, and then click Command Prompt.
2 At the prompt, type nslookup cluster. Note the IP address that is returned.
3 Use the up arrow to run the nslookup cluster command again. Note the IP address that is returned.
4 At the prompt, type ping cluster. Note the IP address that is returned.
5 Use the up arrow to run the ping cluster command again. Note the IP address that is returned.
6 Use the up arrow to run the ping cluster command a third time. Note the IP address that is
returned. Minimize Command Prompt.
7 On the WinClient desktop, open a browser window. In the address bar, type https://cluster:8080.

10
Lab 4.1 Configure iSCSI Cluster Storage
In this lab, students enable the iSCSI service on the cluster and configure the service to work in Windows.

Task 1: Enable the iSCSI service on the cluster


You must have a valid license key to enable iSCSI. After you purchase and then install the license, the iSCSI service is
automatically enabled. In this lab the iSCSI license key is provided by the instructor.

Step Action
1 From your laptop, access and log on to the Windows client.
2 On the Windows client, open a browser.
3 In the browser address field, type https://<IP address of the first node of the cluster>:8080. For
example, https://192.168.0.11:8080. Then press ENTER.
4 Log on to the web administration interface using the admin account.
5 Expand the Help menu, point to Versions and Licenses. The Versions and Licenses page
displays.
6 On the Versions and Licenses page, next to Licensed Modules, click Activate license. The
Activate License page displays.
7 In the License key box, type the iSCSI license key received earlier from your instructor.
8 At the bottom of the page, agree to the EULA and then click Submit. The Versions and Licenses
page displays.
9 Verify that the iSCSI module is shown as either Active or Evaluation.
10 Expand the File System menu, point to iSCSI, and then click Settings. Note that the iSCSI service
is shown enabled.

Note: You can also install the iSCSI license at the command line using the Isi license activate LicenseKey then press
ENTER. If you performed this task correctly, the End User License Agreement page displays.

11
Task 2: Configure the iSNS client service
The Internet Storage Name Service (iSNS) client service is used by iSCSI initiators for target discovery. The settings
configured in this task are applied globally to all nodes in the cluster. A cluster administrator cannot modify these
settings for individual nodes.

Step Action

1 If you are not performing this task immediately after Task 1, then perform this step; otherwise skip
ahead to step 2:
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://<IP address of the first node of the cluster>:8080. For
example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
d. Expand the File System menu, point to iSCSI, and then click Settings.
2 In the iSNS Client Service section, in the iSNS server address box, type the IP address of the iSNS
server on your Windows 2008 R2 server.
3 In the iSNS server port box, leave the default port of 3205.
4 Click Test connection to validate the iSNS configuration settings. The Connection to iSNS server
succeeded message displays to confirm the configuration was successful. If you receive an error,
check the IP address and port.
5 Click Submit. A message displays informing you the iSCSI settings have been updated.

Task 3: Create an iSCSI target


Targets are required as container objects for logical units.

Step Action

1 If you are not performing this task immediately after Task 2, then perform this step; otherwise skip
ahead to step 2.
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://<IP address of the first node of the cluster> :8080.
For example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
2 Expand the File System menu, point to iSCSI, and then click Targets & Logical Units. The Targets &
Logical Units page displays.
3 On the Targets & Logical Units page, in the Targets section, click Add target. The Add Target page
displays.
4 On the Add Target page, in the Name box, type studentX-wintraining-target where X is your
student number.
5 In the Description box, type a detailed description for this target.
6 In the Default path box, type /ifs/iscsi as the directory where LUN directories are created.
Note: The directory must be within the /ifs directory tree.

12
Step Action

7 Do not change the default value (Using static IP pool) for SmartConnect pools.
8 Click Submit. The Edit Target page displays.
9 On the Edit Target page, click Submit. The new target displays in the Targets section of the iSCSI
Targets & Logical Units page.
10 Create a second target by following steps 2 – 9. In step 4 name the second target studentX-
linuxtraining-target.

Task 4: Create a logical unit


As part of creating a logical unit, students configure the target assignments, LUN value, LUN directory path, LUN size,
data protection level, provisioning policy, access state, write access, write caching, and access pattern settings.

Step Action
1 If you are not performing this task immediately after Task 3, then perform this step; otherwise skip
ahead to step 2:
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://<IP address of the first node of the cluster> :8080.
For example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
2 In the Logical Units section, click Add logical unit link. The Add Logical Unit page displays.
3 On the Add Logical Unit page, in the Description box, type a detailed description of this logical
unit.
4 Expand the Target list, and then click the target you created earlier in Task 3.
5 In the LUN number section, leave Automatic selected. Let the system control the enumeration.
6 In the Path box, accept the default path. This path will be /ifs/iscsi/<auto>.
7 In the Size box, type 500, expand the list, and then select MB.
Note: After a logical unit is created, it can be increased its size, but cannot be decreased.
8 In the Provisioning section, leave Thin provision selected. The system will grow the LU as needed
to the maximum size.
9 In the LUN access section, leave Online selected to make the LUN accessible.
10 In the Write access section, leave Read-Write selected to enable iSCSI initiators to write to this
LUN.
11 In the Protection Settings section, in the Disk Pool box, leave ANY selected.
12 In the SSD Strategy section, accept the default of Metadata acceleration.

13
Step Action
13 In the Protection level list, leave Use iSCSI default (2x) selected. In most cases, 2x (mirrored)
protection will result in better performance since parity reads aren’t required during the write
process. However, if your workflow is primarily reads, then 2x protection won’t provide as much
benefit. Additionally if space is a primary concern then you may be willing to sacrifice some write
performance to free up space.
Setting 2X protection on a LUN may fail if the global setting for FlexProtect is different than 2X
(mirrored). You can change the individual protection for a Logical Unit as needed.
14 In the I/O Optimization Settings section, in the SmartCache box, leave Disabled selected.
15 In the Data access pattern section, leave Random selected
16 Click Submit. The Targets & Logical Units page displays.
17 On the Targets & Logical Units page, verify in the Logical Units section that a target LUN has been
created.
18 Follow steps 2 -17 to create a LUN for the studentX-linuxtraining-target.

Task 5: Configure access control settings


You can configure access control settings to specify which initiators are allowed to connect to a target.

Step Action
1 If you are not performing this task immediately after Task4, then perform this step; otherwise skip
ahead to step 2:
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://, the IP address of the first node of the cluster, and
:8080. For example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
2 Expand the File System menu, point to iSCSI, and then click Targets & Logical Units. The Targets &
Logical Units page displays.
3 On the Targets & Logical Units page, in the Targets section, under Actions, click Edit for the
wintraining target you created in Task 4. The Edit Target page displays.
4 On the Edit Target page, in the Initiator Access Control section, if it is not already selected, click
Disable. This allows uninhibited access. This can be changed as desired.

14
Lab 4.2: Configure Microsoft iSCSI Initiator
Students perform this lab on the Microsoft server.

Task 1: Enable the iSCSI service on the cluster


Step Action
1 From your laptop, open a remote desktop connection to the Windows server.
2 On the server logon page, click Other User.
3 Log on to the server using these credentials:
Username: Isilon/Administrator
Password: Isilon2!
Note that the password for this user is slightly different from the other passwords.
4 On the Windows server, click Start, point to Administrative Tools, and then click iSCSI Initiator.
5 In the Microsoft iSCSI dialog box, click Yes to start the iSCSI service and to change the startup
type to automatically start when the server is rebooted.
6 In the iSCSI Initiator Properties dialog box, on the Targets tab, type the IP address of the
SmartConnect IP address of your Isilon cluster into the Target box, and then click Quick
Connect.
7 In the Quick Connect dialog, highlight the wintraining target and click Connect.
8 In the Quick Connect dialog box, in the Progress report section, after the Login Succeeded.
message is displayed, click Done.
9 In the iSCSI Initiator Properties dialog box, click the Discovery tab.
10 On the Discovery page, in the iSNS Servers section, click Add Server.
11 In the Add iSNS Server dialog box, type the IP address of the Windows 2008 R2 Server on which
you are working, and then click OK.

12 In the iSNS Firewall Configuration dialog box asking whether you want to unblock the Microsoft
iSCSI service so it can communicate through the firewall, click Yes.
13 In the iSCSI Initiator Properties dialog box, click the Favorite Targets tab.
14 On the Favorite Targets page, in the Favorite Targets section, verify that the iSCSI initiator listed
is the one that you added to the iSCSI Initiator Access list in the previous lab.
15 Click Details to view the properties of the iSCSI initiator, and then click OK.
16 In the iSCSI Initiator Properties dialog box, click the Volumes and Devices tab.
17 On the Volumes and Devices page, click Auto Configure.
After the Volume/mount point/device box populates with a value, click OK

15
Task 2: Create a Microsoft logical unit
Step Action
1 On the Windows server, click Start, right-click Computer, and then click Manage.
2 In the Server Manager, in the left side navigation pane, expand the Storage node, and then click
Disk Management.
3 In the Disk Management pane, right click Disk 1, and click Initialize Disk.
4 In the Disk Management pane, right click Disk 1, and click Online.
5 In the Disk Management pane, right click Disk 1, and click New Simple Volume.
6 In the New Simple Volume Wizard, on the Welcome page, click Next.
7 On the Specify Volume Size page, in the Simple volume size in MB box, type 497, and then click
Next.
8 On the Assign Drive Letter or Path page, expand the Assign the following drive letter list, and
then click E. Click Next.
9 On the Format Partition page, click Format the volume with the following settings
10 Leave the default settings in the File system .
Select 8192 for Allocation unit size.
In the Volume label box, type a descriptive name, and then click Next.
11 On the Completing the New Simple Volume page, click Finish.

Task 3: Bind the target


Step Action
1 On the Windows server, click Start, point to Administrative Tools, and then click iSCSI Initiator.

2 In the iSCSI initiator Properties dialog box, click the Volumes and Devices tab.
3 Click Auto Configure, and then click OK.

Task 4 Add initiators to the Initiator Access list on the Cluster


Currently, no initiators are allowed to connect to this target.

Step Action
1 Open the Administration UI and log on using the admin account.
2 Expand the File System menu, point to iSCSI, and then click Targets & Logical Units.
3 On the Targets & Logical Units page, in the Targets section, under Actions, click Edit for the
target you created previously in this lab.
4 On the Edit Target page, in the Initiator Access Control section, click Add initiator.
5 In the Add Allowed Initiator dialog box, next to the Initiator name box, click Browse.
6 In the Select initiator dialog box, click the name of the initiator, and then click OK

16
Step Action
7 Click OK.

17
Lab 5.1: Viewing MAC based Alternate Data Streams (ADS)
The Mac Classic operating system used four-character codes Creator Signatures and File Types to keep track of which
application should be used to open specific files and what type of files applications could open. A unique creator
signature was assigned to every application and any file could store a creator code in its resource fork (._file name).
The OS maintained a database of which creator codes matched which applications, so that when the user double-
clicked a file, the OS would look up the creator code in its database and launch the proper application. Then when Mac
OS X came along it had the ability to determine appropriate applications for launching files by looking at the file's
extension, as had been done in the DOS, UNIX and Windows world for years along with the MAC Classic way of using
the Creator Signatures and File Types . In this lab, students will look at ADS files (resource forks) and view the
information inside these files.

Task 1: Log into the data cluster


Step Action
1 Establish a secure shell connection into the cluster using the root user account and password.
2 Map a Windows volume to \\10.9.44.91\ifs\data\ADS\. This volume contains the various file
types for ADS inspection.
3 Map another Windows volume to \\10.9.44.91\ifs\data\alternatestreams\. This volume contains
various file executables with which you can perform the ADS inspection.
4 You will run the various executables in step #3 on step #2. So for example if step 2 gave you the T
drive and step 3 gave you the S drive, then the executables will be on the S drive and the reference
data files are on the T drive.

18
The Creator Signatures for OS X Mac ADS.
Creator Signatures Creator Signatures
Adobe Reader 'CARO' iTunes 'hook'
Any Application 'APPL' SimpleText 'ttxt'
Unknown application '????' Revolution 'Revo'
BBEdit 'R*ch' TextWrangler '!Rch'
TextMate 'TxMt' Photoshop '8BIM'
GraphicConverter 'GKON' QuarkXpress 'XPR3'
WordPerfect Mac 'WPC2' MS Excel 'XCEL'
MS Word 'MSWD' Stuffit Expander 'SITx'
TextEdit 'EDIT' InDesign 'InDn'
Preview 'prvw' Safari 'sfri'
Firefox 'MOZB' Garage Band 'band'
Keynote 'keyn' Pages 'page'
Numbers 'NMBR' iWeb 'iweb'
Dreamweaver 'DmWr' NeoOffice 'NO%F'
Real Player 'PNst'

The File Type Codes for OS X MAC ADS.


File Type Codes File Type Codes
text file 'TEXT' PDF 'PDF '
QuickTime movie 'MooV' MPEG video 'MPG '
MPEG2 movie 'MPG2' MPEG-4 video 'M4V '
MP3 audio file 'Mp3 ' Revolution stack 'RSTK'
HyperCard stack 'STAK' GIF file 'GIFf'
PNG file 'PNGf' JPEG file 'JPEG'
BMP file 'BMPf' TIFF image 'TIFF'
EPS file 'EPSF' Photoshop PSD '8BPS'
Mac PICT image 'PICT' MIDI music file 'Midi
QuarkXpress document 'XDOC' WordPerfect Mac 'WPD1'
MS Excel worksheet 'XLS ' MS Word 'WDBN'
MS PowerPoint 'PPT3' Stuffit archive 'SIT!'
RTF files 'RTF ' Mac snd resource 'snd '
Windows WAV file 'WAVE' AIFF file 'AIFF'
µ-law sound file 'ULAW' Generic binary file 'BINA'
TrueType font 'tfil' Finder 'FNDR'
Flash file 'SWFL'

19
Task 2: View the data files on the cluster
Step Action

1 The file called “strmext.dll” allows you to look at alternate data streams. This file can be installed on
your personal XP, Vista or Windows 7 Laptop.
To install on your Windows 7 laptop:
a. Copy the file strmext.dll in your X:\Windows\System32\ directory where X is the drive your
Windows installation directory.
b. For 64-bit systems place the file strmext.dll in your X:\Windows\SysWOW64\ directory where X is
the drive your Windows installation directory.
c. Click the Start button, click Run, then type regsvr32 C:\Windows\System32\StrmExt.dll or for 64
bit systems, type C:\Windows\SysWOW64\StrmExt.dll.
d. The system will register the DLL and now you can see if a file has ADS. We have seen 64 bit systems
not work sometimes.
If you are using Windows XP you must add two new registry keys:
HKEY_CLASSES_ROOT\Directory\shellex\PropertySheetHandlers\{C3ED1679-814B-4DA9-AB00-
1CAC71F5E337}
HKEY_CLASSES_ROOT\Drive\shellex\PropertySheetHandlers\{C3ED1679-814B-4DA9-AB00-
1CAC71F5E337}
2 To enable the Edit Streams and Create Hard Link buttons from the tab you must copy RWStream.vbs
and HardLinks.vbs into the %SystemRoot%\System32 directory.
3 A useful command based tool is lads.exe. This tool will display files with alternate data streams.
4 After you determine that a MAC file has ADS (notice the AFP_AfpInfo, for Appletalk File Protocol), you
can figure out what application calls it from the two tables above using this command.
5 To see what is in the ADS file you could use the more command as in this example:
more < T:Recording-qt7.mov:AFP_AfpInfo > S:stream1.doc
6 Edit the file with Wordpad and view the information. Notice the format of the file. What are the
Creator Signatures and File Text Codes? CS=____________ FTC=______________
7 The ADSLocater.exe will browse the T: directory and output your ADS files. When you select a file the
Save stream too… highlights.

8 You can save the stream to a file such as: X:stream2.doc.


9 Edit the file with Wordpad and view the information. Notice the format of the file.
What are the Creator Signatures and File Text Codes? CS=___________ FTC=________________
What differences do you see?
10 Repeat either procedure for a few files and notice their Creator Signatures and File Text Codes.
11 Feel free to copy any of these to your personal system using the same 10.9 IP Address above.
You do not need to perform Step 2d to register the DLL for Vista or W7.

20
Lab 6.1: Configure InsightIQ
In this lab, you will install and license InsightIQ, then run it on various scenarios.

Task 1: Activate InsightIQ via command line


Your instructor will give you a license key for InsightIQ . Use this key to activate InsightIQ on your training cluster.

Step Action
1 From the Windows client, establish a secure shell (SSH) connection to the first node of your
training cluster. Use the IP address handed out earlier by your instructor and append the port
number 8080 to the address
(e.g. 192.168.0.11:8080).
2 Log on to the node as root. Then launch a command prompt.
3 At the command prompt, type isi license activate KEY, where KEY is the InsightIQ license key
provided by your instructor. Press ENTER.
4 If necessary, press the SPACE bar repeatedly to scroll through the eleven paragraphs of the
license agreement (EULA). After the agreement is displayed, type yes to agree to the terms of
the EULA. If successful, the screen displays InsightIQ has been successfully activated.
5 At the command shell prompt, type isi license status to confirm that InsightIQ is activated.
6 Close the connection to the node by typing logout.

Task 2: Configure the local InsightIQ user account


InsightIQ connects to the monitored cluster as a local user of the monitored cluster.

Step Action
1 From the Windows client, start a browser.
2 In the browser address bar, type https://IP Address:8080 where IP Address is the IP address of a
node on the training cluster, e.g. https://192.168.0.11:8080.

3 Log on to the OneFS web administration interface.


4 On the File Sharing menu, point to Authentication Sources, and then click Local Users. The
Local Users page appears.

5 In the list of local users, click insightiq.


The Modify Local User page displays.

6 In the Password and Confirm password boxes, type the password that you want to assign to
the local user.
Make a note of this password; you will need to type it later in the InsightIQ web application.

7 Select the Enabled check box to enable this local user account.
8 Click Submit, and then log out from the OneFS web administration interface.

21
Task 3: Configure the InsightIQ administrator account
You must configure an InsightIQ administrator account. The InsightIQ administrator has all privileges to view and
modify InsightIQ configuration settings.

Step Action
1 Open the VMware console for the InsightIQ virtual appliance. The VM starts, and then the
isilon-insightiq login prompt appears.
2 At the login prompt, type administrator and then press ENTER.
A password prompt appears.
3 At the password prompt, type default and then press ENTER.
The (current) UNIX password prompt appears.
4 Type default (the current password) and then press ENTER.
The Enter new UNIX password prompt appears.
5 Type the password that you want to configure for the administrator account and then press
ENTER.
The password must be at least one character long. This is the password that you will use to log
in to the web-based InsightIQ application and the InsightIQ VM console.
6 The Retype new UNIX password prompt appears.
Retype the password that you configured in the previous step, and then press ENTER.
7 Welcome text displays. At the password for administrator: prompt, type the new password
that you previously specified for the InsightIQ administrator, and press ENTER.
8 The system displays a DHCP-generated IP address, the InsightIQ Configuration Wizard starts,
and the Wizard prompt displays: Wizard >>>.

Important: If you want to run InsightIQ in DHCP networking mode, make a note of the DHCP-
generated IP address that appears; you will later need to enter this address in a web browser to
access the InsightIQ application. If you want to configure networking settings manually, you can
disregard the DHCP-generated IP address.

Task 4: Configure Network Settings


In this task you will configure the network environment as required. InsightIQ by default in installed using DHCP
mode. You can, however, specify a static IP address for the InsightIQ virtual appliance. Use of a static IP
addressing configuration is in fact recommended, since an IP address lease can expire without warning, which
may cause operational and quality of service problems. Using dynamic addressing is useful when setting up
InsightIQ for the first time, but in practice changing the way the IP address of the IIQ virtual appliance is
obtained should be changed from dynamic mode to static mode as soon as practicable.
Step Action

22
Step Action
1 At the Wizard prompt perform one of the following steps:
To configure networking manually, follow the prompts to the Configure networking and
Configure networking manually pages, and then proceed to step 3 below.

To configure InsightIQ to run in DHCP networking mode (the default method), use the DHCP-
generated IP address that you recorded in the previous step, follow the prompts to exit the
wizard, do not perform step 3 in this task, and continue to Task 6, Login and accept the End User
Agreement. Your instructor will direct you to accept DHCP mode or to manually configure
InsightIQ.

After you exit the wizard, the isilon-insightiq login prompt appears.
Exit the VMware console.

2 In the previous step, if you selected the Configure networking manually option, perform the
following steps:
a. Follow the prompts to configure a netmask (255.255.255.0) for the InsightIQ virtual
appliance.
b. Follow the prompts to configure the IP address (assigned earlier) that you want to use to
access the InsightIQ virtual appliance. Make a note of this IP address; you will need to enter
this address in a web browser each time you access the InsightIQ application.
c. Follow the prompts to configure a default gateway (assigned earlier) for the InsightIQ
virtual appliance.
d. Follow the prompts to configure one or more DNS servers for the InsightIQ virtual
appliance.
e. Follow the prompts to configure one or more search domains (Isilon.training.com) for the
InsightIQ virtual appliance.
f. Commit your settings, exit the wizard, and then quit the VMware console.

Task 5: Login and accept the End User Agreement


In this task, a new installation of InsightIQ requires that if you are logging in for the first time, you must accept or
decline the End User License Agreement (EULA).

Step Action

1 In a supported web browser, connect to the InsightIQ application at http://ipaddress or host


name, where ipaddresss or host name is either the IP address or the host name for the
InsightIQ virtual appliance. Use the IP address noted earlier.
The InsightIQ application login page appears.
Note: If you had wanted to connect to the InsightIQ application by a host name, you must first
have configured a host name for the specified IP address in DNS.
2 Log in to the InsightIQ application with the user name administrator and the administrator
password that you specified earlier.
The one-time InsightIQ EULA page appears.

23
Step Action

3 Review the EULA, and click I have read and agree to..., and then click Submit.
The Welcome to InsightIQ page appears.

Task 6: Configure the InsightIQ data store


In this task you have the option of configuring a local or NFS data store. The local data store option is included by
default with the InsightIQ virtual appliance. If you want to place a data store an Isilon storage cluster or on an NFS-
mounted server, you can specify the cluster or server in this task.

Step Action
1 If you want to use the InsightIQ appliance local data store:
 In the NFS server box, do not type anything.
 In the Data store path box, type /datastore.
 Go to step 3.
2 If you are specifying storing the data store on an Isilon cluster or on an NFS server:
 In the NFS server box, type the host name or IP address of the server or Isilon cluster
on which you want to store collected performance data.
 In the Data store path box, type the absolute path, beginning with a slash mark (/), to
the directory on the server or cluster where you want the collected data to be stored.
This field must contain only ASCII characters.
3 Click Submit. The Add Cluster dialog box appears.

24
Task 7: Add a cluster
In this task, you will specify an initial cluster to monitor. While you will identify the cluster by an IP address or a host
name in this lab, alternatively you could specify the name of a SmartConnect zone.

Step Action
1 In the Add Cluster dialog box, click I want to monitor a new cluster.
2 In the Isilon cluster box, type the host name or IP address of any node in the cluster that you
want to monitor.
3 In the Username box, type the user name for the corresponding local user on the monitored
cluster. For a monitored cluster running OneFS 6.0 or later, type insightiq .
4 In the Password box, type the local InsightIQ user's password exactly as it is configured on the
monitored cluster.
5 Click OK. The cluster is added to the list of monitored clusters

Task 8: Enable and configure FSA


In this task, you will enable and then configure the File System Analytics feature of InsightIQ.

Step Action
1 On the Settings menu, click Monitored Clusters.
The Monitored Clusters page appears and displays a list of all clusters that InsightIQ is
configured to monitor.
2 For the cluster whose File System Analytics settings you want to configure, in the Actions
column, click configure. The Cluster Configuration page appears.
3 Click Enable FSA. The File System Analytics Job Control page appears.
4 You must enable the File System Analytics feature in order to view chart information in the
Data Usage and Data Properties views. Enable the File System Analytics feature by selecting
the Enabled check box and then clicking Submit.
5 Click FSA Configuration. The File System Analytics Job Settings page appears.
6 Configure the Result Set Options settings:
a. In the Directory chart maximum depth box, type an integer that represents the maximum
depth of the directories that you want InsightIQ to analyze. To specify an unlimited depth,
type -1.
b. In the File/directory list size box, type an integer that represents the maximum number
of top-contributing files and directories to list in the InsightIQ Data Usage view.
c. In the Path squash depth box, type an integer that represents the maximum number of
directory levels to include in a path.

25
Step Action
7 Configure Result Set Retention settings:
a. In the Maximum result set age in days box, type an integer that represents, in days, how
long to retain each data set before automatically deleting it. To retain data sets
indefinitely, type 0 . You can manually delete a data set at any time.
b. In the Maximum result set count box, type an integer that represents the maximum
number of data sets to retain. To retain an unlimited number of data sets, type 0.
8 Click Submit.

26
Lab 6.1 Monitoring with InsightIQ
In this lab, you will use the Isilon InsightIQ virtual appliance to monitor and analyze your Isilon cluster
performance by viewing the charts that display historical performance data. You will see how the data is
displayed to enable you to view these charts and see detailed information about cluster hardware, software, and
file-system and protocol operations.

Demonstration data has been loaded into the cluster to help you visualize the data.

Task 1: Initiate a connection to the InsightIQ virtual appliance

Step Action

1 From your laptop, open a remote desktop connection to the Windows training client
computer and log into that computer.

2 On the client computer, open the fire fox browser. Type in the IP address of the
InsightIQ VM Client.

3 At the InsightIQ Console welcome screen, type in your credentials - user name
administrator and password a.
The InsightIQ Console displays, showing data from Wednesday, April 20, 2011.

Task 2: Most active clients


Step Action

1 On the InsightIQ Console, click the Overview tab.

2 In the Active Clients bar chart, hover your mouse cursor over the bar representing the qa-
long3 cluster. Note how the bar changes color – hover your mouse over each color and notice
that a popup appears for each separate data element that makes up the bar.

3 Note how many active clients are in each section of bar, and note how the bar is color coded
according to protocol used to connect.

Task 3: Network traffic


Step Action

1 Expand the Performance menu item, then click Network.

2 From the Cluster: dropdown, choose sjcluster-1.

3 In the Filter section click 1h.

27
Step Action

3 Scroll lower in the page to the External Network Packets Rate chart.

4 Locate the packet rate for April 20, 2011 around 9:00 a.m.

5 Under Breakout By in the External Network Packets Rate chart, click Node. Note the node
showing the most traffic.
6 Under Breakout By in the External Network Packets Rate chart, click Interface. Note the
interface with the most traffic.
7 Scroll up to the External Network Throughput chart.

8 Under Breakout By, click Protocol. Note the interface with the most traffic in the time period
shown.
9 Click Operation Class.
Which operation accounted for the most external network traffic on April 20 between 8:50
a.m. and 9:00 a.m.?

Task 4: Disk Monitoring


Step Action

1 Expand the Performance menu item, then click Disk.

2 From the Cluster: dropdown, choose sjcluster-1.

3 In the Filter section, verify that the result set shown is Sun Apr 17 2011 19:07:01 GMT-0400
(Eastern Daylight Time).
4 In the Disk Operations Per Second chart, under Breakout By click Disk.

5 Note which disk recorded the most disk ops per second.

Task 5: Data Usage


Step Action

1 Expand the Analytics menu item, then click Disk Usage.

2 From the Cluster: dropdown, choose qa-long3.

3 In the Filter section, verify that the result set shown is Sun Apr 17 2011 19:07:01 GMT-0400
(Eastern Daylight Time).

4 Navigate to the File Count by Physical Size chart. What file size range encompasses most of
the files on this cluster’s file system?

28
Study Questions
1. Which cluster has the most active clients?
2. In the qa-long3 cluster, how many clients connected to the cluster via SMB? NFS ver3?
3. In the sjcluster-1 cluster, what was the packet rate for the external network 4/20/11 as close as possible to
9:00 a.m.?
4. On the same cluster, on which node and interface is that traffic coming in?
5. Which protocol was using the most traffic between 8:50 am and 9:00 am on April 20?
6. Which operation classes were most responsible for traffic between 8:50 am and 9:00 am on April 20?
7. On the qa-long3 cluster, how many disk operations per second were occurring at 9:00 a.m. on April 20?
8. Which disk on the qa-long3 cluster reported the most disk operations per second?
9. How big (a range) are most of the files on the qa-long3 cluster?

29
Case Study 1: SmartConnect & SmartPools
Case Summary
An existing Isilon customer has a 3-node X-series cluster and just added 3 more X-Series nodes. The media department
(using Mac client computers) works on very large video files and the new nodes are expressly for the media
department’s use and have a higher disk density than their previous nodes. The customer wants only media
department members to access the new nodes and for all media files (including those in the media department
employee’s home directories) to be saved only to the new nodes.

The client has stated the following requirements:


1) The Mac client computers should be configured for the best performance when accessing files.
2) All media files and the media department home directories need to be saved to the new nodes.
3) The rest of the company should access and save their files only to the original X-Series nodes.
4) Archived media files are very important and need to be protected.

Implement a solution using Isilon SmartConnect and SmartPools that satisfies the customer requests.
Hint: The solution should include file access protocol, disk access pattern, file pool policies,
SmartConnect management zones, shares, exports, and mount points.

Support Materials – Admin Class


 Module 3: Networking & SmartConnect
 Module 4: Data Layout & Protection
 Module 5: Cluster & Nodes
 Module 6: Connecting to the Enterprise
 Module 7: Connecting Clients
 Module 13: Smartpools

Tasks to be performed:
1) Which diskpool should the media department use? Which should the rest of the organization use?

_______________________________________________________________________

2) What data layout and protection levels should the media department use as opposed to the rest of the
organization?
_______________________________________________________________________

3) What SmartPool configurations do you need to support these requirements?

_______________________________________________________________________

4) To which nodes do you want users to connect?

_______________________________________________________________________

30
5) What SmartConnect configuration changes are needed to support this?

_______________________________________________________________________

6) Do you need additional licenses?

_______________________________________________________________________

Feature Task
SmartConnect Activate license

Enable SmartConnect Service

SIP:__________________

Create Media department management zone

Zone name: _______________________

IP address range:__________________

IP allocation method:_____________________

Connection policy: _______________________

NFS Failover settings: _______________________

Node and interfaces:________________________________

Create general use zone

Zone name: _______________________

IP address range:__________________

Connection policy _______________________

IP allocation method: _______________________

Node and interfaces

31
Feature Task
Create DNS records

1. SIP host record: ______________________________

2. NS record for MediaOnly zone

3. NS record for GeneralUse zone

Command prompt Nslookup: MediaOnly and GeneralUse

Ping: MediaOnly and GeneralUse

File Sharing Configure NFS exports

Home>>Media>>MediaUser#

Data>>MediaFiles

Create SMB shares

Home >>GeneralUse>>User#

Test access

SmartPools Activate license

Check diskpool membership

Configure Default File Pool Policy for general use

______________________________________________________

Configure file pool policy for all media files to move to most dense diskpool

File pool policy name: _______________________________

File filters: _________________________________________

Diskpool and protection settings: _______________________________

Continue to process or stop processing?

32
Feature Task
Configure file pool policy to save \media files directory and contents to most dense
disk pool
File pool policy name: _______________________________

File filters: _________________________________________

Diskpool and protection settings: _______________________________

Continue to process or stop processing?

Configure diskpools

Data protection level

Disk access pattern

Jobs Run SmartPools job to test file pool policies

Run command: isi job hist -j smartpools -v -l100

Checks:

File locations

Data protection level of files

Test Connect to share and save file

Run SmartPools job

Check File System Explorer for location and data protection level of file

Connect to export and create file

Run SmartPools job

Check File System Explorer for location and data protection level of file

33
Case Study 2: Disaster Recovery
Case Summary
A customer recently purchased and installed an Isilon cluster. They need now to create an overall data protection and
disaster recovery plan for the data that is stored on the cluster. They have a Media department that often needs to
revert to earlier previous versions of files. The customer has mentioned that the one important aspect is compatibility
with their backup software (EMC) and granular levels of recovery due to lost data on their existing storage system that
has happened in the past that caused a complete restore to be done to recover the little amount of data. They
currently have IBM LTO 4 drives stand alone and an HP tape library with LTO 4 drives.

What services and features in an Isilon cluster can help the customer?

Support Materials – Admin Class


 Module 3: Networking & SmartConnect
 Module 4: Data Layout & Protection
 Module 5: Cluster & Nodes
 Module 9: SnapshotIQ
 Module 12: SyncIQ
 Module 13: Smartpools
 Module 14: Backup

Tasks to be performed:
1) What Isilon cluster services could help the customer resolve their issues?

Previous version issue____________________________________________________________

Backup using EMC as vendor______________________________________________________

2) SnapshotIQ : reserve and usage calculations

_______________________________________________________________________

3) SnapshotIQ : auto create and auto delete states

_______________________________________________________________________

4) SnapshotsIQ: schedule and pattern

_______________________________________________________________________

5) SnapshotsIQ: directory and file system snapshot maximum calculations

_______________________________________________________________________

34
6) Shadow Copy Emulation recommendations

_______________________________________________________________________

7) Backup topologies

_______________________________________________________________________

8) Additional NDMP settings?

_______________________________________________________________________

9) Are additional licenses needed?

_______________________________________________________________________

35
Case Study 3: Virtualization on Storage Expansion
Case Summary
A customer is looking to upgrade their storage and maintain their server hardware by using it in a more efficient way.
They have stated they are going to move to VSphere 5 for ease of configuration. Their IT setup is based on DHCP with
24 IP’s for use by the ESX hosts. Each server is to be connected to an NFS mount point. The customer has made it clear
that they do not want any down time from the storage, VMotion will not be used and that the storage must stay
balanced under demanding IO loads.

How would you implement a customer solution using Isilon Clustered storage with multiple VMware ESX hosts using
NFS mounts? Specify what the customer will need in the configuration, mount points, What other cluster services can
assist the customer with their goals?

Support Materials – Admin Class


 Module 3: Networking & SmartConnect
 Module 6: Connecting to the Enterprise
 Module 7: Connecting Clients
 Module 13: Smartpools
 Module 15: Virtualization

Considerations and Discussion


1) Cluster configuration-dedicated to virtualization or multipurpose?

_______________________________________________________________________

2) Additional services needed?

_______________________________________________________________________

3) Is SmartConect needed in this case?

______________________________________________________________

4) Is SmartPools needed in this case?

_______________________________________________________________________

5) NFS mount points, how many?

_______________________________________________________________________

6) What additional licenses are needed?

_______________________________________________________________________

36
37

You might also like