2-Day 6 5 Integration Training Lab Manual
2-Day 6 5 Integration Training Lab Manual
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Use, copying, and distribution of any EMC software described in this publication requires an
applicable software license.
EMC2, EMC, Data Domain, RSA, EMC Centera, EMC ControlCenter, EMC LifeLine, EMC OnCourse, EMC
Proven, EMC Snap, EMC SourceOne, EMC Storage Administrator, Acartus, Access Logix, AdvantEdge,
AlphaStor, ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems, Automated
Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Captiva, Catalog Solution, C-Clip,
Celerra, Celerra Replicator, Centera, CenterStage, CentraStar, ClaimPack, ClaimsEditor, CLARiiON,
ClientPak, Codebook Correlation Technology, Common Information Model, Configuration Intelligence,
Configuresoft, Connectrix, CopyCross, CopyPoint, Dantz, DatabaseXtender, Direct Matrix Architecture,
DiskXtender, DiskXtender 2000, Document Sciences, Documentum, elnput, E-Lab, EmailXaminer,
EmailXtender, Enginuity, eRoom, Event Explorer, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony,
Global File Virtualization, Graphic Visualization, Greenplum, HighRoad, HomeBase, InfoMover,
Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, ISIS, Max Retriever, MediaStor,
MirrorView, Navisphere, NetWorker, nLayers, OnAlert, OpenScale, PixTools, Powerlink, PowerPath,
PowerSnap, QuickScan, Rainfinity, RepliCare, RepliStor, ResourcePak, Retrospect, RSA, the RSA logo,
SafeLine, SAN Advisor, SAN Copy, SAN Manager, Smarts, SnapImage, SnapSure, SnapView, SRDF,
StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX,
TimeFinder, UltraFlex, UltraPoint, UltraScale, Unisphere, VMAX, Vblock, Viewlets, Virtual Matrix, Virtual
Matrix Architecture, Virtual Provisioning, VisualSAN, VisualSRM, Voyence, VPLEX, VSAM-Assist,
WebXtender, xPression, xPresso, YottaYotta, the EMC logo, and where information lives, are registered
trademarks or trademarks of EMC Corporation in the United States and other countries.
All other trademarks used herein are the property of their respective owners.
© Copyright 2011 EMC Corporation. All rights reserved. Published in the USA.
1
Table of Contents
COPYRIGHT ............................................................................................................ 1
INTRODUCTION ............................................................................................................. 5
OBTAIN LOGIN INFORMATION ......................................................................................... 5
LOG INTO VDC AND THE VMWARE VCENTER ..................................................................... 5
CLONE VM TEMPLATE COPY ........................................................................................... 6
2
TASK 5: LOGIN AND ACCEPT THE END USER AGREEMENT .................................................... 23
TASK 6: CONFIGURE THE INSIGHTIQ DATA STORE .............................................................. 24
TASK 7: ADD A CLUSTER ............................................................................................... 25
TASK 8: ENABLE AND CONFIGURE FSA ............................................................................ 25
3
Lab Configuration
This lab manual contains the information and instructions needed to perform the lab tasks during this class.
Demo Content
Some of the labs require demonstration files, which you will use for doing sample reads and writes on the cluster.
These files are on the desktop in the Demo Content folder.
Username Password
root or admin (Isilon cluster web user Isilon2
interface)
root (Isilon cluster SSH interface) Isilon2
administrator (Windows server—this is both Isilon2!
local and domain login)
root (Linux server) Isilon2
Win Client\student Isilon2
IP Addresses
Use the following IP addresses for these labs and Domain name of Isilon.training.com.
Computer IP Address
WinServer 192.168.0.201
Linux Server 192.168.0.202
WinClient 192.168.0.211
Linux Client 192.168.0.212
Node external IP addresses 192.168.0.11-16
SmartConnect Service IP 192.168.0.100
Insight IQ Client (Live) 192.168.0.221
Insight IQ Demo 192.168.0.222
4
Lab 0.1: Access the VDC
Introduction
You perform Isilon Administration Training labs in the EMC Virtual Data Center (VDC) using Windows and Linux virtual
machines (VMs). VMs emulate client PCs and backup servers.
Note: Use Internet Explorer® (IE) as your browser for these labs.
2 a. In the EMC2 Education Services Virtual Data Center page, in the User Name box,
type your assigned VDC user name.
b. In the Password box, type the password for the VDC account, and then click Login.
3 Click Virtual Lab Manager. The VMware vCenter Lab Manager 4.0 displays.
4 a. If this is the first time you are running the lab, click Yes to accept the Citrix License
Agreement.
b. Allow the Citrix Web client installation to continue until the Security Warning
dialog box displays, and then click Install.
5 a. In the User name box, type your assigned VDC user name.
b. In the Password box, type the password for the VDC account.
c. Click Login.
5
Clone VM Template Copy
Step Action
1 In the VMware vCenter Lab Manager, in the left-hand navigation pane, under Build and Deploy,
click Library.
2 Hover over the configuration name assigned by your instructor, and then click Clone to
Workspace.
3 In the Clone to Workspace dialog box, click New Configuration.
4 a. In the Name box type your name then append VM to the end of your name. For example, type
JohnSmithVM.
b. Leave the other options at their default settings.
5 In the Create a Linked Clone of section, click Selected Virtual Machines.
6 On the list of available virtual machines, select the LinuxClient and WinClient checkboxes and
then click OK. The configuration is cloned and displays in your workspace.
7 On the left side navigation pane, click Workspace to view your cloned VMs.
8 Under Consoles, hover the mouse over the configuration name of your VM, and then click Deploy
with defaults.
9 After status changes to Deployed, click the WinClient console.
12 Within the Remote Desktop Console connection, at the Windows login screen, click Other User.
6
Lab 0.2: Configure the Lab Environment
In this lab you configure the basic settings you need to complete the remaining labs in this course. You join the cluster
to a Windows 2008 Active Directory (AD) domain and join the WinClient computer to the domain. You also configure
SmartConnect to provide name resolution for your cluster .
Step Action
1 Open a web browser and type the web administration interface URL for your cluster.
2 In the User name box, type Admin. In the Password box, type Isilon.
3 Expand the File Sharing menu, point to Authentication Sources, and then click Active Directory.
Step Action
1 On the desktop, double-click PuTTY.
2 In the Host Name field, type 192.168.0.11 (the IP address of Node 1 of your cluster), and then click
Open.
3 If needed, at the PuTTY Security Alert, click Yes.
4 At the login as prompt, type root, and then press ENTER.
At the password prompt, type Isilon, and then press ENTER.
5 To verify you have joined the domain, type isi auth ads status and then press ENTER.
6 In the output of the command, verify that the ADS status is reported as online. Additional
information that tells you the cluster is properly joined to the domain includes the display of the
domain controller.
7
Task 3: Join your nodes and configure SmartConnect
Choose one student per cluster to complete this task.
Action
Step Action
1 Open the web administration interface and log on using the admin account.
2 Expand the Cluster menu, and then click Networking.
3 In the Subnets section, click subnet0.
4 On the Edit Subnet page of subnet0, in the IP Address Pools section, next to SmartConnect
settings, click Edit.
5 In the SmartConnect Basic section, in the Zone name box, type cluster.isilon.training.com.
6 In the Description box, type a useful description for this pool.
7 In the Connection policy box, leave the default setting of Round Robin.
8 Expand the SmartConnect service subnet list, and then click subnet0.
9 In the SmartConnect Advanced section, in the IP allocation method box, leave the default
value of Static. The Rebalance policy and the IP failover policy are not available.
10 Click Submit
8
Task 4: Create needed DNS records
In this task, you create two DNS records on a Microsoft DNS server, a host record for the SmartConnect
Service and an NS (Delegation) record that defines what you want to call your cluster.
Step Action
1 From Virtual Lab Manager, in your workspace, open the Windows Server VM,
1
9
Task 6: Verify the SmartConnect Service IP address
Let’s complete this task.
Step Action
1 To open a command prompt, on the WinClient desktop, click Start, click All Programs, click
Accessories, and then click Command Prompt.
2 At the prompt, type nslookup cluster. Note the IP address that is returned.
3 Use the up arrow to run the nslookup cluster command again. Note the IP address that is returned.
4 At the prompt, type ping cluster. Note the IP address that is returned.
5 Use the up arrow to run the ping cluster command again. Note the IP address that is returned.
6 Use the up arrow to run the ping cluster command a third time. Note the IP address that is
returned. Minimize Command Prompt.
7 On the WinClient desktop, open a browser window. In the address bar, type https://cluster:8080.
10
Lab 4.1 Configure iSCSI Cluster Storage
In this lab, students enable the iSCSI service on the cluster and configure the service to work in Windows.
Step Action
1 From your laptop, access and log on to the Windows client.
2 On the Windows client, open a browser.
3 In the browser address field, type https://<IP address of the first node of the cluster>:8080. For
example, https://192.168.0.11:8080. Then press ENTER.
4 Log on to the web administration interface using the admin account.
5 Expand the Help menu, point to Versions and Licenses. The Versions and Licenses page
displays.
6 On the Versions and Licenses page, next to Licensed Modules, click Activate license. The
Activate License page displays.
7 In the License key box, type the iSCSI license key received earlier from your instructor.
8 At the bottom of the page, agree to the EULA and then click Submit. The Versions and Licenses
page displays.
9 Verify that the iSCSI module is shown as either Active or Evaluation.
10 Expand the File System menu, point to iSCSI, and then click Settings. Note that the iSCSI service
is shown enabled.
Note: You can also install the iSCSI license at the command line using the Isi license activate LicenseKey then press
ENTER. If you performed this task correctly, the End User License Agreement page displays.
11
Task 2: Configure the iSNS client service
The Internet Storage Name Service (iSNS) client service is used by iSCSI initiators for target discovery. The settings
configured in this task are applied globally to all nodes in the cluster. A cluster administrator cannot modify these
settings for individual nodes.
Step Action
1 If you are not performing this task immediately after Task 1, then perform this step; otherwise skip
ahead to step 2:
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://<IP address of the first node of the cluster>:8080. For
example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
d. Expand the File System menu, point to iSCSI, and then click Settings.
2 In the iSNS Client Service section, in the iSNS server address box, type the IP address of the iSNS
server on your Windows 2008 R2 server.
3 In the iSNS server port box, leave the default port of 3205.
4 Click Test connection to validate the iSNS configuration settings. The Connection to iSNS server
succeeded message displays to confirm the configuration was successful. If you receive an error,
check the IP address and port.
5 Click Submit. A message displays informing you the iSCSI settings have been updated.
Step Action
1 If you are not performing this task immediately after Task 2, then perform this step; otherwise skip
ahead to step 2.
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://<IP address of the first node of the cluster> :8080.
For example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
2 Expand the File System menu, point to iSCSI, and then click Targets & Logical Units. The Targets &
Logical Units page displays.
3 On the Targets & Logical Units page, in the Targets section, click Add target. The Add Target page
displays.
4 On the Add Target page, in the Name box, type studentX-wintraining-target where X is your
student number.
5 In the Description box, type a detailed description for this target.
6 In the Default path box, type /ifs/iscsi as the directory where LUN directories are created.
Note: The directory must be within the /ifs directory tree.
12
Step Action
7 Do not change the default value (Using static IP pool) for SmartConnect pools.
8 Click Submit. The Edit Target page displays.
9 On the Edit Target page, click Submit. The new target displays in the Targets section of the iSCSI
Targets & Logical Units page.
10 Create a second target by following steps 2 – 9. In step 4 name the second target studentX-
linuxtraining-target.
Step Action
1 If you are not performing this task immediately after Task 3, then perform this step; otherwise skip
ahead to step 2:
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://<IP address of the first node of the cluster> :8080.
For example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
2 In the Logical Units section, click Add logical unit link. The Add Logical Unit page displays.
3 On the Add Logical Unit page, in the Description box, type a detailed description of this logical
unit.
4 Expand the Target list, and then click the target you created earlier in Task 3.
5 In the LUN number section, leave Automatic selected. Let the system control the enumeration.
6 In the Path box, accept the default path. This path will be /ifs/iscsi/<auto>.
7 In the Size box, type 500, expand the list, and then select MB.
Note: After a logical unit is created, it can be increased its size, but cannot be decreased.
8 In the Provisioning section, leave Thin provision selected. The system will grow the LU as needed
to the maximum size.
9 In the LUN access section, leave Online selected to make the LUN accessible.
10 In the Write access section, leave Read-Write selected to enable iSCSI initiators to write to this
LUN.
11 In the Protection Settings section, in the Disk Pool box, leave ANY selected.
12 In the SSD Strategy section, accept the default of Metadata acceleration.
13
Step Action
13 In the Protection level list, leave Use iSCSI default (2x) selected. In most cases, 2x (mirrored)
protection will result in better performance since parity reads aren’t required during the write
process. However, if your workflow is primarily reads, then 2x protection won’t provide as much
benefit. Additionally if space is a primary concern then you may be willing to sacrifice some write
performance to free up space.
Setting 2X protection on a LUN may fail if the global setting for FlexProtect is different than 2X
(mirrored). You can change the individual protection for a Logical Unit as needed.
14 In the I/O Optimization Settings section, in the SmartCache box, leave Disabled selected.
15 In the Data access pattern section, leave Random selected
16 Click Submit. The Targets & Logical Units page displays.
17 On the Targets & Logical Units page, verify in the Logical Units section that a target LUN has been
created.
18 Follow steps 2 -17 to create a LUN for the studentX-linuxtraining-target.
Step Action
1 If you are not performing this task immediately after Task4, then perform this step; otherwise skip
ahead to step 2:
From your laptop, access and logon to the Windows client:
a. On the Windows client, open a browser.
b. In the browser address field, type https://, the IP address of the first node of the cluster, and
:8080. For example, https://192.168.0.11:8080. Then press ENTER.
c. Log on to the web administration interface using the admin account.
2 Expand the File System menu, point to iSCSI, and then click Targets & Logical Units. The Targets &
Logical Units page displays.
3 On the Targets & Logical Units page, in the Targets section, under Actions, click Edit for the
wintraining target you created in Task 4. The Edit Target page displays.
4 On the Edit Target page, in the Initiator Access Control section, if it is not already selected, click
Disable. This allows uninhibited access. This can be changed as desired.
14
Lab 4.2: Configure Microsoft iSCSI Initiator
Students perform this lab on the Microsoft server.
12 In the iSNS Firewall Configuration dialog box asking whether you want to unblock the Microsoft
iSCSI service so it can communicate through the firewall, click Yes.
13 In the iSCSI Initiator Properties dialog box, click the Favorite Targets tab.
14 On the Favorite Targets page, in the Favorite Targets section, verify that the iSCSI initiator listed
is the one that you added to the iSCSI Initiator Access list in the previous lab.
15 Click Details to view the properties of the iSCSI initiator, and then click OK.
16 In the iSCSI Initiator Properties dialog box, click the Volumes and Devices tab.
17 On the Volumes and Devices page, click Auto Configure.
After the Volume/mount point/device box populates with a value, click OK
15
Task 2: Create a Microsoft logical unit
Step Action
1 On the Windows server, click Start, right-click Computer, and then click Manage.
2 In the Server Manager, in the left side navigation pane, expand the Storage node, and then click
Disk Management.
3 In the Disk Management pane, right click Disk 1, and click Initialize Disk.
4 In the Disk Management pane, right click Disk 1, and click Online.
5 In the Disk Management pane, right click Disk 1, and click New Simple Volume.
6 In the New Simple Volume Wizard, on the Welcome page, click Next.
7 On the Specify Volume Size page, in the Simple volume size in MB box, type 497, and then click
Next.
8 On the Assign Drive Letter or Path page, expand the Assign the following drive letter list, and
then click E. Click Next.
9 On the Format Partition page, click Format the volume with the following settings
10 Leave the default settings in the File system .
Select 8192 for Allocation unit size.
In the Volume label box, type a descriptive name, and then click Next.
11 On the Completing the New Simple Volume page, click Finish.
2 In the iSCSI initiator Properties dialog box, click the Volumes and Devices tab.
3 Click Auto Configure, and then click OK.
Step Action
1 Open the Administration UI and log on using the admin account.
2 Expand the File System menu, point to iSCSI, and then click Targets & Logical Units.
3 On the Targets & Logical Units page, in the Targets section, under Actions, click Edit for the
target you created previously in this lab.
4 On the Edit Target page, in the Initiator Access Control section, click Add initiator.
5 In the Add Allowed Initiator dialog box, next to the Initiator name box, click Browse.
6 In the Select initiator dialog box, click the name of the initiator, and then click OK
16
Step Action
7 Click OK.
17
Lab 5.1: Viewing MAC based Alternate Data Streams (ADS)
The Mac Classic operating system used four-character codes Creator Signatures and File Types to keep track of which
application should be used to open specific files and what type of files applications could open. A unique creator
signature was assigned to every application and any file could store a creator code in its resource fork (._file name).
The OS maintained a database of which creator codes matched which applications, so that when the user double-
clicked a file, the OS would look up the creator code in its database and launch the proper application. Then when Mac
OS X came along it had the ability to determine appropriate applications for launching files by looking at the file's
extension, as had been done in the DOS, UNIX and Windows world for years along with the MAC Classic way of using
the Creator Signatures and File Types . In this lab, students will look at ADS files (resource forks) and view the
information inside these files.
18
The Creator Signatures for OS X Mac ADS.
Creator Signatures Creator Signatures
Adobe Reader 'CARO' iTunes 'hook'
Any Application 'APPL' SimpleText 'ttxt'
Unknown application '????' Revolution 'Revo'
BBEdit 'R*ch' TextWrangler '!Rch'
TextMate 'TxMt' Photoshop '8BIM'
GraphicConverter 'GKON' QuarkXpress 'XPR3'
WordPerfect Mac 'WPC2' MS Excel 'XCEL'
MS Word 'MSWD' Stuffit Expander 'SITx'
TextEdit 'EDIT' InDesign 'InDn'
Preview 'prvw' Safari 'sfri'
Firefox 'MOZB' Garage Band 'band'
Keynote 'keyn' Pages 'page'
Numbers 'NMBR' iWeb 'iweb'
Dreamweaver 'DmWr' NeoOffice 'NO%F'
Real Player 'PNst'
19
Task 2: View the data files on the cluster
Step Action
1 The file called “strmext.dll” allows you to look at alternate data streams. This file can be installed on
your personal XP, Vista or Windows 7 Laptop.
To install on your Windows 7 laptop:
a. Copy the file strmext.dll in your X:\Windows\System32\ directory where X is the drive your
Windows installation directory.
b. For 64-bit systems place the file strmext.dll in your X:\Windows\SysWOW64\ directory where X is
the drive your Windows installation directory.
c. Click the Start button, click Run, then type regsvr32 C:\Windows\System32\StrmExt.dll or for 64
bit systems, type C:\Windows\SysWOW64\StrmExt.dll.
d. The system will register the DLL and now you can see if a file has ADS. We have seen 64 bit systems
not work sometimes.
If you are using Windows XP you must add two new registry keys:
HKEY_CLASSES_ROOT\Directory\shellex\PropertySheetHandlers\{C3ED1679-814B-4DA9-AB00-
1CAC71F5E337}
HKEY_CLASSES_ROOT\Drive\shellex\PropertySheetHandlers\{C3ED1679-814B-4DA9-AB00-
1CAC71F5E337}
2 To enable the Edit Streams and Create Hard Link buttons from the tab you must copy RWStream.vbs
and HardLinks.vbs into the %SystemRoot%\System32 directory.
3 A useful command based tool is lads.exe. This tool will display files with alternate data streams.
4 After you determine that a MAC file has ADS (notice the AFP_AfpInfo, for Appletalk File Protocol), you
can figure out what application calls it from the two tables above using this command.
5 To see what is in the ADS file you could use the more command as in this example:
more < T:Recording-qt7.mov:AFP_AfpInfo > S:stream1.doc
6 Edit the file with Wordpad and view the information. Notice the format of the file. What are the
Creator Signatures and File Text Codes? CS=____________ FTC=______________
7 The ADSLocater.exe will browse the T: directory and output your ADS files. When you select a file the
Save stream too… highlights.
20
Lab 6.1: Configure InsightIQ
In this lab, you will install and license InsightIQ, then run it on various scenarios.
Step Action
1 From the Windows client, establish a secure shell (SSH) connection to the first node of your
training cluster. Use the IP address handed out earlier by your instructor and append the port
number 8080 to the address
(e.g. 192.168.0.11:8080).
2 Log on to the node as root. Then launch a command prompt.
3 At the command prompt, type isi license activate KEY, where KEY is the InsightIQ license key
provided by your instructor. Press ENTER.
4 If necessary, press the SPACE bar repeatedly to scroll through the eleven paragraphs of the
license agreement (EULA). After the agreement is displayed, type yes to agree to the terms of
the EULA. If successful, the screen displays InsightIQ has been successfully activated.
5 At the command shell prompt, type isi license status to confirm that InsightIQ is activated.
6 Close the connection to the node by typing logout.
Step Action
1 From the Windows client, start a browser.
2 In the browser address bar, type https://IP Address:8080 where IP Address is the IP address of a
node on the training cluster, e.g. https://192.168.0.11:8080.
6 In the Password and Confirm password boxes, type the password that you want to assign to
the local user.
Make a note of this password; you will need to type it later in the InsightIQ web application.
7 Select the Enabled check box to enable this local user account.
8 Click Submit, and then log out from the OneFS web administration interface.
21
Task 3: Configure the InsightIQ administrator account
You must configure an InsightIQ administrator account. The InsightIQ administrator has all privileges to view and
modify InsightIQ configuration settings.
Step Action
1 Open the VMware console for the InsightIQ virtual appliance. The VM starts, and then the
isilon-insightiq login prompt appears.
2 At the login prompt, type administrator and then press ENTER.
A password prompt appears.
3 At the password prompt, type default and then press ENTER.
The (current) UNIX password prompt appears.
4 Type default (the current password) and then press ENTER.
The Enter new UNIX password prompt appears.
5 Type the password that you want to configure for the administrator account and then press
ENTER.
The password must be at least one character long. This is the password that you will use to log
in to the web-based InsightIQ application and the InsightIQ VM console.
6 The Retype new UNIX password prompt appears.
Retype the password that you configured in the previous step, and then press ENTER.
7 Welcome text displays. At the password for administrator: prompt, type the new password
that you previously specified for the InsightIQ administrator, and press ENTER.
8 The system displays a DHCP-generated IP address, the InsightIQ Configuration Wizard starts,
and the Wizard prompt displays: Wizard >>>.
Important: If you want to run InsightIQ in DHCP networking mode, make a note of the DHCP-
generated IP address that appears; you will later need to enter this address in a web browser to
access the InsightIQ application. If you want to configure networking settings manually, you can
disregard the DHCP-generated IP address.
22
Step Action
1 At the Wizard prompt perform one of the following steps:
To configure networking manually, follow the prompts to the Configure networking and
Configure networking manually pages, and then proceed to step 3 below.
To configure InsightIQ to run in DHCP networking mode (the default method), use the DHCP-
generated IP address that you recorded in the previous step, follow the prompts to exit the
wizard, do not perform step 3 in this task, and continue to Task 6, Login and accept the End User
Agreement. Your instructor will direct you to accept DHCP mode or to manually configure
InsightIQ.
After you exit the wizard, the isilon-insightiq login prompt appears.
Exit the VMware console.
2 In the previous step, if you selected the Configure networking manually option, perform the
following steps:
a. Follow the prompts to configure a netmask (255.255.255.0) for the InsightIQ virtual
appliance.
b. Follow the prompts to configure the IP address (assigned earlier) that you want to use to
access the InsightIQ virtual appliance. Make a note of this IP address; you will need to enter
this address in a web browser each time you access the InsightIQ application.
c. Follow the prompts to configure a default gateway (assigned earlier) for the InsightIQ
virtual appliance.
d. Follow the prompts to configure one or more DNS servers for the InsightIQ virtual
appliance.
e. Follow the prompts to configure one or more search domains (Isilon.training.com) for the
InsightIQ virtual appliance.
f. Commit your settings, exit the wizard, and then quit the VMware console.
Step Action
23
Step Action
3 Review the EULA, and click I have read and agree to..., and then click Submit.
The Welcome to InsightIQ page appears.
Step Action
1 If you want to use the InsightIQ appliance local data store:
In the NFS server box, do not type anything.
In the Data store path box, type /datastore.
Go to step 3.
2 If you are specifying storing the data store on an Isilon cluster or on an NFS server:
In the NFS server box, type the host name or IP address of the server or Isilon cluster
on which you want to store collected performance data.
In the Data store path box, type the absolute path, beginning with a slash mark (/), to
the directory on the server or cluster where you want the collected data to be stored.
This field must contain only ASCII characters.
3 Click Submit. The Add Cluster dialog box appears.
24
Task 7: Add a cluster
In this task, you will specify an initial cluster to monitor. While you will identify the cluster by an IP address or a host
name in this lab, alternatively you could specify the name of a SmartConnect zone.
Step Action
1 In the Add Cluster dialog box, click I want to monitor a new cluster.
2 In the Isilon cluster box, type the host name or IP address of any node in the cluster that you
want to monitor.
3 In the Username box, type the user name for the corresponding local user on the monitored
cluster. For a monitored cluster running OneFS 6.0 or later, type insightiq .
4 In the Password box, type the local InsightIQ user's password exactly as it is configured on the
monitored cluster.
5 Click OK. The cluster is added to the list of monitored clusters
Step Action
1 On the Settings menu, click Monitored Clusters.
The Monitored Clusters page appears and displays a list of all clusters that InsightIQ is
configured to monitor.
2 For the cluster whose File System Analytics settings you want to configure, in the Actions
column, click configure. The Cluster Configuration page appears.
3 Click Enable FSA. The File System Analytics Job Control page appears.
4 You must enable the File System Analytics feature in order to view chart information in the
Data Usage and Data Properties views. Enable the File System Analytics feature by selecting
the Enabled check box and then clicking Submit.
5 Click FSA Configuration. The File System Analytics Job Settings page appears.
6 Configure the Result Set Options settings:
a. In the Directory chart maximum depth box, type an integer that represents the maximum
depth of the directories that you want InsightIQ to analyze. To specify an unlimited depth,
type -1.
b. In the File/directory list size box, type an integer that represents the maximum number
of top-contributing files and directories to list in the InsightIQ Data Usage view.
c. In the Path squash depth box, type an integer that represents the maximum number of
directory levels to include in a path.
25
Step Action
7 Configure Result Set Retention settings:
a. In the Maximum result set age in days box, type an integer that represents, in days, how
long to retain each data set before automatically deleting it. To retain data sets
indefinitely, type 0 . You can manually delete a data set at any time.
b. In the Maximum result set count box, type an integer that represents the maximum
number of data sets to retain. To retain an unlimited number of data sets, type 0.
8 Click Submit.
26
Lab 6.1 Monitoring with InsightIQ
In this lab, you will use the Isilon InsightIQ virtual appliance to monitor and analyze your Isilon cluster
performance by viewing the charts that display historical performance data. You will see how the data is
displayed to enable you to view these charts and see detailed information about cluster hardware, software, and
file-system and protocol operations.
Demonstration data has been loaded into the cluster to help you visualize the data.
Step Action
1 From your laptop, open a remote desktop connection to the Windows training client
computer and log into that computer.
2 On the client computer, open the fire fox browser. Type in the IP address of the
InsightIQ VM Client.
3 At the InsightIQ Console welcome screen, type in your credentials - user name
administrator and password a.
The InsightIQ Console displays, showing data from Wednesday, April 20, 2011.
2 In the Active Clients bar chart, hover your mouse cursor over the bar representing the qa-
long3 cluster. Note how the bar changes color – hover your mouse over each color and notice
that a popup appears for each separate data element that makes up the bar.
3 Note how many active clients are in each section of bar, and note how the bar is color coded
according to protocol used to connect.
27
Step Action
3 Scroll lower in the page to the External Network Packets Rate chart.
4 Locate the packet rate for April 20, 2011 around 9:00 a.m.
5 Under Breakout By in the External Network Packets Rate chart, click Node. Note the node
showing the most traffic.
6 Under Breakout By in the External Network Packets Rate chart, click Interface. Note the
interface with the most traffic.
7 Scroll up to the External Network Throughput chart.
8 Under Breakout By, click Protocol. Note the interface with the most traffic in the time period
shown.
9 Click Operation Class.
Which operation accounted for the most external network traffic on April 20 between 8:50
a.m. and 9:00 a.m.?
3 In the Filter section, verify that the result set shown is Sun Apr 17 2011 19:07:01 GMT-0400
(Eastern Daylight Time).
4 In the Disk Operations Per Second chart, under Breakout By click Disk.
5 Note which disk recorded the most disk ops per second.
3 In the Filter section, verify that the result set shown is Sun Apr 17 2011 19:07:01 GMT-0400
(Eastern Daylight Time).
4 Navigate to the File Count by Physical Size chart. What file size range encompasses most of
the files on this cluster’s file system?
28
Study Questions
1. Which cluster has the most active clients?
2. In the qa-long3 cluster, how many clients connected to the cluster via SMB? NFS ver3?
3. In the sjcluster-1 cluster, what was the packet rate for the external network 4/20/11 as close as possible to
9:00 a.m.?
4. On the same cluster, on which node and interface is that traffic coming in?
5. Which protocol was using the most traffic between 8:50 am and 9:00 am on April 20?
6. Which operation classes were most responsible for traffic between 8:50 am and 9:00 am on April 20?
7. On the qa-long3 cluster, how many disk operations per second were occurring at 9:00 a.m. on April 20?
8. Which disk on the qa-long3 cluster reported the most disk operations per second?
9. How big (a range) are most of the files on the qa-long3 cluster?
29
Case Study 1: SmartConnect & SmartPools
Case Summary
An existing Isilon customer has a 3-node X-series cluster and just added 3 more X-Series nodes. The media department
(using Mac client computers) works on very large video files and the new nodes are expressly for the media
department’s use and have a higher disk density than their previous nodes. The customer wants only media
department members to access the new nodes and for all media files (including those in the media department
employee’s home directories) to be saved only to the new nodes.
Implement a solution using Isilon SmartConnect and SmartPools that satisfies the customer requests.
Hint: The solution should include file access protocol, disk access pattern, file pool policies,
SmartConnect management zones, shares, exports, and mount points.
Tasks to be performed:
1) Which diskpool should the media department use? Which should the rest of the organization use?
_______________________________________________________________________
2) What data layout and protection levels should the media department use as opposed to the rest of the
organization?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
30
5) What SmartConnect configuration changes are needed to support this?
_______________________________________________________________________
_______________________________________________________________________
Feature Task
SmartConnect Activate license
SIP:__________________
IP address range:__________________
IP allocation method:_____________________
IP address range:__________________
31
Feature Task
Create DNS records
Home>>Media>>MediaUser#
Data>>MediaFiles
Home >>GeneralUse>>User#
Test access
______________________________________________________
Configure file pool policy for all media files to move to most dense diskpool
32
Feature Task
Configure file pool policy to save \media files directory and contents to most dense
disk pool
File pool policy name: _______________________________
Configure diskpools
Checks:
File locations
Check File System Explorer for location and data protection level of file
Check File System Explorer for location and data protection level of file
33
Case Study 2: Disaster Recovery
Case Summary
A customer recently purchased and installed an Isilon cluster. They need now to create an overall data protection and
disaster recovery plan for the data that is stored on the cluster. They have a Media department that often needs to
revert to earlier previous versions of files. The customer has mentioned that the one important aspect is compatibility
with their backup software (EMC) and granular levels of recovery due to lost data on their existing storage system that
has happened in the past that caused a complete restore to be done to recover the little amount of data. They
currently have IBM LTO 4 drives stand alone and an HP tape library with LTO 4 drives.
What services and features in an Isilon cluster can help the customer?
Tasks to be performed:
1) What Isilon cluster services could help the customer resolve their issues?
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
34
6) Shadow Copy Emulation recommendations
_______________________________________________________________________
7) Backup topologies
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
35
Case Study 3: Virtualization on Storage Expansion
Case Summary
A customer is looking to upgrade their storage and maintain their server hardware by using it in a more efficient way.
They have stated they are going to move to VSphere 5 for ease of configuration. Their IT setup is based on DHCP with
24 IP’s for use by the ESX hosts. Each server is to be connected to an NFS mount point. The customer has made it clear
that they do not want any down time from the storage, VMotion will not be used and that the storage must stay
balanced under demanding IO loads.
How would you implement a customer solution using Isilon Clustered storage with multiple VMware ESX hosts using
NFS mounts? Specify what the customer will need in the configuration, mount points, What other cluster services can
assist the customer with their goals?
_______________________________________________________________________
_______________________________________________________________________
______________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
_______________________________________________________________________
36
37