NetBackup Appliance ISCSI Guide
NetBackup Appliance ISCSI Guide
Legal Notice
Copyright © 2016 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This product may contain third party software for which Veritas is required to provide attribution
to the third party (“Third Party Programs”). Some of the Third Party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation
or TPIP ReadMe File accompanying this product for more information on the Third Party
Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
Veritas Technologies LLC
500 E Middlefield Road
Mountain View, CA 94043
http://www.veritas.com
Technical Support
Technical Support maintains support centers globally. Technical Support’s primary
role is to respond to specific queries about product features and functionality. The
Technical Support group also creates content for our online Knowledge Base. The
Technical Support group works collaboratively with the other functional areas within
the company to answer your questions in a timely fashion.
Our support offerings include the following:
■ A range of support options that give you the flexibility to select the right amount
of service for any size organization
■ Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers software upgrades
■ Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■ Premium service offerings that include Account Management Services
For information about our support offerings, you can visit our website at the following
URL:
www.veritas.com/support
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Customer service
Customer service information is available at the following URL:
www.veritas.com/support
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and support contracts
■ Advice about technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact us regarding an existing support agreement, please contact
the support agreement administration team for your region as follows:
Japan [email protected]
Contents
Index .................................................................................................................... 38
Chapter 1
Overview
This chapter includes the following topics:
■ About iSCSI
About iSCSI
iSCSI is a way of connecting storage devices over a network by using TCP/IP.
iSCSI was developed to enable transmission of SCSI commands over the existing
Internet Protocol (IP) network by using the TCP/IP protocol. iSCSI offers the
possibility of delivering both messaging traffic and block-based storage over IP
networks without installing a separate Fibre Channel network. With release 3.0,
iSCSI supports VMware backups on configuration H of the NetBackup 5240
appliance.
The protocol allows clients (called initiators) to send SCSI commands to SCSI
storage devices (targets) on remote servers. Configuration H of the NetBackup
5240 appliance functions as an initiator.
A target is a storage resource located on an iSCSI server (more generally, one of
the potentially many instances of iSCSI storage nodes running on that server). To
communicate with each other, iSCSI initiators and targets establish iSCSI sessions
Overview 10
About iSCSI initiator and targets
is configured on both the network and iSCSI interface on different subnets, the
configuration is not supported.
IP VLAN IP VLAN
■ Using an iSNS server (Internet Storage Name Service) for discovering targets
is supported.
See “About iSNS” on page 27.
■ Only a QLogic Small Form-Factor Pluggable (SFP+) module is supported in the
10Gb Ethernet/iSCSI card. You will receive an alert if an unsupported SFP
module is detected in the 10Gb Ethernet/iSCSI card (if alerts are configured).
For the latest NetBackup Appliance compatibility information, refer to the Hardware
Compatibility List on the following website:
www.netbackup.com/compatibility
SCSI commands
Target (iSCSI supported
Data Transfer over storage array)
Initiator (Configuration H TCP/IP
of the NetBackup 5240
appliance)
Appliance as the backup
host uses NetBackup client
software to back up virtual
machines
ESX
servers
Virtual machines
VM VM VM
VM VM VM
Figure 2-1 Rear panel riser assembly locations and PCIe slot assignments
for configuration H
8 3 6
7 2 5
1 4
Understanding the NetBackup 5240 appliance configuration H 14
QLE8442 dual-port 10Gb Ethernet/iSCSI capable card with SFP+ modules
H - 10 GbE 10 GbE - 8 Gb FC 8 Gb FC - -
NIC 1, 3 NIC 1, 3 HBA 3 HBA 3
(iSCSI)
* Slot 1 contains a factory installed PCIe RAID 6 controller when at least one NetBackup
5240 Storage Shelf is purchased with the NetBackup 5240 Appliance. Otherwise, slot 1 is
not populated.
** Slot 7 contains the NetBackup 5240 Appliance's internal PCIe raid controller. This RAID
controller is used to create the RAID 1 Array for the disk drives on which the appliance
operating system is installed. The operating system drives are located in slots 0 and 1 of
the front panel.
See the NetBackup Appliance Product Description Guide for more details.
Item Specification
Item Specification
Phase Description
Phase 2 The NetBackup client on the VMware backup host initiates a VMware
snapshot on the virtual machine.
Phase 3 Windows: VSS synchronizes the file system on the virtual machine.
Linux: If snapshot quiesce is enabled in the Linux guest OS, the file system
is synchronized on the virtual machine. (Contact your operating system
vendor and VMware for additional information on how to enable snapshot
quiesce.)
Phase 4 The VMware server creates a snapshot on the virtual disk datastore.
Phase 5 The NetBackup client reads the snapshot from the datastores and writes
the data to the NetBackup storage unit.
Mode Description
Note: This mode is not supported for the virtual machines that use VMware Virtual
Volumes (VVols).
hotadd Lets you run the VMware backup host in a virtual machine.
Note: For the virtual machines that use VVols, the virtual machine and the backup host
(hotadd) virtual machine must reside on same VVol datastore.
For instructions on this transport mode and on installing the backup host in a VMware
virtual machine, refer to your VMware documentation.
nbd For unencrypted transfer over a local network that uses the Network Block Device (NBD)
driver protocol. This mode of transfer is usually slower than Fibre Channel.
nbdssl For encrypted transfer (SSL) over a local network that uses the Network Block Device
(NBD) driver protocol. This mode of transfer is usually slower than Fibre Channel.
Chapter 4
Configuring iSCSI
This chapter includes the following topics:
■ About iSNS
■ Connecting to a target
1. Configure IQN for the initiator See “Setting the IQN for the
initiator” on page 20.
3. Discover the targets by using the portal See “Discovering targets by using
address or the iSNS server. the portal address” on page 26.
+--------------+----------+-----------------+-------------+-------+-------+----+----+
|Interface Name|Network | MAC Address | IP Address |Netmask Gateway|MTU |VLAN
| |Interface | | | | | |Tag |
+--------------+----------+-----------------+-------------+-------+-------+----|----+
| iscsi1 | eth6 |00:0e:1e:53:55:11|10.181.198.62| | |1500| |
+--------------+-----------------+-----------|------------+-------+-------+----+----+
| iscsi2 | eth7 |00:0e:1e:53:55:13| | | |1500| |
+--------------+-----------------+-----------|------------+-------+-------+----|----+
Note: The values used in the examples are sample placeholder values.
■ Type the command Interface VLAN Remove and enter an iSCSI interface
name.
The command removes the VLAN tag from the specified interface.
Example:
During the initial stage of an iSCSI session, the appliance (initiator) sends a login
request to the storage system to begin an iSCSI session. The storage system will
then either permit or deny the login request, or determine that a login is not required.
If authentication is enabled on the target, the credentials must be authenticated
and the session established before the server can access the storage resources.
The server compares the value from the client and, if the information matches,
grants the session. If the response fails, the session is denied, and the request
phase starts over.
The initiator logs in using a CHAP user name and password. You can specify a
CHAP password or generate a random password. To set up and configure CHAP
authentication, see the target vendor documentation.
■ The iSCSI interface name can only contain numbers (0-9), letters (A-Z and
a-z), colons (:), hyphens (-), under scrores (_) and periods (.) It must begin
with numbers (0-9), letters (A-Z and a-z) and underscores (_) only.
+-----+------------------------|---------------------|----------------+
| No. | Target IQN |Target Portal Address| Interfaces |
+-----+------------------------|---------------------|----------------|
| 1 |iqn.1996-03.veritas:abc | 10.121.98.22:3260 | iscsi1, iscsi2 |
+-----+------------------------|---------------------|----------------|
| 2 |iqn.1996-03.veritas:xyz | 10.121.98.23:3260 | iscsi1, iscsi2 |
+-----+------------------------|---------------------|----------------+
| 3 |iqn.1996-03.veritas:host| 10.121.98.24:3260 | iscsi1, iscsi2 |
------|------------------------|---------------------|----------------|
Note: If you run the iSCSI > Target Discover Portal or iSCSI > Target
Discover iSNS command again after the targets are connected, it overrides
the existing connection settings like target credentials. If the target requires
authentication, you will need to enter the target credentials again when the
existing sessions are reconnected. The existing sessions need to be
reconnected if the appliance restarts or when you change the IQN for the
appliance or when the iSCSI processes are restarted etc.
About iSNS
An iSNS server uses the Internet Storage Name Service protocol to maintain
information about active iSCSI devices on the network, including their IP addresses,
iSCSI node names, and portal groups. The iSNS protocol enables automated
discovery and management of iSCSI devices on an IP storage network. An iSCSI
initiator like the NetBackup appliance can query the iSNS server to discover iSCSI
target devices.
Configuring iSCSI 28
Discovering targets by using iSNS
You can use an iSNS (Internet Storage Name Service) server to discover targets.
Configuring the iSNS server eliminates the need for configuring every initiator for
every target. When numerous hosts exist on a network, configuring an iSNS server
saves time. An iSNS server provides a central management point for the group by
dynamically maintaining up-to-date information about the iSCSI target names for
group volumes.
If you are using an iSNS server, there is no need to discover targets by using the
specific target names in the command. The following diagram explains the interaction
between the appliance and the iSNS server.
Connect to target
restarts or when you change the IQN for the appliance or when the iSCSI
processes ae restarted etc.
■ When targets are discovered by using iSNS on two iSCSI interfaces like first
run the Target Discover iSNS command for iscsi1 and then iscsi2, only the
recent record is displayed by the Target Show All command. For example the
Interfaces column in the Target Show All command may not show both the
interfaces (iscsi1, iscsi2) for some targets. It actually shows the interface from
the most recent command (iscsi2 in this case) for some targets.
To discover iSCSI targets by using an iSNS server
Note: An iSNS server must already be set up and available on the network before
running the following procedure.
■ The iSCSI interface name can only contain numbers (0-9), letters (A-Z and
a-z), colons (:), hyphens (-), under scrores (_) and periods (.) It must begin
with numbers (0-9), letters (A-Z and a-z) and underscores (_) only.
5 Run the Target Discover iSNS <iSNS address> <Interface name> command
to discover all the iSCSI targets that are registered with the iSNS server on
the specific interface.
You are asked to provide a username and password. Type yes if your target
requires authentication.
+-----+--------------------------|---------------------|----------------+
| No. | Target IQN |Target Portal Address| Interfaces |
+-----+--------------------------|---------------------|----------------|
| 1 | iqn.1996-03.veritas:abc | 10.121.98.22:3260 | iscsi1, iscsi2 |
+-----+--------------------------|---------------------|----------------|
| 2 | iqn.1996-03.veritas:xyz | 10.121.98.23:3260 | iscsi1, iscsi2 |
+-----+--------------------------|---------------------|----------------+
| 3 | iqn.1996-03.veritas:host | 10.121.98.24:3260 | iscsi1, iscsi2 |
------|--------------------------|---------------------|----------------|
Connecting to a target
After initiator and target connections are discovered, iSCSI initiators must be logged
on to targets to establish connections and transfer data over iSCSI. Logons are
persistent and connections are automatically restored if servers restart (unless the
user logs off from the target).
To connect an initiator to a single target, specify the IP address of the portal and
the target IQN.
Configuring iSCSI 31
Disconnecting the sessions with a target
To connect to a target
1 Open a Secure Shell (SSH) session to log on to the appliance as an
administrator.
2 Navigate to the Main_Menu > Settings > iSCSI menu.
3 Type the command Target Connect.
4 Enter the IQN and portal address of the discovered target. A user name is
required if authentication is enabled on the target.
Note the following about IQN, portal address, and user name:
■ The IQN can only contain numbers (0-9), letters (A-Z and a-z), colons (:),
hyphens (-), and periods (.)
Example: iqn.1999-06.com.veritas:storage.lun1
■ The target portal address must be of the following format: <IP
address/hostname>[:port]. Only IPv4 addresses are supported. The host
name can be a short name or a fully qualified domain name.
Example: 192.116.116.50 or abc:3260
■ The user name can only contain numbers (0-9), letters (A-Z and a-z),
hyphens (-), underscrores (_), and periods (.). It must begin with numbers
(0-9), letters (A-Z and a-z), and underscores (_) only.
Example: john.smith
5 Run the command to connect to the target. You can connect to one discovered
target at a time.
Note: This command takes more time to complete if workloads are running on the
iSCSI interface.
5 Run the command to disconnect sessions with the specific target. Type yes
when the following prompt appears:
+-----+------------+-----------------------+----------------------+--------+
| No. | Session ID | Target IQN | Target Portal Address| Status |
+-----+------------+-----------------------+----------------------|--------+
| 1 | 5 |iqn.1996-03.veritas:abc| 10.121.37.51:3260 | Online 1 |
+-----+------------+-----------------------+----------------------+--------+
The Status of the session can be either Online or Offline. The Status can be
Offline if a cable is pulled or if there are network connectivity issues.
Configuring iSCSI 33
Viewing the targets
+-----+------------------------|---------------------|-----------+
| No. | Target IQN |Target Portal Address|Interfaces |
+-----+------------------------|---------------------|-----------|
| 1 |iqn.1996-03.veritas:abc | 10.121.98.22:3260 | iscsi1 |
+-----+------------------------|---------------------|-----------|
| 2 |iqn.1996-03.veritas:xyz | 10.121.98.23:3260 | iscsi1 |
+-----+------------------------|---------------------|-----------+
| 3 |iqn.1996-03.veritas:host| 10.121.98.24:3260 | iscsi1 |
------|------------------------|---------------------|-----------|
Note: When targets are discovered by using iSNS on two iSCSI interfaces like
first run the Target Discover iSNS command for iscsi1 and then iscsi2, only
the recent record is displayed by the Target Show All command. For example
the Interfaces column in the Target Show All command may not show both
the interfaces (iscsi1, iscsi2) for some targets. It actually shows the interface
from the most recent command (iscsi2 in this case) for some targets.
Chapter 5
Troubleshooting iSCSI
issues and some best
practices
This chapter includes the following topics:
■ Best Practices
■ CPU information
■ Memory information
■ Operating system logs
■ Patch logs
■ Storage logs
■ File system logs
■ Test hardware logs
■ AutoSupport logs
■ Hardware information
■ Sysinfo logs
To gather device logs with the DataCollect command
1 Log on to the NetBackup Appliance Shell Menu.
2 From the Main > Support view, type the following command to gather storage
device logs.
DataCollect
4 You can send the DataCollect.zip file to the Veritas Support team to resolve
your issues.
These messages may appear at different times on the NetBackup Appliance Shell
Menu. They may appear when you are running an iSCSI command, in the middle
of a command output, or even when the console is idle. These messages are
harmless and should be ignored.
Best Practices
The following are some recommendations and best practices for iSCSI:
■ Configure an IQN that is different from the default value.
See “Setting the IQN for the initiator” on page 20.
■ Configure alerts so that you can receive iSCSI-related alerts.
See the NetBackup Appliance Administrator's Guide for information about
configuring alerts.
Index
A N
about Network Block Device (NBD) transport 18
initiator and targets 10 Network Block Device (NBD) transport with SSL 18
iSCSI 9
iSCSI topology 11 O
iSNS 27
overview
appliance configuration H 13
of backup process 17
B P
backup
PCIe slot configurations 13
process overview 17
C Q
QLE8442 dual-port 10Gb Ethernet card
collect logs
dual-port 14
datacollect 34
D S
SAN transport mode 18
datacollect
SSL encryption of snapshot data 18
device logs 34
E T
target
encryption of snapshot data transport 18
connect 30
disconnect sessions 31
H view 32
hardware configuration H 13
hotadd transport mode 18 V
VMware
I introduction 16
interface main features 16
configure 21
remove and reset 24
view 21
iSCSI
alerts 36
best practices 37
configure 19
supported features 10
iSNS
discover targets 28