Adaptec 5325301507 Administration Guide - Page 105

iSCSI Multi-Initiator Support, Write-Cache Options with iSCSI Disks

Page 105 highlights

iSCSI Configuration on the SnapServer iSCSI Multi-Initiator Support The Support Multi-Initiator check box allows two or more initiators to simultaneously access a single iSCSI target. Multi-Initiator Support is designed for use with applications or environments in which clients coordinate with one another to properly write and store data on the target disk. Data corruption becomes possible when multiple initiators write to the same disk in an uncontrolled fashion. Note GuardianOS v5.1 and later support Windows 2003 and Windows 2008 Server failover clustering. The warning message Uncontrolled simultaneous access of multiple initiators to the same iSCSI target can result in data corruption. Only enable Multi-Initiator Support if your environment or application supports it occurs when the checkbox for Support MultiInitiator is selected. It functions as a reminder that data corruption is possible if this option is used when creating an iSCSI disk. Write-Cache Options with iSCSI Disks Note This section refers only to iSCSI disks. For information about configuring write cache on GuardianOS volumes, see "Configuring Write Cache" on page 58. To ensure the fastest possible write performance, SnapServers can buffer up to 1GB of data to efficiently handle data being transmitted to a SnapServer. This widely accepted method of improving performance is not without some risk. For example, if the SnapServer were to suddenly lose power, data still in cache would be lost. This risk can be minimized by following industry-standard security precautions, such as keeping servers in a secured location and connecting power supplies to the mains using a network- or USB-based UPS. In most environments, taking these simple precautions virtually eliminates the risk of serious data loss from sudden and unexpected power outages. Of course, the physical conditions and company policies that guide IT decisions vary widely. Power outages are a common occurrence in some areas, and data protection procedures vary from company to company. Administrators who determine that the risk of data loss, even with security cautions in place, outweighs 89

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250

iSCSI Configuration on the SnapServer
89
iSCSI Multi-Initiator Support
The Support Multi-Initiator check box allows two or more initiators to
simultaneously access a single iSCSI target. Multi-Initiator Support is designed for
use with applications or environments in which clients coordinate with one another
to properly write and store data on the target disk. Data corruption becomes
possible when multiple initiators write to the same disk in an uncontrolled fashion.
Note
GuardianOS v5.1 and later support Windows 2003 and Windows 2008
Server
failover clustering.
The warning message
Uncontrolled simultaneous access of multiple initiators to the same
iSCSI target can result in data corruption. Only enable Multi-Initiator Support if your
environment or application supports it
occurs when the checkbox for Support Multi-
Initiator is selected. It functions as a reminder that data corruption is possible if this
option is used when creating an iSCSI disk.
Write-Cache Options with iSCSI Disks
Note
This section refers only to iSCSI disks. For information about configuring
write cache on GuardianOS volumes, see “Configuring Write Cache” on page 58.
To ensure the fastest possible write performance, SnapServers can buffer up to 1GB
of data to efficiently handle data being transmitted to a SnapServer. This widely
accepted method of improving performance is not without some risk. For example,
if the SnapServer were to suddenly lose power, data still in cache would be lost.
This risk can be minimized by following industry-standard security precautions,
such as keeping servers in a secured location and connecting power supplies to the
mains using a network- or USB-based UPS. In most environments, taking these
simple precautions virtually eliminates the risk of serious data loss from sudden
and unexpected power outages.
Of course, the physical conditions and company policies that guide IT decisions
vary widely. Power outages are a common occurrence in some areas, and data
protection procedures vary from company to company. Administrators who
determine that the risk of data loss, even with security cautions in place, outweighs