8.15. Storage Devices
Figure 8.28. Storage Space Overview
dmeventddaemon is not performed during installation.
8.15.1. The Storage Devices Selection Screen
- Multipath Devices
- Storage devices accessible through more than one path, such as through multiple SCSI controllers or Fiber Channel ports on the same system.The installation program only detects multipath storage devices with serial numbers that are 16 or 32 characters long.
- Other SAN Devices
- Devices available on a Storage Area Network (SAN).
- NVDIMM Devices
- Non-Volatile Dual In-line Memory Module (NVDIMM) storage devices on the machine.
Figure 8.29. Tabbed Overview of Specialized Storage Devices
- Add iSCSI Target - use to attach iSCSI devices; continue with Section 184.108.40.206.1, “Configuring iSCSI Parameters”
- Add FCoE SAN - use to configure a Fibre Channel Over Internet storage device; continue with Section 220.127.116.11.2, “Configuring FCoE Parameters”
- Reconfigure NVDIMM - use to reconfigure a NVDIMM device into sector mode; continue with Section 18.104.22.168.3, “Configuring NVDIMM Devices”
- Refresh List - use to reload the list when a device is added after the installer starts.
Figure 8.30. The Storage Devices Search Tab
22.214.171.124. Advanced Storage Options
Figure 8.31. Advanced Storage Options
126.96.36.199.1. Configuring iSCSI Parameters
Figure 8.32. The iSCSI Discovery Details Dialog
Procedure 8.1. iSCSI Discovery and Starting an iSCSI Session
- Enter the IP address of the iSCSI target in the Target IP Address field.
- Provide a name in the iSCSI Initiator Name field for the iSCSI initiator in iSCSI qualified name (IQN) format. A valid IQN entry contains:
A complete IQN can therefore look as follows:
- the string
iqn.(note the period)
- a date code that specifies the year and month in which your organization's Internet domain or subdomain name was registered, represented as four digits for the year, a dash, and two digits for the month, followed by a period. For example, represent September 2010 as
- your organization's Internet domain or subdomain name, presented in reverse order with the top-level domain first. For example, represent the subdomain
- a colon followed by a string that uniquely identifies this particular iSCSI initiator within your domain or subdomain. For example,
iqn.2010-09.storage.example.com:diskarrays-sn-a8675309. Anaconda prepopulates the iSCSI Initiator Name field with a name in this format to help you with the structure.For more information on IQNs , see 3.2.6. iSCSI Names in RFC 3720 - Internet Small Computer Systems Interface (iSCSI) available from http://tools.ietf.org/html/rfc3720#section-3.2.6 and 1. iSCSI Names and Addresses in RFC 3721 - Internet Small Computer Systems Interface (iSCSI) Naming and Discovery available from http://tools.ietf.org/html/rfc3721#section-1.
- Use the Discovery Authentication Type drop-down menu to specify the type of authentication to use for iSCSI discovery. The following options are available:
- no credentials
- CHAP pair
- CHAP pair and a reverse pair
- If you selected CHAP pair as the authentication type, provide the user name and password for the iSCSI target in the CHAP Username and CHAP Password fields.
- If you selected CHAP pair and a reverse pair as the authentication type, provide the user name and password for the iSCSI target in the CHAP Username and CHAP Password field and the user name and password for the iSCSI initiator in the Reverse CHAP Username and Reverse CHAP Password fields.
- Optionally check the box labeled Bind targets to network interfaces.
- Click the Start Discovery button. Anaconda attempts to discover an iSCSI target based on the information that you provided. If discovery succeeds, the dialog displays a list of all iSCSI nodes discovered on the target.
- Each node is presented with a check box beside it. Click the check boxes to select the nodes to use for installation.
Figure 8.33. The Dialog of Discovered iSCSI Nodes
- The Node login authentication type menu provides the same options as the Discovery Authentication Type menu described in step 3. However, if you needed credentials for discovery authentication, it is typical to use the same credentials to log into a discovered node. To do that, use the additional Use the credentials from discovery option from the menu. When the proper credentials have been provided, the Log In button becomes available.
- Click Log In to initiate an iSCSI session.
188.8.131.52.2. Configuring FCoE Parameters
Figure 8.34. Configure FCoE Parameters
- Use DCB
- Data Center Bridging (DCB) is a set of enhancements to the Ethernet protocols designed to increase the efficiency of Ethernet connections in storage networks and clusters. Enable or disable the installation program's awareness of DCB with the check box in this dialog. This option should only be enabled for network interfaces that require a host-based DCBX client. Configurations on interfaces that implement a hardware DCBX client should leave this check box empty.
- Use auto vlan
- Auto VLAN indicates whether VLAN discovery should be performed. If this box is checked, then the FIP (FCoE Initiation Protocol) VLAN discovery protocol will run on the Ethernet interface once the link configuration has been validated. If they are not already configured, network interfaces for any discovered FCoE VLANs will be automatically created and FCoE instances will be created on the VLAN interfaces. This option is enabled by default.
184.108.40.206.3. Configuring NVDIMM Devices
Figure 8.35. Reconfigure NVDIMM
Figure 8.36. Successfully reconfigured NVDIMM