
120
SLES 11: Storage Administration Guide
no
vd
ocx
(e
n)
7 Ja
nua
ry 201
0
each virtual disk from a physical disk or a partition. After you set up the virtual disks for the guest
virtual machine, start the guest server, then configure the new blank virtual disks as iSCSI target
devices by following the same process as for a physical server.
File-baked disk images are created on the Xen host server, then assigned to the Xen guest server. By
default, Xen stores file-backed disk images in the
/var/lib/xen/images/
vm_name
directory,
where
vm_name
is the name of the virtual machine.
For example, if you want to create the disk image
/var/lib/xen/images/vm_one/xen-0
with a
size of 4 GB, first make sure that the directory is there, then create the image itself.
1
Log in to the host server as the
root
user.
2
At a terminal console prompt, enter the following commands
mkdir -p /var/lib/xen/images/vm_one
dd if=/dev/zero of=/var/lib/xen/images/vm_one/xen-0 seek=1M bs=4096
count=1
3
Assign the file system image to the guest virtual machine in the Xen configuration file.
4
Log in as the
root
user on the guest server, then use YaST to set up the virtual block device by
using the process in
“Partitioning Devices” on page 119
.
13.2.2 Creating iSCSI Targets with YaST
1
Open YaST, and log in as the
root
user.
2
Select
Network Services > iSCSI Target.
YaST opens to the iSCSI Target Overview page with the
Service
tab selected
3
In the
Service Start
area, select one of the following:
When booting:
Automatically start the initiator service on subsequent server reboots.
Manually (default):
Start the service manually.
4
If you are using iSNS for target advertising, select the
iSNS Access Control
check box, then
type the IP address.
5
If desired, open the firewall ports to allow access to the server from remote computers.
5a
Select the
Open Port in Firewall
check box.
5b
Specify the network interfaces where you want to open the port by clicking
Firewall
Details
, selecting the check box next to a network interface to enable it, then clicking
OK
to accept the settings.
6
If authentication is required to connect to target devices you set up on this server, select the
Global
tab, deselect
No Authentication
to enable authentication, then specify the necessary
credentials for incoming and outgoing authentication.
The
No Authentication
option is enabled by default. You can specify authentication for
incoming, outgoing, or both incoming and outgoing. You can also specify multiple sets of
credentials for incoming authentication by adding pairs of usernames and passwords to the list
under
Incoming Authentication
.
7
Configure the iSCSI target devices.
7a
Select the
Targets
tab.
7b
If you have not already done so, select and delete the example iSCSI target from the list,
then confirm the deletion by clicking
Continue
.
Summary of Contents for LINUX ENTERPRISE SERVER 11 - STORAGE ADMINISTRATION GUIDE 2-23-2010
Page 4: ...4 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 10: ...10 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 12: ...12 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 24: ...24 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 34: ...34 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 78: ...78 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 88: ...88 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 98: ...98 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 108: ...108 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 130: ...130 SLES 11 Storage Administration Guide novdocx en 7 January 2010...
Page 134: ...134 SLES 11 Storage Administration Guide novdocx en 7 January 2010...