Cisco MDS 9000 Family Fabric Manager Configuration Guide
SAN Device Virtualization
Downloads: This chapterpdf (PDF - 207.0 KB) The complete bookPDF (PDF - 48.18 MB) | Feedback

SAN Device Virtualization

Table Of Contents

SAN Device Virtualization

About SDV

Key Concepts

Automatic Failover and Fallback

Configuring SDV

Configuring a Virtual Device

Linking a Virtual Device with a Physical Device

Resolving Fabric Merge Conflicts

SDV Requirements and Guidelines

Default Settings

SAN Device Virtualization

This chapter describes how to configure virtual devices to represent physical end devices for switches running Cisco MDS SAN-OS Release 3.1(2) and later, or NX-OS Release 4.1(1a) and later.

Cisco SAN device virtualization (SDV) is a licensed feature included in the Cisco MDS 9000 Family Enterprise package (ENTERPRISE_PKG). See Chapter 10, "Obtaining and Installing Licenses," for details about acquiring licenses.

This chapter includes the following sections:

About SDV

Configuring SDV

Default Settings

About SDV

As of Cisco SAN-OS Release 3.1(2) and NX-OS Release 4.1(1a), you can use Cisco SDV to create virtual devices that represent physical end-devices. Virtualization of SAN devices accelerates swapout or failover to a replacement disk array, and it also minimizes downtime when replacing host bus adapters (HBAs) or when re-hosting an application on a different server.

SAN devices that are virtualized can be either initiators or targets. You can virtualize targets to create a virtual target, and also virtualize initiators to create a virtual initiator. Such configurations do not distinguish between virtual initiators and virtual targets (see Figure 27-1 and Figure 27-2).

Figure 27-1 Target Virtualization

Figure 27-2 Initiator Virtualization

Note While most of the examples in this chapter describe target virtualization, the initiator virtualization functions similarly.

Typically, today's deployments for handling device failures are designed for high availability (HA), with redundancy being a key part of this design. Consider the situation where a target is designed to be redundant. Two arrays are deployed-a primary and secondary in this situation. Enterprises often use some type of consistency technology (such as EMF SRDF) between the primary and secondary arrays to ensure that the secondary is a mirrored copy of the production LUN. However, if the primary array fails, it must be replaced by the secondary because all I/O must occur on the secondary array. Problems can occur because the time required to bring the secondary array up and have it working often takes longer than most can afford (Figure 27-3 illustrates this dilemma).

Figure 27-3 Typical Deployment for Handling Device Failures Before SDV

If a storage array is replaced without using Cisco SDV, then it may require the following actions:

Taking down a server to modify zoning and account for the new array.

Changing the Cisco NX-OS configuration to accommodate Fibre Channel IDs (FC IDs) and pWWNs of the new array.

Changing a server configuration to accommodate the new FC IDs and pWWNs.

More specifically, without SDV you might experience the following conditions:

It can take a considerable amount of time to configure a secondary device for a typical production environment.

In the zoning configuration, all the initiators must be rezoned with the secondary device, and certain initiators must also be reconfigured. For example, the WWN and FC ID of the secondary device are different, so driver files must be changed and the server must be rebooted.

Clustering (multiple initiators) compounds the problem, and the failover procedure must be repeated for each server of the cluster. Think of a server cluster as a set of HBAs-any storage array FC ID changes must be performed for each HBA.

SDV enables you to achieve the following performance targets:

Reduce the amount of time it takes for data migration, and ultimately the overall amount of downtime.

Easily scale to larger numbers of devices.

Figure 27-4 illustrates the benefits of SDV. In this configuration, disk array Y replaces disk array X. When disk array X was deployed, the user created virtual devices for all the Fibre Channel interfaces using SDV. After data replication from disk array X was completed, the user briefly pauses activity on the application server and relinked disk array Y to the virtual devices used by the server, completing the swapout of disk array X. No zoning changes or host operating system configuration changes were required during the time-critical period when the swap was performed; this significantly minimized application downtime.

Note The array administrator will likely have to perform actions on array Y for it to become a primary device and accept server logins before linking the virtual device to the array Y pWWN.

Figure 27-4 SDV Example

Key Concepts

The following terms are used throughout this chapter:

Virtual device—The virtualized or proxy representation of the real device, which is registered with the name server and has a pWWN and FC ID. A virtual device exists as long as its real (physical) counterpart is online. The virtual device pWWN and FC ID must be unique and cannot clash with any real device pWWNs and FC IDs.

Virtual domain—Reserved by SDV to assign FC IDs to virtual devices. If the switch that reserved the domain goes down, another switch takes over its role using the same domain.

Primary device—The device that is configured as primary. By default, the primary device becomes the active device if it is online.

Secondary device—The additional device that is configured. By default, the secondary device is standby.

Active device—The device that is currently virtualized is called the active device. By default, the primary device becomes the active device if it is online. The active device is indicated by a (*) symbol.

Automatic Failover and Fallback

As of Cisco MDS NX-OS Release 4.1(1a), SAN device virtualization supports automatic failover and fallback configurations for the virtual devices. In all of the earlier releases, when there was a failure, you needed to manually configure the device as primary to make it active. With the introduction of automatic failover and fallback configurations, the active device is distinguished from the primary device indicated by a (*) symbol.

Auto failover—When there is a failure, the failover auto attribute automatically shuts down the primary device and brings up the secondary device to active state. When the primary device comes back online, it requires user intervention to switchover.

Auto failover with fallback—In addition to automatic failover, when the primary device comes back online after a failover, the primary device is brought to active state and the secondary device moved to standby state.

Configuring SDV

SDV is a distributed service and uses Cisco Fabric Services (CFS) distribution to synchronize the databases. When you configure SDV, it starts a CFS session and locks the fabric. When a fabric is locked, Cisco NX-OS software does not allow any configuration changes from a switch other than the switch holding the lock-and issues a message to inform users about the locked status. Configuration changes are held in a pending database for the application. You must perform a commit operation to make the configuration active and to release the lock for all switches.

See Chapter 13, "Using the CFS Infrastructure" for more details about CFS,

Note When you enable SDV, CFS distribution is also enabled; CFS distribution cannot be disabled for SDV.

The following sections describe how to configure SDV:

Configuring a Virtual Device

Linking a Virtual Device with a Physical Device

Resolving Fabric Merge Conflicts

Configuring a Virtual Device

A virtual device is identified by an alphanumeric name of up to 32 characters and defines all the real devices (one primary and one or more secondary) that it represents. Upon the successful creation of a virtual device, the virtual device name is internally registered as the device alias name with the device alias database; the pWWN is automatically assigned by the system using Cisco Organizational Unique Identifier (OUI). A virtual device appears as a real, physical device. You can enumerate up to 128 devices for a virtual device. There is a limit of 4095 on the number of virtual devices that you can create in a single VSAN.

Figure 27-5 shows a configuration that includes a new virtual device, vt1.

Figure 27-5 Creating a Virtual Device

As of MDS NX-OS Release 4.1(1a), the following conditions must be considered when configuring the virtual device failover attributes:

The attribute configuration is supported only with MDS NX-OS Release 4.1(1a) and later. In a mixed mode fabric where earlier releases are combined, the attribute configuration will fail.

When the failover attribute is configured, if the primary device is offline then the secondary device becomes active.

When the failover attribute is deleted after the primary device failover to the secondary device, then the primary becomes active if the primary device is online. If the primary device is not online, then the SDV virtual device is shut down.

Note The SDV attributes configuration is supported in MDS Fabric Manager Release 4.1(2) and later.

To configure a virtual target and commit it to the fabric configuration using Fabric Manager, follow these steps:

Step 1 Expand SAN in the Logical Domains pane. Then expand the fabric in which your VSAN resides.

Step 2 Expand the VSAN in which you wish to create the virtual target and select SDV. You see the switches in the VSAN that you selected listed in the Information pane.

Step 3 In the Control tab, select enable from the drop-down menu in the Command column to enable SAN device virtualization for a particular switch in the VSAN(see Figure 27-6).

Figure 27-6 Enabling SAN Device Virtualization

Step 4 Click the Apply Changes icon to commit the configuration change.

Step 5 Click the CFS tab. Confirm that the SAN device virtualization feature is enabled for the switch.

Step 6 Click the Virtual Devices tab and then click the Create Row icon.

You see the Create Virtual Devices dialog box (see Figure 27-7).

Figure 27-7 Create Virtual Devices Dialog Box

Step 7 Select the Virtual Device ID from the drop-down list (ranges from 1 to 4096).

Step 8 Enter a Name for the Virtual Device. Select the Virtual Domain and enter a Virtual FC ID for the virtual target.

Step 9 Check only the autoFailover check box, or check the autoFailover and primFallback check boxes. For more information, see the "Automatic Failover and Fallback" section. You can also change the option in the Option column of the Virtual Devices tab. (See Figure 27-8).

Figure 27-8 Virtual Devices tab

Step 10 Click Create to create the virtual target.

Step 11 Click the CFS icon to commit and distribute the configuration changes.

The pWWN of the virtual target does not appear in the zoning end devices database in Fabric Manager. If you want to zone the virtual device with a pWWN, you must enter it in the Add Member to Zone dialog box when creating a zone. However, if the device alias is in enhanced mode, the virtual device names appear in the device alias database in the Fabric Manager zoning window. In this case, users can choose to select either the device alias name or enter the pWWN in the Add Member to Zone dialog box.

For more information, see the "Adding Zone Members" section on page 30-14.

Set the device alias mode to enhanced when using SDV (because the pWWN of a virtual device could change).

For example, SDV is enabled on a switch and a virtual device is defined. SDV assigns a pWWN for the virtual device, and it is zoned based on the pWWN in a zone. If you later disable SDV, this configuration is lost. If you reenable SDV and create the virtual device using the same name, there is no guarantee that it will get the same pWWN again. You would have to rezone the pWWN-based zone. However, if you perform zoning based on the device-alias name, there are no configuration changes required if or when the pWWN changes.

Be sure you understand how device alias modes work before enabling them. Refer to Chapter 31, "Distributing Device Alias Services" for details and requirements about device alias modes.

Linking a Virtual Device with a Physical Device

After creating a virtual device and configuring it as part of a zone, you can define the primary device for it using the link command, which is also used to fail over to the secondary device.

Note When a link operation fails over to the secondary device, the virtual device is taken offline, and then brought online.

As of MDS NX-OS Release 4.1(1a), the following conditions must be considered before linking a device:

If you link to the secondary device which is currently active because of failover, the primary tag is moved to the secondary device and the secondary device becomes the primary device.

When the secondary device is active, if you link to a third device, and if the fallback attribute was not configured, the third device becomes the primary device but the secondary device continues to be the active device.

When the secondary device is active, if you link to a third device, and if the fallback attribute was configured, then the third device becomes the primary device as well as the active device.

To link a virtual target with a physical target using Fabric Manager, follow these steps:

Step 1 Click the Real Devices tab and then click the Create Row icon.

Step 2 Select the Virtual Device ID from the pull-down list or enter an existing ID for the virtual target that you are linking with a physical target(see Figure 27-9).

Step 3 Select the Real Device ID of the physical target that you are linking with the virtual target.

Figure 27-9 Create Real Devices Dialog Box

Step 4 Choose either the pWWN or deviceAlias radio button, and select the appropriate pWWN or device alias from the pull-down menu. Note that the Name field is automatically populated when you select the pWWN or device alias.

Step 5 Choose either the primary or secondary radio button for the Map Type.

Step 6 Click the CFS icon to save and distribute these changes, or click Close to discard any unsaved changes.

Resolving Fabric Merge Conflicts

Whenever two fabrics merge SDV merges its database. A merge conflict can occur when there is a run-time information conflict or configuration mismatch. Run-time conflicts can occur due to:

Identical pWWNs being assigned to different virtual devices

The same virtual devices are assigned different pWWNs.

The virtual device and virtual FC ID are mismatched.

A blank commit is a commit operation that does not contain configuration changes, and enforces the SDV configuration of the committing switch fabric-wide. A blank commit operation resolves merge conflicts by pushing the configuration from the committing switch throughout the fabric, which reinitializes the conflicting virtual devices. Exercise caution while performing this operation, as it can easily take some virtual devices offline.

Merge failures resulting from a pWWN conflict can cause a failure with the device alias as well. A blank commit operation on a merge-failed VSAN within SDV should resolve the merge failure in the device alias.

You can avoid merge conflicts due to configuration mismatch by ensuring that:

The pWWN and device alias entries for a virtual device are identical (in terms of primary and secondary).

There are no virtual device name conflicts across VSANs in fabrics.

SDV Requirements and Guidelines

Be aware of the following requirements and guidelines as you plan and configure SDV:

SDV should be enabled on switches where devices that are part of SDV zones are connected.

SDV does not work for devices connected to non-MDS switches.

Broadcast zoning is not supported for a zone with a virtual device.

IVR and SDV cannot be used for the same device. In other words, a SDV-virtualized device cannot be part of a IVR zone or zoneset.

Virtual device names should be unique across VSANs because they are registered with the device alias server, which is unaware of VSANs. For example, if you have enabled SDV and have registered a name, vt1 in both VSAN 1 and VSAN 2, then the device alias server cannot store both entries because they have the same name.

You cannot specify the same primary device for different virtual devices.

SDV does not work with soft zoning (Soft zoning means that zoning restrictions are applied only during interaction between the name server and the end device. If an end device somehow knows the FC ID of a device outside its zone, it can access that device), nor does it work with the zone default-zone permit vsan operation (which would otherwise permit or deny traffic to members in the default zone).

If devices are not already zoned with the initiators, then you can configure SDV virtual device zones with no negative impact. If they are already zoned, then zoning changes are required.

The real device-virtual device zone cannot coexist with the real device-real device zone. If the real devices are not already zoned together, then you can configure the real device-virtual device zone with no negative impact. If these devices are already zoned, then adding the real device-virtual device zone may cause the zone activation to fail. If this occurs, then you must delete one of the zones before activation.

For example, a user attempts to create a configuration with zone A, which consists of I, the initiator, and T, the target (I,T), and zone B, which consists of a virtual initiator, VI, and real target, T (zone VI, T). Such a configuration would fail. Likewise, an attempt to configure zone C, which consists of an initiator, I, and target T, with zone D, which consists of an initiator, I, and virtual target, VT (zone I, VT), would also fail.

Caution There must be at least one SDV-enabled switch that is not a Cisco MDS 9124 Switch between the server and the device that are being virtualized. In other words, SDV does not work when initiators and primary devices are connected to the same Cisco MDS 9124 Switch.

Default Settings

Table 27-1 lists the default settings for SDV parameters.

Table 27-1 Default SDV Configuration Parameters