iStorage Server Online Help
Storage sharing and read only KernSafe iSCSI SAN User Manual

In most of the time, using iSCSI Target such as KernSafe iSCSI SAN as the storage server to let many clients share one hard disk, partition, image file or security image file can share and utilize the storage resources to the largest extend and are convenient for centralized management. For data updates, update the target once and for all.

However, according to the principle of storage, multiple clients’ sharing for read-write of one storage device (LUN) would bring risks to data corruptions, which is mainly due to the following reasons:

  • The faulty and malicious operation of users leads to the data corruptions of data center.
  • The Trojan and virus lead to the infection of the whole data center and further infection of other clients.
  • The concurrent data writing of multi-users leads to part of data corruptions.

Therefore, KernSafe iSCSI SAN provides a read-only mechanism with separate permissions, read-only access for a part of users (initiators) and complete read-write access for another part of users. This prevents the data corruption caused by term 1 and 2. For users with complete read-write access, KernSafe iSCSI SAN normally allows only one user can log in, which eliminates the possibility of data corruption caused by the concurrent data writing of multi-users.

When creating the Target, it can be controlled by Anonymous, CHAP, IP Filter or Mixed verification as shown in figure 1.


Figure 1

Virtual write
Read-only can protect the safety of data, however, in many times, only read-only protection is not enough, because some programs are running in the read-only disk and the running process would create files or write data to files. The write operation will fail, which would lead to the abnormal running of these programs. Therefore, KemSafe provides a conception of virtual write, which means the program of read-only users allows the writing in read-only disks, but the writing results only take effect for the user himself. KernSafe iSCSI SAN provide a COW Protection mechanism to have this function as shown in figure 2.


Figure 2

Note: When using this function, do not check "Report as read only device when initiator can not get write access" while creating Target as shown in figure 3.


Figure 3

Concurrent writing of multi-users mentioned above may lead to the data corruption. But when your storage server is running in the environment of cluster, the function of concurrent writing of multi-users is needed and the writing synchronization control is realized by cluster software.

Thus, you only need to check “Enable multiple initiators with full access connected (sharing and clustering)” in the last page of Create Target Wizard as shown in figure 4.


Figure 4

SUPPORT

Newsletter

  • NAME
  • EMAIL