You can use the command-line interface (CLI) to create
host objects.
If you are configuring a host object on a Fibre
Channel attached host, ensure that you have completed all
zone and switch configuration. Also test the configuration to ensure
that zoning was created correctly.
If you are configuring a
host object on the clustered system (system) that uses iSCSI connections,
ensure that you have completed the necessary host-system configurations
and have configured the system for iSCSI connections.
At least
one WWPN or iSCSI name must be specified.
Use the following steps to create host objects:
- Issue the mkhost CLI
command to create a logical host object for a Fibre Channel attached host. Assign your worldwide port name (WWPN) for the
host bus adapters (HBAs) in the hosts.
This is an example of the CLI command that you can issue to create
a
Fibre Channel attached host:
mkhost -name new_name -fcwwpn wwpn_list
where
new_name is the name of the
host and
wwpn_list is the WWPN of the HBA.
- To create an iSCSI-attached
host, issue the following CLI command:
mkhost -iscsiname iscsi_name_list
where
iscsi_name_list specifies one
or more iSCSI qualified names (IQNs) of this host. Up to 16 names
can be specified, provided that the command-line limit is not reached.
Each name should comply with the iSCSI standard, RFD 3720.
- To add ports to a Fibre Channel attached
host, issue the addhostport CLI command.
For example, issue the following CLI command:
addhostport -hbawwpn wwpn_list new_name
This command adds another HBA WWPN
wwpn_list to the host that was created in step
1.
- To add ports to an iSCSI-attached host,
issue the addhostport CLI command.
For example, issue the following CLI command:
addhostport -iscsiname iscsi_name_listnew_name
where
iscsi_name_list specifies the comma-separated list of IQNs
to add to the host. This command adds an IQN to the host that was
created in step
2.
- To set the Challenge Handshake Authentication Protocol
(CHAP) secret that is used to authenticate the host for iSCSI I/O,
issue the chhost CLI command.
This secret is shared between the host and the system. For example,
issue the following CLI command:
chhost -chapsecret chap_secret
where
chap_secret is the CHAP secret that is used to authenticate the host for iSCSI
I/O. To list the CHAP secret for each host, use the
lsiscsiauth command. To clear any previously set CHAP secret for a host, use
the
chhost -nochapsecret command.
After you have created the host object on the system, you
can map
volumes to a host.
If you are unable
to discover the disk on the host system or if there are fewer paths
available for each disk than expected, test the connectivity between
your host system and the system. Depending on the connection type
to the host, these steps might be different. For iSCSI-attached hosts, test your connectivity between the host
and Lenovo Storage V series ports by pinging Lenovo Storage V series from
the host. Ensure that the firewall and router settings are configured
correctly and validate that the values for the subnet mask and gateway
are specified correctly for the Lenovo Storage V series host
configuration.
For Fibre Channel attached
hosts, ensure that the active switch configuration includes the host
zone and check the host-port link status. To verify end-to-end connectivity,
you can use the lsfabric CLI command or the View
Fabric panel under Service and Maintenance container in the management GUI.