You can use the command-line interface (CLI) to create
host objects.
If you are configuring a host object on a Fibre Channel attached host, ensure that you
have completed all zone and switch configuration. Also test the configuration
to ensure that zoning was created correctly.
If you are configuring
a host object on the clustered system (system) that uses iSCSI connections,
ensure that you have completed the necessary host-system configurations
and have configured the system for iSCSI connections.
At least
one WWPN or iSCSI name must be specified.
Use the following steps to create host objects:
- Issue the mkhost CLI
command to create a logical host object for a Fibre Channel attached host. Assign your worldwide
port name (WWPN) for the host bus adapters (HBAs) in the hosts.
This is an example of the CLI command that you can issue to create
a
Fibre Channel attached host:
mkhost -name new_name -fcwwpn wwpn_list
where
new_name is the name of the host and
wwpn_list is the WWPN of the HBA.
- To create an iSCSI-attached
host, issue the following CLI command:
mkhost -iscsiname iscsi_name_list
where
iscsi_name_list specifies one
or more iSCSI qualified names (IQNs) of this host. Up to 16 names
can be specified, provided that the command-line limit is not reached.
Each name should comply with the iSCSI standard, RFD 3720.
- To add ports to a Fibre Channel attached host, issue the addhostport CLI
command.
For example, issue the following CLI command:
addhostport -hbawwpn wwpn_list new_name
This command adds another
HBA WWPN
wwpn_list to the host that was created
in step
1.
- To add ports to an iSCSI-attached host,
issue the addhostport CLI command.
For example, issue the following CLI command:
addhostport -iscsiname iscsi_name_listnew_name
where
iscsi_name_list specifies the comma-separated list of IQNs
to add to the host. This command adds an IQN to the host that was
created in step
2.
- To set the Challenge Handshake Authentication Protocol
(CHAP) secret that is used to authenticate the host for iSCSI I/O,
issue the chhost CLI command.
This secret is shared between the host and the system. For example,
issue the following CLI command:
chhost -chapsecret chap_secret
where
chap_secret is the CHAP secret that is used to authenticate the host for iSCSI
I/O. To list the CHAP secret for each host, use the
lsiscsiauth command. To clear any previously set CHAP secret for a host, use
the
chhost -nochapsecret command.
After you have created the host object on the system, you
can map
volumes to a host.
If you are unable to discover the disk on the host system or if there
are fewer paths available for each disk than expected, test the connectivity
between your host system and the system. Depending on the connection
type to the host, these steps might be different. For iSCSI-attached hosts, test your connectivity
between the host and Lenovo Storage V7000 ports
by pinging Lenovo Storage V7000 from
the host. Ensure that the firewall and router settings are configured
correctly and validate that the values for the subnet mask and gateway
are specified correctly for the Lenovo Storage V7000 host
configuration.
For Fibre Channel attached hosts, ensure that the active switch configuration includes
the host zone and check the host-port link status. To verify end-to-end
connectivity, you can use the lsfabric CLI command
or the View Fabric panel under Service and Maintenance container in
the management GUI.