SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
 

 

    iStorage Server: iSCSI SAN for Xen Server 
                         Friday, May 28, 2010 

                                     

                                     

                                     

                                     

                                     

                                     

                                     

                      KernSafe Technologies, Inc. 

                          www.kernsafe.com 

    Copyright © KernSafe Technologies 2006‐2010. All right reserved. 

 

 

 

 

 

 

 
Table of Contents 

Overview  ...................................................................................................................................................... 3 
        .

Install Xen Server  ......................................................................................................................................... 4 
                  .

Configuring on iStorage Server .................................................................................................................... 4 

    Choose the Authentication Mechanism .................................................................................................. 4 

    Create Target ............................................................................................................................................ 6 

Configure Xen Server  ................................................................................................................................. 12 
                    .

    Log On to Xen Server .............................................................................................................................. 12 

    Add iSCSI storage device into Xen Server .............................................................................................. 14 

    Create a virtual machine ........................................................................................................................ 18 

    Install Operating system ........................................................................................................................ 24 

Contact ........................................................................................................................................................ 29 

 

 

 

 

 

 

 

 

 

 

 
Overview 
iStorage Server is a network based storage virtualization software powered by KernSafe Technologies, 
Inc. Being a powerful, full‐featured and software‐only iSCSI Target SAN solution, that can quickly convert 
existing Windows computer into IP SAN. Storage media of iSCSI Target can include existing storage 
devices such as the entire hard disks or partitions, CD‐RWs, tapes and USB storage devices, as well as 
disk image file or CD image files including ISO9660(,iso), .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img, .raw 
and other image file formats. Furthermore, iStorage Server also supports a lot of features such as: VHD 
(Virtual Hard Disk) target, snapshots, STPI, RAID‐1 and failover, these features are very important and 
poplar in storage industry world and make iStorage Server is suitable for any size of business. 

Citrix Xen Server™ is the only enterprise‐class, cloud‐proven virtualization platform that delivers the 
critical features of live migration and centralized multi‐server management at no cost. Xen Server is an 
open and powerful server virtualization solution that radically reduces datacenter costs by transforming 
static and complex datacenter environments into more dynamic, easy to manage IT service delivery 
centers. 

This article demonstrates how iStorage Server works under XenServer. Such powerful combination will 
expand the application scope of your virtual server, thereby enabling WINDOWS server to expand the 
storage of your virtualized server. It also allows you to directly use the storage devices of the existing 
Windows server for XenServer.  With IP SAN solution provided by iStorage Server, you may set up 
operating systems, install applications and server softwares, as well as store data required by your 
virtual machines. Your XenServer storage can be expanded in the following 3‐most‐commonly‐used 
ways: 


    •    Use Virtual Image File Disk Device to create a file‐based virtual storage device for Citrix Xen 
         Server, this allows quick data migration and backup.  
    •    Directly use the physical disk or partition of Windows server. This enables you to make good use 
         of resource. No additional configurations, just add the storage media to iSCSI Targets. 
    •    Use CD/DVD/RW bridge device or Virtual CD/DVD to map physical CD/DVD drives or CD/DVD 
         image files (iso, .bin, .mdf, .cdi, .b5i, .nrg, .ccd, .sub, .img, .raw) on your Windows server to 
         CD/DVD devices on Citrix Xen Server virtual machine.  
After iStorage Server 2.0, it supports server side mirroring, synchronous replication and failover which 
allows user to create a high‐availability iSCSI SAN for Citrix XenServer. 


Install Xen Server 
You need a server running Xen Server. Xen Server must first be installed on to a suitable machine that 
will be used to create the virtual environment. For how to obtain or install Citrix Xen Server, please 
contact the Citrix supplier.  


Configuring on iStorage Server 

Choose the Authentication Mechanism 
Decide which authentication mechanisms you would want to use: Anonymous, CHAP, IP address or 
Mixed authentication. 
 
1), Anonymous: 
      All initiators will get full access permission without any authorization required. 
2) CHAP (Challenge‐handshake authentication protocol) 
    All initiators need to specify a CHAP user and secret to connect to the target. iStorage Server has a 
    built‐in user called “Guest”, which is used for initiators without CHAP secret specified. 
3) IP Filters 
    All initiators will be authorized by the incoming IP address defined by IP Filter roles. 
4) Mixed 
     Security policy is determined by both CHAP and IP Filters. 
 
Open iStorage Server Management Console. 
 

Create User 

Right click Users Tree Node on the left tree view. 

Press Add button in the tool bar. 

 Create/Edit User dialog is shown.  
Type user name and password as you like, but we recommend that the password should be 12‐16 
characters. We take the user name XenUser and password 111111111111 as an example.  
Press OK button to complete creating user.  

 

 Create group 

After create user, we need a group to hold this user.  

Right click Groups tree node in the left tree view. 

Press Add button on the toolbar, a Create/Edit Group Dialog is shown.   




Take a group name as you like and then click Add button and then select the user which we just created, 
we take XenGroup as an example.  

 


Create Target 
Launch the iStorage Server management consolle, press the Create button on the toolbar of iStorage 
Server management console, the Create Device Wizard is shown. 

 

Select a device type 




                                                                                                 

Choose Hard Disk. 

Press the Next button to continue.  

 

Select a medium type. 
 

Choose Image File in iSCSI Medium Type window.  

Then press Next button to continue. 

 

 

 

 

 

 

 

 
Select an Image type. 




                                       

Choose Standard Image File. 

Press the Next button to continue. 

Specify image file path and size. 
 

Specify the image file. 

Specify the device size. 

If you check Use sparse file on NTFS file system, the size of disk image file only depend on its content 
used, it can save your hard disk space. 

Press the Next button to continue.  

 

Set authorization mode. 
 

Choose CHAP Authorization. 

Press the Next button to continue. 

 

Finish creating iSCSI Target 
 

Type a target name in the Target Name field, or use the default. 

Press the Finish button to continue. 

 


Configure Xen Server  

Log On to Xen Server 
Open Xen Server console. 
 

Click Add New Server in the tool bar.  

Add New Server dialog is shown. 




                                                                           


Input IP address / Name with which running Xen Server, User name and password. 
Press the Connect button to continue. 

The XenCenter which connect to Xen Server is shown. 




 



Add iSCSI storage device into Xen Server 
Click New Storage, New Storage Repository dialog is shown. 
 

Input IP address and port (if not 3260) of the Host that runs iStorage Server, press the Discover IQNS 
button, a list of Targets in drop‐down control is shown. 
Select desired target in the list. 

If the target you want to connect to has CHAP Authentication, check Use CHAP and input user name and 
secret. 

Press the Discover LUNs button. 

The iSCSI Target now contains a valid LUN. Here we create a 10G image file device as a demo.  




Press the Finish button to continue. 

The following dialog is shown. 
press the Yes button to continue.

Now Xen Server is carrying on a series of operations, such as Creating SR, to create data structures 
required by data repositories. 




Sorted! You now see an iSCSI storage device successfully added into Xen Server. 
Create a virtual machine 
Click New VM on Xen Server console. 

Select Windows 7 x64 in the following wizard.  
Input the desired name and description. 
Press the Next to continue. 

Select installation media for operating system.  
Choose physical DVD Drive on XenServer.  

Press the Next button to continue. 

Specify the number of CPUs and memory size.  
Select numver of vCPUs. 

Specify initial memory size. 

Press the Next button to continue. 

Select storage device. 
First you see an iSCSI Virtual disk storage device, which is previously created by iStorage Server. It is Xen 
Server’s default storage device. If you want to add other virtual disk, press the Add button. 

Select iSCSI virtual disk storage… and then press the Next button, the Disk Settings dialog is shown.  
Specify the size of the new virtual disk.  

Press the OK button to finish the wizard.  

A virtual machine is built.  

 Note that before Version 5.5 update1 in the Storage labels of your virtual machine, you need to 
exchange the position of iSCSI Virtual Storage and Local Storage (make sure iSCSI Virtual Storage at 
position 0) so that the operating system can be installed on this iSCSI device. 



Install Operating system 
Run the virtual machine and set up the operating system.  

The process is just like that on real machine.  
Press the Install Now button to install OS. 
Select the 9G disk. Just like that on a real hard disk. 

Setup starts copying files  




Last, with all work done, we’ll see iSCSI virtual storage device in the virtual operating system. 
Likewise, you may install Windows Server 2003, Windows XP, Vista and Windows Server 2008, or even 
any version of Linux as you wish.  


 


 

 

 

 

 
Contact 
Support:          support@kernsafe.com
Sales:            sales@kernsafe.com
Home Page:        http://www.kernsafe.com/
Product Page:     http://www.kernsafe.com/product.aspx?id=5
Licenses          http://www.kernsafe.com/product.aspx?id=5&name=License+Types
Forum:            http://www.kernsafe.com/forum/
    

   

   

   

   

   

   

   

   

   

   

   

   

                             KernSafe Technologies, Inc. 

                                www.kernsafe.com 

          Copyright © KernSafe Technologies 2006‐2010. All right reserved. 
 

Más contenido relacionado

Similar a Configure iSCSI SAN for Xen Server with iStorage Server

Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...
Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...
Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...KernSafe Technologies
 
iStorage Server: iSCSI SAN for Windows Server 2008 Clustering
iStorage Server: iSCSI SAN for Windows Server 2008 ClusteringiStorage Server: iSCSI SAN for Windows Server 2008 Clustering
iStorage Server: iSCSI SAN for Windows Server 2008 ClusteringKernSafe Technologies
 
iStorage Server - High Availability iSCSI SAN for Windows Server 2003
iStorage Server - High Availability iSCSI SAN for Windows Server 2003iStorage Server - High Availability iSCSI SAN for Windows Server 2003
iStorage Server - High Availability iSCSI SAN for Windows Server 2003KernSafe Technologies
 
Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7Devin Olson
 
Gluster Storage Platform Installation Guide
Gluster Storage Platform Installation GuideGluster Storage Platform Installation Guide
Gluster Storage Platform Installation GuideGlusterFS
 
Installation and Configuration
Installation and ConfigurationInstallation and Configuration
Installation and ConfigurationDaniel Taylor
 
Es xi 07-create-virtual-machine
Es xi 07-create-virtual-machineEs xi 07-create-virtual-machine
Es xi 07-create-virtual-machinedzar123456
 
Howto connecttoaniscsi targetusingwindows
Howto connecttoaniscsi targetusingwindowsHowto connecttoaniscsi targetusingwindows
Howto connecttoaniscsi targetusingwindowsganttsetseg
 
Administering windows xp
Administering windows xpAdministering windows xp
Administering windows xpSamaja
 
Documentation freenas
Documentation freenas Documentation freenas
Documentation freenas Moaaz Magdy
 
Documentation free nas
Documentation free nasDocumentation free nas
Documentation free nasMoaaz Magdy
 
Windows server 2008 r2 installation
Windows server 2008 r2 installationWindows server 2008 r2 installation
Windows server 2008 r2 installationsudhir singh yadav
 
How to Install Gluster Storage Platform
How to Install Gluster Storage PlatformHow to Install Gluster Storage Platform
How to Install Gluster Storage PlatformGlusterFS
 
How to Connect to a DSS V6 iSCSI Target Volume from a Microsoft Windows
How to Connect to a DSS V6 iSCSI Target Volume from a Microsoft WindowsHow to Connect to a DSS V6 iSCSI Target Volume from a Microsoft Windows
How to Connect to a DSS V6 iSCSI Target Volume from a Microsoft Windowsopen-e
 
How to Create a Windows Server 2008 Virtual Lab Using VirtualBox
How to Create a Windows Server 2008 Virtual Lab Using VirtualBoxHow to Create a Windows Server 2008 Virtual Lab Using VirtualBox
How to Create a Windows Server 2008 Virtual Lab Using VirtualBoxRusty Painter
 
Installation of windows server 2003
Installation of windows server 2003Installation of windows server 2003
Installation of windows server 2003SANTOSH SAHANI
 

Similar a Configure iSCSI SAN for Xen Server with iStorage Server (20)

Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...
Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...
Kern safe istorage server-high-availability-iscsi-san-for-windows-server-2008...
 
iStorage Server: Remote Tape Backup
iStorage Server: Remote Tape BackupiStorage Server: Remote Tape Backup
iStorage Server: Remote Tape Backup
 
iStorage Server and IP SEC
iStorage Server and IP SECiStorage Server and IP SEC
iStorage Server and IP SEC
 
iStorage Server: iSCSI SAN for Windows Server 2008 Clustering
iStorage Server: iSCSI SAN for Windows Server 2008 ClusteringiStorage Server: iSCSI SAN for Windows Server 2008 Clustering
iStorage Server: iSCSI SAN for Windows Server 2008 Clustering
 
Installation CentOS 6.3
Installation CentOS 6.3Installation CentOS 6.3
Installation CentOS 6.3
 
iStorage Server - High Availability iSCSI SAN for Windows Server 2003
iStorage Server - High Availability iSCSI SAN for Windows Server 2003iStorage Server - High Availability iSCSI SAN for Windows Server 2003
iStorage Server - High Availability iSCSI SAN for Windows Server 2003
 
Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7Installing and Configuring Domino 10 on CentOS 7
Installing and Configuring Domino 10 on CentOS 7
 
Gluster Storage Platform Installation Guide
Gluster Storage Platform Installation GuideGluster Storage Platform Installation Guide
Gluster Storage Platform Installation Guide
 
Installation and Configuration
Installation and ConfigurationInstallation and Configuration
Installation and Configuration
 
Es xi 07-create-virtual-machine
Es xi 07-create-virtual-machineEs xi 07-create-virtual-machine
Es xi 07-create-virtual-machine
 
Howto connecttoaniscsi targetusingwindows
Howto connecttoaniscsi targetusingwindowsHowto connecttoaniscsi targetusingwindows
Howto connecttoaniscsi targetusingwindows
 
How To Install CentOS 7
How To Install CentOS 7How To Install CentOS 7
How To Install CentOS 7
 
Administering windows xp
Administering windows xpAdministering windows xp
Administering windows xp
 
Documentation freenas
Documentation freenas Documentation freenas
Documentation freenas
 
Documentation free nas
Documentation free nasDocumentation free nas
Documentation free nas
 
Windows server 2008 r2 installation
Windows server 2008 r2 installationWindows server 2008 r2 installation
Windows server 2008 r2 installation
 
How to Install Gluster Storage Platform
How to Install Gluster Storage PlatformHow to Install Gluster Storage Platform
How to Install Gluster Storage Platform
 
How to Connect to a DSS V6 iSCSI Target Volume from a Microsoft Windows
How to Connect to a DSS V6 iSCSI Target Volume from a Microsoft WindowsHow to Connect to a DSS V6 iSCSI Target Volume from a Microsoft Windows
How to Connect to a DSS V6 iSCSI Target Volume from a Microsoft Windows
 
How to Create a Windows Server 2008 Virtual Lab Using VirtualBox
How to Create a Windows Server 2008 Virtual Lab Using VirtualBoxHow to Create a Windows Server 2008 Virtual Lab Using VirtualBox
How to Create a Windows Server 2008 Virtual Lab Using VirtualBox
 
Installation of windows server 2003
Installation of windows server 2003Installation of windows server 2003
Installation of windows server 2003
 

Último

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 

Último (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 

Configure iSCSI SAN for Xen Server with iStorage Server