09.03.2015 Views

VSAN-Troubleshooting-Reference-Manual

VSAN-Troubleshooting-Reference-Manual

VSAN-Troubleshooting-Reference-Manual

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Diagnostics and <strong>Troubleshooting</strong> <strong>Reference</strong> <strong>Manual</strong> – Virtual SAN<br />

Verifying subnets/VLAN settings<br />

To view correct subnet masks, the following ESXCLI command may be used on each<br />

ESXi host in the cluster:<br />

esxcli network ip interface ipv4 get –i vmk2<br />

~ # esxcli network ip interface ipv4 get -i vmk2<br />

Name IPv4 Address IPv4 Netmask IPv4 Broadcast Address Type DHCP DNS<br />

---- ------------ ------------- -------------- ------------ --------<br />

vmk2 172.32.0.4 255.255.255.0 172.32.0.255 STATIC false<br />

~ #<br />

One thing missing from the above output is the VLAN id associated with the Virtual<br />

SAN network. This is important as the vmknic for the Virtual SAN network on some<br />

hosts may be tagged with the VLAN IDs and others may not be tagged. This will<br />

again lead to network misconfiguration and cluster partitioning.<br />

To check which VLAN ID, if any, is associated with the Virtual SAN network, the<br />

easiest way is to use the vSphere web client, and navigate to the VMkernel adapter<br />

on each host, select the Virtual SAN network adapter, and check its properties as<br />

shown below. This screenshot is taken from a Virtual SAN 5.5 deployment:<br />

In this case, the Virtual SAN network is not using VLANs that is why the VLAN type<br />

in the lower part of the screen is set to “None”. If VLANs were being used, this<br />

information would be populated. This would then have to be checked on all hosts in<br />

the Virtual SAN Cluster.<br />

V M W A R E S T O R A G E B U D O C U M E N T A T I O N / 1 2 0

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!