3.6. Connecting remote iSCSI devices to storage cluster nodes

Acronis Cyber Infrastructure allows you to connect remote iSCSI devices to nodes and perceives their LUNs as storage disks. You can connect iSCSI devices to nodes at any time.

Note the following:

  1. iSCSI targets can only be used for storage if they have synchronous writes enabled.
  2. Remote iSCSI devices cannot be attached to hosts that belong to iSCSI target groups.
  3. Only one IQN can be used per node. You can connect multiple iSCSI targets using other cluster nodes.

To connect a remote iSCSI device to a node, do the following:

  1. On the Infrastructure > Nodes screen, click the required node name. On the Disks tab, click iSCSI target.

  2. In the Remote iSCSI Target window, do the following:

    1. Specify the IQN of the target.
    2. In the Portal and Port fields, specify the target’s IP address and port (optional), and then click the check mark.
    3. If the target has multiple paths, click Add portal and configure it as in the previous step.
    4. (Optional) To enable CHAP authentication for the target, select CHAP authentication and specify the credentials.
    5. Click Connect.

The target will be connected and all of its LUNs will be initiated. Devices of the iSCSI type will appear in the node’s DISKS list.


If you add another LUN to a connected target, rescan it by running iscsiadm -m node -R in the host’s console.

To remove an iSCSI target, click iSCSI Target, Delete connection, and then click Delete.

3.6.1. Assigning disk roles to remote iSCSI devices

If the node had already been in the cluster before you connected the iSCSI device to it, assign disk roles to all of its LUNs. To do this:

  1. Select a disk with the iSCSI type, and then click Assign.
  2. In the Choose role window, select Storage, and then click Done.
  3. Repeat the above steps for every disk with the iSCSI type.

Even though you can assign Metadata or Cache roles to such disks, it is recommended only for single-node installations for Backup Gateway with SAN-provided redundancy. For more information on disk roles, refer to Assigning disk roles manually.