Professional Documents
Culture Documents
Copyright Notice Copyright 2008 IBM Corporation, including this documentation and all software. All rights reserved. May only be used pursuant to a Tivoli Systems Software License Agreement, an IBM Software License Agreement, or Addendum for Tivoli Products to IBM Customer or License Agreement. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without prior written permission of IBM Corporation. IBM Corporation grants you limited permission to make hardcopy or other reproductions of any machine-readable documentation for your own use, provided that each such reproduction shall carry the IBM Corporation copyright notice. No other rights under copyright are granted without prior written permission of IBM Corporation. The document is not intended for production and is furnished as is without warranty of any kind. All warranties on this document are hereby disclaimed, including the warranties of merchantability and fitness for a particular purpose. Note to U.S. Government UsersDocumentation related to restricted rightsUse, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corporation. Trademarks The following are trademarks of IBM Corporation or Tivoli Systems Inc.: IBM, Tivoli, AIX, Cross-Site, NetView, OS/2, Planet Tivoli, RS/6000, Tivoli Certified, Tivoli Enterprise, Tivoli Ready, TME. In Denmark, Tivoli is a trademark licensed from Kjbenhavns Sommer - Tivoli A/S. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. C-bus is a trademark of Corollary, Inc. in the United States, other countries, or both. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Lotus is a registered trademark of Lotus Development Corporation. PC Direct is a trademark of Ziff Communications Company in the United States, other countries, or both and is used by IBM Corporation under license. ActionMedia, LANDesk, MMX, Pentium, and ProShare are trademarks of Intel Corporation in the United States, other countries, or both. SET and the SET Logo are trademarks owned by SET Secure Electronic Transaction LLC. For further information, see http://www.setco.org/aboutmark.html. Other company, product, and service names may be trademarks or service marks of others. Notices References in this publication to Tivoli Systems or IBM products, programs, or services do not imply that they will be available in all countries in which Tivoli Systems or IBM operates. Any reference to these products, programs, or services is not intended to imply that only Tivoli Systems or IBM products, programs, or services can be used. Subject to valid intellectual property or other legally protectable right of Tivoli Systems or IBM, any functionally equivalent product, program, or service can be used instead of the referenced product, program, or service. The evaluation and verification of operation in conjunction with other products, except those expressly designated by Tivoli Systems or IBM, are the responsibility of the user. Tivoli Systems or IBM may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to the IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, New York 10504-1785, U.S.A.
Introduction
The Tivoli Worldwide Education Course Development team, IBM Tivoli Support and Services, the GEO Delivery Managers, and instructors from all three geographical regions have been involved in the design, development, and review of this course. This is an update of IBM Tivoli Storage Manager 5.4 Implementation and Administration, Part One.
Detailed Revisions
There are recorded presentations of the changes to the slides on your Instructors Resources CD.
TSM 5.5 Implementation and Administration Preface Unit 1: IBM Tivoli Storage Manager Overview Unit 2: Installing IBM Tivoli Storage Manager Unit 3: Administrative Interfaces and Privileges Unit 4: Storage Media Devices Introduction
Changes from TSM 5.4 Implementation and Administration, Part One New Training Roadmap has been added.
Supported platforms were updated. Screen capture of Web page was added. Linux requirements and installation overview has been added. The query examples were chnaged to q admin and q db.
Determining element number sldie updated. Defining and updating ADP moved to Lesson 4 in Unit 10. overview and collocation od ADPs remain. Collocation section was reworked. Collocation by Groups was moved to after Collocation Volume Selection examples. Concurrent access to FILE volumes was added. Slide or active-data pool commands was corrected and slide with define stgpool command syntax was added.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
TSM 5.5 Implementation and Administration Unit 7: Customizing the TSM Database and Recovery Log Unit 8: Client Configuration
Encryption support has been updated. TCP/IP version 6 added as a commmethod. SSL was added. Support for long object names was added. Lesson 5: Archive and Retrieve was moved to after Lesson 6: Backup and Restore Command Line. Now Backup and Restore CLI follows Backup and Restore GUI in the Studnets Guide. No changes to the Students Exercises. AIX JFS2 snapshot added. Open file support for Windows 64-bit added. File names in Restore CLI slides have been changed. Defining and updating ADP from Unit 5 is now Lesson 4. Changes to Student Exercises: new Exercise 7 Define an active-data pool with command line new Exercise 8 Update a policy domain to have an active-data pool destination with command line existing Exercise 9 (formerly exercise 7) Use the Administration Center to create a maintenance script to backup primary storage pool new Exercise 10 Perform a simultaneous write to backuppool and adpool. new Exercise 11 (optional) Use Administration Center to create a new device class, new active-data pool, and policy domain for use with the active-data pool. Solutions are not provided, only hints. The new exercises 7 and 8 will require that the students recall commands covered in Units 5 and 6.
Unit 11: Automating Operations Unit 12: Monitoring and Event Logging Appendix A Appendix B
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course Materials
The following table contains the part numbers for the course materials, along with any part numbers that are being replaced.
Item IBM Tivoli Storage Manager 5.5 Implementation and Administration Students Training Guide IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructors Training Guide IBM Tivoli Storage Manager 5.5 Implementation and Administration Student Exercises for AIX IBM Tivoli Storage Manager 5.5 Implementation and Administration Student Exercises for Windows IBM Tivoli Storage Manager 5.5 Implementation and Administration Student Exercises for Linux IBM Tivoli Storage Manager 5.5 Implementation and Administration Student Resources CD IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Resources CD IBM Tivoli Storage Manager 5.5 Implementation and Administration Classroom Setup CD
Replaces S150-2387-00
S150-2874-00
S150-2876-00
n/a
SK5T-8060-00
SK5T-7295-00
SK5T-8061-00
SK5T-7296-00
SK5T-8062-00
SK5T-7297-00
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Instructor Preparation
Introduction
This section is a compilation of notes by the course developer to help others deliver IBM Tivoli Storage Manager 5.5 Implementation and Administration. It gives an overview of the course, instructions for setting up the classroom, and other information that instructors should have to make the class a success. This is an updated version of the IBM Tivoli Storage Manager 5.4 Implementation and Administration, Part One course. The title has changed as well as the version number.
Course Components
The following materials and equipment are needed to deliver the training. The Instructor Kit: Instructors Training Guide Instructor Resources CD, including, printable Instructor Notes, the PowerPoint Slideshow, and recordings of the course changes, by unit. Course Setup Guide CD Student Exercises for AIX Student Exercises for Linux Student Exercises for Windows
The Student Kit, for each student: Students Training Guide Student Exercises for AIX Student Exercises for Linux Student Exercises for Windows
Instructor Preparation
Student Resources CD, including documentation, RedBooks, PowerPoint presentation on Operational Reporting, Field Guides, Technical Notes, and policy planning worksheets.
PC Projection Unit
Much of the day is spent on a lengthy slide presentation delivered with a PC-based projection unit. The make and operation of the projection system is apt to vary among classrooms, but there are some common considerations that need to be taken into account. First, the slides are best viewed on a typical 4 x 4 screen. This means arranging for the projector to be a good distance from the screen, not on the instructor's podium where an overhead project might belong. Most projectors have remote controls, so it is not necessary to place it in reach of the instructor. (It behooves the instructor to get in some practice operating the projector from the remote prior to class.) Most projectors can be adjusted for different graphics resolutions and screen sizes. Some experimentation prior to class may be required to get the best results. It is necessary to project the entire area of the slide, since some utilize the whole frame. Many projection systems cannot support video output to the projector and the PC monitor at the same time. This means the instructor must be prepared to deliver the lecture without turning around to look at the projection screen. This is best accomplished by working from the Instructors Training Guide, which contains all the slides used in the lectures. The Instructor Notes table has room for you personal comments and reminders for delivery.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Instructor Preparation
Timing Guidelines
Reasonable target times for pacing the course lecture and exercises are shown in the following table.
Unit Day 1 Unit 1 Unit 2 Unit 3 Day 2 Unit 4 Unit 5 Unit 6 Day 3 Unit 7 Unit 8 Day 4 Unit 9 Unit 10 Day 5 Unit 11 Unit 12 Appendix A Appendix B
Hours
1 2 3
1 2.5 2.5
2.5 3.5
3 3
2 2 1* 1*
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Instructor Preparation
Audience
This course is intended for system administrators and implementers who will be responsible for implementing an IBM Tivoli Storage Manager 5.5 solution.
Required Skills/Knowledge
The following list contains the prerequisite knowledge or Tivoli product knowledge an attendee must have prior to taking the course: All students should have a working knowledge of Internet browsers. All students should have a basic understanding of client-server concepts. For classes taught on a Windows platform, the students should have the skills to navigate through Windows 2003 applications. For classes taught on a Linux platform, the students should have experience using the Linux command-line interface, allocating file system space, and connecting devices to a Linux server. For classes taught on an AIX platform, the students should have experience using the AIX command-line interface, allocating file system space, and connecting devices to an AIX server.
Demonstrations
Prompts for instructor demonstrations have been removed from the PowerPoint slide show presentation. Suggested demonstrations are in the Instructor Notes, which are included on the Instructor Resources CD. The students will not be installing the Integrated Solutions Console (ISC) due to time constraints. The demonstration of the ISC installation, as well as navigation demonstrations of the Administration Center, would be very beneficial for the students.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Instructor Preparation
Student Exercises
There are three Student Exercise Guides: AIX, Linux, and Windows. These exercises have been tested successfully, by a variety of course developers, on a variety of Windows 2003, Red Hat Linux, and AIX machines. If you are having a problem during course preparation testing or in the classroom, verify the hardware and software requirements in the Course Setup Guide.
Instructor Notes
The Instructor Notes table follows this document. A printable table of Instructor Notes is also available on the Instructor Resources CD.
Changes
The majority of the changes to this course are listed in the Revision History document. Even if you are familiar with the previous course, please review the PowerPoint slide show presentation to review the new slides and graphics.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Instructor Preparation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Instructor Notes for IBM Tivoli Storage Manager 5.5 Implementation and Administration March 2008 Location Topic Note Preface This course is designed to give the students the necessary skills to install and run TSM. Emphasize the use of the Administration Center in the class, because it is the preferred method of administering TSM (as requested by Development and Support). In many cases there are multiple methods or commands to perform the same function. You can share additional methods with the students. Where applicable, demonstrate the Administration Center. Preface x Suggestions in this Course Ensure the students know the Best Practices mentioned in the product documentation and in this course are suggestions based on product testing and monitoring in a variety of test and production environments. The do not override policies and requirements of their environment. .
Unit 1 1-1 Introduction This Overview includes the most basic elements of Storage Manager. Assure students that more detailed information will be provided as each subject is addressed in upcoming units. Demonstrate the backup-archive GUI.
1-15
Backup-Restore Functions
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 2 2-1 Topic Introduction Note Emphasize the importance of carefully reviewing all of the documentation material provided with the product before beginning an installation. The course follows the suggested installation flow: TSM Server, ISC, Administration Center. SNMP DPI You can configure the SNMP subagent to send traps to an SNMP manager, such as NetView, and to provide support for a management information base (MIB). For details about configuring SNMP for use with Tivoli Storage Manager, see the IBM Tivoli Storage Manager Administrator's Guide. The subagent communicates with the snmpd daemon, which in turn communicates with a management application. The snmpd daemon must support the DPI protocol. Agents are available on AIX . The subagent process is separate from the Tivoli Storage Manager server process, but the subagent gets the information from a server options file. When the SNMP management application is enabled, it can get information and messages from servers. TCP/IP version 6 is now supported. The students do not install the ISC in their lab exercises, due to time constraints. There are screen captures for the installation steps. Suggestion: Demonstrate the installation of the ICS while covering this unit. RSM services should be disabled. See Installation Guide.
(R)
2-5
2-8
ISC Installation
2-17
Device DriversWindows
2-40
Web Browser
2-46
Query System
The query system command consolidates the output from a number of query commands with a number of SQL SELECT commands. The query commands can obtain detailed information about specific areas of the server, while the SELECT statements can produce summaries of certain key areas. In many situations it is helpful to both the TSM administrator and other support personnel to obtain an overview of the TSM installation. This is addressed by the introduction of the query system command. Commands which can be issued by administrators with various privileges are also presented; however, the detailed syntax is not discussed.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 3 3-4
Note Demonstrate opening and navigating the ISC and Administration Center.
3-8
These slides show the opening of each task in the tree and the actions available for the tasks. This is a good place to do a demonstration.
3-19
Support Utility
3-29
Lesson 4: GUI
3-30
Backup-Archive GUI
3-32
Command Line
You can add the Use Command Line action to the Administration Center Favorites. Remind the students that the default Linux path is /opt, not /usr as it is with AIX.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
3-32 Command Line Let the students know that the Administrative command line is invoked when executing the dsmadmc.exe program found in the baclient directory (C:\Program Files\Tivoli\TSM\baclient) The default TCP/IP port address is 1580. Trivia: Program naming convention appears to be DSM=for product code, formerly ADSM; ADM=for administrator; C=for command line.
3-32
Command Line
Experience has shown that students get confused in lab exercises with the differences between the Administrative command-line interface and the backup-archive command-line client. It is important that you make sure students understand the difference between the command-line interfaces, DSMADMC for administrative and DSMC for clients.
3-39
Administrator Authority
Refer to the IBM Tivoli Storage Manager Administrators Guide and the IBM Tivoli Storage Manager Administrators Reference for complete lists of the commands and the list of tasks that the different levels of TSM administrator privilege can perform.
3-40
Privilege Classes
There are two differences between what an administrator with restricted and unrestricted privileges can do: The unrestricted administrator can issue commands which affect all domains and pools, whereas the restricted administrator can only issue commands which affect the domain and pools to which they are authorized. The unrestricted administrator can issue all policy and storage commands, whereas the restricted administrator can only issue a subset of those commands.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 4 4-4 Topic Connect a SCSI library Note For other types of libraries, such as fibre channel libraries, refer to the procedures provided by the manufacturer. Mention the A-Tape library.
4-8
Element number
4-11
If you define a volume explicitly with Define Vol, the volume becomes private and empty.
4-13
Labeling tapes
The use of dsmlabel is no longer a supported method now that autolabel, label libvolume, and the Administration Center can perform the function.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 5 5-10 Topic Storage Destination Note If backing up a mail server, it is best to go directly to tape.
5-12
The devclass in the define stgpool command is the name of the previously defined devicetype TSM object.
5-17
The q content command looks to a TSM table and not to the tape cartridge.
5-19
5-21
New feature
5-24
New method for calculating migration thresholds for storage pools associated with sequential-access disk (FILE) devices. In previous releases of Tivoli Storage Manager, migration thresholds for storage pools associated with sequential-access disk (FILE) devices were based on volume utilization. In this release, migration thresholds are based on a percentage of the storage pools total data capacity. For example, a sequential-access disk storage pool with a capacity of 100 TB and a high migration threshold of 70% is migrated when the pool contains 70 TB of data. Mention the possible problems with aggregate migration.
5-29
Reclamation
5-30
Check to see if students have a single drive library. If nobody has one, skip the next 2 pages. The data belonging to Client D will go to the volume with the most free space.
5-35
5-36
Collocation Example 2
The data belonging to Client D will go to the volume with the most free space.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 6 6-1 Topic Introduction Note Begin to introduce the concept of having business requirements for data management or service level agreement between the client and TSM administration personnel in the IT organization.
6-10
Policy Set
6-11
Defining MC
6-14
Copy Group
A copy group contains the parameters regarding how to manage the data (objects) belonging to the client, how many versions of backup to keep, and how long to keep the archive data. Notice that you can specify zero, one or two copy groups in a management class. If a management class is defined with no copy groups, users will receive warning messages if they choose to bind their files to this management class. When bound to this management class, files will never be backed up or archived. However, as a precautionary measure, TSM is designed to cover this problem by using the grace retention periods for backup and archive defined in the policy domain. This chart is to be used to go through what happens as TSM is backing up a changed file every day. Use the letter A for active and the letter I for inactive. Notice on day 6, the file goes unchanged. Go through the process for each day. If possible, project slides on a writable surface. If not, draw the diagram on a writable surface. On day 1 the file is changed or created. That evening it is backed up. Ask the students if the file on TSM storage would be Active or Inactive. Answer: Active. Write the letter A under the box for backup 1 on day 1. Follow this logic through to day 4. Write the letter I on all the extra versions. Ask the students what happens on day 4 to backup version 1. Answer: It will expire, because we are only keeping three versions of the file. Cross out the versions other than the first three on days 4, 5, and 6.
6-23
Expiration, Part 1
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
6-24 Expiration, Part 2 This takes over where we left off in the previous slide. Fill in active and inactive under the boxes. You should have done this on the board in the previous visual. Ask the students why backup 1 on day 4 is gone. Answer: Because we are keeping only three versions based on VERExist=3. Notice that the file goes unchanged from day 5 on. Ask the students what happens to extra backup 2 and 3 and on what days. Answer: On day 33 extra backup 2 should expire. Fill in active and inactive under the boxes. Cross it off the board and write 33 by the first ?. Ask the students why, if we were keeping three versions, there is only one left. Answer: Because retainextra is set to 30 and needs to be no limit if you always want three versions. This is very important emphasize. Ask the students when the active backup will expire. Answer: It will not expire. Ask the students why backup 2 expired on day 33. Answer: It became inactive on day 3 and you add 30 days based on RETEXTRA=30. Use a story about a resume being updated daily. Then on Day 5 no more changes are made because the salary was doubled and the person was given a car as a bonus. Complete the process by erasing the file on the morning of day 4. Ask the students what happens now. Answer: Backup 3 will go inactive. Mark it on the board with the letter I. Ask the students how many extra copies will be there after the incremental backup on day 4. Verdeleted is set to 1 so we lose backups 2 and 1. Mark them out on the board. Ask the students when the only backup will expire. Answer: Around day 64. Retonly is set to 60. Now, resume.doc is expired. The employee likes the new car and decides to stay with the company, and no longer needs the resume. Point out what happens when you activate a policy set. But first review what a domain is. Ask students what goes inside a domain. Answer: Policy sets. Ask students what goes inside a policy set. Answer: Management classes. Ask students what goes inside management classes. Answer: Copy groups. With each answer write the name on the board in the visual in the appropriate box that is policy set, management class, and copy group. Ask students what happens when you activate. Answer: TSM makes a copy of the policy set, and names it ACTIVE. You cannot change the active policy set. You can change only the one from which it was activated. Ask students what is the minimum number of policy sets you can have in an active valid configuration. Answer: Two, the one you defined, and the active one.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
6-25
Expiration, Part 3
6-31
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
6-32 Binding MC Be sure students understand the difference between active and inactive. If time allows, walk through another expiration example.
6-39
Summary
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 7 7-9 Topic Recovery Log Space Note If the volumes are physically allocated on the same disk, it would be best to allocate a single volume and optional mirrors to avoid performance problems. It is not advisable to use optical storage for the database or the recovery log because of performance characteristics. Increasing the recovery log size can increase the TSM server startup time.
7-13
Common practice is to set the recovery log size to the maximum. An alternate method is qlog f=d, backup the database, reset logconsumption.
7-13
In both normal mode and roll-forward mode, the volume of TSM transactions affects how large you should make your recovery log. As more clients are added and the volume of concurrent transactions increases, you should extend the size of the log. In roll-forward mode you must also consider how often you perform database backups. In this mode, the recovery log keeps all transactions since the last database backup and typically requires significantly more space than is required in normal mode.
7-14
Each time you define a new database or recovery log volume, you provide additional space to the database or recovery log. For performance reasons, define more than one volume for the database and recovery log, and place these volumes on separate disks to allow simultaneous access to different parts of the database or recovery log. When possible, assign each database and recovery log volume to separate disk strings, preferably on disks with different control units and channels. To protect database and recovery log volumes from media failure, you can use the mirroring feature. To use disk space efficiently, allocate a few large disk volumes rather than many small disk volumes. In this way, you avoid losing space to TSM overhead processing.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
10
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
7-19 Mirroring TSM provides nondisruptive and immediate recovery from physical failures on database and recovery log volumes through mirroring. If a mirrored volume encounters a media failure, the server automatically places the failing volume offline and continues database operations using the mirrored copies. After the failed disk is replaced and made available to the server, it is automatically synchronized with the intact copies. The hardware dual copy could also be used to provide protection from media failures. The advantage of using dual copy is faster write performance because the server issues a single write and the storage control asynchronously writes the additional copy. With mirroring, multiple writes are issued at the same time. Mirroring is not recommended with RAID 5, unless it is mirrored to a separate RAID array.
7-19
Mirroring
Database volume copies increase the availability of the database and provide safeguards against media failure. You can have as many as two volume copies of an existing database volume. After each database volume copy is defined, the server attempts to synchronize the volume copy with the database. Recovery log volume copies increase the availability of the recovery log and provide safeguards against media failure. You can have as many as two volume copies of an existing recovery log volume. After each recovery log volume copy is defined, the server attempts to synchronize the volume copy with the recovery log. The 2-step process (dsmfmt and define) is not covered in order to make the topic less confusing for beginning storage administrators. You can include it if you want to.
7-23
If space trigger was set during installation, you can only modify it using the command line. Mention the define spacetrigger stg command and how it differs from space triggers for the database and recovery log.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
11
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 8 8-4 Topic Command Line Note Refer to the IBM Tivoli Storage Manager Administrator Reference Guides for other platforms. Demonstrate navigation of backup-archive GUI.
8-7
GUI
8-16
Client Options
The backup-archive client is enhanced to support backup and restore of directories in a more intuitive and logical way. If none of the options are used, both directories and files are backed up or restored. The DIRSONLY and FILESONLY options can only be specified on backup or restore commands using the backup-archive command line client. The options cannot be put in the client user options file (dsm.opt).
8-17
Client Options
Tivoli Storage Manager now supports fully qualified object names of up to 8704 bytes in length. This support is available for backup and restore functions, and is dependent on whether or not the client also supports the byte length. Long names might be abbreviated in message or query output due to length. You can display them using the DISPLAY OBJNAME command.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
12
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
8-20 Graphical Options Editor Defining a TSM client option set is a two-step process. First, the client option set is defined, and then, the options are defined to it. A graphical options editor (available under Edit > Preferences) is provided with the backup-archive GUI. The graphical options editor makes the process of updating the TSM client options more user friendly and less error prone. The options editor groups the options in the following categories: General: Set general processing options for TSM such as nodename and errorlog. Backup: Set backup processing options. Restore: Set restore processing options such as file replace. Include-Exclude: Specify Include-Exclude processing options. Scheduler: Specify processing options for scheduled TSM work. For example, options that influence scheduling services such as schedule mode and schedule log file handling. Regional Settings: Set locale options for your client node. Authorization: Specify authorization options for your client. Web Client: Specify processing options for your TSM Web client. Command Line: Specify TSM command-line client processing options. Diagnostic: Specify type of tracing to perform in the event of a problem with your TSM client. Communication: Update TCP/IP communication options such as TSM server name, TCP window and buffer sizes. Refer to the TSM Client Options chart. All system services components are now backed up as part of system state. This eliminates the need to schedule a separate backup for system services or specifying systemservices in the domain. You will not be able to back up individual system services components; however, individual components can be restored.
8-26
Options
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
13
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
8-32 Include-Exclude Determine if the files specified will be selected for backup based upon the include-exclude list provided. Remember, if it is not excluded, it is included. bob.log is excluded (matched on line 1) fileone is included (matched on default) /home/nobody/data/file1.dat is excluded (matched on line 2) /usr/lwp/resume.ibm (included matched on line 4) /usr/lwp/data/file1.dat is excluded (matched on line 3)
8-50
Transparent encryption support Support has been added for transparent encryption, using the encryptkeygenerate option.
8-53
SSL
Communications between the Tivoli Storage Manager server and the backup-archive client, administrative command-line client (dsmadmc), and client Application Programming Interface are always password protected. However, you can now add another level of data protection by using Secure Sockets Layer (SSL). SSL is the standard technology for creating encrypted links between servers and clients. SSL provides a secure channel for servers and clients to communicate over open communications paths.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
14
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 9 Unit 9 Topic General Note Note Client node proxy support Backup time can be reduced with client node proxy support. Tivoli Storage Manager nodes, when authorized as agent nodes, can be directed to back up or restore data on behalf of another node (the target node). This enables concurrent operations from multiple nodes to store data to the same target node and file space in parallel. Client nodes can also be configured with proxy node authority to support many of the systems that can be configured to support clustering failover. The asnodename option also allows data to be restored from a different system than the one which performed the backup. Client node proxy is not in the Student Guide, because there is so many concepts already covered. Mention it to the students, if you feel it is appropriate. Mention that Incremental by Date is not often used.
9-5
9-5
9-22
Restore
The difference in No Query Restore and Classic Restore was take from this class and put into the Part Two class, so as to not overload the students. You might want to give a brief overview.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
15
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
9-25 Point-in-Time Restore A point-in-time restore recovers a file space or a directory to the state it had at a prior date and time. A point-in-time restore is difficult to perform using the TODATE and TOTIME options with the restore command. A point-in-time restore is selected from the backup-archive GUI by selecting a point-in-time date from the Restore window. Pointin-time restores are started from the TSM backup-archive command line by using the command-line options. The use of point-in-time restore has a number of dependencies and considerations. Incremental backups performed using the Incremental by Date method are not true incremental backups. A point-in-time restore cannot be performed when this type of incremental backup is used. When performing a point-in-time restore, file filtering is done by the TSM server as opposed to other restores where all the file filtering is done by the TSM client. Having the TSM client server doing the file filtering can potentially lead to reduced restore times. Copy group values with no limits such as VEREXIST and VERDELETED can result in large numbers of backup copies being maintained by the server. This is compounded in situations where users can run multiple incremental backups a day. If such values are to be used, use of the copygroup FREQUENCY parameter, to control the interval between incremental backups, should be considered. 9-43 Student Exercises, Part 1 Even though the topics have been covered by this point, the lab exercises for command-line backup and restore are in Student Exercises, Part 2. This is to make the two lab sessions more equal in time. Open file support and online image backup are now available for Windows 64-bit operating systems. Open file support and online image backup are now supported on Windows 64-bit operating systems, and Volume Shadowcopy Service (VSS) is now a supported snapshot provider on both 32bit and 64-bit Windows versions, excluding Windows XP. With this support, the fileleveltype and imagetype options are being replaced by snapshotproviderfs and snapshotproviderimage, respectively. AIX JFS2 snapshot integration for snapshot-based image backup and snapshot-based file level backup and archive. Snapshot-based image backup and file backup and archive support is available for AIX 5.3 or later JFS2 file systems. This support provides consistent backup of the files and snapshotbased images. The imagetype=dynamic, snapshot, and static options have been replaced by the dynamicimage and snapshotproviderimage options
9-62
9-64
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
16
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 10 10-16 Topic Database Backup Related Commands Restoring the Server Restoring The Database Note The last database backup cannot be deleted unless the parameter force=yes is used. Review how Disaster Recovery Manager automated this process. Ask the students where TSM will get the needed information to restore the database if it is damaged and the VOLHISTORY and DEVCONFIG files are not present. Answer: You would have to know the volumes to mount in the correct order and you would have to rebuild the device config file manually. To restore the database to a specific point in time, use the dsmserv restore db command. TSM restores the database as follows: Reads the volume history file to locate the last regular backup that occurred on or before the specified date and time. Using the device configuration file, requests a mount of the first volume, which should contain the beginning of the regular backup. Restores the backup data from the first volume. 10-28 Best Practices Ask the students if they would mirror the database or the recovery log, if there was only space to mirror one. Answer: Mirror the recovery log, since the database can be backed up. Defining and updating ADPs was moved from Unit 5 to Lesson 4, Unit 10, since it required knowledge of Policies. Emphasize the importance of multiple copy storage pools Ask the students how many commands would have to be issued to back up the primary pool hierarchy for local media failure and disaster recovery (both on-site and off-site). Answer: 4. Ask the students to give the command to back up the storage pool hierarchy from their TSM server in lab to a copy storage pool named on-site. Answer: backup stgpool backuppool on-site backup stpool archivepool on-site
10-25 10-26
Active-data pools Define A Copy Storage Pool Backup Storage Pool Hierarchy
10-52
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
17
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 11 11-13 11-17 Topic Additional Client Polling Options Randomization Note Restart scheduler after resetting mode. Use this scenario to show the alternative to randomizing. There are 450 clients around the country that need to be backed up. We could assign one person the task of coming up with 450 individual schedules to evenly spread the work over the six hour window. Remember that randomizing does not evenly spread the work around but randomly spreads the work around. With 450 individual schedules we could start one backup at 1:00 and one at 1:06, and so on. We could even allow for the fact that one node backs up faster than another and set the schedules start time appropriately. That would take a lot of administrative work. A better approach would be to define ONE schedule for all nodes. Set the start time to 01:00:00. Write that in the STARTTIME box. Tell the students that our current TSM server MAXSESSIONS it set to 100. Write that in the box. MAXSCHEDULED SESSIONS is set to 80%. Write that in the box. Ask the students how many schedules will start at 01:00. Answer: 80. Ask the class what will happen when one of the 80 schedules is completed. Answer: Another will start. Ask the class when the TSM server will stop starting new schedules. Answer: When all schedules have run or the startup window is past. Ask the class what if in the morning we find that there are some schedules that did not run, but we had network and server resources available? Answer: We can adjust MAXSESSIONS or MAXSCHEDULE SESSIONS up. Ask the class what if the reverse was true. Answer: Lower those values. Adjusting MAXSESSIONS or MAXSCHEDULE SESSIONS can be a big advantage to server prompted scheduling. We can adjust the amount of work and not have to rewrite schedules. Ask the class what happens if a client is associated with two schedules that have the same startup time. Answer: TSM provides a way of prioritizing schedules so that the more critical scheduled operation is completed first by the client.
11-18
Defining Schedules
11-37
Demonstrate how to set up a client backup at 21:00 (9:00 p.m.) every night.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
18
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Unit 12 12-8 Topic Event Receiving Note Client messages eligible for sending to the server are formatted as client events. This ensures that all client events have a common format.
12-9
Event Filtering
Before client events can be passed to the server they have to be enabled at the server. The enable event command has been added to manage central logging and monitoring. It enables logging of client and server events.
12-14
One of the main goals when designing the central logging function is to provide an efficient solution. Only a set of client messages are logged as events to the server.
12-16
Client events can be disabled for the activity log. Show command: disable events actlog info node=<nodename>
12-17
12-25
Auditlogging and auditlogname options The auditlogging option generates an audit log with an entry for each file that is processed during an incremental, selective, archive, restore, or retrieve operation. The auditlogname option specifies the path and file name where you want to store audit log information. This option applies when audit logging is enabled. If time permits, have the students perform an optional exercise on installation and configuration of Operational Reporting. Use the Installing Operational Reporting.pdf, file, and excerpt from the IBM Tivoli Storage Manager 5.5 Administration Guide, located on the Instructor and Student Resources CDs.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
19
IBM Tivoli Storage Manager 5.5 Implementation and Administration Instructor Notes
Appendix A A-1 Topic Additional TSM Product Information Note If time permits, you can cover this material. The slides are in your PowerPoint slide show.
Appendix B B-1
Note If time permits, you can cover this material. The slides are in your PowerPoint slide show.
IBM Tivoli Storage Manager 5.5 Implementation and Administration This document may be reproduced for use in classroom training.
20
Copyright Notice Copyright 2008 IBM Corporation, including this documentation and all software. All rights reserved. May only be used pursuant to a Tivoli Systems Software License Agreement, an IBM Software License Agreement, or Addendum for Tivoli Products to IBM Customer or License Agreement. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without prior written permission of IBM Corporation. IBM Corporation grants you limited permission to make hardcopy or other reproductions of any machine-readable documentation for your own use, provided that each such reproduction shall carry the IBM Corporation copyright notice. No other rights under copyright are granted without prior written permission of IBM Corporation. The document is not intended for production and is furnished as is without warranty of any kind. All warranties on this document are hereby disclaimed, including the warranties of merchantability and fitness for a particular purpose. Note to U.S. Government UsersDocumentation related to restricted rightsUse, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corporation. Trademarks The following are trademarks of IBM Corporation or Tivoli Systems Inc.: IBM, Tivoli, AIX, Cross-Site, NetView, OS/2, Planet Tivoli, RS/6000, Tivoli Certified, Tivoli Enterprise, Tivoli Ready, TME. In Denmark, Tivoli is a trademark licensed from Kjbenhavns Sommer - Tivoli A/S. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. C-bus is a trademark of Corollary, Inc. in the United States, other countries, or both. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Lotus is a registered trademark of Lotus Development Corporation. PC Direct is a trademark of Ziff Communications Company in the United States, other countries, or both and is used by IBM Corporation under license. ActionMedia, LANDesk, MMX, Pentium, and ProShare are trademarks of Intel Corporation in the United States, other countries, or both. SET and the SET Logo are trademarks owned by SET Secure Electronic Transaction LLC. For further information, see http://www.setco.org/aboutmark.html. Other company, product, and service names may be trademarks or service marks of others. Notices References in this publication to Tivoli Systems or IBM products, programs, or services do not imply that they will be available in all countries in which Tivoli Systems or IBM operates. Any reference to these products, programs, or services is not intended to imply that only Tivoli Systems or IBM products, programs, or services can be used. Subject to valid intellectual property or other legally protectable right of Tivoli Systems or IBM, any functionally equivalent product, program, or service can be used instead of the referenced product, program, or service. The evaluation and verification of operation in conjunction with other products, except those expressly designated by Tivoli Systems or IBM, are the responsibility of the user. Tivoli Systems or IBM may have patents or pending patent applications covering subject matter in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to the IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, New York 10504-1785, U.S.A.
Table of Contents
Table of Contents
IBM Tivoli Storage Manager 5.5 Implementation and Administration Preface
Course Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii Where to Find the Training Schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii Course Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iv Course Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vi Course Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix Product Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix Software Release Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix Product Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Suggestions in this Course . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
The Powerful Query System Command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Standard Format Query Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Detailed Format Query Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Query Activity Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Student Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Lesson 4: IBM Tivoli Storage Managers Graphical User Interface (GUI) . . .3-29
Tivoli Storage Manager Windows Server GUI: Management Console . . . . . . . . . . . . . . . . . 3-29 The GUI for Backup-Archive Clients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30 Web Backup-Archive Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Lesson 1: Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Installing and Configuring a Tape Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-3 Connecting a SCSI Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4 Supported Device Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-5 Getting Device Information from the Tivoli Storage Manager Device Driver . . . . . . . . . . . . . . . 4-6 Use tsmdlst to Find Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7 Determining Numbers for Libraries with Multiple Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8 Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Update and Query Storage Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Active-data Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Before Storing Data in an Active-data Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Administration Centers Create Storage Pool Wizard . . . . . . . . . . . . . . . . . . . . . . . Create Storage Pool Wizard, continued . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Policy Domain Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating or Defining Storage Pool Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Defining Storage Pool Volumes for Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Deleting Storage Pools and Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . How to Move Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Concurrent Storage Pool Volume Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Overflow Location for Storage Pool Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Storage Pool Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Administration Center for Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reclamation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Single Drive Reclamation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Example of Single Drive Reclamation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collocation Volume Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collocation Volume Selection Example 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collocation Volume Selection Example 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collocation by Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collocation of Active Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Collocation of Active Data with the Administration Center . . . . . . . . . . . . . . . . . . . . . . . . . . Copy Active Data Form . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Student Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5-13 5-14 5-15 5-16 5-17 5-18 5-19 5-21 5-22 5-24 5-26 5-27 5-27 5-29 5-30 5-32 5-34 5-35 5-36 5-37 5-39 5-40 5-41 5-42 5-43 5-44 5-45 5-46 5-47 5-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2 Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Lesson 4: Reducing the Database and Recovery Log Space . . . . . . . . . . . .7-18 Lesson 5: Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-19
Database and Recovery Log Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19 Using the Administration Center to Mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-20 Mirroring Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Include-Exclude Processing Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Exclude Directories from Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . EXCLUDE.DIR Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup of Excluded Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Compression, Encryption, and Adaptive Subfile Backup Processing . . . . . . . . . . . . . . . . . . Identify Files to Be Included or Excluded from Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Metacharacters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Include-Exclude Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Include-Exclude Using the Backup-Archive Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Include-Exclude Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Identify the Value of Client Option Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Define Include-Exclude Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Use Sequence Numbers in an Option Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Use the FORCE Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Copy, Query, Delete, or Update a Client Option Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create an Option Set with the Administration Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary of Client Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8-32 8-33 8-33 8-34 8-35 8-36 8-37 8-38 8-39 8-40 8-43 8-43 8-44 8-44 8-45 8-46 8-47
Lesson 7: Delete Backup Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-48 Lesson 8: Encryption and Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8-50
Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Encryption Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Encryption and Archiving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Encryption and Unattended Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Encryption Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Secure Sockets Layer (SSL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Student Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Review Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-50 8-51 8-51 8-51 8-52 8-53 8-54 8-55 8-57
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Lesson 7: Archive and Retrieve Command Line . . . . . . . . . . . . . . . . . . . . . .9-56 Lesson 8: Command Options for Backup, Archive, Restore, and Retrieve . .9-58
Backup, Archive, Restore, and Retrieve of Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-60
9-61 9-62 9-62 9-63 9-64 9-66 9-67 9-68 9-70 9-71
9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-73
Lesson 1: Tivoli Storage Manager Database and Storage Pool Protection Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10-3
Tivoli Disaster Recovery Manager Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-4 The Disaster Recovery Plan File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-5 Using the Administration Center for Disaster Recovery Management . . . . . . . . . . . . . . . . . 10-6
10-19 10-20 10-21 10-23 10-25 10-26 10-26 10-28 10-32 10-34 10-34 10-34 10-35 10-36 10-37 10-38 10-39 10-40 10-41 10-42 10-43 10-44 10-46 10-48 10-49 10-51 10-51 10-53 10-54 10-55
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Protecting Your Database and Storage Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-57 REUSEDELAY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-57 Daily Administration Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
IBM System Storage Archive Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-6 Optional Additions to IBM Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-7 Hierarchical Storage Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-8 IBM Tivoli Storage Manager for Space Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-9 IBM Tivoli Storage Manager HSM for Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-10 IBM Tivoli Storage Manager for Storage Area Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-11 Continuous Data Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-12
13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Student Guide
Preface
Course Description
This five-day instructor-led course provides hands-on practice in implementing a data management strategy with IBM Tivoli Storage Manager 5.5. The course begins with installing the IBM Tivoli Storage Manager 5.5 server, backup-archive clients, and the Integrated Solution Console Administration Center. Students create simple storage pools and subsequently learn to configure hierarchies of storage pools to manage the flow of data from disk to tape media. Next, storage pools are mapped to the data sent by client nodes through IBM Tivoli Storage Manager policies that provide the rules to implement data management service level agreements. Students define new policy domains, policy sets, management classes, backup copy groups, and archive copy groups. To authorize administrators to perform specific storage tasks, students register administrators and grant the privileges required to support specified responsibilities. Students back up and restore client data, as well as manage long-term and off-site data management through archiving and retrieving of client data. After learning to backuprestore and archive-retrieve data, students practice automating client operations by creating new IBM Tivoli Storage Manager schedules. To monitor client operations, students subsequently learn to configure and manage storage events. Finally, students will learn how to protect their IBM Tivoli Storage Manager server by automating the backup and restore of the IBM Tivoli Storage Manager databases and storage pools from off-site data storage pools. The Student Exercises are written for Windows 2003, Redhat Linux 4, and AIX 5.3. The lecture material covers all supported Intel and UNIX platforms. This course should be followed by IBM Tivoli Storage Manager 5.5 Advanced Administration, Tuning, and Troubleshooting.
Audience
This course is intended for system administrators and implementers who will be responsible for implementing an IBM Tivoli Storage Manager 5.5 solution.
ii
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
If you have any questions about IBM education offerings, send an e-mail to the appropriate alias for your region: Americas: tivamedu@us.ibm.com Asia Pacific: tivtrainingap@au1.ibm.com EMEA: tived@uk.ibm.com
iii
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Course Prerequisites
The following list contains the prerequisite knowledge or Tivoli product knowledge that you must have before taking the course: All students should have a working knowledge of Internet browsers. All students should have a basic understanding of client-server concepts. For classes taught on a Windows platform, the students should have the skills to navigate through Windows 2003 applications. For classes taught on a Linux platform, the students should have the skills to navigate through Red Hat Linux 4 applications. For classes taught on a UNIX platform, you should have experience using the UNIX command-line interface, allocating filesystem space, and connecting devices to a UNIX server.
iv
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Course Objectives
IBM Software Group | Tivoli software
Course Objectives
Upon completion of this course, you will be able to:
Discuss the features of IBM Tivoli Storage Manager. Install IBM Tivoli Storage Manager server and backup-archive client. Navigate the Administrative interfaces. Explain the concepts of attaching a tape library and preparing media. Create and manage storage pools and storage pool volumes. Define policy management to meet business requirements. Customize the IBM Tivoli Storage Manager database and recovery log. Configure the backup-archive client. Backup, restore, archive, and retrieve client data. Protect the IBM Tivoli Storage Manager database and storage pools. Schedule administrative tasks. Monitor server and client messages and events.
3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Agenda
IBM Software Group | Tivoli software
Agenda: Days 1 - 3
Day 1 :
Unit 1: IBM Tivoli Storage Manager Overview Unit 2: Installing IBM Tivoli Storage Manager Server and Client Unit 3: Administrative Interfaces and Privileges
Day 2:
Unit 4: Storage Media Devices Introduction Unit 5: Managing Storage Pools and Storage Pool Volumes Unit 6: Policy Management
Day 3:
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Unit 8: Client Configuration
4
Day 5:
Unit 11: Automating Operations Unit 12: Monitoring and Event Logging Appendix A Appendix B
vi
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Course Outline
The following is a high-level description of the contents of this course. This course contains 12 units. Each unit has an overview presentation, and most have a series of student exercises designed to reinforce the concepts presented. This course contains the following units: Unit 1: IBM Tivoli Storage Manager Overview This unit provides an introduction to IBM Tivoli Storage Manager and describes the major functions and features that are currently available. Unless otherwise stated, the topics introduced in this unit will be explained in greater detail in following units. Unit 2: Installing IBM Tivoli Storage Manager Server and Client This unit provides the requirements for the Integrated Solutions Console and the IBM Tivoli Storage Manager components. Topics include basic installation and configuration of the IBM Tivoli Administration Center, IBM Tivoli Storage Manager server, backup-archive client, and device driver. Unit 3: Administrative Interfaces and Privileges This unit explores the new IBM Tivoli Storage Managers Administration Center, as well as the other available user interfaces for managing IBM Tivoli Storage Manager. The levels of administrative authority required to administer IBM Tivoli Storage Manager are also presented. Unit 4: Storage Media Devices Introduction This unit introduces devices used to store data. Basic concepts of attaching a tape library and preparing media to work with IBM Tivoli Storage Manager are also discussed. Unit 5: Managing Storage Pools and Storage Pool Volumes In this unit, you will see how to create hierarchical storage pools of different media types to allow for efficient management of your data. Unit 6: Policy Management Policy management enables the administrator to determine a set of rules explaining how IBM Tivoli Storage Manager will treat data. This set of rules is composed of policy domains, policy sets, management classes, and copy groups.
vii
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Unit 7: Customizing The Tivoli Storage Manager Database and Recovery Log The Tivoli Storage Manager database is used by the server to manage information about client files. The Tivoli Storage Manager recovery log is used to ensure the consistency and availability of the database. This unit covers how to choose the size and location of the database and recovery log. You will also configure the database and recovery log for improved performance.
Unit 8: Client Configuration This unit describes how to manage and configure client options and invoke the backup-archive interfaces available with IBM Tivoli Storage Manager.
Unit 9: Backup-Archive Client Functions The backup-archive client communicates with the server and invokes the client functions of Tivoli Storage Manager. The backup-archive client is supported on a variety of platforms that might reside on a user workstation or a LAN server. This unit describes the various methods available to back up, restore, archive, and retrieve data, and what options are available to customize these processes to fit your needs.
Unit 10: Protecting the Database and Storage Pools This unit covers backing up and recovering the Tivoli Storage Manager database, recovery log, and storage pools.
Unit 11: Automating Operations Central scheduling enables automation of backup, archive, and other processes. Scheduling of IBM Tivoli Storage Manager operations can be done with an external scheduler or with the built-in Tivoli Storage Manager scheduler. The Tivoli Storage Manager administrative interfaces for defining, updating, and deleting schedules will be described in this unit.
Unit 12: Monitoring and Event Logging Tivoli Storage Manager provides the ability to log client messages as server events. This unit introduces Tivoli Storage Manager logging and monitoring functions.
viii
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Typographical Conventions
In this course, the following typographical conventions are used.
Usage Options and parameters, when not shown in examples, will appear in BOLD UPPERCASE. Commands, keywords, file names, authorization roles, URLs, or other information that you must use literally appear in bold. Variables and values that you must provide appear in italics. Words and phrases that are emphasized also appear in italics. New terms appear in bold italics when they are defined in the text. Command examples, output, and system messages appear in a monospace font. In this manual, the arrow character is used as a path arrow. The arrow indicates the path to the named window.
Bold
Italics
>
Product Information
ix
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Product Documentation
IBM Tivoli product documentation is available on the Student Resources CD. For access to documentation outside the classroom environment, visit the IBM Web site.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-1
Introduction
This unit provides an introduction to IBM Tivoli Storage Manager and describes the major functions and features that are currently available. Unless otherwise stated, the topics introduced in this unit will be explained in greater detail in following units. Note: In this course, IBM Tivoli Storage Manager is also referred to as Tivoli Storage Manager and TSM. Most of the IBM Tivoli Storage Manager commands are platform independent. The examples in this course are shown for Windows and AIX platforms. Refer to the documentation for the other supported platforms for specifics pertaining to commands issued outside of Tivoli Storage Manager. When commands are shown in mixed case, the capitalized letters are the command shortcut. For the command to query the system, you only need to type q sys. The shortcut looks like this:
Query SYStem
Other terms used in this course: Administrative Client: A program that is used to manage the TSM server API: Application program interface Backup-Archive Client: A program that allows backup and recovery of data Client (TSM client): A TSM managed node GUI: Graphical User interface LAN: Local area network Navigation Tree: An expandable menu that shows directory structures Node (managed node): A workstation or file server with the client installed SAN: Storage area network Select action menu: Drop-down menu or expandable text box menu in the Administration Center Server (TSM server): A program that manages Tivoli Storage Manager functions Storage Agent: A program that allows backup and recovery on a SAN WAN:Wide area network
1-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Identify how IBM Tivoli Storage Manager serves as a tool for data management and protection.
Identify the IBM Tivoli Data optional products that are part of the IBM Tivoli Storage Manager solution.
1-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
IBM Tivoli Storage Manager protects your organizations data from hardware failures and other errors by managing backup and archive copies of data. These copies should be stored off-site. Designed for a heterogeneous environment, IBM Tivoli Storage Manager connects over the local area network (LAN), wide area network (WAN), Internet, and storage area network (SAN) to provide smart data move and store techniques, comprehensive policybased automation and data management. Optional modules allow business-critical applications that must run twenty-four hours a day, seven days a week (24x7), to use Tivoli Storage Managers centralized data protection with no interruption to their service.
1-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
storage devices
TSM server
4
Administrative Interface Tivoli Storage Manager Server Scheduler Backup-Archive Client Tivoli Storage Manager Database Tivoli Storage Manager Recovery Log Storage Pools Policy-Based Management Tape Library
For information about supported devices, check the IBM Tivoli Storage Manager supported devices links at http://www.ibm.com/software/tivoli/products/storage-mgr/ platforms.html.
1-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
Interface
IBM Software Group | Tivoli software
Interfaces
Interface: Administration Center GUI Backup-Archive (BA) Client GUI How interface is accessed: ISC logon
dsm
(Windows)
dsmj (UNIX)
Web Client GUI BA Client Command Line TSM Server Command Line TSM Sever GUI Web browser and port 1581
The Tivoli Storage Manager Administration Center, which operates on the Integrated Solutions Console (ISC), provides a task-oriented graphical user interface for storage administrators. Tasks such as creating server maintenance scripts, scheduling, adding storage devices, setting policy domains, user management, and viewing the Health Monitor are some of the tasks the Administration Center provides. Command line, graphical user interface (GUI), and a Web client are also provided. Administrative interfaces are covered in Unit 3.
1-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
1-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
Scheduler
IBM Software Group | Tivoli software
Scheduler
Administrator-defined schedules allow for the automation of Tivoli Storage Manager server and backup-archive client operations. A comprehensive and integrated set of schedules can provide the basis for efficient data management with little need for intervention during normal operations. Scheduling Tivoli Storage Manager backup-archive client operations consists of schedules on the Tivoli Storage Manager server and a scheduler component that runs on the Tivoli Storage Manager backuparchive client machine.
1-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
Backup-Archive Client
IBM Software Group | Tivoli software
Backup-Archive Client
The TSM backup-archive client is a service which sends data to and retrieves data from, a TSM server. The TSM backup-archive client must be installed on every machine that needs to transfer data to server-managed storage called storage pools. This machine might be a workstation or a file or database server. The TSM server uses a unique node name to identify each TSM backuparchive client instance. The TSM backup-archive client supports encryption, and a password can be used to authenticate communications between the TSM backup-archive client and server.
A backup-archive client can actually be a server. Application servers and file servers, as well as desktop workstations and portable PCs, are backup-archive clients to the Tivoli Storage Manager server.
1-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
The Tivoli Storage Manager database does not require database administration skills to manage. The TSM database is discussed in Unit 7.
1-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
10
1-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
Storage Pools
IBM Software Group | Tivoli software
Storage Pools
Storage pools are collections of like media that provide storage for backed up, archived, and migrated files. These pools can be chained in order to create a storage hierarchy. Any supported sequential media can be used in all copy storage pools. Data migration, left diagram: from the primary disk pool to copy file pools or copy disk pools to tape pools primary storage pool copy storage pools Data migration, right diagram: from the primary disk pool directly to tape pools
11
Managing storage pools and storage pool volumes is covered in Unit 5. In Unit 10, protecting the storage pools is described. A storage pool volume is the basic unit of storage for the IBM Tivoli Storage Manager storage pools. A volume can be a logical volume, a standard file system file, a tape cartridge, or an optical cartridge. Each volume is identified by a unique volume identifier.
1-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
12
Policies are defined based on the business requirements for data backup and retention. These requirements, sometimes referred to as a storage service level agreement, identify when backups will be performed, how long and how many copies of files will be retained, and other requirements specified by the customer. This feature makes it possible for different departments with different types of data to have their own customized storage management plan. Policies are covered in Unit 6.
1-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
Tape Library
IBM Software Group | Tivoli software
Tape Library
IBM Tivoli Storage Manager supports a variety of library types, including manual libraries, SCSI libraries, 349X and 358X (LTO) libraries, and external libraries. A tape library is essentially a box that holds drives and cartridges, and provides automation for tape operation.
13
1-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
BACKUP
The backup-archive clients send copies of files to Tivoli Storage Manager server.
RESTORE
The files are returned to the backup-archive client. .
The Tivoli Storage Manager server stores the copies in the storage pools.
When a restore is requested by the backup-archive client, the storage pool sends the copy back to the server.
14
Raw logical volumes are treated as separate entities, and the management class policy is applied to the entire image as a whole. There is no tracking of individual files in an image backup because it is treated as a separate object. Backup: Creates a copy of a file to protect against the operational loss or destruction of that file. Customers control backups by defining the backup frequency and number of versions. Restore: Places backup copies of files into a customer-designated system or workstation after the loss of a file. By default, the most recent version of each active file requested is replaced.
There are four levels of backup available: byte level (small amounts of data, like on notebook computers), block level (bigger amounts of data, between 40 KB and 2 MB), file level (normal files), and image level (includes file system and files). IBM Tivoli Storage Manager uses Progressive Backup Methodology, also known as Incremental backups. Backup and restore functions are covered in Unit 10.
Copyright IBM Corp. 2008 IBM Tivoli Storage Manager 5.5 Implementation and Administration
1-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
ARCHIVE
The backup-archive clients send copies of files for retention to Tivoli Storage Manager server.
RETRIEVE
A copy of the files are returned to the backup-archive client. .
The Tivoli Storage Manager server stores the copies in the storage pools.
When a retrieve is requested by the backup-archive client, the storage pool sends a copy of the data retained in the storage pool.
15
Archiving is useful when you want to store data that is infrequently accessed but must still be kept available. Also it is not uncommon to have a legal requirement to archive business records for extended periods of time, and the archive function is ideal for this purpose. IBM Tivoli Storage Manager has the capability of archiving for 30 years. Archive: Creates a copy of a file or set of files for vital record retention of data, such as patent information, financial information, or customer records. Customers control archive by defining the retention period. This feature enables customers to keep unlimited archive copies of a file. Retrieve: Allows users to copy an archive file from the storage pool to the workstation. The archive copy in the storage pool is not affected.
1-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
Policy Privileges
1-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
IBM Tivoli Storage Managers Administration Center on the Integrated Solutions Console
The Administration Center provides centralized IBM Tivoli Storage Manager enterprise management from the Integrated Solutions Console (ISC).
17
The graphical user interface (GUI) for managing IBM Tivoli Storage Manager administrative functions is called the Administration Center. This GUI runs on IBMs Integrated Solutions Console (ISC), a WebSphere application designed for centralized management of IBM enterprise applications, including IBM Tivoli Storage Manager.
1-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Protecting Data with IBM Tivoli Storage Manager
Administration Center
18
These tasks will be explored in detail in the following units of this course.
1-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Data Storage and Data Management
storage pools
Tivoli Storage Manager supports many tape and optical libraries and a variety of storage media types for copy storage pools, such as:
Storage pools contain backup files, archived files and space managed files. These storage pools are chained in order to create a storage hierarchy. The disk pool is usually first in the chain and is generally followed by tape. This is called a hierarchy.
1-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Data Storage and Data Management
20
1-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 1: IBM Tivoli Storage Manager Overview Data Storage and Data Management
21
IBM Tivoli Storage Managers Disaster Preparation and Recovery, or Disaster Recovery Manager (DRM), is covered in detail in the IBM Tivoli Storage Manager Extended Edition 5.5 Disaster Recovery Manager course (see the IBM Web site for IBM Tivoli Storage Manager curriculum roadmap). It is discussed here, since DRM is mentioned as a best practice for protecting your TSM database. IBM Tivoli Storage Managers Disaster Preparation and Recovery offers various options to configure, control, and automatically generate a disaster recovery plan containing the information, scripts, and procedures needed to automate restoration and help ensure quick recovery of your data after a disaster. It also manages and tracks the media on which your data is stored, whether on-site, in transit, or in a vault, so that your data can be easily located if disaster strikes. The scripts can help you document your basic information technology recovery strategy, the steps to rebuild your core systems, and the critical machines that you must recover.
1-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lesson 3: Licensing
IBM Tivoli Storage Manager Licensing
There are three license types for IBM Tivoli Storage Manager version 5.5. They are tsmbasic.lic for the basic version of IBM Tivoli Storage Manager 5.5, tsmee.lic for the Extended Edition of IBM Tivoli Storage Manager version 5.5, and dataret.lic for the IBM Tivoli Storage Manager for Data Retention version 5.5.
For licensing information, refer to the document titled IBM Tivoli Storage Manager Read This First.
22
For the Extended Edition license, you choose the advanced storage management functions you will need. Always read the documentation shipped with the product code for the latest information on licensing.
1-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. Which of these actions copies the file, and then copies the changed portion of that file to protect it against operational loss or destruction? a. archive b. backup c. retrieve d. restore 2. Which of the following functions returns the backup copies of files? a. return b. recall c. retrieve d. restore 3. IBM Tivoli Storage Manager uses a _______________ backup methodology to back up only changed data. 4. The Tivoli Storage Manager ___________ client must be installed on every machine that will transfer data to server-managed storage. 5. IBM Tivoli Storage Manager saves information in the TSM _________________ about each file that it backs up, archives, or migrates.
1-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Answers
1. Which of these actions copies the file, and then copies the changed portion of that file to protect it against operational loss or destruction? a. archive b. backup c. retrieve d. restore b. backup 2. Which of the following functions returns the backup copies of files? a. return b. recall c. retrieve d. restore d. restore 3. IBM Tivoli Storage Manager uses a _______________ backup methodology to back up only changed data. progressive or incremental 4. The Tivoli Storage Manager ___________ client must be installed on every machine that will transfer data to server-managed storage. backup-archive 5. IBM Tivoli Storage Manager saves information in the Tivoli Storage Manager _________________ about each file that it backs up, archives, or migrates. database
1-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Identify how IBM Tivoli Storage Manager serves as a tool for data management and protection. Identify major components of the IBM Tivoli Storage Manager solution. Identify the IBM Tivoli Data Protection products that are part of the IBM Tivoli Storage Manager solution.
23
1-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-1
Introduction
This unit provides the requirements for the Integrated Solutions Console and the IBM Tivoli Storage Manager components. Topics include basic installation and configuration of the IBM Tivoli Administration Center, IBM Tivoli Storage Manager server, backup-archive client, and device driver.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Describe the Integrated Solutions Console installation requirements. Install IBM Tivoli Storage Manager Administration Center. Install IBM Tivoli Storage Manager server. Install IBM Tivoli Storage Manager backup-archive clients. Install the administrative command line. Describe the IBM Tivoli Storage Manager device driver installation.
2-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Installation Overview
Refer to the IBM Tivoli Storage Manager Installation Guide for your platform for the steps to perform the installation. TSM 5.5 Installation Guide
The following components will need to be installed: IBM Tivoli Storage Manager Server IBM Tivoli Storage Manager Backup-Archive Client IBM Integrated Solutions Console (ISC) IBM Tivoli Storage Manager Administration Center
2-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
AIX Clients OS/400 API Clients Linux CLients UNIX Clients (non-AIX)
IBM Integrated Solutions Console version 6.0.1.1 (version 6.0.1 with fix pack 1): Note: If ISC 5.1 is installed, the package will install ISC 6.0.1.0 and then install ISC Fix Pack 1. If ISC 6.0.1.0 is already installed, the package will only install ISC Fix Pack 1. In all cases, ISC 6.0.1.1 will become the installed version. AIX for use with Tivoli Storage Manager Administration Center Windows for use with Tivoli Storage Manager Administration Center Linux xSeries for use with Tivoli Storage Manager Administration Center Solaris for use with Tivoli Storage Manager Administration Center
2-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Operating System
110 MB 128 MB (256 MB is preferred) TCP/IP (version 4 or 6) Named Pipes Shared Memory Microsoft Internet Explorer 6.x Mozilla 1.0.2, 1.3, and 1.4 Netscape 6.2 and 7.
4
This course describes performing a new installation. To update an existing version of Tivoli Storage Manager, refer to the product documentation. Install and use JRE 1.4.1 or later to optimize performance of the Java backup-archive client. Tivoli Storage Manager implements a simple network management protocol (SNMP) subagent. You can configure the SNMP subagent to send traps to an SNMP manager, such as Tivoli NetView, and to provide support for a management information base (MIB). For details about configuring SNMP for use with Tivoli Storage Manager, see the IBM Tivoli Storage Manager Administrator's Guide for your platform.
2-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Refer to the IBM Web site and documentation for requirement for Linux on zSeries server and Linux on Power server.
5
Always refer to the IBM Web site for the latest information about supported operating environments for Tivoli Storage Manager.
2-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
TSM Server
TSM Server
B-A Client
ISC
TSM Server
B-A Client
The Administration Center is a Web-based interface that can be used to centrally configure and manage IBM Tivoli Storage Manager servers. The Administration Center is installed as an IBM Integrated Solutions Console component. The Integrated Solutions Console, an IBM WebSphere application, allows you to install and access components provided by multiple IBM applications. It makes tasks easier by grouping previously separate tasks together to make a process simpler such as adding hardware or creating new storage pools.
2-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Also required: Port 8421 A static IP address A configured, fully qualified host name
See the README file for details regarding operating system fixes and patches.
2-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
Main Menu
IBM Software Group | Tivoli software
10
After inserting the IBM Tivoli Storage Manager Windows Server CD, the CD browser appears with a main menu. IBM Tivoli Storage Manager will let you know if it detects a previous version installed. Installing Tivoli Storage Manager Server on Windows is a simple InstallShield process. You will be prompted to enter the language for the installation. This language setting applies only to the language used for the installation.
2-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
11
Selecting Install Products will display the Install Products window. The installation sequence is indicated by the product layout provided on the Install Products screen. The default user ID is admin and the default password is admin.
2-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
12
13
2-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
14
Use the Custom installation type if you want to specify parameters such as an installation directory or language support.
Note: If all of your servers have the default name, SERVER1, you will be able to add only one of them to the Administration Center. Use the set servername command to specify the new server name.
2-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
Installing
15
16
2-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
17
License Installation
18
2-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
19
2-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
20
To use a device, you must install the appropriate device driver. Tivoli Storage Manager provides its own device driver for non-IBM devices. For Windows platforms, an InstallShield Wizard is provided for modifying, repairing, installing, or removing the IBM Tivoli Storage Manager device driver. Tivoli Storage Manager also supports non-IBM vendor device drivers if the devices are associated with the GENERICTAPE device class and the hardware vendor also supports that device driver. Using a device class other than GENERICTAPE with a non-IBM vendor device driver is not suggested. The Tivoli Storage Manager device driver is generally preferred for use with Tivoli Storage Manager. It is required for use with automated library devices and optical disk devices unless you are using Windows Removable Storage Manager to manage media. Refer to your device manufacturers documentation.
2-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
21
The AIX installation of IBM Tivoli Storage Manager 5.5 is performed using smit or smitty. Choose Software Installation and Maintenance > Install and Update Software > Install and Update from ALL Available Software. Select the input device, list and select software, and accept new license agreements. The server directory (/usr/tivoli/tsm/server/bin) contains: Storage pool volumes (backup.dsm, archive.dsm, spcmgmt.dsm) Database volume (db.dsm) Recovery log volume (log.dsm) Server code and licensing
Using smit or smitty, fill in the fields to install the Tivoli Storage Manager server. When installing the IBM Tivoli Storage Manager Server on AIX, you will choose between the 32-bit platform and the 64-bit platform files. Issue the following command to see if your AIX system is 32 bit or 64 bit.
bootinfo -K
2-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
The following packages install the Tivoli Storage Manager server: tivoli.tsm.server.com (for both 32 bit and 64 bit) tivoli.tsm.server.rte for 32 bit tivoli.tsm.server.aix5.rte
22
2-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
5. Then select
Install and Update Software Install and Update from ALL Available Software
23
2-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
19. Press Enter. This installation can take several minutes. 20. After the installation is complete, press F10 to exit from smit, and remove the CD.
25
2-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
26
For AIX 5.1 and later, tivoli.tsm.devices.aix5.rte is required, regardless of the kernel mode.
27
2-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
b. The installation menu will display the license agreement and ask for you to accept them. To accept the license agreement, press 1, and Enter. 3. After you have accepted the license agreement, a menu will be displayed with all the available RPM packages for the corresponding platform. To display the remaining items in the menu, press the spacebar.
2-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing IBM Tivoli Storage Manager
4. Choose BASIC INSTALL by typing B to install the Tivoli Storage Manager server. The install_server script will issue the rpm -i command to perform a fresh install of the following Tivoli Storage Manager packages: a. TIVsm-server-5.5.0.0 b. TIVsm-licenses-5.5.0.0 5. Type Y and Enter to continue with the basic install process. The script then goes back to the main installation menu. 6. Type Q and Enter to quit the installation script. 7. The server has successfully installed.
2-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager What the Server Installs
policy
recovery log
FILPOOL1
(Windows; Minimum Configuration) 29
When the installation is complete, the TSM server will have created the components listed on the slide. These components will be explored in greater detail in following units.
2-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager What the Server Installs
BACKUPPOOL: Disk storage for backed up data. ARCHIVEPOOL: Disk storage for archived data. SPACEMGPOOL: Disk storage for data. This pool is used to save space. DISKPOOL: Disk storage on Windows only. FILPOOL1: Disk storage with a device class of file, on Windows (using the minimal configuration option) only. POLICIES: The two default Policy Sets are named ACTIVE and STANDARD. SCHEDULES: The two default schedules are named DAILY_INCR and WEEKLY_INCR.
2-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager What the Server Installs
AIX
db.dsm 17 MB log.dsm 9 MB dsmserv.opt backup.dsm 8 MB archive.dsm 8 MB not applicable db.dsm 17 MB
Linux
Windows
db1.dsm 13 MB log1.dsm 9 MB dsmserv.opt Points to diskpool
Points to diskpool
2-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager What the Server Installs
Once you have the backup-archive client installed, back up client data from a backup-archive client to verify the server was installed successfully. Do not exceed your storage pool capacity.
31
Installations can be verified on Windows systems by viewing the initserv.log file. On AIX systems, examine the contents of the install.trace file located in the TSM server installation directory.
2-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing the IBM Integrated Solutions Console ISC
32
Course prerequisites assume program installation knowledge on your Tivoli Storage Manager server and client platform. Installation is one case where platform-specific issues come up. This class uses the Windows 2003, AIX, or Red Hat Linux platforms for the exercises. After reading the README file for system fixes and patches, install the ISC by following the InstallShield steps.
2-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing the IBM Integrated Solutions Console ISC
33
Use the information in the README file to plan which server to use for the ISC.
2-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing the IBM Integrated Solutions Console ISC
License Agreement
34
35
In the lab exercises, the user ID is iscadmin and the password is iscadmin.
2-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing the IBM Integrated Solutions Console ISC
36
37
2-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing the IBM Integrated Solutions Console ISC
Installation Steps
38
39
2-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
40
After installing the ISC, install the IBM Tivoli Storage Manager Administration Center.
2-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
After entering the ISC ID and password and enabling non-English language support if updating from a previous version, review the installation summary page and begin the installation.
42
2-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
InStallShield Wizard
43
Successful Installation
http://<hostname>:8421/ibm/console
44
2-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
45
The Windows platform provides an InstallShield Wizard for the IBM Tivoli Storage Manager client. Note that you must do a Custom installation in order to have the administrative client installed. Be sure to read all readme documentation provided before you start installing any Tivoli Storage Manager code.
Unit 2: Installing IBM Tivoli Storage Manager Installing the Backup-Archive Client
Destination Folder
IBM Software Group | Tivoli software
Destination Folder
46
2-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing the Backup-Archive Client
Custom Install
On AIX, the dsmadmc interface is installed automatically.
47
Language Packs
48
2-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 2: Installing IBM Tivoli Storage Manager Installing the Backup-Archive Client
Web Client
IBM Software Group | Tivoli software
Web Client
The Web client runs on port 1581 with the following browsers: Microsoft Internet Explorer 5.0 or higher with JRE 1.4.1 or higher. Mozilla 1.4 or higher, or Mozilla Firefox 1.0 with (JRE 1.4.1 or higher AIX and Linux clients). To run the Web client from Mozilla browsers, enable JavaScript must be selected. This setting is enabled by default, but to verify it: 1. Open Mozillas Edit menu and select Preferences. 2. In the Preferences window under Category, select Advanced and Scripts & Plug-ins. 3. Ensure there is a check mark next to Enable JavaScript for Navigator.
49
2-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The Configuration Wizards will guide you through configuring your server.
50
2-41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
51
2-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
52
2-43
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
53
Set the path and initial size of the following volumes: Database volume Recovery log volume Disk storage pool volume
2-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
54
55
2-45
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Use the query command to obtain information about TSM components and operations.
56
Throughout this course you will be use the query command to gather information about the components and operations of Tivoli Storage Manager. For a complete list of query commands, refer to the IBM Tivoli Administrators Reference Guide for your platform.
Server options and status Processes and sessions DB and log configuration
Copyright IBM Corp. 2008
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Storage pool configuration Device configuration Policies information Schedules and nodes
To query database:
Q DB
57
These examples show the results of the query admin and query database commands when issued from the command line. The format of the output is called STANDARD. These commands will be covered later in the course. They are displayed here to demonstrate the different formats you can use with the query command.
2-47
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
58
2-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The activity log records all the messages sent to the server console during server operations, except query commands issued on the console. Any error messages sent to the server console are also stored in the activity log.
59
Examples of messages sent to the activity log include: When client sessions start or end When migration starts and ends When backup versions expire What data is exported to tape When expiration processing is performed What export or import processing is performed
Student Exercise
Student Exercise
60
Open your Student Exercises and perform the exercises for this unit.
2-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. The IBM Tivoli Storage Manager ___________________, which is part of the Integrated Solutions Console, allows the administrator to centrally configure and manage IBM Tivoli Storage Manager servers. 2. What is the best way to find out which platforms or devices are supported for the most current version of IBM Tivoli Storage Manager? a. Look at the Student's Training Guide. b. Check the IBM Tivoli Storage Manager Web site for the latest information. c. Assume that any device or platform will work. d. Check any Quick Start Guide. 3. True or False? Install and use JRE 1.4.1 or higher to optimize performance of the Java backup-archive client. 4. True or False? Installations can be verified on Windows systems by viewing the installserv.log file.
2-51
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Answers
1. The IBM Tivoli Storage Manager ___________________, which is part of the Integrated Solutions Console, allows the administrator to centrally configure and manage IBM Tivoli Storage Manager servers. Administration Center 2. What is the best way to find out which platforms or devices are supported for the most current version of IBM Tivoli Storage Manager? a. Look at the Student's Training Guide. b. Check the IBM Tivoli Storage Manager Web site for the latest information. c. Assume that any device or platform will work. d. Check any Quick Start Guide. b. Check the IBM Tivoli Storage Manager Web site for the latest information. 3. True or False? Install and use JRE 1.4.1 or higher to optimize performance of the Java backup-archive client. true 4. True or False? Installations can be verified on Windows systems by viewing the installserv.log file. false
2-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Describe the Integrated Solutions Console installation requirements. Install IBM Tivoli Storage Managers Administration Center. Install IBM Tivoli Storage Manager server. Install IBM Tivoli Storage Manager backup-archive clients. Install the administrative command line. Describe the IBM Tivoli Storage Manager device driver installation.
61
2-53
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-54
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-1
Introduction
This unit explores the IBM Tivoli Storage Managers Administration Center, as well as the other available user interfaces for managing IBM Tivoli Storage Manager. The levels of administrative authority required to administer IBM Tivoli Storage Manager are also presented.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Identify the types of interfaces available. Navigate the Administration Center on the Integrated Solutions Console. Identify the levels of authority for the different job roles. Create and remove a TSM administrator.
3-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Interfaces for Tivoli Storage Manager
Available Interfaces
Interface: Administration Center GUI Backup-Archive (BA) Client GUI How interface is accessed: ISC logon
dsm
(Windows)
dsmj (UNIX)
Web Client GUI BA Client Command Line TSM Server Command Line TSM Sever GUI Web browser and port 1581
Once an administrator accesses the Administration Center with an Administration Center user ID and password, all TSM servers controlled through the Administration Center can be managed. In this unit you will explore all the interfaces, including navigation of the Administration Center.
3-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
The IBM Tivoli Storage Manager Administration Center is launched from the Integrated Solutions Console.
3-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
The Administration Center provides a new server status Health Monitor which makes TSM server status easier to visualize. Only a single login is required once the Tivoli Storage Manager server connection has been added.
6
3-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
The Integrated Solutions Console can be used to manage multiple software products.
3-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
How the Integrated Solutions Console Recognizes Your Tivoli Storage Manager Authority
Once ISC users log in to the console, they must add a Tivoli Storage Manager server connection, providing their Tivoli Storage Manager administrative ID and password. When a connection is established, the administrative privilege associated with the Tivoli Storage Manager ID is recognized by the ISC user ID. Now only one login is necessary.
ISC user ID
All people who use the Integrated Solutions Console to work with Tivoli Storage Manager need to have their own ISC login ID and password, and their own TSM administrative ID and password.
If the authority of the Tivoli Storage Manager administrative ID is changed, the change is immediately effective in the ISC. There is no need to log out and log back in to the ISC.
3-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
The items in the left panel expand to show the tasks you can perform with the Administration Center.
3-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
10
11
3-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
Selecting Actions
2 2 1 1
1. In the servers table, select server. 2. Open the Select Action menu.
12
Wizards
The wizard will guide you through the form to complete the Action and then summarize the actions.
13
3-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
Health Monitor
IBM Software Group | Tivoli software
Health Monitor
Health Monitor actions Use the Health Monitor to determine the overall status of server operations and to obtain detailed information about client node schedules, the server database and recovery log, and the status of storage devices managed by the server. The health monitor also provides access to the server activity log, which allows you to view messages generated during server operations.
14
3-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
Enterprise Management
IBM Software Group | Tivoli software
Enterprise Management
Enterprise Management actions The table shows all servers that you have added to the console. Use enterprise management to define servers to one another, which allows them to communicate and transfer data. Defined servers can be centrally managed using the commandrouting feature. A defined server can also be configured to store another server's data using virtual volumes. A server's enterprise configuration role determines whether it can distribute or receive configuration information.
15
3-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
16
3-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
17
3-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
Server Maintenance
IBM Software Group | Tivoli software
Server Maintenance
Server Maintenance actions The table shows the servers you have added to the console, and identifies the servers for which maintenance scripts have been created. Maintenance scripts perform routine server maintenance operations according to a schedule you specify. As a best practice, create a maintenance script for every server.
18
3-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
Reporting
IBM Software Group | Tivoli software
Reporting
Reporting actions The table shows the reports you can run against one or more servers. Use reports to view detailed information about your Tivoli Storage Manager environment.
19
3-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
20
3-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
The commands to start and stop the ISC are case sensitive, as are many of the search fields in the ISC. Read the Installation Guide for your platform for more details.
21
The installation program automatically starts the Integrated Solutions Console after a successful installation. If you shut down the system after the initial installation, any servers that were started will be stopped.
3-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
22
3-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges The Integrated Solutions Console and Administration Center
23
3-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
25
3-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
26
3-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
30
3-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
31
3-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
The Health Monitor: Detailed Health Information for Tivoli Storage Manager
You can view details including: Schedule Information Database and Recovery Log Information Activity Log Storage Device Status
32
Preparing to Configure
33
3-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
34
Select the radio button next to a server, and from the Select Action menu choose View Health Details.
35
3-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
36
3-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges Using the ISC to Manage Tivoli Storage Manager
Activity Log
Activity Log
37
Using the Filtering options provided, you can limit the amount of information presented in the table.
38
3-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges IBM Tivoli Storage Managers Graphical User Interface (GUI)
39
The TSM Console is a Microsoft Management Console snap-in that provides: Wizards to assist with Tivoli Storage Manager administration and configuration tasks. A method to access the command line. A Windows-style tree view of the storage management resource network. Network scan utilities that can be used to locate Tivoli Storage Manager client nodes and server nodes for remote management. A notification feature that can be used to alert operators of Tivoli Storage Manager mount requests and status messages.
IBM Tivoli Storage Manager 5.5 Implementation and Administration
3-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges IBM Tivoli Storage Managers Graphical User Interface (GUI)
DSMJ
40
Use this interface to perform backup, restore, archive, and retrieve of client data.
3-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 3: Administrative Interfaces and Privileges IBM Tivoli Storage Managers Graphical User Interface (GUI)
3-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Command Lines
BACKUP-ARCHIVE CLIENT COMMAND LINE: Start the backup-archive client command line at the operating system prompt. The paths may vary, but the default paths are as follows: Windows: Program Files > Tivoli > TSM > baclient AIX: /usr/tivoli/tsm/client/ba/bin Linux: /opt/tivoli/tsm/client/ba/bin To start the backup-archive client command line, type: dsmc On Windows, the backup-archive command line can be opened from All Programs > Tivoli Storage Manager > Backup-Archive Command Line. ADMINISTRATIVE COMMAND LINE: Start the administrative command line at the operating system prompt. The paths may vary, but the default paths are as follows: Windows: Program Files > Tivoli > TSM > baclient AIX: /usr/tivoli/tsm/client/ba/bin Linux: /opt/tivoli/tsm/client/ba/bin To start the administrative command line, type: dsmadmc From the Administration Center, select Server, click Select Action, select Use Command Line.
42
Use the console mode from an administrative client to monitor export or import operations or to capture processing messages to an output file. For example, you can keep a console open to watch processes for successful completion. Manual tape mount requests can also be viewed on the console. To start an administrative session in console mode, enter:
dsmadmc -consolemode
Command recall is available for both the administrative client and the backup-archive client. This enables you to recall and edit previously entered commands.
3-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Key F3 or ESC Ctrl C Backspace Left arrow Right arrow Up arrow Down arrow Tab Left Tab Ctrl Left arrow or Ctrl L Ctrl Right arrow or Ctrl R Home End Ctrl D or Ctrl Delete Enter
Description Exits the command line. Cancels the command line. Moves the cursor one space back and deletes text. Moves the cursor one space to the left. Moves the cursor one space to the right. Displays the command last entered. Displays the command entered after the command currently displayed. Moves the cursor five positions to the right. Moves the cursor five positions to the left. Moves the cursor to the beginning of the previous word. Moves the cursor to the beginning of the next word. Moves the cursor to the beginning of the line. Moves the cursor to the end of the line. Deletes the text from the cursor to the end of the line. Executes the command.
3-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
This excerpt is from the IBM Tivoli Storage Manager for Windows Administrators Reference.
43
This excerpt is from the IBM Tivoli Storage Manager for Windows Administrators Reference.
44
3-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Example of Parameters
Example of Parameters
45
3-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
You can access the command line from any Select Action window.
46
3-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
47
list
table list
48
3-37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Command Assistance
49
3-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Policy Privileges
IBM Tivoli Storage Manager enables customers to register administrators and to grant administrators the ability to accomplish specific tasks. After administrators are registered, they can make queries and request help from the command line. To perform other server functions, they must be granted authority by being assigned one or more administrative privilege classes.
3-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Privilege Classes
51
An administrator with system privilege can distribute administrative tasks by: Registering administrators. Granting one or more administrative privilege classes to other administrators. Allowing separation of tasks. Allowing delegation of authority. Varying commands by privilege class.
This slide shows how you can divide the administrative tasks through the five privilege classes.
3-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Registering an Administrator
IBM Software Group | Tivoli software
Registering an Administrator
Syntax:
TSM administrator
TSM server
3-41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
You must have one of the following privileges to grant or revoke client access or client owner authority: System privilege Policy privilege in the clients domain
53
3-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-43
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Removing an Administrator
Removing an Administrator
Syntax:
TSM administrator
You cannot remove the last administrator with system privilege from the system. You also cannot remove the SERVER_CONSOLE user ID (which has system privilege) from the system.
TSM server
54
You can also remove an administrator who will no longer be responsible for IBM Tivoli Storage Manager operations by using the remove admin command.
3-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lesson 7: Export/Import
You can export or import administrator, node, server, or policy information. You can export the complete server or just parts of it. For example, clients of just one department and their stored data can be exported. The export commands are operating system independent, and create a copy of specified server information or client data. This copy is not a substitute for disaster recovery. Export and import are relatively time-consuming processes. So it is designed primarily for one-time data movement. Data can be exported to sequential media or to another IBM Tivoli Storage Manager server on the network.
Export/Import of Administrator
IBM Software Group | Tivoli software
Export/Import of Administrator
Use the export admin command to export administrator definitions, such as name, password, contact information, administrative privilege classes, and whether the client node ID is locked.
Export admin * toserver=servergray previewimport=yes
55
The export admin command moves administrator information such as name, password, privilege classes, and whether the administrator is locked from server access.
3-45
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Student Exercise
Student Exercise
56
Open your Student Exercises and perform the exercises for this unit.
3-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. In the Administration Center, you can use the __________________ to determine the overall status of server operations. 2. True or False? The only way to access the Tivoli Storage Manager command line is from the console of the operating system. 3. True or False? The IBM Tivoli Storage Manager Console is a Microsoft Management Console snap-in that provides a backup-archive utility for client data. 4. If you have _________________ authority you can perform all IBM Tivoli Storage Manager tasks. 5. What command starts an administrative command line? a. adsm b. dsmc c. admc d. dsmadmc
3-47
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Answers
1. In the Administration Center, you can use the __________________ to determine the overall status of server operations. Health Monitor 2. True or False? The only way to access the Tivoli Storage Manager command line is from the console of the operating system. false 3. True or False? The IBM Tivoli Storage Manager Console is a Microsoft Management Console snap-in that provides a backup-archive utility for client data. false 4. If you have _________________ authority you can perform all IBM Tivoli Storage Manager tasks. system 5. What command starts an administrative command line? a. adsm b. dsmc c. admc d. dsmadmc d. dsmadmc
3-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Identify the types of interfaces available. Navigate the Administration Center on the Integrated Solutions Console. Identify the levels of authority for the different job roles. Create and remove an TSM administrator.
57
3-49
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-1
Introduction
This unit introduces devices used to store data. Basic concepts of attaching a tape library and preparing media to work with IBM Tivoli Storage Manager are also discussed.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Identify the device types. Explain how to configure a locally attached tape library to IBM Tivoli Storage Manager. Explain how to prepare tape cartridges for use in an IBM Tivoli Storage Manager managed tape library. Explain how to check media in and out of the library.
4-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
Lesson 1: Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
Installing and Configuring a Tape Library
IBM Software Group | Tivoli software
The combination of the library, drives, and their device class represents the physical device environment. A physical library is a collection of one or more drives that share similar media mounting requirements. Each drive mechanism within a device (that uses removable media) is represented by a drive object. For devices with multiple drives, including automated libraries, each drive is separately defined and must be associated with a library. A drive is a hardware device capable of performing operations on a specific type of sequential media. Drive definitions can include such information as the element address (for drives in SCSI libraries), how often the drive is cleaned (for tape drives), and whether or not the drive is online.
4-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
Perform the following steps to attach an automated library device: 1. Install the SCSI adapter card in your system, if not already installed. 2. Determine the SCSI IDs available on the adapter card to which you are attaching the device. Find one unused SCSI ID for each drive, and one for the library or autochanger controller. In some automated libraries, the drives and the autochanger share a single SCSI ID but have different logical unit numbers (LUNs). For these libraries, only a single SCSI ID is required. Check the documentation for your device. 3. Follow the instructions from the manufacturer to set the SCSI ID for the drives and library controller to the unused SCSI IDs that you found. Usually you need to set switches on the back of the device. Note: Each device connected in a chain to a single SCSI bus must be set to a unique SCSI ID. If each device does not have a unique SCSI ID, you may have serious system problems. 4. Follow the instructions from the manufacturer to attach the device to your server system hardware. Note: Power off your system before attaching a device to prevent damage to the hardware. Also, you must attach a terminator to the last device in the chain of
4-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
devices connected on one SCSI adapter card. Detailed instructions should be in the documentation that came with your hardware.
Note: If your device is not listed on the supported list of devices, it is very likely that it is not supported.
4-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
Getting Device Information from the Tivoli Storage Manager Device Driver
Use the wizards associated with the TSM Management Console to initiate the Device Configuration wizard and view existing device configuration information. IBM devices require IBM device drivers. Non-IBM devices require TSM device drivers.
4-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
2. Change directories to the directory in which the Tivoli Storage Manager Console been installed. For default installations, the path is:
c:\program files\tivoli\tsm\console
3. To view the information, enter the following command: tsmdlst > devlist.txt
To view a listing of devices and their attributes, you can use the tsmdlst command.
# lsdev -Cc disk hdisk0 Available 40-60-00-4,0 16 Bit SCSI Disk Drive # lsdev -Cc tape rmt0 Available 1P-08-00-0,0 4.0 GB 4mm Tape Drive rmt1 Available 1P-08-00-2,0 4.0 GB 4mm Tape Drive smc0 Available 1P-08-00-3,0 IBM 7336 Tape Medium Changer # lsdev -Cc adsmtape mt0 Available 1P-08-00-0,0 Tivoli Storage Manager Tape Drive mt1 Available 1P-08-00-2,0 Tivoli Storage Manager Tape Drive
4-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
To get information on determining element numbers, go to the following Web page: http://www.ibm.com/software/sysmgmt/products/support/ IBM_TSM_Supported_Devices_for_AIXHPSUNWIN.html Find the device worksheet that applies to your device, and determine the alias name for the device. The device name for each drive has the form mtx. The device name for the library controller has the form lbx. In both cases, x is the number assigned when the drive and library were set up with its device driver.
4-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
Alias names appear in the form mtx.y.z.n or lbx.y.z.n or opx.y.z.n, where: mt: Indicates the device is a tape device. For example: mt3 (Tape drive at SCSI ID 3, LUN 0, bus 0, port 0) mt5.0.0.1 (Tape drive at SCSI ID 5, LUN 0, bus 0, port 1). lb: Indicates the device is the controller for an automated library device. For example: lb4.1 (Library at SCSI ID 4, LUN 1, bus 0, port 0.). op: Indicates the device is an optical device. For example: op4 (Optical drive at SCSI ID 4, LUN 0, bus 0, port 0). x: Indicates the SCSI ID for the targeted device. y: Indicates the logical unit number (LUN) for the targeted device. z: Indicates the bus number supported by the adapter device driver. n: Indicates the port number for the SCSI adapter device driver.
Enter the device special file name in the worksheet. Keep the Worksheets. The information you record on the worksheets can help you when you need to perform operations such as adding volumes to an autochanger. Keep them for future reference.
4-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 4: Storage Media Devices Introduction Installing and Configuring a Tape Library Attached to the IBM Tivoli Storage Manager Server
Configuring Devices
After the device is installed and recognized by the operating system, you will need to configure the device.
Use the audit library command and check the activity log to ensure you were successful. Perform the steps, in the order shown on the slide, for each drive.
4-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SCRATCH VOLUMES:
Are empty or contain no valid data. Change status to PRIVATE when data is written to them. Can be used to satisfy any request to mount a scratch volume.
PRIVATE VOLUMES:
May contain valid data. Are used or owned by an application. Can only be used to satisfy a request to mount the specified volume.
11
A private volume is a labeled volume that is in use or owned by an application and may contain valid data. You must define each private volume, and it can only be used to satisfy a request to mount that volume by name. Private volumes do not return to scratch when they become empty. A scratch volume is a labeled volume that is empty or contains no valid data and can be used to satisfy any request to mount a scratch volume. When data is written to a scratch volume, its status is changed to private. You can change the status of volumes by issuing the update libvolume command. The command allows you to assign a private status to a scratch volume or to assign a scratch status to a private volume. The private volumes must be administrator-defined volumes
4-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
with either no data or invalid data. They cannot be partially written volumes containing active data. Volume statistics are lost when volume statuses are modified.
There are several methods for checking in a tape. They can be checked in online or offline. You can label and check in all in one step (label libvol), or use the autolabel=yes feature when defining a 349X, ACSLS, SCSI, external, or manual library.
4-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Labeling Tapes
IBM Software Group | Tivoli software
Labeling Tapes
The label libvolume command: label libvolume storagelibname checkin=scratch search=bulk labelsource=barcode or The AUTOLABEL parameter with the define library command: define library autodltlib libtype=scsi autolabel=yes
13
Label Libvolume
If you label volumes with the label libvolume command, you can issue the CHECKIN parameter. You can label volumes with the label libvolume command. The following example demonstrates using the label libvolume command to label tapes for both manual and automated libraries. Assume the automated device is attached to SCSI address 4, and the manual device is attached to SCSI address 5. You want to insert media into the entry and exit ports of the device, and you want the bar code reader to read bar code labels and overwrite existing labels with the information on the bar code label.
4-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
AUTOLABEL
The AUTOLABEL parameter: Can be used with the define library and update library commands. Can be more efficient than using the label libvolume command, which requires you to mount volumes separately. Can be used with all library types except shared. Will use the barcode values for 349X, ACSLS, and SCSI libraries, and whatever volume name given by the external application for external libraries. Will prompt you for a label with manual libraries.
The AUTOLABEL parameter allows you to checkin volumes without a label. The server will label both blank and incorrectly labeled tapes when they are initially mounted, using the barcode as the volume name. Using the AUTOLABEL parameter eliminates the need to prelabel a set of tapes. AUTOLABEL is specified as a parameter on the library with possible values of NO (default), YES, or OVERWRITE. If you use the AUTOLABEL parameter, you must check in tapes by specifying CHECKLABEL=BARCODE on the checkin libvolume command.
4-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
You can also check out volumes for a library from the Administration Center:
1. Click Storage Devices in the Tivoli Storage Manager tree. 2. In the Libraries for all Servers table, click a library name. 3. In the properties notebook for the library, click the Volumes tab. 4. In the Volumes table, click Select Action, select Check Out Volumes.
14
For automated libraries with multiple entry and exit ports, you can issue the checkout libvolume command with the REMOVE=BULK parameter. Tivoli Storage Manager ejects the volume to the next available entry and exit port.
4-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Checking In Volumes
After the volumes have been labeled, make the volumes available to Tivoli Storage Manager devices by checking the volumes into the library volume inventory using the checkin libvolume command. Checking media into an automated library involves adding them to the library volume inventory.
Checking In Volumes
checkin libvolume tapelib volx search=no status=scratch checkin libvolume tapelib search=yes status=scratch checklabel=barcode query libvolume
You can check in and label volumes for a library from the Administration Center:
1. Click Storage Devices in the Tivoli Storage Manager tree. 2. In the Libraries for all Servers table, click a library name. 3. In the librarys properties notebook, click the Volumes tab. 4. In the Volumes table, click Select Action, select Add Volumes.
15
4-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Auditing a Library
You can issue the audit library command to audit the volume inventories of automated libraries.
Auditing a Library
vol_002
vol_002
slot 1
2
vol_007
slot 1
slot 2
vol_007
slot 2
slot 3
vol_008
slot 3
vol_008
3
The AUDIT LIBRARY command will update the library inventory.
?
slot 1
?
slot 2
slot 3
16
Auditing the volume inventory ensures that the information maintained by the Tivoli Storage Manager server is consistent with the physical media in the library. The audit is useful when the inventory has been physically moved. Tivoli Storage Manager deletes missing volumes and updates the locations of volumes that have moved since the last audit. Tivoli Storage Manager cannot add new volumes during an audit. It is suggested that you not move tapes within the library.
Review Questions
1. Tivoli Storage Manager has two status types for a tape volume. A ___________ volume is a labeled volume that is in use or owned by Tivoli Storage Manager, and may contain valid data. 2. A ___________ volume is empty or contains no valid data, and can be used to satisfy any request to mount a scratch volume. 3. The __________ command is useful when the inventory has been physically moved. 4. The _____________ is a number that indicates the physical location of a drive within an automated library.
4-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Answers
1. Tivoli Storage Manager has two status types for a tape volume. A ___________ volume is a labeled volume that is in use or owned by Tivoli Storage Manager, and may contain valid data. private 2. A ___________ volume is empty or contains no valid data, and can be used to satisfy any request to mount a scratch volume. scratch 3. The __________ command is useful when the inventory has been physically moved. audit library 4. The _____________ is a number that indicates the physical location of a drive within an automated library. element number
4-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
Summary
You should now be able to:
Identify the device types. Explain how to configure a locally attached tape library to IBM Tivoli Storage Manager.
Explain how to prepare tape cartridges for use in an IBM Tivoli Storage Manager managed tape library.
17
4-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-1
Introduction
In this unit, you will see how to create hierarchical storage pools of different media types to allow for efficient management of your data.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Describe the purpose of storage pools, storage pool hierarchies, and storage pool volumes. Create a storage pool. Design and configure storage pools based on given customer requirements. Manage storage pool volumes.
5-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Storage Pools
Client sends data to server. Server records data storage information in TSM database.
Storage pools: Are a collection of like media (same device class) Provide storage for backed up, archived, or migrated files Support a variety of devices Can be chained together to create storage hierarchy
3
Data storage may be composed of direct access storage and sequential tape media. Files may be initially placed on different storage pools according to the desired storage management policy. Files are automatically moved to other devices to satisfy free space, space utilization, performance, and recovery requirements. An administrator with system, storage, or operator privilege can manage data storage. This includes planning, preparing, monitoring, and deleting storage volumes and storage pools depending on level of privilege class. Data storage is actually defined as a collection of storage pools.
5-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
less expensive
slower
A storage pool is a named set of volumes, belonging to the same device class, which is the destination of backed up or archived data. A device class is a grouping of like devices, such as disk or tape. The purpose of storage pools is to match user requirements for data with the physical characteristics of storage devices. For example, if users need immediate access to certain data, you can define a storage pool, which consists of storage volumes residing on highperformance DASD (direct access storage device an IBM term for a hard disk). Then, users can associate this storage pool as a destination for their files by binding the appropriate management class. Storage pools can be chained to create a storage hierarchy.
5-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Active-data pools: Can be used with sequential-access disk (FILE) Can be used with sequential-access tape or optical Can collocate active versions of backup data Can be used for backup data only; no archive or HSM data
5-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Device Classes
IBM Software Group | Tivoli software
Device Classes
Random Access:
Sequential Access:
Define additional tape device classes to reflect specific devices, media, and procedures. DEFine DEVClass DEVType=type of device
def devc autodlt_class devt=dlt format=drive library=autodltlib00
6
A device class represents a set of storage devices with similar availability, performance, and storage characteristics. These device types are managed by Tivoli Storage Manager. Tivoli Storage Manager uses the device class to determine which device and storage volume type to use to: Store backup, archive, or space-managed data (primary storage pools). Store copies of primary storage pool data (copy storage pools). Store database backups. Export or import Tivoli Storage Manager data.
One device class can be associated with multiple storage pools. Each storage pool is associated with only one device class. Each device class is characterized by its device type, which indicates the type of storage volumes that are used to store data. For random access storage, Tivoli Storage Manager supports only the DISK device class. The DISK device class is predefined by Tivoli Storage Manager. However, you can define many storage pools associated with the DISK device class. You cannot modify the DISK device class. For sequential access storage, Tivoli Storage Manager supports the following device types, including the FILE device class; drive space designated for use as a virtual storage device.
5-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Device Type 3570 3583 3590 3592 4 MM 8 MM DLT DTF FILE GENERICTAPE OPTICAL QIC
Description IBM 3570 cartridge tape devices IBM 3583 tape drives IBM 3590 tape drives IBM 3592 tape drives 4 mm tape drives, such as IBM 7206-005 8 mm tape drives, such as IBM 7208-001 and 7208011 Digital linear tape (DLT) drives Digital tape format Standard files are used to represent individual media volumes. Data is written to file volumes sequentially, as if they were tape volumes. Tape drives supported by a Windows tape device driver Optical drives that use 5.25-inch rewritable optical cartridges Quarter-inch cartridge tape drives, such as the IBM 7207 Removable media devices that are attached as local, removable file systems (for example, Iomega Zip or Jaz drives, or CD media) Storage volumes that are actually files archived in the server storage of another Tivoli Storage Manager server (a target server) Optical drives that use 5.25-inch write-once read-many optical cartridges A device type for StorageTek drives in a LAN-free configuration (except VOLSAFE which has its own devtype) Linear Tape-Open (LTO) devices Network-attached storage devices Also StorageTek tape media referred to as WORM (Write Once Read Many) tape technology
REMOVABLEFILE
SERVER
WORM
5-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Based on the tape environment, an administrator with system privilege can define as many different device classes for tape storage pools as needed. Each tape device class is uniquely identified by its name. Not all device classes are available on all platforms. Tape device classes allow the installation to control the following: Whether you will be using cartridge or reel tape (DEVtype). The maximum tapes that can be simultaneously mounted (MOUNTLimit). The maximum minutes before idle tape is demounted (MOUNTRetention). The tape volume naming convention (PREFIX). The estimated volume capacity (ESTCAPacity), since the default does not consider the use of compression by the client or tape hardware.
5-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Each device is associated with a device class that specifies the device type and how the device manages the media. If you have two libraries you will need two device classes. Storage pools are mapped to a device class. Through this mapping, when data is written to, or accessed from a storage pool, Tivoli Storage Manager knows the device characteristics of the storage pool media and how to access it. If the device is not listed on the IBM support page, it is probably not supported.
5-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Storage Destination
Storage Destination
stgpool_A
stgpool_D
sales
stgpool_C
accounting
8
A storage destination identifies the storage pool where client data is sent when it is backed up, archived, or migrated. It is specified in the backup and archive copy group definitions that are included in the management class, which is part of policy management. Policy management is covered in Unit 6. Data placement is also influenced by storage pool settings that may restrict read/write access and limit the size of files placed in the storage pool.
5-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Sequential access
To create large, sequential access file-type storage pools, issue the following command:
The storage volumes are actually files. Data is written sequentially into standard files in the file system of the server machine. You can define this device class by issuing a define devclass command with the DEVTYPE=FILE parameter. Both disk storage pool formats also have the capability of providing a space trigger for automatic allocation of storage pool space, which can result in increased efficiency of disk storage pools. This will reduce the potential for disk fragmentation and maintenance downtime. Do not use raw partitions with a device class type of FILE.
5-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
During installation, Tivoli Storage Manager provides predefined random access storage pools: BACKUPPOOL: A storage destination for user files that are backed up to the server. ARCHIVEPOOL: A storage destination for user files that are archived to the server. SPACEMGPOOL: A storage destination for files migrated from user nodes. DISKPOOL: Only for Windows systems. FILPOOL1: A default storage pool of device class FILEDEV1 created as a default Next Storage Pool for both ARCHIVEPOOL and BACKUPOOL when you install a minimum configuration on Windows only.
Example:
define stgpool pool1 disk description="test1 storage pool" maxsize=5m highmig=70 lowmig=30 cache=yes nextstgpool=test2
5-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Use the following command to show which storage pools contain client file spaces for a node and how much space they occupy:
Use the update stgpool command to change any parameter in an existing primary, copy, or active-data storage pool. If you do not explicitly update a parameter, it remains unchanged. The parameters to update are the same as the parameters when you define a storage pool. Use the query stgpool command to display information about one or more storage pools. The query occupancy command displays: Node name Type (backup, archive, or space managed) Filespace name and number Storage pool names Number of files Physical and logical space occupied
For the syntax of the commands, refer to the IBM Tivoli Storage Manager Administrator's Guide or issue the help update stg or help query command as an administrator.
5-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Create volumes in a storage pool from the Administration Center: 1. Click Storage Devices in the Tivoli Storage Manager tree. 2. In the Servers table, select a server. 3. Click Select Action, select View Storage Pools. 4. In the storage pools portlet for the server, click a storage pool name. 5. In the properties notebook for the storage pool, click the Volumes tab. 6. In the volumes table, click Select Action, select Add Volume.
12
Use the define volume command to assign a random or sequential access volume to be used for storage within an existing storage pool. You can define a volume to either a primary storage pool or a copy storage pool. You must define each volume to be used in a storage pool unless you allow scratch volumes for the storage pool. Before issuing this command for a random access volume, you must allocate and format the volume by using Tivoli Storage Manager command define volume with the FORMATSIZE parameter. For sequential access storage pools with a device type other than FILE or SERVER, you must prepare volumes for use. When the server accesses a sequential access volume, it checks the volume name in the header to ensure that the correct volume is being accessed.
5-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
To prepare a volume: 1. Label the volume. 2. For storage pools in automated libraries, use the checkin libvolume command to check the volume into the library. 3. Use the define volume command unless you allowed scratch volumes in the storage pool by specifying a nonzero MAXSCRATCH parameter.
>>--DEFine Volume--poolname--volume-----------------------> +-ACCess--=--READWrite-------+ >--+----------------------------+-------------------------+-ACCess--=---+-READWrite----+ (2) +-READOnly-----+ +-UNAVailable--+ | (1) |
-Formatsize---=--megabytes--+-------------------+ .-Wait--=--No----- . >--+------------------------------------------------+---> | (3) -LOcation------=--location- (1) This value is valid only for volumes assigned to copy storage pools. (2) This parameter is valid only for random access volumes. (3) This parameter is valid only for sequential access volumes.
5-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
13
5-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Delete storage pools and storage volumes with the following commands:
14
Before you begin deleting all volumes that belong to the storage pool, change the access mode of the storage pool to unavailable so that no files can be written to or read from volumes in the storage pool. To delete an empty storage pool volume, use the delete volume command:
DELete VOLume volumename
Tivoli Storage Manager does not allow you to delete a volume that contains data unless you specify DISCARDDATA=YES on the delete volume command.
DELete VOLume volumename DISCARDData=YES
The delete volume command can be used to delete a volume assigned to either a primary or copy storage pool. If during the processing of this command for a primary storage pool volume, Tivoli Storage Manager deletes the primary copy of a file (not a cached copy), then Tivoli Storage Manager also deletes any copies of that file residing in copy storage pools. If you are deleting several volumes, it is suggested that you delete the volumes one at a time. Concurrent volume deletion can adversely affect server performance. If archive retention protection is enabled, the data cannot be deleted until the retention period has been met.
5-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
The query content command is used to determine the contents stored on a volume by querying a Tivoli Storage Manager database table. Use the delete stgpool command to delete a storage pool. In order to use this command, you must first delete all volumes assigned to the specified storage pool. You cannot delete a storage pool that is defined as a subordinate storage pool. For more information on subordinate storage pools, see the NEXTSTGPOOL parameter in the define stgpool command. Do not delete a storage pool that is specified as a destination for a management class or copy group in the ACTIVE policy set. For additional parameters, refer to the IBM Tivoli Storage Manager Administrators Reference Guide for your platform.
5-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
MOVE NODEDATA
You can use the MOVE NODEDATA command to move file spaces for a node from one storage pool to another. move nodedata nodename fromstgpool=source_STGpool tostgpool=target_STGpool
16
Before deleting a storage pool, be sure you have moved all the data you need to retain by issuing the move data command to move the data to another storage pool. To move data from stgvol.1 to stgvol.2 in the same storage pool, issue the following command:
MOVe Data stgvol.1 stgvol.2
The move nodedata command can be used to move data in a sequential access storage pool for one or more nodes and is useful for consolidating data for a specific node within a storage pool. This is helpful for reducing number of volume mounts required during a restore operation. The move nodedata command can also be used to move data for a node to a different storage pool. This is helpful for preparing for client restore processing by first moving data to a random access storage pool. The move nodedata process performs the following tasks: Creates a list of nodes and file spaces to move based on the criteria of the user specified in the move nodedata command. Starts a queue thread to determine a list of volumes to process.
5-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
he volumes added to this list meet the following criteria: Access of READWRITE or READONLY. Have data for the node and file spaces specified by the user.
The volumes list created also becomes the list of volumes to exclude. Once the queue thread is complete a process thread is started. The number of process threads started is determined by the MAXPROCESS parameter. Each process thread that is started performs the following tasks: Selects a volume from the volume list. Processes each bitfile in the volume to determine whether it should be moved. Uses the move data functions to batch up the file and to move the bitfile.
The RECONSTRUCT option specifies whether to reconstruct file aggregates during data movement. Reconstruction removes empty space that has accumulated during deletion of logical files from an aggregate.
5-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
The following client sessions can concurrently read and write to FILE volumes: BACKUP RESTORE ARCHIVE RETRIEVE
The following server processes have concurrent read access to FILE volumes: BACKUP DB BACKUP STGPOOL COPY ACTIVEDATA EXPORT/IMPORT NODE EXPORT/IMPORT SERVER GENERATE BACKUPSET RESTORE STGPOOL RESTORE VOLUME
15
Concurrent access improves restore performance by allowing multiple clients access to the same volume at the same time. Server processes that do not have concurrent access to FILE volumes include: AUDIT VOLUME DELETE VOLUME MIGRATION MOVE DATA MOVE NODEDATA RECLAMATION
5-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
Text that lists physical location, shown with the MOVE MEDIA command. Used when library becomes full. Applicable to primary or copypool volumes. Volumes must be manually moved to overflow location. Used to associate location of volumes outside of the library. update stgpool archivepool ovflocation=locker24
17
Database Tracking
Use database tracking to update volume location to specified overflow location. Overflow storage pools allow the Tivoli Storage Manager administrator to better manage storage pools that grow beyond the capacity of the library. Database tracking is intended to be used primarily for long-term archive storage pools where the data is maintained on-site but is rarely retrieved for Tivoli Storage Manager processing. The first stage in implementing an overflow storage pool is to define the location of the volumes when they overflow from the library. This may be done either with the define stgpool or update stgpool command and the OVFLOCATION parameter. This parameter is a text description of where the volumes may be found. There is no default value for this parameter. The description may be up to 255 characters in length. The second step is to move the media to the overflow location. Issue the move media command to move media from the library to the overflow location. For example, to move all full volumes in the specified storage pool out of the library.
move media * stgpool=archivepool
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Storage Pools, Hierarchies, and Storage Pool Volumes
The overflow location for a storage pool may be displayed by using the query stgpool f=d (format=detail) command. This command produces output showing the storage pool name, type, associated device class, estimated capacity, and the overflow location.
5-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
stgpool_A Sales migration path 1. disk (stgpool_D) 2. tape (stgpool_C) stgpool_B Accounting migration path 1. disk (stgpool_A) 2. file (stgpool_B) 3. tape (stgpool_C)
stgpool_D
sales
stgpool_C
accounting
18
Automatic data movement between storage pools is used to balance the performance and cost of different storage devices while ensuring adequate free space to satisfy new space allocations. This process is known as migration. For each storage pool, you define low and high migration thresholds. Migration thresholds are based on a percentage of the storage pools total data-capacity. The low threshold identifies the amount of free space needed to satisfy the daily processing requirements of your business. The high threshold is used to trigger migration and ensure that enough free space is available while migration is performed. The difference between the high and low thresholds indicates the approximate amount of data that will be migrated. To reduce tape mounts and to use the space on tape volumes most effectively (when collocation is not used), ensure that the amount of data that is migrated from a disk storage pool is a multiple of the capacity of a tape volume in the next storage pool. Automatic data movement is also used to free up space on tape volumes by consolidating active data from fragmented tape volumes onto a single volume, leaving the original volumes available for reuse. This process is known as reclamation. For each tape storage pool, you define a reclamation threshold, which indicates the amount of space consumed by data that is no
5-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
longer valid before triggering reclamation. The best practice is to specify a value not less than 50% in order to avoid tape volume reclamation to multiple volumes.
When the high threshold is reached, files are migrated to the specified next-in-chain storage pool.
Migration ends when the amount of space used in the storage pool reaches the low migration threshold.
19
No migration occurs if there is no next storage pool. Tivoli Storage Manager first identifies which client node has backed up or migrated the largest single file space, or has archived files that occupy the most space. When the server identifies the client node based on these criteria, the server migrates all files from every file space belonging to that client. The migration applies to those files whose number of days in the storage pool exceeds the value specified by the MIGDELAY parameter. After the files for the first client node are migrated to the next storage pool, the server checks the low migration threshold for the storage pool to determine if the migration process should be stopped. If the amount of space used in the storage pool is now below the low migration threshold, migration ends. If not, using the same criteria as previously described, Tivoli Storage Manager chooses another client node, and the migration process continues. If the value for MIGCONTINUE has been set to YES, then Tivoli Storage Manager continues the migration process based on how long the files have been in the storage pool. The oldest files are migrated first until the low migration threshold is reached. If the value for MIGCONTINUE has been set to NO, then the migration process ends, and a warning message will be issued to the administrator.
Copyright IBM Corp. 2008 IBM Tivoli Storage Manager 5.5 Implementation and Administration
5-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
If multiple migration processes are running (controlled by the MIGPROCESS parameter of the define stgpool command), the files for more than one node may be chosen for migration at the same time. If the cache option is enabled, files that are migrated remain on disk storage (that is, the files are cached) until space is needed for new files. You can enable caching by specifying CACHE=YES when you define or update a disk storage pool. When caching is enabled, the migration process leaves behind duplicate copies of files on disk after the server migrates these files to subordinate storage pools in the storage hierarchy. The copies remain in the disk storage pool, but in a cached state, so that subsequent retrieval requests can be satisfied quickly. However, if space is needed to store new data in the disk storage pool, cached files are erased and the space they occupied is used for the new data. The advantage of using a cache for a disk storage pool is that caching can improve how quickly the server retrieves some files. When you use a cache, a copy of the file remains on fast disk storage after the server migrates the primary file to another storage pool. You may want to consider using a disk storage pool with caching enabled for storing space-managed files that are frequently accessed by clients. However, using a cache has some important disadvantages, such as: It can increase the time for client backup operations to complete. It can require more space for the Tivoli Storage Manager database.
The migrate stgpool command allows you to manually run migration for a random access or sequential access primary storage pool.
5-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
1. Click Storage Devices in the Tivoli Storage Manager tree. 2. In the Servers table, select a server. 3. Click Select Action, select View Storage Pools.
4. In the storage pools portlet for the server, click a storage pool name. 5. In the properties notebook for the storage pool, click the Migration tab.
20
1. 2. 3. 4. 5.
Click Storage Devices in the Tivoli Storage Manager tree. In the Servers table, select a server. Click Select Action, select View Storage Pools. In the storage pools portlet for the server, click a storage pool name. In the properties notebook for the storage pool, click the Migration tab.
21
5-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
22
(caching)
1. 2. 3. 4.
Click Storage Devices in the Tivoli Storage Manager tree. In the Servers table, select a server. Click Select Action, select View Storage Pools. In the servers storage pools portlet, click a storage pool name.
5-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Reclamation
IBM Software Group | Tivoli software
Reclamation
Reclamation is a process of consolidating the remaining data from many sequential access volumes onto fewer new sequential access volumes. Lower threshold = more tapes; faster reclamation. Higher threshold = fewer tapes, longer reclamation. TAPE_SP1
100%
Use the RECLAIM STGPOOL command to initiate an automatic drive reclamation for a sequential access primary or copy storage pool. Empty tapes move back to scratch or private pools. Reclamation of an active-data pool recovers space used by inactive and deleted files.
24
Space on a sequential volume becomes reclaimable as files expire or are deleted from the volume. Reclamation is the process of reclaiming this space. For example, files become obsolete because of aging or limits on the number of versions of a file. When the percentage of reclaimable space exceeds a specified level (the reclamation threshold), the volume is eligible for reclamation. The server checks whether reclamation is needed at least once per hour and begins space reclamation for eligible volumes. You can set a reclamation threshold for each sequential access storage pool when you define or update the pool. When multiple volumes are eligible for reclamation, Tivoli Storage Manager reclaims the eligible volumes in random order. Space within aggregate files is also reclaimed during the reclamation process. An aggregate is a physical file that contains multiple logical files backed up or archived from a client in a single transaction. Unused space from expired or deleted logical files is removed as the aggregate file is copied to another volume during reclamation. The reclaimstgpool command allows you to manually run reclamation for a sequential access primary or copy storage pool.
5-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Space requirements
No minimum size Size related to reclamation threshold or storage pool to be reclaimed
25
The reclaimstgpool command points to another storage pool that can be used as the holding area for the data being consolidated. The storage pool specified as the reclaim storage pool may be any primary storage pool on the system or a new primary storage pool created for this purpose. The only disk pool allowed is one with DEVTYPE=FILE. A copy storage pool may not be defined as a reclaim storage pool because data may be only copied to or from a copy storage pool, not moved.
5-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
define stg filepool file define stg tapepool 3570 reclaimstg=filepool upd stg filepool next=tapepool
26
Single drive reclamation is effectively an automation of the move data command and storage pool migration. The move data process moves only the data which has not expired from the storage pool to be reclaimed to the reclaimstgpool. This data may then be migrated back down the Tivoli Storage Manager storage hierarchy to the now empty storage pool volumes. The second half of the single drive reclamation process involves Tivoli Storage Manager migration. A reclaim storage pool should have the storage pool being reclaimed as its next storage pool in the Tivoli Storage Manager hierarchy. This allows data moved into the reclaim storage pool by the reclamation process to be migrated back down through the Tivoli Storage Manager hierarchy. In the example shown above, the TAPEPOOL is a storage pool defined within a single drive library. The TAPEPOOL is defined with the DISKPOOL as its reclaim storage pool, and the DISKPOOL is defined with the TAPEPOOL as its next storage pool.
5-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Collocation
IBM Software Group | Tivoli software
Collocation
volumes in collocated storage pools A B Files for Client Node A Files for Client Node B volumes in a non-collocated storage pool A and B
Benefits of collocation:
Keeps client data together Can significantly reduce tape mount requests Has faster retrieval time
Costs of collocation:
Uses more tapes Has longer backup time
27
Collocation is a process in which the server attempts to keep files belonging to a single client node or to a single file space of a client node on a minimal number of sequential access storage volumes. You can set collocation for each sequential access storage pool when you define or update the pool. There are four options for collocation when using the define stgpool or update stgpool commands: No Group Node File Space
With collocation, less time is spent searching database entries. By using collocation, you reduce the number of volume mount operations required when users restore, retrieve, or recall many files from the storage pool. Collocation thus improves access time for these operations.
5-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
If collocation is enabled and reclamation occurs, the server tries to reclaim the files for each client node or client file space onto a minimal number of volumes. Collocation cannot collocate data already in a storage pool volume.
5-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
5-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
A C D
A C
B D
B C D
B C D
tape pool
s tA n e a i t Cl da
s B nt a e i t Cl da
s tC n e a i Cl dat
g lin ll fil fu % 20
g lin ll fil fu % 40
g lin ll fil fu % 75
h tc ra pty) c s m (e
r fo d up e rv k se ac re B_b ty) D mp (e
5-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
A C D
A C
B D
B C D
B C D
tape pool
s tA n i e ta Cl da
s tB n e a i t Cl da
s tC n ie ta Cl da
g lin ll fil fu % 20
g lin ll fil fu % 40
g lin ll fil fu % 75
r fo d up e rv k se ac re B_b ty) D mp (e
After the data for Client D goes to the tape for Client A, and a new tape is added, use the move data command to recollocate.
5-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Collocation by Groups
IBM Software Group | Tivoli software
Collocation by Groups
Groups of nodes can be defined, and the server can then collocate data based on these groups.
Accounting Sales
ntin g
ou Acc
les Sa
31
The define collocgroup command is used to define the group for collocation.
define collocgroup groupname
The define collocmember command is used to add a client node to a collocation group.
define collocmember groupname node1,node2
Some of the benefits of collocation by group are as follows: Reduces unused tape capacity by allowing more collocated data on individual tapes. Minimizes mounts of target volumes. Minimizes database scanning and reduce tape passes for sequential-to-sequential transfer.
Minimizes database scanning which reduces tape passes for sequential-to-sequential transfers, such as reclamation.
5-37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
You can also use the Administration Center to copy active data.
32
5-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
33
Active-data pool related actions: Create Storage Pool Modify Storage Pool Copy Active Data
5-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
34
The Copy Active-data form: Is similar to Backup Storage Pool, but handles active-data pools. Is valid for pools with NATIVE or NONBLOCK format. Enforces that pool data format is the same as source primary pool.
5-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Student Exercise
IBM Software Group | Tivoli software
Student Exercise
35
Open your Student Exercises and perform the exercises for this unit.
5-41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Review Questions
1. Data that is backed up or archived is stored on _______________ in a storage pool. 2. A storage pool is a named set of volumes that all use the same _________ class. 3. Storage pools are chained to create a ______________. 4. The _______________ command is used to define a storage pool. 5. The _______________ command is used to update any parameters in an existing storage pool. 6. The _______________ command is used to query information about one or more storage pools. 7. ________________ is an option in which the Tivoli Storage Manager server attempts to keep files belonging to a single client node or to a single file space of a client node on a minimal number of tape volumes. 8. To have Tivoli Storage Manager collocate data in a storage pool by client file system, set the collocation option to __________. 9. What do you call the process that automatically moves data from a pool to the next storage pool? 10. Which command is available to move the data from a single node out of one storage pool and into another storage pool?
5-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
5-43
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Review Answers
1. Data that is backed up or archived is stored on _______________ in a storage pool. volumes 2. A storage pool is a named set of volumes that all use the same ___________ class. device 3. Storage pools are chained to create a ______________. hierarchy 4. The _______________ command is used to define a storage pool. DEFine STGpool 5. The _______________ command is used to update any parameters in an existing storage pool. UPDate STGpool 6. The _______________ command is used to query information about one or more storage pools. Query STGpool 7. ________________ is an option in which the Tivoli Storage Manager server attempts to keep files belonging to a single client node or to a single file space of a client node on a minimal number of tape volumes. Collocation 8. To have Tivoli Storage Manager collocate data in a storage pool by client file system, set the collocation option to __________. filespace 9. What do you call the process that automatically moves data from a pool to the next storage pool? migration
5-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
10. Which command is available to move the data from a single node out of one storage pool into another storage pool? the move nodedata command
5-45
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Describe the purpose of storage pools, storage pool hierarchies, and storage pool volumes. Create a storage pool. Design and configure storage pools based on given customer requirements. Manage storage pool volumes.
36
5-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
5-47
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 5: Managing Storage Pools and Storage Pool Volumes Automatic Data Movement
5-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-1
Introduction
Policy management enables the administrator to determine a set of rules explaining how IBM Tivoli Storage Manager will treat data. This set of rules is composed of policy domains, policy sets, management classes, and copy groups.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Define a new policy domain. Define a new policy set. Define a new management class. Define a new backup copy group. Assign a default management class. Validate a policy set. Activate a policy set. Manage policies with the Administration Center.
6-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
TSM servers
Policies, which are created by the administrator and stored in the database on the server, can be updated and the updates retroactively applied to already managed data. You might have one policy or many depending on business needs. Policies include several elements:
Policy Domain: A set of rules applied to a group of nodes managed by the same set of policy constraints as defined by the policy sets. A node may only be defined to one policy domain per server. A node may be defined to more than one Tivoli Storage Manager server. Policy Set: A collection of management class (MC) definitions. A policy domain may contain a number of policy sets, however, only one policy set in a domain can be active at a time. Management Class: A collection of management attributes describing backup and archive characteristics. There are two sets of MC attributes, one for backup and one for archive. A set of attributes is called a copy group. There is a backup copy group and an archive copy group. For Tivoli Space Manager clients only, there are parameters that affect space management.
6-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Policy Domain
Policy Domain
Client nodes are assigned to a policy domain. Policy domains are groups of one or more policies. Policy domains are stored in the TSM database. Policy domain names may be from 1 to 30 characters. There is no limit to the number of defined policy domains. A client node can only be associated with one policy domain.
Active Policy Set Management Class Backup Backup Copy Copy Group Group Archive Archive Copy Copy Group Group
A policy domain provides you with a logical way of managing backup and archive policies for a group of nodes with common needs. It is a collection of one or more nodes and one or more policies. Each domain is an object stored in the Tivoli Storage Manager database with a name that contains from 1 to 30 characters. Policy domain names should be meaningful. There is no limit to the number of policy domains that can be defined on a Tivoli Storage Manager server. A client node can be associated with only one policy domain on a specific Tivoli Storage Manager server. However, a client or node may be registered (defined) to more than one server. Each domain may have one or more clients or nodes associated with it. The clients or nodes may be running on the same or different platforms. Some installations may only require a single policy domain. A policy domain also contains a grace period backup and an archive retention period. This grace period acts as a safety net to insure that data backed up or archived in a storage pool is not inadvertently deleted.
6-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1. Click Policy Domains and Client Nodes in the Tivoli Storage Manager tree. 2. In the Servers table, select the name of a server. 3. In the policy domains notebook of the server, click Select Action, and select Create a Policy Domain.
6-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Use the define domain command to define a policy domain for the UNIX clients.
Management Class Backup Backup Copy Copy Group Group Archive Archive Copy Copy Group Group
Domainname: Specifies the name of the policy domain to be defined. This parameter is required. The maximum length of this name is 32 characters. DESCription=description: Specifies a text string that describes the policy domain. This parameter is optional, but it is suggested to provide a meaningful description. The maximum length of the description is 255 characters. BACKRETention=bkretvalue: Specifies the number of days (from the date the backup versions became inactive) to retain backup versions of files that no longer exists on the client system. This is a grace period. ARCHRETention=arch: Specifies the number of days (from the date of archive) to retain archive copies that are bound to a management class that no longer exists on the client system. This is a grace period.
Related commands include: update domain and delete domain. Remember, a policy domain also contains a grace period backup and an archive retention period.
6-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Policy Set
Policy Domain Active Policy Set Management Class Backup Backup Copy Copy Group Group Archive Archive Copy Copy Group Group
There can be only one active policy set per policy domain. There may be any number of inactive policy sets. The policy set is stored in the server database. Policy set names may be from 1 to 30 characters. A policy set is a collection of management classes. A policy set contains one default management class.
Each policy set contains a default management class and can contain any number of additional management classes. Policy sets are used to implement different policies based on user and business requirements. Use the assign defmgmtclass command to specify an existing management class as the default management class for a particular policy set. You must assign a default management class for a policy set before you can activate that policy set. It is suggested that the default management class contains both an archive copy group and a backup copy group.
ASsign DEFMGmtclass domainname setname classname
In the Administration Center, you work only with the active policy set.
6-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Use the define policyset command to define a policy set named lab in the UNIX policy domain.
define policyset UNIX lab description='Policy set for UNIX clients in the lab'
10
Domainname: Specifies the name of the policy domain to which the policy set belongs. This parameter is required. Setname: Specifies the name you want to assign to the policy set. This parameter is required. The maximum length of this name is 30 characters. Description: Describes the new policy set using a text string. This parameter is optional. The maximum length of the description is 255 characters. It is suggested you use the description since this will define the policy set once it becomes active.
6-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Policy Domain Active Policy Set Management Class Backup Backup Copy Copy Group Group Archive Archive Copy Copy Group Group
11
A management class associates backup and archive groups with files and specifies if and how client node files are migrated to storage pools. Users can bind (which means, associate) their files to a management class through the include-exclude list. Includeexclude lists are discussed in Unit 9.
6-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12
To define a management class using the Administration Center, perform the following steps: 1. Click Policy Domains and Client Nodes in the Tivoli Storage Manager tree. 2. In the Servers table, select the name of a server. 3. In the policy domains notebook of the server, select the name of a domain. 4. In the properties portlet of the domain, click Management Classes. 5. In the table, click Select Action, select Create Management Class.
6-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Use the define mgmtclass command to define the management class that is named UNIXMC.
define mgmtclass UNIX lab UNIXMC
13
Domainname: Specifies the name of the policy domain to which the management class belongs. This parameter is required. Setname: Specifies the name of the policy set to which the management class belongs. This parameter is required. Classname: Specifies the name of the new management class. This parameter is required. Description: Specifies a description of the management class. This parameter is optional. The maximum length of the description is 255 characters. Enclose the description in quotation marks if it contains any blank characters.
6-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Copy Groups
Policy Domain Active Policy Set Management Class Backup Backup Copy Copy Group Group
Copy groups contain the parameters that control the generation and expiration of backup and archive data. There are two types of copy groups: backup and archive. Each management class can contain up to two copy groups. If there are two copy groups, they will be:
One for backups One for archives
6-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
DOMAINNAME SETNAME CLASSNAME STANDARD TYPE=BACKUP (optional; default) TYPE=ARCHIVE DESTINATION FREQUENCY=FREQVALUE VEREXISTS (Backup only) VERDELETE (Backup only) RETEXTRA (Backup only) RETONLY (Backup only) RETVER (Archive only) RETINIT (Archive only) RETMIN (Archive only) MODE=MODE SERIALIZATION=SERIALVALUE
15
Use the define copygroup command to define a new backup or archive copy group within a specified policy domain, policy set, and management class. Additional define copygroup command parameters: DOMAINNAME: Specifies the name of the policy domain for which you are defining the copy group. This parameter is required. SETNAME: Specifies the name of the policy set for which you are defining the copy group. This parameter is required. CLASSNAME: Specifies the name of the management class for which you are defining the copy group. This parameter is required. STANDARD: Specifies the name of the copy group as STANDARD. This parameter is optional. The name of the copy group must be STANDARD, which is the default value. Type=Backup: Specifies that you want to define a backup copy group. The default parameter is BACKUP. This parameter is optional. Type=Archive: Specifies that you want to define an archive copy group. The default parameter is ARCHIVE. This parameter is optional.
IBM Tivoli Storage Manager 5.5 Implementation and Administration
6-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
FREQuency=freqvalue: Specifies the minimum interval, in days, between successive backups. This parameter is optional. VERExists: Specifies the maximum number of backup versions to retain for files that are currently on the client file system. This parameter is optional. The default value is 2. VERDelete: Specifies the maximum number of backup versions to retain for files that have been deleted from the client file system after being backed up using Tivoli Storage Manager. This parameter is optional. The default value is 1. RETExtra: Specifies the number of days to retain a backup version after that version becomes inactive. A version of a file becomes inactive when the client stores a more recent backup version, or when the client deletes the file from the workstation and then runs a full incremental backup. The server deletes inactive versions based on retention time even if the number of inactive versions does not exceed the number allowed by the VEREXISTS or VERDELETED parameters. This parameter is optional. The default value is 30 days. RETOnly: Specifies the number of days to retain the last backup version of a file that has been deleted from the client file system. This parameter is optional. The default value is 60. RETVer: Specifies the number of days to keep an archive copy. This parameter is optional. The default value is 365. RETInit: Specifies when the retention time specified by the RETVER attribute is initiated. This parameter is optional. The default value is CREATION. RETMin: Specifies the minimum number of days to keep an archive copy after it has been archived. This parameter is optional. The default value is 365. MODE=mode: Specifies whether a file should be backed up based on changes made to the file since the last time it was backed up. This parameter is optional. The MODE value is only used for incremental backup. This value is ignored during selective backup. The default value is MODIFIED. SERialization=serialvalue: Specifies how files or directories are handled if they are modified during backup processing and what Tivoli Storage Manager should do if a modification occurs. This parameter is optional. The default value is SHRSTATIC.
6-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Using the Command Line to Define a Copy Group Policy Domain UNIX
Use the define copygroup command to define the backup copy group and archive copy group for the UNIXMC management class.
Active Policy Set lab Management Class UNIXMC Backup Backup Copy Copy Group Group
define copygroup UNIX lab UNIXMC standard destination=diskpool define copygroup UNIX lab UNIXMC standard type=archive destination=archivepool
6-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The set of backup parameters defines the following attributes: frequency mode (modified or absolute) destination copy serialization number of versions number of versions when the file is deleted retention days for all but the last version retention days for the last version when the file is deleted
The set of archive parameters defines the following attributes: frequency (always CMD) mode (always ABSOLUTE) destination copy serialization retention days for archive copies
6-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Tivoli Storage Manager provides a predefined policy domain, policy set, management class, backup copy group, and archive copy group. Each policy is stored on the server and named STANDARD.
STANDARD Policy Domain Active Policy Set Management Class Backup Copy Group Archive Copy Group
BACKRETention=30 ARCHRETention=365
17
Using the policy objects provided in Tivoli Storage Manager allows you to begin using IBM Tivoli Storage Manager immediately. As you become familiar with Tivoli Storage Manager you can tailor the standard policies. Backup Retention Grace Period: Specifies the number of days to retain a backup version when the server is unable to rebind the file to an appropriate management class. The default is 30 days. Archive Retention Grace Period: Specifies the number of days to retain an archive copy when the server is unable to rebind the file to an appropriate management class. The default is 365 days.
Issuing the register client node command will fail if STANDARD is deleted.
6-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Type = Backup DESTination = Backuppool VERExists = 2 VERDeleted = 1 RETExtra = 30 RETOnly = 60 SERialization = SHRSTatic
Type = Archive DESTination = Archivepool FREQuency = Cmd RETver = 365 MODE = ABSolute SERialization = SHRSTatic
18
6-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lesson 4: Expiration
Expiration is the process by which files are identified for deletion because their expiration date or retention period has passed. Backed up or archived files are marked expired by IBM Tivoli Storage Manager based on the criteria defined in the backup or archive copy group. Expire inventory manually starts inventory expiration processing. The inventory expiration process removes client backup and archive file copies from server storage based on policy specified in the backup and archive copy groups of the management classes to which the files are bound.
Expire Inventory
This excerpt is from the IBM Tivoli Storage Manager for Windows Administrators Reference.
19
6-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20
Copies of files that have expired are not deleted from server storage until expiration processing occurs. You can run expiration processing either automatically or by command. You control automatic expiration processing by using the expiration interval option (EXPINTERVAL) in the Tivoli Storage Manager options file (dsmserv.opt). Expiration processing then deletes eligible backup versions and archive file copies. Backup versions are eligible based on policy in the backup copy group (how long and how many inactive versions are kept). Archive file copies are eligible based on policy in the archive copy group (how long archived copies are kept). If you need to cancel inventory expiration, use the command
cancel expiration.
6-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
backup versions
resume.doc
changed
changed
changed
changed
21
The slide shows the life cycle of a backed up client file as it is stored in a TSM storage pool. A scheduled incremental backup and expire inventory run every day and the copy group values for this file are: Frequency = 0 Verexists = 3 (Maximum) Verdeleted = 1 Retextra = 30 (File exists on workstation) Retonly = 60 (File deleted from workstation) Mode = modified
Use the chart in the slide to consider what happens as TSM is backing up a changed file every day. For this scenario, on day 6, the file goes unchanged. On day 1 the file is changed or created. That evening it is backed up. The file would be marked as active. The same logic applies through day 4. Follow this logic through to day 4. Put the letter I (for inactive) on the extra versions. On day 4, because we are only keeping three versions of the file, the fourth backup is removed. Versions beyond the first three for days 4, 5, and 6 would not be kept.
6-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
backup versions
resume.doc
changed
changed
changed
A = active I = inactive
22
Assume a scheduled incremental backup and expire inventory run every day and that backup and copy group values for this file are: Frequency = 0 Verexists = 3 (Maximum) Verdeleted = 1 Retextra = 30 (File exists on workstation) Retonly = 60 (File deleted from workstation) Mode = modified
In this example, notice that the backup 1 on day 4 is gone because we are keeping only three versions based on VERExist=3. Notice, too, that the file goes unchanged after day 4. In this case, can you predict the results for day 33? On day 33, you would expect to see only one version. This is because RETAINEXTRA is set to 30 and needs to be NO LIMIT if you always want three versions. Can you predict when backup 2 would expire?
6-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Backup 2 would expire on day 33 because it became inactive on day 3 and you would add 30 days based on RETEXTRA=30.
backup versions
resume.doc
changed changed
A = active I = inactive
23
Assume a scheduled incremental backup and expire inventory run every day and that copy group values for this file are: Frequency = 0 Verexists = 3 (Maximum) Verdeleted = 1 Retextra = 30 (File exists on workstation) Retonly = 60 (File deleted from workstation) Mode = modified
Can you predict what happens if the file is erased on the morning of day 4? Backup 3 will go inactive if the file is deleted. How many extra copies will be there after the incremental backup on day 4?
Copyright IBM Corp. 2008 IBM Tivoli Storage Manager 5.5 Implementation and Administration
6-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
To determine this, notice that VERDELETED is set to 1. This means that backups 1 and 2 will be lost.
Can you predict when the only backup will go away? The only backup will go away on day 64 because RETONLY is set to 60.
6-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Archived 01/01/08
MAY 2008
Archived 01/01/08
JUN 2008
Archived 01/01/08
JUL 2008
Archived 01/01/08
AUG 2008
Archived 01/01/08
SEP 2008
Archived 01/01/08
OCT 2008
Archived 01/01/08
NOV 2008
Archived 01/01/08
DEC 2008
Archived 01/01/08
Archived 01/01/08
Archived 01/01/08
Archived 01/01/08
JAN 2009
Archived 01/01/08
24
The RETAIN VERSION that is specified in the archive copy group specifies the number of days an archived copy remains in data storage. When the specified number of days elapses for the archived copy of the file, IBM Tivoli Storage Manager deletes the file from data storage. Unlike the backup function, archive does not allow multiple versions of data files and directories.
6-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
25
The management class specified in the policy domain defines the backup and archive criteria for client nodes in the policy domain. Client users have the option of creating an include-exclude list to identify what files are eligible for backup services and to specify how IBM Tivoli Storage Manager will manage backed up or archived files. The INCLUDE and EXCLUDE options are specified in the client option file. If you do not specify the Management Class, the default Management Class is used.
6-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The policy domain grace retention period is used when default MGMTCLASS has no copy group for backup and archive.
Each policy domain contains a backup grace retention period and an archive grace retention period. The grace retention period is used to protect backup versions and archive copies from immediately being deleted when the default management class does not contain a backup or archive copy group.
6-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
27
You must assign a default management class for a policy set before you can activate that policy set. To ensure clients can always back up and archive files, choose a default management class that contains both an archive copy group and a backup copy group. DOMAIN_NAME: Specifies the policy domain to which the management class belongs. POLICY_SET_NAME: Specifies the policy set for which you want to assign a default management class. You cannot assign a default management class to the ACTIVE policy set. CLASS_NAME: Specifies the management class that is to be the default management class for the policy set.
6-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The validate command examines the management class and copy group definitions in a specified policy set and reports on conditions that need to be considered if the policy set is to be activated. After a change is made to a policy set, and the policy set is validated, then the policy set must be activated to make it the ACTIVE policy set. The validate policy set command will fail if any of the following conditions exist: A default management class is not defined for the policy set. A copy group within the policy set specifies a copy storage pool as a destination. A management class specifies a copy pool as the destination for space-managed files.
When a policy set is activated, the contents of the policy set are copied to a policy set that has the reserved name ACTIVE. Once activated, there is no real relationship between the policy set that has been activated (copied to ACTIVE) and the contents of the ACTIVE policy set. The original policy set can still be modified, but the copied definitions in the ACTIVE policy set can only be modified by activating another policy set.
6-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
archive
Monday BigFile.txt MC_ARCH_1
inactive versions
Wednesday
MC1 /usr/WhatsUp.doc
Friday
MC1 /usr/WhatsUp.doc
active version
MC1
The MC is bound to the file during backups. All backup versions of a file are bound to the same MC. Backup versions of a file can be rebound to a different MC.
The MC is bound to the file during archive. Archive files are never rebound to a different MC. Different archives of the same file may have a different MC.
29
Binding is the process of associating a file name with a management class name. Files are bound to a management class name when: A user can bind a file to a specific management class name using the INCLUDE option on an include-exclude list. A user can bind a file to a management class name using the ARCHMC option when archiving a file. A user can bind a directory to a management class name using the DIRMC option when backing up a file. The client node can bind a file to the default management class in the active policy set, when a user does not bind to a specific management class name.
Rebinding is the process of associating a file with a new management class name. Archive files are never rebound since each archive operation creates a different archive copy.
6-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Users change the management class assigned to a file by specifying a different management class in an include-exclude list and then performing an incremental or selective backup.
An administrator activates a policy that does not contain the management class.
An administrator assigns a client node to a different policy domain and the active policy set in that policy domain does not have a management class with the same name.
30
All backup versions are re-bound to the new MGMTCLASS. If the management class to which files are bound is deleted, IBM Tivoli Storage Manager uses the attributes of the default management class to manage the backup versions.
6-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Copy Domain
IBM Software Group | Tivoli software
31
To copy an existing domain named priority to create a new domain named critical, issue the following command:
copy domain priority critical
Update the new critical domain to specify the following updates: An active-data pool named adpool as the destination for active versions of backup data A backup retention grace period of 120 days An archive retention grace period of 2 years (730 days)
6-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Export/Import of Policy
IBM Software Group | Tivoli software
Export/Import of Policy
Use the export policy command to export definitions for policy domains, policy sets, management classes, backup and archive copy groups, and schedules to another server. export policy replacedefs=yes toserver=servergray
32
The export policy command moves policy information from one or more policy domains. Policy information includes policy domain and set definitions, management class definitions, backup, copy group and archive group definitions, schedule definitions for each policy domain, and client node associations.
6-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Student Exercise
IBM Software Group | Tivoli software
Student Exercise
33
Open your Student Exercises and perform the exercises for this unit.
6-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. The __________ command examines the management class and copy group definitions in a specified policy set and reports on conditions that need to be considered if the policy set is to be activated. a. activate b. bind c. validate d. reclamation 2. Each management class can contain up to ______ copy groups. 3. Each policy is stored on the server and named ___________. 4. True or False? A TSM client node can be associated with multiple policy domains on the same Tivoli Storage Manager server. 5. Copies of files that have expired are not deleted from server storage until ______________________ occurs.
6-37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Answers
1. The __________ command examines the management class and copy group definitions in a specified policy set and reports on conditions that need to be considered if the policy set is to be activated. a. activate b. bind c. validate d. reclamation c. validate 2. Each management class can contain up to ______ copy groups. two 3. Each policy is stored on the server and named ___________. Standard 4. True or False? A TSM client node can be associated with multiple policy domains on the same Tivoli Storage Manager server. false 5. Copies of files that have expired are not deleted from server storage until _______________ occurs. expiration processing
6-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Define a new policy domain. Define a new policy set. Define a new management class. Define a new backup copy group. Assign a default management class. Validate a policy set. Activate a policy set. Manage policies with the Administration Center.
34
6-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log
7-1
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log
Introduction
The Tivoli Storage Manager database is used by the server to manage information about client files. The Tivoli Storage Manager recovery log is used to ensure the consistency and availability of the database. This unit covers how to choose the size and location of the database and recovery log. You will also configure the database and recovery log for improved performance.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Identify the purpose of the database and recovery log volumes. Choose the location of the database and recovery log. Determine the size of the database and recovery log. Configure the database and recovery log to optimize performance. Configure the database and recovery log for high availability.
7-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log The Purpose of the Database and Recovery Log
The TSM database is used by the server to manage information about client files.
backup-archive client
3
The Tivoli Storage Manager database contains information that is needed for server operations and information about client data that has been backed up, archived, and spacemanaged. The database does not store client data. Instead, the database points to the locations of the client files in the storage pools. The database includes information about: Client nodes and administrators Policies and schedules Server settings Locations of client files on server storage Server operations (for example, activity logs and event records)
IBM Tivoli Storage Manager 5.5 Implementation and Administration
7-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log The Purpose of the Database and Recovery Log
The recovery log contains information about database updates that have not yet been committed. Updates can include activities such as defining a management class, backing up a client file, and registering a client node. Changes to the database are recorded in the recovery log to maintain a consistent database image.
7-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log The Purpose of the Database and Recovery Log
Transactions
IBM Software Group | Tivoli software
Transactions
backup-archive clients
A transaction is the unit of work exchanged between the TSM client and TSM server. To support multiple transactions from concurrent client sessions, the server holds the transaction log records in the recovery log buffer until they can be written to the recovery log. The transaction is committed. TRANSACTION COMMIT is the writing of all the log records for that transaction to the recovery log. The TSM database is updated.
4
The transaction records remain in the buffer pool until the active buffer becomes full or IBM Tivoli Storage Manager forces log records to the recovery log. The log records are moved to the recovery log volume disk when the transaction is committed. Changes resulting from transactions are held in the buffer pool temporarily and are not made to the database immediately. Therefore, the database and recovery log are not always consistent. When all records for a transaction are written to the recovery log, IBM Tivoli Storage Manager updates the database. The transaction is then committed to the database. At some point after a transaction is committed, the server deletes the transaction record from the recovery log. When a transaction occurs, the Tivoli Storage Manager server performs the following actions: 1. Reads a database page into the database buffer and updates it. A page is a 4096 byte block that is transferred as a unit between memory and disk storage. 2. Writes a transaction log record to the recovery log to describe the action that is occurring and associates it with the database page in case the database page needs to be rolled back during recovery. 3. Writes the database page to the database, releasing it from the buffer pool. The page remains in the buffer pool until buffer space is needed for another page.
7-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log The Purpose of the Database and Recovery Log
Recovery Log
The recovery log is used by the server to keep a record of all changes to the database. When a change occurs, the recovery log is updated with some transaction information prior to the database being updated. This enables uncommitted transactions to be rolled back during recovery, so the database remains consistent.
Recovery Log
Log space in normal mode is managed as a circular array of blocks. Out of log space causes in-process transactions to stop. Log space is freed when transactions commit or stop. Log records changes prior to database update.
Old New
Use normal mode for first complete backup, then change to roll-forward.
5
The recovery log functions in two modes: normal mode and roll-forward mode.
Normal Mode
When the transaction log record is written to the recovery log, a recovery point is recorded in it, and the data is committed to the database. A point of consistency is a time when all recoverable information in the database matches the data managed by the server. If the database needs to be recovered, the server uses the recovery point in the recovery log to bring the database back to its last point of consistency. If a failure occurs before a transaction is committed to the database, the server rolls back any changes made to the database pages. The log is treated as a circular array of blocks with the head (the newest log records) always chasing the tail (oldest records). The server will never let the head overtake and overwrite the tail; it must take some other action. As transactions commit, they free up log space and allow the tail to move forward. The recovery log saves some records for transactions that
7-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log The Purpose of the Database and Recovery Log
have already been committed, but only to the extent necessary to perform redo processing on recovery.
Roll-Forward Mode
In roll-forward mode, all changes made to the database since the last database backup are saved in the recovery log. With roll-forward mode and an intact recovery log, you can recover the database up to its most current state (the point at which the database was lost). The recovery log keeps all transactions since the last database backup. In this mode you should significantly increase the recovery log size. However, frequent database backups reduce recovery log storage requirements (after a backup is completed, recovery log records preceding the backup are deleted).
7-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log The Purpose of the Database and Recovery Log
Refer to the IBM Tivoli Storage Manager Performance Tuning Guide for more information.
7-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log The Purpose of the Database and Recovery Log
7-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Sizing the Database and Recovery Log
The size of your Tivoli Storage Manager database depends on the number of client files to be stored and how Tivoli Storage Manager manages them. If you can estimate the maximum number of files that might be in server storage at any time, you can use the following information to come up with a useful database size estimate: Each version of a file that Tivoli Storage Manager stores requires about 400 to 600 bytes of database space. Each cached or copy storage pool copy of a file requires about 100 to 200 bytes of database space. Caching is turned off by default. It is only used for moving from one storage pool to next. Overhead could increase the required space up to an additional 25%.
7-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Sizing the Database and Recovery Log
In the following example, the computations are probable maximums.The numbers are not based on the use of file aggregation. In general, the more that small files are aggregated, the less database space required.
7-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Sizing the Database and Recovery Log
Cached Files
Cached Files
Disk pool caching:
Cached copy requires 100 - 200 bytes of database space. Average file size is about 10 KB. About 100,000 files are in cache at any one time. 100,000 files x 200 bytes = 20
MB
Caching is enabled in the disk storage pool. The disk pool has a capacity of 5 GB and uses the default high migration threshold (90%) and low migration threshold (70%). Thus, if migration begins at 90% and stops at 70%, 20% of the disk pool, or 1 GB, is occupied by cached files.
10
7-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Sizing the Database and Recovery Log
11
For example, over a period of a week the highest cumulative consumption value was 500 MB. If you set your recovery log to 650 MB you should have sufficient space between daily backups.
7-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Adding Space
Define: Use the define dbvolume command to define a new database volume and use the define logvolume command to define a new recovery log volume. Another method to allocate a new Tivoli Storage Manager database volume is by using the define dbvolume command with the FORMATSIZE option from either the Tivoli Storage Manager console or an administrative client. Extend: Use the extend db command to increase the amount of space that can be used by the database within all the database volumes previously allocated to Tivoli Storage Manager. Use the extend log command to increase the amount of space that can be used by the recovery log within all the recovery log volumes previously allocated to Tivoli Storage Manager.
7-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Adding Space
Examples
AIX Example
DEFine DEF DEFine DEF EXTend EXTend EXT EXT DBVolume volume_name Formatsize=[format size] DBVol /usr/tivoli/TSM/server/dbvol/db2.dsm F=12 LOGVolume volume_name Formatsize=[format size] LOGVol /usr/tivoli/TSM/server/rclog/log2.dsm F=8 DB mb LOG mb db 12 log 8
Linux Example
DEFine DEF DEFine DEF EXTend EXTend EXT EXT DBVolume volume_name Formatsize=[format size] DBVol /opt/tivoli/TSM/server/dbvol/db2.dsm F=12 LOGVolume volume_name Formatsize=[format size] LOGVol /opt/tivoli/TSM/server/rclog/log2.dsm F=8 DB mb LOG mb db 12 log 8
Note: For UNIX users, the database name is case sensitive. Remember this when typing in the name of your volume. It is a best practice not to have your database and logs in the /bin directory.
Windows Example
DEFine DEF DEFine DEF EXTend EXTend EXT EXT DBVolume volume_name Formatsize=[format size] DBVol D:\TSM\SERVER\db2.dsm F=12 LOGVolume volume_name Formatsize=[format size] LOGVol D:\TSM\SERVER\log2.dsm F=8 DB mb LOG mb db 12 log 8
7-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Adding Space
Available Space Assigned Capacity Maximum % Used Maximum Reduction % Utilization Volumes used for database and recovery log must be disk volumes. All volumes treated as a single logical volume.
13
Maximum Extension
IBM Tivoli Storage Manager treats all volumes associated with the database or with the recovery log as a single logical volume. The logical volume manager maps data between logical and physical storage, allowing database and recovery log data to span physical disks. No reorganization of the database or recovery log is required. The amount of available space for the database or recovery log equals the combined space of all volumes defined to the database or recovery log. As data is added, Tivoli Storage Manager tracks the percentage of utilization, which is the amount of space used at a specific point in time. Be aware that the maximum amount of space used by the recovery log can vary significantly throughout the day, as it is proportional to the transaction load on the system. The maximum amount of space used by the database is more consistent with the utilization percentage, because the amount of database space consumed grows in proportion to the number of objects inserted into the database. Note: It is a good practice to always have extension space available.
7-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Adding Space
Using the Administration Center to Create, View, and Modify Database and Log Volumes
14
15
7-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Reducing the Database and Recovery Log Space
You should only need to run these commands if you want to redesign the volume layouts, or if you redefine volume to Tivoli Storage Manager.
16
There are some additional commands that can be used to decrease both database and recovery log space. Use the reduce db command to decrease the amount of space that can be used by the database. To reduce the capacity of the database, you must reduce the database in 4 MB increments. If you do not specify the reduction in 4 MB increments, Tivoli Storage Manager rounds the number to the next 4 MB partition. Use the reduce log command to decrease the amount of space that can be used by the recovery log. To reduce the capacity of the recovery log, you must reduce the recovery log in 4 MB increments. If you do not specify the reduction in 4 MB increments, Tivoli Storage Manager rounds the number to the next 4 MB partition. The log must be in normal mode.
For example, if you specify 11 MB, the server will round up to 12 MB when doing the extend or reduce operation. This does not apply to data storage. There is no notion of extending or reducing storage pool storage other than in volume increments.
7-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Mirroring
Lesson 5: Mirroring
Database and Recovery Log Mirroring
IBM Software Group | Tivoli software
log1 DB1
mirror
DB1 copy
log1 copy
17
The availability of the database and recovery log is ensured, by providing protection from logical errors and from device or media failures. Mirroring offers additional flexibility to that of using a hardware dual copy. Mirroring has the following benefits: Three copies can be supported. You have finer control over what is mirrored. Copies may be on physical volumes that reside on different storage control units. Support for multiple and different direct access storage device types. Read performance improves with mirroring because the server will read from the device with the best response time.
7-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Mirroring
Note: It is not advisable to independently mirror volumes used for the database or recovery log, although it is allowed.
18
7-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Mirroring
Mirroring Examples
IBM Software Group | Tivoli software
Mirroring Examples
Mirror database volume 4: define database copy primary copy mirror copy Formatsize=size def dbcopy e:\tsmdata\server1\db4.dsm f=12 k:\mirs\db4mir.dsm
def dbcopy /usr/tivoli/tsm/server/bin/db4.dsm /usr/tivoli/tsm/server/mirs/db4mir.dsm f=12 Mirror log volume 2: define log copy primary copy mirror copy Formatsize=size def logcopy e:\tsmdata\server1\log2.dsm k:\mirs\log2mir.dsm f=8 def logcopy /usr/tivoli/tsm/server/bin/log2.dsm /usr/tivoli/tsm/server/mirs/log2mir.dsm f=8
19
7-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log BUFPOOLSIZE Parameters
BUFPOOLSIZE Parameters
Server expiration processing resets the database buffer pool before the next processing starts and examines if the database buffer pool cache hit ratio is above 98%. If the cache hit ratio is lower than 98%, the database buffer pool will be increased; if it is higher, the buffer pool size will not change. Increasing the database buffer pool will not use more than 10% of available real storage.
BUFPOOLSIZE The minimum size is 256 KB The maximum size is limited by available memory The default is 32768 KB Suggested size is 131072 KB for server with 1 GB real memory (10% to 15% of real memory).
20
To have the server automatically tune the BUFPOOLSIZE option, set the SELFTUNEBUFPOOLSIZE option to YES. The default is NO. If you specify YES for the SELFTUNEBUFPOOLSIZE server option, the database buffer pool is dynamically adjusted. The cache hit ratio statistics for the buffer pool are reset at the beginning of expiration. After expiration processing completes, the buffer pool size is adjusted dynamically. Use the setopt bufpoolsize command to change the buffer pool size.
7-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
Define Spacetrigger
Use the define spacetrigger command to define settings for triggers that determine when and how Tivoli Storage Manager prepares additional space when predetermined thresholds have been exceeded in the database and recovery logs. DEFine SPACETrigger db fullpct=80 spaceexpansion=20 expansionprefix=c:\tsmserver\ mirrorprefixes=f:\mirvol1\,g:\mirvol2\ max=10000 DEFine DBCopy Query SPACETrigger db
Operation Results:
DB Full Percentage DB Space Expansion Percentage ---------- ----------80 20 DB DB Maximum Expansion Size Prefix (Megabytes) ------------ ----------C:\tsmserver 10000 Mirror Prefix1 Mirror Prefix2
Space triggers can be created, viewed, and modified with the Administration Center.
21
When the server performs an internal data movement operation, such as migration, reclamation, move data, or storage pool backup or restore, it will adjust the values of automatic performance tuning parameters, if configured, to achieve optimal performance. To prevent running out of log space during these operations, use the define spacetrigger command to allow for expansion of the recovery log. Administrator-defined space triggers tell the Tivoli Storage Manager server when to increase the size of the database or log. Space triggers define a maximum utilization percentage. When that utilization percentage is reached, the first step is to increase the size of the database or log, using space previously allocated but not used. The extend command is used to do this. If there is no previously allocated space, or if there is insufficient space to reduce the utilization percentage below the trigger value, the database or log is expanded. The first step in expanding the database is to allocate a new volume. A volume prefix name and the amount of space by which to extend as a percentage of the existing database or log must be predefined. A constraining upper limit can be defined for the database or log to prevent
Copyright IBM Corp. 2008 IBM Tivoli Storage Manager 5.5 Implementation and Administration
7-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
extension beyond a certain point. When volume allocation formatting is finished, the database or log will be extended by the size of the newly allocated volumes. Mirrored volumes will be allocated as well if the database or log is mirrored. The define spacetrigger command defines settings for the database and recovery log that determine when and how Tivoli Storage Manager deals with space shortages in the database and recovery log. The first parameter specifies whether the database or log is to be managed by automatic space trigger extension (the example shown is for a database). Database triggers are covered in Unit 10. The following parameters can be added.
Parameter
Fullpct=percentage
Description Specifies that when this value is reached Tivoli Storage Manager will acquire more space for expansion. Specifies the expansion size as a percentage of the existing size. Tivoli Storage Manager creates new volumes in multiples of 9 MB to achieve the required size. Specifies the prefix to use when creating the expanded files. The prefix name can include one or more directory separator characters (for example: J:\tsmtivoli storage managerserv\). Storage Manager does not check the prefix name for validity and automatic expansion can fail if invalid. Specifies the maximum allowable size of the database or log. If below this size when the utilization trigger is reached, the expansion will proceed, even if the expanded size exceeds this maximum size setting. Subsequent expansions will then fail because this size was exceeded. Specifies the prefix or prefixes that Tivoli Storage Manager uses to create new files for database or recovery log copy volumes.
SPACEexpansion= percentage
EXPansionprefix= prefixname
MAXimumsize=number
MIRRORprefixes
Note: To specify a directory as your prefix and allow the server to create files in that directory, use a backslash at the end of the directory you are specifying. Put quotation marks around the mirror prefix to ensure the directory separator characters are interpreted correctly.
7-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
Student Exercise
IBM Software Group | Tivoli software
Student Exercise
22
Open your Student Exercises and perform the exercises for this unit.
7-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
Review Questions
1. True or False? The recovery log is predominately read-oriented. 2. In which mode is the recovery log treated as a circular array of blocks with the head (the newest log records) always chasing the tail (oldest records)? a. Normal mode b. Roll-forward mode 3. In which mode does the recovery log track all transactions between database backups? a. Normal mode b. Roll-forward mode 4. To prevent running out of log space during these operations, use the ____________command to allow for expansion of the recovery log. 5. To have the server automatically tune the BUFPOOLSIZE option, set the ___________________________ option to YES. a. BUFFPOOLMEMSIZEON b. SELFTUNEBUFPOOLSIZE c. MAXSIZEBUFFPOOL d. SELFTUNEBUFPOOLMEM
7-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
7-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
Review Answers
1. True or False? The recovery log is predominately read-oriented. false 2. In which mode is the recovery log treated as a circular array of blocks with the head (the newest log records) always chasing the tail (oldest records)? a. Normal mode b. Roll-forward mode a. Normal mode 3. In which mode does the recovery log track all transactions between database backups? a. Normal mode b. Roll-forward mode b. Roll-forward mode 4. To prevent running out of log space during these operations, use the ____________command to allow for expansion of the recovery log. define spacetrigger 5. To have the server automatically tune the BUFPOOLSIZE option, set the ___________________________ option to YES. a. BUFFPOOLMEMSIZEON b. SELFTUNEBUFPOOLSIZE c. MAXSIZEBUFFPOOL d. SELFTUNEBUFPOOLMEM b. SELFTUNEBUFPOOLSIZE
7-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Identify the purpose of the database and recovery log volumes. Choose the location of the database and recovery log. Determine the size of the database and recovery log. Configure the database and recovery log to optimize performance. Configure the database and recovery log for high availability.
23
7-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 7: Customizing the Tivoli Storage Manager Database and Recovery Log Space Triggers
7-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 8:
Client Configuration
8-1
Introduction
This unit describes how to manage and configure client options and invoke the backuparchive interfaces available with IBM Tivoli Storage Manager.
Objectives
IBM Software Group | Tivoli software
Objectives
Identify the types of clients and how to invoke them. Register client nodes. Configure client access to the server. Control client access to the server. Set up client options. Use include-exclude to control client backup processing.
8-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
You can use the graphical user interface (GUI), the command line, or the Web client to perform tasks. More information on all these interfaces is available online and in the product manuals.
8-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
TSM server
>dsmc
backup-archive command line
Start the client command line at the operating system prompt. Your path may vary, but the default paths are as follows: Windows: Program Files > Tivoli > TSM > baclient AIX: /usr/tivoli/tsm/client/ba/bin Linux: /opt/tivoli/tsm/client/ba/bin
4
The client can be invoked by using the command line and typing dsmc at the system command prompt in the directory path where the client was installed. For example:
c:\Program Files\Tivoli\tsm\baclient dsmc
The client invokes a session with the server until the command is completed. The command dsmc can be followed by a keyword. For example, the dsmc incremental command is shown below:
dsmc i
When authentication is on, a password must be entered on the command line or the user will be prompted to enter a password. The password is encrypted and will not display when prompted. For Solaris, HU-UX and Linux, start the backup-archive client command line from:
/opt/tivoli/tsm/client/ba/bin
8-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
http://x.x.x.x:1581
Refer to the Backup-Archive Client Requirements section for the specific operating system levels supported for the Web clients. TCP/IP is the only communication protocol supported for this client interface.
8-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Change Password
A password is required when authorization is on. The change password function allows you to change your password at any time.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Manager client GUI. Node access can also be granted with the set access command on the command line. The second user may use the Access Another Node window in the Tivoli Storage Manager client GUI. The FROMNODE option when used with the restore or retrieve command can return node objects from one client to another. The Access Another Node functionality is supported in the Tivoli Storage Manager Web client. This allows one node to restore objects backed up or archived from one node to another node with a Tivoli Storage Manager Web client agent.
Delete Filespace
Use this utility if you do not need a file space. When you select the delete filespace command from the menu a delete confirmation request prompt displays. You can also remove a file space using the delete filespace command at the command line.
8-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Setup Wizard
The client configuration wizard is accessible from here. The Setup Wizard will run you through all the steps necessary to configure the Tivoli Storage Manager client and Web client.
Preview Include-Exclude
The preview command allows you to view the objects to be backed up or archived according to the include-exclude list, prior to sending any data to the server.
8-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Registration
Each node must be registered with the server and requires an option file with a pointer to the server. This can be done several ways. Register a node at the administrative command line with the following command:
From the Administration Center: 1. Click Policy Domains and Client Nodes in Tivoli Storage Manager tree. 2. In the Servers table, click a server name. 3. In the policy domains notebook for the server, click a domain name. 4. In the properties portlet for domain, click Client Nodes . 5. In the table, click Select Action, select Create a Client Node. Client nodes can also be viewed and modified with the Administration Center.
Registration can be set to open or closed. Open means the client node is automatically registered when a session is started. The administrator does not have to register this node. Closed registration means the client node must be registered by the administrator.
8-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Password Management
IBM Software Group | Tivoli software
Password Management
When will my password expire? How many attempts do I have? How long must my password be?
Administrators have a variety of commands and options that can be used to limit and control access to the system.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
node. The following example sets a system-wide limit of three consecutive invalid password attempts:
set invalidpwlimit 3
8-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
TSM Administrator
11
You can prevent a client node from accessing the system by using the lock node command. When you lock a node when it already has a session, the lock will not take effect until the system is restarted. You can reverse this by using the unlock node command. There are several reasons why a node might be locked. A node locks when there are too many invalid password attempts. An administrator may choose to lock a node to keep it from being included in an upcoming scheduled event.
8-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12
8-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Text editor
13
8-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Windows
dsm.opt
UNIX
dsm.opt dsm.sys
14
On multi-user systems, like UNIX and Linux, the client options are in both files: dsm.opt and dsm.sys. The dsm.sys file contains the system-wide options, where dsm.opt is specific to the client. On other systems, like Windows 2003, the client options are in dsm.opt. This is a file that a client can edit, containing a default set of processing options that identify the server, communication method, backup and archive options, and scheduling options. When entering options in your client options file (dsm.opt), use these guidelines: Each comment must have an asterisk (*) as the first character in a line. Comments and options cannot be entered on the same line. Enter each option on a separate line and enter all parameters for an option on the same line. Enter one or more blank spaces between parameters. 8440 bytes is the maximum number of bytes for a file name and file path combined.
Copyright IBM Corp. 2008
The file name itself cannot exceed 256 bytes. the path leading to the file cannot exceed 8184 bytes.
IBM Tivoli Storage Manager 5.5 Implementation and Administration
8-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
directory names (including the directory delimiter) within a path are limited to 256 bytes.
Remember, the Unicode representation of a character can occupy several bytes, so the maximum number of characters in a file name can vary. It is a good idea to indent options with spaces or tabs.
The server can manage client option sets, which is covered later in this unit.
Example of DSM.OPT
IBM Software Group | Tivoli software
Example of DSM.OPT
15
8-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Edit from the GUI graphical options editor Edit >> Preferences
16
Using the backup-archive GUI (more options available): Open the Edit menu and select Preferences. Make any necessary changes, and then click OK to save those changes.
Using the Setup Wizard (basic options only): Open the Utilities menu and select Setup Wizard. Select the Help me configure the TSM Backup Archive Client check box. Click the Next button. Select the Update my options file radio button.
8-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17
The graphical options editor will query the server for options that are stored centrally in client option set on the server. It is important to NOTE that the graphical options editor will only update or add client options to the options files on the client. Client option sets on the Tivoli Storage Manager server are not updated. The centrally stored options are displayed by the graphical options editor. Only client options that the backup-archive client is authorized to update can be changed with the graphical options editor.
8-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The following communication parameters must be set in the client options file: TCPPORT TCPServeraddress COMMMethod NODename
18
IBM Tivoli Storage Manager uses several communications parameters that must be set. These options are TCPPORT, TCPSERVERADDRESS, COMMMETHOD, and NODENAME. TCPPORT: Use the TCPPORT option to specify a TCP/IP port address of the server. The TCP/IP port address is used to communicate with a Tivoli Storage Manager server. The range of values is 1000 to 32767. The default is 1500.
TCPPORT port_address
TCPSERVERADDRESS: Use the TCPSERVERADDRESS option to specify the TCP/ IP address for a Tivoli Storage Manager server. To use the TCP/IP communication protocol, you must include the TCPSERVERADDRESS option in your client option file. The other TCP/IP options have default values which you can modify only if you want to change the default value. Provide a 1- to 64-character TCP/IP address for a Tivoli Storage Manager server. The value you specify for this parameter can be a TCP/IP Internet domain name or an IP address. COMMMETHOD: Use the COMMMETHOD option to specify the communication method you are using to provide connectivity for client-server communication. Some of the communication methods that can be used with the COMMMETHOD option include:
8-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SHAREDMEM: The Shared Memory communication method. This communication method option is possible when the Tivoli Storage Manager Server and Tivoli Storage Manager Client are on the same machine. TCPIP: The Transmission Control Protocol/Internet Protocol (TCP/IP) version 4, communication method. NAMEDPIPE: The Named Pipe option specifies the name of a named pipe to use for communication between a Tivoli Storage Manager server and Tivoli Storage Manager client on the same Windows workstation. V6TCPIP: The Transmission Control Protocol/Internet Protocol (TCP/IP) version 6 communication method. This method is not supported for all functions, including NDMP, Windows Microsoft Management Console, and the Administration Center. Refer to the documentation for a complete list of functions which are not supported. TCPIP (version 4) and V6TCPIP (version 6) can be used in dedicated or intermixed environments.
Please refer to the Tivoli online documentation for a complete listing of communication methods. NODENAME: Use the NODENAME option to identify your workstation to the server. The nodename can be a 1- to 64-character name that will be used to identify the node for which you want to request Tivoli Storage Manager services. For Windows systems, the default is the name of the machine if you do not use this option. For UNIX, the default is the same as the name returned by the hostname command. The NODENAME option goes in your client system options file dsm.sys. For UNIX environments, dsm.opt is used.
8-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
PASSWORDACCESS GENERATE
IBM Software Group | Tivoli software
PASSWORDACCESS GENERATE
Passwordaccess generate support is activated by specifying PASSWORDACCESS GENERATE in a client option file.
PASSWORDACCESS GENERATE
19
The password of the IBM Tivoli Storage Manager backup-archive client is encrypted and stored in a file on the client system. If a client receives a return code from the IBM Tivoli Storage Manager server indicating that the password has expired, the client generates a new random password. The PASSWORDDIR backup-archive client option is used to specify the location of the encrypted password file. The Win32 backup-archive client is an exception to this rule as it stores the encrypted IBM Tivoli Storage Manager client password in the registry.
8-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Additional Options
IBM Software Group | Tivoli software
Additional Options
There are several groups of options. We will discuss some of them in detail. Here is a global overview of the groups: Communication options Node options Backup and archive processing options Restore and retrieve processing options Scheduling options Format and language options Command processing options Authorization options Error processing options Transaction processing options Web client options Diagnostics options
20
8-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
To include all the local drives except for the e: drive enter the following command: dsmc incremental -domain=ALL-LOCAL -e:
21
This description applies generally to all platforms. Consider the term local drives to mean volumes or file systems if one of those terms applies to your platform. For more specific information about this option, see the appropriate IBM Tivoli Storage Manager BackupArchive Client Installation and Users Guide manual for your platform. Use the DOMAIN option to specify the drives you want to include in your client domain for incremental backup. When you use this option in your client option file, it defines your default client domain. The DOMAIN option is an additive option, so it will not override other options. IBM Tivoli Storage Manager uses your default client domain to determine which local drives to process during an incremental backup in the following situations: You run an incremental backup using the incremental command without specifying which local drives to process. Your IBM Tivoli Storage Manager administrator defines a schedule to run an incremental backup for you, but does not specify which local drives to process.
For UNIX clients, this option goes in the client user options file. ALL-LOCAL backs up all local hard drives, the systemobject domain (Windows 2000, XP), the systemstate domain (Windows Server 2003), and the systemservices domain (Windows Server 2003). This is the default.
Copyright IBM Corp. 2008 IBM Tivoli Storage Manager 5.5 Implementation and Administration
8-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
All system services components are backed up as part of system state. You cannot back up individual system services components; however, individual components can be restored. You can exclude individual system services components. Place the exclude.systemservice (or exclude.systemobject for Windows XP) options in the client options file (dsm.opt). You can also set these options on the Include-Exclude tab, Define Include-Exclude Options section of the Preferences editor.
22
Using the IBM Tivoli Storage Manager Client Configuration Wizard, select the domains and type of backup from a list.
8-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The TXNBYTELIMIT option specifies the number of kilobytes the client program buffers before it sends a transaction to the server.
file 3
There are some client options that are valid on the initial command line only. Many of these options establish the run-time environment, such as the COMMMETHOD and OPTFILE options. Options in this category are not valid in interactive, macro, or scheduler modes. They generate an error and cause processing to stop. Refer to the IBM Tioli Storage Manager Performance and Tuning Guide for more details.
8-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The TXNGROUPMAX option in the server options file indicates the maximum number of logical files (client files) that a client may send to the server in a single transaction.
TXNGROUPMAX is the number of files that are transferred as a group between a client and the server between transaction commit points. It is possible to affect the performance of client backup, archive, restore, and retrieve operations by using a larger value for the TXNGROUPMAX option. You can use the TXNGROUPMAX option to increase performance when Tivoli Storage Manager writes to tape. This performance can be considerable when a user transfers multiple small files. Either set the TXNGROUPMAX option by editing the dsmserv.opt file on the server, or use the setopt command. The value range is 4 - 65,000. The default is 256 objects. For more tips on performance tuning, refer to the IBM Tivoli Storage Manager Performance and Tuning Guide.
8-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
dsmerror.log
day 1
pruning
dsmerror.log
day 2
dsmerror.log
Place these options in the client option file: errorlogname errorlogretention errorlogmax
dsmerror.log
day 3 day 4
dsmerror.log
Unless you specify QUIET, messages will display on your screen during Tivoli Storage Manager processes.
day 5
25
ERRORLOGNAME: Use the ERRORLOGNAME option to specify the path and name of the file where you want Tivoli Storage Manager to store information about errors that occur during processing. ERRORLOGRETENTION: Use the ERRORLOGRETENTION option to specify the number of days to keep entries in the error log, and whether to save the pruned entries. The error log is pruned when the first error is written to the log after a Tivoli Storage Manager session is started and after every schedule is run. If the only Tivoli Storage Manager session you run is the scheduler, and you run it 24 hours a day, the error log might not be pruned according to your expectations. You must stop the session and restart it to allow the log to be pruned when the next error is written. It is suggested that you set your log to be kept for 7 days. ERRORLOGMAX: The ERRORLOGMAX option specifies the maximum size of the error log, in megabytes. If you change from ERRORLOGMAX to ERRORLOGRETENTION, all existing log entries are retained and the log is pruned using the ERRORLOGRETENTION criteria. If you change from ERRORLOGRETENTION to ERRORLOGMAX, all records in the existing log are copied to the pruned log, the existing log is emptied, and logging begins under the new log-wrapping criteria. If you change the value of the ERRORLOGMAX option, the existing log is extended or shortened to accommodate the new size. If the value is reduced, the oldest entries are deleted to reduce the file to the new size.
8-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
QUIET: The QUIET option prevents messages from displaying on your screen during Tivoli Storage Manager processing. For example, when you run either the incremental or selective backup command, Tivoli Storage Manager displays information about each file it backs up. Use the QUIET option to reduce the number of entries you have to look through. When you use the QUIET option, certain error information still displays on your screen, and messages are written to log files. If you do not specify QUIET, Tivoli Storage Manager uses the default option, VERBOSE. It is suggested that you set this to QUIET.
DSMSCHED.LOG
IBM Software Group | Tivoli software
DSMSCHED.LOG
When you run the schedule command as a service, output is directed to the dsmsched.log file, as well as the application event log. By default, the dsmsched.log file is in the current directory unless you change the path and file name using the SCHEDLOGNAME option. The amount of detail is determined by whether VERBOSE or QUIET is set in the dsm.opt file. After scheduled work is performed, check the schedule log for the following entry to verify that all work completed successfully:
26
To specify the number of days to keep log file entries in the schedule log, use the SCHEDLOGRETENTION option. This is covered in Unit 11.
8-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
EXclude *.doc INclude c:\TSM\...\*.doc EXclude c:\TSM\critproj1\*.doc Does rule 3 match the file?
Yes
C:\TSM\critproj2\user.doc (rule 2)
Yes
Yes
E:\TSM\data\base.doc (rule 1)
exclude
28
Use the flowchart to determine whether a file will be included or excluded from processing according to the include-exclude rules provided. The include-exclude process is a bottom up process in that the last include-exclude statement is checked first. When the file matches the statement, exclude processing ends for that file. The include-exclude list is generated in the configuration options file. The exclude list in the options file can be overridden by the include-exclude options on the command. The graphic shows an example.
8-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
project2
project3
The Tivoli Storage Manager backuparchive client builds an internal traverse tree before performing a backup. The EXCLUDE.DIR statement excludes a directory structure from the traverse tree. It prevents directories and directory attributes from being backed up. If you use the following EXCLUDE.DIR statement: EXCLude.dir c:\TSM\project2\subdir1 What will happen to the costs file? What will happen to the plans file? What will happen to the dates file?
29
subdir1
subdir2
costs
plans
dates
EXCLUDE.DIR Statement
EXCLUDE.DIR Excludes a directory structure from backup and from being traversed during incremental backup. EXCLUDE.FILE Can be abbreviated to EXCLUDE and excludes files from backup. A directory is traversed even if all the files from that directory are excluded. If a directory structure is excluded using EXCLUDE.DIR, subdirectories in the excluded directory tree are not eligible for backup. Any INCLUDE statement that includes part of an excluded directory structure is ignored at backup time.
8-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
In the previous example, the include statement for the /home/dir1/subdir1 and /home/ dir1/subdir2 directory is ignored when an incremental backup is performed. This is because the subdirectory has been excluded using an EXCLUDE.DIR statement.
dsmc> selective -subdir=yes /home/* dsmc> selective /home/dir1/subdir1/*
The first selective backup command backs up all files, except files in the excluded directory (home/dir1). This is because the EXCLUDE.DIR statement is honored for subdirectories. The second selective backup command backs up files in the /home/dir1/subdir1. This is an explicit backup of an excluded directory that overrides the EXCLUDE.DIR statement. What will happen to the costs file? (excluded) What will happen to the plans file? (included) What will happen to the dates file? (included)
8-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
COPMPRESSION: The compression option compresses files before you send them to the server. ENCRYPTION: You can encrypt the data that is sent to the server during a backup or archive operation using standard encryption. ADAPTIVRE SUBFILE BACKUP: Allows you to perform a backup over a network device with limited bandwidth, such as a modem. An adaptive subfile backup sends only changed portions of a file to the server during successive backup operations instead of sending the entire file. If you want to include specific files or groups of files for compression, encryption, and adaptive subfile backup processing during a backup or archive operation, you must set the compression option to yes to enable processing for: the following actions Compression Encryption Adaptive subfile backup processing
8-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
TSM server
You can assign a management class for a file or file group by using an INCLUDE statement in your client options file. For example, to associate all the files in the costs directory with a management class named project, you would enter: Include c:\tsm\project2\costs\* project
31
The include-exclude list allows you to establish files that are to be included in or excluded from backup processing. The include statement is used for two purposes. One is to specify exceptions to the exclude list. The other is to associate a management class with a file or group of files. The include statement is also used during archive to determine the management class, while the exclude statement is not checked during the archive processing. Unless you have the EXCLUDE.DIR statement, directory type files are always included in the backup, even when all the files within the directory are excluded. The include-exclude list uses metacharacters to select files to be included or excluded. Some metacharacters differ depending on the client platform. These metacharacters allow you to specify wildcard processing. The metacharacters can also be used in the command line to specify the file specification on most commands.
8-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Metacharacters
Function One and only one character matched as a wildcard Match any number of characters as a wildcard Windows: Match any directory UNIX: Match any directory
Some Examples of Metacharacters on Selected Platforms Objective Match one character Match n characters Match n directories Directory separator Open character class Character class range Close character class Literal escape Drive separator AIX ? * /... / [ ] \ none DOS ? * \... \ [ ] \ : HP ? * /... / [ ] \ : Win ? * \... \ [ ] \ : Mac ? * .... : [ ] \ : Lin ? * /... / [ ] \ : Sun ? * /... / [ ] \ :
8-37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Include-Exclude Wizard
IBM Software Group | Tivoli software
Include-Exclude Wizard
The wizard helps users create an includeexclude statement that is intuitive and easy to use. The exclude wizard window opens for already included files. The include wizard window opens for excluded files. The files section is disabled for Directory objects. The Preview the include-exclude statement check box should be selected to view excluded files.
32
8-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Exclude Include
33
You can include or exclude a file in the backup-archive tree, by selecting the file, then clicking the include or exclude button.
8-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Include-Exclude Exercise
IBM Software Group | Tivoli software
Include-Exclude Exercise
Domain: /usr/ /home/ 1. Exclude /home/admin/*.* 2. Exclude /home/nobody/.../* 3. Exclude /usr/lwp/* 4. Include /usr/lwp/resume.* STOP (when you make a match).
Included or Excluded? __________ /home/admin/bob.log __________ /home/admin/fileone __________ /home/nobody/data/file1.dat __________ /usr/lwp/resume.ibm __________ /usr/lwp/data/file1.dat
34
Determine if the files specified will be selected for backup based upon the include-exclude list provided. Remember, if it is not excluded, it is included.
8-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Perform the following steps to create a client option set and have the clients use the option set: 1. Create the client option set with the define cloptset command. The define cloptset command defines the option set name and description. The name can be up to 64 characters in length and should not include embedded blanks. The option set description can be up to 255 characters in length and should be enclosed in quotation marks if embedded blanks are used. To issue this command, the administrator needs to have system or unrestricted policy privilege. 2. Add client options to the option set with the define clientopt command. Once the option set has been defined to Tivoli Storage Manager, options and their values must be defined to the option set. This is done with the define clientopt command. The options set name, option name, and option value must be supplied. Optionally, either or both a sequence number and force value may be supplied.
8-41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3. Specify which clients should use the option set with the register node or update node command. Once a client option set and the client options have been defined, nodes may be associated with that set. This is done by using either the CLOPTSET option on the register node command for new nodes, or on the update node command for existing nodes. Clients can be attached to only one client option set, but client option sets can be used to centrally manage multiple clients.
8-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
second
plans
TSM server The server automatically assigns sequence numbers to the specified options, or you can choose to specify the sequence number for order of processing. For example: define clientopt prodbackup inclexcl include d:/plans seqnumber=20 define clientopt prodbackup inclexcl include c:/patents seqnumber=10
36
Sequence numbers identify the order for processing. Client option sets allow the administrator to specify additional options that may not be included in the option file (dsm.opt) for the client. You can specify which clients use the option set with the register node or update node commands. The client can use these defined options during a backup, archive, restore, or retrieve process. The options defined in a client option set are a subset of the available client options. Options such as communication method are still stored on the client machine. To allow the administrator to control these options centrally, it is possible to specify that individual options cannot be overridden in the client machine.
8-43
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The options are processed starting with the highest sequence number. Any include-exclude statements in the server client option set have priority over the include-exclude statements in the local client option sets. The server include-exclude statements are always enforced and placed at the bottom of the include-exclude list and evaluated before the client includeexclude statements. If the server option set has several include-exclude statements, the statements are processed starting with the highest sequence number. The client can use the query inclexcl command to view the include-exclude statements in the order in which they are processed. query inclexcl also displays the source of each include-exclude statement. Use double-digit numbers like 10 and 20, so that you have more space between sequence numbers to add in new statements.
TSM administrator
TSM server
The FORCE parameter allows an administrator to specify whether a client node can override an option value. The default is NO. If FORCE=YES, the client cannot override the value. The following example shows how to prevent a client from performing a subfile backup: define clientopt prodbackup subfilebackup no force=yes
37
The sequence number assigned to a client option is used when the same option is defined more than once. Options such as INCLUDE may be defined to a client option set many times and the sequence is crucial. The FORCE option is used to specify options that cannot be overridden by the local option file for the client. To stop an option being overridden by the client, it should be defined to the option set with FORCE=YES. The default is NO.
8-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Client option sets can be copied, queried, deleted, or updated using the copy, query, delete, and update cloptset commands. Individual client options within an option set can be deleted using the delete clientopt command. The sequence number of a client option may be changed using the update clientopt command. It is also possible to create a file that has include-exclude statements, and you can point a client to that file. This is convenient when you want to create one set of statements and point multiple clients at it.
8-45
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
39
Client options sets are defined in the server database and are used by the clients that you designate. 1. Select Policy Domains and Client Nodes in the Tivoli Storage Manager tree. 2. Click the Domain Name with which you want to work. The Domain Properties are displayed. 3. Click the triangle next to Option Sets to expand it. 4. Select Create an Option Set.
8-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
40
8-47
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Virus Scan Report: The GrindingHalt virus has been detected in Download_file.doc.
Download_file.doc
41
A good example of the reason a backed up file would need to be deleted is the removal of a file infected with a virus.
8-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
43
8-49
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Encryption
To ensure the security of the backed up data, the Tivoli Storage Manager client implements an encryption function, which allows for encrypting the data before sending it to the TSM server. Encryption helps secure backed up data during transmission. Once the data is stored on the Tivoli Storage Manager server, it is unreadable. The include.encrypt option is the only way to enable encryption on the client.
44
Encryption
Encryption enables the user to choose which files are subject to encryption with include-exclude processing. All files matching the pattern on the include.encrypt specification will be encrypted before the data is sent to the server. Encryption uses a very simple key management system, which means that the user either must remember the encryption key password during restore or store it locally on the client system. The encryption processing is the last task on the client system before the data is sent to the server; other client operations such as compression happen before encryption is done. Encryption works for backup as well as for archive.
8-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Encryption Considerations
Encryption is CPU-intensive. Because of the nature of the encryption process, it adds a lot of additional computing requirements on the client CPU. You should decide very carefully which data items really need to be encrypted and control them using the include-exclude statements. The administrator has the option to overwrite client selections using client options sets.
8-51
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Encryption Key
IBM Software Group | Tivoli software
Encryption Key
Place the encryptkey option in the client options file (dsm.opt or dsm.sys). There are three options for managing the key used to encrypt the files:
backup
archive
45
With the SAVE option, the encryption key password is saved in the Tivoli Storage Manager clients password file. A prompt is issued for the initial encryption key password. After the initial prompt, the encryption key password saved in the password file is used for backups and archives matching the include.encrypt specification. With the PROMPT option, you manage the encryption key password. You are prompted for the encryption key password when the Tivoli Storage Manager client begins a backup or archive operation. A prompt for the same key is issued when restoring or retrieving the encrypted file. With the GENERATE option, an encryption key password is dynamically generated when the Tivoli Storage Manager client begins a backup or archive. This generated key password is used for the backups of files matching the include.encrypt specification. The generated key password is kept on the Tivoli Storage Manager server in an encrypted form. The key password is returned to the Tivoli Storage Manager client for decryption during restore and retrieve operations.
8-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
46
Secure Sockets Layer is the standard technology for creating encrypted connections between servers and clients. SSL provides secure communications for servers and clients over open communications paths, through the use of digital certificates. Refer to the IBM Tivoli Storage Manager Administrators Guide for your platform for information on configuring SSL.
8-53
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Student Exercise
Student Exercise
47
Open your Student Exercises and perform the exercises for this unit.
8-54
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. The administrator defines a clientopt value in the central client option set. What is the default value for the FORCE option: yes or no? 2. True or False? There is more than one way to access and create or update a client option set. 3. True or False? The client include-exclude list is processed differently on different client platforms. 4. True or False? Before a user can request Tivoli Storage Manager services, the node must be registered with the server. 5. True or False? There is no default archive description. 6. True or False? The backup-archive client acts differently depending on the Tivoli Storage Manager server platform.
Review Answers
1. The administrator defines a clientopt value in the central client option set. What is the default value for the FORCE option: yes or no? no 2. True or False? There is more than one way to access and create or update a client option set. true 3. True or False? The client Include-Exclude list is processed differently on different client platforms. false 4. True or False? Before a user can request Tivoli Storage Manager services, the node must be registered with the server. true 5. True or False? There is no default archive description. false 6. True or False? The backup-archive client acts differently depending on the Tivoli Storage Manager server platform. false
8-56
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Identify the types of clients and how to invoke them. Register client nodes. Configure client access to the server. Control client access to the server. Set up client options. Use include-exclude to control client backup processing.
48
8-57
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-1
Introduction
The backup-archive client communicates with the server and invokes the client functions of Tivoli Storage Manager. The backup-archive client is supported on a variety of platforms that might reside on a user workstation or a LAN server. This unit describes the various methods available to back up, restore, archive, and retrieve data, and what options are available to customize these processes to fit your needs.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Describe and compare the kinds of backups possible. Use the Tivoli Storage Manager Backup-Archive Graphical User Interface to back up and restore files from a client. Use the command line to back up and restore files from a client. Use the Tivoli Storage Manager Backup-Archive Graphical User Interface to archive and retrieve client files.
9-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Types of Backups
Progressive or Incremental Backup Complete Date Only Without Journal Selective Backup (Always Backup) Journal-Based Backups Image Backup Logical Volume Backup Subfile Backup NAS File System Backup Backup Sets
IBM Tivoli Storage Manager uses by default the intelligent Progressive or Incremental backup strategy. Only files that have changed or that are new are backed up, reducing the amount of data transfer on your network and system. Progressive backup does away with the need to do resource intensive nightly full backups, and gives you faster restores because it only needs to restore the version of the file requested. Progressive backup needs to back up less data, thus saving network bandwidth, tapes, and management overhead. Selective backups are backups of files specified by the user. The files are backed up regardless of whether or not the file has changed. This is a full backup. Journal-based Windows backups improve performance of Incremental and Selective backups by utilizing the journal engine service to note the changed files, rather than file scanning.
9-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Image backups are full volume backups for Windows clients, which uses the snapshot function of Tivoli Storage Manager. Logical volume backups are used to improve restoration performance. Periodically, the logical volume is backed up, before the scheduled daily incremental backups. If a logical volume needs to be restored, the logical volume backup is restored first, followed by the subsequent incrementals. With subfile backup, the Windows backup-archive client dynamically determines the most efficient approach for creating backup copies to improve backup performance over dial-up connections. Backups are either performed by changed bytes, changed blocks, or changed files. Network attached storage (NAS) filesystem backups are enabled through the support of Network Data Management Protocol (NDMP). Tivoli Storage Manager Windows, AIX, and Solaris servers can efficiently back up and restore network attached storage (NAS) file system images to automated tape drives or libraries that are attached to Network Appliance and EMC Celerra NAS file servers. NDMP support is available only on IBM Tivoli Storage Manager Extended Edition. Backup sets are portable, self-contained copies of backups, which can result in a rapid recovery without the TSM server or network availability. Backup sets are created by an administrator. Note: With UNIX symbolic links, only the path information that the symbolic link contains is backed up. For more information on logical volume, subfile, image and NAS filesystem backups, refer to your IBM Tivoli Storage Manager Administrators Guide.
9-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Journal-based backup is supported on all Windows clients. If you install the journal engine service and it is running, then by default the incremental command will automatically perform a journal-based backup on selected file systems that are being monitored by the journal engine service. IBM Tivoli Storage Manager does not use the journaling facility inherent in Windows NTFS file systems or any other journaled file system. In order to successfully perform a journal-based backup, several conditions must be met, which include: The journal service must be set up to monitor the file system that contains the files and directories being backed up. A full incremental backup has to have been run successfully at least once on the file system being backed up. The file space image of the file system at the server must not have been modified by an administrative command since the last full incremental backup.
The storage management policy for the files being backed up must not have been updated since the last full incremental backup.
9-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Apr. 6
file modified Apr. 4
Apr. 7
Apr. 5
C
Apr. 6
D
Apr. 7
D A D A D
A,B,C
A,B,C
A,B,C
A,B,C
A,B,C,D
B,C,D A
9-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Although the creation of backup sets is not a client function, they are an important feature of backups. Using the most recent backup versions stored on the server, a Tivoli Storage Manager administrator can generate a complete set of client files (backup set). These backup sets can be used to retain a copy of client files for a longer period of time (Instant Archive) or for recovery of a client system, without server or network, when the backup set is copied onto portable media and restored locally (Rapid Recovery). The generate backupset command runs as a background process on the server. The restore backupset command restores a backup set from the server, a local file, or a local tape device.
9-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
System, policy or owner authority required. Carefully consider the FORMAT parameter defined in the device class. Sequential media must be readable on the local drive of the client machine. Device class maps a tape device common with client. Unique description for easy management. Retention option to define the backup set expiration. Backup set volumes tracked in volume history file. Command line only for file level restore.
9-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Backup sets allow a point-in-time to be specified (default is TODAY, NOW). Files that were active at a specified date and time are included in backup sets. In-progress backups do not affect selection of files.
Backup sets cannot include deleted or expired files. Backup set date and time is PITDATE and PITTIME. If PITDATE is specified, the default PITTIME is midnight.
9-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10
11
9-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12
9-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4 3
Click the box to the left of the directory to select all files in a directory for backup.
Click the folder next to the directory to see the list of files selected for backup.
13
From the Windows system command line, type dsm to start the GUI. From a UNIX system command line, type dsmj to start the GUI. To access the Web client, use port 1581 and a supported Web browser. 1. Select Backup from the GUI main window. 2. Expand directory tree to see folders and files. 3. Select objects to back up. 4. Select the type of backup from Select Action menu: Incremental (complete) Incremental (date only) Always Backup Incremental (without journal)
5. Click Backup.
9-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Take a moment to look over the backup-archive GUI directory tree. You will see that your local files, network files, RAW volumes, removable objects, and system objects are represented in the tree. The selection box next to a branch can have the following states: Not selected (empty) Partially selected (partially filled) Implicitly selected (filled) Fully selected (checked)
9-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14
While the backup is running, this window will be displayed, which shows the progress of your backup. When it is finished, the window will show the results of the backup.
9-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
From the backup menu select Edit > Find and you get the screen shown. Fill in your criteria and click Search. You get a separate screen with files that fit your criteria.
15
Click the button at the top of the screen that looks like a flashlight or select Edit > Find to start the Find function. Notice the names of the files in the TSM directory. The Find function filters or searches for files stored locally on a client's disk or for files on the TSM server. Invoking the Find function starts a window to filter files or search for files matching certain criteria. The files matching the filter of find criteria can then be selected to perform a Tivoli Storage Manager action (back up, archive, retrieve, restore, or delete archive file). The Find Function is case sensitive.
9-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Results of a Filter
IBM Software Group | Tivoli software
Results of a Filter
16
When you select names that start with the letter T and then click the Filter button instead of Find, the file names listed from the TSM directory will include just the file names that begin with the letter T. So, Find Files gives you another window from which you can select files, and Filter modifies the files displayed in the backup window.
9-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17
Selecting files when performing a selective backup is the same as with the incremental back-up. The Find Files and Filter options can also be used with the selective backup just as with the incremental backup.
9-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18
Select the Delete option from the menu. You can delete active objects, inactive objects, or all objects. Select a folder of files that have been previously backed up from the directory tree on the left. The items will appear in the right pane. In the right pane, select the backup object to be deleted, and click the Delete button.
9-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Restore Overview
Restore is the process of copying a backup version of a file from the Tivoli Storage Manager server to the client system over the specified communication method.
Users must request to restore their own files. Users can restore the files of others as authorized. Tivoli Storage Manager server sends a copy of file to client, but the backup remains on the server. The user is able to restore backed up files to a specific point in time. Users can do restores through the GUI, client command line, or through a schedule. A user can restore files to a location other than where they were backed up.
19
If a file is damaged, the user (Tivoli Storage Manager client) can request that the system restore the current or a specific backup version without the aid of an administrator. A user may only restore files that he or she has backed up unless he or she has been granted authority to the backup files of another person. When a user restores a backup version of a file, Tivoli Storage Manager sends a copy of the file to the client node. The backup version remains in the Tivoli Storage Manager server. If more than one backup version exists, a user can restore the active backup version of the file or any inactive backup versions.
9-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20
The restore GUI queries the TSM server for a list of files that have been backed up and presents them in the same format as the backup GUI. Simply select the files you want to restore. You can also use the Find function to select files. The Find function gives you the same options as those for doing a backup but will look for backed up files on the TSM server from which to select for restoring.
9-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
21
In order to restore a specific version of a file, you must select View and display. When the screen shown is presented, select Original location. The preserve path options are covered later in this unit.
9-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1. Select a file to restore and click Options. 2. Select Replace from the menu, and click OK, and Restore.
22
The Modify restore and collision options panel offers several choices for your restore process. Choosing All selected files and directories recovers both files and directories. Choosing Files only recovers files only. Choosing Directories only recovers directories only.
You can also specify what actions to take on files that already exist. You can even specify how to restore for image by choosing image only, or image plus incremental directories and files. The options you specify are effective during the current client operation, but they are not saved for the next operation.
9-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Point-in-Time Restore
IBM Software Group | Tivoli software
Point-in-Time Restore
A Point-in-time Restore restores files to a past state that existed at a specific date and time, as opposed to the current state of the last backup. Options for GUI and command-line point-in-time restores:
File space, directory, or file level restore GUI window PITTIME hh:mm:ss PITDATE mm/dd/yyyy NLS enabled
Frequency determines point-in-time resolution for deleted files Fault tolerant restore Restartable restore Backup retention period Number of backup versions kept
23
Tivoli Storage Manager uses a point-in-time (PIT) restore to restore a file space, directory, or file to the version equal to or before the point in time. Incremental backups are necessary to capture the fact that files have been deleted. Support for PIT restore is essential to be able to recover a file space or directory to a time when it was known to be in a good or consistent state. For example, a PIT restore can eliminate the effect of data corruption or recover a configuration to a prior date or time. When a PIT restore is performed, new files that have been created on the client after the PIT date are not deleted. Point-in-time restores that do include deleted files are possible when incremental backups are run on the client because the server is only notified about files that are deleted from a client file space during an incremental backup. Incremental backups should run frequently enough to provide the necessary point-in-time resolution. Files that have been deleted from a client file space between two incremental backups might be restored during a point-intime restore.
9-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The first time you expand the Local folder to restore a backup set, this task box is displayed.
24
To find the volume name of the backup set, issue the following command:
q backupset f=d
9-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Restartable Restores
IBM Software Group | Tivoli software
Restartable Restores
Resumes at point of interruption New restore states Active Restartable Restarts on transaction boundary
Restore failure
Point of restart
Restore progress
25
If an error occurs in the middle of a restore, the user can start another restore specifying the same source and destination. If the restore is started within the restart period allowed, the restore will start from where it left off. If a restore is restarted, some files may be restored again depending on how much of the Tivoli Storage Manager transaction was complete when the error occurred. A restarted restore starts at a transaction boundary as defined by the TSM client and server options TXNGROUPMAX and TXNBYTELIMIT.
9-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Restart not performed when canceled by administrator. Client cannot restart the restore. Restart not performed when canceled by administrator. Client can restart the restore.
cancel sessions
(administrative command)
26
The backup archive GUI and command-line support restartable restores. The backup archive GUI contains a menu option to restart a restartable restore.The query restore command, reports active restores with the associated session number. Restartable restores are reported with negative session numbers, which makes them easier to identify. Query restore: Lists the active and restartable sessions. Restart restore: Restarts a restartable restore session. The user is presented a list of restartable restore sessions by number. Cancel restore: Cancels a restartable restore session and removes it from the list by asking the user which session to cancel.
9-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Restore sessions can also be canceled in the normal manner by an administrator using the cancel session command. Doing this stops the session but leaves a restartable restore session. When a restartable restore session is canceled using the cancel session administrative command, the client node can restart the restartable restore session using the restart command. When a restartable restore session is canceled using the cancel restore administrative command, the client node cannot restart the session.
Cancel session
Cancel restore
To ensure a consistent restore, the client file space that is restored during a restartable restore is locked when a restartable restore is in running state. All Tivoli Storage Manager move operations for sequential media containing files from the node or file space are prevented. TSM client backups that affect data being restored are also prevented.
9-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
27
The server option, RESTOREINTERVAL, sets the length of time restartable restore sessions are held in the restartable state. Information regarding the status of the restore is kept in the Tivoli Storage Manager database. The default is to keep the restartable restore session information for 24 hours. RESTOREINTERVAL is defined in the server options file (DSMSERV.OPT) and can be changed dynamically. The restartable restore state is removed from the Tivoli Storage Manager database following a successful restore or when the restore is canceled by either the client or a Tivoli Storage Manager administrator. The restartable restore state is also removed by some TSM server processes after the RESTOREINTERVAL has elapsed. Server data movement operations such as migration, reclamation, and move data commands remove the restartable restore state from the Tivoli Storage Manager database when they run. The restore state is also removed during the expiration process. Expiration process is when files are identified for deletion because their expiration date or retention period has passed.
9-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
Change directories to the backup-archive client and type dsmc to start the command line. C:\Program Files\Tivoli\TSM\baclient>dsmc Or navigate to the backup-archive command line. Syntax for command line: dsmc action keyword option=value filespec
28
The backup-archive command line offers more options to back up and restore data. There is also more than one method to invoke the same command line. Options available to this command include: DOMAIN PASSWORD COMPRESSION QUIET/VERBOSE
For other options, refer to the IBM Tivoli Storage manager Administrators Guide for your platform.
9-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
All options on the command line override the options specified in the configuration options file, except the domain option which adds to the options file domain option. The file specification filename parameter is different than the -DOMAIN= option in that this parameter will override the domain option in the configuration options file.
29
When you run an incremental backup on the command line, you see a breakdown of the results from start to finish.
9-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
30
The selective command backs up files that you specify. If these files become damaged or lost, you can replace them with backup versions from the server. When you run a selective backup, all the files are candidates for backup unless you exclude them from backup, or if they do not meet management class requirements for serialization.
9-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
31
The query filespace command displays a list of file spaces in Tivoli Storage Manager storage. You can also specify a single file space name to query.
9-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
d:\project\*.*
To delete all files backed up from the /usr/lab/project directory with a file extension of .txt, issue the following command:
Linux: To delete all files backed up from the /opt/lab/project directory with a file extension of .txt, issue the following command:
delete backup "/opt/lab/project/*.txt"
To select files to delete, that were backed up from the /opt/lab/project directory, issue the command with the pick option:
delete backup pick /opt/lab/project/*"
9-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
data
temp
projects
lab.p
pt
tech.doc
tech.xls
33
The default restore method is the no query method, unless inactive, pick, latest, fromdate, and todate are specified, or it is a restore of NetWare NDS. To force the use of classic restore, use ?* in the source file specification rather than *. For example:
c:\projects\2007\?* or /home/projects/2007/?*
9-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
data
temp
projects
tech .doc
tech.xls
lab.ppt
34
Use the PICK option to list active and inactive backups stored on the server. It can be used to choose a backup version that is older than the most recent backup. Use the INACTIVE option to instruct Tivoli Storage Manager to restore an inactive backup if an active one is not available.
9-37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
data
temp
projects
tech.doc
tech2.doc
tech.xls
lab.ppt
35
9-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
data
temp
projects
tech.doc
tech.xls
36
9-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
The PRESERVEPATH restore option is available with the backup-archive command line. This option allows users to specify how directory structures are handled when performing restore to a new location. It creates the lowest-level source directory as a subdirectory of the target directory. Files from the source directory are stored in the new subdirectory. The PRESERVEPATH restore option can be specified with one of the following options: Partial or subtree: Creates the lowest-level source directory as a subdirectory of the target directory. Files from the source directory are stored in the new subdirectory. Subtree is the default. Complete: Restores the entire path, starting from the root, into the specified directory. The entire path includes all the directories except the file space name. Nobase: Restores the contents of the source directory without the lowest-level, or base directory, into the specified destination directory. None: Restores all selected source files to the target directory. No part of the source path at or above the source directory is reproduced at the target. If you specify subdir=yes, Tivoli Storage Manager restores all files in the source directories to the single target directory.
9-40
directories to restore
37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
C:
data
temp
projects
tech.xls
lab.ppt
38
Use the IFNEWER option to instruct Tivoli Storage Manager to replace an existing file with the backup if the backup is newer than the existing file.
9-41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
data
temp
projects
tech.xls
lab.ppt
39
The TODATE and TOTIME or FROMDATE and FROMTIME options specify a date and time range for restore processing. TODATE: Use the TODATE option to specify the latest date of files to be listed. TSM does not list files backed up after the specified date. Use this option with the FROMDATE option to list files backed up between the from date and the to date. TOTIME: Use the TOTIME and TODATE with FROMTIME and FROMDATE to request a list of files that were backed up within a window of time. You cannot use the no query method with the todate option.
9-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Backup and Restore with the Command Line
40
Open your Student Exercises and perform the exercises for the preceding lessons.
9-43
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Retrieve copies archived files from the storage pool to the client node for use. The retrieve operation does not affect the archive copy in the storage pool.
41
Archiving is used to preserve files for later use or for records. Archiving can be used to request Tivoli Storage Manager to copy files, subdirectories, and directories for long-term storage on media controlled by Tivoli Storage Manager. When users archive files, they can choose to have Tivoli Storage Manager erase the original files from their workstation after the files are archived. Do so with caution. Tivoli Storage Manager uses archive packages to identify groups of archived files. Tivoli Storage Manager retrieves the directories first, and then adds the files to the directories. Archived copies can be retrieved from the directory tree. Filters can be used to identify copies from the directory tree.
Copyright IBM Corp. 2008
9-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Authorized users can retrieve archive copies of files owned by someone else. For UNIX symbolic links, the file to which the symbolic link points can be archived, but under the name of the symbolic link.
9-45
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
This is the Archive and Retrieve section of the Tivoli Storage Manager GUI. Click the Archive button, and TSM will begin preparations for use.
42
The archive GUI presents a list of files in the same format as seen in the backup GUI. Select the files you want to archive and click the Archive button. You can also use the Find function to select files. The Find function gives you the same options as those for performing a backup.
9-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
43
The first time you select the Archive button on the main menu, these two messages will be displayed. For the first message click Yes, and for the second message, click OK. These messages will not appear again.
9-47
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Archiving Files
You can archive multiple files, directories, or subdirectories together. Archiving is processed differently from backup in that a copy is stored on the server regardless of change status or frequency of backup. Files can be grouped by description for easy retrieval. Archives can trigger the deletion of the original file or can just make a copy of the original file. You can add a descriptive tag onto a file for easy retrieval. A separate copy group is used for archive and backup so that each management class can handle the differences between backup and archive.
Archiving Files
The archive function allows you to group important files by an associated description to archive and later retrieve.
44
9-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Archive Descriptions
IBM Software Group | Tivoli software
Archive Descriptions
Archive descriptions are added to expedite the retrieval of files by ensuring the correct file is found. An archive description is a 255-character text field that identifies archived files and directories.
If you do not enter a description, Tivoli Storage Manager assigns the following default archive description: Archive Date: mm/dd/yyyy (where mm/dd/yyyy is the current date)
45
When files are archived using the backup-archive client, an archive description is required. The archive description is a 255-byte text field that can contain information relevant to the files and directories archived. TSM stores the archive descriptions in a new format internally in the TSM database. An initial conversion process occurs when you starts a GUI archive function. This conversion process can be long running if you own a large number of archived files. The conversion process can be canceled and restarted at a later time.
Archive Descriptions
The archive description can be used to locate and identify files and directories without the knowledge of the physical client file spaces from which they were archived.
9-49
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Archive Packages
IBM Software Group | Tivoli software
Archive Packages
Archived files with common description Archive or retrieve
Archive or retrieve complete package. Retrieve individual files in package. Add files to existing package. Delete files from package.
New package
Created using unique archive description. Default description
Archive Date: mm/dd/yyyy
An archive package is a set of files and directories archived with a common, unique archive description. All files archived require a description. Specifying a unique archive description creates a new package. Archive packages can be encrytped and use password management. Note: Remember, passwords may change for each archive and can potentially be required for up to 30 years.
9-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Use the filter option to select files that match a pattern. 1. Select Delete files after Archive. 2. Click OK.
2
47
In the Archive Options window you can: Compress or compress always Have TSM delete the files from your workstation after they are successfully archived Choose to override the include list Select the management class you want for this file
9-51
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The option you specify is effective during the current client operation, but it is not saved for the next operation. Select Override include-exclude list to override the management classes associated with objects using the include-exclude list.
When you retrieve a file, TSM sends a copy of the file to the client node. The archived file remains on the TSM server. Tivoli Storage Manager retrieves the directories first, then adds the files to the directories. Archive copies can be retrieved from the directory tree. Authorized users can retrieve archive copies of files owned by someone else.
48
9-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Retrieving Files
IBM Software Group | Tivoli software
Retrieving Files
The retrieve function allows you to copy an archived file from the storage pool back to your system.
49
9-53
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2 1
Once you select Retrieve panel: from the main
1. Expand the tree to find archive files to retrieve. 2. Select the files. 3. Click the Retrieve button.
50
The retrieve GUI looks just like the restore GUI. Expand the directory tree where it shows client node name and observe the differences that archive packages introduced. The retrieve Find function works similarly to the restore Find function. You can select files based upon modified, accessed, or archived dates. If you click the set button on the Archived line you will be able to specify various options for archived dates.
Note: For more information on retrieve, see the appropriate reference manual for your platform. The retrieve window shows objects that you have previously archived to the server. You can use this window to select objects that you want to retrieve. You can also run an estimate for the retrieve or change processing options.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
51
The modify retrieve and collision options screen allows you to specify what objects to retrieve and what actions to take for files that already exist.
9-55
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
dsmc archive
52
The archive command archives a single file, selected files, or all files in a directory and its subdirectories on a TSM server. Directories are archived. You can archive files that you want to keep in their present condition. To release storage space on your workstation, delete files as you archive them. Retrieve the archived files to your workstation whenever you need them again.
The options available for Archive are: ARCHMC: Use the ARCHMC option to name the available management class in the active policy set of your policy domain. DELETEFILES: Use the DELETEFILES option to delete archived files from your workstation after they are stored on the server.
9-56
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
DESCRIPTION: Use the DESCRIPTION option to assign a description to a file when you archive it. If you do not remember the name of an archived file, you can use the DESCRIPTION option to retrieve the file. DIRSONLY: Use the DIRSONLY option to back up and restore only directories. FILESONLY: Use the FILESONLY option to back up and restore only files.
When you archive a symbolic link, TSM archives the file to which the symbolic link points. It does not archive path information for the directory. If you archive a symbolic link that points to a directory, TSM archives the files contained in the directory (and its subdirectories if the SUBDIR option is set to yes) under the name of the symbolic link. You can use the retrieve command to retrieve files.
dsmc retrieve
53
Indicate the file you want to retrieve and a destination. If you do not indicate a destination, the files are retrieved to their original location.
9-57
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Command Options for Backup, Archive, Restore, and Retrieve
FROMTIME: Use the FROMTIME option with the FROMDATE and TOTIME option to specify a beginning time or a window of time. TODATE: Use the TODATE option to specify the latest date of files to be listed. TSM does not list files backed up or archived after the specified date. Use this option with the FROMDATE option to list files backed up or archived between the from date and the to date. TOTIME: Use the TOTIME and TODATE with FROMTIME and FROMDATE to request a list of files that were backed up or archived within a window of time. For example, you could request files that were backed up or archived between 6:00 a.m. on June 1, 2002, and 11:59 p.m. on June 30, 2002. FROMNODE: Use the FROMNODE option to see a list of file space names on another node on whose behalf you can restore or retrieve files. FROMOWNER: Use the FROMOWNER option to specify an alternative owner from which to restore files. The owner must grant access to use the files.
9-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Command Options for Backup, Archive, Restore, and Retrieve
PICK: Use the PICK option to display a list of backed up or archived files that match the file specification you enter. From the list, you can select the versions to restore. VIRTUALNODENAME: The VIRTUALNODENAME option specifies the node name of your workstation when you want to restore or retrieve files to a different workstation. SUBDIR: The SUBDIR option specifies whether you want to include subdirectories of named directories for processing on the following commands: archive delete archive delete backup incremental query archive query backup restore restore backupset retrieve selective
9-59
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 9: Backup-Archive Client Functions Command Options for Backup, Archive, Restore, and Retrieve
DIRSONLY When this option is specified, only the directories and their attributes are archived or retrieved.
FILESONLY When this command-line option is specified, only the files and their attributes are archived or retrieved. The default is to archive or retrieve both directories and files.
55
Directories that are archived use the same archive description as the files with which they are archived.
9-60
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
56
From your local workstation, you can back up one or more volumes as a single object (image backup) on your system. These volumes can be formatted FAT, FAT32, NTFS, or unformatted RAW volumes. If a volume is NTFS-formatted, only those blocks used by the file system will be backed up. You cannot restore single files from an image backup, only a full image restore. Image backup is visible only if the image plug-in is installed. Example of an option file entry for image backups: INCLUDE.IMAGE C: IMAGETYPE=SNAPSHOT SNAPSHOTFSIDLERETRIES=50 SNAPSHOTFSIDLEWAIT=1S,100MS SNAPSHOTCACHELOCATION=D:\: include.fs D: fileleveltype=dynamic DOMAIN.IMAGE C:
9-61
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
57
A snapshot image backup performs an online image backup of a volume in which the volume remains active and available for read and write operations during the backup. This function is available only if the Tivoli Storage Manager Logical Volume Snapshot Agent is installed and available. You cannot do an image backup of the system drive or the volume containing the snapshot cache. Put the snapshotproviderfs option in dsm.opt to enable snapshot-based file backup and archive operations, and to specify a snapshot provider. Use the snapshotproviderimage option to enable snapshot-based online image backup, and to specify a snapshot provider. Providers include Volume Shadowcopy Service (VSS) and Logical Volume Snapshot Agent (LVSA). VSS is not supported on Windows XP. If you use VSS, you do not need to install LVSA.
9-62
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
If you do not have the LVSA installed, Tivoli Storage Manager attempts to back up open files. Some files are open exclusively for the application that opened them. If Tivoli Storage Manager encounters such a file, it cannot read it for backup purposes. If you are aware of such file types in your environment, you should exclude them from backup to avoid seeing error messages in the log file.
58
You can perform incremental-by-date of last image backup regardless of whether the full image was backed up using offline or online image backup. Use the image backup in combination with the regular incremental backups to make restore easier.
9-63
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Corruption of the backup may occur if applications write to the volume while the backup is in progress.
59
Command-line syntax:
dynamicimage=<value>
Values: Yes: Use this option only if the volume cannot be unmounted and remounted as read-only. Tivoli Storage Manager backs up the volume as is without remounting it as read-only. Corruption of the backup can occur if applications write to the volume while the backup is in progress. In this case, run fsck after a restore and manually mount the file system in order to regain access to the volume. This option is valid for AIX, Solaris, HP-UX and all Linux clients. No: Use this option if you do not want to perform a dynamic image backup. This is the default. The default behavior depends on the platform and file system type. For platforms and file systems that support snapshot, namely AIX JFS2 file systems and LINUX LVM file systems, the default is snapshot-based image backup. For all other UNIX platforms and file systems, the default is static image backup.
9-64
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Types of images: Dynamic: Specifies that you want to perform an image backup if the volume cannot be unmounted and remounted as read-only. Tivoli Storage Manager backs up the volume as is without remounting it as read-only. Static: Performs an image backup during which the volume is unmounted and remounted read-only. This is the default for AIX, HP-UX, and Solaris. Valid for AIX, Solaris, HP-UX, Linux86, Linux IA64, Linux pSeries, Linux iSeries, and Linux zSeries. Snapshot: Specifies that you want to perform a snapshot image backup during which the volume is available to other system applications. This is the default for file systems residing on a logical volume created by the Linux Logical Volume Manager. Valid for AIX 5.3 and greater JFS2 file systems, Linux86 and Linux IA64 clients only.
9-65
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
You must be a root user to perform a snapshot-based file backup or archive operation.
For Linux86 and Linux IA64: By default, Tivoli Storage Manager performs a snapshot image backup of file systems residing on a logical volume created by the Linux Logical Volume Manager, during which the volume is available to other system applications.
60
9-66
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Subfile Backup
IBM Software Group | Tivoli software
Subfile Backups
Backups
file on client day 1 day 2 day 3 day 4 backed up object base file delta file 1 delta file 2 delta file 3
Restore +
base file Delta file 3
=
restored file on client
61
backed up objects
Sometimes, if communication lines are slow or unreliable, you will want to send the minimal amount of data over the communication line. With the subfile backup feature you can back up only the changed portion of a file instead of transferring the whole file to the server every time. Only the changed portion of the file is backed up relative to the last complete backup of the file. A full backup is the base or reference file. The changed portion is called a delta file. All changes since the last complete backup of the file are included in this delta file. As you can see in the graphic, on the first day the file is created and backed up. On day two a change is made and only the changed portion is backed up. On the third day another change is made, so now the two changes are combined and backed up as one file. The same with the third day. All three changes are combined and saved as one delta file. In the case of a restore, this allows for the restore of the whole file by restoring only two subfile components, one delta file containing all three changes and the last complete backup of the base file. The adaptive subfile backup, as well as the restore of a base and delta file, is a background process. All necessary file data separations or reconstructions happen in the background on the backup-archive client. All other TSM features, such as policy management or faulttolerant backup and restore, still fully apply. Adaptive subfile backups can be used with incremental and selective backups and will work together with client data compression and encryption.
Copyright IBM Corp. 2008 IBM Tivoli Storage Manager 5.5 Implementation and Administration
9-67
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Subfile backup technology is not used for very small files (less than 1 KB in size) or for very large files (greater than 2 GB). If the delta file size exceeds 60 percent of the base file, a new base file will be transferred.
data
62
When backing up NAS files systems, the Tivoli Storage Manager server uses Network Data Management Protocol, or NDMP, to connect to the NAS file server to initiate, to control, and to monitor a file system backup or restore operation. Since TSM is using NDMP on the NAS file server, the NAS file servers are essentially backup-ready. With this feature of TSM, you can back up to storage devices without moving the data over the LAN. The storage devices have to be under the direct control of the NAS file server, which means that they have to be directly attached or connected through a supported SAN environment. An NDMP backup is usually an image backup because the NAS filer performs the backup as an entity without telling TSM about the content. So the TSM server administers only one image object that has been backed up. Additionally, TSM can create a table of contents (TOC) during backup and store the TOC afterwards in a dedicated storage pool. The TOC enables TSM to restore a single file from a NAS backup image. Each time a single file restore from an NAS image backup is performed, IBM Tivoli Storage Manager will load the TOC from the dedicated storage pool into a temporary database table. You are able to
9-68
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
configure how long the TOC is stored in the temporary table. Even without the TOC you are able to restore single files from a NAS backup image. In that special case exact information about the single file and the image it resides in must be provided for restore. Although an NDMP backup is usually started and controlled by a TSM server, a TSM Web client is also able to initiate and control an NDMP backup or restore. NDMP support is available only on IBM Tivoli Storage Manager Extended Edition.
9-69
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
63
Open your Student Exercises and perform the exercises for the preceding lessons.
9-70
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. Which type of backup performs an online Windows 2000 image backup of a volume in which the volume remains active and available for read and write operations during the backup? 2. Use a(n) _______________ backup when you want to back up specific files or directories regardless of whether a current copy of those files exists on the server. 3. In order to successfully perform a journal-based backup, ____________ must be set up to monitor the file system that contains the files and directories being backed up. 4. Use the ____________ option on the command line with the dsmc restore command to list active and inactive backups stored on the server. This option is used to choose a backup version that is older than the most recent backup. 5. Use the ____________ option on the command line dsmc restore to instruct Tivoli Storage Manager to replace an existing file with the backup if the backup is newer than the existing file.
Review Answers
1. Which type of backup performs an online Windows 2000 image backup of a volume in which the volume remains active and available for read and write operations during the backup? Snapshot Image Backup 2. Use a(n) _______________ backup when you want to back up specific files or directories regardless of whether a current copy of those files exists on the server. Always (Selective) 3. In order to successfully perform a journal-based backup, ____________ must be set up to monitor the file system that contains the files and directories being backed up. the journal engine service 4. Use the ____________ option on the command line with the dsmc restore command to list active and inactive backups stored on the server. This option is used to choose a backup version that is older than the most recent backup. PICK 5. Use the ____________ option on the command line dsmc restore to instruct Tivoli Storage Manager to replace an existing file with the backup if the backup is newer than the existing file. IFNEWER
9-72
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Describe and compare the kinds of backups possible. Use the Tivoli Storage Manager Backup-Archive Graphical User Interface to back up and restore files from a client. Use the command line to back up and restore files from a client. Use the Tivoli Storage Manager Backup-Archive Graphical User Interface to archive and retrieve client files.
64
9-73
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9-74
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10-1
Introduction
This unit covers backing up and recovering the Tivoli Storage Manager database, recovery log, and storage pools.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Back up the IBM Tivoli Storage Manager database. Recover the IBM Tivoli Storage Manager database. Back up the storage pools. Recover the storage pools.
10-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Database and Storage Pool Protection Requirements
Lesson 1: Tivoli Storage Manager Database and Storage Pool Protection Requirements
IBM Software Group | Tivoli software
10-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Database and Storage Pool Protection Requirements
Creates Disaster Recovery Plan file Manages off-site media Maintains client information Centralizes the disaster recovery process Provides scripts to automate recovery Provides electronic vaulting of backups
Disaster Recovery Manager is a function within IBM Tivoli Storage Manager Extended Edition that assists you in preparing a disaster recovery plan. You can use the plan as a guide for disaster recovery and for auditing purposes to certify IBM Tivoli Storage Manager servers ability to recover. The following functions are provided: Generates a Disaster Recovery Plan file Handles off-site recovery media Maintains client recovery information in the IBM Tivoli Storage Manager server database Centralizes the management of the disaster recovery process Provides scripts to automate recovery Provides electronic vaulting of storage pool and database backups
IBM Tivoli Storage Manager Extended Edition must be installed and licensed before you can use IBM Tivoli Disaster Recovery Manager (DRM). Server-to-server communication, included in TSM Extended Edition, allows the use of a remote server for electronic vaulting.
10-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Database and Storage Pool Protection Requirements
For more information on Disaster Recovery Manager, refer to the curriculum roadmap for scheduling and enrollment in: IBM Tivoli Storage Manager Extended Edition 5.5 Disaster Recovery
5
With DRM you can create a Disaster Recovery Plan file to help you restore your Tivoli Storage Manager server. After storage pool and database backups, the backup volumes and the Plan are sent off-site. Every time you run the prepare command, a new Recovery Plan file is created. This function has also been added to the Administration Center. The Recovery Plan file contains the following stanzas that make up the Plan: Instructions that you define (for example: contact names and telephone numbers) The recovery procedure A list of required database and storage pool backup volumes and their location Types of devices that are required to read the volumes Database and recovery log space requirements Copies of the server options file Device configuration and volume history information Commands for performing database recovery, primary storage pool recovery, and registering licenses Machine and recovery media information that you define
10-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Database and Storage Pool Protection Requirements
10-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
Tivoli Storage Manager can perform full plus incremental backups of the database to tape while the server is running and available to clients. With the Tivoli Storage Manager recovery log in normal mode, the backup media can then be stored on-site or off-site and can be used to recover the database up to the point of the backup. You can run full or incremental backups as often as needed to ensure that the database can be restored to an acceptable point in time. You can provide even more complete protection if you specify that Tivoli Storage Manager run roll-forward mode. With Tivoli Storage Manager in roll-forward mode and with an intact recovery log, you can recover the database up to its most current status.
10-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
For backups, an administrator can weigh the trade-offs between running full backups and running incremental backups. A full backup takes longer to run than an incremental because it copies the entire database. However, recovery time is faster with a full backup because only one set of volumes needs to be loaded to restore the entire database. A full backup is required under specific conditions, but an administrator can choose to run as many as 32 incremental backups between each full backup. An incremental backup takes less time to run because it copies only those database pages that have changed since the last time the database was backed up. However, incremental backups increase the time it takes to recover a database because a regular backup must be loaded first, followed by some or all of the incremental backups in the same database backup series.
10-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
A snapshot backup is a full backup that does not interrupt the full plus incremental backup series. It is also referred to as an out-of-band database backup. This backup can be stored off-site for disaster recovery purposes. A database snapshot backup is tracked by the volume history and can be used for a restore of the Tivoli Storage Manager database to the point in time when the snapshot was performed. A database snapshot backup does not empty the recovery log.
10-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
10
Parameter
Description Specifies the name of the sequential access device class to use for the backup. Be sure that you have used the DEVCONFIG option in the DSMSERV.OPT file to specify an external file in which to store a backup copy of device class definitions. If you do not have this file and your Tivoli Storage Manager database is damaged or lost and must be restored, the definitions created by using the define devclass command will not be available and must be recreated manually. This parameter is required. Specifies the type of backup to run. This parameter is optional. The default value is INCREMENTAL. Specifies the volumes to use for the backup. You can specify more than one volume by separating each volume name with a comma, with no intervening spaces.
Copyright IBM Corp. 2008
DEVCLASS=DEVCLASSNAME
TYPE=TYPEVALUE
VOLUMENAMES=VOLNAME
10-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
Parameter
SCRATCH=SCRATCHVALUE
Description Specifies whether scratch volumes can be used for the backup. This parameter is optional. The default value is YES. Specifies whether to wait for the server to complete processing this command in the foreground. The default value is NO. The first backup of your database must be a regular backup. You can run up to 32 incremental backups between regular backups. To perform a regular backup of your database to the TAPECLASS device class, for example, enter:
backup db type=full devclass=tapeclass
WAIT=WAITVALUE
In this example, Tivoli Storage Manager writes the backup data to scratch volumes. You can also specify volumes by name. After a regular backup, you can perform incremental backups, which copy only the changes to the database since the previous backup. Run an incremental backup of the database, using a scratch volume. Assume a device class of FILE for the backup:
backup db devclass=file type=incremental
10-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
11
The Tivoli Storage Manager administrator can choose any combination of the following methods to back up the Tivoli Storage Manager database: Scheduled backups Backups based upon trigger levels Manual backups
10-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
The following commands are used to define the database backup trigger and log modes:
set logmode rollforward The database and log backup triggers, and setting the log mode can be managed with the Administration Center.
12
10-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
Parameter
Description Specifies the name of the sequential access device class to use for backups. This parameter is required. If the mount limit for the device class specified has already been reached (all drives are busy) when the backup runs, Tivoli Storage Manager automatically cancels lower priority operations, such as reclamation, to make a mount point available for the backup. Specifies the name of the sequential access device class to use for incremental backups. Specifies when Tivoli Storage Manager automatically backs up the database, based on the percentage of available space used for the recovery log. When the percentage of space used for the recovery log exceeds this value, Tivoli Storage Manager performs an automatic backup of the database and removes unnecessary records from the recovery log. Specifies the maximum number of incremental backups that can be run before a regular backup is required. You can specify a value from 0-32, where 0 specifies that Tivoli Storage Manager runs only regular backups automatically. This parameter is optional.
DEVCLASS=DEVCLASSNAME
INCRDEVCLASS
LOGFULLPCT=PERCENTAGE
NUMINCREMENTAL=NUMBER
Example
Define the setting of the database backup trigger at 80%. Run two incremental backups to every regular backup of the database. Assume a device class of FILE for the backup. Use the following command.
define dbbackuptrigger devclass=file logfullpct=80 numincremental=2
Run the query status command, and it will return the mode the recovery log is in.
10-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
SET LOGMODE
NORMAL
Description Specifies that Tivoli Storage Manager saves only those recovery log records that are needed to recover the database in case of a system failure. This is the default for the log mode. Specifies that Tivoli Storage Manager saves enough log records to ensure that the database can be restored to its most current state using the most recent database backup series and recovery log records.
ROLLFORWARD
10-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
Query DB
To help you determine how much storage space a regular or incremental backup will require, use the q db command. This command displays the number of changed megabytes in the database.
Query Volhistory
Use the q volh command to display sequential volume history information that has been collected by the server. Volume history information includes data such as date and time of use for the following types of volumes:
10-16
Volumes not in storage pools. Volumes used to back up a Tivoli Storage Manager database (regular or incremental). Volumes used to dump a Tivoli Storage Manager database.
Copyright IBM Corp. 2008
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Backing Up the Database
Volumes used to export administrator, node, policy, or server data. Backup sets.
Query VOLHistory Type=typevalue
The TYPEVALUE specifies the type of records to display from the volume history file. This parameter is optional. The default is ALL. Possible values are:
Typevalue
ALL DBBACKUP
Description Specifies that all history information is displayed. Specifies to display only records that contain information about volumes used for backups (regular or incremental). Specifies a full backup that does not interrupt the current full plus incremental backup series. Also referred to as database out-of band or snapshot backup. Specifies to display only records that contain information about volumes used for online database dumps. Specifies to display only records that contain information about volumes used for exporting data.
DBSNAPSHOT
DBDUMP
EXPORT
Delete Volhistory
Use the delete volhistory command to delete sequential volume history information collected by the server when the information is no longer needed. For example, you may want to delete information about volumes used for obsolete database backups. When volume history information about volumes that are not in storage pools is deleted, the volumes return to scratch status if they were acquired by Tivoli Storage Manager as scratch volumes. For scratch volumes with device type FILE, the files are deleted. Do not delete sequential volume history information until you no longer need it. Do not delete the volume history information for database dump, database backup, or export volumes that reside in automated libraries unless you want to return the volumes to scratch status. When the delete volhistory command removes volume information for database dump, database backup, or export volumes, the volumes are automatically returned to scratch status if they reside in automated libraries. These volumes are then available for reuse by the server, and the information stored on them may be overwritten when the server reuses the volume for some other purpose, such as storage pool volumes or other database backups.
10-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
= =
Restore
If you lose the TSM database, you can no longer restore files.
14
10-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
Point-in-time recovery Roll-forward to most recent state recovery Single database volume recovery
15
10-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
Roll-Forward Recovery
IBM Software Group | Tivoli software
Roll-Forward Recovery
+ + + + +
16
Roll-forward recovery to most recent state provides the ability to restore a database to its most current state if the recovery log is available. Mirroring and roll-forward recovery together provide the most comprehensive protection for a Tivoli Storage Manager database. Here are some considerations when enabling roll-forward recovery: Restoring the database to its most current state allows a site to protect against loss of client and server files due to a hardware failure on the Tivoli Storage Manager server. Since there is no requirement for auditing the database and storage pools after a database restore the recovery time is much faster. If there is a media failure on a database volume, only that volume needs to be restored, which reduces the time to recover the Tivoli Storage Manager database. The recovery log must be defined with a larger size because Tivoli Storage Manager must save additional recovery log records. The size of the recovery log depends on the frequency of required backups, how the database backup trigger is set, and the volume of Tivoli Storage Manager transactions. The maximum size of the recovery log is 13 GB. Mirrored copies of the recovery log consume additional disk space because of the larger recovery log size. However, it is still advisable to mirror your recovery log as well as the database, if you have enough disk space.
Copyright IBM Corp. 2008
10-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
Point-in-Time Recovery
IBM Software Group | Tivoli software
Point-in-Time Recovery
+ + + +
17
Point-in-time recovery is normally used for exceptional situations such as disaster recovery or removing the effects of software logic or other types of errors that can cause an inconsistency in the database. If an administrator enables roll-forward recovery, point-intime recovery is also available. For disaster recovery purposes, an administrator can run regular or incremental backups as often as necessary to ensure that a Tivoli Storage Manager database can be restored to an acceptable point in time and can send those backups to an off-site location for safekeeping. It is important to perform database backup with storage pool backup to provide disaster recovery services for the server. To restore a database to a specific point in time to remove the effects of an error that caused an inconsistency in a database, an administrator can use some or all of the backups contained in a database backup series. An administrator can also choose to enable point-in-time recovery only. The considerations of enabling point-in-time recovery only are: When only point-in-time recovery is enabled, the recovery log can be defined with a smaller size, and mirrored copies of the recovery log consume less disk space. Since there is no requirement for auditing the database after a database restore, the recovery time is much faster compared to the database salvage utility.
IBM Tivoli Storage Manager 5.5 Implementation and Administration
10-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
The database cannot be restored to its most current state. It can only be restored to the point in time when the particular backup series used to restore the database was created. Because restoring a single database volume requires roll-forward recovery, the entire database must be restored, even if only one volume is damaged. After the database has been restored, you have to audit the sequential storage pool volumes based on the information in the volume history file. You also must audit the disk storage pool volumes.
You will still need to mirror the recovery log, even if you use only point-in-time recovery. If the recovery log is gone, you will need to run the audit storagepool command.
10-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
backup devconfig
18
Volume history information is automatically collected by the server for use in performing database recovery. The volume history information collected by the server is maintained in the Tivoli Storage Manager database. The Tivoli Storage Manager server collects the following types of volume history information: Volumes used to back up a Tivoli Storage Manager database. Volumes used to export administrator, node, policy, or server data. Sequential access storage pool volumes that have been reused, added, or deleted.
Use the backup volhistory command to request that the server save sequential volume history information to one or more files. Volume history information includes data such as date and time of use for the following types of volumes: Volumes used to back up a Tivoli Storage Manager database (regular or incremental). Volumes used to dump a Tivoli Storage Manager database. Volumes used to export administrator, node, policy, or server data. Sequential access volumes that have been added to storage pools.
IBM Tivoli Storage Manager 5.5 Implementation and Administration
10-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
Sequential access volumes that have been reused in storage pools reclamation or move data operations. Sequential access volumes that have been removed by using the del volume command or removed during reclamation of scratch volumes.
Device, drive, and library definitions are also stored in the Tivoli Storage Manager database. Device configuration information consists of device class definitions created using the define devclass command. On an AIX server, it also includes drive and library definitions created using the define drive and define library commands. Use the backup devconfig command to specify one or more files in which to store a backup copy of the device class definitions created using the define devclass command, library definitions created using the define library command, and drive definitions created using the define drive command.
10-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
19
Keep current copies of these files off-site for safekeeping. Keep the output of the query system file off-site.
10-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
20
The dsmserv restore db utility uses backed up versions of the database either created manually with the backup db command or versions created with the automatically triggered database backups.
10-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
If the volume history file is unavailable, you can use one or more dsmserv restore db utilities to restore a Tivoli Storage Manager database to a specific point in time. For example, if you need to load a regular backup and one or more incremental backups, you can issue a dsmserv restore db command to restore the regular backup, and then issue an additional dsmserv restore db command for each incremental backup. When you use multiple dsmserv restore db utilities, you must specify COMMIT = NO for each command except the last one you issue. For the last dsmserv restore db command, you must specify COMMIT = YES to place the database in a consistent and usable state. If the volume history file is not available, you need to tell restore db which volumes to restore. VOLNAME: Specifies the names of one or more volumes to use to restore the database. You can specify more than one backup volume by separating each volume name with a comma, with no intervening spaces. You must list the volumes in the order in which the backup was stored. For example, if you want to use the backup volumes TAPE01, TAPE02, and TAPE03, specify the following volumes:
VOLUMENAMES=TAPE01,TAPE02,TAPE03
10-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
Best Practices
IBM Software Group | Tivoli software
Best Practices
Use automatic backup triggers. Use space triggers. Use recovery log mirroring. Store backup of DEVCNFG.OUT, VOLHIST.OUT, and DSMSERV.OPT off-site. Complement with database mirroring for 24 x 7 environments (operate 24 hours a day, 7 days a week). Define volume history and device class backup files. Back up the database using administrator scheduling facility. Schedule database backup immediately following storage pool backup. Store backup volumes off-site. Use Disaster Recovery Manager to automate the recovery of the TSM database.
21
With the space management function, Tivoli Storage Manager is able to store active client data. In order to restore the database to the most recent state the roll-forward mode must be set. Using this mode, you are able to restore the database up to the last ended transaction. Use automatic backup triggers. By defining the database trigger you are protected from a situation that the database recovery log becomes full before the scheduled backup is run. If the automatic backup is run too often, you must adjust the size of the recovery log or change the percent of space used to trigger backup to run automatically. Use space trigger. Use the space trigger to increase the size of the database and recovery log by defining the percentage you will increase the database and recovery log, when a specified utilization percentage is reached. Use recovery log mirroring if you have enough space. The recovery log is vital for restoring to the most recent state. If you are using mirroring for recovery log, you are protected against media failure, and you can always restore to the most recent state even if one of the recovery logs suffers from a media failure.
10-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Database Recovery
Store backup volumes off-site. All backup volumes should be stored off-site to protect them from a disaster at the installation site.
Store backup of DSMSERV.OPT and DSMSERV.DSK off-site. Copies of the DSMSERV.OPT and DSMSERV.DSK files should be stored offsite to protect them from disaster recovery at the installation site.
Complement with database mirroring for environments that operate 24 hours a day. For those sites that are running operations 24 hours a day, the database mirroring feature is the only way to protect against a database media failure.
Define volume history and device class backup files. The volume history and device class backup files are used during database restore. If the volume history information is not available when doing point-in-time restore, you will not know which storage pool to audit. Consequently, you world need to audit all storage pools. If the device configuration is not available you have to define all device classes, drives, and libraries manually.
Back up database using the administrator scheduling facility. Schedule a regular backup once a week and an incremental backup once a day.
Schedule database backup immediately after the storage pool backup. If you are using the storage pool copy to take a backup of the primary storage pool, you should schedule the database backup to be run when the storage copy pool has been completed. If you do that, you will have a database backup that reflects the storage pool backup. If there is a disaster recovery situation, you can use the database backup and the storage copy pool backups to restore the Tivoli Storage Manager environment. These backups would restore the environment to the time backups were sent to an off-site location.
Consider using Disaster Recovery Manager. Refer to the Training Roadmap on the IBM Web site for information on IBM Tivoli Disaster Recovery Manager education.
10-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Using Active Data-pools
Active-data Pools
Copy storage pool: Copies of active or inactive data from primary storage pools for offsite storage. Active-data pools on disk: Copies of active data for fast restore of client data. Active-data pools on tape: Copies of active data to reduce the number of tapes stored offsite.
22
Reduced storage requirement (on-site or off-site) while protecting data against media failure or disaster Simplified tape management because of fewer tapes
10-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Using Active Data-pools
You can also use the Administration Center to define active-data pools.
23
This excerpt is from the IBM Tivoli Storage Manager for Windows Administrators Reference.
24
10-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Using Active Data-pools
Administrators must decide whether to copy and update an existing domain or establish a new policy in which the domain will authorize nodes to store data into an active-data pool.
10-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Using Active Data-pools
26
27
10-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Using Active Data-pools
28
29
10-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Using Active Data-pools
30
The command used: UPDATE DOMAIN <user_domain_name> <other user parameters..> ACTIVEDEST=ADP1,ADP2
31
10-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Back up without interruption of services. The design allows incremental backups to be taken while the server is operational and available to clients. The administrator can decide which storage pools should be backed up, and then can also schedule these backups using the central scheduling feature of TSM. The storage pool backups can be run at a time convenient for the business.
Restore one volume in a storage pool. Restore individual volumes within a storage pool to recover from a media failure.
Restore a complete storage pool. Restore all damaged volumes within a storage pool to recover from a complete loss of a storage pool.
10-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Support disaster recovery. Identify removable media volumes containing storage pool backup data to be sent to an off-site location for disaster recovery purposes. Provide management for the volumes that are stored off-site for disaster recovery protection. Address the issues of file expiration, volume reclamation, and volume rotation. Identify which volumes will return to the on-site location if you need to recover from a major disaster or from loss of a few volumes at the on-site location.
Automatically switch to a duplicate copy if the primary file is damaged. If you cannot obtain the primary file, the duplicate copy should automatically be used, if one is available.
10-37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
copy pool
copy pool
33
Use the backup stgpool command to create backup copies of files that reside in a primary storage pool, and store the backup copies in a copy storage pool. If a file is already duplicated in the specified copy storage pool, a new copy of the file is not made in that copy pool. One primary pool can use multiple copy storage pools. You have many copy storage pools for each primary storage pool; you are not limited to two or three backup copies. Each copy pool requires additional database and storage pool space, a potentially important consideration. By supporting multiple copy storage pools, TSM supports both media and disaster recovery by physically separating these copies. This separation reduces the risk of losing data as a result of a disaster. You create multiple backup copies of a primary pool by initiating the backup of the primary storage pool for each copy pool. The incremental backup is performed for each copy storage pool. The files are copied only if they are not already in that copy or if the copy in the copy pool has a different insertion date (that is, the file has changed since it was last copied into the copy pool). The copy pool with all on-site volumes is used for media failure. Because all volumes are stored on-site, they may be destroyed if a disaster occurs.
10-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
You can use the copy pool with on-site volumes to provide a way to reduce the potential for data integrity loss due to media failure or other problems. If the primary file is not available or becomes corrupted, TSM will access and use a duplicate file from a copy storage pool. Disaster recovery is the reason for providing copy storage pools with off-site volumes. Off-site volumes in this disaster recovery copy storage pool are never automatically used by TSM. The volumes in this copy pool should be marked with the access mode of OFFSITE to make sure that TSM does not request a mount of the volume. The off-site volumes in the disaster recovery copy storage pool should be stored off-site with the database backup to make sure that you can recover the TSM environment if there is a disaster. You will get an error message when trying to access files from a copy storage pool that contains off-site volumes only. You can temporarily move the volume on-site and recover the files from volumes that belong to the disaster recovery storage pool.
10-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
on-site volumes
off-site volumes
DEFine STGpool poolname deviceclassname POoltype=Copy DESCription=description ACCess=READWrite|READOnly|UNAViable COLlocate=No|GRoup|NODe|Filespace REClaim=percent RECLAIMPRocess number RECLAMATIONType=THRESHold OFFSITERECLAIMLimit= NOLimit|number MAXSCRatch=number REUsedelay=0|days OVFLOcation=location DATAFormat=NATive|NONblock CRData=Yes|No
Define Stgpool
Use the define stgpool command to name a set of volumes as a primary storage pool or a copy storage pool. The volumes in a pool belong to the same device class. A copy storage pool is used to store backup copies of files that are in primary storage pools.
Parameter
POOLNAME
Description Specifies the name of the copy storage pool to be defined. This parameter is required. The maximum length of the name is 30 characters.
10-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Parameter
Description Specifies the name of the sequential access device class to which this copy storage pool is assigned. This parameter is required. You can specify any device class except DISK. Specifies that you want to define a copy storage pool. This parameter is required. Specifies a description of the copy storage pool to be defined. This parameter is optional. The maximum length of the description is 255 characters. Specifies how users and system processes (like reclamation) can access files in the copy storage pool. This parameter is optional. The default value is READWRITE. Specifies whether TSM attempts to keep data belonging to a single client node or group of nodes assigned to as few volumes as possible. This parameter is optional. The default value is NO. Specifies when to initiate reclamation of fragmented space on volumes in the copy storage pool, based on the percentage of reclaimable space on a volume. Specifies the maximum number of scratch volumes that can be requested by TSM. This parameter is required.
DEVCLASSNAME
POOLTYPE=COPY
DESCRIPTION=DESCRIPTION
ACCESS=ACCESSMODE
COLLOCATE=COLLOCATION
RECLAIM=RECLAIMVALUE
MAXSCRATCH= MAXSCRATCHVALUE
For more options, refer to the IBM Tivoli Storage Manager Administrators Reference Guide for your platform.
Define Volume
Use the define volume command to assign a random or sequential access volume to be used for storage within an existing storage pool. You can define a volume to either a primary storage pool or a copy storage pool. You must define each volume to be used in a storage pool, unless you allow scratch volumes for the storage pool.
10-41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
To back up files in a primary storage pool hierarchy to an on-site copy storage pool, issue the following commands:
backup stgpool primary_disk onsite backup stgpool primary_tape onsite
The number specified by MAXPROCESS does not limit the number of tape drives used.
10-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
copypool_1
To allow for client data to be written simultaneously to multiple copy storage pools, the storage pool must contain a list of the additional copy storage pools (up to ten). Do not change the copy storage pool list in the storage pool hierarchy. If there is a different copy storage pool list, then all resources currently held are released in order to obtain the resources of the new copy storage pool list. Once the session has a storage pool that has a copy storage pool list, the operation session will continue to use the Simultaneous Write path. Target pools can have different device classes. There can be limited availability of mount points. Simultaneous writes should be used in conjunction with storage pool backup.
10-43
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Use the ACTIVEDATAPOOLS parameter for the DEFINE STGPOOL and UPDATE STGPOOL commands. This practice specifies the names of active-data pools where the server simultaneously writes data during a client backup operation.
37
Use the simultaneous write function to automatically copy client data to two copy storage pools, COPYPOOL1 and COPYPOOL2, and an active-data pool, ACTIVEDATAPOOL, during a backup operation. With DISKPOOL and TAPEPOOL already defined as your storage pool hierarchy, issue the following commands to enable simultaneous write:
define stgpool copypool1 mytapedevice pooltype=copy define stgpool copypool2 mytapedevice pooltype=copy define stgpool activedatapool mydiskdevice pooltype=activedata update stgpool diskpool copystgpools=copypool1,copypool2 activedatapools=activedatapool
Refer to the IBM Tivoli Storage Manager Administrative Guide for more information.
10-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
38
10-45
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Set access mode to OFFSITE Use location No mount request UPDate Volume Volname ACCess=Offsite Location=Vault
39
You will need to change the status of the tapes that were used to perform the copy storage pool for off-site disaster recovery as not available to TSM. The status change is done with the update volume command specifying ACCESS = OFFSITE. TSM does not issue mount requests for off-site volumes. .
10-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Use the following command to create a list of volumes to send offsite. query media * stg=* wherestgpool=off-site whereaccess=readwrite,readonly wherestatus=filling,full
40
10-47
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
.....
ON-Site
Softwa r e Packag ----- FRAGIL e E -----
I N S T A L L
C U S T O M I
file A
ite OFF-S
cal Point : Fo 011 From erver To: S
Reclamation 100%
file B
file A file B
file B
file A
This sequence ensures that the files on the new copy storage pool volumes are sent off-site and are not inadvertently kept on-site because of reclamation.
10-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
To obtain a list of empty off-site volumes, issue the following command. query volume * access=offsite status=empty stg=OFF-SITE Bring the volumes identified above on-site and update their access to readwrite. update volume * access=readwrite location=Back Home wherestgpool=off-site whereaccess=offsite wherestatus=empty
42
The administrator periodically returns outdated backup database volumes. These volumes are displayed with the query volhistory command and can be released for reuse with the delete volhistory command. Consider scheduling this task.
10-49
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
File Level Backups TSM does storage pool backups on the file level to allow for recovery at different levels. Depending on the situation, you sometimes have to restore only files that have been damaged. In the event of a media failure, you can restore individual volumes, or you may have to restore multiple primary storage pool volumes because of a major failure. TSM supports recovery in all these situations.
Damaged Files A damaged file is one for which a data integrity error has been detected, such as when a client attempts to restore, retrieve, or recall the file or during an audit volume operation. If a data integrity error is detected for a file in either a primary or a copy storage pool, that copy of the file is marked as damaged in the database. If the same file is stored in other storage pools, the status of those file copies is not changed. File copies which have been marked as damaged are not:
Restored, retrieved, or recalled to clients Moved with migration, reclamation, or move data Restored during a restore stgpool or restore volume operation (if the backup copy in the copy storage pool is damaged)
10-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
To facilitate restore processing of entire volumes, DESTROYED volume access mode is introduced. If a volume has an access mode of DESTROYED, it is not mounted for either read or write access. The restore volume command recreates files that reside on a volume or volumes in the same primary storage pool. This command can be used to recreate files for one or more primary volumes that have been lost or physically damaged. When you issue the restore command against a storage pool volume, the volume will have an access mode of DESTROYED, and all files that have been backed up from this volume will be restored to the other volumes in that pool. Damaged Volumes within a Storage Pool The restore stgpool command restores files on any volumes that have been designated as DESTROYED using the update volume command. This command also restores all files in a storage pool that have previously been identified as having data integrity errors. The restore stgpool command is useful for restoring a large number of volumes (more than can be practically listed using a single restore volume command) after a major disaster, or for recreating damaged primary files. Support and Enhancements for Windows 2000 -RSM (Removable Storage Media) This service included with Windows 2000 facilitates communication among applications, robotic media changers, and media libraries. It enables multiple applications to share local robotic media libraries and tape or disk drives, and manage removable media with a single-server system.
10-51
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
preview=yes
44
TSM automatically accesses copy storage pool file if volume is on-site. Normally a file is obtained from the primary storage pool whenever an attempt is made to access that file. However, TSM will attempt to access the file from a copy storage pool if the primary copy of the file cannot be obtained because the primary file copy has been previously marked damaged. TSM will also use the duplicate copy if the primary file is stored on a volume which is UNAVAILABLE, DESTROYED, or OFFLINE. For certain operations (restore, retrieve, or recall of files to clients and export of file data), TSM will also access a file from a copy storage pool if the primary file is located in a storage pool that is UNAVAILABLE. If the file is stored on a volume with ACCESS=OFFSITE, the file will not be obtained from the copy pool. Instead an error message will be issued to the client.
Run restore stgpool periodically to restore damaged files. If a primary file copy is marked as damaged and a usable backup copy exists in a copy storage pool, the primary file can be recreated using the restore stgpool command. To recreate damaged files in the primary pool, you can define a schedule that executes the following command:
RESTORE STGPOOL primarypool
10-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
The restore stgpool command will restore all damaged files in the primary pool. If you are using off-site copy volumes only, these volumes must be brought onsite before you can issue the restore stgpool command. Otherwise, TSM will write an error message saying that the files on offline volumes cannot be restored. The restore stgpool command can be issued with a PREVIEW option to obtain a list of required copy storage pool volumes.
10-53
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
45
10-54
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
vol_01
vol_03
46
In this scenario, an operator inadvertently destroys a tape volume (VOL2) belonging to the primary storage pool. An administrator performs the following actions to recover the data stored on the destroyed volume by using the on-site copy storage pool:
restore volume VOL2
This command sets the access mode of VOL2 to DESTROYED and attempts to restore all the files that were stored on VOL2. The files are not actually restored to VOL2, but to another volume in the primary storage pool. All references to the files on VOL2 are deleted from the database, and the volume itself is deleted from the database. The restoration of a volume may be incomplete. Use the query content command to get more information on the remaining files on volumes for which restoration was incomplete. The restoration may be incomplete for one or more of the following reasons: Files were either never backed up or the backup copies are marked as damaged. A copy storage pool was specified on the restore command, but files were backed up to a different copy storage pool. Volumes in the copy storage pool needed to perform the restore operation are offsite or unavailable.
10-55
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
If the query content VOL2 command showed files remaining, you would have to take some action. Analyze the cause for the situation. You may have to delete the volume with DISCARDDATA=YES to get the volume out of the storage pool.
DELETE VOLUME VOL2 DISCARDDATA=YES
10-56
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
vol_01
vol_02
vol_03
Parameter
Description Specifies the name of the volume in a primary storage pool to which the files will be restored. This parameter is required. You can specify a list of volumes if all volumes in the list belong to the same primary storage pool. The items in the list are separated by commas with no intervening spaces.
VOLNAME
10-57
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Parameter
Description Specifies the name of the copy storage pool from which the files are to be restored. This parameter is optional. If this parameter is not specified, files are restored from any copy pool in which copies can be located. Specifies the name of the new storage pool to which the files will be restored. This parameter is optional. If this parameter is not specified, files are restored to the primary storage pool to which the volume or volumes being restored belong. Specifies the maximum number of parallel processes that are used for restoring files. By using multiple, parallel processes, you may be able to improve throughput for the restore operation. This parameter is optional. You can specify a value from 1-999, inclusive. The default value is 1. Specifies whether you want to preview the restore operation without actually restoring data. This parameter is optional. The default value is NO. If you specify YES this option displays: The number of files and the number of bytes that will be restored. A list of copy storage pool volumes containing files that will be restored. These are volumes that must be mounted if you actually perform the restore. A list of any volumes containing files that are not restorable.
COPYSTGPOOL=COPYPOOL
NEWSTGPOOL= NEWPRIMARYPOOL
MAXPROCESS=NUMPROCESSES
PREVIEW=VALUE
WAIT=WAITVALUE
Specifies whether to wait for the server to complete processing this command in the foreground. This parameter is optional. The default value is NO.
10-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
2. Set the access mode of the copy volumes to UNAVAILABLE. Set the access mode of the damaged volumes identified as UNAVAILABLE to prevent reclamation by entering:
UPDATE VOLUME volumename(s) access=unavailable
3. Bring the identified volumes to the on-site location. Bring the identified volumes to the on-site location and set their access mode to READONLY by entering:
UPDATE VOLUME volumename(s) access=readonly
5. Set the access mode of the volumes to OFFSITE. Set the access mode of the copy pool volumes to OFFSITE by entering:
UPDATE VOLUME volumename(s) access=offsite
10-59
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
UPDATE Volume volname ACCESS=destroyed RESTORE STGpool primarypool NEWstgpool=newprimarypool MAXPRocess=numprocesses Preview=No|Yes Wait=No|Yes
48
Use the restore stgpool command to restore files from one or more copy storage pools to a primary storage pool. The files must have been copied to the copy storage pools by using the backup stgpool command. When you use this command, TSM restores all files that belong to the specified primary storage pool and that meet one of the following criteria: The primary copy of the file has been identified as having data integrity errors during a previous operation. The primary copy of the file resides on a volume that has an access mode of DESTROYED.
After the files are restored, the old references to these files in the primary storage pool are deleted from the database. TSM now locates these files on the volumes to which they were restored rather than on the volumes on which they were previously stored. If a destroyed volume becomes empty because all files have been restored to other locations, the destroyed volume is automatically deleted from the database.
10-60
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Use the Administration Center to create a script for the following tasks: Back up the primary storage pools and database. Create a Recovery Plan File if using Disaster Recovery Manager.
49
Back up entire primary storage pool hierarchy to the same copy pool. TSM is smart enough to recognize that when a file migrates down the storage hierarchy, it does not need to be copied again into a copy pool. Or, if you move a file with the move data command, TSM can recognize this situation. Migration works if you have set up your configuration so that each primary storage pool hierarchy is copied to the same copy pool.
Consider using at least one copy pool for on-site recovery and one for disaster recovery. It is useful to have one backup copy of a primary pool that is kept on-site to be used for media failures or damaged files. Remember that if you access a file that is damaged in the primary storage pool, TSM will automatically let you access the copy in the copy pool, if the copy pool volumes are on-site. To be prepared for disaster situations, have one backup copy of a primary pool that is used for off-site storage. The primary pool is copied to on-site volumes in this special disaster recovery copy pool, and then the administrator can change the volume access mode to OFFSITE and physically move the volumes to an off-site location.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
The administrative command scheduling facility can be used to automate storage pool backups. The backup stgpool command can be scheduled to initiate at regular intervals. Back up the storage pool first. Back up the storage pools first. By backing up storage pools first, you ensure that all storage pool files are recorded in the database. You may end up with extra records in the database, but at least there should be a record for each file in the storage pools. Also, since the storage pool backups may take longer than the database backup, the storage pools should be backed up first to further reduce the inconsistencies between the database and the storage pools. Back up the database and storage pool together. To prepare for server disaster recovery, both the server database and storage pools should be backed up at the same time. In this way, the database and storage pools will match (be in sync) to a greater degree. Save the volume history and device configuration file. To ensure the integrity of the storage pool data, save the volume history and device configuration files and send them off-site. Use Disaster Recovery Manager.
10-62
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
Daily tasks: Back up primary storage pools to copy storage pools. Back up the database. Save the volume history file, the device configuration file, and the output of the query system command. Move storage pool volumes, database backup, volume history file, and the device configuration file off-site.
50
REUSEDELAY
You should delay the reuse of any reclaimed volumes in copy storage pools for as long as you keep your oldest database backup. Delaying reuse may help you to recover data under certain conditions during recovery from a disaster. When you define or update a sequential access storage pool, you can use the REUSEDELAY parameter. This parameter specifies the number of days that must elapse before a volume can be reused or returned to scratch status after all files have expired, deleted, or moved from the volume. If REUSEDELAY is set to 0, you run the risk of data loss.
10-63
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Storage Pool Backup and Recovery
back up first stgpool back up next stgpool back up TSM database back up devconfig/volhist migration eject off-site volumes and insert scratch volumes expiration processing clients hours of operations 08:00 18:00
51
reclamation processing
This is one example of the daily operations of an IBM Tivoli Storage Manager administrator. Fortunately, the administrator for this company has automated these functions with maintenance plans and scheduled administrative scripts.
10-64
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
Use the Administration Center to create a separate script for each TSM server in your environment.
52
The Tivoli Storage Manager maintenance plans use a Web interface wizard to build scripted plans. Here are some benefits of the maintenance plans: Generate a custom maintenance plan for each server. Expand the maintenance plan as the server environment changes. Provide a schedule for the maintenance plan to run daily. Allow the maintenance plan to be viewed and edited by the administrator.
10-65
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
How to Begin
Select Server Maintenance in the Tivoli Storage Manager tree, and the Server Maintenance page will display as shown.
53
Select the server you want to make the script for, and from the Select Action menu select Create maintenance script. The options to modify and to remove a script are also available from the same menu.
54
10-66
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
Server Maintenance
55
Selecting a Device
The left side of the screen shows the sequence of processes that will be scheduled. The arrow indicates that the step being scripted is Back Up Server Database. Select the device to be used from the menu and select the radio button next to the type of backup that will be performed. Click Next.
56
10-67
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
Back Up Storage Pools is the next task to be scripted. Now a relationship must be added. Select Add a Relationship.
57
Add a Relationship
Select a storage pool to back up and up to three copy storage pools where the backup will be stored, and click OK.
58
10-68
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
59
Select the storage pool to migrate, set the migration threshold, and set the amount of time the process can run before it is canceled. Click Next to continue.
60
10-69
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
If you want to limit the amount of time allowed for the expiration process, set that value here, and click Next to continue.
61
Reclamation
Select the storage pool to run reclamation for, set the percent of unused space which will be the trigger to start the reclamation process, and set the amount of time the process is allowed to run.
62
10-70
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Schedule of Maintenance
Set the schedule for the script, including date and time, and click Finish.
63
Finish
The check mark under the Maintenance Script heading indicates a maintenance script has been created for this server.
64
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
65
You can verify that a scripted maintenance plan has been created for this server by viewing Server Properties. Select the radio button next to the server and use the SELECT ACTION menu to select Server Properties. Then select the scripts from the left panel.
10-72
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
66
Over time, the server database may experience fragmentation. Reorganizing the database can improve query performance. You can use the estimate dbreorgstats command to estimate how much space can be recovered if a reorganization is performed. The estimate allows you to determine if a reorganization will offer any space savings. The command performs the following: Scans all tables defined in the TSM server. Processes a single table at a time. Finishes one table and progresses to another until all tables areevaluated. Traverse tables leaf pages from lowest order page (page with the lowest order key) to the highest order page (page with the highest order key).
Reads the records in table leaf pages in ascending key order and records statistics about: Records processed Logical leaf pages needed Tables processed
After evaluating all tables, this command will display information about the minimum estimated amount of database space that would be recovered if a database reorganization were performed.
IBM Tivoli Storage Manager 5.5 Implementation and Administration
10-73
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
When process completes, messages show the results of processing. (ANR1784I) Results of the last time process was run are also shown in q db f=d.
Follow the procedure for Reorganizing the Database in the Tivoli Storage Manager Administrators Guide.
10-74
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
Student Exercise
IBM Software Group | Tivoli software
Student Exercise
67
Open your Student Exercises and perform the exercises for this unit.
10-75
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. True or False? You can recover information from a TSM storage pool without the TSM database. 2. A(n) ____________________ backup takes less time to run because it copies only those database pages that have changed since the last time the database was backed up. 3. A ___________________ backup is a full backup that does not interrupt the full plus incremental backup series. 4. True or False? The main reason to do incremental backups is because you use fewer tapes. 5. True or False? It is a good idea to mirror your database and recovery log. 6. True or False? The IBM Tivoli Storage Manager maintenance plan runs monthly virus scans.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
10-77
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
Review Answers
1. True or False? You can recover information from a TSM storage pool without the TSM database. false 2. A(n) ____________________ backup takes less time to run because it copies only those database pages that have changed since the last time the database was backed up. Incremental 3. A ___________________ backup is a full backup that does not interrupt the full plus incremental backup series. Snapshot 4. True or False? The main reason to do incremental backups is because you use fewer tapes. False 5. True or False? It is a good idea to mirror your database and recovery log. True 6. True or False? The IBM Tivoli Storage Manager maintenance plan runs monthly virus scans. False
10-78
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Back up the IBM Tivoli Storage Manager database. Recover the IBM Tivoli Storage Manager database. Back up the storage pools. Recover the storage pools.
68
10-79
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 10: Protecting the Database and Storage Pools Tivoli Storage Manager Maintenance Plans
10-80
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
11-1
Introduction
Central scheduling enables automation of backup, archive, and other processes. Scheduling of IBM Tivoli Storage Manager operations can be done with an external scheduler or with the built-in Tivoli Storage Manager scheduler. The Tivoli Storage Manager administrative interfaces for defining, updating, and deleting schedules will be described in this unit.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Describe the difference between client polling and server prompted methods. Identify and describe available scheduler options. Associate scheduler options with the schedule method to which it applies. Identify the tasks that can be scheduled for a client. Create a schedule. Copy a schedule. Define association of client to schedule.
11-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Overview of Schedules
Two types of scheduling: Client scheduling
Tivoli Storage Manager uses schedules to allow you to automate operations. Each scheduled operation is called and is tracked by the server and recorded in the database. Scheduled operations that are in progress, have completed, or have failed are recorded. You can query the log to determine whether the scheduled events have completed successfully or not. Event records can be deleted from the database as needed to recover database space. The administrator is responsible for building and maintaining the schedules and has the authority to prioritize workstations. In addition, the administrator can determine the number of client server sessions that may be used by central scheduling. The Central Scheduler supports two modes of scheduling: Client Polling and Server Prompted. For environments that occupy multiple time zones, schedules run in the time zone of the server.
11-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Scheduling Options
IBM Software Group | Tivoli software
Scheduling Options
MAXSCHEDSESSIONS* MAXCMDRETRIES RETRYPERIOD QUERYSCHEDPERIOD RANDOMIZE* SCHEDCMDDISABLE SCHEDMODE SESSIONINITIATION SCHEDLOGNAME SCHEDLOGRETENTION
dsm.sys dsm.opt
POSTSCHEDCMD POSTNSCHEDCMD PRESCHEDCMD PRENSCHEDCMD MANAGEDSERVICES TPCCLIENTADDRESS TPCCLIENTPORT SRVPREPOSTSCHEDDISABLED SRVPREPOSTSNAPDISABLED SCHEDRESTRETRDISABLED
There are several processing options which impact the performance of the client scheduler. You can define most of these options in the client options file (dsm.opt or dsm.sys) on the Tivoli Storage Manager client. Some of these options can be set globally on the Tivoli Storage Manager server for all Tivoli Storage Manager clients. * Server defined
4
There are several processing options which impact the behavior of the client scheduler. On the Tivoli Storage Manager client, you can define most of these options in the client options file (dsm.opt). However, some of these options can be set globally on the Tivoli Storage Manager server for all Tivoli Storage Manager clients. These options will be described throughout this unit.
11-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Client Scheduling
Client scheduling Backup-Restore and Archive-Retrieve Client operating system commands and scripts One-time scheduled commands Two modes of client scheduling: Client Polling Server Prompted
11-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Traditional Scheduling
IBM Software Group | Tivoli software
Refer to the IBM Tivoli Storage Managers Backup-Archive Installation and Users Guide for more information.
11-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
backup-archive client
TSM server
1. The client queries the server for a scheduled operation. 2. The server sends the schedule to the client. 3. The client waits for start time, then begins the scheduled operation.
In client polling, the TSM client periodically queries or polls the server for a scheduled operation and the date and time that the operation is to start. The client then waits until it is time to start the scheduled operation and executes the operation. Client polling is initiated when the client starts the TSM client scheduling program using the command line. To start the program, enter dsmc schedule. The program will continue to query the server and execute schedules until you explicitly stop the program or the machine is shut down.
11-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1. Client registers its TCP/IP address with the server. 2. Server notifies the client that a scheduled operation should be performed.
3. Client queries the server for the scheduled operation, then begins that operation.
In server-prompted mode, the Tivoli Storage Manager client registers its TCP/IP address with the server and waits until the server contacts the client to notify the client that a scheduled operation should be performed. The client then queries the server for the operation and executes the operation. Upon completing the operation, the client notifies the server that the operation has completed, either successfully or unsuccessfully. Server-prompted mode is initiated by the client starting the Tivoli Storage Manager client scheduling program using the command line. To start the program, enter dsmc schedule. To enable server prompted scheduling, change the client option sets so that the SCHEDMODE is PROMPTED.
11-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
dsm.sys
Polling PRompted
On the server, the administrator with system privileges must specify which central scheduling modes will be supported by the server. The Set SCHEDMODes command is used, and the supported parameters are: ANY: Indicates the server can support clients using either client polling or server prompted scheduling. ANY is the default and suggested value. POLLING: Indicates that only clients using client polling will be accepted. PROMPTED: Indicates that only clients using server-prompted mode will be accepted.
On the client, the options file must be updated with the SCHEDMODE option that is used to specify which mode the client scheduler will operate in. The option is specified as follows:
SCHEDMODe POlling | PRompted
This option is ignored except during the execution of the dsmc schedule command, which invokes the client portion of the central scheduling function.
11-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Users (root users on UNIX systems) set the scheduling mode on client nodes. They specify either the client polling or the server-prompted scheduling mode on the command line or in the client user options file (client system options file on UNIX systems).
11-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
MAXSCHEDSESSIONS
(must be set by an administer with System Privilege)
10
MAXCMDRETRIES: Specifies the maximum number of times you want the client scheduler on your workstation to attempt to process a scheduled command that fails. The TSM administrator can also set this option. If the TSM administrator specifies a value for this option, that value overrides what you specify in the client options file after your client node successfully contacts the TSM server. All clients support this option. For UNIX clients, this option goes in the client system options file. Set maxcmdretries: This command is used to specify the maximum number of times that a scheduler on a client node can retry a scheduled command that fails.
RETRYPERIOD: Specifies the number of minutes you want the client scheduler to wait between attempts to process a scheduled command that fails or between unsuccessful attempts to report results to the server. The TSM administrator can also set this option. If the TSM administrator specifies a value for this option, that value overrides what you specify in the client option file after your client node successfully contacts the TSM server. All clients support this option. For UNIX clients, this option goes in the client system options file. Set retryperiod: This command is used to specify the number of minutes the scheduler on a client node waits between retry attempts after a failed attempt to contact the server or after a scheduled command fails to process. Clients can set their own retry period at the time their scheduler program is started. You can use this command to set a global value for the retry period, which
IBM Tivoli Storage Manager 5.5 Implementation and Administration
11-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
will override the value specified by all clients. The value for the client is overridden only if the client is able to connect with the server. When setting the period between retry attempts, set a time period that permits more than one retry attempt within a typical startup window. This command is used in conjunction with the set maxcmdretries command to regulate the period of time and the number of retry attempts to execute a failed command.
SCHEDMODE: Specifies whether you want to use the polling mode (the client node periodically queries the server for scheduled work) or the prompted mode (the server contacts the client node when it is time to start a scheduled operation). All communication methods can use the client polling mode, but only TCP/IP can use the server prompted mode. SCHEDLOGNAME: Specifies the name and location of a file where you want Tivoli Storage Manager to store the schedule log. For UNIX clients, this option goes in the client system options file. When you run the schedule command, output from scheduled commands appears on the screen and can be directed to the file you specify with this option. SCHEDLOGRETENTION: Specifies the number of days to keep entries in the schedule log and whether to save the pruned entries. Tivoli Storage Manager prunes the log after every schedule is run if you tell Tivoli Storage Manager to prune. The default is not to prune the log. For UNIX clients, this option goes in the client system options file. SCHEDCMDDISABLE: Specifies whether to disable the scheduling of generic commands specified by your Tivoli Storage Manager administrator. MANAGEDSERVICES: Specifies whether the Storage Manager Client Acceptor service manages the Web client, the scheduler, or both.
MAXSCHEDSESSIONS
An administrator with System Privlege can set MAXSCHEDSESSIONS. Set maxschedsessions: This command is used to regulate the number of sessions that the server can use for processing scheduled work. This command specifies the maximum number of scheduled sessions as a percentage of the total number of server sessions available.
Set MAXSCHedsessions schedulepercent 80
To check, issue query status. Maxschedsessions is displayed as a number, not a percentage. This setting should be changed if client nodes receive messages that server sessions are not available when trying to execute scheduled events. If you find that scheduled sessions are not contacting the server, you may have a network error.
11-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
dsm.sys
11
QUERYSCHEDPERIOD: The value for this parameter can be set by each client node at the time the client scheduler program is started. You can set a global value for the period between attempts by the client to contact the server for scheduled work. This value overrides the value specified by the client. Set queryschedperiod: This command is used to regulate the frequency with which client nodes contact the server to obtain scheduled work when they are running in the client polling mode. Use the QUERYSCHEDPERIOD option to specify the number of hours you want the client scheduler to wait between attempts to contact the TSM server for scheduled work. This option applies only when the DSMC SCHEDMODE option is set to POLLING. Tivoli Storage Manager uses this option only when the dsmc schedule command is running. For UNIX clients, this option goes in the client system options file dsm.sys.
11-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
dsm.opt
TCPCLIENTAddress
TCPCLIENTPort
dsm.sys
Client options file example: SCHEDMODe COMMmethod TCPCLIENTAddress TCPCLIENTPort Prompted TCPip Addressdomain_name dot_address 1501
12
TCPCLIENTADDRESS: Specifies a TCP/IP address if your client node has more than one address, and you want the server to contact a different address than the one used to make initial contact with the server. For UNIX clients, this option goes in the client system options file. TCPCLIENTPORT: Specifies a TCP/IP port number if you want the TSM server to contact a different port than the one used to make initial contact with the server. If the default or specified port is busy, Tivoli Storage Manager attempts to use any other available port. For UNIX clients, this option goes in the client system options file.
11-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13
PRESCHEDULECMD and PRENSCHEDULECMD specify client OS commands that you want executed prior to the TSM schedule process. The difference between PRESCHEDULECMD and PRENSCHEDULECMD is that with PRESCHEDULECMD the schedule process waits for the client OS commands to complete before executing, whereas with PRENSCHEDULECMD, the schedule process does not wait. POSTSCHEDULECMD and POSTNSCHEDULECMD specify client OS commands that you want executed after the TSM scheduled action. The difference between POST and POSTN is the same as for PRE and PREN: POST waits for the OS commands to complete, whereas POSTN does not wait.
11-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
return code
meaning
. . .
14
The command-line client and scheduler provide reliable, consistent, and documented return codes and provide automation of client operations through user-written scripts. Administrators can now distinguish between scheduled backups that complete successfully with no skipped files and scheduled backups that complete successfully with one or more skipped files. Also, if the pre-schedulecmd command ends with nonzero return codes, the scheduled event will not run. This ensures that scheduled events will not run if prescheduled commands do not complete successfully.
11-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Example of Randomizing
IBM Software Group | Tivoli software
Example of Randomizing
NODE A NODE B NODE B NODE A NODE C NODE C
01:30
03:01
05:00
05:45
Randomize Period
Randomize Period
04:00
05:00
06:00
07:00
Scatter schedule start times across window. Balance network and server loads. % specification Defines portion of the startup window in which start times will randomly occur. Randomization period based on time client polls. Client polling mode only.
15
The purpose of randomizing the start time is to scatter scheduled work across the startup window. Randomizing balances the load on the server as well as the load on the networks without having to duplicate schedules except for their start times. Set randomize: This command is used to specify the degree to which start times are randomized within the startup window of each schedule for clients using the client polling mode. The maximum percentage of randomization allowed is 50%. This limit ensures that half of the startup window is available for retrying scheduled commands that have failed.
11-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Defining Schedules
IBM Software Group | Tivoli software
Defining Schedules
Defining schedules involves the following: System or policy privilege is required. Schedules are defined with a define schedule command. Schedules apply to a particular policy domain. Define association command associates client with schedule.
16
Schedules are created and maintained in the TSM database by an administrator with either system or policy privileges and are defined with a define schedule command and apply to a particular policy domain. Administrators use the define association command to associate clients (that are in the domain) with a schedule. A client may be associated with more than one schedule, and any number of schedules can be defined in a policy domain. A client executes schedules serially.
11-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
17
POLICY DOMAIN NAME: Specifies the name of the policy domain to which this schedule belongs. This parameter is required. SCHEDULE NAME: Specifies the name of the schedule to be defined. This parameter is required. The maximum length of the name is 30 characters. DESCRIPTION: Specifies a description of the schedule. This parameter is optional. The maximum description length is 255 characters. The description must be enclosed in quotation marks if it contains any blank characters. The default is no description. ACTION: Specifies the action that occurs when this schedule is executed. This parameter is optional. The default value is INCREMENTAL. Possible values are: INCREMENTAL: Specifies that this schedule initiates the backup of any files that have changed since the last backup and for which the specified time between backups has elapsed. SELECTIVE: Specifies that this schedule backs up only the files specified with the OBJECTS parameter. ARCHIVE: Specifies that this schedule archives the files specified with the OBJECTS parameter.
11-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
RESTORE: Specifies that this schedule restores the files specified with the OBJECTS parameter. RETRIEVE: Specifies that this schedule retrieves the files specified with the OBJECTS parameter. COMMAND: Specifies that the action is to be a client operating system command string specified with the OBJECTS parameter. MACRO: Specifies that a macro whose file name is specified with the OBJECTS parameter is to be executed.
OPTIONS: Specifies options that are supplied to the dsmc command at the time the schedule is executed. Only those options that are valid on the dsmc command line may be specified for this parameter. This parameter is optional. You can specify most options from the client option file. Each option is preceded by a hyphen and delimited with a space. The option string must be enclosed in quotation marks if it contains any blank characters. OBJECTS: Specifies the objects for which the specified action is performed. This parameter is required except when ACTION = INCREMENTAL. The allowed objects depend on the action you specify with the ACTION parameter and the operating system used by the clients associated with the schedule. PRIORITY: Specifies the priority value for a schedule. This parameter is optional. You can specify an integer in the range of 1-10, inclusive, with 1 being the highest priority and 10 being the lowest. The default value is 5. If two or more schedules for a given client have the same window start time, this value determines the order of execution. The schedule with the highest priority starts first. START DATE: Specifies the date for the beginning of the window in which the schedule is first executed. This parameter is optional. The default value is the current date. This parameter is used in conjunction with the STARTTIME parameter to specify when the initial startup window begins. START TIME: Specifies the time for the beginning of the window in which the schedule is first executed, in HH:MM format. This parameter is optional. The default value is the current time. This parameter is used in conjunction with the STARTDATE parameter to specify when the initial startup window begins. DURATION: Specifies the number of units that define the length of the startup window. This parameter is optional. This value must be in the range of 1-999, inclusive. The default value is 1. This parameter is used in conjunction with the DURUNITS parameter to specify the length of the startup window. For example, if you specify DURATION = 20 and DURUNITS = MINUTES, the schedule must be started within 20 minutes of the start date and start time. DURATION UNITS: Specifies the time units used to determine the duration of the window in which the schedule can start. This parameter is optional. The default value is HOURS. This parameter is used in conjunction with the
11-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
DURATION parameter to specify how long the startup window remains open to execute the schedule. INDEFINITE: Specifies that the startup window has an indefinite duration. The schedule can run any time after the scheduled start time until the schedule expires. You cannot specify duration units of INDEFINITE unless you also specify PERIOD UNITS as ONETIME. PERIOD: Specifies the length of time between startup windows for this schedule. This parameter is optional. You can specify an integer in the range of 1-999, inclusive. The default value is 1. This parameter is used in conjunction with the PERUNITS parameter to specify the period between startup windows. For example, if you specify PERIOD = 5 and PERUNITS = DAYS (assuming that DAYOFWEEK = ANY), the operation is scheduled every five days after the initial start date and start time. PERIOD UNITS: Specifies the time units used to determine the period between startup windows for this schedule. This parameter is optional. The default value is DAYS. DAY OF WEEK: Specifies the day of the week on which the startup window begins. This parameter is optional. If the beginning of the calculated startup window falls on a day that does not correspond with your value for the DAY OF WEEK parameter, the startup window will be shifted forward in 24-hour increments until the DAY of WEEK parameter is satisfied. If you select a value for DAY OF WEEK other than ANY, depending on the values for PERIOD and PERIOD UNITS, schedules may not be executed when you would expect. Use the query event command to project when schedules will be executed and thereby ensure that the desired result is achieved. The default value is ANY. EXPIRATION: Specifies the date on which this schedule is no longer used, use the MM/DD/YYYY format. This parameter is optional. The default value is NEVER.
11-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
set maxsessions
100 90
DSM.OPT DSM.SYS (UNIX) SCHEDMODE PROMPTED COMMMETHOD TCPIP
define schedule DOMAIN SCHEDULENAME 23:30 ACTION=I, STARTT = DUR=6, PERIOD=1 DURU=HOURS, PERU=DAYS DAYOFWEEK=WEEKDAY
18
11-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Client Node Schedule: 1. Click Policy Domains and Client Nodes in the Tivoli Storage Manager tree. 2. In the Servers table, click the name of a server. 3. In the policy domains notebook for the server, click the name of a domain. 4. In the properties portlet for the domain, click Node Schedules. 5. In the table, click Select Action, select Create a Schedule.
Schedules can also be Viewed and Modified with the Administration Center.
19
Use the Web interface to create a new schedule. A schedule can have two forms, depending on whether the schedule applies to client operations or administrative commands. The syntax and parameters for each form are defined separately.
11-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20
11-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Example:
define schedule xyz_critical_project weekly_backup startdate=06/07/2003 starttime=23:00 duration=4 durunits=hours perunits=weeks dayofweek=saturday options=-quiet
11-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Enhanced Scheduling
IBM Software Group | Tivoli software
Enhanced Scheduling
The enhanced schedule style, also known as calendar-based scheduling, increases flexibility for client and administrative schedules. Calendar-based scheduling can be defined with Administration Center or with the command line. To define an enhanced style schedule on the command line, issue the following command. define schedule test_lab starttime=20:00 \ action=archive object=/home/lab/tests/* \ duration=1 durunits=hour schedstyle=enhanced month=mar,jun,sep,dec \ weekofmonth=last dayofweek=fri
22
Schedules can be classic or enhanced, depending on how the interval to the next execution is defined. Classic schedules allow the period to be as small as an hour. Enhanced schedules allow actions to be executed on specific days. The Tivoli Storage Manager scheduler provides calendar-based scheduling for increased flexibility of client and administrative schedules. SCHEDSTYLE defines either the interval between times when a schedule should run or the days on which it should run. The style can be either classic or enhanced. The default is the classic syntax. For classic schedules, these parameters are allowed: PERIOD, PERUNITS, and DAYOFWEEK. These parameters are not allowed: MONTH, DAYOFMONTH, and WEEKOFMONTH.
For enhanced schedules, these parameters are allowed: MONTH, DAYOFMONTH, WEEKOFMONTH, and DAYOFWEEK. These parameters are not allowed: PERIOD and PERUNITS.
11-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
23
11-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Schedule Example
IBM Software Group | Tivoli software
Schedule Example
24:00 Backup
Start
Backup
Start
01:00
01:00
Startup window: Starttime = 01:00 Function: Action = Incremental Backup Time between windows: Period = 2 days Duration = 6 hours
Action must start within startup window. Action may not complete within window. Scheduled operations run serially on client. Event log maintained on server.
24
A schedule is given a startup window that defines when a scheduled operation is to start. The client must start the scheduled operation within the startup window. If the client or the network is unavailable during the startup window, the client will wait until the next occurrence of the schedule's startup window to begin the operation. The scheduled operation must start within the window, however, it may complete outside of the window. A log is maintained on the server, which records information about the scheduled events. The administrator can query the log for information about started, completed, and failed events.
11-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Relative Date
Date specification can be written as a displacement from the current date. The current date is furnished with the keyword TODAY.
Relative Time
Time specification can be written as a displacement from the current time. The current time is furnished with the keyword NOW.
11-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Copying a Schedule
The copy schedule command copies the schedule to another domain. An administrator can define any number of schedules in a policy domain.
Copying a Schedule
Schedule descriptions and parameters are copied with the copy schedule command. The copied schedule can then be edited.
To copy the LABSYS schedule from policy domain DOMAIN1 to DOMAIN2 and name the new schedule LABSYSNEW, enter the following command. copy schedule domain1 labsys domain2 labsysnew
26
11-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
d e fi n e as
socia
tion
define association
tion ocia s s a
schedule daily_incr
ine def
DOMAINNAME Specifies the name of the policy domain to which the schedule belongs. This parameter is required. SCHEDULENAME: Specifies the name of the schedule that you want to associate with one or more clients. This parameter is required. NODENAME: Specifies the name of the client node to be associated with the specified schedule. This parameter is required. You can specify a list of clients that you want to associate with the specified schedule. Commas, with no intervening spaces, separate the items in the list. You can use a pattern matching expression to specify a name. All matching clients are associated with the specified schedule. In some commands, such as the query commands, you can use wildcard characters to create a pattern-matching expression that specifies more than one object. Using wildcard characters makes it easier to tailor a command to your needs.
11-31
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The wildcard characters you use depend on the operating system from which you issue commands. For example, you can use wildcard characters such as an asterisk (*) to match any (0 or more) characters or you can use a question mark (?), or a percent sign (%) to match exactly one character. If a client is listed, but is already associated with the specified schedule or is not assigned to the domain to which the schedule belongs, the command has no effect for that client.
11-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The SET CLIENTACTDURATION command sets how long the one-time schedule remains active. The client action duration can be viewed with the QUERY STATUS command. The defaults for a client action are: Schedule priority is set to 1 Duration is set to 5 days Period is set to Onetime Scheduler services must be running.
28
Define clientaction: Allows a TSM administrator to have a command executed on a TSM client without defining a schedule and associating the schedule with the client. With the define clientaction command, the command executes once only. Clients may be selected from multiple domains by the use of the NODE and DOMAIN parameters. Pattern matching expressions may be used in the node list specified, and if no nodes are selected, the action is sent to all nodes. When a command is specified with the define clientaction command, the speed with which that command is executed depends entirely upon the scheduling mode for the desired client. If the client schedule mode is server-prompted, then the command is executed immediately. If the client concerned is using a schedule mode of POLLING, then the action is executed the next time the client queries the server for its schedules (governed by the QUERYSCHEDPERIOD client parameter). WAIT=[YES | NO] parameter, when used with define clientaction command, specifies whether to wait for a scheduled client operation to complete. WAIT=YES allows for the clientaction command to complete before processing the next step. This synchronous operation provides the serialization in a script. The default is NO.
11-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Clients for which actions are defined must have their scheduled client running. Set clientactduration: Specifies the duration in days for the schedule and the number of days it is retained in the TSM database before automatically being deleted. If this value is set to 0, the schedule duration is indefinite and the schedule and associations are not deleted. Only schedules and associations defined by the define clientaction are deleted from the TSM database automatically. The value of CLIENTACTDURATION may be viewed with the query status command. The defaults for a client action are: Schedule priority is set to 1. Duration is set to 5 days. Period is set to Onetime.
11-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Executing a scheduled operating system command operation (action=cmd). Executing a scheduled operating system command operation using the preschedule or postschedule or presnapshot or postsnapshot command defined in the Tivoli Storage Manager server client option set or define schedule command. Executing a scheduled restore or retrieve operation (action=restore or action=retrieve).
29
11-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
30
If a preschedule or postschedule command is defined by both the client and the Tivoli Storage Manager administrator, the command defined by the Tivoli Storage Manager administrator will not override the corresponding command defined in the client option file. If a presnapshot or postsnapshot command is defined by both the client and the Tivoli Storage Manager administrator, the command defined by the Tivoli Storage Manager administrator will not override the corresponding command defined in the client option file.
11-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The format equal detail (f=d) option with the command requests and lists the output in a different format and provides more details.
31
11-37
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Administrator commands can be handled by Tivoli Storage Manager scheduler to: Automate server operations. Ensure server resources are available to clients. Ensure server functions performed with minimal manual intervention.
32
TSM server includes a central scheduling component that is used to schedule the automatic execution of client functions. This scheduler provides facilities for defining, updating, querying, and deleting client schedules, associating schedules with one or more client nodes, and reporting on the success or failure for each scheduled event. A similar mechanism is required to automate server operations. Many of the administrative commands can be used to tune server operations and start functions that require significant server or system resources. The ability to automate the execution of these commands helps the administrator ensure that: Server resources are available when needed by clients Server functions are performed with minimal manual intervention
Each TSM schedule can schedule only one administrative command. When the schedule executes, it has the same authority as when the administrator originally defined it. It can be
11-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
in the ACTIVE or INACTIVE state. The default is INACTIVE. The active state indicates that the schedule is eligible for execution when the specified command window occurs. An administrator can also schedule commands that activate or inactivate other scheduled commands. The following processes are not supported by the administrative command scheduler: Command macros (as used on the administrative client) Redirection of command output
11-39
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
What to consider when scheduling an administrative command: Type of schedule command can be administrative or client. Type=Administrative Type=Client Output from execution of administrative tasks is sent to the activity log. Administrative tasks are not associated with a policy domain.
33
The query event and delete event commands are modified to view and remove administrative command schedule status. A Type=Administrative is added to events so that you can discriminate between Type=Client and Type=Administrative. Redirection of command output is not allowed; instead, output is written to the activity log. Using the administrative client and the query actlog command, the output can be collected at a later time and placed in a file. Schedules defined as Type=Client are identified by policy domain and schedule names. Schedules defined as Type=Administrative are only qualified by a schedule name. The schedules do not need to be associated to nodes or servers by names.
11-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
34
If you define a schedule to lower the high threshold to zero, when the schedule executes, migration will automatically begin. You can then have a schedule that resets the threshold to your usual percentage. To improve tape drive usability, ensure that reclamation occurs during hours when backup or threshold migration does not occur. You can schedule a command to lower the threshold for reclamation processing to zero, so that when the command executes, reclamation will automatically begin. TSM server database backup can be automated to ensure a regularly scheduled backup is taken. Because file inventory expiration is a CPU-consuming job, you can schedule it for hours when the CPU load is low. Backup of the TSM server storage pool volumes can be automated to ensure that this task is done periodically and concurrently with the TSM server database backup.
11-41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
define schedule backup_archivepool type=administrative cmd="backup stgpool archivepool recoverypool" active=yes starttime=18:00 period=3
Define a schedule named BACKUP_ARCHIVEPOOL that backs up the primary storage pool ARCHIVEPOOL to the copy storage pool RECOVERYPOOL. Select an enhanced schedule and run on the following days of the month: 7, 14, 21, and 28.
define schedule backup_archivepool type=administrative cmd="backup stgpool archivepool recoverypool" schedstyle=enhanced dayofmonth=7,14,21,28
35
11-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Administrative Schedule: 1. Click Storage Devices in the Tivoli Storage Manager tree. 2. In the Servers table, click a server name. 3. In the properties portlet for the server, click the Administrative Schedules tab. 4. In the table, click Select Action, and select Create a Schedule.
Schedules can also be Viewed and Modified with the Administration Center.
36
37
11-43
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
38
You may want to change how many devices are allocated to different server activities, such as migration. For example, you may want fewer devices during the day and more at night because during the day the devices might be shared with other applications. Because volume history records are cumulative, you can delete older records periodically. The output of a scheduled administrative command is directed to the console and recorded in the activity log. Consequently, if Tivoli Storage Manager allowed you to schedule the query actlog command, the activity log size would immediately double.
Note: The following client scheduling constructs do not apply to administrative command schedules:
11-44
Maximum scheduled sessions Schedule randomization percentage Maximum command retries Retry period Scheduling modes
Copyright IBM Corp. 2008
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Student Exercise
IBM Software Group | Tivoli software
Student Exercise
39
Open your Student Exercises and perform the exercises for this unit.
11-45
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. In _________________ mode, the Tivoli Storage Manager client registers its TCP/IP address with the server and waits until the server contacts the client to notify the client that a scheduled operation should be performed. 2. In ________________ mode, the TSM client periodically queries or polls the server for a scheduled operation and the date and time that the operation is to start. The client then waits until it is time to start the scheduled operation and executes the operation. 3. On the server, the administrator with system privilege must specify which central scheduling modes will be supported by the server. The set schedmodes command is used and the supported parameters include (select three): a. ANY b. SERVER c. CLIENT d. POLLING e. PROMPTED 4. With ________________ the schedule process waits for the client OS commands to complete before executing, whereas with ______________________, the schedule process does not wait. (PREschedulecmd/PRENschedulecmd) 5. The ____________________ command copies the schedule to another domain.
11-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
11-47
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Answers
1. In _________________ mode, the Tivoli Storage Manager client registers its TCP/IP address with the server and waits until the server contacts the client to notify the client that a scheduled operation should be performed. prompted 2. In ________________ mode, the TSM client periodically queries or polls the server for a scheduled operation and the date and time that the operation is to start. The client then waits until it is time to start the scheduled operation and executes the operation. client polling 3. On the server, the administrator with system privilege must specify which central scheduling modes will be supported by the server. The set schedmodes command is used and the supported parameters include (select three): a. ANY b. SERVER c. CLIENT d. POLLING e. PROMPTED a. ANY, d. POLLING, and e. PROMPTED 4. With ________________ the schedule process waits for the client OS commands to complete before executing, whereas with ______________________, the schedule process does not wait. (PREschedulecmd/PRENschedulecmd) PREschedulecmd, PRENschedulecmd 5. The ____________________ command copies the schedule to another domain. copy schedule
11-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Describe the difference between client polling and server prompted methods. Identify and describe available scheduler options. Associate scheduler options with the schedule method to which it applies. Identify the tasks that can be scheduled for a client. Create a schedule. Copy a schedule. Define association of client to schedule.
40
11-49
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
11-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-1
Introduction
Tivoli Storage Manager provides the ability to log client messages as server events. This unit introduces Tivoli Storage Manager logging and monitoring functions.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Identify client message candidates. Describe client event formatting. Query the activity log for events. Query the event log. Select from summary. Centralize event logging on the TSM server. Create reports with the select statement. Control event logging.
12-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
This lesson explains which messages can be logged and how client event monitoring is configured, including: Which client messages can be logged as events and how these messages are formatted. How client events are enabled and processed. How client events are stored, displayed, and queried.
12-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
For API messages, the API application is responsible for placing text into the string buffer.
4
Loggable Messages
The intention of client error logging is to notify the server of problems encountered during a client operation. Therefore, client message candidates are those messages that reflect an error condition. Client statistics are also passed to the server.
Nonloggable Messages
The following message types are not logged as events: Session, communication, and TCA errors: When encountering a session, communication, or a Trusted Communication Agent (TCA) error, the client is unable to initiate a session with the Tivoli Storage Manager server. Therefore the client cannot pass any message of this type to the server. Client memory errors: Because of insufficient memory resources, the client is not able to log these types of messages.
12-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Informational messages: Informational messages do not contain an error condition and therefore are not logged. Server disabled messages: During the client sign-on procedure the Tivoli Storage Manager server provides information to the client about which messages should be logged to the server. Disabled messages are not passed to the server.
API Messages
For all application programming interface (API) related messages, it is the responsibility of the API to place an appropriate message text into the string buffer.
12-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Event formatting
Logged locally on client as ANS message. Externally appears in 4000-4999 range. Event message assigned ANE messages: ANE4007E.
The event message contains enough information that the message can be processed outside where it has occurred. Where it is applicable, the event contains the name of the object and file space.
Event Formatting
Client messages in the ANS4000 to ANS4999 range are eligible to be sent to the server as client events. Eligible client messages will be sent to the server as events using an ANE prefix instead of ANS. These client messages will be logged locally in the client schedule or error logs as appropriate.
12-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Event Content
Client event messages contain enough information to be processed outside of the context where the message occurred. The client assigns the correct message number and provides information about related object or file space names. The server adds information such as time stamp, node name, or any other relevant information.
Message Formatting
IBM Software Group | Tivoli software
Message Formatting
Messages are seen in the following format:
A N [ R S E ] # # # # [ I W E S]
Type: Levels:
####
6
12-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Event Receiving
Eligible events
Any client message which can be logged All server messages with an associated message number
Event receivers
TSM server console Activity log Event viewer (Windows) File exit User exit Server-to-server event logging Tivoli Enterprise Console (TEC) Tivoli NetView SNMP manager (AIX only)
7
Client messages are divided into two types of messages: loggable and nonloggable messages. All loggable messages can be enabled as events. Unlike client messages, there is no distinction for server events. Any server message that has an associated message number is an event. All events, regardless of being client or server events, can be enabled or disabled for the event receivers. Each interface supported by the central logging mechanism is called an event receiver. Events from clients or servers can be passed to one or more of the receivers. It is possible to send the same events to different receivers or to enable a group of events for specific receivers. You can choose any combination that suits your needs.
12-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
ENABLE EVENTS Enables specific events to be passed to one or more receiver. DISABLE EVENTS Disables specific events for one or more receiver. QUERY ENABLED Displays a list of enabled or disabled events. QUERY EVENTRULES
Displays a summary of enabled events.
Begin Eventlogging
This command begins event logging for one or more receivers. Event logging is automatically turned on for receivers configured by default (server console and activity log). To begin event logging for the NetView receiver, enter:
tsm> begin eventlogging netview
If no receiver is specified, or if ALL is specified, logging begins for all configured receivers.
Enable Events
This command is used to enable specific events or groups of events for one or more receivers. With this command the following options are specified: Receiver name Message number or message severity
12-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
If the NODENAME parameter is specified, the events entered must be client events. When enabling individual client events, the four-digit message number must be prefixed with ANE:
tsm> enable event userexit ANE4027,ANE4034 node=*
This prefix enables all nodes to send the following client events to a user exit:
ANE4027 internal program message encountered and ANE4034 unknown system error
To enable only server events for a receiver, omit the NODENAME parameter. Individual server messages have to be specified with the prefix ANR:
tsm> enable event snmp ANR0131
This prefix enables the server error message Server DB space exhausted for the SNMP receiver.
Disable Events
The disable event command works similarly to the enable event command but instead of enabling specific events, the specified events are disabled. The command requires the same parameters, which are: Receiver name Message name or message severity Node name (optionally) The parameter specifications are based on the same rules as they are for the enable event command. You cannot disable server events.
12-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Query Enable
The query enable command displays either a list of enabled events or a list of disabled events whichever is shorter. To display all enabled server events for receiver file enter:
tsm> query enable file
All server events are disabled for the receiver file. In the following example, no server events are enabled for this receiver.
Query Enable
To query enabled client events of node DBSERVER1 for the console receiver, enter the following command:
In this example, client events have been enabled and certain individual events disabled. The result will be the shorter of the enabled or disabled events list.
Query Eventrules
The query eventrules command displays a summary of events enabled:
tsm> query eventrules Date/Time Server Event Rules -------------------- -----------------------------------08/08/2000 09:21:33 ENABLE EVENTS FILE ALL 08/09/2000 13:15:29 ENABLE EVENTS SNMP ALL 08/14/2000 17:53:49 ENABLE EVENTS USEREXIT ERROR
12-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Entering query eventrules displays the enabled server events. Entering the same command with a NODE= option will display enabled client events for that node or nodes.
End Eventlogging
The counterpart to the begin eventlogging command is the end eventlogging command. It stops event logging for one or more receivers. An administrator may want to end event logging for performance reasons.
12-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10
When an eligible client message occurs, the message number is looked up in the client message event repository and assigned the appropriate ANE message number. The event message is formatted with the related object or file space name and is sent to the Tivoli Storage Manager server in this format. The server receives the event message and then adds information such as node name from where the event was received. The session number from which the original client error message originated is also added. If the event has been enabled for the Tivoli Storage Manager console, the event appears as soon as the information has been formatted. Message prefixes are: ANR: Server message ANS: Client message ANE: Event message
IBM Tivoli Storage Manager 5.5 Implementationand Administration
12-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
database servers
TSM console
laboratory systems
11
This example illustrates client events that are enabled for the Tivoli Storage Manager console. The default setting is ALL ENABLED. When enabling disabled events, the following information must be specified: The destination to which events are passed for monitoring. In this case, the destination is the Tivoli Storage Manager console. The console will show all related event information. For example, if the message occurred during a scheduled operation, the schedule name is also displayed. Which messages are enabled for the server console. The selection can be done by a list of individual message names, severity types, or a combination of both. If all loggable messages should be tracked, specify ALL. Which client nodes participate in central logging. When client events are enabled, a node name must be specified. You can specify a list of node names, or node names can be specified by using the wildcard character (*).
12-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
To enable all nodes to log events of ERROR or SEVERE severity to the Tivoli Storage Manager console, the following enable event command can be issued by an administrator:
tsm> enable events console error,severe node=*
Client events are displayed as soon as they have occurred on the client and have been passed to the Tivoli Storage Manager server. Client events should not be disabled.
12-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
server events
critical critical project project server server
Message Message (events) (events)
event filter
12
Tivoli Storage Manager server events are always stored in the activity log and cannot be disabled. Server information in the activity log is often needed to resolve critical situations. All client events are also enabled for the server activity log by default.
12-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Use the query status command to display the management type and value of the setting for the activity log.
13
If the activity log occupies less space than the maximum allowed, no pruning is done. This log management option is in addition to the existing option to prune the log based on age of the entries. The query status command is updated to display the management type and value of the setting for the activity log.
12-17
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The query actlog command has the following parameters for extended event querying.
Parameter
ORIGINATOR NODENAME
Description Event origin: Server, client, or all events. Client node name: To display all events that derived from this node. Schedule name and related domain name: To display all events that have been logged for the specified scheduled client activity. Session ID of Tivoli Storage Manager client session: To display all logged events that originated from the specified client session. Owner name: To display all events that have been logged for a particular owner.
SESSION ID
OWNERNAME
12-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Parameter
Description Specifies a text string that you want to search for in the activity log. Enclose the string expression in quotation marks if it contains blanks. You can use text and a wildcard character to specify this string. This parameter is optional.
SEARCH
The following example command queries for any client events in the last seven days from the node named critproj, associated with the DAILY_INC client schedule:
tsm> query actlog begindate=-7 originator=client node=critproj sched=daily_inc
12-19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
15
Event Logging, Event Receivers, SNMP Logging, and Tivoli Enterprise Console options can be defined and viewed in the Administration Center, in a servers properties notebook.
12-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Audit Logs
IBM Software Group | Tivoli software
Audit Logs
Auditlogging and Auditlogname The auditlogging option generates an audit log with an entry for each file that is processed during an incremental, selective, archive, restore, or retrieve operation. The auditlogname option specifies the path and file name where you want to store audit log information. This option applies when audit logging is enabled.
02/02/0818:04:24 ANS1650I Command: sel c:\results\file.txt 02/02/0818:04:24 ANS1651I Backed Up: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1652I Archived: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1653I Updated: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1654E Failed: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1655I Restored: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1656I Retrieved: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1657I Expired: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1658I Deleted: \\project\c$\results\file.txt 02/02/0818:04:24 ANS1659I Skipped: \\project\c$\results\file.txt
17
The audit log can be configured for either basic or full level of information. The example in the slide is the basic level. In addition to all of the events recorded in the basic level, the full level records information for a file that has been excluded or not sent during a progressive incremental backup operation because there was no change in the file. The audit log should not be a substitute for the standard error log (dsmerror.log) or the schedule log (dsmsched.log).
12-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Database Reporting
The Select statement can be used to query the Tivoli Storage Manager server database using SQL select statements.
Database Reporting
Some queries require server time and resources and can impact performance.
18
An open database connectivity (ODBC) driver is provided with Tivoli Storage Manager. This driver allows desktop database products such as Lotus Approach or Microsoft Access to be connected to the Tivoli Storage Manager server database. This connection enables administrators to use these tools to perform Tivoli Storage Manager server queries in an easy-to-use graphical manner. You can fill the recovery log if you run a select statement against the backup or archive tables.
12-23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SQL Select
IBM Software Group | Tivoli software
SQL Select
SQL SELECT Statement Syntax SELECT column_name | aggregate_function [ AS output_column_name ], ... FROM table_name, ... [ WHERE predicate ] [ GROUP BY [table_name.] column_name ] [ HAVING predicate ] [ ORDER BY output_column_name [ ASC | DESC ], ...
19
The simplest form of a select statement is to select all columns from a table. To use the SQL interface, a basic understanding of the SQL select statement is required. The syntax of the TSM select statement is compliant with ANSI SQL syntax but limited from the full specification provided by the SQL92/93 standard. These limitations reduce query complexity and the corresponding load on the Tivoli Storage Manager server database. An SQL select statement can be divided into a number of clauses. Type help select for online assistance.
12-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
Operational Reporting focuses on the information available in the TSM database and does not maintain a separate database of information. This makes it very useful for day-to-day operations but not for trending and advanced analysis.
The Operational Reporting application is on a CD shipped with IBM Tivoli Storage Manager code.
20
There is additional information on TSM Operational Reporting on your Student Resources CD.
12-25
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
12-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
Operational Reports
IBM Software Group | Tivoli software
Daily Report
22
23
12-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
Hourly Monitoring
IBM Software Group | Tivoli software
Hourly Monitor
24
12-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
Refer to the documentation on your Student Resources CD for more information on Operational Reporting.
25
Administrators or node owners can be notified by desktop message, e-mail, or text message paging when a scheduled backup did not complete (missed or failed). This feature is enabled in the Microsoft Management Console (MMC).
12-29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
Student Exercise
Student Exercise
26
Open your Student Exercises and perform the exercises for this unit.
12-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1. True or False? The monitoring of client events will only monitor scheduled client activity. 2. True or False? The only client messages that can be logged are those that reflect an error condition. 3. True or False? The activity log is used to store client and server events. 4. True or False? The query actlog command allows you to query a specific node's centrally logged events. 5. True or False? Eligible client and server events can be reported to interfaces external to the Tivoli Storage Manager server. 6. True or False? For a given event the Tivoli Storage Manager administrator has to choose which single event receiver is to receive the event.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
Review Answers
1. True or False? The monitoring of client events will only monitor scheduled client activity. false 2. True or False? The only client messages that can be logged are those that reflect an error condition. false 3. True or False? The activity log is used to store client and server events. true 4. True or False? The query actlog command allows you to query a specific node's centrally logged events. true 5. True or False? Eligible client and server events can be reported to interfaces external to the Tivoli Storage Manager server. true 6. True or False? For a given event the Tivoli Storage Manager administrator has to choose which single event receiver is to receive the event. false
12-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Identify client message candidates. Describe client event formatting. Query the activity log for events. Query the event log. Select from summary. Centralize event logging on the TSM server. Create reports with the select statement. Control event logging.
27
12-33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Unit 12: Monitoring and Event Logging IBM Tivoli Storage Manager Operational Reporting
12-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-1
Once you have reached the Storage and Optimization Web page, you can navigate to specific products, storage solutions, and other links, including IBM TotalStorage solutions. One IBM TotalStorage product that can enhance your storage solution is IBM TotalStorage Productivity Center. The IBM TotalStorage Productivity Center (TPC) includes: IBM TotalStorage Productivity Center for Data (previously known as IBM Tivoli Storage Resource Manager) IBM TotalStorage Productivity Center for Fabric (previously known as IBM Tivoli Storage Area Network Manager) IBM TotalStorage Productivity Center for Disk IBM TotalStorage Productivity Center for Replication
A-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
IBM Tivoli Storage Manager for Mail IBM Tivoli Storage Manager for Hardware IBM Tivoli Storage Manager for Databases IBM Tivoli Storage Manager for Application Servers IBM Tivoli Storage Manager for Enterprise Resource Planning
The above were previously known as Tivoli Data Protection agents, or TDPs.
IBM offers a variety of data protection products (Tivoli Data Protection or TDP) that work with IBM Tivoli Storage Manager to protect enterprise data. IBM Tivoli Storage Manager for Mail is a software module for IBM Tivoli Storage Manager that automates the data protection of e-mail servers running either Lotus Domino or Microsoft Exchange. This module utilizes the application program interfaces (APIs) provided by e-mail application vendors to perform online hot backups without shutting down the e-mail server and improves data restore performance. IBM Tivoli Storage Manager for Hardware improves the data protection of your business-critical databases and Enterprise Resource Planning (ERP) applications that require 24-hour by 365-day availability. This software module helps IBM Tivoli Storage Manager and its other data protection modules perform high-efficiency data backups and archives of your most business-critical applications. These operations are performed with minimal impact on database or ERP servers. IBM Tivoli Storage Manager for Databases is a software module that works with IBM Tivoli Storage Manager to exploits the backup-certified utilities and interfaces provided for Oracle, Microsoft SQL Server, and Informix.Tivoli Storage Manager for Databases in conjunction with Tivoli Storage Manager automates data protection tasks. Database servers can continue running their primary applications while they back up and restore data to and from offline storage.
Copyright IBM Corp. 2008 IBM Tivoli Storage Manager 5.5 Implementation and Administration
A-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
IBM Tivoli Storage Manager for Application Servers is a software module that works with IBM Tivoli Storage Manager to better protect the infrastructure and application data and improve the availability of WebSphere Application Servers. It works with the WebSphere Application Server software to provide an applet GUI to do reproducible, automated online backup of a WebSphere Application Server environment, including the WebSphere administration database (DB2 Universal Database), configuration data, and deployed application program files. Specifically designed and optimized for the SAP R/3 environment, IBM Tivoli Storage Manager for Enterprise Resource Planning (ERP). Provides automated data protection Reduces the CPU performance impact of data backups and restores on the R/3 server Reduces the administrative workload necessary to meet data protection requirements Is built on the SAP database Includes a set of database administration functions integrated with R/3 for database control and administration
These topics are covered in the IBM Tivoli Storage Manager 5.5 Advanced Administration, Tuning, and Troubleshooting course (see the IBM Tivoli Storage Manager curriculum roadmap).
A-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
IBM Tivoli Storage Manager for System Backup and Recovery (Tivoli SysBack) for AIX and Solaris
Cristie Bare Machine Recovery for Windows, Linux, HP, and Solaris (go to www.cristie.com for supported platforms)
This topic is covered in the IBM Tivoli Storage Manager 5.5 Extended Edition Disaster Recovery course (see the IBM Tivoli Storage Manager curriculum roadmap).
A-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
IBM System Archive Storage Manager facilitates compliance with the most stringent regulatory requirements in the most flexible and function-rich manner. It helps manage and simplify the retrieval of the ever-increasing amount of data that organizations must retain for strict records retention regulations. Many of the regulations demand the archiving of records, e-mails, design documents, and other data for many years, in addition to requiring that the data is not changed or deleted. This topic is covered in Chapter 4 of the Understanding the IBM TotalStorage DR550 RedBook, on your Student Resources CD.
A-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Hierarchical Storage Management (HSM) Products: IBM Tivoli Storage Manager for Space Management IBM Tivoli Storage Manager HSM for Windows
Complementary Products: IBM Tivoli Storage Manager for Storage Area Networks Tivoli Continuous Data Protection (CDP) for Files
A-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Migrating files to a distributed storage device takes advantage of lowercost storage resources that are available in your network environment for infrequently used files, thus allowing more free space on your local system.
IBM Tivoli Storage Manager supports: IBM Tivoli Storage Manager for Space Management (for UNIX) IBM Tivoli Storage Manager HSM for Windows
A-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
migrate recall
8
IBM Tivoli Storage Manager for Space Management frees administrators and users from manual file system pruning tasks and defers the need to purchase additional disk storage by automatically and transparently migrating rarely accessed files to Tivoli Storage Manager storage while the files most frequently used remain in the local file system.
A-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
TSM Server
data
migrate recall
9
IBM Tivoli Storage Manager Hierarchical Storage Management for Windows helps you control runaway storage growth by facilitating the movement of inactive Windows files to cost-appropriate media. Because it is a policy-based management system, you can specify the criteria. For example, you can select files based on the last date the file was accessed or modified, or the file type. Your selection determines where files are stored. As a result, the solution helps you maximize the cost-effectiveness of your storage devices while supporting your business priorities. With Tivoli Storage Manager HSM for Windows, you can automatically migrate individual files, parts of Windows file system, or complete file systems to an IBM Tivoli Storage Manager server. To the data owners, migrated files appear on the local file system as they did before they were migrated, but they occupy less disk space on the local file system. You can access, open and update these migrated files just as you would any other file.
A-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
LAN-free backups and restores use storage area networks (SANs) for data movement between clients and the server, decreasing the network traffic on the local area network (LAN). Shared storage resources (disk, tape) are accessible to both the client and the server over the SAN.
10
The IBM Tivoli Storage Manager for Storage Area Networks extension allows SANconnected Tivoli Storage Manager servers and Tivoli Storage Manager backup-archive client computers to make maximum use of their direct network connection to storage. This software extension allows both servers and client computers to make the bulk of their backup-restore and archive-retrieve data transfers over the SAN instead of the LAN, either directly to tape or to the Tivoli Storage Manager disk storage pool. This ability greatly reduces the performance impact of data protection on the LAN while also reducing CPU utilization on both client and server.
A-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Replication
Disk-to-disk duplication Fast Real-time for high-importance files Tolerant of transient networks Multiple targets
Traditional Backup
Versioning of files Point-in-time restore Central administration Archiving (vaulting) Retention Highly scalable
11
With Tivoli Continuous Data Protection for Files, you can specify as many as three target backup or replication areas for: High-priority files Local disk File server Network-attached storage (NAS) appliance IBM Tivoli Storage Manager server
These areas will capture every save of a file when it occurs to help protect against corruption, file loss, or system loss.
A-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
B-1
Sometimes a problem can be resolved by evoking features of IBM Tivoli Storage Manager.
The TSM Development teams have addressed what were once common problems for storage administrators and created features and options to make it easier to protect your data.
Some performance situations can be addressed with TSM features. The following charts examine a few of the features and how they can resolve performance issues.
B-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Description
Storage pools defined to contain only active data. Task-orientated interface to manage one or more Tivoli Storage Manager servers. Collection of backed up files, stored as a single object on specific media.
Solution Provided
Reduces restore times and storage requirements. Centralized management of enterprise systems. Can be used for client restore without network or server.
system command line, type DSM to start the GUI. A collection of client options that can be applied Sets options for groups of
to multiple clients. Enables the server to keep all files belonging to a client node or a client file space on a minimal number of sequential access storage volumes. Allows creation of a group of nodes for collocation. Tapeless backups use disks as storage media. Part of the Administration Center, which is used to monitor system status. clients. Reduces restore times.
Does not require a tape for every node. Faster restore time. Minimized fragmentation, utilizes inexpensive disks. Centralized monitoring of storage tasks. 3
Description
Lists that customize which files are considered for backup or archive. Automatic migration to the next storage pool in the hierarchy maintains free space in the primary storage pool. Creates a point-in-time image backup, or
Solution Provided
Does not use space or time on files which do not require protection. Ensures sufficient space in the faster storage pools at the top of the storage pool hierarchy. Allows other applications to
system command line, DSM the GUI. and changing continue accessing snapshot, at the volume level,type in which the to start
volume remains in an available state during the backup. The backup-archive client delays the start of the volume snapshot until volume activity is idle for a specified amount of time, thus allowing for a more stable snapshot. the contents of the volume during backup.
Only files that have changed are candidates to be backed up (incremental backups).
Reduces network traffic and improves processor utilization by minimizing data transfer time. More efficient use of storage space. Efficient tape utilization and reduced restore times (fewer tapes). 4
As data expires and leaves unused space on the tape, the remaining data can be moved, allowing the empty space to be reused.
B-3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Problem Determination
IBM Software Group | Tivoli software
Learn the steps for problem determination when the TSM server has experienced a failure. Understand how the suggestions made for volume placement, mirroring, and backup of TSM provide for TSM recovery. Learn how to manually recover the TSM server in the event of a catastrophic failure. Disaster Recovery Manager can automate this process; an instructor-led class is available. Understand how to recover in the event of database failure, data corruption on a volume, or volume destruction.
??
6
B-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
B-5
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Hints and Tips for Libraries, Drives and Device Drivers Problem Diagnoses
Has the operating system changed? Has the host bus adapter (HBA) or SCSI adapter connecting to the device been changed, updated, or replaced? Has the adapter firmware changed? Has the cabling between the computer and device changed? Are any of the cable connections loose? Has the device firmware changed? Are there error messages in the system error log for this device? Has a device driver changed?
10
B-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
11
B-7
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
12
B-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
www.ibm.com/software/sysmgmt/products/support
Issue the query systeminfo command, when instructed by TSM Support, and review the output file. If you still need to call support, they will direct you in what information needs to be gathered. Use caution when issuing traces. Trace functions can require a lot of time and system resources.
13
B-9
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Reporting a Problem
You can contact IBM Customer Support in one of the following ways: Visit the Tivoli Storage Manager technical support Web site. Submit a problem management record (PMR) electronically at IBMLink. Submit a problem management record (PMR) electronically at IBM Software Support. Customers in the United States can call 1-800-IBM-SERV (1-800-426-7378). International customers should consult the Web site for customer support telephone numbers. Hearing-impaired customers should visit the TDD/TTY Voice Relay Services and Accessibility Center Web site. You can also review the IBM Software Support Guide. When you contact IBM Software Support, be prepared to provide identification information for your company so that support personnel can readily assist you. Company identification information is needed to register for online support available on the Web site.
15
16
B-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Education
IBM Software Group | Tivoli software
Education
The following slides show the IBM Tivoli Storage Manager 5.5 Curriculum Roadmap, which shows the courses in the order they should be taken. Check the IBM Web site for the availability of the courses. From the IBM home page, select: Welcome Training to TSM Tivoli Training. Storage and Optimization
17
18
B-11
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Product Documentation
IBM Software Group | Tivoli software
19
B-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Documentation on www.ibm.com
Documentation on www.ibm.com
http://publib.boulder.ibm.com/infocenter/tivihelp/index.jsp
20
21
B-13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Other Publications
RedBooks: http://www.redbooks.ibm.com/ Search for Tivoli Storage
22
IBM Tivoli Storage Manager Knowledge Base Web site: www.ibm.com/software/sysmgmt/products/support Other useful Web sites (these forums are not maintained by IBM): www.adsm.org and http://search.adsm.org
23
B-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
24
IBM Support Assistant (ISA) is available in the download section at the TSM Support page: http://www.ibm.com/software/sysmgmt/products/support/IBMTivoliStorageManager.html
25
B-15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Additional Assistance
IBM Software Group | Tivoli software
26
User Groups
www.tivoli-ug.org
27
B-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Where Can I Take a Certification Exam and How Much Do They Cost?
All IBM certification exams are available at Thomson Prometric and Pearson VUE testing centers worldwide. In addition, testing is offered at a discount or for free at many IBM conferences and events, including many Tivoli User Group (TUG) meetings. Exam costs vary from country to country. Please see the Thomson Prometric or Pearson VUE Web sites for the exact cost at the testing center you plan to use.
II
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Notes:
-1
S150-2877-00
March 2008
Printed in Ireland
S150-2877-00
CT4SYEN