Professional Documents
Culture Documents
2 Family Update
Jim Smith Tivoli Storage Manager Architect
IBM Software
Disclaimer
This presentation describes potential future enhancements to the IBM Tivoli Storage Manager family of products All statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only Information in this presentation does not constitute a commitment to deliver the described enhancements or to do so in a particular timeframe IBM reserves the right to change product plans, features, and delivery schedules according to business needs and requirements This presentation uses the following designations regarding availability of potential product enhancements
Future Candidate: Candidate for delivery in a future release (2011 or beyond)
The information on the new product is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information on the new product is for informational purposes only and may not be incorporated into any contract. The information on the new product is not a commitment, promise, or legal obligation to deliver any material, code or functionality. The development, release, and timing of any features or functionality described for our products remains at our sole discretion.
Abstract
This session provides a detailed preview of selected future enhancements in the next TSM release and beyond. Topics include deduplication, security and compliance, management of the server database and storage hierarchy, virtual tape library integration, and software deployment.
Agenda
Data Deduplication Security and Compliance Storage Hierarchy and Database VTL Integration Software Deployment Backup Environments
Note: VMware and Hyper-V will be covered in a separate presentation at this conference and therefore is not included in this presentation
DATA DEDUPLICATION
4. Duplicate data chunks removed from primary storage pool during Reclaim operation C 3. Backup Stgpool operation copies data to non-deduplicated copy storage pool
B C C E
D A
TSM 5.5 Client TSM 6.1 Server Copy Storage Pool (non-deduplicated)
File 1
File 3
File 2 File 3
Exchange Server
2. Identify Duplicates process creates chunks and pointers to hash index (deduplication index) in server database to relate files to chunks
Hash Index
Currently Available
1. Client creates chunks TSM 6.x Client 2. Client and server identify which chunks need to be sent
Chunks within pool are shared by client-side and server-side deduplication operations
C D
F Exchange Server with TSM 6.x API TSM 6.x Server 3. Client sends chunks and hashes so server can represent object in database FastBack Server with TSM 6.x API
File 4
4. Entire file is reconstructed during Backup Stgpool operation to non-deduplicated storage pool
Hash Index
Reduced space requirement in storage pools Reduced space requirement in storage pools Reduced consumption of network bandwidth Reduced consumption of network bandwidth
TSM 6.2
Source-side (client-side)
Security
Reporting
Incremental forever
Client only sends changed files
Subfile backup
Client only sends changed subfiles
Server-side deduplication
Server eliminates redundant data chunks No Backup, archive, HSM, API Redundant data from any files in storage pool Yes
Client-side deduplication
Client and server eliminate redundant data chunks Yes Backup, archive, API Redundant data from any files in storage pool Yes
Yes Backup, archive, HSM, API Redundant data within same file on client node No
Yes
Yes Backup (Windows only) Subfiles that do not change between backups No
Scope of data reduction Avoids storing identical files renamed, copied, or relocated on client node? Removes redundant data for files from different client nodes?
No
No
No
Yes
Yes
Available prior to V5
Available 6.1
Available 6.2
Future Candidate
10
11
Important text
Data encryption prior to Data encryption prior to deduplication processing can deduplication processing can subvert data reduction subvert data reduction
Encryption key 1
txpt tnatroemI
Data deduplication
Encryption key 2
12
Client
Server
Servers public key is distributed in a digital certificate Certificate validation ensures that the certificate really came from the server
Client can validate digital certificate using a trusted third party called a certificate authority (CA) Certificate can be self-signed by the server and delivered to each client using secure mechanism
After initial authentication, random symmetric key is negotiated for encrypting the remainder of the session
13
256-bit AES encryption for in-flight data 256-bit AES encryption for in-flight data Compatible with TSM server- or client-side deduplication Compatible with TSM server- or client-side deduplication Simplified deployment and validation of TSM server certificates Simplified deployment and validation of TSM server certificates
TSM 6.2
14
14
2 1
Storage Agent TSM Server 1 Admin Client
7 3 1 6
Admin Center
4
TSM Client 2 (B-A, HSM, or API) SSL paths Non-SSL paths
TSM Server 2
Communication Types
1. Client-to-server (backup/recovery, file selection, data movement) 2. Admin command-line client (administrative commands) 3. Administration center 4. Web client (file selection for backup/restore) 5. Client-to-client (coordination for HSM, Copy Services) 6. Server-to-server (management tasks) 7. Storage-agent-to-server (LAN-free)
15
Web browser
Configuration Certificate request is signed by CA Certificate is installed on TSM server CA's root certificate is installed on the client
Runtime Client accepts any certificate signed by CA Client rejects all other certificates Client verifies server's identity TSM 6.2
16
DB2
TSM Server A
Storage Hierarchy
Historical information for each stored object is tracked in database Object information can be queried for audit compliance or problem diagnosis
Improved tracking of historical information on data objects Improved tracking of historical information on data objects Future Candidate
18
Historical information relating to server configuration is tracked in database Server-configuration information can be queried for audit compliance or problem diagnosis
Improved tracking of historical information on server configuration Improved tracking of historical information on server configuration Future Candidate
19
Parallel streams for backup/restore processing give improved throughput Reduced time for database backup/restore Increased scalability of TSM server without expanding database backup window
Reduced database backup window Reduced database backup window Improved recovery time Improved recovery time Increased scalability of TSM server Increased scalability of TSM server
Future Candidate
21
Target Server
Storage Hierarchy
Metadata transferred between servers using export/import Storage pool volumes physically moved (or replicated) to the target server Especially attractive when used with shared libraries Could be used for
Splitting/balancing servers Consolidating servers, such as after upgrade to DB2
Reduced time and bandwidth consumption for export/import of object data Reduced time and bandwidth consumption for export/import of object data Ability to transfer data for individual nodes Ability to transfer data for individual nodes
Future Candidate
22
2 3
Site B
Database
Storage pool backup
Database
No special hardware/software required Deduplication gives storage/bandwidth savings All data in primary hierarchy could be replicated, after initially being stored in deduplicated primary pool
Near-term document solution combining existing technologies: TSM deduplication, probably client-side Copy pool with network-attached storage DB2 HADR
23
Site B
TSM Server B
DB2
DB2
TSM server would replicate all data and metadata for specified nodes to another server, ensuring node completeness and consistency of data/metadata Incremental client data transfer with deduplication to minimize bandwidth consumption Remote TSM server could be hot standby for primary server, for improved RTO Native TSM solution with no dependency on specific storage device Many-to-1 transfer to target server (recovery manageability) Supports dissimilar hardware, configuration and retention at primary and remote sites
Remote vaulting without manual tape transfer Remote vaulting without manual tape transfer Efficient use of bandwidth through deduplicated replication Efficient use of bandwidth through deduplicated replication Allows hot standby at remote site Allows hot standby at remote site
Future Candidate
24
Data written synchronously to primary pool and one or more copy-pool or activedata-pool destinations Avoids need for subsequent copy operations to active-data pool or copy pool Requires that sufficient tape devices be available during client backup Tape delays may extend client backup window Not compatible with client-side deduplication
Currently Available
25
Data flow
Combines windows for migration, storage pool backup, and copy active data
Reduces total time for these operations Frees server resources for other operations
VTL Basics
VTL emulates/virtualizes tape drives and library Underlying media is magnetic disk Performs like disk, with no delays for mount, dismount, locate, or rewind Integrated capabilities may include
Compression Encryption Shredding of data when no longer needed Data deduplication Remote replication Attachment of physical tape and data movement from virtual to physical tape
28
29
VTL Volume
Concurrent access for VTL volumes (multiple read operations, one write operation)
More effective use of VTL in TSM storage hierarchy More effective use of VTL in TSM storage hierarchy
Future Candidate
30
SOFTWARE DEPLOYMENT
31
TSM server and admin center must be at release 6.x or higher Supported client releases
Current client is 5.4 or higher Target client level is 6.x or higher
TSM 6.2
32
Client Scheduler
Deployment Manager
7 8
33
33
Automatic downgrading (regression) of client software Initial client distribution and installation Distribution without client scheduler running
Future Candidate
34
BACKUP ENVIRONMENTS
35
TSM 6.2
36
Future Candidate
Journal-based backup for Linux Data reduction through metadata separation Simplified configuration of backup-archive clients in a cluster Automated System Recovery (ASR) for Windows 2008, Vista, and Windows 7
37
QUESTIONS ?
38