TSM Tape Solution v8.1.4
TSM Tape Solution v8.1.4
TSM Tape Solution v8.1.4
Version 8.1.4
IBM
IBM Spectrum Protect
Version 8.1.4
IBM
Note:
Before you use this information and the product it supports, read the information in “Notices” on page 251.
This edition applies to version 8, release 1, modification 4 of IBM Spectrum Protect (product numbers 5725-W98,
5725-W99, 5725-X15), and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright IBM Corporation 1993, 2017.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
About this publication . . . . . . . . vii Preparing file systems for the server . . . . . . 46
Who should read this guide . . . . . . . . . vii AIX systems . . . . . . . . . . . . . 46
Publications . . . . . . . . . . . . . . vii Linux systems . . . . . . . . . . . . 48
Windows systems . . . . . . . . . . . 48
What's new in this release . . . . . . ix
Chapter 8. Installing the server and
Operations Center . . . . . . . . . . 51
Part 1. Planning for a tape-based
Installing on AIX and Linux systems . . . . . . 51
data protection solution . . . . . . . 1 Installing prerequisite RPM files for the graphical
wizard . . . . . . . . . . . . . . . 52
Chapter 1. Tape planning requirements 3 Installing on Windows systems . . . . . . . . 52
Chapter 12. Setting up a storage pool Part 3. Monitoring a tape solution 147
hierarchy . . . . . . . . . . . . . 111
Chapter 18. Daily monitoring checklist 149
Chapter 13. Protecting applications
and systems . . . . . . . . . . . . 113 Chapter 19. Periodic monitoring
Adding clients . . . . . . . . . . . . . 113 checklist . . . . . . . . . . . . . 155
Selecting the client software and planning the Monitoring tape alert messages for hardware errors 161
installation . . . . . . . . . . . . . 114 Preventing errors caused by media incompatibility 161
Specifying rules for backing up and archiving Operations with cleaner cartridges . . . . . . 162
client data . . . . . . . . . . . . . 115
Scheduling backup and archive operations . . 119 Chapter 20. Verifying license
Registering clients . . . . . . . . . . . 120 compliance . . . . . . . . . . . . 163
Installing and configuring clients . . . . . . 121
Chapter 21. Tracking system status by
Chapter 14. Configuring LAN-free data using email reports . . . . . . . . . 165
movement . . . . . . . . . . . . . 127
Validating your LAN-free configuration . . . . 128
Part 4. Managing operations for a
Chapter 15. Tape encryption methods 129 tape solution . . . . . . . . . . . 167
Configuring tape drive encryption . . . . . . 131
Chapter 22. Managing the Operations
Chapter 16. Controlling tape storage Center . . . . . . . . . . . . . . 169
operations. . . . . . . . . . . . . 133
How IBM Spectrum Protect fills volumes . . . . 133 Chapter 23. Managing client
Specifying the estimated capacity of tape volumes 133 operations. . . . . . . . . . . . . 171
Specifying recording formats for tape media . . . 134 Evaluating errors in client error logs. . . . . . 171
Associating library objects with device classes . . 134 Stopping and restarting the client acceptor . . . 172
Controlling media-mount operations for tape Resetting passwords . . . . . . . . . . . 173
devices . . . . . . . . . . . . . . . 135 Managing client upgrades . . . . . . . . . 174
Controlling the number of simultaneously Decommissioning a client node . . . . . . . 175
mounted volumes . . . . . . . . . . . 135 Deactivating data to free storage space . . . . . 177
Controlling the amount of time that a volume
remains mounted . . . . . . . . . . . 136 Chapter 24. Managing data storage 179
Controlling the amount of time that the server
Managing inventory capacity . . . . . . . . 179
waits for a drive . . . . . . . . . . . 137
Tuning scheduled activities . . . . . . . . . 181
Preempting operations . . . . . . . . . . 137
Optimizing operations by enabling collocation of
Mount point preemption . . . . . . . . 137
client files . . . . . . . . . . . . . . 181
Volume access preemption . . . . . . . . 138
Effects of collocation on operations . . . . . 183
Impacts of device changes on the SAN . . . . . 139
Selecting volumes with collocation enabled . . 185
Displaying device information. . . . . . . . 140
Selecting volumes with collocation disabled . . 187
Write-once, read-many tape media . . . . . . 140
Collocation settings . . . . . . . . . . 188
WORM-capable drives . . . . . . . . . 141
Collocation of copy storage pools. . . . . . 188
Check-in of WORM media . . . . . . . . 141
Planning for and enabling collocation . . . . 189
Restrictions on WORM media . . . . . . . 141
Mount failures with WORM media . . . . . 142
Relabeling WORM media . . . . . . . . 142 Chapter 25. Managing tape devices 193
Removing private WORM volumes from a Preparing removable media . . . . . . . . 193
library . . . . . . . . . . . . . . . 142 Labeling tape volumes . . . . . . . . . 193
Creation of DLT WORM volumes . . . . . 142 Checking volumes into an automated library 196
Support for short and normal 3592 WORM Managing volume inventory . . . . . . . . 201
tapes . . . . . . . . . . . . . . . 142 Controlling access to volumes . . . . . . . 201
Querying a device class for the Reusing tapes . . . . . . . . . . . . 201
WORM-parameter setting . . . . . . . . 143 Maintaining a supply of scratch volumes . . . 203
Troubleshooting problems with devices. . . . . 143 Maintaining a supply of volumes in a library
that contains WORM media . . . . . . . 204
Notices . . . . . . . . . . . . . . 251
Chapter 27. Securing the IBM
Spectrum Protect server . . . . . . 227
Glossary . . . . . . . . . . . . . 255
Managing administrators . . . . . . . . . 227
Changing password requirements . . . . . . 228
Securing the server on the system . . . . . . 229 Index . . . . . . . . . . . . . . . 257
Restricting user access to the server . . . . . 229
Contents v
vi IBM Spectrum Protect: Tape Solution Guide
About this publication
This publication provides information about planning for, implementing,
monitoring, and operating a data protection solution that uses IBM Spectrum
Protect™ best practices.
You should be familiar with the operating system on which the server resides and
the communication protocols required for the client or server environment. You
also need to understand the storage management practices of your organization,
such as how you are currently backing up workstation files and how you are using
storage devices.
Publications
The IBM Spectrum Protect product family includes IBM Spectrum Protect
Snapshot, IBM Spectrum Protect for Space Management, IBM Spectrum Protect for
Databases, and several other storage management products from IBM®.
Planning roadmap
Plan for the tape solution by reviewing the architecture layout in Figure 1 and then
completing the roadmap tasks that follow the diagram.
1 2
Primary pool on tape for Remote library for offsite copy
client and inventory backup
In this data protection configuration, the server uses both disk and tape storage
hardware. Storage pool staging is used, in which client data is initially stored in
disk storage pools and then later migrated to tape storage pools. For disaster
recovery, tape volumes can be stored offsite. Offsite options include physically
moving a second copy offsite by a courier or electronically vaulting copies offsite
to a remote library.
Tip: The described solution does not include node replication. However, if you
want to use node replication to back up a storage pool from disk to disk, ensure
that the replication operation is completed before data is migrated from disk to
tape. You can also use node replication to back up a storage pool on a local tape
device to a copy storage pool on a local tape device.
Tip: Check with your tape-drive manufacturer for guidance about the
size of the database that is suitable to write to tape.
v Use disk to back up data from clients that have smaller objects.
v To back up data directly to tape, use LAN-free data movement. For more
information, see Chapter 14, “Configuring LAN-free data movement,” on
page 127.
v Do not back up virtual machines to tape. Use a separate disk-based
storage pool that does not migrate to a tape-based storage pool. For
more information about virtual machine support, see technote 1239546.
Storage pool capacity
Maintain enough storage pool capacity to allow for 2 days of client
backups and a buffer of 20%. You might have to schedule full backups
over a few days to ensure that you have enough storage pool space.
Tape drives
Review the manufacturer specifications and estimate the capacity of a tape
drive. Determine the amount of space that is required for backup and
migration operations. Reserve 20% of tape drives for restore operations.
Related reference:
MIGRATE STGPOOL (Migrate storage pool to next storage pool)
Review the information to determine the hardware and software requirements for
your storage environment. You might have to make adjustments based on your
system size.
Hardware requirements
Hardware requirements for your IBM Spectrum Protect solution are based on
system size. Choose equivalent or better components than those items that are
listed to ensure optimum performance for your environment.
For more information about planning disk devices, see Planning for disk storage.
For more information about planning tape devices, see Planning for tape storage.
The following table includes minimum hardware requirements for the server and
storage. If you are using local partitions (LPARs) or work partitions (WPARs),
adjust the network requirements to take account of the partition sizes. The figures
in the table are based on a data ingestion rate of 14 TB per hour.
Hardware
component System requirements
Server AIX 8 processor cores, 3.42 GHz or faster.
processor For example, use a POWER8® processor-based server.
Use separate Fibre Channel adapters for tape and disk data.
Hardware requirements for the Operations Center are included in the preceding
table, except for the database and archive log space (inventory) that the Operations
Center uses to hold records for managed clients.
If you do not plan to install the Operations Center on the same system as the IBM
Spectrum Protect server, you can estimate system requirements separately. To
calculate system requirements for the Operations Center, see the system
requirements calculator in technote 1641684.
Managing the Operations Center on the IBM Spectrum Protect server is a workload
that requires extra space for database operations on both the hub server and any
spoke servers. The amount of space on the hub server for the archive log is larger
if the hub server is monitoring one or more spoke servers. Review the following
guidelines to estimate how much space your IBM Spectrum Protect server requires.
For this example, you would calculate the space by using the following
figures:
(66.33 GB + 8.4 GB) × 1.20 = 76.41 GB
Archive log space
The Operations Center uses approximately 18 GB of archive log space
every 24 hours, per server, for every 1000 clients monitored on that server.
Software requirements
Documentation for the IBM Spectrum Protect tape-based solution includes
installation and configuration tasks for IBM AIX®, Linux, and Microsoft Windows
operating systems. You must meet the minimum software requirements that are
listed.
For information about software requirements for IBM lin_tape device drivers, refer
to the .
AIX systems
Type of software Minimum software requirements
Operating system IBM AIX 7.1
AIX systems can cache a large amount of file system data, which
can reduce memory that is required for server and IBM DB2®
processes. To avoid paging with the AIX server, use the rbrw
mount option for the JFS2 file system. Less memory is used for
the file system cache and more is available for IBM Spectrum
Protect.
Do not use the file system mount options, Concurrent I/O (CIO),
and Direct I/O (DIO), for file systems that contain the IBM
Spectrum Protect database, logs, or storage pool volumes. These
options can cause performance degradation of many server
operations. IBM Spectrum Protect and DB2 can still use DIO
where it is beneficial to do so, but IBM Spectrum Protect does not
require the mount options to selectively take advantage of these
techniques.
Other software Korn Shell (ksh)
Linux systems
Type of software Minimum software requirements
Operating system Red Hat Enterprise Linux 7 (x86_64)
Libraries GNU C libraries, Version 2.3.3-98.38 or later that is installed on
the IBM Spectrum Protect system.
Windows systems
Type of software Minimum software requirements
Operating system Microsoft Windows Server 2012 R2 (64-bit) or Windows Server
2016
File system type NTFS
Other software Windows 2012 R2 or Windows 2016 with .NET Framework 3.5 is
installed and enabled.
Each worksheet helps you prepare for different parts of the system configuration
by using best practice values:
Server system preconfiguration
Use the preconfiguration worksheets to plan for the file systems and
directories that you create when you configure file systems for IBM
Spectrum Protect during system setup. All directories that you create for
the server must be empty.
Server configuration
Use the configuration worksheets when you configure the server. Default
values are suggested for most items, except where noted.
Table 1. Worksheet for preconfiguration of a server system
Minimum directory
Item Default value Your value size More information
TCP/IP port 1500 Not applicable. Ensure that this
address for port is available
communications when you install
with the server and configure the
operating system.
Linux Windows
Minimum space that is
required for the
directory: 30 GB
Directory for /usr AIX Available
server installation space that is required
for the directory: 5 GB.
Windows C:\tsminst1\
TSMarchlog
Directories for the AIX Linux For instructions about Create four file
database /tsminst1/TSMdbspace00 calculating space systems for the
/tsminst1/TSMdbspace01 requirements, see database.
/tsminst1/TSMdbspace02 “Hardware
/tsminst1/TSMdbspace03 requirements” on page
5.
Windows
C:\tsminst1\TSMdbspace00
C:\tsminst1\TSMdbspace01
C:\tsminst1\TSMdbspace02
C:\tsminst1\TSMdbspace03
Directories for AIX Linux Determine the The preferred
storage /tsminst1/TSMfile00 minimum total capacity method is to define
/tsminst1/TSMfile01 for all directories by at least one
/tsminst1/TSMfile02 using the following directory for each
/tsminst1/TSMfile03 calculation: tape device.
... Daily
Windows
percentage of ingested
data that is written
C:\tsminst1\TSMfile00 to disk + 20% =
C:\tsminst1\TSMfile01 Minimum total capacity
C:\tsminst1\TSMfile02
C:\tsminst1\TSMfile03
...
v Windows TapeX
v Linux
/dev/tsmscsi/mtX
v Windows mtA.B.C.D
You design storage arrays with size and performance characteristics that are
suitable for one of the IBM Spectrum Protect server storage components, such as
the server database or a storage pool. The storage planning activity must take
account of drive type, RAID level, number of drives, the number of spare drives,
and so on. In the solution configurations, storage groups contain internal-storage
RAID arrays and consist of multiple physical disks that are presented as logical
volumes to the system. When you configure the disk storage system, you create
storage groups, or data storage pools, and then create storage arrays in the groups.
You create volumes, or LUNs, from the storage groups. The storage group defines
which disks provide the storage that makes up the volume. When you create
volumes, make them fully allocated. Faster disks types are used to hold the
database volumes and active log volumes. Slower disk types can be used for the
storage pool volumes, archive log, and database backup volumes. If you use a
smaller disk storage pool to stage data, you might need to use faster disks to
manage the daily workload performance for ingesting and migrating data.
Table 4 and Table 5 on page 16 describe the layout requirements for storage groups
and volume configuration.
Table 4. Components of storage group configuration
Component Details
Server storage How the storage is used by the server.
requirement
Disk type Size and speed for the disk type that is used for the storage
requirement.
Examples
Configuration examples for storage groups and volumes are available at the
following link: Examples of worksheets for planning storage arrays. The examples
show how to plan the storage for different server sizes. In the example
configurations, there is a one-to-one mapping between disks and storage groups.
You can download the examples and edit the worksheets to plan the storage
configuration for your server.
For a list of supported devices and valid device class formats, see the website for
your operating system:
v AIX Windows Supported devices for AIX and Windows
v Linux Supported devices for Linux
For more information about storage devices and storage objects, see Types of
storage devices.
Each device that is defined to IBM Spectrum Protect is associated with one device
class. The device class specifies the device type and media management
information, such as recording format, estimated capacity, and labeling prefixes.
A device class for a tape drive must also specify a library. A physical library is a
collection of one or more drives that share similar media-mounting requirements.
That is, the drive can be mounted by an operator or by an automated mounting
mechanism.
A library object definition specifies the library type and other characteristics that are
associated with that library type.
The following table lists the preferred library types for an IBM Spectrum Protect
Version 8.1.4 tape solution.
In a SAN, you can share tape drives and libraries that are supported by the IBM
Spectrum Protect server, including most SCSI tape devices.
When IBM Spectrum Protect servers share a SCSI tape, one server, the library
manager, owns and controls the device. The storage agents, along with other IBM
Spectrum Protect servers that share this library are library clients. A library client
requests shared library resources, such as drives or media, from the library
manager, but uses the resources independently. The library manager coordinates
the access to these resources. IBM Spectrum Protect servers that are defined as
library clients use server-to-server communications to contact the library manager
and request device service. Data moves over the SAN between each server and the
storage device.
Requirement: If you define a library manager server that is shared with the IBM
Spectrum Protect server, the SANDISCOVERY option must be set to ON. By default,
this option is set to OFF.
IBM Spectrum Protect servers use the following features when sharing an
automated library:
Partitioning of the volume inventory
The inventory of media volumes in the shared library is partitioned among
servers. Either one server owns a particular volume, or the volume is in
the global scratch pool. No server owns the scratch pool.
Serialized drive access
Only one server accesses each tape drive at a time. Drive access is
serialized. IBM Spectrum Protect controls drive access so that servers do
not dismount other servers' volumes or write to drives where other servers
mount their volumes.
Serialized mount access
The library autochanger completes a single mount or dismount operation
at a time. The library manager completes all mount operations to provide
this serialization.
Library sharing
You can optimize the efficiency of your tape solution by configuring library
sharing. Library sharing allows multiple IBM Spectrum Protect servers to use the
same tape library and drives on a storage area network (SAN) and to improve
backup and recovery performance and tape hardware utilization.
When IBM Spectrum Protect servers share a library, one server is set up as the
library manager and controls library operations such as mount and dismount. The
library manager also controls volume ownership and the library inventory. Other
servers are set up as library clients and use server-to-server communications to
contact the library manager and request resources.
LAN
Client data
Library control
Backup-archive client
with storage agent
installed SAN
LAN-free data movement requires the installation of a storage agent on the client
system. The server maintains the database and recovery log, and acts as the library
manager to control device operations. The storage agent on the client handles the
data transfer to the device on the SAN. This implementation frees up bandwidth
on the LAN that would otherwise be used for client data movement.
Libraries with this capability are models that have built-in mixed drives, or that
support the addition of mixed drives. For information about specific models, see
the manufacturer's documentation. To learn about libraries that were tested on IBM
Spectrum Protect with mixed device types, see the information for your operating
system:
v IBM Spectrum Protect Supported Devices for AIX, HP-UX, Solaris, and Windows
For example, you can have LTO Ultrium drives and IBM TS4500 drives in a single
library that is defined to the IBM Spectrum Protect server.
If the new drive technology cannot write to media that is formatted by older
generation drives, the older media must be marked read-only to avoid problems
for server operations. Also, the older drives must be removed from the library, or
the definitions of the older drives must be removed from the server. For example,
the IBM Spectrum Protect server does not support the use of Oracle StorageTek
9940A drives with 9940B drives in combination with other device types in a single
library.
In general, IBM Spectrum Protect does not support mixing generations of LTO
Ultrium drives and media. However, the following mixtures are supported:
v LTO Ultrium Generation 3 (LTO-3) with LTO Ultrium Generation 4 (LTO-4)
v LTO Ultrium Generation 4 (LTO-4) with LTO Ultrium Generation 5 (LTO-5)
v LTO Ultrium Generation 5 (LTO-5) with LTO Ultrium Generation 6 (LTO-6)
v LTO Ultrium Generation 6 (LTO-6) with LTO Ultrium Generation 7 (LTO-7)
The server supports these mixtures because the different drives can read and write
to the different media. If you plan to upgrade all drives to Generation 4 (or
Generation 5, 6, or 7), you must delete all existing LTO Ultrium drive definitions
and the paths that are associated with them. Then, you can define the new
Generation 4 (or Generation 5, 6, or 7) drives and paths.
Restrictions that apply to mixing LTO Ultrium tape drives and media
v LTO-5 drives can read only LTO-3 media. If you are mixing LTO-3 with
LTO-5 drives and media in a single library, you must mark the LTO-3
media as read-only. You must check out all LTO-3 scratch volumes.
v LTO-6 drives can read only LTO-4 media. If you are mixing LTO-4 with
LTO-6 drives and media in a single library, you must mark the LTO-4
media as read-only. You must check out all LTO-4 scratch volumes.
v LTO-7 drives can read only LTO-5 media. If you are mixing LTO-5 with
LTO-7 drives and media in a single library, you must mark the LTO-5
media as read-only. You must check out all LTO-5 scratch volumes.
Restrictions that apply to mixed generation LTO Ultrium tape drives in a library
You must use tape cartridges that are an earlier generation than the tape
drive. A later generation tape drive can read and write data to an earlier
generation tape cartridge. For an example, if a library has LTO-7 and
LTO-6 tape drives, you must use LTO-6 tape cartridges. Both the LTO-7
and LTO-6 tape drives can read and write data to LTO-6 tape cartridges.
Restrictions that apply to mixed generation LTO Ultrium tape cartridges in a
library
You must use a tape cartridge that is the same generation as the tape drive,
or one generation earlier. For example, if a library has LTO-7 tape drives,
you can use LTO-7 tape cartridges or mixed LTO-7 and LTO-6 tape
To learn about additional considerations when you mix LTO Ultrium generations,
see “Defining LTO device classes” on page 96.
When you use IBM Spectrum Protect, you cannot mix drives that are 3592, TS1130,
TS1140, TS1150, and later drive generations. Use one of three special
configurations. For details, see “Defining 3592 device classes” on page 100.
If you plan to encrypt volumes in a library, do not mix media generations in the
library.
Multiple storage pools and their device classes of different types can point to the
same library that can support them as described in “Different media generations in
a library” on page 21.
You can migrate to a new generation of a media type within the same storage pool
by following these steps:
1. Replace all older drives with the newer generation drives within the library.
The drives should be mixed.
2. Mark the existing volumes with the older formats read-only if the new drive
cannot append those tapes in the old format. If the new drive can write to the
existing media in their old format, this is not necessary, but Step 1 is still
required. If it is necessary to keep different drive generations that are read but
not write compatible within the same library, use separate storage pools for
each.
Tip: You can use the PERFORM LIBACTION command to simplify the process when
you add devices to SCSI and VTL library types.
Table 7 summarizes the definitions that are required for different device types.
Table 7. Required definitions for storage devices
Required definitions
Library Drive Path Device
Device Device types class
1
Magnetic disk DISK — — — Yes
2
FILE — — — Yes
Linux CENTERA 3
Tape 3590 Yes Yes Yes Yes
3592
DLT
LTO
NAS
VOLSAFE
AIX Windows
GENERICTAPE
4
ECARTRIDGE
Removable REMOVABLEFILE Yes Yes Yes Yes
media (file
system)
The storage pool hierarchy helps to manage the flow of data. To understand the
data flow, review Figure 3 on page 24.
1 2
Primary pool on tape for Remote library for offsite copy
client and inventory backup
Procedure
Use the disaster recovery manager (DRM) function to configure and automatically
generate a disaster recovery plan that contains the information, scripts, and
procedures that are required to automatically restore the server and recover client
data after a disaster. Choose from one of the following offsite data storage options
as a disaster recovery strategy to protect tape copies:
Offsite vaulting from a single production site
Storage volumes, such as tape cartridges and media volumes, are vaulted
at an offsite location. A courier transports the data from the offsite storage
facility to the recovery site. If a disaster occurs, the volumes are sent back
to the production site after hardware and the IBM Spectrum Protect server
are restored.
Offsite vaulting with a recovery site
A courier moves storage volumes from the production site to an offsite
storage facility. By having a dedicated recovery site, you can reduce
recovery time compared to the single production site. However, this option
increases the cost of disaster recovery because more hardware and software
must be maintained. For example, the recovery site must have compatible
tape devices and IBM Spectrum Protect server software. Before the
production site can be recovered, the hardware and software at the
recovery site must be set up and running.
Electronic vaulting
To use electronic vaulting as a disaster recovery strategy, the recovery site
must have a running IBM Spectrum Protect server. Critical data is vaulted
electronically from the production site to the recovery site. DRM is also
used for offsite vaulting of noncritical data. Electronic vaulting moves
critical data offsite faster and more frequently than traditional courier
methods. Recovery time is reduced because critical data is already stored
The scenarios in Table 8 provide examples about why you might want to assign
varying levels of authority so that administrators can perform tasks:
Table 8. Scenarios for administrator roles
Scenario Type of administrator ID to set up
An administrator at a small company manages the server v System authority: 1 administrator ID
and is responsible for all server activities.
An administrator for multiple servers also manages the v System authority on all servers: 1 administrator ID for
overall system. Several other administrators manage their the overall system administrator
own storage pools.
v Storage authority for designated storage pools: 1
administrator ID for each of the other administrators
An administrator manages 2 servers. Another person v System authority on both servers: 2 administrator IDs
helps with the administration tasks. Two assistants are
v Operator authority: 2 administrator IDs for the
responsible for helping to ensure that important systems
assistants with access to the server that each person is
are backed up. Each assistant is responsible for
responsible for
monitoring the scheduled backups on one of the IBM
Spectrum Protect servers.
Related tasks:
“Managing administrators” on page 227
Determine the level of protection that is required for your data, based on
regulations and business requirements under which your company operates.
If your business requires a high level of security for passwords and data
transmission, plan on implementing secure communication with Transport Layer
Security (TLS) or Secure Sockets Layer (SSL) protocols.
TLS and SSL provide secure communications between the server and client, but
can affect system performance. To improve system performance, use TLS for
authentication without encrypting object data. To specify whether the server uses
TLS 1.2 for the entire session or only for authentication, see the SSL client option
for client-to-server communication, and the UPDATE SERVER=SSL parameter for
server-to-server communication. Beginning in V8.1.2, TLS is used for authentication
by default. If you decide to use TLS to encrypt entire sessions, use the protocol
only for sessions where it is necessary and add processor resources on the server to
manage the increase in network traffic. You can also try other options. For
example, some networking devices such as routers and switches provide the TLS
or SSL function.
You can use TLS and SSL to protect some or all of the different possible
communication paths, for example:
v Operations Center: browser to hub; hub to spoke
v Client to server
v Server to server: node replication
Related tasks:
“Configuring secure communications with Transport Layer Security” on page 60
Table 10 describes the ports that are used by the server, client, and Operations
Center.
Table 10. Ports that are used by the server, client, and Operations Center
Item Default Direction Description
Base port 1500 Outbound/ Each server instance requires a unique port.
(TCPPORT) inbound You can specify an alternative port number.
The TCPPORT option listens for both TCP/IP
and SSL-enabled sessions from the client.
You can use the TCPADMINPORT option and
ADMINONCLIENTPORT option to set port values
for administrative client traffic.
SSL-only port No default Outbound/ This port is used if you want to restrict
(SSLTCPPORT) inbound communication on the port to SSL-enabled
sessions only. A server can support both SSL
and non-SSL communication by using the
TCPPORT or TCPADMINPORT options.
SMB 45 Inbound/ This port is used by configuration wizards
outbound that communicate by using native protocols
with multiple hosts.
Related tasks:
Collecting diagnostic information with IBM Spectrum Protect client
management services
Related reference:
ADMINONCLIENTPORT server option
DEFINE SERVER (Define a server for server-to-server communications)
TCPADMINPORT server option
TCPPORT server option
1 2
Primary pool on tape for Remote library for offsite copy
client and inventory backup
Tip: The described solution does not include node replication. However, if you
want to use node replication to back up a storage pool from disk to disk, ensure
that the replication operation is completed before data is migrated from disk to
tape. You can also use node replication to back up a storage pool on a local tape
device to a copy storage pool on a local tape device.
Implementation roadmap
Tip: Procedures for setting up the server and the disk storage system are
described. To get started with setting up tape devices, see Chapter 10, “Attaching
tape devices for the server,” on page 73.
Procedure
1. Provide a connection between the server and the storage devices by following
these guidelines:
v Use a switch or direct connection for Fibre Channel connections.
v Consider the number of ports that are connected and account for the amount
of bandwidth that is needed.
v Consider the number of ports on the server and the number of host ports on
the disk system that are connected.
2. Verify that device drivers and firmware for the server system, adapters, and
operating system are current and at the recommended levels.
3. Configure storage arrays. Make sure that you planned properly to ensure
optimal performance. For more information, see Chapter 4, “Planning for disk
storage,” on page 15.
4. Ensure that the server system has access to disk volumes that are created.
Complete the following steps:
a. If the system is connected to a Fibre Channel switch, zone the server to see
the disks.
b. Map all of the volumes to tell the disk system that this specific server is
allowed to see each disk.
5. Ensure that tape and disk devices use different Host Bus Adapter (HBA) ports.
Control tape and disk I/O by using the SAN.
Related tasks:
“Configuring multipath I/O” on page 42
Procedure
1. Install AIX Version 7.1, TL4, SP2, or later according to the manufacturer
instructions.
2. Configure your TCP/IP settings according to the operating system installation
instructions.
3. Open the /etc/hosts file and complete the following actions:
v Update the file to include the IP address and host name for the server. For
example:
192.0.2.7 server.yourdomain.com server
v Verify that the file contains an entry for localhost with an address of
127.0.0.1. For example:
127.0.0.1 localhost
4. Enable AIX I/O completion ports by issuing the following command:
chdev -l iocp0 -P
For example, if you lived in Tucson, Arizona, where Mountain Standard Time
is used, you would issue the following command to change to the POSIX
format:
chtz MST7MDT,M3.2.0/2:00:00,M11.1.0/2:00:00
6. Add an entry in the .profile of the instance user so that the following
environment is set:
export MALLOCOPTIONS=multiheap:16
Tip: If the instance user is not available, complete this step later, when the
instance user becomes available.
7. Set the system to create full application core files. Issue the following
command:
chdev -l sys0 -a fullcore=true -P
8. For communications with the server and Operations Center, make sure that
the following ports are open on any firewalls that might exist:
v For communications with the server, open port 1500.
v For secure communications with the Operations Center, open port 11090 on
the hub server.
If you are not using the default port values, make sure that the ports that you
are using are open.
9. Enable TCP high-performance enhancements. Issue the following command:
no -p -o rfc1323=1
If you need to modify any user limit values, follow the instructions in the
documentation for your operating system.
The operating system will be installed on the internal hard disks. Configure the
internal hard disks by using a hardware RAID 1 array. For example, if you are
configuring a small system, the two 300 GB internal disks are mirrored in RAID 1
so that a single 300 GB disk appears available to the operating system installer.
Procedure
1. Install Red Hat Enterprise Linux Version 7.1 or later, according to the
manufacturer instructions. Obtain a bootable DVD that contains Red Hat
Enterprise Linux Version 7.1 and start your system from this DVD. See the
Tip: Automatically adjust kernel parameter settings and eliminate the need for
manual updates to these settings. On Linux, the DB2 database software
automatically adjusts interprocess communication (IPC) kernel parameter
values to the preferred settings. For more information about kernel parameter
settings, search for Linux kernel parameters in the IBM DB2 Version 11.1
product documentation.
Table 12. Linux kernel parameter optimum settings
Parameter Description
kernel.shmmni The maximum number of segments.
kernel.shmmax The maximum size of a shared memory segment (bytes).
There are four values for the kernel.sem The maximum semaphores per array.
parameter.
(SEMMNS)
7. Open firewall ports to communicate with the server. Complete the following
steps:
a. Determine the zone that is used by the network interface. The zone is
public, by default.
Issue the following command:
# firewall-cmd --get-active-zones
public
interfaces: ens4f0
If you need to modify any user limit values, follow the instructions in the
documentation for your operating system.
Procedure
1. Install Windows Server 2016 Standard Edition, according to the manufacturer
instructions.
2. Change the Windows account control policies by completing the following
steps.
a. Open the Local Security Policy editor by running secpol.msc.
b. Click Local Policies > Security Options and ensure that the following User
Account Control policies are disabled:
AIX systems
Complete the following steps to enable and configure multipathing for disk
storage.
Procedure
1. Determine the Fibre Channel port address that you must use for the host
definition on the disk subsystem. Issue the lscfg command for every port.
v On small and medium systems, issue the following commands:
lscfg -vps -l fcs0 | grep "Network Address"
lscfg -vps -l fcs1 | grep "Network Address"
v On large systems, issue the following commands:
lscfg -vps -l fcs0 | grep "Network Address"
lscfg -vps -l fcs1 | grep "Network Address"
lscfg -vps -l fcs2 | grep "Network Address"
lscfg -vps -l fcs3 | grep "Network Address"
2. Ensure that the following AIX file sets are installed:
v devices.common.IBM.mpio.rte
v devices.fcp.disk.array.rte
v devices.fcp.disk.rte
3. Issue the cfgmgr command to have AIX rescan the hardware and discover
available disks. For example:
cfgmgr
4. To list the available disks, issue the following command:
lsdev -Ccdisk
Linux systems
Complete the following steps to enable and configure multipathing for disk
storage.
Procedure
1. Edit the /etc/multipath.conf file to enable multipathing for Linux hosts. If the
multipath.conf file does not exist, you can create it by issuing the following
command:
mpathconf --enable
devices {
device {
vendor "IBM "
product "2145"
path_grouping_policy group_by_prio
user_friendly_names no
path_selector "round-robin 0"
prio "alua"
path_checker "tur"
failback "immediate"
no_path_retry 5
rr_weight uniform
You can also restart the system to rescan disk LUN host assignments.
b. Confirm that disks are now available for multipath I/O by reissuing the
multipath -l command.
5. Use the multipath output to identify and list device IDs for each disk device.
For example, the device ID for your 2 TB disk is
36005076802810c509800000000000012.
Save the list of device IDs to use in the next step.
Windows systems
Complete the following steps to enable and configure multipathing for disk
storage.
Procedure
1. Ensure that the Multipath I/O feature is installed. If needed, install additional
vendor-specific multipath drivers.
2. To verify that disks are visible to the operating system and are managed by
multipath I/O, issue the following command:
c:\program files\IBM\SDDDSM\datapath.exe query device
3. Review the multipath output and ensure that each device is listed and that it
has as many paths as you expect. You can use size and device serial
information to identify which disks are listed.
You can specify only lowercase letters (a-z), numerals (0-9), and the underscore
character ( _ ) for the user ID. The user ID and group name must comply with the
following rules:
v The length must be 8 characters or fewer.
v The user ID and group name cannot start with ibm, sql, sys, or a numeral.
v The user ID and group name cannot be user, admin, guest, public, local, or any
SQL reserved word.
Procedure
1. Use operating system commands to create a user ID.
v AIX Linux Create a group and user ID in the home directory of the
user that owns the server instance.
For example, to create the user ID tsminst1 in group tsmsrvrs with a
password of tsminst1, issue the following commands from an administrative
user ID:
Linux
groupadd tsmsrvrs
useradd -d /home/tsminst1 -m -g tsmsrvrs -s /bin/bash tsminst1
passwd tsminst1
Log off, and then log in to your system. Change to the user account that you
created. Use an interactive login program, such as telnet, so that you are
prompted for the password and can change it if necessary.
v Windows Create a user ID and then add the new ID to the Administrators
group. For example, to create the user ID tsminst1, issue the following
command:
net user tsminst1 * /add
After you create and verify a password for the new user, add the user ID to
the Administrators group by issuing the following commands:
AIX systems
You must create volume groups, logical volumes, and file systems for the server by
using the AIX Logical Volume Manager.
Procedure
1. Increase the queue depth and maximum transfer size for all of the available
hdiskX disks. Issue the following commands for each disk:
chdev -l hdisk4 -a max_transfer=0x100000
chdev -l hdisk4 -a queue_depth=32
chdev -l hdisk4 -a reserve_policy=no_reserve
chdev -l hdisk4 -a algorithm=round_robin
Do not run these commands for operating system internal disks, for example,
hdisk0.
2. Create volume groups for the IBM Spectrum Protect database, active log,
archive log, database backup, and storage pool. Issue the mkvg command,
specifying the device IDs for corresponding disks that you previously
identified.
For example, if the device names hdisk4, hdisk5, and hdisk6 correspond to
database disks, include them in the database volume group and so on.
System size: The following commands are based on the medium system
configuration. For small and large systems, you must adjust the syntax as
required.
The output is similar to the following. The FREE PPs column represents the
free physical partitions:
tsmdb:
PV_NAME PV STATE TOTAL PPs FREE PPs FREE DISTRIBUTION
hdisk4 active 1631 1631 327..326..326..326..326
hdisk5 active 1631 1631 327..326..326..326..326
hdisk6 active 1631 1631 327..326..326..326..326
4. Create logical volumes in each volume group by using the mklv command. The
volume size, volume group, and device names vary, depending on the size of
your system and variations in your disk configuration.
For example, to create the volumes for the IBM Spectrum Protect database on a
medium system, issue the following commands:
mklv -y tsmdb00 -t jfs2 -u 1 -x 1631 tsmdb 1631 hdisk2
mklv -y tsmdb01 -t jfs2 -u 1 -x 1631 tsmdb 1631 hdisk3
mklv -y tsmdb02 -t jfs2 -u 1 -x 1631 tsmdb 1631 hdisk4
5. Format file systems in each logical volume by using the crfs command.
For example, to format file systems for the database on a medium system, issue
the following commands:
crfs -v jfs2 -d tsmdb00 -p rw -a logname=INLINE -a options=rbrw
-a agblksize=4096 -m /tsminst1/TSMdbspace00 -A yes
crfs -v jfs2 -d tsmdb01 -p rw -a logname=INLINE -a options=rbrw
-a agblksize=4096 -m /tsminst1/TSMdbspace01 -A yes
crfs -v jfs2 -d tsmdb02 -p rw -a logname=INLINE -a options=rbrw
-a agblksize=4096 -m /tsminst1/TSMdbspace02 -A yes
6. Mount all of the newly created file systems by issuing the following command:
mount -a
7. List all file systems by issuing the df command. Verify that file systems are
mounted at the correct LUN and correct mount point. Also, verify the available
space.
The following example of command output shows that the amount of used
space is typically 1%:
tapsrv07> df -g /tsminst1/*
Filesystem GB blocks Free %Used Iused %Iused Mounted on
/dev/tsmact00 195.12 194.59 1% 4 1% /tsminst1/TSMalog
8. Verify that the user ID that you created in “Creating the user ID for the server”
on page 45 has read and write access to the directories for the server.
Procedure
1. Using the list of device IDs that you generated previously, issue the mkfs
command to create and format a file system for each storage LUN device.
Specify the device ID in the command. See the following examples. For the
database, format ext4 file systems:
mkfs -t ext4 -T largefile -m 2 /dev/mapper/36005076802810c509800000000000012
Windows systems
You must format New Technology File System (NTFS) file systems on each of the
disk LUNs to be used by the IBM Spectrum Protect server.
Procedure
1. Create mount point directories for file systems.
Issue the md command for each directory that you must create. Use the
directory values that you recorded in the planning worksheets. For example, to
create the server instance directory by using the default value, issue the
following command:
md c:\tsminst1
Tip: Determine the volume label and directory mapping labels based on the
size of the disk that is reported.
3. Verify that file systems are mounted at the correct LUN and correct mount
point. List all file systems by issuing the mountvol command and then review
the output. For example:
\\?\Volume{8ffb9678-3216-474c-a021-20e420816a92}\
C:\tsminst1\TSMdbspace00\
4. After the disk configuration is complete, restart the system.
What to do next
You can confirm the amount of free space for each volume by using Windows
Explorer.
Verify that the operating system is set to the language that you require. By default,
the language of the operating system is the language of the installation wizard.
Procedure
1. AIX Verify that the required RPM files are installed on your system.
See “Installing prerequisite RPM files for the graphical wizard” on page 52 for
details.
2. Before you download the installation package, verify that you have enough
space to store the installation files when they are extracted from the product
package. For space requirements, see the download document at technote
4042992.
3. Go to Passport Advantage® and download the package file to an empty
directory of your choice.
4. Ensure that executable permission is set for the package. If necessary, change
the file permissions by issuing the following command:
chmod a+x package_name.bin
5. Extract the package by issuing the following command:
./package_name.bin
When you select the packages to install, choose both the server and Operations
Center.
What to do next
v If errors occur during the installation process, the errors are recorded in log files
that are stored in the IBM Installation Manager logs directory.
To view installation log files from the Installation Manager tool, click File >
View Log. To collect these log files from the Installation Manager tool, click
Help > Export Data for Problem Analysis.
RPM files are required for the IBM Installation Manager graphical wizard.
Procedure
1. Verify that the following files are installed on your system. If the files are not
installed, go to Step 2.
atk-1.12.3-2.aix5.2.ppc.rpm libpng-1.2.32-2.aix5.2.ppc.rpm
cairo-1.8.8-1.aix5.2.ppc.rpm libtiff-3.8.2-1.aix5.2.ppc.rpm
expat-2.0.1-1.aix5.2.ppc.rpm pango-1.14.5-4.aix5.2.ppc.rpm
fontconfig-2.4.2-1.aix5.2.ppc.rpm pixman-0.12.0-3.aix5.2.ppc.rpm
freetype2-2.3.9-1.aix5.2.ppc.rpm xcursor-1.1.7-3.aix5.2.ppc.rpm
gettext-0.10.40-6.aix5.1.ppc.rpm xft-2.1.6-5.aix5.1.ppc.rpm
glib2-2.12.4-2.aix5.2.ppc.rpm xrender-0.9.1-3.aix5.2.ppc.rpm
gtk2-2.10.6-4.aix5.2.ppc.rpm zlib-1.2.3-3.aix5.1.ppc.rpm
libjpeg-6b-6.aix5.1.ppc.rpm
2. Ensure that there is at least 150 MB of free space in the /opt file system.
3. From the directory where the installation package file is extracted, go to the gtk
directory.
4. Download the RPM files to the current working directory from the IBM AIX
Toolbox for Linux Applications website by issuing the following command:
download-prerequisites.sh
5. From the directory that contains the RPM files that you downloaded, install
them by issuing the following command:
rpm -Uvh *.rpm
Procedure
1. Before you download the installation package, verify that you have enough
space to store the installation files when they are extracted from the product
package. For space requirements, see the download document at technote
4042993.
2. Go to Passport Advantage and download the package file to an empty
directory of your choice.
3. Change to the directory where you placed the executable file.
What to do next
v If errors occur during the installation process, the errors are recorded in log files
that are stored in the IBM Installation Manager logs directory.
To view installation log files from the Installation Manager tool, click File >
View Log. To collect these log files from the Installation Manager tool, click
Help > Export Data for Problem Analysis.
v After you install the server and before you customize it for your use, go to the
IBM Spectrum Protect support site. Click Support and downloads and apply
any applicable fixes.
AIX Linux
v The system where you installed IBM Spectrum Protect must have the X Window
System client. You must also be running an X Window System server on your
desktop.
v The system must have the Secure Shell (SSH) protocol enabled. Ensure that the
port is set to the default value, 22, and that the port is not blocked by a firewall.
You must enable password authentication in the sshd_config file in the
/etc/ssh/directory. Also, ensure that the SSH daemon service has access rights
to connect to the system by using the localhost value.
v You must be able to log in to IBM Spectrum Protect with the user ID that you
created for the server instance, by using the SSH protocol. When you use the
wizard, you must provide this user ID and password to access that system.
v If you changed any settings in the preceding steps, restart the server before you
proceed with the configuration wizard.
Windows Verify that the remote registry service is started by completing the
following steps:
1. Click Start > Administrative Tools > Services. In the Services window, select
Remote Registry. If it is not started, click Start.
2. Ensure that port 137, 139, and 445 are not blocked by a firewall:
a. Click Start > Control Panel > Windows Firewall.
b. Select Advanced Settings.
c. Select Inbound Rules.
d. Select New Rule.
e. Create a port rule for TCP ports 137, 139, and 445 to allow connections for
domain and private networks.
3. Configure the user account control by accessing the local security policy
options and completing the following steps.
a. Click Start > Administrative Tools > Local Security Policy. Expand Local
Policies > Security Options.
b. If not already enabled, enable the built-in administrator account by selecting
Accounts: Administrator account status > Enable > OK.
The wizard can be stopped and restarted, but the server is not operational until the
entire configuration process is complete.
Procedure
1. Start the local version of the wizard.
v AIX Linux Open the dsmicfgx program in the /opt/tivoli/tsm/
server/bin directory. This wizard can be only run as a root user.
v Windows Click Start > All Programs > IBM Spectrum Protect >
Configuration Wizard.
2. Follow the instructions to complete the configuration. Use the information that
you recorded in Chapter 3, “Planning worksheets,” on page 11 during IBM
Spectrum Protect system setup to specify directories and options in the wizard.
AIX Linux On the Server Information window, set the server to start
automatically by using the instance user ID when the system boots.
Windows By using the configuration wizard, the server is set to start
automatically when rebooted.
Procedure
To install the backup-archive client, follow the installation instructions for your
operating system.
v Install UNIX and Linux backup-archive clients
v Installing the Windows client for the first time
Procedure
1. Go to the server instance directory and open the dsmserv.opt file.
2. Review the values in the following table and verify your server option settings,
based on system size.
Update server option settings if necessary, to match the values in the table. To
make updates, close the dsmserv.opt file and use the SETOPT command from
the administrative command-line interface to set the options.
For example, to update the IDLETIMEOUT option to 60, issue the following
command:
setopt idletimeout 60
3. To configure secure communications for the server, clients, and the Operations
Center, verify the options in the following table.
If any of the option values must be updated, edit the dsmserv.opt file by using
the following guidelines:
v Remove the asterisk at the beginning of a line to enable an option.
v On each line, enter only one option and the specified value for the option.
v If an option occurs in multiple entries in the file, the server uses the last
entry.
Save your changes and close the file. If you edit the dsmserv.opt file directly,
you must restart the server for the changes to take effect.
Tip: Any IBM Spectrum Protect documentation that indicates "SSL" or to "select
SSL" applies to TLS.
SSL is provided by the Global Security Kit (GSKit) that is installed with the IBM
Spectrum Protect server that the server, client, and storage agent use.
Restriction: Do not use the SSL or TLS protocols for communications with a DB2
database instance that is used by any IBM Spectrum Protect servers.
Each server, client, or storage agent that enables SSL must use a trusted self-signed
certificate or obtain a unique certificate that is signed by a certificate authority
(CA). You can use your own certificates or purchase certificates from a CA. Either
certificate must be installed and added to the key database on the IBM Spectrum
Protect server, client, or storage agent. The certificate is verified by the SSL client
or server that requests or initiates the SSL communication. Some CA certificates are
preinstalled in the key databases, by default.
SSL is set up independently on the IBM Spectrum Protect server, client, and
storage agent.
Authority levels
With each IBM Spectrum Protect server, different administrative authority levels
are available that determine the tasks that an administrator can complete.
An administrator can control access to specific client nodes for root user IDs and
non-root user IDs. By default, a non-root user ID cannot back up data on the node.
Use the UPDATE NODE command to change the node settings to enable backup.
Passwords
Session security
Session security is the level of security that is used for communication among IBM
Spectrum Protect client nodes, administrative clients, and servers and is set by
using the SESSIONSECURITY parameter.
| Note: You are not required to update backup-archive clients to V8.1.2 or later
| before you upgrade servers. After you upgrade a server to V8.1.2 or later, nodes
| and administrators that are using earlier versions of the software will continue
| to communicate with the server by using the TRANSITIONAL value until the entity
| meets the requirements for the STRICT value. Similarly, you can upgrade
| backup-archive clients to V8.1.2 or later before you upgrade your IBM Spectrum
| Protect servers, but you are not required to upgrade servers first.
| Communication between servers and clients is not interrupted.
Tips:
v Ensure that all IBM Spectrum Protect software that the administrator account
uses to log on is upgraded to V8.1.2 or later. If an administrator account logs on
from multiple systems, ensure that the server's certificate is installed on each
system.
v After an administrator authenticates to a V8.1.2 or later server by using a V8.1.2
or later client, the administrator can authenticate only on clients or servers that
are using V8.1.2 or later. An administrator command can be issued from any
system.
v If necessary, create a separate administrator account to use only with clients and
servers that are using V8.1.1 or earlier software.
Enforce the highest level of security for communication with the IBM Spectrum
Protect server by ensuring that all nodes, administrators, and servers use STRICT
session security. You can use the SELECT command to determine which servers,
nodes, and administrators are using TRANSITIONAL session security and should be
updated to use STRICT session security.
Related tasks:
Securing communications
When you updated the server options file in “Setting options for the server” on
page 56, the SSLTLS12 and SSLDISABLELEGACYTLS server options were set to restrict
secure communications to use TLS 1.2. This setting prevents the use of previous
TLS protocol levels, which are less secure.
For more information about configuring the server and clients for SSL or TLS
communications, see Configuring storage agents, servers, clients, and the
Operations Center to connect to the server by using SSL.
When you connect to the Operations Center for the first time, you must provide
the following information:
v Connection information for the server that you want to designate as a hub
server
v Login credentials for an administrator ID that is defined for that server
Procedure
1. Designate the hub server. In a web browser, enter the following address:
https://hostname:secure_port/oc
where:
v hostname represents the name of the computer where the Operations Center
is installed
v secure_port represents the port number that the Operations Center uses for
HTTPS communication on that computer
For example, if your host name is tsm.storage.mylocation.com and you are
using the default secure port for the Operations Center, which is 11090, the
address is:
https://tsm.storage.mylocation.com:11090/oc
The truststore file of the Operations Center is a container for certificates that the
Operations Center can access. It contains the certificate that the Operations Center
uses for HTTPS communication with web browsers.
During the installation of the Operations Center, you create a password for the
truststore file. To secure communication between the Operations Center and the
hub server, you must use the same password to add the certificate of the hub
server to the truststore file. If you do not remember this password, you can reset it.
The following figure illustrates the components for setting up SSL between the
Operations Center and the hub server.
Secure communications
Truststore file
cert256.arm
Procedure
Register a license by specifying the name of the enrollment certificate file that
contains the license. To use the Operations Center command builder for this task,
complete the following steps.
1. Open the Operations Center.
2. Open the Operations Center command builder by hovering over the settings
icon and clicking Command Builder.
3. Issue the REGISTER LICENSE command. For example, to register a base IBM
Spectrum Protect license, issue the following command:
register license file=tsmbasic.lic
What to do next
Save the installation media that contains your enrollment certificate files. You
might need to register your license again if, for example, one of the following
conditions occur:
v The server is moved to a different computer.
v The NODELOCK file is corrupted. The server stores license information in the
NODELOCK file, which is in the directory from which the server is started.
v Linux If you change the processor chip that is associated with the server on
which the server is installed.
Procedure
1. On the Services page of the Operations Center, select the STANDARD domain
and click Details.
2. On the Summary page for the policy domain, click the Policy Sets tab. The
Policy Sets page indicates the name of the active policy set and lists all of the
management classes for that policy set.
3. Click the Configure toggle, and make the following changes:
v Change the backup destination for the STANDARD management class to the
directory-container storage pool.
v Change the value for the Backups column to No limit.
v Change the retention period. Set the Keep Extra Backups column to 30 days
or more, depending on your business requirements.
4. Save your changes and click the Configure toggle again so that the policy set is
no longer editable.
5. Activate the policy set by clicking Activate.
Schedule server maintenance operations to run after client backup operations. You
can control the timing of schedules by setting the start time in combination with
the duration time for each operation.
8 PM 1
Re
cla
and t i o n o n s it e
ma
off s i
7
te
4 PM 6 AM
kup
bac
2
ol
po
6
e
ag
Ex nve
3 PM
or
re
pi
St
i
nt wi
or th
y 4 3
Mig se
rat taba ter
disk ion from Create da
isas
to tap or d
e backup f overy
rec
2 PM 5 Pre lting 10 AM
pare file
s for offsite vau
12 PM
Protect client data Protect the server Prepare for disaster recovery
The following table shows how you can schedule server maintenance processes in
combination with the client backup schedule for a tape solution.
Operation Schedule
Client backup Starts at 11 PM.
Storage pool backup Starts at 6 AM.
Procedure
After you configure the device class for the database backup operations, create
schedules for database backup and other required maintenance operations by using
the DEFINE SCHEDULE command. Depending on the size of your environment, you
might need to adjust the start times for each schedule in the example.
1. Define a device class for the backup operation before you create the schedule
for database backups. Use the DEFINE DEVCLASS command to create a device
class that is named LTOTAPE:
define devclass ltotape devtype=lto library=ltolib
2. Set the device class for automatic database backups. Use the SET DBRECOVERY
command to specify the device class that you created for the database backup
in the preceding step. For example, if the device class is LTOTAPE, issue the
following command:
set dbrecovery ltotape
3. Create schedules for the maintenance operations by using the DEFINE SCHEDULE
command. See the following table for the required operations with examples of
the commands.
For example, issue the following command to create a backup schedule for
a primary storage pool that is named PRIMARY_POOL. The pool will be
backed up to a copy storage pool, COPYSTG:
define schedule BACKUPSTGPOOL type=administrative
cmd="backup stgpool primary_pool copystg"
active=yes starttime=06:00 period=1
Replicate nodes. Optionally, use node replication to protect client data by backing the data
up to a secondary server. For instructions, see Replicating client data to
another server. Ensure that node replication is completed before migration
operations begin.
Migrate data from disk to tape daily. Create a schedule for storage pool migration.
For example, if a disk storage pool is named DISKPOOL and the next
storage pool is TAPEPOOL, you can schedule storage pool migration by
issuing the following command:
define schedule stgpool_migration type=administrative
cmd="migrate stgpool diskpool lomig=0" active=yes
description="migrate disk storagepool to tapepool"
startdate=today starttime=12:00 duration=2
durunits=hours period=1 perunits=days
Remove older versions of database Create a schedule to run the DELETE VOLHISTORY command:
backups that are no longer required. define schedule DELVOLHIST type=admin cmd="delete volhistory
type=dbb todate=today-6 totime=now" active=yes desc="Remove
old database backups." startdate=today starttime=20:00:00
duration=45 durunits=minutes
Remove objects that exceed their Create a schedule to run the EXPIRE INVENTORY command.
allowed retention.
Set the RESOURCE parameter based on the system size that you are
configuring to be equal to the number of processor cores that you specified
for your system.
What to do next
After you create schedules for the server maintenance tasks, you can view them in
the Operations Center by completing the following steps:
1. On the Operations Center menu bar, hover over Servers.
2. Click Maintenance.
Related reference:
UPDATE STGPOOL (Update a storage pool)
DEFINE SCHEDULE (Define a schedule for an administrative command)
Related information:
DEFINE STGPOOL (Define a volume in a storage pool)
To display all virtual copy storage pool and database backup volumes that have
their backup objects on the remote target server, issue the QUERY DRMEDIA
command:
query drmedia * wherestate=remote
Ensure that storage pool backup processes are completed. In this way, you can
avoid issues that might occur when the MOVE DRMEDIA and BACKUP STGPOOL
commands are run concurrently.
Procedure
1. Identify the copy storage pool and database backup volumes to be moved
offsite by issuing the QUERY DRMEDIA command:
query drmedia * wherestate=mountable
2. Indicate the movement of volumes whose current state is MOUNTABLE by
issuing the MOVE DRMEDIA command:
move drmedia * wherestate=mountable
For all volumes in the MOUNTABLE state, DRM completes the following tasks:
v Updates the volume state to NOTMOUNTABLE and updates the volume
location if you issued the SET DRMNOTMOUNTABLENAME command. If you did not
issue the command, the default location is NOTMOUNTABLE.
v Updates the access mode to unavailable for a copy storage pool volume.
v Checks volumes out of automated libraries.
a. During check-out processing, SCSI libraries request operator intervention.
Bypass these requests and eject the cartridges from the library by issuing
the following command:
move drmedia * wherestate=mountable remove=no
b. Access a list of the volumes to identify and remove the cartridges from the
library by issuing the following command:
query drmedia wherestate=notmountable
3. Send the volumes to the offsite vault.
4. To track the offsite volumes, issue the MOVE DRMEDIA command:
move drmedia * wherestate=notmountable
For all volumes in the NOTMOUNTABLE state, DRM updates the volume state
to COURIER and the volume location according to the SET DRMCOURIERNAME
command. If you did not issue the SET command, the default location is
COURIER.
5. When the vault location confirms receipt of the volumes, issue the MOVE
DRMEDIA command to specify the COURIER state:
70 IBM Spectrum Protect: Tape Solution Guide
move drmedia * wherestate=courier
For all volumes in the COURIER state, DRM updates the volume state to
VAULT and the volume location according to the SET DRMVAULTNAME command.
If you did not issue the SET command, the default location is VAULT.
6. Display a list of volumes that contain valid data at the vault by issuing the
following command:
query drmedia wherestate=vault
7. Avoid going through all the different volume states by using MOVE DRMEDIA
command and specifying the TOSTATE parameter to name the destination state.
To change the volumes from NOTMOUNTABLE state to VAULT state, issue the
following command:
move drmedia * wherestate=notmountable tostate=vault
For all volumes in the NOTMOUNTABLE state, DRM updates the volume state
to VAULT and the volume location according to the SET DRMVAULTNAME
command. If the SET command is not yet issued, the default location is VAULT.
You can expire a database backup volume when all of the following conditions are
true:
v The age of the last volume of the series exceeds the expiration value. The
expiration value is the number of days since the last backup in the series. At
installation, the expiration value is 60 days. To override this value, you can issue
the SET DRMDBBACKUPEXPIREDAYS command.
v All volumes in the series are in the VAULT state.
v The volume is not part of the most recent database backup series.
Procedure
1. Specify the number of days before a database backup series is expired by
issuing the SET DRMDBBACKUPEXPIREDAYS command. For example, to set the
number of days to 30, issue the following command:
set drmdbbackupexpiredays 30
Tip: Issue the DEFINE STGPOOL command and specify the same value for the
REUSEDELAY parameter in your copy storage pool definition to ensure that the
following occurs:
v Database can be returned to an earlier level.
v Database references to files in the copy storage pool are still valid.
If copy storage pools that are managed by DRM have different REUSEDELAY
values, issue the SET DRMDBBACKUPEXPIREDAYS command and set the REUSEDELAY
parameter to the highest value.
2. Identify all volumes at the offsite vault that no longer contain valid data and
can be returned to onsite. Issue the following QUERY DRMEDIA command and
specify the WHERESTATE=VAULTRETRIEVE parameter.
Procedure
1. On the Operations Center menu bar, hover over Clients.
2. Click Schedules.
3. Click +Schedule.
4. Complete the steps in the Create Schedule wizard. Set client backup schedules
to start at 22:00, based on the server maintenance activities that you scheduled
in “Defining schedules for server maintenance activities” on page 65.
Attach tape devices on their own host bus adapter (HBA), not shared with other
devices types such as disk. IBM tape drives have some special requirements for
HBAs and associated drivers.
Before you attach an automated library device, consider the following restrictions:
v Attached devices must be on their own Host Bus Adapter (HBA).
v An HBA must not be shared with other device types, such as a disk.
v For multiport Fibre Channel HBAs, devices must be attached on their own port.
These ports must not be shared with other device types.
v IBM tape drives have some special requirements on HBA and associated drivers.
For more information about devices, see the website for your operating system:
– IBM Spectrum Protect Supported Devices for AIX
– IBM Spectrum Protect Supported Devices for Linux and Windows
Procedure
To use the Fibre Channel (FC) adapter, complete the following steps:
1. Install the FC adapter and associated drivers.
2. Install the appropriate device drivers for attached medium changer devices.
Related concepts:
“Selecting a tape device driver” on page 74
Procedure
1. Refer to the documentation for your tape device to determine how to set the
library mode.
2. Set the mode to the appropriate mode for your tape device. For most tape
devices, the appropriate mode is called the RANDOM mode. If your tape
device does not have a RANDOM mode, consult the documentation for your
device to identify the appropriate mode.
You can download IBM tape device drivers from the Fix Central website:
1. Go to the Fix Central website: Fix Central website.
2. Click Select product.
3. Select System Storage for the Product Group menu.
4. Select Tape systems for the System Storage menu.
5. Select Tape drivers and software for the Tape systems menu.
6. Select Tape device drivers for the Tape drivers and software menu. In addition
to tape drivers, you also get access to tools such as the IBM Tape Diagnostic
Tool (ITDT).
7. Select your operating system for the Platform menu.
AIX Windows
For the most up-to-date list of devices and operating-system levels that are
supported by IBM tape device drivers, see the IBM Spectrum Protect Supported
Devices website at Supported devices for AIX and Windows.
Linux
For the most up-to-date list of tape devices and operating-system levels that are
supported by IBM tape device drivers, see the IBM Spectrum Protect Supported
Devices website at Supported devices for Linux.
IBM tape device drivers support only some Linux kernel levels. For information
about supported kernel levels, see the Fix Central website.
An IBM Spectrum Protect tape device driver is installed with the server.
AIX
You can use the generic SCSI tape device driver that is provided by the IBM AIX
operating system to work with tape devices that are not supported by the IBM
Spectrum Protect device driver. If the AIX generic SCSI tape device driver is used,
the GENERICTAPE device class must be set to the device type that is specified in
the DEFINE DEVCLASS command.
For the following tape devices, you can choose whether to install the IBM
Spectrum Protect tape device driver or the native device driver for your operating
system:
ECART
LTO (not from IBM)
All SCSI-attached libraries that contain tape drives from the list must use the IBM
Spectrum Protect changer driver.
Tape device drivers that are acquired from other hardware vendors can be used if
they are associated with the GENERICTAPE device class. Generic device drivers
are not supported in write-one read-many (WORM) device classes.
Linux
You can use the IBM Spectrum Protect Passthru device driver. IBM Spectrum
Protect Passthru device drivers require the Linux SCSI generic (sg) device driver
along with the Linux operating system to install the kernels.
For example, you can install the IBM Spectrum Protect Passthru device driver for
the following tape devices:
ECART
LTO (not from IBM)
All SCSI-attached libraries that contain tape drives that are not IBM labeled from
the list must also use the IBM Spectrum Protect Passthru device driver.
You cannot use the generic SCSI tape (st) device driver that is provided by the
Linux operating system. Therefore, the GENERICTAPE device type is not
supported for the DEFINE DEVCLASS command.
Windows
You can select a Windows Hardware Qualification Lab certified native device
driver instead of the IBM Spectrum Protect device driver. The Windows Hardware
Qualification Lab certified native device driver can be used only for devices that
have a non-IBM label and for non-IBM tape drives. For the Windows Hardware
Qualification Lab certified native device driver, you can select either the IBM
Spectrum Protect SCSI passthru device driver or the Windows native tape device
driver. If the SCSI passthru device driver is used, the device class on the DEFINE
DEVCLASS command cannot be GENERICTAPE. If the native device driver is used,
the device class must be GENERICTAPE.
AIX
When a device is configured successfully, a logical file name is returned. Table 16
specifies the name of the device, also called a special file name, that corresponds to
the drive or library. You can use the SMIT operating system command to get the
device special file name. In the examples, x specifies an integer, 0 or greater.
Table 16. Device examples
Device Device Logical file
example name
Tape drives that can be used by the IBM Spectrum Protect /dev/mtx mtx
device driver
Tape drives that can be used by the IBM tape device /dev/rmtx rmtx
driver
Tape drives that can be used by the IBM AIX generic tape /dev/rmtx rmtx
device driver
Library devices that can be used by the IBM Spectrum /dev/lbx lbx
Protect device driver
Library devices that can be used by the IBM tape device /dev/smcx smcx
driver
Linux
When a device is configured successfully, a logical file name is returned. Table 17
specifies the name of the device, also called the special file name, that corresponds
to the drive or library. In the examples, x specifies an integer, 0 or greater.
Table 17. Device examples
Device Device Logical file
example name
Tape drives that can be used by the IBM Spectrum Protect /dev/tsmscsi/ mtx
passthru device driver mtx
Tape drives that can be used by the IBM lin_tape device /dev/IBMtapex IBMtapex
driver
Library devices that can be used by the IBM Spectrum /dev/tsmscsi/ lbx
Protect passthru device driver lbx
Library devices that can be used by the IBM lin_tape /dev/ IBMchangerx
device driver IBMchangerx
Windows
When a device is configured successfully, a logical file name is returned. Table 18
on page 77 specifies the name of the device, also called the special file name, that
corresponds to the drive or library. In the examples, a, b, c, d, and x specify an
integer, 0 or greater, where:
v a specifies the target ID.
v b specifies the LUN.
v c specifies the SCSI bus ID.
IBM Spectrum Protect supports all devices that are supported by IBM tape device
drivers. However, IBM Spectrum Protect does not support all the operating-system
levels that are supported by IBM tape device drivers.
For instructions about installing and configuring IBM tape device drivers, see the
IBM Tape Device Drivers Installation and User's Guide.
AIX After you complete the installation procedure in the IBM Tape Device
Drivers Installation and User's Guide, different messages are issued, depending on
the device driver that you are installing. If you are installing the device driver for
an IBM tape drive or library, the following messages are returned:
rmtx Available
or
smcx Available
Note the value of x, which is assigned by the IBM tape device driver. To determine
the special file name of your device, issue one of the following commands:
v For tape drives, ls -l /dev/rmt*
v For tape libraries, ls -l /dev/smc*
The file name might have more characters at the end to indicate different operating
characteristics, but these characters are not needed by IBM Spectrum Protect. For
After you install the device driver, you can use the System Management Interface
Tool (SMIT) to configure non-IBM tape drives and tape libraries. Complete the
following steps:
1. Run the SMIT program.
2. Click Devices.
3. Click IBM Spectrum Protect Devices.
4. Click Fibre Channel SAN Attached devices.
5. Click Discover Devices Supported by IBM Spectrum Protect. Wait for the
discovery process to be completed.
6. Go back to the Fibre Channel SAN Attached devices menu, and click List
Attributes of a Discovered Device.
Linux After you complete the installation procedure in the IBM Tape Device
Drivers Installation and User's Guide, different messages are issued, depending on
the device driver that you are installing. If you are installing the device driver for
an IBM LTO or 3592 device, the following messages are returned:
IBMtapex Available
or
IBMChangerx Available
Note the value of x, which is assigned by the IBM tape device driver. To determine
the special file name of your device, issue one of the following commands:
v For tape drives, ls -l /dev/IBMtape*
v For tape libraries, ls -l /dev/IBMChange*
The file name might have more characters at the end to indicate different operating
characteristics, but these characters are not needed by IBM Spectrum Protect. For
IBM device drivers, use the base file name in the DEVICE parameter of the DEFINE
PATH command to assign a device to a drive (/dev/IBMtapex) or a library
(/dev/IBMChangerx).
Windows For Windows operating systems, IBM Spectrum Protect provides two
device drivers:
Passthru device driver
If the tape device manufacturer provides a SCSI device driver, install the
IBM Spectrum Protect passthru device driver.
SCSI device driver for tape devices
If the tape device manufacturer does not provide a SCSI device driver,
install the IBM Spectrum Protect SCSI device driver for tape devices. The
driver file name is tsmscsi64.sys.
For instructions about installing and configuring IBM tape device drivers, see the
IBM Tape Device Drivers Installation and User's Guide. After you install the IBM tape
device driver, the server specifies a special file name, TapeX, for IBM tape drives, or
ChangerY, for IBM medium changers. For an IBM Spectrum Protect SCSI device
driver or an IBM Spectrum Protect passthru device driver, you can issue the
Windows operating system command, regedit, to verify the device special file
The IBM tape device driver provides multipathing support so that if one path fails,
the server can use a different path to access data on a storage device. The failure
and transition to a different path are undetected by the running server or by a
storage agent. The IBM tape device driver also uses multipath I/O to provide
dynamic load balancing for enhanced I/O performance.
To provide redundant paths for IBM tape devices, connect each device to two or
more ports on a multiport Fibre Channel or SAS Host Bus Adapter (if it is
available on your operating system), or to different single Fibre Channel Host Bus
Adapters. If multipath I/O is enabled and a permanent error occurs on one path,
such as a malfunctioning HBA or cable, device drivers provide automatic path
failover to an alternate path.
After multipath I/O is enabled, the IBM tape device driver detects all paths for a
device on the host system. One path is designated as the primary path. The rest of
the paths are alternate paths. The maximum number of alternate paths for a device
is 16. For each path, the IBM tape device driver creates a special file with a unique
name. A path must exist on the system before the driver can create a special file
for the path. If a path does not exist, the driver does not create a special file. When
you use the DEFINE PATH command to specify the path to a destination, specify the
file that is associated with the primary path as the value of the DEVICE parameter.
AIX
On AIX, multipath I/O is not enabled automatically when the IBM tape device
driver is installed. You must configure it for each logical device after installation.
Multipath I/O remains enabled until the device is deleted or the support is
unconfigured. For configuration instructions, see the IBM Tape Device Drivers
Installation and User's Guide.
To obtain the names of special files, use the ls -l command, for example, ls -l
/dev/rmt*. Primary paths and alternate paths are identified by PRI and ALT, as seen
in the following example:
rmt0 Available 20-60-01-PRI IBM 3590 Tape Drive and Medium Changer (FCP)
rmt1 Available 30-68-01-ALT IBM 3590 Tape Drive and Medium Changer (FCP)
In this example, the following paths are associated with the IBM 3590 tape drive:
v 20-60-01-PRI
To display path-related details about a particular tape drive, you can also use the
itdt -f /dev/rmtx path command, where x is the number of the configured tape
drive. To display path-related details about a particular medium changer, use the
itdt -f /dev/smcy path command, where y is the number of the configured
medium changer.
Linux
On Linux, multipath I/O for medium changers and tape drives is not enabled
automatically when the device driver is installed. For instructions about
configuring multipath I/O, see the IBM Tape Device Drivers Installation and User's
Guide.
When multipath I/O is enabled for a logical device, it remains enabled until the
device is deleted or the support is unconfigured.
To display the names of special file for IBM tape drives and medium changers, use
the ls -l /dev/IBMx, where x is the index number of the device. You can also enter
the cat /proc/scsi/IBMtape command for tape drives. As shown in the IBMtape
file, primary paths and alternate paths are identified as Primary or Alternate:
Number Model SN HBA FO Path
0 03592 IBM1234567 qla2xxx Primary
1 03592 IBM1234567 qla2xxx Alternate
The name of the special file that is associated with the primary path for this tape
drive is /dev/IBMtape0. Specify /dev/IBMTape0 as the value of the DEVICE parameter
in the DEFINE PATH command for this device.
To obtain the names of the special files that are associated with the primary paths
for all medium changers that are configured on the system, issue the cat
/proc/scsi/IBMchanger command. The following example is taken from the
IBMchanger file:
Number Model SN HBA FO Path
3 03584L22 IBM1002345 qla2xxx Primary
4 03584L22 IBM1002345 qla2xxx Alternate
The name of the special file that is associated with the primary path for this
medium changer is /dev/IBMchanger3. Specify /dev/IBMchanger3 as the value of
the DEVICE parameter in the DEFINE PATH command for this device.
To display path-related details about a particular tape drive on the system, use the
itdt -f /dev/IBMtapex path command, where x is the number of a configured
tape device. To display path-related details about a particular medium changer on
the system, use the itdt -f /dev/IBMchangerx path command, where x is the
number of a configured medium changer.
Windows
On Windows, multipath I/O for medium changers and tape drives is not enabled
automatically when the device driver is installed. For instructions about
Alternate Path
Logical Device................. Tape0
Serial Number.................. 0000078F7612
SCSI Host ID.................... 8
SCSI Channel................... 0
Target ID.......................... 3
Logical Unit....................... 0
Path Enabled................... Yes
Primary Path
Logical Device................. Tape0
Serial Number.................. 0000078F7612
SCSI Host ID................... 8
SCSI Channel.................. 0
Target ID......................... 1
Logical Unit...................... 0
Path Enabled................... Yes
Review the instructions to install and configure non-IBM tape device drivers on
AIX systems.
For instructions about installing and configuring IBM tape device drivers, see the
IBM Tape Device Drivers Installation and User's Guide.
The IBM Spectrum Protect device definition menus and prompts in SMIT allow for
the management of both SCSI and Fibre Channel (FC) attached devices.
The main menu for IBM Spectrum Protect has two options:
SCSI attached devices
Use this option to configure SCSI devices that are connected to a SCSI
adapter in the host.
Fibre channel system area network (SAN) attached devices
Use this option to configure devices that are connected to an FC adapter in
the host. Choose one of the following attributes:
List attributes of a discovered device
Lists attributes of a device that is known to the current ODM
database.
Use the following procedure to configure IBM Spectrum Protect device drivers for
autochangers for non-IBM libraries.
Procedure
Run the SMIT program to configure the device driver for each autochanger or
robot:
Use the following procedure to configure IBM Spectrum Protect device drivers for
autochangers for vendor-acquired libraries.
Procedure
Important: IBM Spectrum Protect cannot overwrite tar or dd tapes, but tar or dd
can overwrite IBM Spectrum Protect tapes.
Restriction: Tape drives can be shared only when the drive is not defined or the
server is not started. The MKSYSB command does not work when both IBM
Spectrum Protect and AIX are sharing the same drive or drives. To use the
operating system's native tape device driver with a SCSI drive, the device must be
configured to AIX first and then configured to IBM Spectrum Protect. See your AIX
documentation regarding these native device drivers.
Run the SMIT program to configure the device driver for each drive (including
drives in libraries) as follows:
1. Select Devices.
2. Select IBM Spectrum Protect Devices.
3. Select Tape Drive.
4. Select Add a Tape Drive.
5. Select the IBM Spectrum Protect-SCSI-MT for any supported tape drive.
6. Select the adapter to which you are connecting the device. This number is listed
in the form: 00-0X, where X is the slot number location of the SCSI adapter
card.
7. When prompted, enter the CONNECTION address of the device you are
installing. The connection address is a two-digit number. The first digit is the
Procedure
1. Run the SMIT program.
2. Select Devices.
3. Select IBM Spectrum Protect Devices.
4. Select Fibre Channel SAN Attached devices.
5. Select Discover Devices Supported by IBM Spectrum Protect. The discovery
process can take some time.
6. Go back to the Fibre Channel menu, and select List Attributes of a Discovered
Device.
7. Note the three-character device identifier, which you use when you define a
path to the device to IBM Spectrum Protect. For example, if a tape drive has
the identifier mt2, specify /dev/mt2 as the device name.
Review the following topics when you install and configure tape device drivers on
Linux systems.
To use the IBM Spectrum Protect Linux Passthru driver, you must complete the
following steps.
Procedure
1. Verify that the device is connected to your system, and is powered on and
active.
2. Verify that the device is correctly detected by your system by issuing this
command:
cat /proc/scsi/scsi
What to do next
If you restart the host system, you must rerun the autoconf or tsmscsi script to
reconfigure IBM Spectrum Protect devices. If you restart the IBM Spectrum Protect
server instance, you do not have to reconfigure devices. In general, the Linux SCSI
generic driver is preinstalled to the kernel. To verify that the driver is in the kernel,
issue the following command:
> lsmod | grep sg
If the driver is not in the kernel, issue the modprobe sg command to load the sg
driver into the kernel.
The zSeries Linux Fibre Channel adapter (zfcp) device driver is a special adapter
driver on the IBM zSeries system.
IBM Spectrum Protect and IBM tape device drivers can run on zSeries platforms
with Linux operating systems in 64-bit environments, and support most original
equipment manufacturer (OEM) and IBM tape devices with Fibre Channel
interfaces.
For more information about the zfcp driver, see the IBM Redpaper™, Getting Started
with zSeries Fibre Channel Protocol, which is available at IBM Redbooks®.
Procedure
1. Load the qdio module.
2. Install the zfcp driver.
3. Map the Fibre Channel Protocol (FCP) and configure the zfcp driver.
4. Install and configure the IBM tape device driver.
Information about the devices seen by your system is available in the file
/proc/scsi/scsi. This file contains a list of every detected SCSI device.
The following device information is available: the host number, channel number,
SCSI ID, Logical Unit number, vendor, firmware level, type of device, and the SCSI
mode. For example, if a system contains some StorageTek and IBM libraries, a
SAN Gateway, and some Quantum DLT drives, the /proc/scsi/scsi file will look
similar to this:
Attached devices:
Host: scsi2 Channel: 00 Id: 00 Lun: 00
Vendor: STK Model: 9738 Rev: 2003
Type: Medium Changer ANSI SCSI revision: 02
Host: scsi2 Channel: 00 Id: 01 Lun: 02
Vendor: PATHLIGHT Model: SAN Gateway Rev: 32aC
Type: Unknown ANSI SCSI revision: 03
Host: scsi2 Channel: 00 Id: 01 Lun: 02
Vendor: QUANTUM Model: DLT7000 Rev: 2560
Type: Sequential-Access ANSI SCSI revision: 02
Host: scsi2 Channel: 00 Id: 01 Lun: 04
Vendor: IBM Model: 7337 Rev: 1.63
Type: Medium Changer ANSI SCSI revision: 02
The IBM Spectrum Protect Passthru device driver uses the Linux SCSI generic
device driver (sg) to control and operate tape devices that are attached on the
system. If the Linux generic SCSI tape device driver (st) is loaded to the kernel and
configures attached tape devices, conflicts can arise over how a device is managed
because the generic sg driver and the st driver can both control the same device.
If the st driver controls devices that are used by IBM Spectrum Protect, IBM
Spectrum Protect internal tape labels can be overwritten and data can be lost. If an
application uses the st driver to control devices and the non-rewind option is not
specified, tapes are automatically rewound following completion of an operation.
The auto-rewind operation relocates the tape header position to the beginning of
the tape. If the tape remains loaded in the drive, the next non-IBM Spectrum
Protect write operation overwrites the IBM Spectrum Protect tape label because the
label is at the beginning of the tape.
To prevent IBM Spectrum Protect labels from being overwritten, which can result
in data loss, ensure that only the IBM Spectrum Protect Passthru driver controls
devices that are used by IBM Spectrum Protect. Remove the st driver from the
kernel or, if the driver is used by some applications on the system, delete the
special files that correspond to IBM Spectrum Protect devices so that the st driver
can no longer control them.
If you are using the IBM tape device driver to control devices on your system, you
might encounter the same issues with device driver control conflicts. Review your
IBM tape documentation to determine how to resolve this issue and prevent data
loss.
Remove the st driver
If no other applications on the system use st devices, remove the st driver
from the kernel. Issue the following command to unload the st driver:
rmmod st
Delete device special files that correspond to IBM Spectrum Protect devices
If there are applications that require use of the st driver, delete the special
files that correspond to IBM Spectrum Protect devices. These special files
are generated by the st driver. When they are eliminated, the st driver can
no longer control the corresponding IBM Spectrum Protect devices. Device
special file names for tape drives appear in the /dev/ directory. Their
names have the form /dev/[n]st[0-1024][l][m][a].
List the st drive special file names and IBM Spectrum Protect device
special file names by using the ls command. Based on the output of the
device sequences, you can find devices in the st devices list matching those
in the IBM Spectrum Protect devices list. The rm command can then be
used to delete st devices.
Issue the following commands to list the st and IBM Spectrum Protect
devices:
ls -l /dev/*st*
ls -l /dev/tsmscsi/mt*
Delete the st devices with the rm command:
rm /dev/*st*
Review the instructions to install and configure drivers for tape devices and
libraries on Windows systems.
To use the IBM Spectrum Protect Windows passthru device driver for tape devices
and libraries, you must install the driver and obtain the device names for the
server to use.
Procedure
1. Install the IBM Spectrum Protect passthru device driver.
2. Obtain the device names that the server must use by taking one of the
following actions:
v On the server, run the QUERY SAN command. The output shows all devices
names and their associated device serial numbers.
v In the server directory, run the tsmdlst.exe utility. The output shows all
devices names, their associated serial numbers, and associated device
locations.
v At the Windows system command prompt, run the regedit command. From
the output, obtain the device file names based on the device locations. The
location consists of the port ID, SCSI bus ID, LUN ID, and SCSI target ID.
The IBM Spectrum Protect device file name has a format of mtA.B.C.C for
tape drives and lbA.B.C.D for tape libraries, where:
– A is the SCSI target ID.
– B is the LUN ID.
– C is the SCSI bus ID.
– D is the port ID.
If the manufacturer of a tape drive or tape library does not provide a SCSI device
driver, you must install the IBM Spectrum Protect SCSI device driver.
The IBM Spectrum Protect SCSI device driver file name is tsmscsi64.sys.
Procedure
1. Define the library and the path from the server to the library. Follow the
instructions in “Defining libraries” on page 93.
2. Define the drives in the library. Follow the instructions in “Defining drives” on
page 94.
For SCSI libraries, you can use the PERFORM LIBACTION command to define
drives and paths for a library in one step, instead of completing both steps 2
and 3. To use the PERFORM LIBACTION command to define drives and paths for a
library, the SANDISCOVERY option must be supported and enabled.
3. Define a path from the server to each drive by using the DEFINE PATH
command.
4. Define a device class. Follow the instructions in “Defining tape device classes”
on page 95.
Device classes specify the recording formats for drives and classify them
according to type. Use the default value, FORMAT=DRIVE as the recording format
only if all the drives that are associated with the device class can read and
write to all of the media. For example, you have a mix of Ultrium Generation 3
and Ultrium Generation 4 drives, but you have only Ultrium Generation 3
media. You can specify FORMAT=DRIVE because both the Generation 4 and
Generation 3 drives can read from and write to Generation 3 media.
5. Define a storage pool by using the DEFINE STGPOOL command.
Consider the following key choices for defining storage pools:
v Scratch volumes are empty volumes that are available for use. If you specify
a value for the maximum number of scratch volumes in the storage pool, the
server can choose from the scratch volumes available in the library.
If you do not allow scratch volumes, you must complete the extra step of
explicitly defining each volume to be used in the storage pool. Also, specify
the MAXSCRATCH=0 parameter when you define the storage pool so that scratch
volumes are not used.
v The default setting for primary storage pools is collocation by group. The
default for copy storage pools and active-data pools is disablement of
collocation. The server uses collocation to keep all files that belong to a group
of client nodes, a single client node, a client file space, or a group of client
file spaces on a minimal number of volumes. If collocation is disabled for a
Libraries with multiple device types: If your library has drives of multiple
device types, and you defined two libraries to the IBM Spectrum Protect server,
the two defined libraries represent one physical library. You must check in tape
volumes separately to each defined library. Ensure that you check in volumes
to the correct IBM Spectrum Protect library.
What to do next
Verify your device definitions to ensure that everything is configured correctly. Use
a QUERY command to review information about each storage object.
When you review the results of the QUERY DRIVE command, verify that the device
type for the drive is what you expect. If a path is not defined, the drive device
type is listed as UNKNOWN and if the wrong path is used, GENERIC_TAPE or
another device type is shown. This step is especially important when you are using
mixed media.
Defining libraries
Before you can use a drive, you must define the library to which the drive belongs.
Procedure
1. Define the library by using the DEFINE LIBRARY command.
For example, if you have an IBM TS3500 tape library, you can define a library
that is named ROBOTMOUNT by using the following command:
define library robotmount libtype=scsi
If you require library sharing or LAN-free data movement, see the following
information:
v “Configuring library sharing” on page 103
v Chapter 14, “Configuring LAN-free data movement,” on page 127
2. Define a path from the server to the library by using the DEFINE PATH
command. When you specify the DEVICE parameter, enter the device special file
name. This name is required by the server to communicate with tape drives,
medium changer, and removable media devices. For more information about
device special file names, see “Special file names for tape devices” on page 76.
AIX
Linux
Windows
For a library type of SCSI on a SAN, the server can track the library's serial
number. With the serial number, the server can confirm the identity of the device
when you define the path or when the server uses the device.
If you choose, you can specify the serial number when you define the library to
the server. For convenience, the default is to allow the server to obtain the serial
number from the library when you define the path.
If you specify the serial number, the server confirms that the serial number is
correct when you define the path to the library. When you define the path, you can
set the AUTODETECT=YES parameter to allow the server to correct the serial number if
the number that it detects does not match what you entered when you defined the
Depending on the capabilities of the library, the server might not be able to
automatically detect the serial number. Not all devices are able to return a serial
number when prompted by an application such as the server. In this case, the
server does not record a serial number for the device, and is not able to confirm
the identity of the device when you define the path or when the server uses the
device. For more information, see “Impacts of device changes on the SAN” on
page 139.
Defining drives
To inform the server about a drive that can be used to access storage volumes,
issue the DEFINE DRIVE command, followed by the DEFINE PATH command.
A drive object represents a drive mechanism within a library that uses removable
media. For devices with multiple drives, including automated libraries, you must
define each drive separately and associate it with a library. Drive definitions can
include such information as the element address for drives in SCSI, how often a
tape drive is cleaned, and whether the drive is online.
IBM Spectrum Protect supports tape drives that can be stand-alone or that can be
part of an automated library. The preferred method is to configure the tape
solution by using automated libraries.
When you issue the DEFINE DRIVE command, you must provide some or all of the
following information:
Library name
The name of the library in which the drive is located.
Drive name
The name that is assigned to the drive.
Serial number
The serial number of the drive. The serial number parameter applies only
to drives in SCSI. With the serial number, the server can confirm the
identity of the device when you define the path or when the server uses
the device.
You can specify the serial number if you choose. The default is to enable
the server to obtain the serial number from the drive itself at the time that
the path is defined. If you specify the serial number, the server confirms
that the serial number is correct when you define the path to the drive.
When you define the path, you can set the AUTODETECT=YES parameter to
enable the server to correct the serial number if the number that it detects
does not match what you entered when you defined the drive. As a best
practice, specify the AUTODETECT=YES parameter to automatically update the
serial number for the drive in the database when the path is defined.
Depending on the capabilities of the drive, the server might not be able to
automatically detect the serial number. In this case, the server does not
record a serial number for the device, and is not able to confirm the
identity of the device when you define the path or when the server uses
the device. See “Impacts of device changes on the SAN” on page 139.
94 IBM Spectrum Protect: Tape Solution Guide
Element address
The element address of the drive. The ELEMENT parameter applies only to
drives in SCSI libraries. The element address is a number that indicates the
physical location of a drive within an automated library. The server needs
the element address to connect the physical location of the drive to the
drive's SCSI address. The server can obtain the element address from the
drive when you define the path, or you can specify the element number
when you define the drive. As a best practice, specify the
ELEMENT=AUTODETECT parameter for the server to automatically detect the
element number when the path to the drive is defined.
Depending on the capabilities of the library, the server might not be able to
automatically detect the element address. In this case, you must supply the
element address when you define the drive, if the library has more than
one drive. To obtain the element address, go to the IBM Support Portal for
IBM Spectrum Protect.
Tip: IBM tape device drivers and non-IBM tape device drivers generate different
device files and formats:
v For IBM, device names begin with rmt followed by an integer, for example,
/dev/rmt0.
v For IBM Spectrum Protect tape device drivers, tape device names begin with mt
followed by an integer, for example /dev/mt0.
You must use the correct device file when you define a path.
Procedure
1. Assign a drive to a library by issuing the DEFINE DRIVE command.
2. To make the drive usable by the server, issue the DEFINE PATH command.
For examples about configuring libraries, paths, and drives, see Example:
Configure a SCSI or virtual tape library with a single drive device type and
Example: Configure a SCSI or virtual tape library with multiple drive device
types.
You must define libraries and drives to the server before you define device classes.
For a list of supported devices and valid device class formats, see the IBM
Spectrum Protect Supported Devices website for your operating system:
v AIX Windows Supported devices for AIX and Windows
v Linux Supported devices for Linux
You can define multiple device classes for each device type. For example, you
might want to specify different attributes for different storage pools that use the
Guidelines:
v One device class can be associated with multiple storage pools, but each storage
pool is associated with only one device class.
v SCSI libraries can include tape drives of more than one device type. When you
define the device class in this environment, you must declare a value for the
FORMAT parameter.
For more information, see “Mixed device types in libraries” on page 20.
Procedure
To define a device class, use the DEFINE DEVCLASS command with the DEVTYPE
parameter, which assigns a device type to the device class.
Results
If you include the DEVCONFIG option in the dsmserv.opt file, the files that you
specify with that option are automatically updated with the results of the DEFINE
DEVCLASS, UPDATE DEVCLASS, and DELETE DEVCLASS commands.
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
QUERY DEVCLASS (Display information on one or more device classes)
UPDATE DEVCLASS (Update a device class)
When you mix different generations of LTO drives and media, you must consider
the read/write capabilities of each generation. The preferred method is to
configure a different device class for each generation of media.
If you are considering mixing different generations of LTO media and drives,
review the following restrictions:
Table 19. Read/write capabilities for different generations of LTO drives
Generation 1 Generation 2 Generation 3 Generation 4 Generation 5 Generation 6 Generation 7
Drives media media media media media media media
Generation 1 Read/write n/a n/a n/a n/a n/a n/a
access
Generation 2 Read/write Read/write n/a n/a n/a n/a n/a
access access
Example
If you are mixing different types of drives and media, configure different device
classes: one for each type of media. To specify the media type, use the FORMAT
parameter in each of the device class definitions. (Do not specify FORMAT=DRIVE.)
For example, if you are mixing Ultrium Generation 5 and Ultrium Generation 6
drives, specify FORMAT=ULTRIUM5C (or ULTRIUM5) for the Ultrium Generation 5 device
class, and FORMAT=ULTRIUM6C (or ULTRIUM6) for the Ultrium Generation 6 device
class.
In this example, both device classes can point to the same library with Ultrium
Generation 5 and Ultrium Generation 6 drives. The drives are shared between the
two storage pools. One storage pool uses the first device class and Ultrium
Generation 5 media exclusively. The other storage pool uses the second device
class and Ultrium Generation 6 media exclusively. Because the two storage pools
share a single library, Ultrium Generation 5 media can be mounted on Ultrium
Generation 6 drives as they become available during mount point processing.
If you mix older read-only media generations with newer read/write media in a
single library, you must mark the read-only media as read-only and check out all
read-only scratch media. For example, if you are mixing Ultrium Generation 4 with
Ultrium Generation 6 drives and media in a single library, you must mark the
Generation 4 media as read-only. In addition, you must check out all Generation 4
scratch volumes.
For example, in a mixed media library that contains Ultrium Generation 1 and
Ultrium Generation 2 drives and media, Ultrium Generation 1 media can be
mounted in Ultrium Generation 2 drives.
Consider the example of a mixed library that consists of the following drives and
media:
v Four LTO Ultrium Generation 1 drives and LTO Ultrium Generation 1 media
v Four LTO Ultrium Generation 2 drives and LTO Ultrium Generation 2 media
The number of mount points available for use by each storage pool is specified in
the device class by using the MOUNTLIMIT parameter. The MOUNTLIMIT parameter in
the LTO2CLASS device class must be set to 4 to match the number of available
drives that can mount only LTO2 media. The MOUNTLIMIT parameter in the
LTO1CLASS device class must be set to a value that is greater than the number of
available drives (5 or possibly 6) to adjust for the fact that Ultrium Generation 1
media can be mounted in Ultrium Generation 2 drives. The optimal value for
MOUNTLIMIT depends on workload and storage pool access patterns.
Monitor and adjust the MOUNTLIMIT setting to suit changing workloads. If the
MOUNTLIMIT for LTO1POOL is set too high, mount requests for the LTO2POOL
might be delayed or fail because the Ultrium Generation 2 drives are used to
satisfy Ultrium Generation 1 mount requests. In the worst scenario, too much
competition for Ultrium Generation 2 drives might cause mounts for Generation 2
media to fail with the following message:
ANR8447E No drives are currently available in the library.
If the MOUNTLIMIT value for LTO1POOL is not set high enough, mount requests that
might be satisfied by LTO Ultrium Generation 2 drives are delayed.
Restriction: Restrictions apply when you mix Ultrium Generation 1 with Ultrium
Generation 2 or Generation 3 drives because of how mount points are allocated.
For example, processes that require multiple mount points that include both
Ultrium Generation 1 and Ultrium Generation 2 volumes might try to reserve
Ultrium Generation 2 drives only, even when one mount can be satisfied by an
available Ultrium Generation 1 drive. Processes that behave in this manner include
the MOVE DATA and BACKUP STGPOOL commands. These processes wait until the
required number of mount points can be satisfied with Ultrium Generation 2
drives.
Related reference:
BACKUP STGPOOL (Back up primary storage pool data to a copy storage
pool)
DEFINE DEVCLASS (Define a device class)
MOVE DATA (Move files on a storage pool volume)
IBM Spectrum Protect supports the three types of drive encryption that are
available with LTO Generation 4 or later drives: Application, System, and Library.
These methods are defined through the hardware.
IBM Spectrum Protect supports the Application method of encryption with IBM
and HP LTO-4 or later drives. Only IBM LTO-4 or later supports the System and
Library methods. The Library method of encryption can be used only if your
system hardware (for example, IBM TS3500) supports it.
Restriction: You cannot use drive encryption with write-once, read-many (WORM)
media.
The Application method is defined through the hardware. To use the Application
method, in which IBM Spectrum Protect generates and manages encryption keys,
set the DRIVEENCRYPTION parameter to ON. This action enables data encryption for
empty volumes. If the parameter is set to ON and the hardware is configured for
another encryption method, backup operations fail.
Procedure
The following simplified example shows the steps that you would take to enable
and disable data encryption for empty volumes in a storage pool:
1. Define a library by issuing the DEFINE LIBRARY command:
define library 3584 libtype=SCSI
2. Define a device class, LTO_ENCRYPT, by issuing the DEFINE DEVCLASS
command and specifying IBM Spectrum Protect as the key manager:
define devclass lto_encrypt library=3584 devtype=lto driveencryption=on
3. Define a storage pool by issuing the DEFINE STGPOOL command:
define stgpool lto_encrypt_pool lto_encrypt
4. To disable encryption on new volumes, set the DRIVEENCRYPTION parameter to
OFF. The default value is ALLOW. Drive encryption for empty volumes is allowed
if another method of encryption is enabled.
Related concepts:
Chapter 15, “Tape encryption methods,” on page 129
For optimal performance, do not mix generations of 3592 media in a single library.
Media problems can result when different drive generations are mixed. For
example, IBM Spectrum Protect might not be able to read a volume's label.
If you must mix generations of drives in a library, review the example and
restrictions to help prevent problems.
This method allows both generations to use their optimal format and
minimizes potential media problems that can result from mixing
generations. However, it does not resolve all media issues. For
example, competition for mount points and mount failures might
result. (To learn more about mount point competition in the context of
3592 drives and media, see “Defining 3592 device classes” on page
100.)
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
CHECKOUT LIBVOLUME (Check a storage volume out of a library)
LABEL LIBVOLUME (Label a library volume)
UPDATE STGPOOL (Update a storage pool)
You can optimize the storage capacity and improve data-access speeds when you
create volumes. By partitioning data into storage pools that have volumes, you can
specify the scale capacity percentage to provide maximum storage capacity, or to
provide fast access to the volume.
To reduce media capacity, specify the SCALECAPACITY parameter when you define
the device class by using the DEFINE DEVCLASS command or when you update the
device class by using the UPDATE DEVCLASS command.
Specify a percentage value of 20, 90, or 100. A value of 20 percent provides the
fastest access time, and 100 percent provides the largest storage capacity. For
example, if you specify a scale capacity of 20 for a 3592 device class without
compression, a 3592 volume in that device class would store 20 percent of its full
capacity of 300 GB, or about 60 GB.
Scale capacity takes effect only when data is first written to a volume. Updates to
the device class for scale capacity do not affect volumes that already have data
written to them until the volume is returned to scratch status.
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
UPDATE DEVCLASS (Update a device class)
With IBM Spectrum Protect, you can use the following types of drive encryption
with drives that are 3592 Generation 2 and later: Application, System, and Library.
These methods are defined through the hardware.
The following simplified example shows how to encrypt data for empty volumes
in a storage pool, by using IBM Spectrum Protect as the key manager:
1. Define a library by issuing the DEFINE LIBRARY command. For example, issue
the following command:
define library 3584 libtype=SCSI
2. Define a device class, 3592_ENCRYPT, by issuing the DEFINE DEVCLASS
command and specifying the value ON for the DRIVEENCRYPTION parameter. For
example, issue the following command:
define devclass 3592_encrypt library=3584 devtype=3592 driveencryption=on
3. Define a storage pool. For example, issue the following command:
define stgpool 3592_encrypt_pool 3592_encrypt
What to do next
Ensure that your systems meet licensing requirements for library sharing. An
entitlement for IBM Spectrum Protect for SAN is required for each IBM Spectrum
Protect server that is configured as a library client or a library manager in a SAN
environment.
With LAN-free data movement, IBM Spectrum Protect client systems can directly
access storage devices that are defined to an IBM Spectrum Protect server. Storage
agents are installed and configured on the client systems to perform the data
movement.
To set up library sharing, you must define one IBM Spectrum Protect server as the
library manager for your shared library configuration. Then, you define other IBM
Spectrum Protect servers as library clients that communicate and request storage
resources from the library manager. The library manager server must be at the
same version or a later version as the server or servers that are defined as library
clients.
Procedure
To complete the following steps to share library resources on a SAN among IBM
Spectrum Protect servers, complete the following steps:
1. Set up server-to-server communications.
To learn how to set up a SCSI library sharing environment for servers that run on
AIX or Linux systems, review the sample procedure.
In this example, a library manager server named ASTRO and a library client
named JUDY are configured. To help clarify where each step is performed, the
commands are preceded by the server name from which the command is issued.
Most commands are issued from the library client.
Procedure
1. To set up ASTRO as the library manager server, define a shared SCSI library
named SANGROUP. For example:
astro> define library sangroup libtype=scsi shared=yes
Then complete the rest of the steps as described in Example: Configure a SCSI
or virtual tape library with a single drive device type to configure the library.
Tip: You can use the PERFORM LIBACTION command to define drives and paths
for a library in one step.
2. Define ASTRO as the library manager server by issuing the DEFINE SERVER
command.
judy> define server astro serverpassword=secret hladdress=192.0.2.24
lladdress=1777 crossdefine=yes
3. Define the shared library SANGROUP by issuing the DEFINE LIBRARY
command. You must use the library manager server name in the
PRIMARYLIBMANAGER parameter, and use LIBTYPE=SHARED.
judy> define library sangroup libtype=shared primarylibmanager=astro
Ensure that the library name is the same as the library name on the library
manager.
4. Define paths from the library manager, ASTRO, to two drives in the shared
library by issuing the DEFINE PATH command.
AIX
Linux
Linux
Repeat the procedure to define more library clients to your library manager.
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
DEFINE DRIVE (Define a drive to a library)
DEFINE LIBRARY (Define a library)
DEFINE PATH (Define a path)
DEFINE STGPOOL (Define a volume in a storage pool)
To learn how to set up a library sharing environment for servers that run on
Windows systems, review the sample procedure.
In this example, a library manager server named ASTRO and a library client
named JUDY are configured.
For SCSI libraries, define the library by specifying the libtype=scsi parameter.
You must set up the library manager server in order to configure the IBM
Spectrum Protect servers to share SAN-connected devices.
Procedure
You must set up one or more library client servers to configure the IBM Spectrum
Protect servers to share SAN-connected devices.
You must define the library manager server. Use the following procedure as an
example of how to set up an IBM Spectrum Protect server that is named JUDY as a
library client.
Procedure
1. Ensure that the library manager server is running:
a. Start the Windows Services Management Console (services.msc).
b. Select the service. For example, TSM Server1.
c. If the service is not running, right-click and select Start.
2. Obtain the library and drive information for the shared library device:
a. Run the tsmdlst.exe utility. The utility is in the \Program
Files\Tivoli\TSM\server directory.
3. Define the shared library, SANGROUP, and identify the library manager.
Ensure that the library name is the same as the library name on the library
manager.
define library sangroup libtype=shared primarylibmanager=astro
4. Define the paths from the library client server to each of the drives by issuing
commands on the administrative client:
define path judy drivea srctype=server desttype=drive library=sangroup
device=mt0.1.0.3
define path judy driveb srctype=server desttype=drive library=sangroup
device=mt0.2.0.3
5. Define at least one device class by issuing commands from the library client:
define devclass tape devtype=dlt mountretention=1 mountwait=10
library=sangroup
Set the parameters for the device class the same on the library client as on the
library manager. Making the device class names the same on both servers is
also a good practice, but is not required.
Procedure
For more information about how to set up migration from disk to tape, see
Migrating disk storage pools.
What to do next
A storage pool hierarchy includes only primary storage pools. After you set up the
storage pool hierarchy, complete the following steps:
Adding clients
Following the successful setup of your IBM Spectrum Protect server, install and
configure client software to begin backing up data.
The procedure describes basic steps for adding a client. For more specific
instructions about configuring clients, see the documentation for the product that
you install on the client node. You can have the following types of client nodes:
Application client nodes
Application client nodes include email servers, databases, and other
applications. For example, any of the following applications can be an
application client node:
v IBM Spectrum Protect Snapshot
v IBM Spectrum Protect for Databases
v IBM Spectrum Protect for Enterprise Resource Planning
v IBM Spectrum Protect for Mail
v IBM Spectrum Protect for Virtual Environments
System client nodes
System client nodes include workstations, network-attached storage (NAS)
file servers, and API clients.
Virtual machine client nodes
Virtual machine client nodes consist of an individual guest host within a
hypervisor. Each virtual machine is represented as a file space.
Procedure
To add a client, complete the following steps:
1. Select the software to install on the client node and plan the installation. Follow
the instructions in “Selecting the client software and planning the installation”
on page 114.
2. Specify how to back up and archive client data. Follow the instructions in
“Specifying rules for backing up and archiving client data” on page 115.
3. Specify when to back up and archive client data. Follow the instructions in
“Scheduling backup and archive operations” on page 119.
4. To allow the client to connect to the server, register the client. Follow the
instructions in “Registering clients” on page 120.
5. To start protecting a client node, install and configure the selected software on
the client node. Follow the instructions in “Installing and configuring clients”
on page 121.
The preferred practice is to install the backup-archive client on all client nodes so
that you can configure and start the client acceptor on the client node. The client
acceptor is designed to efficiently run scheduled operations.
The client acceptor runs schedules for the following products: the backup-archive
client, IBM Spectrum Protect for Databases, IBM Spectrum Protect for Enterprise
Resource Planning, IBM Spectrum Protect for Mail, and IBM Spectrum Protect for
Virtual Environments. If you install a product for which the client acceptor does
not run schedules, you must follow the configuration instructions in the product
documentation to ensure that scheduled operations can occur.
Procedure
Based on your goal, select the products to install and review the installation
instructions.
Tip: If you install the client software now, you must also complete the client
configuration tasks that are described in “Installing and configuring clients” on
page 121 before you can use the client.
Tip: To use the client for space management, you can install IBM Spectrum Protect
for Space Management or IBM Spectrum Protect HSM for Windows.
Policies affect how much data is stored over time, and how long data is retained
and available for clients to restore. To meet objectives for data protection, you can
update the default policy and create your own policies. A policy includes the
following rules:
During the client registration process, you assign a client to a policy domain. The
policy for a specific client is determined by the rules in the policy domain to which
the client is assigned. In the policy domain, the rules that are in effect are in the
active policy set.
When a client backs up or archives a file, the file is bound to a management class
in the active policy set of the policy domain. A management class is the key set of
rules for managing client data. The backup and archive operations on the client
use the settings in the default management class of the policy domain unless you
further customize policy. A policy can be customized by defining more
management classes and assigning their use through client options.
Client options can be specified in a local, editable file on the client system and in a
client option set on the server. The options in the client option set on the server
can override or add to the options in the local client option file.
Procedure
1. Review the policies that are configured for your solution by following the
instructions in “Viewing policies.”
2. If you need to make minor changes to meet data retention requirements, follow
the instructions in “Editing policies” on page 117.
3. Optional: If you need to create policy domains or make extensive changes to
policies to meet data retention requirements, see Customizing policies.
Viewing policies
View policies to determine whether they must be edited to meet your
requirements.
Procedure
1. To view the active policy set for a policy domain, complete the following steps:
a. On the Services page of the Operations Center, select a policy domain and
click Details.
b. On the Summary page for the policy domain, click the Policy Sets tab.
Tip: To help ensure that you can recover data after a ransomware attack,
apply the following guidelines:
v Ensure that the value in the Backups column is a minimum of 2. The
preferred value is 3, 4, or more.
v Ensure that the value in the Keep Extra Backups column is a minimum of
14 days. The preferred value is 30 or more days.
v Ensure that the value in the Keep Archives column is a minimum of 30
days.
If IBM Spectrum Protect for Space Management software is installed on the
client, ensure that data is backed up before you migrate it. On the DEFINE
MGMTCLASS or UPDATE MGMTCLASS command, specify MIGREQUIRESBKUP=YES.
Then, follow the guidelines in the tip.
2. To view inactive policy sets for a policy domain, complete the following steps:
a. On the Policy Sets page, click the Configure toggle. You can now view and
edit the policy sets that are inactive.
116 IBM Spectrum Protect: Tape Solution Guide
b. Scroll through the inactive policy sets by using the forward and back
arrows. When you view an inactive policy set, the settings that differentiate
the inactive policy set from the active policy set are highlighted.
c. Click the Configure toggle. The policy sets are no longer editable.
Editing policies
To change the rules that apply to a policy domain, edit the active policy set for the
policy domain. You can also activate a different policy set for a domain.
Changes to policy can affect data retention. Ensure that you continue to back up
data that is essential to your organization so that you can restore that data if a
disaster occurs. Also, ensure that your system has sufficient storage space for
planned backup operations.
You edit a policy set by changing one or more management classes within the
policy set. If you edit the active policy set, the changes are not available to clients
unless you reactivate the policy set. To make the edited policy set available to
clients, activate the policy set.
Although you can define multiple policy sets for a policy domain, only one policy
set can be active. When you activate a different policy set, it replaces the currently
active policy set.
To learn about preferred practices for defining policies, see Customizing policies.
Procedure
1. On the Services page of the Operations Center, select a policy domain and click
Details.
2. On the Summary page for the policy domain, click the Policy Sets tab.
The Policy Sets page indicates the name of the active policy set and lists all of
the management classes for that policy set.
3. Click the Configure toggle. The policy set is editable.
4. Optional: To edit a policy set that is not active, click the forward and back
arrows to locate the policy set.
5. Edit the policy set by completing any of the following actions:
Option Description
Add a management 1. In the Policy Sets table, click +Management Class.
class
2. To specify the rules for backing up and archiving data,
complete the fields in the Add Management Class window.
3. To make the management class the default management class,
select the Make default check box.
4. Click Add.
Delete a management In the Management Class column, click -.
class Tip: To delete the default management class, you must first assign
a different management class as the default.
6. Click Save.
Attention: When you activate a new policy set, data might be lost. Data that
is protected under one policy set might not be protected under another policy
set. Therefore, before you activate a policy set, ensure that the differences
between the previous policy set and the new policy set do not cause data to be
lost.
7. Click Activate. A summary of the differences between the active policy set and
the new policy set is displayed. Ensure that the changes in the new policy set
are consistent with your data retention requirements by completing the
following steps:
a. Review the differences between corresponding management classes in the
two policy sets, and consider the consequences for client files. Client files
that are bound to management classes in the active policy set will be bound
to the management classes with the same names in the new policy set.
b. Identify management classes in the active policy set that do not have
counterparts in the new policy set, and consider the consequences for client
files. Client files that are bound to these management classes will be
managed by the default management class in the new policy set.
c. If the changes to be implemented by the policy set are acceptable, select the
I understand that these updates can cause data loss check box and click
Activate.
When you exclude unnecessary objects from backup operations, you get better
control of the amount of storage space that is required for backup operations, and
the cost of storage. Depending on your licensing package, you also might be able
to limit licensing costs.
Procedure
How you modify the scope of backup operations depends on the product that is
installed on the client node:
v For a backup-archive client, you can create an include-exclude list to include or
exclude a file, groups of files, or directories from backup operations. To create an
include-exclude list, follow the instructions in Creating an include-exclude list.
To ensure consistent use of an include-exclude list for all clients of one type, you
can create a client option set on the server that contains the required options.
Typically, backup operations for all clients must be completed daily. Carefully
schedule client and server workloads to achieve the best performance for your
storage environment. To avoid the overlap of client and server operations, consider
scheduling client backup and archive operations so that they run at night. If client
and server operations overlap or are not given enough time and resources to be
processed, you might experience decreased system performance, failed operations,
and other issues.
Procedure
1. Review available schedules by hovering over Clients on the Operations Center
menu bar. Click Schedules.
2. Optional: Modify or create a schedule by completing the following steps:
Option Description
Modify a schedule 1. In the Schedules view, select the schedule
and click Details.
2. On the Schedule Details page, view
details by clicking the blue arrows at the
beginning of the rows.
3. Modify the settings in the schedule, and
click Save.
Create a schedule In the Schedules view, click +Schedule and
complete the steps to create a schedule.
3. Optional: To configure schedule settings that are not visible in the Operations
Center, use a server command. For example, you might want to schedule a
client operation that backs up a specific directory and assigns it to a
management class other than the default.
Registering clients
Register a client to ensure that the client can connect to the server, and the server
can protect client data.
Determine whether the client requires an administrative user ID with client owner
authority over the client node. To determine which clients require an
administrative user ID, see technote 7048963.
Restriction: For some types of clients, the client node name and the administrative
user ID must match. You cannot authenticate those clients by using the
Lightweight Directory Access Protocol authentication method that was introduced
in V7.1.7. For details about this authentication method, sometimes referred to as
integrated mode, see Authenticating users by using an Active Directory database.
Procedure
where node_name specifies the node name and password specifies the node
password. For details, see Register a node.
v If the client does not require an administrative user ID, register the client by
using the Operations Center Add Client wizard. Complete the following steps:
1. On the Operations Center menu bar, click Clients.
2. In the Clients table, click +Client.
3. Complete the steps in the Add Client wizard:
a. Specify that redundant data can be eliminated on both the client and
server. In the Client-side data deduplication area, select the Enable check
box.
b. In the Configuration window, copy the TCPSERVERADDRESS, TCPPORT,
NODENAME, and DEDUPLICATION option values.
Tip: Record the option values and keep them in a safe place. After you
complete the client registration and install the software on the client
node, use the values to configure the client.
c. Follow the instructions in the wizard to specify the policy domain,
schedule, and option set.
d. Set how risks are displayed for the client by specifying the at-risk setting.
Procedure
If you already installed the software, start at step 2 on page 122.
1. Take one of the following actions:
v To install software on an application or client node, follow the instructions.
2. To allow the client to connect to the server, add or update the values for the
TCPSERVERADDRESS, TCPPORT, and NODENAME options in the client options file. Use
the values that you recorded when you registered the client (“Registering
clients” on page 120).
v For clients that are installed on an AIX, Linux, or Mac OS X operating
system, add the values to the client system-options file, dsm.sys.
v For clients that are installed on a Windows operating system, add the values
to the dsm.opt file.
By default, the options files are in the installation directory.
3. Optional: If you installed a backup-archive client on a Linux or Windows
operating system, install the client management service on the client. Follow
the instructions in Installing the client management service.
4. Configure the client to run scheduled operations. Follow the instructions in
“Configuring the client to run scheduled operations” on page 123.
5. Optional: Configure communications through a firewall. Follow the instructions
in “Configuring client/server communications through a firewall” on page 125.
6. Run a test backup to verify that data is protected as you planned. For example,
for a backup-archive client, complete the following steps:
a. On the Clients page of the Operations Center, select the client that you want
to back up, and click Back Up.
b. Verify that the backup completes successfully and that there are no warning
or error messages.
7. Monitor the results of the scheduled operations for the client in the Operations
Center.
What to do next
If you need to change what is getting backed up from the client, follow the
instructions in “Modifying the scope of a client backup” on page 118.
The preferred method is to install the backup-archive client on all client nodes so
that you can configure and start the client acceptor on the client node. The client
acceptor is designed to efficiently run scheduled operations. The client acceptor
manages the client scheduler so that the scheduler runs only when required:
v When it is time to query the server about the next scheduled operation
v When it is time to start the next scheduled operation
By using the client acceptor, you can reduce the number of background processes
on the client and help to avoid memory retention problems.
The client acceptor runs schedules for the following products: the backup-archive
client, IBM Spectrum Protect for Databases, IBM Spectrum Protect for Enterprise
Resource Planning, IBM Spectrum Protect for Mail, and IBM Spectrum Protect for
Virtual Environments. If you installed a product for which the client acceptor does
not run schedules, follow the configuration instructions in the product
documentation to ensure that scheduled operations can occur.
If your business uses a third-party scheduling tool as standard practice, you can
use that scheduling tool as an alternative to the client acceptor. Typically,
third-party scheduling tools start client programs directly by using operating
system commands. To configure a third-party scheduling tool, see the product
documentation.
Procedure
To configure and start the client scheduler by using the client acceptor, follow the
instructions for the operating system that is installed on the client node:
AIX and Oracle Solaris
1. From the backup-archive client GUI, click Edit > Client Preferences.
2. Click the Web Client tab.
3. In the Managed Services Options field, click Schedule. If you also
want the client acceptor to manage the web client, click the Both
option.
4. To ensure that the scheduler can start unattended, in the dsm.sys file,
set the passwordaccess option to generate.
5. To store the client node password, issue the following command and
enter the client node password when prompted:
dsmc query sess
6. Start the client acceptor by issuing the following command on the
command line:
/usr/bin/dsmcad
7. To enable the client acceptor to start automatically after a system
restart, add the following entry to the system startup file (typically,
/etc/inittab):
tsm::once:/usr/bin/dsmcad > /dev/null 2>&1 # Client Acceptor Daemon
If you used the Add Client wizard to register a client, find the option values in the
client options file that you obtained during that process. You can use the values to
specify ports.
Procedure
Procedure
To configure LAN-free data movement, complete the following steps. For details,
see the documentation for IBM Spectrum Protect for SAN.
1. Verify the network connection.
2. Establish communications among the client, storage agent, and the server.
3. Install and configure software on client systems.
4. Configure devices on the server for the storage agent to access.
5. Configure IBM Spectrum Protect policies for LAN-free data movement for the
client.
6. If you are using shared FILE storage, install and configure IBM TotalStorage
SAN File System or IBM Spectrum Scale™.
What to do next
To help you tune the use of your LAN and SAN resources, you can control the
path that data transfers take for clients with the capability of LAN-free data
movement. Control the path by using the UPDATE NODE command. For each client,
you can select one of the following settings for data read and write operations.
Specify data read operations by using the DATAREADPATH parameter and data write
operations by using the DATAWRITEPATH parameter. The parameter is optional. The
default value is ANY.
LAN (LAN path only)
Specify the LAN value if either of the following conditions is true:
v You want to back up or restore a small amount of data.
v The client does not have SAN connectivity.
LANFREE (LAN-free path only)
Specify the LANFREE value if the client and server are on the same SAN,
and any of the following conditions are true:
v You want to back up or restore a large amount of data.
v You want to offload the server processing load to the client.
v You want to relieve LAN congestion.
ANY (Any available path)
A LAN-free path is used if one is available. If a LAN-free path is
unavailable, the data is moved by using the LAN.
Procedure
Determine whether a client node has a problem with its LAN-free configuration by
issuing the VALIDATE LANFREE command. For example, if the client node FRED is
using the storage agent FRED_STA, issue the following command:
validate lanfree fred fred_sta
The results help you to identify adjustments that might be needed in the storage
configuration or policies. The output displays which management class
destinations for a specific operation type are not capable of LAN-free data
transfers. It also reports the total number of LAN-free destinations.
Related reference:
VALIDATE LANFREE (Validate LAN-Free paths)
It is critical to secure client data, especially when that data is sensitive. To ensure
that data in onsite and offsite volumes is protected, IBM tape encryption
technology is available.
IBM tape technology supports different methods of drive encryption for the
following devices:
v IBM 3592 Generation 2 and Generation 3
v IBM Linear Tape-Open (LTO) Generation 4 and Generation 5
The methods of drive encryption that you can use with IBM Spectrum Protect are
set up at the hardware level. IBM Spectrum Protect cannot control or change which
encryption method is used in the hardware configuration. If the hardware is set up
for the Application method, IBM Spectrum Protect can turn encryption on or off
depending on the DRIVEENCRYPTION value on the device class.
To encrypt all data in a particular logical library or to encrypt data on more than
just storage pool volumes, use the Library or System method. If the encryption key
manager is set up to share keys, the Library and System methods can share the
encryption key, which allows the two methods to be interchanged. IBM Spectrum
Protect cannot share or use encryption keys between the Application method and
either the Library or the System methods of encryption.
To determine whether a volume is encrypted and which method was used, issue
the QUERY VOLUME command and specify the FORMAT=DETAILED parameter.
To determine which encryption methods can be used with various drive types, see
the following table.
Table 22. Available encryption methods
Application method Library method System method
3592 Generation 2 Yes Yes. Yes
and later
HP LTO-4 and later Yes No. No
IBM LTO-4 and later Yes Yes, but only if your Yes
system hardware (for
example, a TS3500
tape library) supports
it.
Oracle StorageTek Yes No. No
T10000B
Oracle StorageTek Yes No. No
T10000C
Oracle StorageTek Yes No. No
T10000D
A library can contain a mixture of drives, some of which support encryption and
some of which do not. For example, a library might contain two LTO-2 drives, two
LTO-3 drives, and two LTO-4 drives. You can also mix media in a library by using,
for example, encrypted and non-encrypted device classes that have different tape
and drive technologies.
Restrictions:
For more information about setting up your hardware environment to use drive
encryption, see your hardware documentation.
Procedure
1. Install a device driver that supports drive encryption:
v To enable encryption for an IBM LTO-4 or later drive, you must install the
IBM RMSS Ultrium device driver. SCSI drives do not support IBM LTO-4 or
later encryption.
v To enable encryption for an HP LTO-4 or later drive, you must install the
IBM Spectrum Protect device driver.
2. Enable drive encryption by specifying the DRIVEENCRYPTION parameter on the
DEFINE DEVCLASS or UPDATE DEVCLASS command for the 3592, LTO, or
ECARTRIDGE device types.
What to do next
“Enabling and disabling drive encryption for LTO Generation 4 or later tape
drives” on page 99
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
UPDATE DEVCLASS (Update a device class)
If the ESTCAPACITY parameter is not specified, IBM Spectrum Protect uses a default
value that is based on the recording format that is specified for the device class by
using the FORMAT parameter.
If you specify an estimated capacity that exceeds the actual capacity of the volume
in the device class, IBM Spectrum Protect updates the estimated capacity of the
volume when the volume becomes full. When IBM Spectrum Protect reaches the
end of the volume, it updates the capacity to match the amount that is written to
the volume.
You can either accept the default estimated capacity for the device class, or
explicitly specify an estimated capacity. An accurate estimated capacity value is not
required, but is useful. IBM Spectrum Protect uses the estimated capacity of
volumes to determine the estimated capacity of a storage pool, and the estimated
percent that is used. You might want to change the estimated capacity if on or both
of the following conditions are true:
v The default estimated capacity is inaccurate because of data compression.
v You have volumes of nonstandard size.
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
UPDATE DEVCLASS (Update a device class)
For tape device classes, the default values selected by the server depend on the
recording format that is used to write data to the volume. You can either accept the
default for a device type or specify a value.
To specify estimated capacity for tape volumes, use the ESTCAPACITY parameter
when you define the device class or update its definition.
Related reference:
To specify a recording format, use the FORMAT parameter when you define the
device class or update its definition.
If all drives associated with that device class are identical, specify FORMAT=DRIVE.
The server selects the highest format that is supported by the drive on which a
volume is mounted.
If some drives associated with the device class support a higher density format
than others, specify a format that is compatible with all drives.
If drives in a single SCSI library use different tape technologies (for example, DLT
and LTO Ultrium), specify a unique value for the FORMAT parameter in each device
class definition.
For a configuration example, see Example: Configure a SCSI or virtual tape library
with multiple drive device types.
The recording format that the server uses for a volume is selected when data is
first written to the volume. Updating the FORMAT parameter does not affect media
that already contain data until those media are rewritten from the beginning. This
process might happen after a volume is reclaimed or deleted, or after all of the
data on the volume expires.
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
UPDATE DEVCLASS (Update a device class)
When you select a mount limit for a device class, consider the following issues:
v How many storage devices are connected to your system?
Do not specify a mount limit value that is greater than the number of associated
available drives in your installation. If the server tries to mount as many
volumes as specified by the mount limit and no drives are available for the
required volume, an error occurs and client sessions might end. (This restriction
does not apply when the DRIVES parameter is specified.)
If you are sharing library resources on a SAN among IBM Spectrum Protect
servers, you must limit the number of tape drives that a library client can use at
a time. To allow multiple library client servers use a library simultaneously
specify the MOUNTLIMIT parameter when you define or update the device class on
the library client. For more information about configuring library sharing, see
“Configuring library sharing” on page 103.
v Are you using the simultaneous-write function to primary storage pools, copy
storage pools, and active-data pools?
Specify a mount limit value that provides enough mount points to support
writing data simultaneously to the primary storage pool and all associated copy
storage pools and active-data pools.
v Are you associating multiple device classes with a single library?
A device class that is associated with a library can use any drive in the library
that is compatible with the device class' device type. Because you can associate
more than one device class with a library, a single drive in the library can be
used by more than one device class. IBM Spectrum Protect ensures that two
operations cannot use the same drive simultaneously by using two different
device classes.
v How many IBM Spectrum Protect processes do you want to run at the same
time, by using devices in this device class?
IBM Spectrum Protect automatically cancels some processes to run other, higher
priority processes. If the server is using all available drives in a device class to
complete higher priority processes, lower-priority processes must wait until a
drive becomes available. For example, IBM Spectrum Protect cancels the process
for a client that backs up directly to tape if the drive is needed for a server
migration or tape reclamation process. IBM Spectrum Protect cancels a tape
To control the amount of time a mounted volume remains mounted, use the
MOUNTRETENTION parameter when you define the device class or update its
definition. For example, if the mount retention value is 60, and a mounted volume
remains idle for 60 minutes, the server dismounts the volume.
While IBM Spectrum Protect has a volume mounted, the drive is allocated to IBM
Spectrum Protect and cannot be used for anything else. If you need to free the
drive for other uses, you can cancel IBM Spectrum Protect operations that are
using the drive and then dismount the volume. For example, you can cancel server
migration or backup operations. For information on how to cancel processes and
dismount volumes, see “Managing server requests for volumes” on page 210
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
UPDATE DEVCLASS (Update a device class)
To control the wait time for a drive to become available for a mount request, use
the MOUNTWAIT parameter when you define or update a device class.
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
UPDATE DEVCLASS (Update a device class)
Preempting operations
The server can preempt server or client operations for a higher priority operation
when a mount point is in use and no others are available, or access to a specific
volume is required. When an operation is preempted, it is canceled.
You can use the QUERY MOUNT command to see the status of the volume for the
mount point.
Mount points can be preempted only when the device class of the operation
preempting and the operation that is being preempted is the same.
The following high-priority operations can preempt other operations for a mount
point.
v Database backup operations
v Retrieve, restore, or HSM recall operations that are initiated by clients
v Restore operations by using a remote data mover
v Export operations
v Import operations
v Operations to generate backup sets
The following operations can be preempted and are listed in order of priority, from
highest priority to lowest priority. The server selects the lowest priority operation
to preempt, for example, identify duplicates.
v Replicate nodes
v Back up data to a copy storage pool
v Copy active data to an active data pool
v Move data on a storage pool volume
v Migrate data from disk to sequential media
v Migrate data from sequential media to sequential media
v Back up, archive, or HSM migrate operations that are initiated by clients
v Reclaim volumes in a sequential-access storage pool
v Identify duplicates
The following operations can be preempted, and are listed in order of priority,
from highest priority to lowest priority. The server selects the lowest priority
operation to preempt, for example, identify duplicates.
v Replicate nodes
v Back up data to a copy storage pool
v Copy active data to an active data pool
v Move data on a storage pool volume
Device IDs that are assigned by the SAN and known to the server or storage agent
can be altered due to bus resets or other environmental changes. For example, the
server might know a device X as rmt0 (on AIX), based on the original path
specification to the server and original configuration of the LAN. However, some
event in the SAN, for example, the addition of new device Y, causes device X to be
assigned rmt1. When the server tries to access device X by using rmt0, either the
access fails or the wrong target device is accessed. The server attempts to recover
from changes to devices on the SAN by using device serial numbers to confirm the
identity of devices it contacts.
When you define a drive or library, you have the option of specifying the serial
number for that device. If you do not specify the serial number when you define
the device, the server obtains the serial number when you define the path for the
device. In either case, the server then has the device serial number in its database
and can use it to confirm the identity of a device for operations.
When the server uses drives and libraries on a SAN, the server attempts to verify
that the correct device is used. The server contacts the device by using the device
name in the path that you defined for it. The server then requests the serial
number from the device, and compares that serial number with the serial number
that is stored in the server database for that device.
If the serial number does not match, the server begins the process of discovery on
the SAN, attempting to find the device with the matching serial number. If the
server finds the device with the matching serial number, it corrects the definition
of the path in the server's database by updating the device name in that path. The
server issues a message with information about the change that is made to the
device. Then, the server proceeds to use the device.
To determine when device changes on the SAN affect the IBM Spectrum Protect
server, you can monitor the activity log for messages. The following messages are
related to serial numbers:
v ANR8952 through ANR8958
v ANR8961 through ANR8968
v ANR8974 through ANR8975
Restriction: Some devices cannot report their serial numbers to applications such
as the IBM Spectrum Protect server. If the server cannot obtain the serial number
from a device, the server cannot help the system to recover from a device location
change on the SAN.
You can display information about devices that are connected to the server by
using the device information utility (tsmdlst).
Procedure
1. From a command prompt, change to the server subdirectory of the server
installation directory, for example, C:\Program Files\Tivoli\TSM\server.
2. Run the tsmdlst.exe executable file.
Related reference:
QUERY SAN (Query the devices on the SAN)
tsmdlst (Display information about devices)
You can use the following types of WORM media with IBM Spectrum Protect:
v IBM 3592, all supported generations
v IBM LTO-3 and all supported generations
v HP LTO-3 and all supported generations
v Quantum LTO-3 and all supported generations
v Quantum SDLT 600, Quantum DLT V4, and Quantum DLT S4
v StorageTek VolSafe
v Sony AIT50 and AIT100
Tips:
v A storage pool can consist of either WORM or RW media, but not both.
v To avoid wasting tape after a restore or import operation, do not use WORM
tapes for database backup or export operations.
Library changers cannot identify the difference between standard read/write (RW)
tape media and the following types of WORM tape media:
v VolSafe
v Sony AIT
v LTO
v SDLT
v DLT
To determine the type of WORM media that is being used, a volume must be
loaded into a drive. Therefore, when you check in one of these types of WORM
volumes, you must use the CHECKLABEL=YES option on the CHECKIN LIBVOLUME
command.
If they provide support for WORM media, IBM 3592 library changers can detect
whether a volume is WORM media without loading the volume into a drive.
Specifying CHECKLABEL=YES is not required. Verify with your hardware vendors that
your 3592 drives and libraries provide the required support.
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
You cannot use WORM media with IBM Spectrum Protect specified as the
drive-encryption key manager for the following drives:
v IBM LTO-5, LTO-6, and later
v HP LTO-5, LTO-6, and later
v Oracle StorageTek T10000B
v Oracle StorageTek T10000C
v Oracle StorageTek T10000D
Issue the LABEL LIBVOLUME command only once for VolSafe volumes. You can guard
against overwriting the label by using the OVERWRITE=NO option on the LABEL
LIBVOLUME command.
Related reference:
LABEL LIBVOLUME (Label a library volume)
If you have SDLT-600, DLT-V4, or DLT-S4 drives and you want to enable them for
WORM media, upgrade the drives by using V30 or later firmware available from
Quantum. You can also use DLTIce software to convert unformatted RW volumes
or blank volumes to WORM volumes.
In SCSI libraries, the IBM Spectrum Protect server creates scratch DLT WORM
volumes automatically when the server cannot locate any scratch WORM volumes
in a library's inventory. The server converts available unformatted or blank RW
scratch volumes or empty RW private volumes to scratch WORM volumes. The
server also rewrites labels on newly created WORM volumes by using the label
information on the existing RW volumes.
You can troubleshoot errors that occur when you configure or use devices with
IBM Spectrum Protect.
Procedure
1. Test backup operations to verify that your data is protected in the way that you
expect.
a. On the Clients page of the Operations Center, select the clients that you
want to back up, and click Back Up.
b. On the Servers page of the Operations Center, select the server for which
you want to back up the database. Click Back Up, and follow the
instructions in the Back Up Database window.
c. Verify that the backup operations completed successfully with no warning
or error messages.
Tip: Alternatively, you can use the backup-archive client GUI to back up
client data and you can backup the server database by issuing BACKUP DB
command from an administrative command-line.
2. Set up monitoring for your solution by following the instructions in Part 3,
“Monitoring a tape solution,” on page 147.
The preferred way to monitor a solution is by using the Operations Center, which
provides overall and detailed system status in a graphical user interface. In
addition, you can configure the Operations Center to generate email reports that
summarize system status.
Procedure
1. Complete daily monitoring tasks. For instructions, see Daily monitoring
checklist.
2. Complete periodic monitoring tasks. For instructions, see Periodic monitoring
checklist.
3. Verify that your system complies with licensing requirements. For instructions,
see Verifying license compliance.
4. Optional: Set up email reports of system status. For instructions, see
Chapter 21, “Tracking system status by using email reports,” on page 165
Complete the daily monitoring tasks from the Operations Center Overview page.
You can access the Overview page by opening the Operations Center and clicking
Overviews.
The following figure shows the location for completing each task.
Tip: To run administrative commands for advanced monitoring tasks, use the
Operations Center command builder. The command builder provides a type-ahead
function to guide you as you enter commands. To open the command builder, go
to the Operations Center Overview page. On the menu bar, hover over the settings
icon and click Command Builder.
The following table lists the daily monitoring tasks and provides instructions for
completing each task.
1. To verify whether servers are at risk, Tip: If you detect an issue that is related to
3 Determine server properties, update the server properties:
in the Servers area, look for an
whether servers that Unavailable notification. 1. In the Servers table, select a server and click
are managed by the Details.
2. To view additional information, click
Operations Center are
the Servers area. 2. To update server properties, click
available to provide
3. Select a server in the Servers table and Properties.
data protection services
to clients. click Details.
1. Click the Servers area. You can also look for related alerts on the
4 Determine Alerts page. For additional instructions about
2. In the Status column of the table,
whether sufficient troubleshooting, see Resolving server problems.
view the status of the server and
space is available for
resolve any issues:
the server inventory,
which consists of the v Normal Sufficient space is
server database, active available for the server database,
log, and archive log. active log, and archive log.
v Critical Insufficient space is
available for the server database,
active log, or archive log. You must
add space immediately, or the data
protection services that are
provided by the server will be
interrupted.
v Warning The server database,
active log, or archive log is running
out of space. If this condition
persists, you must add space.
v To obtain an overview of activity in the v If more data was sent to the server than you
7 Verify that the last 24 hours, view the Activity area. expected, determine which clients are
amount of data that backing up more data and investigate the
v To compare activity in the last 24 hours
was recently sent to cause. It is possible that client-side data
with activity in the previous 24 hours,
and from servers is deduplication is not working correctly.
review the figures in the Current and
within the expected
Previous areas. Attention: If the amount of backed-up data
range.
is significantly larger than usual, it might
indicate a ransomware attack. When
ransomware encrypts data, the system
perceives the data as being changed, and the
changed data is backed up. Thus, backup
volumes become larger. To determine which
clients are affected, click the Applications,
Virtual, or Systems tabs.
v If less data was sent to the server than you
expected, investigate whether client backup
operations are proceeding on schedule.
1. If problems are indicated in the To view the storage-pool capacity that was
8 Verify that used over the past two weeks, select a row in
Storage & Data Availability area, click
storage pools are Pools to view the details: the Storage Pools table and click Details.
available to back up
client data. v If the Critical status is
displayed, insufficient space is
available in the storage pool, or its
access status is unavailable.
Attention: If the status is critical,
investigate the cause:
– If the data deduplication rate for
a storage pool drops
significantly, it might indicate a
ransomware attack. During a
ransomware attack, data is
encrypted and cannot be
deduplicated. To verify the data
deduplication rate, in the Storage
Pools table, review the value in
the % Savings column.
– If a storage pool unexpectedly
becomes 100% utilized, it might
indicate a ransomware attack. To
verify the utilization, review the
value in the Capacity Used
column. Hover over the values
to see the percentages of used
and free space.
v If the Warning status is
displayed, the storage pool is
running out of space, or its access
status is read-only.
2. To view the used, free, and total space
for your selected storage pool, hover
over the entries in the Capacity Used
column.
Tip: To run administrative commands for advanced monitoring tasks, use the
Operations Center command builder. The command builder provides a type-ahead
function to guide you as you enter commands. To open the command builder, go
to the Operations Center Overview page. On the menu bar, hover over the settings
icon and click Command Builder.
Table 25. Periodic monitoring tasks
Task Basic procedures Advanced procedures and troubleshooting
Monitor system Determine the length of time that is Limit the time for client backup operations to 8
performance. required for client backup - 12 hours. Ensure that client schedules do not
operations: overlap with server maintenance tasks.
1. On the Operations Center
For instructions about reducing the time that it
Overview page, click Clients.
takes for the client to back up data to the
Find the server that is associated
server, see Resolving common client
with the client.
performance problems.
2. Click Servers. Select the server
and click Details. Look for performance bottlenecks. For
3. To view the duration of instructions, see Identifying performance
completed tasks in the last 24 bottlenecks.
hours, click Completed Tasks.
For information about identifying and resolving
4. To view the duration of tasks other performance issues, see Performance.
that were completed more than
24 hours ago, use the QUERY
ACTLOG command. For
information about this
command, see QUERY ACTLOG
(Query the activity log).
5. If the duration of client backup
operations is increasing and the
reasons are not clear, investigate
the cause.
A tape alert message can have one of the following severity levels:
v Informational (for example, trying to load a cartridge type that is not supported)
v Warning (for example, a hardware failure is predicted)
v Critical (for example, there is a problem with the tape and data is at risk)
Procedure
v To enable tape alert messages, issue the SET TAPEALERTMSG command and specify
the ON value: set tapealertmsg on
v To check whether tape alert messages are enabled, issue the QUERY TAPEALERTMSG
command: query tapealertmsg
By default, existing volumes with a status of FILLING remain in that state after a
drive upgrade. In some cases, you might want to continue to use a previous drive
to fill these volumes. This preserves read/write capability for the existing volumes
until they are reclaimed. If you choose to upgrade all of the drives in a library,
verify that the media formats are supported by the new hardware. Unless you plan
to use only the most current media with your new drive, you need to be aware of
any compatibility issues. For migration instructions, see “Migrating data to
upgraded drives” on page 225.
To use a new drive with media that it can read but not write to, issue the UPDATE
VOLUME command to set the access for those volumes to read-only. This prevents
errors that are caused by read/write incompatibility. For example, a new drive
might eject media that is written in a format that the drive does not support as
soon as the media is loaded into the drive. Or a new drive might fail the first write
command to media partially written in a format that the drive does not support.
When data on the read-only media expires and the volume is reclaimed, replace it
with media that is fully compatible with the new drive. Errors can be generated if
a new drive is unable to correctly calibrate a volume that is written when you use
a previous format. To avoid this problem, ensure that the original drive is in good
working order and at current microcode levels.
The method that you use to verify that your solution complies with license terms
varies depending on the provisions of your IBM Spectrum Protect licensing
agreement.
Front-end capacity licensing
The front-end model determines license requirements based on the amount
of primary data that is reported as being backed up by clients. Clients
include applications, virtual machines, and systems.
Back-end capacity licensing
The back-end model determines license requirements based on the
terabytes of data that are stored in primary storage pools and repositories.
Tips:
v To ensure the accuracy of front-end and back-end capacity estimates,
install the most recent version of the client software on each client node.
v The front-end and back-end capacity information in the Operations
Center is for planning and estimation purposes.
PVU licensing
The PVU model is based on the use of PVUs by server devices.
For the most recent information about licensing models, see the information about
product details and licenses at the IBM Spectrum Protect product family website. If
you have questions or concerns about licensing requirements, contact your IBM
Spectrum Protect software provider.
Procedure
Tip: The Operations Center provides an email report that summarizes front-end
and back-end capacity usage. Reports can be sent automatically to one or more
recipients regularly. To configure and manage email reports, click Reports on the
Operations Center menu bar.
1. On the Operations Center menu bar, hover over the settings icon
Front-end model
and click Licensing.
The front-end capacity estimate is displayed on the Front-end
Usage page.
2. If a value is displayed in the Not Reporting column, click the
number to identify clients that did not report capacity usage.
3. To estimate capacity for clients that did not report capacity usage,
go to the following FTP site, which provides measuring tools and
instructions:
ftp://public.dhe.ibm.com/storage/tivoli-storage-management/
front_end_capacity_measurement_tools
To measure front-end capacity by script, complete the instructions
in the most recently available licensing guide.
4. Add the Operations Center estimate and any estimates that you
obtained by using a script.
5. Verify that the estimated capacity complies with your licensing
agreement.
Restriction: If the source and target replication servers do not use the
Back-end model same policy settings, you cannot use the Operations Center to monitor
back-end capacity usage for replicated clients. For information about
how to estimate capacity usage for these clients, see technote 1656476.
1. On the Operations Center menu bar, hover over the settings icon
and click Licensing.
2. Click the Back-end tab.
3. Verify that the estimated amount of data complies with your
licensing agreement.
PVU model For information about how to assess compliance with PVU licensing
terms, see Assessing compliance with the PVU licensing model.
Before you set up email reports, ensure that the following requirements are met:
v A Simple Mail Transfer Protocol (SMTP) host server is available to send and
receive reports by email. The SMTP server must be configured as an open mail
relay. You must also ensure that the IBM Spectrum Protect server that sends
email messages has access to the SMTP server. If the Operations Center is
installed on a separate computer, that computer does not require access to the
SMTP server.
v To set up email reports, you must have system privilege for the server.
v To specify the recipients, you can enter one or more email addresses or
administrator IDs. If you plan to enter an administrator ID, the ID must be
registered on the hub server and must have an email address that is associated
with it. To specify an email address for an administrator, use the EMAILADDRESS
parameter of the UPDATE ADMIN command.
| You can configure the Operations Center to send a general operations report, a
| license compliance report, and one or more custom reports. You create custom
| reports by selecting a template from a set of commonly used report templates or
| by entering SQL SELECT statements to query managed servers.
Procedure
To set up and manage email reports, complete the following steps:
1. On the Operations Center menu bar, click Reports.
2. If an email server connection is not yet configured, click Configure Mail Server
and complete the fields. After you configure the mail server, the general
operations report and license compliance report are enabled.
3. To change report settings, select a report, click Details, and update the form.
4. Optional: To add a custom report, click + Report, and complete the fields.
Tip: To immediately run and send a report, select the report and click Send.
Results
What to do next
You can use the Operations Center to monitor multiple servers and to complete
some administrative tasks. The Operations Center also provides web access to the
IBM Spectrum Protect command line. For more information about managing the
Operations Center, see Managing the Operations Center.
In some cases, you can resolve client errors by stopping and starting the client
acceptor. If client nodes or administrator IDs are locked, you can resolve the issue
by unlocking the client node or administrator ID, and then resetting the password.
For detailed instructions about identifying and resolving client errors, see
Resolving client problems.
For instructions about adding clients, see Chapter 13, “Protecting applications and
systems,” on page 113.
Procedure
To diagnose and resolve client errors, take one of the following actions:
v If the client management service is installed on the client node, complete the
following steps:
1. On the Operations Center Overview page, click Clients and select the client.
2. Click Details.
3. On the client Summary page, click the Diagnosis tab.
4. Review the retrieved log messages.
Tips:
– To show or hide the Client Logs pane, double-click the Client Logs bar.
– To resize the Client Logs pane, click and drag the Client Logs bar.
If suggestions are displayed on the Diagnosis page, select a suggestion. In
the Client Logs pane, client log messages to which the suggestion relates are
highlighted.
5. Use the suggestions to resolve the problems that are indicated by the error
messages.
Procedure
Follow the instructions for the operating system that is installed on the client node:
AIX and Oracle Solaris
v To stop the client acceptor, complete the following steps:
1. Determine the process ID for the client acceptor by issuing the
following command on the command line:
ps -ef | grep dsmcad
Resetting passwords
If a password for a client node or an administrator ID is lost or forgotten, you can
reset the password. Multiple attempts to access the system with an incorrect
password can cause a client node or administrator ID to be locked. You can take
steps to resolve the issue.
Procedure
where node_name specifies the client node and new_password specifies the
password that you assign.
2. Inform the client node owner about the changed password. When the owner
of the client node logs in with the specified password, a new password is
generated automatically. That password is unknown to users to enhance
security.
where node_name specifies the name of the node and new_password specifies
the password that you assign.
4. Inform the client node owner about the changed password. When the owner
of the client node logs in with the specified password, a new password is
generated automatically. That password is unknown to users to enhance
security.
Procedure
To upgrade the software, complete the instructions that are listed in the following
table.
The simplest method for decommissioning a client node is to use the Operations
Center. The decommission process runs in the background. If the client is
configured to replicate client data, the Operations Center automatically removes
the client from replication on the source and target replication servers before it
decommissions the client.
Procedure
What to do next
Watch for error messages, which might be displayed in the user interface or in the
command output, immediately after you run the process.
v If no status is provided for the decommission process, and you did not
receive an error message, the process is incomplete. A process can be
incomplete if files that are associated with the node are not yet deactivated.
After the files are deactivated, run the decommission process again.
v If no status is provided for the decommission process, and you receive an
error message, the process failed. Run the decommission process again.
Related reference:
DECOMMISSION NODE (Decommission a client node)
DECOMMISSION VM (Decommission a virtual machine)
When you run the deactivation process, all active backup data that was stored
before the specified date becomes inactive. The data is deleted as it expires and
cannot be restored. The deactivation feature applies only to application clients that
protect Oracle databases.
Procedure
1. From the Operations Center Overview page, click Clients.
2. In the Clients table, select one or more clients and click More > Clean Up.
Check the Operations Center to determine the component of the inventory that is
full. Ensure that you stop the server before you increase the size of one of the
inventory components.
Procedure
v To increase the disk space for the database, complete the following steps:
– Create one or more directories for the database on separate drives or file
systems.
– Issue the EXTEND DBSPACE command to add the directory or directories to the
database. The directories must be accessible to the instance user ID of the
database manager. By default, data is redistributed across all database
directories and space is reclaimed.
Tips:
- The time that is needed to complete redistribution of data and reclaiming
of space is variable, depending on the size of your database. Make sure
that you plan adequately.
- Ensure that the directories that you specify are the same size as existing
directories to ensure a consistent degree of parallelism for database
operations. If one or more directories for the database are smaller than the
others, they reduce the potential for optimized parallel prefetching and
distribution of the database.
– Halt and restart the server to fully use the new directories.
Restriction: The commands can increase I/O activity, and might affect server
performance. To minimize performance problems, wait until one command is
completed before you issue the next command. The DB2 commands can be
issued when the server is running.
v To increase or decrease the size of the active log, complete the following steps:
1. Ensure that the location for the active log has enough space for the increased
log size.
2. Halt the server.
3. In the dsmserv.opt file, update the ACTIVELOGSIZE option to the new size of
the active log, in megabytes.
The size of an active log file is based on the value of the ACTIVELOGSIZE
option. Guidelines for space requirements are in the following table:
Table 26. How to estimate volume and file space requirements
Reserve this much free space in the active
log directory, in addition to the
ACTIVELOGSize option value ACTIVELOGSize space
16 GB - 128 GB 5120 MB
129 GB - 256 GB 10240 MB
257 GB - 512 GB 20480 MB
To change the active log to its maximum size of 512 GB, enter the following
server option:
activelogsize 524288
4. If you plan to use a new active log directory, update the directory name that
is specified in the ACTIVELOGDIRECTORY server option. The new directory must
be empty and must be accessible to the user ID of the database manager.
5. Restart the server.
v Compress the archive logs to reduce the amount of space that is required for
storage. Enable dynamic compression of the archive log by issuing the following
command:
setopt archlogcompress yes
Restriction: Use caution when you enable the ARCHLOGCOMPRESS server option on
systems with sustained high volume usage and heavy workloads. Enabling this
option in this system environment can cause delays in archiving log files from
the active log file system to the archive log file system. This delay can cause the
active log file system to run out of space. Be sure to monitor the available space
in the active log file system after archive log compression is enabled. If the
active log directory file system usage nears out of space conditions, the
ARCHLOGCOMPRESS server option must be disabled. You can use the SETOPT
command to disable archive log compression immediately without halting the
server.
Related reference:
ACTIVELOGSIZE server option
Procedure
1. Monitor system performance regularly to ensure that backup and maintenance
tasks are completing successfully. For more information about monitoring, see
Part 3, “Monitoring a tape solution,” on page 147.
2. If the monitoring information shows that the server workload increased, you
might need to review the planning information. Review whether the capacity of
the system is adequate in the following cases:
v The number of clients increases
v The amount of data that is being backed up increases
v The amount of time that is available for backups changes
3. Determine whether your solution has performance issues. Review the client
schedules to check whether tasks are completing within the scheduled time
frame:
a. On the Clients page of the Operations Center, select the client.
b. Click Details.
c. From the client Summary page, review the Backed up and Replicated
activity to identify any risks.
Adjust the time and frequency of client backup operations, if necessary.
4. Schedule enough time for the following maintenance tasks to complete
successfully within a 24-hour period:
a. Back up the database
b. Run expiration to remove client backups and archive file copies from server
storage.
Related concepts:
Performance
Related tasks:
Deduplicating data (V7.1.1)
Figure 7 shows an example of collocation by file space group. Six groups are
defined. Each group contains data from file spaces that belong to a single node.
The data for each group is stored on a separate volume.
1
3
1
2
4 2
3
5
4
5
6 6
Collocation by group is the IBM Spectrum Protect system default for primary
sequential-access storage pools. The default for copy storage pools is no
collocation.
When collocation is enabled for a group, single client node, or file space, all the
data that belongs to the group, the node, or the file space is moved or copied by
one server process. For example, if data is collocated by group, all data for all
nodes that belong to the same collocation group is migrated by the same process.
When collocating data, the IBM Spectrum Protect server tries to keep files together
on a minimal number of sequential-access storage volumes. However, when the
server is backing up data to volumes in a sequential-access storage pool, the
backup process has priority over collocation settings. As a result, the server
completes the backup operation, but might not be able to collocate the data.
For example, suppose that you are collocating by node and you specify that a node
can use two mount points on the server. Suppose also that the data that is backed
up from the node can easily fit on one tape volume. During backup, the server
might mount two tape volumes, and the node's data might be distributed across
two tapes, rather than one. If you enable collocation, the following server
operations use one server process:
v Moving data from random-access and sequential-access volumes
v Moving node data from sequential-access volumes
v Backing up a random-access or sequential-access storage pool
v Restoring a sequential-access storage pool
v Reclaiming space in a sequential-access storage pool or offsite volumes
v Migrating data from a random-access storage pool
However, when you migrate collocated data from a sequential-access storage pool
to another sequential-access storage pool, the server orders the volumes according
One reason to collocate by group is that individual client nodes often do not have
sufficient data to fill high-capacity tape volumes. Collocating data by groups of
nodes can reduce unused tape capacity by putting more collocated data on
individual tapes. Also, collocating data by groups of file spaces reduces the unused
tape to a greater degree.
The data that belongs to all the nodes in the same collocation group are migrated
by the same process. Therefore, collocation by group can reduce the number of
times that a volume to be migrated must be mounted. Collocation by group can
also minimize database scanning and reduce tape passes during data transfer from
one sequential-access storage pool to another.
Table 28 shows how the IBM Spectrum Protect server selects the first volume when
collocation is enabled for a storage pool at the client-node, collocation-group, and
file-space level.
Table 28. How the server selects volumes when collocation is enabled
Volume Selection When collocation is by group When collocation is by node When collocation is by file
Order space
1 A volume that already A volume that already A volume that already
contains files from the contains files from the same contains files from the same
collocation group to which the client node file space of that client node
client belongs
2 An empty predefined volume An empty predefined volume An empty predefined volume
3 An empty scratch volume An empty scratch volume An empty scratch volume
4 A volume with the most A volume with the most A volume that contains data
available free space among available free space among from the same client node
volumes that already contain volumes that already contain
data data
5 Not applicable Not applicable A volume with the most
available free space among
volumes that already contain
data
When the server must continue to store data on a second volume, it uses the
following selection order to acquire more space:
1. An empty predefined volume
2. An empty scratch volume
3. A volume with the most available free space among volumes that already
contain data
4. Any available volume in the storage pool
When collocation is by client node or file space, the server tries to provide the best
use of individual volumes and minimizes file mixing from different clients or file
spaces on volumes. This configuration is depicted in Figure 9 on page 186, which
Tips:
1. If collocation is by node and the node has multiple file spaces, the server does
not attempt to collocate those file spaces.
2. If collocation is by file space and a node has multiple file spaces, the server
attempts to put data for different file spaces on different volumes.
Amount
of space D
used on
each
A
B D
volume C
VOL1 VOL2 VOL3 VOL4 VOL5
Numbers of volumes (1 to n)
Figure 9. Using all available sequential-access storage volumes with collocation enabled at
the node or file space level
Collocation can be by file space group or node group. When collocation is by node
group (node collocation group), the server tries to collocate data from nodes that
belong to the same collocation group. A file space collocation group uses the same
methods as a node collocation group, but can use more space because of the
granularity of file space sizes. As shown in Figure 10 on page 187, data for the
following groups of nodes was collocated:
v Group 1 consists of nodes A, B, and C
v Group 2 consists of nodes D and E
v Group 3 consists of nodes F, G, H, and I
Whenever possible, the IBM Spectrum Protect server collocates data that belongs to
a group of nodes on a single tape, as represented by Group 2 in the figure. Data
for a single node can also be spread across several tapes that are associated with a
group (Group 1 and 2). If the nodes in the collocation group have multiple file
spaces, the server does not attempt to collocate those file spaces.
Numbers of volumes (1 to n)
Figure 10. Using all available sequential-access storage volumes with collocation enabled at
the group level
Normally, the IBM Spectrum Protect server always writes data to the current filling
volume for the operation that is running. However, occasionally you might notice
more than one filling volume in a collocated storage pool. Having more than one
filling volume in a collocated storage pool can occur if different server processes or
client sessions try to store data into the collocated pool at the same time. In this
situation, IBM Spectrum Protect allocates a volume for each process or session that
needs a volume so that both operations are completed as quickly as possible.
When you store client files in a sequential-access storage pool where collocation is
disabled, the server selects a volume by using the following selection order:
1. A previously used sequential volume with available space (a volume with the
most amount of data is selected first)
2. An empty volume
When the server needs to continue to store data on a second volume, it attempts to
select an empty volume. If no empty volume exists, the server attempts to select
any remaining available volume in the storage pool.
Figure 11 on page 188 shows that volume use is vertical when collocation is
disabled. In this example, fewer volumes are used because the server attempts to
use all available space by mixing client files on individual volumes. A, B, C, and D
represent files from four different client nodes.
Numbers of volumes (1 to n)
Figure 11. Using all available space on sequential-access volumes with collocation disabled
Collocation settings
After you define a storage pool, you can change the collocation setting by
updating the storage pool. The change in collocation for the pool does not affect
files that are already stored in the pool.
For example, if collocation is off for a storage pool and you turn it on, from then
on client files that are stored in the pool are collocated. Files that were previously
stored in the storage pool are not moved to collocate them. As volumes are
reclaimed, the data in the pool tends to become more collocated. You can also use
the MOVE DATA or MOVE NODEDATA commands to move data to new volumes to
increase collocation. Moving data to new volumes causes an increase in the
processing time and the volume mount activity.
Tip: A mount wait can occur or take longer than usual when collocation by file
space is enabled and a node has a volume that contains multiple file spaces. If a
volume is eligible to receive data, IBM Spectrum Protect waits for that volume.
Primary storage pools play a different recovery role than copy storage pools.
Normally, you use primary storage pools to recover data to clients directly. In a
disaster, when both clients and the server are lost, you might use offsite copy
storage pool volumes to recover the primary storage pools. The types of recovery
scenarios can help you to determine whether to use collocation on your copy
storage pools.
Collocation typically results in partially filled volumes when you collocate by node
or by file space. However, partially filled volumes are less prevalent when you
collocate by group. Partially filled volumes might be acceptable for primary
storage pools because the volumes remain available and can be filled during the
next migration process. However, partially filled volumes might be unacceptable
for copy storage pools whose storage pool volumes are taken offsite immediately.
If you use collocation for copy storage pools, you must make the following
decisions:
When collocation is disabled for a copy storage pool, typically only a few partially
filled volumes remain after data is backed up to the copy storage pool.
Consider your options carefully before you use collocation for copy storage pools,
and whether to use simultaneous write. If you do not use simultaneous write and
you use collocation for your primary storage pools, you might want to disable
collocation for copy storage pools. Collocation of copy storage pools might be
desirable if you have few clients with each of them having large amounts of
incremental backup data each day. For collocation with simultaneous write, you
must ensure that the collocation settings are identical for the primary storage pools
and copy storage pools.
Table 29 lists the four collocation options that you can specify on the DEFINE
STGPOOL and UPDATE STGPOOL commands. The table also shows the effects of
collocation on data that belongs to nodes that are and are not members of
collocation groups.
Table 29. Collocation options and the effects on node data
If a node is not defined as a member of a If a node is defined as a member of a
Collocation option collocation group collocation group
No The data for the node is not collocated. The data for the node is not collocated.
Group The server stores the data for the node on as The server stores the data for the node and for
few volumes in the storage pool as possible. other nodes that belong to the same
collocation group on as few volumes as
possible.
Node The server stores the data for the node on as The server stores the data for the node on as
few volumes as possible. few volumes as possible.
File space The server stores the data for the node's file The server stores the data for the node's file
space on as few volumes as possible. If a node space on as few volumes as possible. If a node
has multiple file spaces, the server stores the has multiple file spaces, the server stores the
data for different file spaces on different data for different file spaces on different
volumes in the storage pool. volumes in the storage pool.
Table 30. Collocation group options and effects on file space data
If a file space is not defined as a member of If a file space is defined as a member of a
Collocation option a collocation group collocation group
No The data for the file space is not collocated. The data for the file space is not collocated.
Procedure
To determine whether and how to collocate data, complete the following steps:
1. Determine how to organize data, whether by client node, group of client nodes,
or file space. To collocate by group, you must decide how to group nodes:
v If the goal is to save space, you might want to group small nodes together to
better use tapes.
v If the goal is potentially faster client restores, group nodes together so that
they fill as many tapes as possible. By grouping nodes together, the
individual node data is distributed across two or more tapes and that more
tapes can be mounted simultaneously during a multi-session no-query
restore operation.
v If the goal is to departmentalize data, you can group nodes by department.
2. To collocate groups, complete the following steps:
a. Define collocation groups with the DEFINE COLLOCGROUP command.
b. Add client nodes to the collocation groups with the DEFINE COLLOCMEMBER
command.
The following query commands are available to help in collocating groups:
QUERY COLLOCGROUP
Displays the collocation groups that are defined on the server.
QUERY NODE
Displays the collocation group, if any, to which a node belongs.
QUERY NODEDATA
Displays information about the data for one or more nodes in a
sequential-access storage pool.
QUERY STGPOOL
Displays information about the location of client data in a
sequential-access storage pool and the amount of space a node occupies
in a volume.
You can also use IBM Spectrum Protect server scripts or PerlL scripts to display
information that can be useful in defining collocation groups.
3. Specify how data must be collocated in a storage pool by issuing the DEFINE
STGPOOL or UPDATE STGPOOL command and specifying the COLLOCATE parameter.
Tip: To reduce the number of media mounts, use space on sequential volumes
more efficiently, and enable collocation, complete the following steps:
v Define a storage pool hierarchy and policy to require that backed-up, archived,
or space-managed files are initially stored in disk storage pools.
When files are migrated from a disk storage pool, the server attempts to migrate
all files that belong to the client node or collocation group that is using the most
disk space in the storage pool. This process works well with the collocation
option because the server tries to place all of the files from a particular client on
the same sequential-access storage volume.
v Use scratch volumes for sequential-access storage pools to allow the server to
select new volumes for collocation.
v Specify the client option COLLOCATEBYFILESPEC to limit the number of tapes to
which objects associated with one file specification are written. This collocation
option makes collocation by the server more efficient; it does not override
collocation by file space or collocation by node.
When IBM Spectrum Protect accesses a removable media volume, it verifies the
volume name in the label header to ensure that the correct volume is accessed.
Tape volumes must be labeled before the server can use them.
Procedure
Tip: When you use the LABEL LIBVOLUME command with drives in an
automated library, you can label and check in the volumes with one command.
3. If the storage pool cannot contain scratch volumes (MAXSCRATCH=0), identify the
volume to IBM Spectrum Protect by name so that the volume can be accessed
later.
If the storage pool can contain scratch volumes (MAXSCRATCH is set to a non-zero
value), skip this step.
Procedure
To label tape volumes before you check them in, complete the following steps:
1. Label tape volumes by issuing the LABEL LIBVOLUME command. For example, to
name a library volume VOLUME1 in a library that is named LIBRARY 1, issue
the following command:
label libvolume library1 volume1
When you label volumes individually by using the LABEL LIBVOLUME command,
you must specify a volume name.
Procedure
1. Insert volumes into the entry/exit slot of the library when the server prompts
you. The library mounts each inserted volume into a drive.
2. For a SCSI library, enter a volume name when prompted. A label with the
specified name is written to the volume.
Tip: To prompt for the volume name for a SCSI library, issue the LABEL
LIBVOLUME command and specify the LABELSOURCE=PROMPT parameter.
3. If the library does not have an entry/exit port, you are prompted to remove the
tape from a specified slot number. Remove the tape from the specified slot. If
the library has an entry/exit port, the command by default returns each labeled
volume to the entry/exit port of the library.
You can use the LABEL LIBVOLUME command to overwrite existing volume labels if
no valid data exists in the storage volumes.
You can label volumes in a SCSI library, even if they do not have an entry/exit
port. You must manually insert each new volume to the library, and place the
volumes in storage slots inside the library after their labels are written.
Procedure
Overwrite the existing volume labels by issuing the LABEL LIBVOLUME command.
For example, if the name of the library is LIB1 and the volume name is
VOLNAME, issue the following command:
label libvolume lib1 volname overwrite=yes
Procedure
Issue the DEFINE LIBRARY or UPDATE LIBRARY command and specify the AUTOLABEL
parameter.
Tip: If you use the AUTOLABEL parameter with a SCSI library, you must check in
tapes by specifying CHECKLABEL=BARCODE parameter on the CHECKIN LIBVOLUME
command. The AUTOLABEL parameter defaults to YES for all non-SCSI libraries and
to NO for SCSI libraries. The CHECKLABEL=BARCODE parameter is honored only if the
library has a bar code reader.
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
LABEL LIBVOLUME (Label a library volume)
Related information:
DEFINE LIBRARY (Define a library)
IBM Spectrum Protect can search all storage slots in a library for volumes and can
attempt to label each volume that it finds.
Procedure
To search a library and label volumes, issue the LABEL LIBVOLUME command and
specify the SEARCH=YES parameter.
Tip: If you use a SCSI library and the library has a bar code reader, the LABEL
LIBVOLUME command can use the reader to obtain volume names, instead of
prompting you for volume names. The LABELSOURCE=BARCODE parameter is valid
only for SCSI libraries.
For example, to label all volumes in a SCSI library, issue the following command:
label libvolume library_name search=yes labelsource=barcode
IBM Spectrum Protect selects the next available drive so that you can continue
your search.
Results
After a volume is labeled, the volume is returned to its original location in the
library.
Related reference:
LABEL LIBVOLUME (Label a library volume)
To automatically label tapes before you check them in, issue the DEFINE LIBRARY
command and specify the AUTOLABEL=YES parameter. By using the AUTOLABEL
parameter, you eliminate the need to prelabel a set of tapes.
Each volume that is used by a server for any purpose must have a unique name.
This requirement applies to all volumes, whether the volumes are used for storage
pools, or used for operations such as database backup or export. The requirement
also applies to volumes that are in different libraries but that are used by the same
server.
Tips:
v Do not use a single library for volumes that have bar code labels and volumes
that do not have bar code labels. Bar code scanning can take a long time for
unlabeled volumes.
v The server accepts only tapes that are labeled with IBM standard labels.
v Any volume that has a bar code that begins with CLN is treated as a cleaning
tape.
v If a volume has an entry in volume history, you cannot check it in as a scratch
volume.
Procedure
1. To check a storage volume into a library, issue the CHECKIN LIBVOLUME
command.
Tip: The command always runs as a background process. Wait for the CHECKIN
LIBVOLUME process to complete processing before you define volumes, or the
defining process fails. You can save time by checking in volumes as part of the
labeling operation.
2. Name the library and specify whether the volume is a private volume or a
scratch volume. Depending on whether you use scratch volumes or private
volumes, complete one of the following steps:
v If you use only scratch volumes, ensure that enough scratch volumes are
available. For example, you might need to label more volumes. As volumes
are used, you might also need to increase the number of scratch volumes
that are allowed in the storage pool that you defined for this library.
v If you want to use private volumes in addition to or instead of scratch
volumes in the library, define volumes to the storage pool by using the
DEFINE VOLUME command. You must label and check in the volumes that you
define.
Related tasks:
“Labeling tape volumes” on page 193
Procedure
1. Issue the CHECKIN LIBVOLUME command.
For example, to check in volume VOL001, enter the following command:
checkin libvolume tapelib vol001 search=no status=scratch
2. Respond to the prompt from the server.
v If the library has an entry/exit port, you are prompted to insert a tape into
the entry/exit port.
v If the library does not have an entry/exit port, you are prompted to insert a
tape into one of the slots in the library. Element addresses identify these
slots. For example, the server finds that the first empty slot is at element
address 5. The following message is returned:
ANR8306I 001: Insert 8MM volume VOL001 R/W in slot with element
address 5 of library TAPELIB within 60 minutes; issue ’REPLY’ along
with the request ID when ready.
If you do not know the location of element address 5 in the library, check the
worksheet for the device. To find the worksheet, review the documentation
for your library. After you insert the volume as requested, respond to the
message from an IBM Spectrum Protect administrative client. Issue the REPLY
command, followed by the request number (the number at the beginning of
the mount request) for example:
reply 1
Procedure
1. Open the library and place the new volumes in unused slots. For example, for
a SCSI device, open the library access door, place all of the new volumes in
unused slots, and close the door.
2. If the volumes are not labeled, use the LABEL LIBVOLUME command to label the
volume.
3. Issue the CHECKIN LIBVOLUME command with the SEARCH=YES parameter.
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
Issue the LABEL LIBVOLUME command to label volumes that are not labeled.
For SCSI libraries, the server scans all of the entry/exit ports in the library for
volumes. If a volume is found that contains a valid volume label, it is checked in
automatically.
Procedure
Issue the CHECKIN LIBVOLUME command and specify the SEARCH=BULK parameter.
v To load a tape in a drive and read the label, specify the CHECKLABEL=YES
parameter. After the server reads the label, the server moves the tape from the
drive to a storage slot.
v To have the server use the bar code reader to verify external labels on tapes,
specify the CHECKLABEL=BARCODE parameter. When bar code reading is enabled,
the server reads the label and moves the tape from the entry/exit port to a
storage slot.
The server reads the bar code labels and uses the information to write the internal
media labels. For volumes that have no bar code labels, the server mounts the
volumes in a drive and attempts to read the internal, recorded label.
Procedure
When you check in a volume, you can specify whether the media labels are read
during check-in processing. When label-checking is on, IBM Spectrum Protect
mounts each volume to read the internal label and checks in a volume only if it is
correctly labeled. Label-checking can prevent future errors when volumes are used
in storage pools, but also increases processing time at check-in.
Procedure
To check in volumes by using a bar code reader, issue the CHECKIN LIBVOLUME
command and specify CHECKLABEL=BARCODE. For example, to use the bar code
reader to check in all volumes as scratch volumes in a library that is named
TAPELIB, issue the following command:
checkin libvolume tapelib search=yes status=scratch checklabel=barcode
Related tasks:
“Preparing removable media” on page 193
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
The server selects the volume to eject by checking first for any available scratch
volume, then for the volume that is least frequently mounted. The server ejects the
volume that it selects for the swap operation from the library and replaces the
ejected volume with the volume that is being checked in.
Procedure
Partially written volumes are always private volumes. Volumes have a status of
either scratch or private, but when IBM Spectrum Protect stores data on them, their
status becomes private.
Related tasks:
“Changing the status of a volume in an automated library” on page 205
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
DELETE VOLUME (Delete a storage pool volume)
If a library has entry/exit ports, you can add and remove media by using the
ports. If no entry/exit port exists, you must load tapes into storage slots.
If you load tapes into storage slots, you must reply to mount requests that identify
storage slots with element addresses. If you specify a wait time of 0 on the CHECKIN
LIBVOLUME command or the LABEL LIBVOLUME command, you do not need to reply
to a mount request.
Each volume that is used by a server must have a unique name, whether the
volumes are used for storage pools, or used for operations such as database
backup or export. Volumes that are in different libraries but that are used by the
same server must also have a unique name.
Procedure
Reusing tapes
To ensure an adequate supply of tapes, you can expire old files, reclaim volumes,
and delete volumes that reach end of life. You can also maintain a supply of
scratch volumes.
Over time, media age, and you might not need some of the backup data that is
stored on the media. You can define server policies to determine how many
backup versions are retained and how long they are retained. You can use
expiration processing to delete files that you no longer require. You can keep the
data that you require on the media. When you no longer require the data, you can
then reclaim and reuse the media.
Procedure
1. Delete unnecessary client data by regularly running expiration processing.
Expiration processing deletes data that is no longer valid either because it
exceeds the retention specifications in the policy or because users or
administrators deleted the active versions of the data.
Chapter 25. Managing tape devices 201
2. Reuse volumes in storage pools by running reclamation processing.
Reclamation processing consolidates any unexpired data by moving it from
multiple volumes onto fewer volumes. The media can then be returned to the
storage pool and reused.
3. Reuse volumes that contain outdated database backups or exported data that is
no longer required by deleting volume history.
Before the server can reuse volumes that are tracked in the volume history, you
must delete the volume information from the volume history file by issuing the
DELETE VOLHISTORY command.
Tip: If your server uses the disaster recovery manager (DRM) function, the
volume information is automatically deleted during MOVE DRMEDIA command
processing.
4. Determine when tape volumes reach end of life. You can use the server to
display statistics about volumes, including the number of write operations that
are completed on the media and the number of write errors. Private volumes
and scratch volumes display the following statistical data:
Private volumes
For media initially defined as private volumes, the server maintains
this statistical data, even as the volume is reclaimed. You can compare
the information with the number of write operations and write errors
that are recommended by the manufacturer.
Scratch volumes
For media initially defined as scratch volumes, the server overwrites
this statistical data each time the volumes are reclaimed.
5. Reclaim any valid data from volumes that reach end of life. If the volumes are
in automated libraries, check them out of the volume inventory. Delete private
volumes from the database with the DELETE VOLUME command.
6. Ensure that volumes are available for tape rotation so that the storage pool
does not run out of space. You can use the Operations Center to monitor the
availability of scratch volumes. Ensure that the number of scratch volumes is
high enough to meet demand. For more information, see “Maintaining a supply
of volumes in a library that contains WORM media” on page 204.
WORM media: Write Once Read Many (WORM) drives can waste media when
the server cancels transactions because volumes are unavailable to complete the
backup operation. After the server writes to WORM volumes, the space on the
volumes cannot be reused, even if the transactions are canceled (for example, if
a backup is canceled because of a shortage of media in the device). To
minimize wasted WORM media, complete the following actions:
a. Ensure that the maximum number of scratch volumes for the device storage
pool is at least equal to the number of storage slots in the library.
b. Check enough volumes into the device's volume inventory for the expected
load.
If most backup operations are for small files, controlling the transaction size
can affect how WORM platters are used. Smaller transactions mean that less
space is wasted when a transaction such as a backup operation must be
canceled. Transaction size is controlled by a server option, TXNGROUPMAX, and a
client option, TXNBYTELIMIT.
Related tasks:
“Migrating data to upgraded drives” on page 225
“Managing server requests for volumes” on page 210
Procedure
When a storage pool needs more than the maximum number of scratch volumes,
you can take one or both of the following actions:
1. Increase the maximum number of scratch volumes by issuing the UPDATE
STGPOOL command and specifying the MAXSCRATCH parameter.
2. Make volumes available for reuse by running expiration processing and
reclamation to consolidate data onto fewer volumes.
a. Issue the EXPIRE INVENTORY command to run expiration processing.
Tip: By default this process automatically runs every day. You can also
specify the EXPINTERVAL server option in the server options file,
dsmserv.opt, to run expiration processing automatically. A value of 0 means
that you must use the EXPIRE INVENTORY command to run expiration
processing.
b. Issue the RECLAIM STGPOOL command to run reclamation processing.
Tip: You can also specify reclamation thresholds when you define the
storage pool by using the DEFINE STGPOOL command and specifying the
RECLAIMPROCESS parameter.
What to do next
If you need more volumes for future backup operations, label more scratch
volumes by using the LABEL LIBVOLUME command.
Related tasks:
“Maintaining a supply of scratch volumes in an automated library” on page 206
Related reference:
LABEL LIBVOLUME (Label a library volume)
For example, if you have WORM volumes that hold 2.6 GB each and a client starts
to back up a 12 GB file. If IBM Spectrum Protect cannot acquire a fifth scratch
volume after four volumes are full, IBM Spectrum Protect cancels the backup
operation. The four volumes that IBM Spectrum Protect already filled cannot be
reused.
Procedure
1. Ensure that the storage pool that is associated with the library has sufficient
scratch volumes. Issue the UPDATE STGPOOL command and specify the
MAXSCRATCH parameter.
2. To manage the expected load, check in a sufficient number of scratch or private
volumes to the library by issuing the CHECKIN LIBVOLUME command.
3. To control transaction size, specify the TXNGROUPMAX server option and the
TXNBYTELIMIT client option. If your clients tend to store small files, controlling
the transaction size can affect how WORM volumes are used. Smaller
transactions waste less space when a transaction such as a backup must be
canceled.
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
UPDATE STGPOOL (Update a storage pool)
Txnbytelimit option
TXNGROUPMAX server option
The library volume inventory is separate from the inventory of volumes for each
storage pool. To add a volume to a library volume inventory, you check in a
volume to that IBM Spectrum Protect library.
A list of volumes in the library volume inventory might not be identical to a list of
volumes in the storage pool inventory for the device. For example, you can check
in scratch volumes to the library but you cannot define them to a storage pool. If
scratch volumes are not selected for backup operations, you can define private
volumes to a storage pool but you cannot check them into the volume inventory
for the device.
To ensure that the volume inventory for the server library remains accurate, check
out volumes to physically remove the volumes from a SCSI library. When you
check out a volume that is used by a storage pool, the volume remains in the
storage pool. If you must mount the volume when it is checked out, a message to
the mount operator's console is displayed with a request to check in the volume. If
the check-in operation is unsuccessful, the server marks the volume as unavailable.
When a volume is in the library volume inventory, you can change the status of
the volume from scratch to private.
To check whether the volume inventory for the server library is consistent with the
volumes that are physically in the library, you can audit the library. The inventory
can become inaccurate if volumes are moved in and out of the library without
informing the server by using volume check-in or check-out operations.
Related tasks:
“Checking volumes into an automated library” on page 196
Related reference:
AUDIT LIBRARY (Audit volume inventories in an automated library)
Procedure
To change the status of a volume, issue the UPDATE LIBVOLUME command. For
example, to change the status of a volume that is named VOL1 to a private
volume, issue the following command:
update libvolume lib1 vol1 status=private
Restrictions:
v You cannot change the status of a volume from private to scratch if the volume
belongs to a storage pool or is defined in the volume history file.
v Private volumes must be administrator-defined volumes with either no data or
invalid data. They cannot be partially written volumes that contain active data.
Volume statistics are lost when volume statuses are modified.
By default, the server mounts the volume that you check out and verifies the
internal label. When the label is verified, the server removes the volume from the
library volume inventory, and then moves it to the entry/exit port or convenience
I/O station of the library. If the library does not have an entry/exit port, the server
requests that the mount operator remove the volume from a slot or device within
the library.
Procedure
v To remove a volume from an automated library, issue the CHECKOUT LIBVOLUME
command.
v For automated libraries with multiple entry/exit ports, issue the CHECKOUT
LIBVOLUME command and specify the REMOVE=BULK parameter. The server ejects
the volume to the next available entry/exit port.
What to do next
If you check out a volume that is defined in a storage pool and the server must
access the volume later, the server requests that the volume be checked in. To
return volumes to a library, issue the CHECKIN LIBVOLUME command.
Related reference:
CHECKIN LIBVOLUME (Check a storage volume into a library)
CHECKOUT LIBVOLUME (Check a storage volume out of a library)
Procedure
If the number of scratch volumes that the server is using for the storage pool
exceeds the number that is specified in the storage pool definition, complete the
following steps:
1. Add scratch volumes to the library by issuing the CHECKIN LIBVOLUME
command.
Tip: You might have to use an overflow location to move volumes out of the
library to make room for these scratch volumes. For more information, see
“Managing a full library with an overflow location” on page 207.
2. Increase the maximum number of scratch volumes that can be added to a
storage pool by issuing the UPDATE STGPOOL command and specifying the
MAXSCRATCH parameter.
You might need more volumes for future recovery operations, so consider labeling
and setting aside extra scratch volumes.
Related tasks:
“Maintaining a supply of scratch volumes” on page 203
The server tracks the volumes that are moved to the overflow area and makes
storage slots available for new volumes.
Procedure
1. Create a volume overflow location. Define or update the storage pool that is
associated with the automated library by issuing the DEFINE STGPOOL or UPDATE
STGPOOL command and specifying the OVFLOCATION parameter. For example, to
create an overflow location that is named ROOM2948 for a storage pool that is
named ARCHIVEPOOL, issue the following command:
update stgpool archivepool ovflocation=Room2948
2. When you need to create space in the library for scratch volumes, move full
volumes to the overflow location by issuing the MOVE MEDIA command. For
example, to move all full volumes in the specified storage pool out of the
library, issue the following command:
move media * stgpool=archivepool
3. Check in scratch volumes as needed.
Restriction: If a volume has an entry in the volume history file, you cannot
check it in as a scratch volume. For more information, see “Checking volumes
into an automated library” on page 196.
4. Identify the empty scratch tapes in the overflow location by issuing the QUERY
MEDIA command. For example, issue the following command:
query media * stg=* whereovflocation=Room2948 wherestatus=empty
5. If the server requests additional volumes, locate and check in volumes from the
overflow location.
To find volumes in an overflow location, issue the QUERY MEDIA command. You
can also use the QUERY MEDIA command to generate commands by checking in
volumes.
For example, to list the volumes in the overflow location, and at the same time
generate the commands to check those volumes into the library, issue a
command that is similar to the following example:
query media format=cmd stgpool=archivepool whereovflocation=Room2948
cmd="checkin libvol autolib &vol status=private"
cmdfilename="\storage\move\media\checkin.vols"
Tips:
v Mount requests from the server include the location of the volumes.
Procedure
1. Ensure that no volumes are mounted in the library drives. If any volumes are
mounted in the IDLE state, issue the DISMOUNT VOLUME command to dismount
them.
2. Audit the volume inventory by issuing the AUDIT LIBRARY command. Take one
of the following actions:
v If the library has a bar code reader, you can save time by using the bar code
reader to identify volumes. For example, to audit the TAPELIB library by
using its bar code reader, issue the following command:
audit library tapelib checklabel=barcode
v If the library does not have a bar code reader, issue the AUDIT LIBRARY
command without specifying CHECKLABEL=BARCODE. The server mounts each
volume to verify the label. After the label is verified, the server completes
auditing any remaining volumes.
Results
The server deletes missing volumes from the inventory and updates the locations
of volumes that moved since the last audit.
Restriction: The server cannot add new volumes to the inventory during an audit
operation.
Related tasks:
“Labeling tape volumes” on page 193
Related reference:
AUDIT LIBRARY (Audit volume inventories in an automated library)
DISMOUNT VOLUME (Dismount a volume by volume name)
The library client contacts the library manager when the library manager starts and
the storage device initializes, or after a library manager is defined to a library
client. The library client confirms that the contacted server is the library manager
for the named library device. The library client also compares drive definitions
with the library manager for consistency. The library client contacts the library
manager for each of the following operations:
Volume mount
A library client sends a request to the library manager for access to a
particular volume in the shared library device. For a scratch volume, the
library client does not specify a volume name. If the library manager
cannot access the requested volume, or if scratch volumes are unavailable,
the library manager denies the mount request. If the mount is successful,
the library manager returns the name of the drive where the volume is
mounted.
Volume release
When a library client no longer needs to access a volume, it notifies the
library manager that the volume can be returned to a scratch volume. The
library manager database is updated with the new location for the volume,
which is now in the inventory of the library server. The volume is deleted
from the volume inventory of the library client.
Table 32 shows the interaction between library clients and the library manager in
processing IBM Spectrum Protect operations.
Table 32. How SAN-enabled servers process IBM Spectrum Protect operations
Operation Library manager Library client
(Command)
Query library volumes Displays the volumes that Not applicable.
are checked into the library.
(QUERY LIBVOLUME) For private volumes, the
owner server is also
displayed.
(Command)
Check in and check out Sends the commands to the Not applicable.
library volumes library device.
When a check-in operation is
(CHECKIN LIBVOLUME, required because of a client
CHECKOUT LIBVOLUME) restore operation, a request is
sent to the library manager
server.
Move media and move DRM Valid only for volumes that Requests that the library
media are used by the library manager server completes
manager server. the operation. Generates a
(MOVE MEDIA, MOVE DRMEDIA) check-out process on the
library manager server.
Audit library inventory Synchronizes the inventory Synchronizes the inventory
with the library device. with the library manager
(AUDIT LIBRARY) server.
Label a library volume Labels and checks in Not applicable.
volumes.
(LABEL LIBVOLUME)
Dismount a volume Sends the request to the Requests that the library
library device. manager server completes
(DISMOUNT VOLUME) the operation.
Query a volume Checks whether the volume Requests that the library
is owned by the requesting manager server completes
(QUERY VOLUME) library client and checks the operation.
whether the volume is in the
library device.
For automated libraries, use the CHECKIN LIBVOLUME and LABEL LIBVOLUME
commands to insert cartridges into slots. If you specify a value for the WAITTIME
parameter, a reply message is displayed. If the value of the parameter is 0, no
reply is required. When you issue the CHECKOUT LIBVOLUME command, you must
insert cartridges into slots and, in all cases, a reply message is displayed.
Procedure
The following table provides information about how to handle different server
media tasks.
The request_number parameter specifies the request identification number that tells
the server which pending operator request is completed. This three-digit number is
always displayed as part of the request message.
Cancel an operator request To cancel a mount request for a library, issue the CANCEL REQUEST command. For
most requests that are associated with automated SCSI libraries, an operator must
complete a hardware or system action to cancel the requested mount. For such
requests, the CANCEL REQUEST command is not accepted by the server.
The CANCEL REQUEST command must include the request identification number. This
number is included in the request message.
If you want to mark the requested volume as UNAVAILABLE, issue the CANCEL
REQUEST command and specify the PERMANENT parameter. If you specify the
PERMANENT parameter, the server does not try to mount the requested volume again.
This is useful if, for example, the volume is at a remote site or is otherwise
unavailable.
Respond to a volume check-in If the server cannot find a particular volume to mount in an automated library, the
request server requests that the operator check in the volume.
If the requested volume is available, place the volume in the library and check it
in. For more information, see “Checking volumes into an automated library” on
page 196.
If the requested volume is unavailable, update the access mode of the volume by
issuing the UPDATE VOLUME command and specifying the ACCESS=UNAVAILABLE
parameter. Then, cancel the check-in request by using the CANCEL REQUEST
command. Do not cancel the client process that caused the request. Use the QUERY
REQUEST command to obtain the ID of the request that you want to cancel.
If you do not respond to the check-in request from the server within the
mount-wait period that is specified for the device class for the storage pool, the
server marks the volume as unavailable.
Determine which volumes are For a report about all volumes that are currently mounted for use by the server,
mounted issue the QUERY MOUNT command. The report shows which volumes are mounted,
which drives accessed them, and whether the volumes are in use.
To dismount an idle volume from the drive where it is mounted, issue the
DISMOUNT VOLUME command.
For information about setting mount retention times, see “Controlling the amount
of time that a volume remains mounted” on page 136.
Related information:
QUERY REQUEST (Query one or more pending mount requests)
Updating drives
You can change the attributes of a drive definition to take a drive offline or
reconfigure it.
Restriction: If a drive is in use, you cannot change the element number or the
device name. For instructions about taking drives offline, see “Taking tape drives
offline” on page 214.
If a volume is mounted in the drive but the volume is idle, it can be explicitly
dismounted. For instructions about dismounting idle volumes, see “Managing
server requests for volumes” on page 210.
Procedure
v Change the element address of a drive by issuing the UPDATE DRIVE command.
For example, in a library that is named AUTO, change the element address of
DRIVE3 to 119 by issuing the following command:
update drive auto drive3 element=119
v Change the device name of a drive by issuing the UPDATE PATH command. For
example, to change the device name of a drive that is named DRIVE3, issue the
following command: AIX
Linux
Windows
If you change the status of a drive to offline while the drive is in use, the server
finishes processing the tape that is in the drive, and then stops using the drive.
However, if the tape that was in use was part of a series of tapes for a single
transaction, the drive is unavailable to complete the series. If no other drives are
available, the transaction might fail.
Procedure
To change the status of a drive, issue the UPDATE DRIVE command and specify the
ONLINE parameter. For example, to update the DRIVE3 drive in the MANLIB
library and take the drive offline, issue the following command:
update drive manlib drive3 online=no
Restriction: Do not specify other optional parameters when you specify the ONLINE
parameter. If you do, the drive is not updated, and the command fails when the
drive is in use.
Results
If you update all drives in a library to an offline status, processes that require a
library mount point fail.
The updated state of the drive is retained even when the server is halted and
restarted. If a drive is marked offline when the server is restarted, a warning is
issued stating that the drive must be manually brought online.
Related information:
UPDATE DRIVE (Update a drive)
With logical block protection, you can identify errors that occur when data is
written to tape and during data transfer from the tape drive to IBM Spectrum
Protect through the storage area network. Drives that support logical block
protection validate data during read and write operations. The IBM Spectrum
Protect server validates data during read operations.
If validation by the drive fails during write operations, the failure can indicate that
data was corrupted during transfer to tape. In this case, the IBM Spectrum Protect
server fails the write operation. You must restart the operation to continue. If
validation by the drive fails during read operations, the failure can indicate that
the tape media is corrupted. If validation by the IBM Spectrum Protect server fails
during read operations, the failure can indicate that data was corrupted during
transfer from the tape drive, and the server tries the operation again. If validation
If logical block protection is disabled on a tape drive, or the drive does not support
logical block protection, the IBM Spectrum Protect server can read protected data.
However, the data is not validated.
Logical block protection is superior to the CRC validation that you can specify
when you define or update a storage pool. When you specify CRC validation for a
storage pool, data is validated only during volume auditing operations. Errors are
identified after the data is written to tape.
Restrictions:
v You cannot use logical block protection for sequential data such as backup sets
and database backups.
v CRC checking impacts performance because more processor usage is required on
both the client and server to calculate and compare CRC values.
v For a scratch volume, if you specify logical block protection for read/write
operations (LBPROTECT=READWRITE), do not change the parameter value at any
time after data is written to the volume. Changing the parameter value during
the life of the volume on the IBM Spectrum Protect server is not supported.
The following table shows the media and the formats that you can use with drives
that support logical block protection.
Tips:
Logical block protection is available for drives that are in SCSI libraries. For the
most current information about support for logical block protection, see technote
1568108.
To use logical block protection for write operations, all drives in the library must
support logical block protection. If a drive is not capable of logical block
protection, volumes that have read/write access are not mounted. However, the
server can use the drive to mount volumes that have read-only access. The
protected data is read and validated by the IBM Spectrum Protect server if logical
block protection is enabled for read/write operations.
Restriction: Logical block protection is available only for certain device types. For
more information, see “Drives that support logical block protection” on page 215.
Procedure
1. To enable logical block protection for the 3592, LTO, and ECARTRIDGE device
types, issue the DEFINE DEVCLASS or the UPDATE DEVCLASS command and specify
the LBPROTECT parameter. For example, to specify logical block protection
during read and write operations for a 3592 device class that is named
3592_lbprotect, issue the following command:
define devclass 3592_lbprotect library=3594 lbprotect=readwrite
Tips:
v If you update the value of the LBPROTECT parameter from NO to READWRITE or
WRITEONLY and the server selects a filling volume without logical block
protection for write operations, the server issues a message each time the
volume is mounted. The message indicates that data is written to the volume
without logical block protection. To prevent this message from displaying or
to have IBM Spectrum Protect write data only with logical block protection,
update the access of filling volumes without logical block protection to
read-only.
216 IBM Spectrum Protect: Tape Solution Guide
v To improve performance, do not specify the CRCDATA parameter on the DEFINE
STGPOOL or UPDATE STGPOOL command.
v When data is validated during read operations by both the drive and by the
IBM Spectrum Protect server, it can slow server performance during restore
and retrieve operations. To reduce the time that is required for restore and
retrieve operations, change the setting of the LBPROTECT parameter from
READWRITE to WRITEONLY. After data is restored or retrieved, you can reset the
LBPROTECT parameter to READWRITE.
2. To disable logical block protection, issue the DEFINE DEVCLASS or the UPDATE
DEVCLASS command and specify the LBPROTECT=NO parameter.
Restriction: If logical block protection is disabled, the server does not write to
an empty tape with logical block protection. However, if a filling volume with
logical block protection is selected, the server continues to write to the volume
with logical block protection. To prevent the server from writing to tapes with
logical block protection, change the access of filling volumes with logical block
protection to read-only. When data is read, the CRC results are not checked by
the drive or server.
If a disaster occurs and the disaster recovery site does not have drives that
support logical block protection, you must specify the LBPROTECT=NO parameter.
If the tape drives are used for write operations, you must change the volume
access for volumes with protected data to read-only to prevent the server from
using the volumes.
If the server must enable logical block protection, the server issues an error
message that indicates that the drive does not support logical block protection.
What to do next
To determine whether a volume has logical block protection, issue the QUERY
VOLUME command and review the value in the Logical Block Protection field.
Related reference:
DEFINE DEVCLASS (Define a device class)
UPDATE STGPOOL (Update a storage pool)
Related information:
DEFINE STGPOOL (Define a volume in a storage pool)
QUERY VOLUME (Query storage pool volumes)
UPDATE DEVCLASS (Update a device class)
If you use the UPDATE DEVCLASS command to change the setting for logical block
protection, the change applies only to empty volumes. Filling and full volumes
maintain their status of logical block protection until they are empty and ready to
be refilled.
Tips:
v If a drive does not support logical block protection, volumes with logical block
protection for write operations cannot be mounted. To prevent the server from
mounting the protected volumes for write operations, change the volume access
to read-only. Also, disable logical block protection to prevent the server from
enabling the feature on the tape drive.
v If a drive does not support logical block protection, and logical block protection
is disabled, the server reads data from protected volumes. However, the data is
not validated by the server and the tape drive.
Related information:
QUERY VOLUME (Query storage pool volumes)
UPDATE DEVCLASS (Update a device class)
To define device classes and storage pools for a TS3500 library that has LTO-5
drives, for protected and unprotected data, you can issue a series of commands as
shown in the following example:
define library 3584 libtype=scsi
define devclass lbprotect library=3584 devicetype=lto lbprotect=readwrite
define devclass normal library=3584 devicetype=lto lbprotect=no
define stgpool lbprotect_pool lbprotect maxscratch=10
define stgpool normal_pool normal maxscratch=10
Related reference:
DEFINE DEVCLASS (Define a device class)
Related information:
DEFINE LIBRARY (Define a library)
DEFINE STGPOOL (Define a volume in a storage pool)
You must have system privilege or unrestricted storage privilege to clean tape
drives. For automated libraries, you can automate cleaning by specifying the
frequency of cleaning operations and checking a cleaner cartridge into the library
volume inventory. IBM Spectrum Protect mounts the cleaner cartridge as specified.
There are special considerations if you plan to use server-controlled drive cleaning
with a SCSI library that provides automatic drive cleaning support in its device
hardware.
You can prevent premature wear on the read/write heads of drives by using the
library cleaning functions that are available from your device manufacturer.
Drives and libraries from manufacturers differ in how they manage cleaner
cartridges, and how they report the presence of a cleaner cartridge in a drive. The
device driver might not be able to open a drive that contains a cleaner cartridge.
Sense codes and error codes that are issued by devices for drive cleaning vary.
Library-drive cleaning is usually not known to applications. Therefore, IBM
Spectrum Protect might not always detect the cleaner cartridges in drives and
might not be able to determine when cleaning begins.
Some devices require a small amount of idle time between mount requests to start
drive cleaning. However, IBM Spectrum Protect tries to minimize the idle time for
a drive. The result might be to prevent the library drive cleaning from functioning
effectively. If this happens, use IBM Spectrum Protect to control drive cleaning. You
can set the frequency to match the cleaning recommendations from the
manufacturer.
You can choose to use the library-drive cleaning method or the IBM Spectrum
Protect drive-cleaning method, but not both. Some SCSI libraries provide automatic
drive cleaning. Select the library-drive cleaning method if it is available. If it is
unavailable or causes issues, use IBM Spectrum Protect to control library drive
cleaning.
Library drive-cleaning method
The library drive-cleaning method provides several advantages for
automated tape libraries that use this function:
v Reduces the burden on the IBM Spectrum Protect administrator to
physically manage cartridge cleaning.
v Improves cleaning cartridge usage rates. Most tape libraries track the
number of times that drives can be cleaned based on hardware
indicators. IBM Spectrum Protect uses a raw count.
v Reduces unnecessary cleaning. Modern tape drives do not have to be
cleaned at fixed intervals and can detect and request when cleaning is
required.
Manufacturers who provide a library drive-cleaning method recommend
its use to prevent premature wear on the read/write heads of the drives.
Drives and libraries from different manufacturers differ in how they
manage cleaner cartridges and how they report the presence of a cleaner
cartridge in a drive. The device driver might not be able to open a drive
that contains a cleaner cartridge. Sense codes and error codes that are
issued by devices for drive cleaning vary. Library drive cleaning is usually
transparent to all applications. However, IBM Spectrum Protect might not
always detect cleaner cartridges in drives and might not be able to
determine when cleaning begins.
IBM Spectrum Protect drive cleaning method
Determine how often the drive must be cleaned. This step is required so that you
can specify an appropriate value for the CLEANFREQUENCY parameter on the DEFINE
DRIVE or UPDATE DRIVE command. For example, to clean a drive after 100 GB of
data is processed on the drive, you would specify CLEANFREQUENCY=100.
You can either specify a value for the CLEANFREQUENCY parameter or specify
ASNEEDED to clean the drive as needed.
Restrictions:
1. For IBM 3592 drives, you must specify a numerical value for the
CLEANFREQUENCY parameter. By using the cleaning frequency that is listed in the
product documentation, you will not overclean the drives.
2. The CLEANFREQUENCY=ASNEEDED parameter value does not work for all tape
drives. To determine whether a drive supports this function, see the
information for your operating system:
AIX Windows Supported devices for AIX and Windows
Linux Supported devices for Linux
Procedure
Define or update the drives in the library, by using the CLEANFREQUENCY parameter
in the DEFINE DRIVE or UPDATE DRIVE command. For example, to clean a drive that
is named DRIVE1 after 100 GB of data is processed, issue the following command:
update drive autolib1 drive1 cleanfrequency=100
Results
After the cleaner cartridge is checked in, the server mounts the cleaner cartridge in
a drive when the drive needs cleaning. The server uses that cleaner cartridge for
the number of specified cleanings. For more information, see “Operations with
cleaner cartridges” on page 162.
What to do next
Check the cleaner cartridge into the library volume inventory by following the
instructions in “Checking a cleaner cartridge into a library.”
Related information:
DEFINE DRIVE (Define a drive to a library)
UPDATE DRIVE (Update a drive)
When you check a cleaner cartridge into a library, ensure that it is correctly
identified to the server as a cleaner cartridge. Ensure that a cleaner cartridge is not
in a slot that is detected by the search process. Errors and delays of 15 minutes or
more might indicate that a cleaner cartridge is improperly placed.
Procedure
To check a cleaner cartridge into a library, issue the CHECKIN LIBVOLUME command.
For example, to check in a cleaner cartridge that is named AUTOLIB1, issue the
following command:
checkin libvolume autolib1 cleanv status=cleaner cleanings=10
checklabel=no
The server requests that the cartridge is placed in the entry/exit port, or into a
specific slot.
When a drive needs cleaning, the server loads what its database shows as a cleaner
cartridge into the drive. The drive then moves to a READY state, and IBM
Spectrum Protect detects that the cartridge is a data cartridge. The server
completes the following steps:
1. The server attempts to read the internal tape label of the data cartridge.
2. The server ejects the cartridge from the drive and moves it back to the home
slot of the cleaner cartridge within the library. If the eject operation fails, the
server marks the drive offline and issues a message that the cartridge is still in
the drive.
3. The server checks out the cleaner cartridge to avoid selecting it for another
drive cleaning request. The cleaner cartridge remains in the library but no
longer appears in the IBM Spectrum Protect library inventory.
Replacing drive and path definitions is required even if you are exchanging one
drive for another of the same type, with the same logical address, physical address,
SCSI ID, and port number. Device alias names can change when you change your
drive connections.
If the new drive is an upgrade that supports a new media format, you might be
required to define a new logical library, device class, and storage pool. Procedures
for setting up a policy for a new drive in a multiple-drive library vary, depending
on the types of drives and media in the library.
Procedure
1. Stop the IBM Spectrum Protect server and shut down the operating system.
2. Remove the old drive and follow the manufacturer's instructions to install the
new drive.
3. Restart the operating system and the IBM Spectrum Protect server.
4. Delete the path from the server to the drive. For example, to delete a path from
SERVER1 to LIB1, issue the following command:
delete path server1 lib1 srctype=server desttype=drive
5. Delete the drive definition. For example, issue the following command to delete
a drive that is named DLT1 from a library device that is named LIB1:
delete drive lib1 dlt1
Related reference:
DELETE DRIVE (Delete a drive from a library)
DELETE PATH (Delete a path)
If a library includes only one model of drive and you want to replace a drive, you
must replace the drive with the same model drive. If a library includes mixed
models of drives and you want to replace a drive, you can replace the drive with
any model drive that exists in the library.
Procedure
1. Delete the path and drive definitions for the old drive. For example, to delete a
drive that is named DRIVE1 from a library that is named LIB1, enter the
following command:
delete path server2 drive1 srctype=server desttype=drive library=lib1
delete drive lib1 drive1
2. Power off the library, remove the original drive, replace it with the new drive,
and power on the library.
3. Refresh the host system to ensure that the system detects the new drive.
4. Define the new drive and path. For example, to define a new drive, DRIVE2,
and a path to it from SERVER2, if you are using the IBM Spectrum Protect
device driver, enter the following commands:
AIX
Linux
Windows
Tip: You can use your existing library, device class, and storage pool
definitions.
Related reference:
DELETE DRIVE (Delete a drive from a library)
DELETE PATH (Delete a path)
The following scenario assumes that you already have a primary storage pool for a
DISK device class that is named POOL1.
Procedure
1. To migrate data to a storage pool that is created for the new drives, specify the
NEXTSTGPOOL parameter. For example, to migrate data from an existing storage
pool, POOL1, to the new storage pool, POOL2, issue the following command:
update stgpool pool1 nextstgpool=pool2
2. Update the management-class definitions to store data in the DISK storage pool
by using the UPDATE MGMTCLASS command.
Related reference:
UPDATE MGMTCLASS (Update a management class)
UPDATE STGPOOL (Update a storage pool)
Related information:
DEFINE STGPOOL (Define a volume in a storage pool)
Managing administrators
An administrator who has system authority can complete any task with the IBM
Spectrum Protect server, including assigning authority levels to other
administrators. To complete some tasks, you must be granted authority by being
assigned one or more authority levels.
Procedure
Task Procedure
Add an administrator. To add an administrator, ADMIN1, with
system authority and specify a password,
complete the following steps:
1. Register the administrator and specify
Pa$#$twO as the password by issuing
the following command:
register admin admin1 Pa$#$twO
2. Grant system authority to the
administrator by issuing the following
command:
grant authority admin1 classes=system
Related concepts:
Procedure
Complete the following tasks to change password requirements for IBM Spectrum
Protect servers.
Table 33. Authentication tasks for IBM Spectrum Protect servers
Task Procedure
Set a limit for invalid password attempts. 1. On the Servers page in the Operations
Center, select the server.
2. Click Details, and then click the
Properties tab.
3. Set the number of invalid attempts in the
Invalid sign-on attempt limit field.
The default value at installation is 0.
Set a minimum length for passwords. 1. On the Servers page in the Operations
Center, select the server.
2. Click Details and then click the
Properties tab.
3. Set the number of characters in the
Minimum password length field.
Set the expiration period for passwords. 1. On the Servers page in the Operations
Center, select the server.
2. Click Details and then click the
Properties tab.
3. Set the number of days in the Password
common expiration field.
Disable password authentication. By default, the server automatically uses
password authentication. With password
authentication, all users must enter a
password to access the server.
Procedure
Ensure that unauthorized users cannot access the directories for the server
database and the server instance. Keep the access settings for these directories that
you configured during implementation.
Procedure
1. After you register an administrator by using the REGISTER ADMIN command, use
the GRANT AUTHORITY command to set the administrator's authority level. For
details about setting and changing authority, see “Managing administrators” on
page 227.
2. To control the authority of an administrator to complete some tasks, use the
following two server options:
a. You can select the authority level that an administrator must have to issue
QUERY and SELECT commands with the QUERYAUTH server option. By default,
no authority level is required. You can change the requirement to one of the
authority levels, including system.
b. You can specify that system authority is required for commands that cause
the server to write to an external file with the REQSYSAUTHOUTFILE server
option. By default, system authority is required for such commands.
3. You can restrict data backup on a client node to only root user IDs or
authorized users. For example, to limit backups to the root user ID, issue the
REGISTER NODE or UPDATE NODE command and specify the
BACKUPINITIATION=root parameter:
update node backupinitiation=root
You must have system or operator privilege to stop and start the IBM Spectrum
Protect server.
Procedure
To prepare the system and stop the server, complete the following steps:
1. Prevent new client node sessions from starting by issuing the DISABLE SESSIONS
command:
disable sessions all
2. Determine whether any client node sessions or processes are in progress by
completing the following steps:
a. On the Overview page of the Operations Center, view the Activity area for
the total numbers of processes and sessions that are currently active. If
numbers differ significantly from the usual numbers that are displayed
during your daily storage-management routine, view other status indicators
in the Operations Center to check whether there is a problem.
b. View the graph in the Activity area to compare the amount of network
traffic over the following periods:
v The current period, that is, the most recent 24-hour period
v The previous period, that is, the 24 hours before the current period
If the graph for the previous period represents the expected amount of
traffic, significant differences on the graph for the current period might
indicate a problem.
c. On the Servers page, select a server for which you want to view processes
and sessions, and click Details. If the server is not registered as a hub or
spoke server in the Operations Center, obtain information about processes
by using administrative commands. Issue the QUERY PROCESS command to
query processes and obtain information about sessions by issuing the QUERY
SESSION command.
Tip: If the process that you want to cancel is waiting for a tape volume to be
mounted, the mount request is canceled. For example, if you issue an EXPORT,
IMPORT, or MOVE DATA command, the command might initiate a process that
requires a tape volume to be mounted. However, if a tape volume is being
mounted by an automated library, the cancel operation might not take effect
until the mount process is complete. Depending on your system
environment, this could take several minutes.
4. Stop the server by issuing the HALT command:
halt
Start the server in maintenance mode by running the DSMSERV utility with the
MAINTENANCE parameter.
Tips:
v You do not have to edit the server options file, dsmserv.opt, to start the server in
maintenance mode.
v While the server is running in maintenance mode, you can manually start the
storage-space reclamation, inventory expiration, and storage-pool migration
processes.
Procedure
What to do next
Procedure
1. Review the list of fix packs and interim fixes. See technote 1239415.
2. Review product improvements, which are described in readme files.
Tip: When you obtain the installation package file from the IBM Spectrum
Protect support site, you can also access the readme file.
3. Ensure that the version that you upgrade your server to is compatible with
other components, such as storage agents and library clients. See technote
1302789.
4. If your solution includes servers or clients at a level that is earlier than V7.1,
review the guidelines to ensure that client backup and archive operations are
not disrupted. See technote 1053218.
5. Review the upgrade instructions. Ensure that you back up the server database,
the device configuration information, and the volume history file.
What to do next
To install a fix pack or interim fix, follow the instructions for your operating
system:
v AIX Installing an IBM Spectrum Protect server fix pack
v Linux Installing an IBM Spectrum Protect server fix pack
v Windows Installing an IBM Spectrum Protect server fix pack
Related information:
Upgrade and Migration Process - Frequently Asked Questions
Procedure
1. Cancel processes and sessions that are in progress by completing the following
steps:
a. In the Operations Center, on the Servers page, select a server for which you
want to view processes and sessions, and click Details.
b. Click the Active Tasks tab, and select one or more processes, sessions, or a
combination of both that you want to cancel.
c. Click Cancel.
2. Stop the server by issuing the HALT command:
halt
Tip: You can issue the halt command from the Operations Center by hovering
over the Settings icon and clicking Command Builder. Then, select the server,
type halt, and press Enter.
Related reference:
HALT (Shut down the server)
DRM tracks the movement of offsite media and registers that information in the
IBM Spectrum Protect database. DRM consolidates plans, scripts, and other
information in a plan file that is required to recover the IBM Spectrum Protect
server when a disaster or unplanned outage occurs. If you are concerned about
possible malware attacks, including ransomware, consider using DRM because it
can help you recover your servers after an attack.
Restriction: DRM is only available in the IBM Spectrum Protect Extended Edition
product.
The plan is organized into stanzas, which you can separate into multiple files. Each
stanza has a begin statement and an end statement.
Table 34. Stanzas in the disaster recovery plan file
Stanza Information in the stanza
SERVER.REQUIREMENTS Identifies the database and recovery log storage requirements
for the server.
RECOVERY.INSTRUCTIONS.GENERAL Identifies site-specific instructions that the administrator enters
in the file that is identified by the prefix
RECOVERY.INSTRUCTIONS.GENERAL. The instructions
include the recovery strategy, key contact names, an overview of
key applications that are backed up by this server, and other
relevant recovery instructions.
RECOVERY.INSTRUCTIONS.OFFSITE Contains instructions that the administrator enters in the file
that is identified by the prefix
RECOVERY.INSTRUCTIONS.OFFSITE. The instructions describe
the name and location of the offsite vault, and how to contact
the vault administrator (for example, a name and phone
number).
RECOVERY.INSTRUCTIONS.INSTALL Contains instructions that the administrator enters in the file
that is identified by the prefix
RECOVERY.INSTRUCTIONS.INSTALL. The instructions
describe how to rebuild the base server and provide the location
of the system image backup copies.
RECOVERY.INSTRUCTIONS.DATABASE Contains instructions that the administrator enters in the file
that is identified by the prefix
RECOVERY.INSTRUCTIONS.DATABASE. The instructions
describe how to prepare for the database recovery. For example,
you might enter instructions about how to initialize or load the
backup volumes for an automated library. No sample of this
stanza is provided.
IBM Spectrum Protect is set up to use the Secure Sockets Layer (SSL) protocol for
client/server authentication. When you start the server, a digital certificate file,
cert.kdb, is created as part of the process. This file includes the server's public key,
which allows the client to encrypt data. The digital certificate file cannot be stored
in the server database because the Global Security Kit (GSKit) requires a separate
file in a certain format.
1. Keep backup copies of the cert.kdb, cert.sth, and cert256.arm files.
2. If both the original certificate files and any copies are lost or corrupted,
generate new certificate files.
Procedure
1. Get the latest recovery plan.
2. Review the recovery steps that are described in the
RECOVERY.INSTRUCTIONS.GENERAL stanza of the plan.
Chapter 31. Preparing for and recovering from a disaster by using DRM 241
3. Separate the stanzas of the plan file into individual files for general preliminary
instructions, IBM Spectrum Protect server recovery scripts, and client recovery
instructions.
4. Retrieve all required recovery volumes (as listed in the plan) from the vault.
5. Review the device configuration file to ensure that the hardware configuration
at the recovery site is the same as the original site. Any differences must be
updated in the device configuration file. The following example configuration
changes require updates to the configuration information:
v Different device names.
v For automated libraries, the requirement of manually placing the database
backup volumes in the automated library and updating the configuration
information to identify the element within the library. This allows the server
to locate the required database backup volumes.
6. Set up replacement hardware for the IBM Spectrum Protect server, including
the operating system and the IBM Spectrum Protect base release installation.
7. Run the IBM Spectrum Protect server recovery scripts from the recovery plan.
The RECOVERY.SCRIPT.DISASTER.RECOVERY.MODE and
RECOVERY.SCRIPT.NORMAL.MODE stanzas contain executable command
files that can be used to drive the recovery of the IBM Spectrum Protect server
by calling other command files that were generated in the plan. The
RECOVERY.SCRIPT.DISASTER.RECOVERY.MODE script recovers the server to
the point where clients can begin restores directly from the copy storage pool
volumes.
8. Restore the primary storage pools by using the
RECOVERY.SCRIPT.NORMAL.MODE script.
9. Start client restore operations in order of highest priority, as defined in your
high-level planning.
What to do next
The IBM Spectrum Protect server can now be used for normal server operations.
Ensure that all required operations are scheduled. For instructions, see “Defining
schedules for server maintenance activities” on page 65 and Scheduling backup
and archive operations.
Related reference:
PREPARE (Create a recovery plan file)
Related information:
Repairing and recovering data in directory-container storage pools
Tip:
When you issue the PREPARE command, the IBM Spectrum Protectdisaster
recovery manager (DRM) function creates one copy of the disaster recovery plan
file.
You can manage offsite disaster recovery without using DRM, however, DRM
helps to consolidate plans, scripts, and other information that is required during
disaster recovery.
Create multiple copies of the plan for safekeeping. For example, keep copies in
print, on a USB flash drive, on disk space that is located offsite, or on a remote
server. The disaster recovery plan file is moved offsite daily with the tapes. For
more information about DRM, see Chapter 31, “Preparing for and recovering
from a disaster by using DRM,” on page 239.
v Configure the following resources at the disaster recovery site:
1. A recovery IBM Spectrum Protect server. The server at the disaster recovery
site must be at the same level as the server on the production site.
2. A tape library to store the media that is shipped from the production site.
For more information about offsite recovery locations, see “Offsite data
storage” on page 26.
3. Disk storage space for the database, archive log, active logs, and storage
pools.
4. Clients to test restore operations.
Test the disaster recovery plan and the IBM Spectrum Protect server recoverability
often, in an environment that is similar to the production environment.
Procedure
1. Ensure that tapes are available onsite. Issue the QUERY LIBVOLUME command to
identify volumes that are checked into an automated library.
2. Back up the database to the onsite tapes by completing the following steps:
a. On the Servers page of the Operations Center, select the server whose
database you want to back up.
b. Click Back Up, and follow the instructions in the Back Up Database
window.
3. Copy the following files to the home directory of the server at the recovery site:
v Disaster recovery plan file
v Volume history file
Chapter 31. Preparing for and recovering from a disaster by using DRM 243
v Device configuration file
v Optional: dsmserv.opt server options file
4. Move the tape to the offsite recovery location.
5. Restore the server database by using the DSMSERV RESTORE DB utility on the
recovery server. For more information about restoring the server database, see
“Restoring the database.”
6. Issue the UPDATE VOLUME command and specify the ACCESS=DESTROYED parameter
to indicate that an entire volume must be restored.
7. On the recovery server, restore the storage pool volumes by using the RESTORE
STGPOOL command.
What to do next
Ensure that you can access the data in the library by auditing a tape volume in the
restored storage pool to verify that the data is consistent. Issue the AUDIT VOLUME
command to audit a tape volume. For faster performance, audit restored data only.
Related tasks:
“Auditing the volume inventory in a library” on page 208
Related reference:
AUDIT VOLUME (Verify database information for a storage pool volume)
DSMSERV RESTORE DB (Restore the database)
RESTORE STGPOOL (Restore storage pool data)
If the database and recovery log directories are lost, re-create them before you run
the DSMSERV RESTORE DB server utility.
You can restore the database to its most current state or to a specified point in
time. To recover the database to the time when the database was lost, recover the
database to its latest version.
Restrictions:
v To restore the database to its latest version, you must locate the archive log
directory. If you cannot locate the directory, you can restore the database only to
a point in time.
v You cannot use the Secure Sockets Layer (SSL) protocol for database restore
operations.
v If the release level of the database backup is different from the release level of
the server that is being restored, you cannot restore the server database. For
example, if you are using a Version 8.1 server and you try to restore a V7.1
database, an error occurs.
Use the DSMSERV RESTORE DB server utility to restore the database. Depending on
the version of the database that you want to restore, choose one of the following
methods:
v Restore a database to its latest version. For example, use the following
command:
dsmserv restore db
v Restore a database to a point in time. For example, to restore the database to a
backup series that was created on 19 April 2017, use the following command:
dsmserv restore db todate=04/19/2017
Related reference:
DSMSERV RESTORE DB (Restore the database)
Chapter 31. Preparing for and recovering from a disaster by using DRM 245
246 IBM Spectrum Protect: Tape Solution Guide
Part 5. Appendixes
Overview
The IBM Spectrum Protect family of products includes the following major
accessibility features:
v Keyboard-only operation
v Operations that use a screen reader
The IBM Spectrum Protect family of products uses the latest W3C Standard,
WAI-ARIA 1.0 (www.w3.org/TR/wai-aria/), to ensure compliance with US Section
508 (www.access-board.gov/guidelines-and-standards/communications-and-it/
about-the-section-508-standards/section-508-standards) and Web Content
Accessibility Guidelines (WCAG) 2.0 (www.w3.org/TR/WCAG20/). To take
advantage of accessibility features, use the latest release of your screen reader and
the latest web browser that is supported by the product.
Keyboard navigation
Interface information
User interfaces do not have content that flashes 2 - 55 times per second.
Web user interfaces rely on cascading style sheets to render content properly and
to provide a usable experience. The application provides an equivalent way for
low-vision users to use system display settings, including high-contrast mode. You
can control font size by using the device or web browser settings.
Web user interfaces include WAI-ARIA navigational landmarks that you can use to
quickly navigate to functional areas in the application.
Vendor software
The IBM Spectrum Protect product family includes certain vendor software that is
not covered under the IBM license agreement. IBM makes no representation about
the accessibility features of these products. Contact the vendor for accessibility
information about its products.
In addition to standard IBM help desk and support websites, IBM has a TTY
telephone service for use by deaf or hard of hearing customers to access sales and
support services:
TTY service
800-IBM-3383 (800-426-3383)
(within North America)
For more information about the commitment that IBM has to accessibility, see IBM
Accessibility (www.ibm.com/able).
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at www.ibm.com/legal/copytrade.shtml.
Linear Tape-Open, LTO, and Ultrium are trademarks of HP, IBM Corp. and
Quantum in the U.S. and other countries.
Java™ and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
VMware, VMware vCenter Server, and VMware vSphere are registered trademarks
or trademarks of VMware, Inc. or its subsidiaries in the United States and/or other
jurisdictions.
Permissions for the use of these publications are granted subject to the following
terms and conditions.
Applicability
These terms and conditions are in addition to any terms of use for the IBM
website.
Personal use
You may reproduce these publications for your personal, noncommercial
use provided that all proprietary notices are preserved. You may not
distribute, display or make derivative work of these publications, or any
portion thereof, without the express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within
Notices 253
your enterprise provided that all proprietary notices are preserved. You
may not make derivative works of these publications, or reproduce,
distribute or display these publications or any portion thereof outside your
enterprise, without the express consent of IBM.
Rights Except as expressly granted in this permission, no other permissions,
licenses or rights are granted, either express or implied, to the publications
or any information, data, software or other intellectual property contained
therein.
IBM reserves the right to withdraw the permissions granted herein
whenever, in its discretion, the use of the publications is detrimental to its
interest or, as determined by IBM, the above instructions are not being
properly followed.
You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United
States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE
PUBLICATIONS. THE PUBLICATIONS ARE PROVIDED "AS-IS" AND
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES
OF MERCHANTABILITY, NON-INFRINGEMENT, AND FITNESS FOR A
PARTICULAR PURPOSE.
This Software Offering does not use cookies or other technologies to collect
personally identifiable information.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, see IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details in the
section entitled “Cookies, Web Beacons and Other Technologies,” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
Index 259
mount policy domains
library 134 specifying 115
limit 135 pool, storage
operations 210 3592, special considerations for 100
query 210 determining whether to use collocation 181
retention period 136 LTO Ultrium, special considerations for 96
wait period 137 preemption
mount point mount point 137
preemption 137 volume access 138
relationship to mount limit in a device class 135 privilege class
move data 70 system privilege 227
move media 70, 71 processor value unit (PVU) licensing 163
multipath I/O 79 product license
configure for AIX systems 42 register 64
configure for Linux systems 43 protecting your data 140
configure for Windows systems 44 publications vii
N Q
name of device 76 QUERY SAN 140
network bandwidth 3
new tape drive 223
NOPREEMPT server option 137 R
random mode for libraries 73
reconfiguration tasks
O start the server in maintenance mode 232
offsite storage 26 recovery drill 242
offsite vaulting 26 registration
offsite volume 70 clients 120
onsite volume 71 remove drive 223
operating system replace drive 224
install on AIX server systems 36 replacing tape drive 223
install on Linux server systems 37 reports
install on Windows server systems 41 email
security 229 configuring 165
Operations Center restricting
configure 61 user access 229
secure communications 62 RPM files
option, server install for graphical wizard 52
NOPREEMPT 137 rules
options editing 117
set for server 56 specifying
outage backup and archive operations 115
prepare 237 viewing 116
P S
passthru driver 75 SAN (storage area network)
password requirements client access to devices 18, 20
LDAP 228 device changes, detecting 139
passwords LAN-free data movement 18, 20
changing 228 sharing a library among servers 18, 103
resetting 173 storage agent role 18, 20
paths scale capacity 102
defining 93 scheduled activities
performance tuning 181
volume frequently used, improve with longer mount schedules
retention 136 backup and archive operations 119
periodic checklist of monitoring tasks 155 scratch volume 206
planning solutions scratch volumes 203
tape 1 SCSI
planning worksheet 11 automatic labeling of volumes 195
policies library with different tape technologies 100
editing 117 SCSI devices 81
specifying 115 SCSI libraries
viewing 116 define a library client 104, 106
Index 261
V
VALIDATE LANFREE command 128
validating data
logical block protection 214
volume capacity 133
volumes
access preemption 138
access, controlling 201
auditing 208
automated library inventory 209
checking in new volumes to library 196
checking out 206
determining which are mounted 210
dismounting 210
inventory maintenance 201
managing 205
mount retention time 136
removing from a library 206
sequential storage pools 193
swapping 199
updating 205
W
WORM devices and media
DLT WORM 140
IBM 3592 140
LTO WORM 140
maintaining volumes in a library 204
Oracle StorageTek T10000B drives 141
Oracle StorageTek T10000C drives 141
Oracle StorageTek T10000D drives 141
Quantum LTO3 140
Sony AIT50 and AIT100 140
special considerations for WORM media 140
VolSafe
considerations for media 140
worm volumes 142
Printed in USA