Home Page Icon
Home Page
Table of Contents for
Front cover
Close
Front cover
by Carlos A. Martinez Vazquez, Emmanuel Barajas Gonzalez, Mara Miranda Bautista, Ka
IBM ProtecTIER Implementation and Best Practices Guide
Front cover
Notices
Trademarks
IBM Redbooks promotions
Preface
Authors
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Summary of changes
June 2016, Fourth Edition
Part 1 General best practices
Chapter 1. IBM ProtecTIER basics
1.1 Terminology
1.1.1 ProtecTIER Appliance terminology
1.1.2 ProtecTIER Gateway terminology
1.1.3 ProtecTIER replication terminology
1.2 ProtecTIER fundamental concepts
1.2.1 ProtecTIER with deduplication disabled
1.3 ProtecTIER models
1.3.1 ProtecTIER appliance
1.4 Remote support and call home
1.5 Simple Network Management Protocol (SNMP)
1.5.1 Alert filtering
1.5.2 Space thresholds
1.5.3 Email alerts
1.6 ProtecTIER command-line interface
1.7 Performance considerations for repository creation
1.7.1 Example 1: Calculate performance throughput
1.7.2 Example 2: Calculate performance throughput
Chapter 2. Deduplication considerations
2.1 HyperFactor data deduplication
2.1.1 HyperFactor, deduplication, and bandwidth savings
2.2 ProtecTIER HyperFactor deduplication processing
2.3 Components of a ProtecTIER system
2.3.1 ProtecTIER server
2.3.2 HyperFactor deduplication algorithm
2.3.3 Disk storage subsystem
2.4 Benefits of ProtecTIER HyperFactor
2.4.1 Flexibility
2.4.2 High availability
2.4.3 High performance, low storage requirements, and lower environmental costs
2.5 General ProtecTIER deduplication considerations
2.5.1 Rethinking your overall backup strategy
2.5.2 Data reduction technologies should not be combined
2.5.3 Data streams must be in order
2.5.4 Data organization in your ProtecTIER repository
2.5.5 The dynamics of the ProtecTIER repository
2.5.6 ProtecTIER repository usage
2.5.7 Compression
2.5.8 Encryption
2.5.9 Database logs and other data types with high data change rates
2.5.10 Multiplexing
2.5.11 Tape block size
2.5.12 File size
2.6 Data types
2.6.1 Candidates for a high factoring ratio
2.6.2 Candidates for a low factoring ratio
Chapter 3. Networking essentials
3.1 Network terminology
3.2 General configuration considerations
3.3 Bonding and teaming
3.3.1 The three bonding modes of ProtecTIER
3.4 Preferred ProtecTIER bonding configuration
3.4.1 VLANs
3.4.2 IP addresses
3.4.3 Routing the IP traffic
Chapter 4. Virtual Tape Library guidelines
4.1 ProtecTIER Virtual Tape Library introduction
4.2 General preferred practices for the virtual tape library
4.3 Setting up the virtual library and cartridges
4.3.1 Creating libraries
Chapter 5. ProtecTIER File System Interface: General introduction
5.1 ProtecTIER FSI network overview
5.1.1 ProtecTIER network
5.1.2 Network configuration considerations
5.1.3 Connecting a ProtecTIER server to the network
5.1.4 Replication
5.1.5 Disaster recovery: Test
5.1.6 Disaster recovery: Event
5.1.7 General FSI suggestions
5.2 File System Interface guidelines for NFS
5.2.1 ProtecTIER NFS authentication and security management
5.2.2 Understanding root squash
5.3 File System Interface guidelines for CIFS
5.3.1 Mounting the NFS export in a UNIX system
5.3.2 ProtecTIER authentication and user management
5.4 FSI file system scalability
Chapter 6. Host attachment considerations for Virtual Tape Library
6.1 General suggestions
6.2 Device driver specifications
6.2.1 AIX specifications to work with VTL
6.2.2 Solaris specifications to work with VTL
6.2.3 Linux specifications to work with VTL
6.2.4 Windows specifications to work with VTL
6.2.5 IBM Tape Device Driver
6.2.6 Control path failover and data path failover
6.2.7 Persistent device naming
6.3 LUN masking for VTL systems
6.3.1 LUN masking methods and preferred practices
6.3.2 LUN masking configuration steps
Part 2 Back-end storage subsystems
Chapter 7. Back-end storage overview
7.1 Overview
7.1.1 ProtecTIER Planner tool
7.2 Dependencies from a back-end storage subsystem view
7.3 Dependencies from a ProtecTIER view
7.4 Smart storage subsystems
7.5 Key rules for a ProtecTIER server
7.6 Storage arrays configuration
7.6.1 General requirements
7.6.2 RAID considerations
7.6.3 LUNs
7.6.4 Expanding the repository
7.7 Storage area network fabric
7.7.1 Two Fibre Channel paths to each storage controller
7.7.2 Dedicated zones
7.7.3 Front-end zones
7.7.4 Back-end zones
7.7.5 SAN paths
Chapter 8. IBM FlashSystem 900 with System Storage TS7650G ProtecTIER Deduplication Gateway
8.1 Introduction to flash technology
8.2 IBM FlashSystem overview
8.3 General FlashSystem considerations
8.4 Deploying the IBM FlashSystem 900 with IBM ProtecTIER
8.4.1 Creating user data and metadata volumes
8.4.2 Mapping the FlashSystem Volumes to the ProtecTIER System
8.4.3 Creating file systems and building the ProtecTIER repository
8.5 General preferred practices integrating FlashSystem 900 with ProtecTIER
8.5.1 ProtecTIER Metadata Planner preferred practices for FlashSystem 900
Chapter 9. IBM Storwize Family and SAN Volume Controller
9.1 IBM Storwize V3700 and V5000 overview
9.2 General considerations: V3700, V5000, and V7000
9.2.1 Configuration steps: ProtecTIER repository
9.2.2 Creating empty user data and metadata storage pools
9.2.3 Creating the MDisk arrays or discovering unmanaged MDisks
9.2.4 Creating volumes with a sequential virtualization type
9.2.5 Creating a host connection for the ProtecTIER nodes by using the GUI
9.2.6 Mapping volumes to a host
9.2.7 Creating file systems and building the ProtecTIER repository
9.2.8 Expanding the repository
9.3 IBM System Storage SAN Volume Controller, IBM Storwize V7000, and V7000 Unified Storage
9.3.1 Storage virtualization introduction
9.3.2 Terminology
9.4 General notes
9.5 Firmware level
9.6 Fibre Channel connection topology
9.7 User data and metadata pool: General suggestions
9.7.1 Metadata pool
9.7.2 User data pool
9.8 Configuration steps
Chapter 10. IBM XIV Storage System
10.1 XIV Storage System hardware
10.2 Fibre Channel switch cabling and zoning
10.2.1 Zoning configuration
10.3 Configuring XIV Storage System for ProtecTIER server
Chapter 11. IBM System Storage DS8000
11.1 DS8000 series overview
11.1.1 Disk drives
11.1.2 RAID levels
11.2 General considerations
11.2.1 Planning tools
11.2.2 Metadata
11.2.3 User data
11.2.4 Firmware levels
11.2.5 Replication
11.3 Rotate extents: Striping and when to use it
11.3.1 When not to use rotate extents
Chapter 12. Backup management introduction
12.1 Introduction
12.2 General suggestions
12.2.1 Interoperability
12.2.2 Software compatibility
12.2.3 Software, backup application, and operating system
12.2.4 Tape library zoning
12.2.5 Compression
12.2.6 Encryption
12.2.7 Multiplexing
12.2.8 Tape block sizes
12.2.9 Type of data that is backed up
12.3 General advice for backups
12.4 ProtecTIER integration with backup applications
12.5 Backup application terminology cross-reference
12.6 Backup application catalog
12.7 Remote cloning of virtual tapes
Chapter 13. IBM Spectrum Protect
13.1 IBM Spectrum Protect VTL
13.2 IBM Spectrum Protect: Preferred options
13.2.1 LAN-free backups with the ProtecTIER product
13.2.2 Data streams
13.2.3 Reclamation
13.2.4 Collocation
13.2.5 Migration
13.2.6 Backing up your IBM Spectrum Protect database
13.2.7 Physical tape
13.2.8 Avoiding mount conflicts
13.2.9 Multiple streams from the client with the resourceutilization parameter
13.2.10 Accommodating increased sessions
13.2.11 IBM Spectrum Protect storage pool selection
13.2.12 Technical overview
13.2.13 Advantages of an IBM Spectrum Protect environment with ProtecTIER
13.2.14 IBM Spectrum Protect configuration with VTL
13.2.15 Updating to a VTL library type
13.2.16 Defining and deleting IBM Spectrum Protect libraries with many drives
13.3 IBM Spectrum Protect: FSI
13.3.1 Setting up backup and restore on IBM Spectrum Protect
13.3.2 Parameters for best performance with ProtecTIER FSI
Chapter 14. Symantec NetBackup and BackupExec
14.1 NetBackup overview
14.2 General suggestions for NetBackup
14.3 NetBackup in a VTL environment
14.4 NetBackup in an FSI environment
14.4.1 NetBackup in an FSI-CIFS environment
14.4.2 NetBackup in an FSI-NFS environment
14.5 Symantec BackupExec in an FSI environment
Chapter 15. EMC NetWorker
15.1 Overview
15.2 EMC NetWorker in a VTL environment
15.2.1 General suggestions
15.2.2 Suggestion if a ProtecTIER server is used as a VTL
15.3 EMC NetWorker in an FSI environment
15.3.1 Creating a Windows user for EMC NetWorker
15.3.2 Setting up for backup and restore
15.3.3 General configuration suggestions
15.3.4 Setting the information to be backed up
15.3.5 Setting the time for the backup
15.3.6 Performing a restore
15.3.7 Parameters for best performance with ProtecTIER FSI
Chapter 16. HP Data Protector
16.1 HP Data Protector with ProtecTIER
16.1.1 HP Data Protector architecture with ProtecTIER
16.2 HP Data Protector in a VTL environment
16.2.1 Enabling the robotic bar code reader
16.2.2 Increasing the tape block size
16.2.3 Enabling the lock name
16.2.4 Disabling compression, encryption, and CRC chksum
16.2.5 Hosts multipath support
16.2.6 Load balancing
16.2.7 Using a mirroring functionality
16.2.8 Troubleshooting logs
Chapter 17. IBM i and Backup, Recovery, and Media Services
17.1 IBM i overview
17.1.1 Integrated file system
17.1.2 Integrated database
17.1.3 Object-based architecture
17.1.4 Libraries
17.1.5 Backup considerations in IBM i
17.2 Integration of IBM i and ProtecTIER in a VTL environment
17.2.1 Backup considerations with ProtecTIER
17.2.2 Suggested ProtecTIER and IBM i configuration
17.3 Configuration of BRMS for ProtecTIER
17.3.1 BRMS overview
17.3.2 Suggested configurations of BRMS
17.4 Deploying ProtecTIER with BRMS for disaster recovery
17.4.1 BRMS available at the production site and DR site
17.4.2 No BRMS at the DR site
17.5 Use DUPMEDBRM to duplicate media from ProtecTIER to physical media
17.5.1 Enable append to multiple parallel volumes during DUPMEDBRM
17.5.2 Support multiple batch jobs for the DUPMEDBRM command
17.6 Device configuration
17.7 BRMS movement of replicated volumes: considerations
Chapter 18. Commvault
18.1 Commvault introduction
18.1.1 Commvault components
18.2 Commvault with ProtecTIER VTL
18.2.1 Commvault configuration
18.2.2 Data multiplexing
18.2.3 Hardware compression
18.2.4 Data encryption
18.2.5 Alternative data paths
18.3 Commvault FSI
18.3.1 Setting up backup and restore in a CIFS environment
18.3.2 Parameters for best performance with ProtecTIER FSI-CIFS
18.3.3 Setting up backup and restore in an NFS environment
18.3.4 Parameters for best performance with ProtecTIER FSI-NFS
Chapter 19. Veeam FSI-CIFS
19.1 Setting up backup infrastructure
19.1.1 Creating backup repository
19.1.2 Adding VMware backup proxy
19.1.3 Adding a VMware Server
19.2 Setting up backup and restore
19.2.1 Creating a new backup job for backup
19.2.2 Performing backup
19.2.3 Performing restore
19.3 Parameters for best performance with ProtecTIER-CIFS
19.3.1 Disabling data de-duplication and compression
19.3.2 Setting data block size for backup to SAN or local storage
19.3.3 Setting Incremental backup mode
19.4 Advanced backup repository settings
19.4.1 Setting data blocks alignment
19.4.2 Setting data blocks decompression
19.5 Summary of parameters for best performance
Part 3 Application considerations
Chapter 20. Application considerations and data types
20.1 IBM Domino
20.1.1 Common server
20.1.2 Existing backup and disk space usage
20.1.3 Domino attachments and object service
20.1.4 Applying the DAOS solution
20.1.5 ProtecTIER considerations
20.2 Microsoft Exchange
20.2.1 Defragmentation
20.2.2 Suggestions for Microsoft Exchange
20.2.3 Microsoft Exchange 2010
20.3 Microsoft SQL Server
20.3.1 Integrating the ProtecTIER server with Microsoft SQL Server backup
20.3.2 Index defragmentation
20.3.3 Suggestions for Microsoft SQL Server
20.3.4 LiteSpeed for SQL Server
20.4 DB2
20.4.1 Combining DB2 compression and ProtecTIER deduplication
20.4.2 Upgrading the DB2 database to improve deduplication
20.4.3 DB2 DEDUP_DEVICE setting
20.4.4 Example of DEDUP_DEVICE setting
20.4.5 Excluding logs from the DB2 database backup
20.4.6 DB2 suggested settings without DEDUP_DEVICE
20.4.7 Example of DB2 command using sessions, buffers, and parallelism
20.5 Oracle
20.5.1 Suggested RMAN settings
20.5.2 Mounting NFS Oracle Server to ProtecTIER NAS
20.5.3 Using ProtecTIER NAS to run RMAN incremental merge backups
20.5.4 Using ProtecTIER NAS to store Oracle Data Pump exports
20.5.5 Using ProtecTIER NAS to store Oracle database files and offline redo logs
20.5.6 Other suggestions for RMAN
20.6 SAP
20.6.1 SAP introduction
20.6.2 Data protection for SAP
20.6.3 Integration of Tivoli Storage Manager for ERP with SAP
20.6.4 Tivoli Storage Manager for ERP for Oracle database
20.6.5 Tivoli Storage Manager for ERP for DB2
20.6.6 SAP BR*Tools for Oracle using BACKINT
20.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager
20.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage Manager
20.6.9 Preferred practices for Tivoli Storage Manager for ERP with ProtecTIER
20.7 VMware
20.7.1 Technical overview
20.7.2 Settings and tuning for VMware and Tivoli Storage Manager
20.7.3 Backup solutions
20.7.5 Configuring the ProtecTIER server
20.7.6 Installing the tape driver on the Tivoli Storage Manager server and the Tivoli Storage Manager storage agent
20.7.8 Tivoli Storage Manager server configuration
20.7.9 Tivoli Storage Manager client installation
20.7.10 Disabling compression and deduplication on Tivoli Storage Manager
20.7.11 Configuring a full VM backup through the vStorage API
20.7.12 VMware Guest OS backup to ProtecTIER
Part 4 Replication and disaster recovery
Chapter 21. ProtecTIER replication
21.1 ProtecTIER IP replication
21.2 Native replication
21.2.1 One-to-one replication
21.2.2 Many-to-one replication
21.2.3 Many-to-many replication
21.2.4 VTL replication
21.2.5 FSI replication
21.2.6 Replication grid
21.2.7 Replication topology group
21.3 Replication policies
21.4 Visibility switching
21.5 Principality
21.6 Replication Manager
21.7 Initial synchronization
21.8 Replication schedules
21.8.1 Continuous replication
21.8.2 Scheduled replication
21.8.3 Centralized Replication Schedule Management
21.8.4 Replication rate control
21.8.5 Setting replication rate limits
21.8.6 Limiting port bandwidth consumption
21.9 Replication backlog
21.9.1 SNMP alerts for replication backlog
21.10 Replication planning
21.10.1 Replication throughput barriers
21.10.2 Calculating the replication data transfer
21.10.3 Calculating replication bandwidth
21.10.4 Ports for replication in firewalled environments
21.11 Bandwidth validation utility
21.11.1 Using the bandwidth validation utility to test the data flow
21.11.2 Interpreting the results
21.11.3 Repository replacement
21.12 Planning ProtecTIER replication
21.12.1 Deployment planning scenario: many-to-many
21.12.2 Many-to-one replication
21.13 The backup application database backup
Chapter 22. Disaster recovery deployment with backup applications
22.1 Disaster recovery operations
22.2 ProtecTIER replication overview
22.3 Disaster recovery operations with VTL
22.3.1 Replication data transfer
22.3.2 Managing cartridges after replication
22.3.3 Cartridge replication requirements
22.3.4 Importing/exporting slots allocation in VTL
22.3.5 Import/export slots searching
22.3.6 Automation of daily operation
22.3.7 Gauging the replication completion status
22.4 Disaster recovery operations with FSI
22.4.1 Replication destination directory (RDD)
22.4.2 ProtecTIER FSI cloning
22.4.3 Preferred replication practices for FSI
22.5 Entering ProtecTIER DR mode
22.5.1 Working at the disaster recovery site
22.5.2 Inventory command options for a VTL disaster recovery scenario
22.5.3 Commonly used disaster recovery queries
22.5.4 Returning to normal operations
22.6 The backup application catalog
22.6.1 ProtecTIER replication with IBM Spectrum Protect
22.6.2 Recovering the backup application catalog
22.6.3 IBM Spectrum Protect reclamation and housekeeping
22.7 Single domain and multiple domains
22.7.1 Single domain environment
22.7.2 Multiple domain environment
22.8 Deploying replication with specific backup applications
22.8.1 Recovery point objective (RPO)
22.9 IBM Spectrum Protect
22.9.1 Scenario 1: Replication complete
22.9.2 Scenario 2: Replication incomplete
22.9.3 Scenario 3: Auditing tapes and fixing the IBM Protect database
22.9.4 Reclamation considerations
22.9.5 Determining what is available for restoration at the DR site
22.10 Symantec NetBackup deployment with ProtecTIER replication
22.10.1 Scripting the inject/eject commands
22.10.2 Scripting the inventory commands
22.10.3 Setting up NetBackup for backup and restore
22.10.4 Setting up NetBackup for disaster recovery
22.10.5 Cross-site backups
22.10.6 ProtecTIER disaster recovery with Symantec NetBackup
22.10.7 Single domain versus two separate domains
22.10.8 Disaster recovery scenarios
22.10.9 Determining what is available for restore at the disaster recovery site
22.10.10 Eject and inject commands from NetBackup software
22.11 EMC NetWorker deployment with ProtecTIER replication
22.11.1 Cloning physical tapes with ProtecTIER replication
22.11.2 Disaster recovery with ProtecTIER replication
22.12 Commvault
22.12.1 Prerequisites
22.12.2 Running the Commvault backup operation
22.12.3 Commvault resources
Part 5 Appendixes
Appendix A. Hints and tips
Remote access with IBM Endpoint Manager for Remote Control (Assist On-site)
Operating system recovery functionality
Online fsck command
Dedup estimator tool
Local directory cloning for FSI
Commands to send files to and receive files from IBM Support
Graphical performance tool
ProtecTIER licensing tips
Reconfigure an IBM Spectrum Protect instance attached to ProtecTIER after a reboot
Appendix B. ProtecTIER compatibility
IBM System Storage Interoperation Center (SSIC)
Independent Software Vendor Support Matrix
Appendix C. ProtecTIER parsers
The ProtecTIER parsers
Appendix D. Managing cartridge sizes with ProtecTIER
Effects of dynamic cartridge sizes
The mechanism behind fluctuating cartridge sizes
Glossary
Related publications
IBM Redbooks
Other publications
Online resources
Help from IBM
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Note: Before using this information and the product it supports, read the information in “Notices” on page xiii.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset