8.1.9 Tape - Solution
8.1.9 Tape - Solution
8.1.9 Tape - Solution
Version 8.1.9
IBM
Note:
Before you use this information and the product it supports, read the information in “Notices” on page
213.
This edition applies to version 8, release 1, modification 9 of IBM Spectrum Protect (product numbers 5725-W98, 5725-
W99, 5725-X15), and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright International Business Machines Corporation 1993, 2019.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
What's new.......................................................................................................... ix
Part 1. Planning.....................................................................................................1
Tape planning requirements........................................................................................................................2
System requirements for a tape-based solution........................................................................................ 3
Hardware requirements......................................................................................................................... 3
Software requirements...........................................................................................................................6
Planning worksheets....................................................................................................................................8
Planning for disk storage........................................................................................................................... 12
Planning the storage arrays................................................................................................................. 12
Planning for tape storage...........................................................................................................................14
Supported tape devices and libraries.................................................................................................. 14
Supported tape device configurations.................................................................................................15
Data movement between storage devices.....................................................................................15
Library sharing................................................................................................................................ 16
LAN-free data movement............................................................................................................... 16
Mixed device types in libraries....................................................................................................... 17
Required definitions for tape storage devices.....................................................................................19
Planning the storage pool hierarchy.................................................................................................... 20
Offsite data storage..............................................................................................................................22
Planning for security.................................................................................................................................. 23
Planning for administrator roles.......................................................................................................... 23
Planning for secure communications.................................................................................................. 24
Planning for storage of encrypted data............................................................................................... 24
Planning firewall access.......................................................................................................................25
Part 2. Implementing...........................................................................................27
Setting up the system................................................................................................................................ 28
Configuring the storage hardware....................................................................................................... 28
Installing the server operating system................................................................................................ 29
Installing on AIX systems...............................................................................................................29
Installing on Linux systems............................................................................................................ 30
Installing on Windows systems......................................................................................................34
Configuring multipath I/O.................................................................................................................... 35
AIX systems.................................................................................................................................... 35
Linux systems................................................................................................................................. 36
Windows systems........................................................................................................................... 37
Creating the user ID for the server...................................................................................................... 38
Preparing file systems for the server................................................................................................... 39
AIX systems.................................................................................................................................... 39
Linux systems................................................................................................................................. 40
Windows systems........................................................................................................................... 41
Installing the server and Operations Center.............................................................................................42
Installing on AIX and Linux systems................................................................................................... 42
Installing prerequisite RPM files for the graphical wizard.............................................................43
Installing on Windows systems........................................................................................................... 43
iii
Configuring the server and the Operations Center................................................................................... 44
Configuring the server instance........................................................................................................... 44
Installing the backup-archive client.................................................................................................... 45
Setting options for the server...............................................................................................................45
Security concepts................................................................................................................................. 47
Configuring secure communications with Transport Layer Security.............................................49
Configuring the Operations Center...................................................................................................... 50
Securing communications between the Operations Center and the hub server.......................... 50
Registering the product license........................................................................................................... 52
Defining data retention rules for your business.................................................................................. 53
Defining schedules for server maintenance activities........................................................................ 53
Moving backup media..................................................................................................................... 58
Defining client schedules..................................................................................................................... 60
Attaching tape devices for the server....................................................................................................... 60
Attaching an automated library device to your system...................................................................... 61
Setting the library mode................................................................................................................. 61
Selecting a tape device driver.............................................................................................................. 62
IBM tape device drivers..................................................................................................................62
IBM Spectrum Protect tape device drivers.................................................................................... 62
Special file names for tape devices..................................................................................................... 63
Installing and configuring tape device drivers.................................................................................... 64
Installing and configuring IBM device drivers for IBM tape devices.............................................65
AIX systems.................................................................................................................................... 68
Linux systems................................................................................................................................. 70
Windows systems........................................................................................................................... 73
Configuring libraries for use by a server....................................................................................................74
Defining tape devices........................................................................................................................... 76
Defining libraries and drives........................................................................................................... 76
Defining tape device classes.......................................................................................................... 78
Configuring library sharing................................................................................................................... 85
Example: Library sharing for AIX and Linux servers...................................................................... 86
Example: Library sharing for Windows servers..............................................................................87
Setting up a storage pool hierarchy...........................................................................................................90
Protecting applications and systems........................................................................................................ 91
Adding clients....................................................................................................................................... 91
Selecting the client software and planning the installation.......................................................... 92
Specifying rules for backing up and archiving client data............................................................. 93
Scheduling backup and archive operations................................................................................... 97
Registering clients.......................................................................................................................... 97
Installing and configuring clients................................................................................................... 98
Configuring LAN-free data movement.................................................................................................... 102
Validating your LAN-free configuration............................................................................................. 103
Encryption methods................................................................................................................................ 104
Configuring tape drive encryption..................................................................................................... 106
Controlling tape storage operations....................................................................................................... 107
How IBM Spectrum Protect fills volumes......................................................................................... 107
Specifying the estimated capacity of tape volumes......................................................................... 108
Specifying recording formats for tape media.................................................................................... 108
Associating library objects with device classes................................................................................ 109
Controlling media-mount operations for tape devices..................................................................... 109
Controlling the number of simultaneously mounted volumes....................................................109
Controlling the amount of time that a volume remains mounted............................................... 110
Controlling the amount of time that the server waits for a drive................................................ 110
Preempting operations...................................................................................................................... 111
Mount point preemption...............................................................................................................111
Volume access preemption.......................................................................................................... 112
Impacts of device changes on the SAN.............................................................................................112
Displaying device information........................................................................................................... 113
iv
Write-once, read-many tape media...................................................................................................113
WORM-capable drives.................................................................................................................. 114
Check-in of WORM media.............................................................................................................114
Restrictions on WORM media.......................................................................................................114
Mount failures with WORM media................................................................................................115
Relabeling WORM media.............................................................................................................. 115
Removing private WORM volumes from a library........................................................................ 115
Creation of DLT WORM volumes.................................................................................................. 115
Support for short and normal 3592 WORM tapes....................................................................... 115
Querying a device class for the WORM-parameter setting......................................................... 115
Troubleshooting problems with devices........................................................................................... 115
Completing the implementation............................................................................................................. 117
Part 4. Managing................................................................................................139
v
Server requests for volumes..............................................................................................................178
Chapter 10. Preparing for and recovering from a disaster by using DRM..............................................205
Disaster recovery plan file .................................................................................................................205
Recovering the server and client data............................................................................................... 207
Recovery drills....................................................................................................................................208
Restoring the database...................................................................................................................... 210
Appendix A. Accessibility...................................................................................211
Notices..............................................................................................................213
Glossary............................................................................................................ 217
Index................................................................................................................ 219
vi
About this publication
This publication provides information about planning for, implementing, monitoring, and operating a data
protection solution that uses IBM Spectrum Protect best practices.
Publications
The IBM Spectrum Protect product family includes IBM Spectrum Protect Plus, IBM Spectrum Protect for
Virtual Environments, IBM Spectrum Protect for Databases, and several other storage management
products from IBM®.
To view IBM product documentation, see IBM Knowledge Center.
Planning roadmap
Plan for the tape solution by reviewing the architecture layout in Figure 1 on page 1 and then
completing the roadmap tasks that follow the diagram.
In this data protection configuration, the server uses both disk and tape storage hardware. Storage pool
staging is used, in which client data is initially stored in disk storage pools and then later migrated to tape
storage pools. For disaster recovery, tape volumes can be stored offsite. Offsite options include physically
moving a second copy offsite by a courier or electronically vaulting copies offsite to a remote library.
Tips:
• In the described solution, data is migrated from disk storage pools to tape storage pools. However,
instead of migrating the data, you can use the tiering-to-tape feature that was introduced in IBM
Spectrum Protect Version 8.1.8. With this feature, you can automatically tier data from directory-
container storage pools on disk to tape storage. You can specify that all data is tiered based on a
specified age threshold, or that only inactive data is tiered based on an age threshold. For more
information about tiering data to tape storage, see Tiering data to cloud or tape storage.
• The described solution does not include node replication. If you want to use node replication to back up
a storage pool from disk to disk, ensure that the replication operation is completed before data is
migrated from disk to tape. You can also use node replication to back up a storage pool on a local tape
device to a copy storage pool on a local tape device.
To plan for a tape-based solution, complete the following tasks:
Hardware requirements
Hardware requirements for your IBM Spectrum Protect solution are based on system size. Choose
equivalent or better components than those items that are listed to ensure optimum performance for your
environment.
For more information about planning disk devices, see Planning for disk storage.
For more information about planning tape devices, see Planning for tape storage.
The following table includes minimum hardware requirements for the server and storage. If you are using
local partitions (LPARs) or work partitions (WPARs), adjust the network requirements to take account of
the partition sizes. The figures in the table are based on a data ingestion rate of 14 TB per hour.
Tape
Select the tape technology that best fits your business requirements. For
example, use IBM Linear Tape-Open (LTO) or IBM TS1150 tape drives. Ensure
that you have sufficient mount points for client backup operations and for
migration. For more information about planning tape storage, see Planning for
tape storage. For a list of supported tape devices, see IBM Support Portal for IBM
Spectrum Protect.
Tip: To optimize data movement, use LAN-free data movement.
SAN I/O Segregate disk and tape I/O. For more information about selecting an adapter, see
adapters the documentation for Brocade hardware products and for IBM Storwize® storage
solutions.
Disk
Use at least two adapters.
Tape
Use at least two adapters.
(4.4 GB x 2) = 8.8 GB
For example, if you back up 100 TB of front-end data, use a 30-day retention period, and have a 5%
change rate, calculate your total managed data by using the following figures:
• For client types that perform full backups every day, the following formula can be used to estimate
the total managed data:
For example, if you back up 10 TB of front-end data, use a 30-day retention period, and have a 3%
change rate, calculate your total managed data by using the following figures:
For this example, you would calculate the space by using the following figures:
These estimates are based on the default status collection interval of 5 minutes. If you reduce the
collection interval from once every 5 minutes to once every 3 minutes, the space requirements
increase. The following examples show the approximate increase in the log space requirements with a
collection interval of once every 3 minutes for a configuration in which V8.1.2 or later spoke servers
are monitored:
• Hub server: In the range 39.6 GB - 66 GB
• Each spoke server: In the range 18 GB - 30 GB
Allocate archive log space so that you can support the Operations Center without affecting server
operations.
Software requirements
Documentation for the IBM Spectrum Protect tape-based solution includes installation and configuration
tasks for IBM AIX®, Linux, and Microsoft Windows operating systems. You must meet the minimum
software requirements that are listed.
For information about software requirements for IBM in tape device drivers, refer to the IBM Tape Device
Drivers Installation and User's Guide.
AIX systems
Gunzip utility The gunzip utility must be available on your system before you install or
upgrade the IBM Spectrum Protect server. Ensure that the gunzip utility is
installed and the path to it is set in the PATH environment variable.
Linux systems
File system type Format database-related file systems with ext3 or ext4.
For storage pool-related file systems, use XFS.
Windows systems
C:\tsminst1\TSMarchlog
C:\tsminst1\TSMdbspace0
0
C:\tsminst1\TSMdbspace0
1
C:\tsminst1\TSMdbspace0
2
C:\tsminst1\TSMdbspace0
3
Suggested storage group Preferred name to use for MDisks and MDisk groups.
and array names
Usage Server component that uses part of the physical disk.
Examples
Configuration examples for storage groups and volumes are available at the following link: Examples of
worksheets for planning storage arrays. The examples show how to plan the storage for different server
Table 6. Library types for an IBM Spectrum Protect 8.1.6 tape solution
Library type Description More information
SCSI A SCSI library is controlled through a SCSI interface, “Configuring libraries for
attached either directly to the server's host by using use by a server” on page
SCSI cabling or by a storage area network. A robot or 74
other mechanism automatically handles tape volume
Restrictions apply when
mounts and dismounts.
you mix different
If you create different drive types for a SCSI library, generations of media and
you create multiple logical libraries that cannot be split drives. For more
between different types of drives. A SCSI library can information, see:
contain drives of mixed technologies, including LTO
• “Mixing generations of
Ultrium and digital linear tape (DLT) drives. For
3592 drives and media in
example:
a single library” on page
• The Oracle StorageTek L700 library 82
• The IBM 3592 tape device • “Mixing LTO drives and
media in a library” on
page 79
Library sharing
You can optimize the efficiency of your tape solution by configuring library sharing. Library sharing allows
multiple IBM Spectrum Protect servers to use the same tape library and drives on a storage area network
(SAN) and to improve backup and recovery performance and tape hardware utilization.
When IBM Spectrum Protect servers share a library, one server is set up as the library manager and
controls library operations such as mount and dismount. The library manager also controls volume
ownership and the library inventory. Other servers are set up as library clients and use server-to-server
communications to contact the library manager and request resources.
Library clients must be at the same or an earlier version than the library manager server. A library
manager cannot support library clients that are at a later version. For more information, see Storage-
agent and library-client compatibility with an IBM Spectrum Protect server.
LAN-free data movement requires the installation of a storage agent on the client system. The server
maintains the database and recovery log, and acts as the library manager to control device operations.
The storage agent on the client handles the data transfer to the device on the SAN. This implementation
frees up bandwidth on the LAN that would otherwise be used for client data movement.
CENTERA — — — Yes
CENTERA 3
GENERICTAPE
ECARTRIDGE 4
Procedure
To plan the storage pool hierarchy, answer the following questions:
a. Which clients should back up data to disk, and which clients should back up data to tape?
An administrator manages 2 servers. Another person • System authority on both servers: 2 administrator
helps with the administration tasks. Two assistants IDs
are responsible for helping to ensure that important
• Operator authority: 2 administrator IDs for the
systems are backed up. Each assistant is responsible
assistants with access to the server that each
for monitoring the scheduled backups on one of the
person is responsible for
IBM Spectrum Protect servers.
Related tasks
Managing administrators
Table 10. Ports that are used by the server, client, and Operations Center
Item Default Direction Description
Base port 1500 Outbound/ Each server instance requires a unique port. You can
(TCPPORT) inbound specify an alternative port number. The TCPPORT
option listens for both TCP/IP and SSL-enabled
sessions from the client. You can use the
TCPADMINPORT option and
ADMINONCLIENTPORT option to set port values for
administrative client traffic.
SSL-only port No default Outbound/ This port is used if you want to restrict
(SSLTCPPORT inbound communication on the port to SSL-enabled sessions
) only. A server can support both SSL and non-SSL
communication by using the TCPPORT or
TCPADMINPORT options.
SMB 45 Inbound/ This port is used by configuration wizards that
outbound communicate by using native protocols with multiple
hosts.
Client Client port: Outbound The client listens on the port that is named and
schedule port 1501 communicates the port number to the server. The
server contacts the client if server prompted
scheduling is used. You can specify an alternative
port number in the client options file.
Long-running KEEPALIVE Outbound When the KEEPALIVE option is enabled, keepalive
sessions setting: YES packets are sent during client/server sessions to
prevent the firewall software from closing long-
running, inactive connections.
Operations HTTPS: 11090 Inbound These ports are used for the Operations Center web
Center browser. You can specify an alternative port number.
Client Client port: Inbound If you plan to use IBM Spectrum Protect client
management 9028 management services, the client management
service port service port must be accessible from the Operations
Center. Ensure that firewalls cannot prevent
connections. The client management service uses
the TCP port of the server for the client node for
authentication by using an administrative session.
Related information
Collecting diagnostic information with IBM Spectrum Protect client management services
ADMINONCLIENTPORT server option
DEFINE SERVER (Define a server for server-to-server communications)
TCPADMINPORT server option
TCPPORT server option
Tips:
• In the described solution, data is migrated from disk storage pools to tape storage pools. However,
instead of migrating the data, you can use the tiering-to-tape feature that was introduced in IBM
Spectrum Protect Version 8.1.8. With this feature, you can automatically tier data from directory-
container storage pools on disk to tape storage. You can specify that all data is tiered based on a
specified age threshold, or that only inactive data is tiered based on an age threshold. For more
information about tiering data to tape storage, see Tiering data to cloud or tape storage.
• The described solution does not include node replication. If you want to use node replication to back up
a storage pool from disk to disk, ensure that the replication operation is completed before data is
migrated from disk to tape. You can also use node replication to back up a storage pool on a local tape
device to a copy storage pool on a local tape device.
Implementation roadmap
The following steps are required to set up a tape-based solution.
1. Set up the system.
2. Install the server and the Operations Center.
3. Configure the server and the Operations Center.
4. Attach tape devices for the server.
5. Configure tape libraries for use by the server.
6. Set up a storage pool hierarchy.
Procedure
1. Provide a connection between the server and the storage devices by following these guidelines:
• Use a switch or direct connection for Fibre Channel connections.
• Consider the number of ports that are connected and account for the amount of bandwidth that is
needed.
• Consider the number of ports on the server and the number of host ports on the disk system that are
connected.
2. Verify that device drivers and firmware for the server system, adapters, and operating system are
current and at the recommended levels.
3. Configure storage arrays. Make sure that you planned properly to ensure optimal performance.
For more information, see “Planning for disk storage” on page 12.
4. Ensure that the server system has access to disk volumes that are created. Complete the following
steps:
a) If the system is connected to a Fibre Channel switch, zone the server to see the disks.
b) Map all of the volumes to tell the disk system that this specific server is allowed to see each disk.
5. Ensure that tape and disk devices use different Host Bus Adapter (HBA) ports. Control tape and disk
I/O by using the SAN. Use separate Fibre Channel ports for tape and disk I/O.
Related tasks
Configuring multipath I/O
Procedure
1. Install AIX Version 7.1, TL4, SP6, or later according to the manufacturer instructions.
2. Configure your TCP/IP settings according to the operating system installation instructions.
3. Open the /etc/hosts file and complete the following actions:
• Update the file to include the IP address and host name for the server. For example:
• Verify that the file contains an entry for localhost with an address of 127.0.0.1. For example:
127.0.0.1 localhost
chdev -l iocp0 -P
chtz=local_timezone,date/time,date/time
For example, if you lived in Tucson, Arizona, where Mountain Standard Time is used, you would issue
the following command to change to the POSIX format:
chtz MST7MDT,M3.2.0/2:00:00,M11.1.0/2:00:00
6. In the .profile file of the instance user, verify that the following environment variable is set:
export MALLOCOPTIONS=multiheap:16
In later versions of the IBM Spectrum Protect server, this value is set automatically when the server
is started. If the instance user is not available, complete this step later, when the instance user
becomes available.
7. Set the system to create full application core files. Issue the following command:
8. For communications with the server and Operations Center, make sure that the following ports are
open on any firewalls that might exist:
• For communications with the server, open port 1500.
• For secure communications with the Operations Center, open port 11090 on the hub server.
If you are not using the default port values, make sure that the ports that you are using are open.
9. Enable TCP high-performance enhancements. Issue the following command:
10. For optimal throughput and reliability, bond two 10 Gb Ethernet ports together for a medium system
and four 10 Gb Ethernet ports for a large system. Use the System Management Interface Tool (SMIT)
to bond the ports together by using Etherchannel.
The following settings were used during testing:
mode 8023ad
auto_recovery yes Enable automatic recovery after failover
backup_adapter NONE Adapter used when whole channel fails
hash_mode src_dst_port Determines how outgoing adapter is chosen
interval long Determines interval value for IEEE
802.3ad mode
mode 8023ad EtherChannel mode of operation
netaddr 0 Address to ping
noloss_failover yes Enable lossless failover after ping
failure
num_retries 3 Times to retry ping before failing
retry_time 1 Wait time (in seconds) between pings
use_alt_addr no Enable Alternate EtherChannel Address
use_jumbo_frame no Enable Gigabit Ethernet Jumbo Frames
11. Verify that user process resource limits, also known as ulimits, are set according to guidelines in
Table 11 on page 30. If ulimit values are not set correctly, you might experience server instability or
a failure of the server to respond.
If you need to modify any user limit values, follow the instructions in the documentation for your
operating system.
Procedure
1. Install Red Hat Enterprise Linux Version 7.4 or later, according to the manufacturer instructions.
[root@tvapp02]# df –h
Filesystem Size Used Avail Use% Mounted on
/dev/mapper/rhel-root 50G 3.0G 48G 6% /
devtmpfs 32G 0 32G 0% /dev
tmpfs 32G 92K 32G 1% /dev/shm
tmpfs 32G 8.8M 32G 1% /run
tmpfs 32G 0 32G 0% /sys/fs/cgroup
/dev/mapper/rhel-home 220G 37M 220G 1% /home
/dev/sda1 497M 124M 373M 25% /boot
2. Configure your TCP/IP settings according to the operating system installation instructions.
For optimal throughput and reliability, consider bonding multiple network ports together. Bond two
ports for a medium system and four ports for a large system. This can be accomplished by creating a
Link Aggregation Control Protocol (LACP) network connection, which aggregates several subordinate
ports into a single logical connection. The preferred method is to use a bond mode of 802.3ad, miimon
setting of 100, and a xmit_hash_policy setting of layer3+4.
Restriction: To use an LACP network connection, you must have a network switch that supports LACP.
For additional instructions about configuring bonded network connections with Red Hat Enterprise
Linux Version 7, see Create a Channel Bonding Interface.
3. Open the /etc/hosts file and complete the following actions:
• Update the file to include the IP address and host name for the server. For example:
• Verify that the file contains an entry for localhost with an address of 127.0.0.1. For example:
127.0.0.1 localhost
4. Install components that are required for the server installation. Complete the following steps to create
a Yellowdog Updater Modified (YUM) repository and install the prerequisite packages.
a) Mount your Red Hat Enterprise Linux installation DVD to a system directory. For example, to mount
it to the /mnt directory, issue the following command:
cd /etc/yum/repos.d
ls rhel-source.repo
mv rhel-source.repo rhel-source.repo.orig
vi rhel74_dvd.repo
g) Add the following lines to the new repo file. The baseurl parameter specifies your directory mount
point:
[rhel74_dvd]
name=DVD Redhat Enterprise Linux 7.4
baseurl=file:///mnt
enabled=1
gpgcheck=0
unmount /mnt
cd /etc/yum/repos.d
mv rhel74_dvd.repo rhel74_dvd.repo.orig
mv rhel-source.repo.orig rhel-source.repo
6. Determine whether kernel parameter changes are required. Complete the following steps:
a) Use the sysctl -a command to list the parameter values.
b) Analyze the results by using the guidelines in Table 12 on page 33 to determine whether any
changes are required.
c) If changes are required, set the parameters in the /etc/sysctl.conf file.
The file changes are applied when the system is started.
(SEMOPM)
The maximum operations per semaphore call.
(SEMMNI)
The maximum number of arrays.
# firewall-cmd --get-active-zones
public
interfaces: ens4f0
b) To use the default port address for communications with the server, open TCP/IP port 1500 in the
Linux firewall.
If you want to use a value other than the default, you can specify a number in the range 1024 -
32767. If you open a port other than the default, you will need to specify that port when you run
the configuration script.
c) If you plan to use this system as a hub, open port 11090, which is the default port for secure (https)
communications.
Issue the following command:
firewall-cmd --reload
8. Verify that user process resource limits, also known as ulimits, are set according to guidelines in Table
13 on page 34. If ulimit values are not set correctly, you might experience server instability or a
failure of the server to respond.
If you need to modify any user limit values, follow the instructions in the documentation for your
operating system.
Procedure
1. Install Windows Server 2016 Standard Edition, according to the manufacturer instructions.
2. Change the Windows account control policies by completing the following steps.
a) Open the Local Security Policy editor by running secpol.msc.
b) Click Local Policies > Security Options and ensure that the following User Account Control policies
are disabled:
6. On the Operations Center hub server, open the default port for secure (https) communications with the
Operations Center.
The port number is 11090.
For example, issue the following command:
AIX systems
Complete the following steps to enable and configure multipathing for disk storage.
Procedure
1. Determine the Fibre Channel port address that you must use for the host definition on the disk
subsystem. Issue the lscfg command for every port.
• On small and medium systems, issue the following commands:
cfgmgr
lsdev -Ccdisk
5. Use the output from the lsdev command to identify and list device IDs for each disk device.
For example, a device ID could be hdisk4. Save the list of device IDs to use when you create file
systems for the IBM Spectrum Protect server.
6. Correlate the SCSI device IDs to specific disk LUNs from the disk system by listing detailed information
about all physical volumes in the system. Issue the following command:
lspv -u
On an IBM Storwize system, the following information is an example of what is shown for each device:
bootinfo -s hdisk4
Linux systems
Complete the following steps to enable and configure multipathing for disk storage.
Procedure
1. Edit the /etc/multipath.conf file to enable multipathing for Linux hosts.
If the multipath.conf file does not exist, you can create it by issuing the following command:
mpathconf --enable
The following parameters were set in multipath.conf for testing on an IBM Storwize system:
defaults {
user_friendly_names no
}
devices {
device {
vendor "IBM "
product "2145"
path_grouping_policy group_by_prio
user_friendly_names no
path_selector "round-robin 0"
prio "alua"
path_checker "tur"
failback "immediate"
no_path_retry 5
rr_weight uniform
rr_min_io_rq "1"
dev_loss_tmo 120
}
}
3. To verify that disks are visible to the operating system and are managed by multipath, issue the
following command:
multipath -l
4. Ensure that each device is listed and that it has as many paths as you expect. You can use size and
device ID information to identify which disks are listed.
For example, the following output shows that a 2 TB disk has two path groups and four active paths.
The 2 TB size confirms that the disk corresponds to a pool file system. Use part of the long device ID
number (12, in this example) to search for the volume on the disk-system management interface.
a) If needed, correct disk LUN host assignments and force a bus rescan.
For example:
You can also restart the system to rescan disk LUN host assignments.
b) Confirm that disks are now available for multipath I/O by reissuing the multipath -l command.
5. Use the multipath output to identify and list device IDs for each disk device.
For example, the device ID for your 2 TB disk is 36005076802810c509800000000000012.
Save the list of device IDs to use in the next step.
Windows systems
Complete the following steps to enable and configure multipathing for disk storage.
Procedure
1. Ensure that the Multipath I/O feature is installed. If needed, install additional vendor-specific
multipath drivers.
2. To verify that disks are visible to the operating system and are managed by multipath I/O, issue the
following command:
3. Review the multipath output and ensure that each device is listed and that it has as many paths as you
expect. You can use size and device serial information to identify which disks are listed.
For example, by using part of the long device serial number (34, in this example) you can search for
the volume on the disk-system management interface. The 2 TB size confirms that the disk
corresponds to a storage pool file system.
4. Create a list of disk device IDs by using the serial numbers that are returned from the multipath output
in the previous step.
For example, the device ID for your 2 TB disk is 60050763008101057800000000000034
Save the list of device IDs to use in the next step.
5. To bring new disks online and clear the read-only attribute, run diskpart.exe with the following
commands. Repeat for each of the disks:
diskpart
select Disk 1
online disk
attribute disk clear readonly
select Disk 2
online disk
attribute disk clear readonly
< ... >
select Disk 49
online disk
attribute disk clear readonly
exit
Procedure
1. Use operating system commands to create a user ID.
• Create a group and user ID in the home directory of the user that owns the
server instance.
For example, to create the user ID tsminst1 in group tsmsrvrs with a password of tsminst1,
issue the following commands from an administrative user ID:
groupadd tsmsrvrs
useradd -d /home/tsminst1 -m -g tsmsrvrs -s /bin/bash tsminst1
passwd tsminst1
Log off, and then log in to your system. Change to the user account that you created. Use an
interactive login program, such as telnet, so that you are prompted for the password and can
change it if necessary.
After you create and verify a password for the new user, add the user ID to the Administrators
group by issuing the following commands:
AIX systems
You must create volume groups, logical volumes, and file systems for the server by using the AIX Logical
Volume Manager.
Procedure
1. Increase the queue depth and maximum transfer size for all of the available hdiskX disks. Issue the
following commands for each disk:
Do not run these commands for operating system internal disks, for example, hdisk0.
2. Create volume groups for the IBM Spectrum Protect database, active log, archive log, database
backup, and storage pool. Issue the mkvg command, specifying the device IDs for corresponding disks
that you previously identified.
For example, if the device names hdisk4, hdisk5, and hdisk6 correspond to database disks, include
them in the database volume group and so on.
System size: The following commands are based on the medium system configuration. For small and
large systems, you must adjust the syntax as required.
3. Determine the physical volume names and the number of free physical partitions to use when you
create logical volumes. Issue the lsvg for each volume group that you created in the previous step.
For example:
lsvg -p tsmdb
The output is similar to the following. The FREE PPs column represents the free physical partitions:
tsmdb:
PV_NAME PV STATE TOTAL PPs FREE PPs FREE DISTRIBUTION
hdisk4 active 1631 1631 327..326..326..326..326
hdisk5 active 1631 1631 327..326..326..326..326
hdisk6 active 1631 1631 327..326..326..326..326
5. Format file systems in each logical volume by using the crfs command.
For example, to format file systems for the database on a medium system, issue the following
commands:
6. Mount all of the newly created file systems by issuing the following command:
mount -a
tapsrv07> df -g /tsminst1/*
Filesystem GB blocks Free %Used Iused %Iused Mounted on
/dev/tsmact00 195.12 194.59 1% 4 1% /tsminst1/TSMalog
8. Verify that the user ID that you created in “Creating the user ID for the server” on page 38 has read
and write access to the directories for the server.
Linux systems
You must format ext4 or xfs file systems on each of the disk LUNs to be used by the IBM Spectrum
Protect server.
Procedure
1. Using the list of device IDs that you generated previously, issue the mkfs command to create and
format a file system for each storage LUN device. Specify the device ID in the command. See the
following examples.
For the database, format ext4 file systems:
You might issue the mkfs command as many as 50 times, depending on how many different devices
you have.
2. Create mount point directories for file systems.
Issue the mkdir command for each directory that you must create. Use the directory values that you
recorded in the planning worksheets.
mkdir /tsminst1
4. Mount the file systems that you added to the /etc/fstab file by issuing the mount -a command.
5. List all file systems by issuing the df command.
Verify that file systems are mounted at the correct LUN and correct mount point. Also, verify the
available space.
The following example on an IBM Storwize system shows that the amount of used space is typically
1%:
6. Verify that the user ID that you created in “Creating the user ID for the server” on page 38 has read
and write access to the directories for the IBM Spectrum Protect server.
Windows systems
You must format New Technology File System (NTFS) file systems on each of the disk LUNs to be used by
the IBM Spectrum Protect server.
Procedure
1. Create mount point directories for file systems.
Issue the md command for each directory that you must create. Use the directory values that you
recorded in the planning worksheets. For example, to create the server instance directory by using the
default value, issue the following command:
md c:\tsminst1
\\?\Volume{8ffb9678-3216-474c-a021-20e420816a92}\
C:\tsminst1\TSMdbspace00\
What to do next
You can confirm the amount of free space for each volume by using Windows Explorer.
Procedure
1.
Verify that the required RPM files are installed on your system.
See “Installing prerequisite RPM files for the graphical wizard” on page 43 for details.
2. Before you download the installation package, verify that you have enough space to store the
installation files when they are extracted from the product package.
For space requirements, see the download document at technote 4042992.
3. Go to Passport Advantage® and download the package file to an empty directory of your choice.
4. Ensure that executable permission is set for the package. If necessary, change the file permissions by
issuing the following command:
./package_name.bin
lsuser
./install.sh
When you select the packages to install, choose both the server and Operations Center.
Procedure
1. Verify that the following files are installed on your system. If the files are not installed, go to Step 2.
atk-1.12.3-2.aix5.2.ppc.rpm libpng-1.2.32-2.aix5.2.ppc.rpm
cairo-1.8.8-1.aix5.2.ppc.rpm libtiff-3.8.2-1.aix5.2.ppc.rpm
expat-2.0.1-1.aix5.2.ppc.rpm pango-1.14.5-4.aix5.2.ppc.rpm
fontconfig-2.4.2-1.aix5.2.ppc.rpm pixman-0.12.0-3.aix5.2.ppc.rpm
freetype2-2.3.9-1.aix5.2.ppc.rpm xcursor-1.1.7-3.aix5.2.ppc.rpm
gettext-0.10.40-6.aix5.1.ppc.rpm xft-2.1.6-5.aix5.1.ppc.rpm
glib2-2.12.4-2.aix5.2.ppc.rpm xrender-0.9.1-3.aix5.2.ppc.rpm
gtk2-2.10.6-4.aix5.2.ppc.rpm zlib-1.2.3-3.aix5.1.ppc.rpm
libjpeg-6b-6.aix5.1.ppc.rpm
2. Ensure that there is at least 150 MB of free space in the /opt file system.
3. From the directory where the installation package file is extracted, go to the gtk directory.
4. Download the RPM files to the current working directory from the IBM AIX Toolbox for Linux
Applications website by issuing the following command:
download-prerequisites.sh
5. From the directory that contains the RPM files that you downloaded, install them by issuing the
following command:
Procedure
1. Before you download the installation package, verify that you have enough space to store the
installation files when they are extracted from the product package.
For space requirements, see the download document at technote 4042993.
2. Go to Passport Advantage and download the package file to an empty directory of your choice.
3. Change to the directory where you placed the executable file.
4. Double-click the executable file to extract to the current directory.
What to do next
• If errors occur during the installation process, the errors are recorded in log files that are stored in the
IBM Installation Manager logs directory.
To view installation log files from the Installation Manager tool, click File > View Log. To collect these
log files from the Installation Manager tool, click Help > Export Data for Problem Analysis.
• After you install the server and before you customize it for your use, go to the support site. Click
Support and downloads and apply any applicable fixes.
• The system where you installed IBM Spectrum Protect must have the X Window System client. You
must also be running an X Window System server on your desktop.
• The system must have the Secure Shell (SSH) protocol enabled. Ensure that the port is set to the
default value, 22, and that the port is not blocked by a firewall. You must enable password
authentication in the sshd_config file in the /etc/ssh/ directory. Also, ensure that the SSH
daemon service has access rights to connect to the system by using the localhost value.
• You must be able to log in to IBM Spectrum Protect with the user ID that you created for the server
instance, by using the SSH protocol. When you use the wizard, you must provide this user ID and
password to access that system.
• If you changed any settings in the preceding steps, restart the server before you proceed with the
configuration wizard.
Verify that the remote registry service is started by completing the following steps:
1. Click Start > Administrative Tools > Services. In the Services window, select Remote Registry. If it
is not started, click Start.
2. Ensure that port 137, 139, and 445 are not blocked by a firewall:
a. Click Start > Control Panel > Windows Firewall.
b. Select Advanced Settings.
c. Select Inbound Rules.
d. Select New Rule.
e. Create a port rule for TCP ports 137, 139, and 445 to allow connections for domain and private
networks.
Procedure
1. Start the local version of the wizard.
• Open the dsmicfgx program in the /opt/tivoli/tsm/server/bin
directory. This wizard can be only run as a root user.
• Click Start > All Programs > IBM Spectrum Protect > Configuration Wizard.
2. Follow the instructions to complete the configuration.
Use the information that you recorded in “Planning worksheets” on page 8 during IBM Spectrum
Protect system setup to specify directories and options in the wizard.
On the Server Information window, set the server to start automatically by using
the instance user ID when the system boots.
By using the configuration wizard, the server is set to start automatically when rebooted.
Procedure
• To install the backup-archive client, follow the installation instructions for your operating system.
– Install UNIX and Linux backup-archive clients
– Installing the Windows client for the first time
Procedure
1. Go to the server instance directory and open the dsmserv.opt file.
Update server option settings if necessary, to match the values in the table. To make updates, close
the dsmserv.opt file and use the SETOPT command from the administrative command-line interface
to set the options.
For example, to update the IDLETIMEOUT option to 60, issue the following command:
setopt idletimeout 60
3. To configure secure communications for the server, clients, and the Operations Center, verify the
options in the following table.
If any of the option values must be updated, edit the dsmserv.opt file by using the following
guidelines:
• Remove the asterisk at the beginning of a line to enable an option.
• On each line, enter only one option and the specified value for the option.
• If an option occurs in multiple entries in the file, the server uses the last entry.
Security concepts
You can protect IBM Spectrum Protect from security risks by using communication protocols, securing
passwords, and providing different access levels for administrators.
Authority levels
With each IBM Spectrum Protect server, different administrative authority levels are available that
determine the tasks that an administrator can complete.
After registration, an administrator must be granted authority by being assigned one or more
administrative authority levels. An administrator with system authority can complete any task with the
server and assign authority levels to other administrators by using the GRANT AUTHORITY command.
Administrators with policy, storage, or operator authority can complete subsets of tasks.
An administrator can register other administrator IDs, grant levels of authority to them, rename IDs,
remove IDs, and lock and unlock them from the server.
An administrator can control access to specific client nodes for root user IDs and non-root user IDs. By
default, a non-root user ID cannot back up data on the node. Use the UPDATE NODE command to change
the node settings to enable backup.
Passwords
By default, the server automatically uses password authentication. With password authentication, all
users must enter a password when they access the server.
Use Lightweight Directory Access Protocol (LDAP) to apply stricter requirements for passwords. For more
information, see Managing passwords and log on procedures (V7.1.1).
Invalid password attempts You can set a limit on consecutive invalid password
attempts for all client nodes. When the limit is
exceeded, the server locks the node.
Default password length 8 characters.
The administrator can specify a minimum length.
Beginning with Version 8.1.4, the default minimum
length for server passwords changed from 0 to 8
characters.
Session security
Session security is the level of security that is used for communication among IBM Spectrum Protect
client nodes, administrative clients, and servers and is set by using the SESSIONSECURITY parameter.
The SESSIONSECURITY parameter can be set to one of the following values:
• The STRICT value enforces the highest level of security for communication between IBM Spectrum
Protect servers, nodes, and administrators.
• The TRANSITIONAL value specifies that the existing communication protocol is used while you update
your IBM Spectrum Protect software to V8.1.2 or later. This is the default. When
SESSIONSECURITY=TRANSITIONAL, stricter security settings are automatically enforced as higher
versions of the TLS protocol are used and as the software is updated to V8.1.2 or later. After a node,
administrator, or server meets the requirements for the STRICT value, session security is automatically
updated to the STRICT value, and the entity can no longer authenticate by using a previous version of
the client or earlier TLS protocols.
Note: You are not required to update backup-archive clients to V8.1.2 or later before you upgrade
servers. After you upgrade a server to V8.1.2 or later, nodes and administrators that are using earlier
versions of the software will continue to communicate with the server by using the TRANSITIONAL
value until the entity meets the requirements for the STRICT value. Similarly, you can upgrade backup-
archive clients to V8.1.2 or later before you upgrade your IBM Spectrum Protect servers, but you are not
required to upgrade servers first. Communication between servers and clients is not interrupted.
For more information about the SESSIONSECURITY parameter values, see the following commands.
Administrators that authenticate by using the DSMADMC command, DSMC command, or dsm program
cannot authenticate by using an earlier version after authenticating by using V8.1.2 or later. To resolve
authentication issues for administrators, see the following tips:
Tips:
• Ensure that all IBM Spectrum Protect software that the administrator account uses to log on is
upgraded to V8.1.2 or later. If an administrator account logs on from multiple systems, ensure that the
server's certificate is installed on each system.
• After an administrator successfully authenticates with the server by using V8.1.2 or later software or
V7.1.8 or later software, the administrator can no longer authenticate with that server using client or
server versions earlier than V8.1.2 or V7.1.8. An administrator command can be issued from any
system.
• If necessary, create a separate administrator account to use only with clients and servers that are using
V8.1.1 or earlier software.
Enforce the highest level of security for communication with the IBM Spectrum Protect server by ensuring
that all nodes, administrators, and servers use STRICT session security. You can use the SELECT
command to determine which servers, nodes, and administrators are using TRANSITIONAL session
security and should be updated to use STRICT session security.
Related information
Securing communications
When you updated the server options file in “Setting options for the server” on page 45, the SSLTLS12
and SSLDISABLELEGACYTLS server options were set to restrict secure communications to use TLS 1.2.
This setting prevents the use of previous TLS protocol levels, which are less secure.
Procedure
1. Designate the hub server.
In a web browser, enter the following address:
https://hostname:secure_port/oc
where:
• hostname represents the name of the computer where the Operations Center is installed
• secure_port represents the port number that the Operations Center uses for HTTPS communication
on that computer
For example, if your host name is tsm.storage.mylocation.com and you are using the default secure
port for the Operations Center, which is 11090, the address is:
https://tsm.storage.mylocation.com:11090/oc
When you log in to the Operations Center for the first time, a wizard guides you through an initial
configuration to set up a new administrator with system authority on the server.
2. Set up secure communications between the Operations Center and the hub server by configuring the
Secure Sockets Layer (SSL) protocol.
Follow the instructions in “Securing communications between the Operations Center and the hub
server” on page 50.
3. Optional: To receive a daily email report that summarizes system status, configure your email settings
in the Operations Center.
Follow the instructions in “Tracking system status by using email reports” on page 138.
Securing communications between the Operations Center and the hub server
To secure communications between the Operations Center and the hub server, add the Transport Layer
Security (TLS) certificate of the hub server to the truststore file of the Operations Center.
Procedure
To set up SSL communication by using self-signed certificates, complete the following steps.
1. Specify the cert256.arm certificate as the default certificate in the key database file of the hub
server:
a) Issue the following command from the hub server instance directory:
b) Restart the hub server so that it can receive the changes to the key database file.
c) Verify that the cert256.arm certificate is set as the default. Issue the following command:
ikeyman
Procedure
Register a license by specifying the name of the enrollment certificate file that contains the license. To
use the Operations Center command builder for this task, complete the following steps.
1. Open the Operations Center.
2. Open the Operations Center command builder by hovering over the settings icon and clicking
Command Builder.
3. Issue the REGISTER LICENSE command.
For example, to register a base IBM Spectrum Protect license, issue the following command:
What to do next
Save the installation media that contains your enrollment certificate files. You might need to register your
license again if, for example, one of the following conditions occur:
• The server is moved to a different computer.
Procedure
1. On the Services page of the Operations Center, select the STANDARD domain and click Details.
2. On the Summary page for the policy domain, click the Policy Sets tab.
The Policy Sets page indicates the name of the active policy set and lists all of the management
classes for that policy set.
3. Click the Configure toggle, and make the following changes:
• Change the backup destination for the STANDARD management class to the directory-container
storage pool.
• Change the value for the Backups column to No limit.
• Change the retention period. Set the Keep Extra Backups column to 30 days or more, depending on
your business requirements.
4. Save your changes and click the Configure toggle again so that the policy set is no longer editable.
5. Activate the policy set by clicking Activate.
The following table shows how you can schedule server maintenance processes in combination with the
client backup schedule for a tape solution.
Operation Schedule
Client backup Starts at 11 PM.
Storage pool backup Starts at 6 AM.
Processing for database and • The database backup operation starts at 10 AM, or 11 hours after
disaster recovery files the beginning of the client backup operation. This process runs until
completion.
• Device configuration information and volume history backup
operations start at 5 PM, or 7 hours after the start of the database
backup operation.
• Volume history deletion starts at 8 PM, or 10 hours after the start of
the database backup operation.
Preparation of files for offsite Starts at 10 AM, at the same time as processing for the database and
vaulting disaster recovery files.
Migration from disk to tape Starts at 12 PM, or 2 hours after the start of the database backup
operation.
Inventory expiration Starts at 2 PM, or 15 hours after the beginning of the client backup
operation. This process runs until completion.
Procedure
After you configure the device class for the database backup operations, create schedules for database
backup and other required maintenance operations by using the DEFINE SCHEDULE command.
Depending on the size of your environment, you might need to adjust the start times for each schedule in
the example.
1. Define a device class for the backup operation before you create the schedule for database backups.
Use the DEFINE DEVCLASS command to create a device class that is named LTOTAPE:
2. Set the device class for automatic database backups. Use the SET DBRECOVERY command to specify
the device class that you created for the database backup in the preceding step.
For example, if the device class is LTOTAPE, issue the following command:
3. Create schedules for the maintenance operations by using the DEFINE SCHEDULE command. See the
following table for the required operations with examples of the commands.
Replicate nodes. Optionally, use node replication to protect client data by backing the
data up to a secondary server. For instructions, see Replicating client
data to another server. Ensure that node replication is completed before
migration operations begin.
Prepare files for offsite vaulting. a. Move tape volumes offsite by following the instructions in “Moving
backup media” on page 58.
b. Create the disaster recovery plan file by issuing the PREPARE
command on the source server:
prepare
c. Ensure that all volumes that are required for disaster recovery are
included in the recovery plan file. For more information, see Chapter
10, “Preparing for and recovering from a disaster by using DRM,” on
page 205.
Back up the device configuration Create a schedule to run the BACKUP DEVCONFIG command:
information.
define schedule DEVCONFIGBKUP type=admin cmd="backup devconfig
filenames=devconfig.dat" active=yes desc="Backup the device
configuration file." startdate=today starttime=17:00:00
duration=45 durunits=minutes
Back up the volume history. Create a schedule to run the BACKUP VOLHISTORY command:
Remove objects that exceed their Create a schedule to run the EXPIRE INVENTORY command.
allowed retention.
Set the RESOURCE parameter based on the system size that you are
configuring to be equal to the number of processor cores that you
specified for your system.
For example, issue the following command to create a schedule that is
named EXPINVENTORY:
What to do next
After you create schedules for the server maintenance tasks, you can view them in the Operations Center
by completing the following steps:
1. On the Operations Center menu bar, hover over Servers.
2. Click Maintenance.
Related information
UPDATE STGPOOL (Update a storage pool)
DEFINE SCHEDULE (Define a schedule for an administrative command)
DEFINE STGPOOL (Define a volume in a storage pool)
Procedure
1. Identify the copy storage pool and database backup volumes to be moved offsite by issuing the QUERY
DRMEDIA command:
2. Indicate the movement of volumes whose current state is MOUNTABLE by issuing the MOVE DRMEDIA
command:
For all volumes in the MOUNTABLE state, DRM completes the following tasks:
• Updates the volume state to NOTMOUNTABLE and updates the volume location if you issued the
SET DRMNOTMOUNTABLENAME command. If you did not issue the command, the default location is
NOTMOUNTABLE.
• Updates the access mode to unavailable for a copy storage pool volume.
• Checks volumes out of automated libraries.
a) During check-out processing, SCSI libraries request operator intervention. Bypass these requests
and eject the cartridges from the library by issuing the following command:
b) Access a list of the volumes to identify and remove the cartridges from the library by issuing the
following command:
For all volumes in the NOTMOUNTABLE state, DRM updates the volume state to COURIER and the
volume location according to the SET DRMCOURIERNAME command. If you did not issue the SET
command, the default location is COURIER.
5. When the vault location confirms receipt of the volumes, issue the MOVE DRMEDIA command to
specify the COURIER state:
For all volumes in the COURIER state, DRM updates the volume state to VAULT and the volume
location according to the SET DRMVAULTNAME command. If you did not issue the SET command, the
default location is VAULT.
6. Display a list of volumes that contain valid data at the vault by issuing the following command:
7. Avoid going through all the different volume states by using MOVE DRMEDIA command and specifying
the TOSTATE parameter to name the destination state. To change the volumes from NOTMOUNTABLE
state to VAULT state, issue the following command:
For all volumes in the NOTMOUNTABLE state, DRM updates the volume state to VAULT and the volume
location according to the SET DRMVAULTNAME command. If the SET command is not yet issued, the
default location is VAULT.
Procedure
1. Specify the number of days before a database backup series is expired by issuing the SET
DRMDBBACKUPEXPIREDAYS command.
For example, to set the number of days to 30, issue the following command:
set drmdbbackupexpiredays 30
Tip: Issue the DEFINE STGPOOL command and specify the same value for the REUSEDELAY
parameter in your copy storage pool definition to ensure that the following occurs:
• Database can be returned to an earlier level.
• Database references to files in the copy storage pool are still valid.
If copy storage pools that are managed by DRM have different REUSEDELAY values, issue the SET
DRMDBBACKUPEXPIREDAYS command and set the REUSEDELAY parameter to the highest value.
2. Identify all volumes at the offsite vault that no longer contain valid data and can be returned to onsite.
Issue the following QUERY DRMEDIA command and specify the WHERESTATE=VAULTRETRIEVE
parameter.
3. To start the process of moving a copy storage pool, issue the following command:
The server completes the following actions for all volumes in the COURIERRETRIEVE state:
• Moves the volumes onsite where they can be reused or disposed of.
• Deletes the database backup volumes from the volume history table.
• Deletes the record in the database for scratch copy storage pool volumes. For private copy storage
pool volumes, updates the access to read⁄write.
5. Specify the destination of the volumes by issuing the MOVE DRMEDIA command with the TOSTATE
parameter.
For example, to move the volumes from VAULTRETRIEVE state to ONSITERETRIEVE state, issue the
following command:
The server completes the following actions for all volumes with in the VAULTRETRIEVE state:
• Moves the volumes onsite where they can be reused or disposed of.
• Deletes the database backup volumes from the volume history table.
• Deletes the record in the database for scratch copy storage pool volumes. For private copy storage
pool volumes, updates the access to read⁄write.
Procedure
1. On the Operations Center menu bar, hover over Clients.
2. Click Schedules.
3. Click +Schedule.
4. Complete the steps in the Create Schedule wizard.
Set client backup schedules to start at 22:00, based on the server maintenance activities that you
scheduled in “Defining schedules for server maintenance activities” on page 53.
Procedure
To use the Fibre Channel (FC) adapter, complete the following steps:
1. Install the FC adapter and associated drivers.
2. Install the appropriate device drivers for attached medium changer devices.
Related concepts
Selecting a tape device driver
To use tape devices with IBM Spectrum Protect you must install the appropriate tape device driver.
Procedure
1. Refer to the documentation for your tape device to determine how to set the library mode.
2. Set the mode to the appropriate mode for your tape device. For most tape devices, the appropriate
mode is called the RANDOM mode. If your tape device does not have a RANDOM mode, consult the
documentation for your device to identify the appropriate mode.
For the most up-to-date list of devices and operating-system levels that are supported by IBM tape
device drivers, see the IBM Spectrum Protect Supported Devices website at Supported devices for AIX
and Windows.
For the most up-to-date list of tape devices and operating-system levels that are supported by IBM tape
device drivers, see the IBM Spectrum Protect Supported Devices website at Supported devices for Linux.
IBM tape device drivers support only some Linux kernel levels. For information about supported kernel
levels, see the Fix Central website.
You can use the generic SCSI tape device driver that is provided by the IBM AIX operating system to work
with tape devices that are not supported by the IBM Spectrum Protect device driver. If the AIX generic
SCSI tape device driver is used, the GENERICTAPE device class must be set to the device type that is
specified in the DEFINE DEVCLASS command.
For the following tape devices, you can choose whether to install the IBM Spectrum Protect tape device
driver or the native device driver for your operating system:
ECART
LTO (not from IBM)
All SCSI-attached libraries that contain tape drives from the list must use the IBM Spectrum Protect
changer driver.
Tape device drivers that are acquired from other hardware vendors can be used if they are associated
with the GENERICTAPE device class. Generic device drivers are not supported in write-one read-many
(WORM) device classes.
When a device is configured successfully, a logical file name is returned. Table 16 on page 63 specifies
the name of the device, also called a special file name, that corresponds to the drive or library. You can
use the SMIT operating system command to get the device special file name. In the examples, x specifies
an integer, 0 or greater.
When a device is configured successfully, a logical file name is returned. Table 17 on page 64 specifies
the name of the device, also called the special file name, that corresponds to the drive or library. In the
examples, x specifies an integer, 0 or greater.
When a device is configured successfully, a logical file name is returned. Table 18 on page 64 specifies
the name of the device, also called the special file name, that corresponds to the drive or library. In the
examples, a, b, c, d, and x specify an integer, 0 or greater, where:
• a specifies the target ID.
• b specifies the LUN.
• c specifies the SCSI bus ID.
• d specifies the port ID.
rmtx Available
or
smcx Available
Note the value of x, which is assigned by the IBM tape device driver. To determine the special file name of
your device, issue one of the following commands:
• For tape drives, ls -l /dev/rmt*
• For tape libraries, ls -l /dev/smc*
The file name might have more characters at the end to indicate different operating characteristics, but
these characters are not needed by IBM Spectrum Protect. For IBM device drivers, use the base file name
in the DEVICE parameter of the DEFINE PATH command to assign a device to a drive (/dev/rmtx) or a
library (/dev/smcx).
After you install the device driver, you can use the System Management Interface Tool (SMIT) to
configure non-IBM tape drives and tape libraries. Complete the following steps:
1. Run the SMIT program.
2. Click Devices.
3. Click IBM Spectrum Protect Devices.
4. Click Fibre Channel SAN Attached devices.
5. Click Discover Devices Supported by IBM Spectrum Protect. Wait for the discovery process to be
completed.
6. Go back to the Fibre Channel SAN Attached devices menu, and click List Attributes of a Discovered
Device.
After you complete the installation procedure in the IBM Tape Device Drivers Installation and
User's Guide, different messages are issued, depending on the device driver that you are installing. If you
are installing the device driver for an IBM LTO or 3592 device, the following messages are returned:
IBMtapex Available
or
IBMChangerx Available
Note the value of x, which is assigned by the IBM tape device driver. To determine the special file name of
your device, issue one of the following commands:
• For tape drives, ls -l /dev/IBMtape*
• For tape libraries, ls -l /dev/IBMChange*
The file name might have more characters at the end to indicate different operating characteristics, but
these characters are not needed by IBM Spectrum Protect. For IBM device drivers, use the base file name
in the DEVICE parameter of the DEFINE PATH command to assign a device to a drive (/dev/IBMtapex)
or a library (/dev/IBMChangerx).
tsmdlst
Related concepts
Multipath I/O access with IBM tape devices
Multipath I/O is a technique that uses different paths to access the same physical device, for example
through multiple host bus adapters (HBA) or switches. The use of the multipath technique helps to ensure
that a single point of failure does not occur.
On AIX, multipath I/O is not enabled automatically when the IBM tape device driver is installed. You must
configure it for each logical device after installation. Multipath I/O remains enabled until the device is
deleted or the support is unconfigured. For configuration instructions, see the IBM Tape Device Drivers
Installation and User's Guide.
rmt0 Available 20-60-01-PRI IBM 3590 Tape Drive and Medium Changer (FCP)
rmt1 Available 30-68-01-ALT IBM 3590 Tape Drive and Medium Changer (FCP)
In this example, the following paths are associated with the IBM 3590 tape drive:
• 20-60-01-PRI
• 30-68-01-ALT
The name of the special file that is associated with the primary path is /dev/rmt0. Specify /dev/rmt0
as the value of the DEVICE parameter in the DEFINE PATH command.
To display path-related details about a particular tape drive, you can also use the itdt -f /dev/rmtx
path command, where x is the number of the configured tape drive. To display path-related details about
a particular medium changer, use the itdt -f /dev/smcy path command, where y is the number of
the configured medium changer.
On Linux, multipath I/O for medium changers and tape drives is not enabled automatically when the
device driver is installed. For instructions about configuring multipath I/O, see the IBM Tape Device
Drivers Installation and User's Guide.
When multipath I/O is enabled for a logical device, it remains enabled until the device is deleted or the
support is unconfigured.
To display the names of special file for IBM tape drives and medium changers, use the ls -l /dev/
IBMx, where x is the index number of the device. You can also enter the cat /proc/scsi/IBMtape
command for tape drives. As shown in the IBMtape file, primary paths and alternate paths are identified
as Primary or Alternate:
The name of the special file that is associated with the primary path for this tape drive is /dev/
IBMtape0. Specify /dev/IBMTape0 as the value of the DEVICE parameter in the DEFINE PATH
command for this device.
To obtain the names of the special files that are associated with the primary paths for all medium
changers that are configured on the system, issue the cat /proc/scsi/IBMchanger command. The
following example is taken from the IBMchanger file:
The name of the special file that is associated with the primary path for this medium changer is /dev/
IBMchanger3. Specify /dev/IBMchanger3 as the value of the DEVICE parameter in the DEFINE PATH
command for this device.
To display path-related details about a particular tape drive on the system, use the itdt -f /dev/
IBMtapex path command, where x is the number of a configured tape device. To display path-related
details about a particular medium changer on the system, use the itdt -f /dev/IBMchangerx path
command, where x is the number of a configured medium changer.
On Windows, multipath I/O for medium changers and tape drives is not enabled automatically
when the device driver is installed. For instructions about configuring multipath I/O, see the IBM Tape
Device Drivers Installation and User's Guide. If multipath I/O is configured, a device has two matching
device names with different locations. To obtain detailed information about the primary path and the
Alternate Path
Logical Device................. Tape0
Serial Number.................. 0000078F7612
SCSI Host ID.................... 8
SCSI Channel................... 0
Target ID.......................... 3
Logical Unit....................... 0
Path Enabled................... Yes
Primary Path
Logical Device................. Tape0
Serial Number.................. 0000078F7612
SCSI Host ID................... 8
SCSI Channel.................. 0
Target ID......................... 1
Logical Unit...................... 0
Path Enabled................... Yes
Procedure
Run the SMIT program to configure the device driver for each autochanger or robot:
1. Select Devices.
2. Select IBM Spectrum Protect Devices.
3. Select Library/MediumChanger.
4. Select Add a Library/MediumChanger.
5. Select the IBM Spectrum Protect-SCSI-LB for any IBM Spectrum Protect supported library.
6. Select the parent adapter to which you are connecting the device. This number is listed in the form:
00-0X, where X is the slot number location of the SCSI adapter card.
7. When prompted, enter the CONNECTION address of the device that you are installing. The connection
address is a two-digit number. The first digit is the SCSI ID (the value you recorded on the worksheet).
The second digit is the device's SCSI logical unit number (LUN), which is usually zero, unless otherwise
noted. The SCSI ID and LUN must be separated by a comma (,).
For example, a connection address of 4,0 has a SCSI ID=4 and a LUN=0.
8. Click DO.
You receive a message (logical file name) of the form lbX Available. Note the value of X, which is a
number that is assigned automatically by the system. Use this information to complete the Device
Name field on your worksheet.
For example, if the message is lb0 Available, the Device Name field is /dev/lb0 on the
worksheet. Always use the /dev/ prefix with the name provided by SMIT.
Procedure
Important: IBM Spectrum Protect cannot overwrite tar or dd tapes, but tar or dd can overwrite IBM
Spectrum Protect tapes.
Procedure
1. Run the SMIT program.
2. Select Devices.
3. Select IBM Spectrum Protect Devices.
4. Select Fibre Channel SAN Attached devices.
5. Select Discover Devices Supported by IBM Spectrum Protect. The discovery process can take some
time.
6. Go back to the Fibre Channel menu, and select List Attributes of a Discovered Device.
7. Note the three-character device identifier, which you use when you define a path to the device to IBM
Spectrum Protect.
For example, if a tape drive has the identifier mt2, specify /dev/mt2 as the device name.
Configuring IBM Spectrum Protect passthru drivers for tape devices and libraries
To use the IBM Spectrum Protect Linux Passthru driver, you must complete the following steps.
Procedure
1. Verify that the device is connected to your system, and is powered on and active.
cat /proc/scsi/scsi
3. Ensure that both the IBM Spectrum Protect device driver package (tsmscsi) and the storage server
package are installed.
4. There are two driver configuration methods available in the IBM Spectrum Protect device driver
package: autoconf and tsmscsi. Both of these methods complete the following tasks:
• Load the Linux SCSI generic driver (sg) to the kernel.
• Create necessary special files for the Passthru driver.
• Create device information files for tape devices (/dev/tsmscsi/mtinfo) and libraries (/dev/
tsmscsi/lbinfo).
5. Run the configuration method that you prefer (autoconf or tsmscsi) for the IBM Spectrum Protect
Passthru driver.
• To run the autoconf configuration method, issue the following command:
autoconf
> ls /dev/tsmscsi/mt*
> ls /dev/tsmscsi/lb*
This information helps you identify which of the /dev/tsmscsi/mtx and /dev/tsmscsi/lbx
special file names to provide the server when you issue a DEFINE PATH command.
What to do next
If you restart the host system, you must rerun the autoconf or tsmscsi script to reconfigure IBM
Spectrum Protect devices. If you restart the IBM Spectrum Protect server instance, you do not have to
reconfigure devices. In general, the Linux SCSI generic driver is preinstalled to the kernel. To verify that
the driver is in the kernel, issue the following command:
If the driver is not in the kernel, issue the modprobe sg command to load the sg driver into the kernel.
Procedure
1. Load the qdio module.
2. Install the zfcp driver.
3. Map the Fibre Channel Protocol (FCP) and configure the zfcp driver.
4. Install and configure the IBM tape device driver.
Attached devices:
Host: scsi2 Channel: 00 Id: 00 Lun: 00
Vendor: STK Model: 9738 Rev: 2003
Type: Medium Changer ANSI SCSI revision: 02
Host: scsi2 Channel: 00 Id: 01 Lun: 02
Vendor: PATHLIGHT Model: SAN Gateway Rev: 32aC
Type: Unknown ANSI SCSI revision: 03
Host: scsi2 Channel: 00 Id: 01 Lun: 02
Vendor: QUANTUM Model: DLT7000 Rev: 2560
Type: Sequential-Access ANSI SCSI revision: 02
Host: scsi2 Channel: 00 Id: 01 Lun: 04
Vendor: IBM Model: 7337 Rev: 1.63
Type: Medium Changer ANSI SCSI revision: 02
rmmod st
Delete device special files that correspond to IBM Spectrum Protect devices
If there are applications that require use of the st driver, delete the special files that correspond to
IBM Spectrum Protect devices. These special files are generated by the st driver. When they are
eliminated, the st driver can no longer control the corresponding IBM Spectrum Protect devices.
Device special file names for tape drives appear in the /dev/ directory. Their names have the
form /dev/[n]st[0-1024][l][m][a].
List the st drive special file names and IBM Spectrum Protect device special file names by using the ls
command. Based on the output of the device sequences, you can find devices in the st devices list
matching those in the IBM Spectrum Protect devices list. The rm command can then be used to delete
st devices.
Issue the following commands to list the st and IBM Spectrum Protect devices:
ls -l /dev/*st*
ls -l /dev/tsmscsi/mt*
rm /dev/*st*
Preparing to use the IBM Spectrum Protect passthru driver for tape devices and libraries
To use the IBM Spectrum Protect Windows passthru device driver for tape devices and libraries, you must
install the driver and obtain the device names for the server to use.
Procedure
1. Install the IBM Spectrum Protect passthru device driver.
2. Obtain the device names that the server must use by taking one of the following actions:
• On the server, run the QUERY SAN command. The output shows all devices names and their
associated device serial numbers.
• In the server directory, run the tsmdlst.exe utility. The output shows all devices names, their
associated serial numbers, and associated device locations.
• At the Windows system command prompt, run the regedit command. From the output, obtain the
device file names based on the device locations. The location consists of the port ID, SCSI bus ID,
Configuring the IBM Spectrum Protect SCSI driver for tape devices and libraries
If the manufacturer of a tape drive or tape library does not provide a SCSI device driver, you must install
the IBM Spectrum Protect SCSI device driver.
Procedure
1. Locate the device in the Device Manager console (devmgmt.msc) and select it. Tape drives are listed
under Tape drives, and medium changers are under Medium Changers.
2. Configure the device for use by the tsmscsi64.sys device driver:
a. Right-click the device and click Update Driver Software.
b. Click Browse my computer for driver software.
3. Click Let me pick from a list of device drivers on my computer.
4. Click Next.
5. Select the appropriate option:
a. For a tape drive, select IBM Spectrum Protect for Tape Drives.
b. For a medium changer, select IBM Spectrum Protect for Medium Changers.
6. Click Next.
7. Click Close.
8. Verify that the device was configured correctly for the tsmscsi64 device driver:
a. Right-click on the device and click Properties.
b. Click the Driver tab and Driver Details. The Driver Details window shows the device driver that is
controlling the device.
What to do next
Verify your device definitions to ensure that everything is configured correctly. Use a QUERY command to
review information about each storage object.
When you review the results of the QUERY DRIVE command, verify that the device type for the drive is
what you expect. If a path is not defined, the drive device type is listed as UNKNOWN and if the wrong
path is used, GENERIC_TAPE or another device type is shown. This step is especially important when you
are using mixed media.
Defining libraries
Before you can use a drive, you must define the library to which the drive belongs.
Procedure
1. Define the library by using the DEFINE LIBRARY command.
For example, if you have an IBM TS3500 tape library, you can define a library that is named
ROBOTMOUNT by using the following command:
If you require library sharing or LAN-free data movement, see the following information:
• “Configuring library sharing” on page 85
• “Configuring LAN-free data movement” on page 102
2. Define a path from the server to the library by using the DEFINE PATH command. When you specify
the DEVICE parameter, enter the device special file name. This name is required by the server to
communicate with tape drives, medium changer, and removable media devices. For more information
about device special file names, see “Special file names for tape devices” on page 63.
Related information
DEFINE LIBRARY (Define a library)
http://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.9/srv.reference/r_cmd_path_define.html
Defining drives
To inform the server about a drive that can be used to access storage volumes, issue the DEFINE DRIVE
command, followed by the DEFINE PATH command.
Procedure
1. Assign a drive to a library by issuing the DEFINE DRIVE command.
2. To make the drive usable by the server, issue the DEFINE PATH command.
For examples about configuring libraries, paths, and drives, see Example: Configure a SCSI or virtual
tape library with a single drive device type and Example: Configure a SCSI or virtual tape library with
multiple drive device types.
Procedure
To define a device class, use the DEFINE DEVCLASS command with the DEVTYPE parameter, which
assigns a device type to the device class.
Results
If you include the DEVCONFIG option in the dsmserv.opt file, the files that you specify with that option
are automatically updated with the results of the DEFINE DEVCLASS, UPDATE DEVCLASS, and DELETE
DEVCLASS commands.
Related information
DEFINE DEVCLASS (Define a device class)
QUERY DEVCLASS (Display information on one or more device classes)
UPDATE DEVCLASS (Update a device class)
Generation Read/write n/a n/a n/a n/a n/a n/a n/a n/a
1 access
Generation Read/write Read/write n/a n/a n/a n/a n/a n/a n/a
2 access access
Generation Read-only Read/write Read/write n/a n/a n/a n/a n/a n/a
3 access access access
Generation n/a Read-only Read/write Read/write n/a n/a n/a n/a n/a
4 access access access
Generation n/a n/a Read-only Read/write Read/write n/a n/a n/a n/a
5 access access access
Generation n/a n/a n/a Read-only Read/write Read/write n/a n/a n/a
6 access access access
Generation n/a n/a n/a n/a Read Read/write Read/write n/a n/a
7 access access access
Generation n/a n/a n/a n/a n/a n/a Read/write Read/write Read/write
8 access access access
Example
If you are mixing different types of drives and media, configure different device classes: one for each type
of media. To specify the media type, use the FORMAT parameter in each of the device class definitions.
(Do not specify FORMAT=DRIVE.) For example, if you are mixing Ultrium Generation 5 and Ultrium
If the MOUNTLIMIT value for LTO1POOL is not set high enough, mount requests that might be satisfied
by LTO Ultrium Generation 2 drives are delayed.
Restriction: Restrictions apply when you mix Ultrium Generation 1 with Ultrium Generation 2 or
Generation 3 drives because of how mount points are allocated. For example, processes that require
multiple mount points that include both Ultrium Generation 1 and Ultrium Generation 2 volumes might try
to reserve Ultrium Generation 2 drives only, even when one mount can be satisfied by an available Ultrium
Generation 6 drive. Processes that behave in this manner include the MOVE DATA and BACKUP STGPOOL
Enabling and disabling drive encryption for LTO Generation 4 or later tape drives
IBM Spectrum Protect supports the three types of drive encryption that are available with LTO Generation
4 or later drives: Application, System, and Library. These methods are defined through the hardware.
Procedure
The following simplified example shows the steps that you would take to enable and disable data
encryption for empty volumes in a storage pool:
1. Define a library by issuing the DEFINE LIBRARY command:
2. Define a device class, LTO_ENCRYPT, by issuing the DEFINE DEVCLASS command and specifying IBM
Spectrum Protect as the key manager:
4. To disable encryption on new volumes, set the DRIVEENCRYPTION parameter to OFF. The default
value is ALLOW. Drive encryption for empty volumes is allowed if another method of encryption is
enabled.
Related concepts
Tape encryption methods
If you must mix generations of drives in a library, review the example and restrictions to help prevent
problems.
This method allows both generations to use their optimal format and minimizes
potential media problems that can result from mixing generations. However, it
does not resolve all media issues. For example, competition for mount points and
mount failures might result. (To learn more about mount point competition in the
context of 3592 drives and media, see “Defining 3592 device classes” on page
82.)
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
CHECKOUT LIBVOLUME (Check a storage volume out of a library)
LABEL LIBVOLUME (Label a library volume)
UPDATE STGPOOL (Update a storage pool)
Procedure
The following simplified example shows how to encrypt data for empty volumes in a storage pool, by
using IBM Spectrum Protect as the key manager:
1. Define a library by issuing the DEFINE LIBRARY command.
For example, issue the following command:
2. Define a device class, 3592_ENCRYPT, by issuing the DEFINE DEVCLASS command and specifying
the value ON for the DRIVEENCRYPTION parameter.
For example, issue the following command:
Procedure
To complete the following steps to share library resources on a SAN among IBM Spectrum Protect
servers, complete the following steps:
1. Set up server-to-server communications.
To share a storage device on a SAN, define servers to each other by using the cross-define function.
Each server must have a unique name.
2. Define a shared library and set up tape devices on the server systems.
Use the procedure that is described in “Configuring libraries for use by a server” on page 74 to define a
library for use in the shared environment. Modify the procedure to define the library as shared, by
specifying the SHARED=YES parameter for the DEFINE LIBRARY command.
3. Define the library manager server.
4. Define the shared library on the server that is the library client.
5. From the library manager server, define paths from the library client to each drive that the library client
can access.
The device name must reflect the way that the library client system recognizes the tape device. A path
from the library manager to each tape drive must be defined in order for the library client to use the
drive.
To avoid problems, ensure that all drive path definitions that are defined for the library manager are
also defined for each library client.
For example, if the library manager defines three tape drives, the library client must also define three
tape drives. To limit the number of tape drives that a library client can use at a time, use the
MOUNTLIMIT parameter of the device class on the library client.
6. Define device classes for the shared library.
The preferred method is to make the device class names the same on both servers to avoid confusion
when you define multiple device classes with the same device type and library parameters. Some
operations, such as database backup, use the device class name to identify the data for backup.
Procedure
1. To set up ASTRO as the library manager server, define a shared SCSI library named SANGROUP.
For example:
Then complete the rest of the steps as described in Example: Configure a SCSI or virtual tape library
with a single drive device type to configure the library.
Tip: You can use the PERFORM LIBACTION command to define drives and paths for a library in one
step.
2. Define ASTRO as the library manager server by issuing the DEFINE SERVER command.
3. Define the shared library SANGROUP by issuing the DEFINE LIBRARY command. You must use the
library manager server name in the PRIMARYLIBMANAGER parameter, and use LIBTYPE=SHARED.
Ensure that the library name is the same as the library name on the library manager.
4. Define paths from the library manager, ASTRO, to two drives in the shared library by issuing the
DEFINE PATH command.
5. Define all device classes that are associated with the shared library.
The following parameters for the device class definition must be the same on the library client and the
library manager:
• LIBRARY
• DRIVEENCRYPTION
• WORM
• FORMAT
6. Define a storage pool that is named BACKTAPE for the shared library to use. Issue the DEFINE
STGPOOL command.
What to do next
Repeat the procedure to define more library clients to your library manager.
Related information
DEFINE DEVCLASS (Define a device class)
DEFINE DRIVE (Define a drive to a library)
DEFINE LIBRARY (Define a library)
http://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.9/srv.reference/r_cmd_path_define.html
DEFINE STGPOOL (Define a volume in a storage pool)
Procedure
The following procedure is an example of how to set up an IBM Spectrum Protect server that is named
ASTRO as a library manager:
1. Ensure that the library manager server is running:
a) Start the Windows Services Management Console (services.msc).
b) Select the service. For example, TSM Server1.
c) If the service is not running, right-click the service name and click Start.
2. Obtain the library and drive information for the shared library device:
a) Run the tsmdlst.exe utility. The utility is in the \Program Files\Tivoli\TSM\server
directory.
3. Define a library whose library type is SCSI.
For example:
This example uses the default for the library's serial number, which is to have the server obtain the
serial number from the library itself at the time that the path is defined. Depending on the capabilities
of the library, the server might not be able to automatically detect the serial number. In this case, the
server does not record a serial number for the device, and is not able to confirm the identity of the
device when you define the path or when the server uses the device.
4. Define the path from the server to the library.
If you did not include the serial number when you defined the library, the server now queries the
library to obtain this information. If you did include the serial number when you defined the library, the
server verifies what you defined and issues a message if there is a mismatch.
5. Define the drives in the library.
This example uses the default for the drive's serial number, which is to have the server obtain the
serial number from the drive itself at the time that the path is defined. Depending on the capabilities of
the drive, the server might not be able to automatically detect the serial number. In this case, the
server does not record a serial number for the device, and is not able to confirm the identity of the
device when you define the path or when the server uses the device.
This example also uses the default for the drive's element address, which is to have the server obtain
the element number from the drive itself at the time that the path is defined.
The element address is a number that indicates the physical location of a drive within an automated
library. The server needs the element address to connect the physical location of the drive to the
drive's SCSI address. You can have the server obtain the element number from the drive itself at the
time that the path is defined, or you can specify the element number when you define the drive.
Depending on the capabilities of the library, the server might not be able to automatically detect the
element address. In this case, you must supply the element address when you define the drive.
Element numbers for many libraries are available at IBM Support Portal for IBM Spectrum Protect.
6. Define the path from the server to each of the drives.
If you did not include the serial number or element address when you defined the drive, the server
now queries the drive or the library to obtain this information.
7. Define at least one device class.
8. Check in the library inventory. The following example checks all volumes into the library inventory as
scratch volumes. The server uses the name on the bar code label as the volume name.
9. Set up a storage pool for the shared library with a maximum of 50 scratch volumes.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
Procedure
1. Ensure that the library manager server is running:
a) Start the Windows Services Management Console (services.msc).
b) Select the service. For example, TSM Server1.
c) If the service is not running, right-click and select Start.
2. Obtain the library and drive information for the shared library device:
a) Run the tsmdlst.exe utility. The utility is in the \Program Files\Tivoli\TSM\server
directory.
3. Define the shared library, SANGROUP, and identify the library manager. Ensure that the library name is
the same as the library name on the library manager.
4. Define the paths from the library client server to each of the drives by issuing commands on the
administrative client:
5. Define at least one device class by issuing commands from the library client:
Set the parameters for the device class the same on the library client as on the library manager.
Making the device class names the same on both servers is also a good practice, but is not required.
The device class parameters that are specified on the library manager server override those specified
for the library client. This is true whether or not the device class names are the same on both servers.
If the device class names are different, the library manager uses the parameters specified in a device
class that matches the device type specified for the library client.
If a library client requires a setting that is different from what is specified in the library manager's
device class (for example, a different mount limit), complete the following steps:
a. Create an additional device class on the library manager server. Specify the parameter settings that
you want the library client to use.
Procedure
To set up a storage pool hierarchy, complete the following steps:
1. Define a primary storage pool for the tape device by issuing the DEFINE STGPOOL command.
For example, define a primary storage pool, TAPE1, with a device class of LTO, and enable group
collocation. Set the maximum number of scratch volumes that the server can request for this storage
pool to 999. Issue the following command:
2. Define the drives, paths, and libraries for the primary storage pool on tape. Follow the instructions in
“Defining tape devices” on page 76.
3. Define a primary storage pool for the disk device by issuing the DEFINE STGPOOL command.
For example, define a storage pool, DISK1, with a device class of FILE. Ensure that data can be
migrated to the tape storage pool, TAPE1, but prevent automatic migration by specifying 100 for the
HIGHMIG parameter and 0 for the LOWMIG parameter. Prevent reclamation by specifying 100 for the
RECLAIM parameter. Enable node collocation. Set the maximum number of scratch volumes that the
server can request for this storage pool to 9999. Use the MIGPROCESS parameter to specify the
number of migration processes. The value of the MIGPROCESS parameter should equal the number of
drives in the library minus the number of drives that are reserved for restore operations. Issue the
following command:
What to do next
A storage pool hierarchy includes only primary storage pools. After you set up the storage pool hierarchy,
complete the following steps:
1. Create a copy storage pool on a tape device. For instructions, see DEFINE STGPOOL (Define a copy
storage pool assigned to sequential access devices).
2. Back up the tape-based primary storage pool to the copy storage pool by using the BACKUP STGPOOL
command. For instructions, see BACKUP STGPOOL (Back up primary storage pool data to a copy
storage pool).
3. To ensure that data can be recoved in a disaster, set up a procedure for moving tape volumes from the
copy storage pool to an offsite location. For instructions, see Chapter 10, “Preparing for and recovering
from a disaster by using DRM,” on page 205.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
DEFINE STGPOOL (Define a volume in a storage pool)
Adding clients
Following the successful setup of your IBM Spectrum Protect server, install and configure client software
to begin backing up data.
Procedure
To add a client, complete the following steps:
Procedure
Based on your goal, select the products to install and review the installation instructions.
Tip: If you install the client software now, you must also complete the client configuration tasks that are
described in “Installing and configuring clients” on page 98 before you can use the client.
Protect IBM Spectrum Protect Snapshot protects • Installing and upgrading for UNIX and Linux
applications with data with integrated, application-aware
• Installing and upgrading for VMware
snapshot backup snapshot backup and restore capabilities.
and restore You can protect data that is stored by IBM • Installing and upgrading for Windows
capabilities Db2 database software and SAP, Oracle,
Microsoft Exchange, and Microsoft SQL
Server applications.
Protect an email IBM Spectrum Protect for Mail: Data • Installation of Data Protection for IBM
application on an Protection for IBM Domino automates data Domino on a UNIX, AIX, or Linux system
IBM Domino® protection so that backups are completed (V7.1.0)
server without shutting down IBM Domino
• Installation of Data Protection for IBM
servers.
Domino on a Windows system (V7.1.0)
Tip: To use the client for space management, you can install IBM Spectrum Protect for Space
Management or IBM Spectrum Protect HSM for Windows.
Procedure
1. Review the policies that are configured for your solution by following the instructions in “Viewing
policies” on page 94.
2. If you need to make minor changes to meet data retention requirements, follow the instructions in
“Editing policies” on page 95.
3. Optional: If you need to create policy domains or make extensive changes to policies to meet data
retention requirements, see Customizing policies.
Viewing policies
View policies to determine whether they must be edited to meet your requirements.
Procedure
1. To view the active policy set for a policy domain, complete the following steps:
a) On the Services page of the Operations Center, select a policy domain and click Details.
b) On the Summary page for the policy domain, click the Policy Sets tab.
Tip: To help ensure that you can recover data after a ransomware attack, apply the following
guidelines:
• Ensure that the value in the Backups column is a minimum of 2. The preferred value is 3, 4, or
more.
• Ensure that the value in the Keep Extra Backups column is a minimum of 14 days. The preferred
value is 30 or more days.
• Ensure that the value in the Keep Archives column is a minimum of 30 days.
If IBM Spectrum Protect for Space Management software is installed on the client, ensure that data
is backed up before you migrate it. On the DEFINE MGMTCLASS or UPDATE MGMTCLASS command,
specify MIGREQUIRESBKUP=YES. Then, follow the guidelines in the tip.
2. To view inactive policy sets for a policy domain, complete the following steps:
Editing policies
To change the rules that apply to a policy domain, edit the active policy set for the policy domain. You can
also activate a different policy set for a domain.
Procedure
1. On the Services page of the Operations Center, select a policy domain and click Details.
2. On the Summary page for the policy domain, click the Policy Sets tab.
The Policy Sets page indicates the name of the active policy set and lists all of the management
classes for that policy set.
3. Click the Configure toggle. The policy set is editable.
4. To edit a policy set that is not active, click the forward and back arrows to locate the policy set.
5. Edit the policy set by completing any of the following actions:
Option Description
Add a management a. In the Policy Sets table, click +Management Class.
class
b. To specify the rules for backing up and archiving data, complete the
fields in the Add Management Class window.
c. To make the management class the default management class, select
the Make default check box.
d. Click Add.
Make a management In the Default column for the management class, click the radio button.
class the default
Tip: The default management class manages client files when another
management class
management class is not assigned to, or appropriate for managing, a file.
To ensure that clients can always back up and archive files, choose a
default management class that contains rules for both backing up and
archiving files.
Modify a management To change the properties of a management class, update the fields in the
class table.
6. Click Save.
Attention: When you activate a new policy set, data might be lost. Data that is protected under
one policy set might not be protected under another policy set. Therefore, before you activate a
policy set, ensure that the differences between the previous policy set and the new policy set
do not cause data to be lost.
7. Click Activate. A summary of the differences between the active policy set and the new policy set is
displayed. Ensure that the changes in the new policy set are consistent with your data retention
requirements by completing the following steps:
a) Review the differences between corresponding management classes in the two policy sets, and
consider the consequences for client files. Client files that are bound to management classes in the
active policy set will be bound to the management classes with the same names in the new policy
set.
b) Identify management classes in the active policy set that do not have counterparts in the new
policy set, and consider the consequences for client files. Client files that are bound to these
management classes will be managed by the default management class in the new policy set.
c) If the changes to be implemented by the policy set are acceptable, select the I understand that
these updates can cause data loss check box and click Activate.
Procedure
How you modify the scope of backup operations depends on the product that is installed on the client
node:
• For a backup-archive client, you can create an include-exclude list to include or exclude a file, groups
of files, or directories from backup operations. To create an include-exclude list, follow the
instructions in Creating an include-exclude list.
To ensure consistent use of an include-exclude list for all clients of one type, you can create a client
option set on the server that contains the required options. Then, you assign the client option set to
each of the clients of the same type. For details, see Controlling client operations through client option
sets.
• For a backup-archive client, you can specify the objects to include in an incremental backup operation
by using the domain option. Follow the instructions in Domain option.
• For other products, to define which objects are included in and excluded from backup operations,
follow the instructions in the product documentation.
Procedure
1. Review available schedules by hovering over Clients on the Operations Center menu bar. Click
Schedules.
2. Optional: Modify or create a schedule by completing the following steps:
Option Description
Modify a schedule a. In the Schedules view, select the schedule and click Details.
b. On the Schedule Details page, view details by clicking the blue arrows at the
beginning of the rows.
c. Modify the settings in the schedule, and click Save.
Create a schedule In the Schedules view, click +Schedule and complete the steps to create a
schedule.
3. Optional: To configure schedule settings that are not visible in the Operations Center, use a server
command. For example, you might want to schedule a client operation that backs up a specific
directory and assigns it to a management class other than the default.
a) On the Overview page of the Operations Center, hover over the settings icon and click
Command Builder.
b) Issue the DEFINE SCHEDULE command to create a schedule or the UPDATE SCHEDULE command
to modify a schedule. For more information about the commands, see DEFINE SCHEDULE (Define a
client schedule) or UPDATE SCHEDULE (Update a client schedule).
Related information
Tuning the schedule for daily operations
Registering clients
Register a client to ensure that the client can connect to the server, and the server can protect client data.
Procedure
To register a client, complete one of the following actions.
• If the client requires an administrative user ID, register the client by using the REGISTER NODE
command and specify the USERID parameter:
where node_name specifies the node name and password specifies the node password. For details,
see Register a node.
• If the client does not require an administrative user ID, register the client by using the Operations
Center Add Client wizard. Complete the following steps:
a. On the Operations Center menu bar, click Clients.
b. In the Clients table, click +Client.
c. Complete the steps in the Add Client wizard:
1) Specify that redundant data can be eliminated on both the client and server. In the Client-side
data deduplication area, select the Enable check box.
2) In the Configuration window, copy the TCPSERVERADDRESS, TCPPORT, NODENAME, and
DEDUPLICATION option values.
Tip: Record the option values and keep them in a safe place. After you complete the client
registration and install the software on the client node, use the values to configure the client.
3) Follow the instructions in the wizard to specify the policy domain, schedule, and option set.
4) Set how risks are displayed for the client by specifying the at-risk setting.
5) Click Add Client.
Related information
Tcpserveraddress option
Tcpport option
Nodename option
Deduplication option
Procedure
If you already installed the software, start at step “2” on page 99.
1. Take one of the following actions:
• To install software on an application or client node, follow the instructions.
IBM Spectrum Protect for Mail – Installation of Data Protection for IBM Domino on a UNIX, AIX,
or Linux system (V7.1.0)
– Installation of Data Protection for IBM Domino on a Windows
system (V7.1.0)
– Installing, upgrading, and migrating
IBM Spectrum Protect – Installing and upgrading for UNIX and Linux
Snapshot
– Installing and upgrading for VMware
– Installing and upgrading for Windows
IBM Spectrum Protect for – Installing Data Protection for SAP for Db2
Enterprise Resource Planning
– Installing Data Protection for SAP for Oracle
• To install software on a virtual machine client node, follow the instructions for the selected backup
type.
What to do next
If you need to change what is getting backed up from the client, follow the instructions in “Modifying the
scope of a client backup” on page 96.
Procedure
To configure and start the client scheduler by using the client acceptor, follow the instructions for the
operating system that is installed on the client node:
AIX and Oracle Solaris
a. From the backup-archive client GUI, click Edit > Client Preferences.
b. Click the Web Client tab.
c. In the Managed Services Options field, click Schedule. If you also want the client acceptor to
manage the web client, click the Both option.
d. To ensure that the scheduler can start unattended, in the dsm.sys file, set the passwordaccess
option to generate.
e. To store the client node password, issue the following command and enter the client node
password when prompted:
f. Start the client acceptor by issuing the following command on the command line:
g. To enable the client acceptor to start automatically after a system restart, add the following entry
to the system startup file (typically, /etc/inittab):
Linux
a. From the backup-archive client GUI, click Edit > Client Preferences.
b. Click the Web Client tab.
c. In the Managed Services Options field, click Schedule. If you also want the client acceptor to
manage the web client, click the Both option.
d. To ensure that the scheduler can start unattended, in the dsm.sys file, set the passwordaccess
option to generate.
e. To store the client node password, issue the following command and enter the client node
password when prompted:
f. Start the client acceptor by logging in with the root user ID and issuing the following command:
g. To enable the client acceptor to start automatically after a system restart, add the service by
issuing the following command at a shell prompt:
MAC OS X
a. In the backup-archive client GUI, click Edit > Client Preferences.
b. To ensure that the scheduler can start unattended, click Authorization, select Password
Generate, and click Apply.
c. To specify how services are managed, click Web Client, select Schedule, click Apply, and click
OK.
d. To ensure that the generated password is saved, restart the backup-archive client.
e. Use the IBM Spectrum Protect Tools for Administrators application to start the client acceptor.
Windows
a. In the backup-archive client GUI, click Utilities > Setup Wizard > Help me configure the Client
Scheduler. Click Next.
b. Read the information on the Scheduler Wizard page and click Next.
c. On the Scheduler Task page, select Install a new or additional scheduler and click Next.
d. On the Scheduler Name and Location page, specify a name for the client scheduler that you are
adding. Then, select Use the Client Acceptor daemon (CAD) to manage the scheduler and click
Next.
e. Enter the name that you want to assign to this client acceptor. The default name is Client Acceptor.
Click Next.
f. Complete the configuration by stepping through the wizard.
g. Update the client options file, dsm.opt, and set the passwordaccess option to generate.
h. To store the client node password, issue the following command at the command prompt:
Procedure
Open the following ports to allow access through the firewall:
TCP/IP port for the backup-archive client, command-line administrative client, and the client
scheduler
Specify the port by using the tcpport option in the client options file. The tcpport option in the client
options file must match the TCPPORT option in the server options file. The default value is 1500. If
you decide to use a value other than the default, specify a number in the range 1024 - 32767.
HTTP port to enable communication between the web client and remote workstations
Specify the port for the remote workstation by setting the httpport option in the client options file of
the remote workstation. The default value is 1581.
TCP/IP ports for the remote workstation
The default value of 0 (zero) causes two free port numbers to be randomly assigned to the remote
workstation. If you do not want the port numbers to be randomly assigned, specify values by setting
the webports option in the client options file of the remote workstation.
TCP/IP port for administrative sessions
Specify the port on which the server waits for requests for administrative client sessions. The value of
the client tcpadminport option must match the value of the TCPADMINPORT server option. In this
way, you can secure administrative sessions within a private network.
What to do next
To help you tune the use of your LAN and SAN resources, you can control the path that data transfers take
for clients with the capability of LAN-free data movement. Control the path by using the UPDATE NODE
command. For each client, you can select one of the following settings for data read and write operations.
Specify data read operations by using the DATAREADPATH parameter and data write operations by using
the DATAWRITEPATH parameter. The parameter is optional. The default value is ANY.
LAN (LAN path only)
Specify the LAN value if either of the following conditions is true:
• You want to back up or restore a small amount of data.
• The client does not have SAN connectivity.
LANFREE (LAN-free path only)
Specify the LANFREE value if the client and server are on the same SAN, and any of the following
conditions are true:
• You want to back up or restore a large amount of data.
• You want to offload the server processing load to the client.
• You want to relieve LAN congestion.
ANY (Any available path)
A LAN-free path is used if one is available. If a LAN-free path is unavailable, the data is moved by
using the LAN.
The results help you to identify adjustments that might be needed in the storage configuration or
policies. The output displays which management class destinations for a specific operation type are
not capable of LAN-free data transfers. It also reports the total number of LAN-free destinations.
Related information
VALIDATE LANFREE (Validate LAN-Free paths)
To determine whether a volume is encrypted and which method was used, issue the QUERY VOLUME
command and specify the FORMAT=DETAILED parameter.
A library can contain a mixture of drives, some of which support encryption and some of which do not. For
example, a library might contain two LTO-2 drives, two LTO-3 drives, and two LTO-4 drives. You can also
mix media in a library by using, for example, encrypted and non-encrypted device classes that have
different tape and drive technologies.
Restrictions:
• To apply encryption to LTO-4 or later drives, all of the drives must support encryption.
• To apply encryption to a logical library, you must use the same method of encryption for all drives within
the library. Do not create an environment in which some drives use the Application method and some
drives use the Library or System methods of encryption.
Procedure
1. Install a device driver that supports drive encryption:
• To enable encryption for an IBM LTO-4 or later drive, you must install the IBM RMSS Ultrium device
driver. SCSI drives do not support IBM LTO-4 or later encryption.
• To enable encryption for an HP LTO-4 or later drive, you must install the IBM Spectrum Protect
device driver.
2. Enable drive encryption by specifying the DRIVEENCRYPTION parameter on the DEFINE DEVCLASS
or UPDATE DEVCLASS command for the 3592, LTO, or ECARTRIDGE device types.
What to do next
When you use encryption-capable drives with a supported encryption method, a different format is used
to write encrypted data to tapes. When data is written to volumes that use the different format and if the
volumes are then returned to scratch, they contain labels that can be read only by encryption-enabled
drives. To use these scratch volumes in a drive that is not enabled for encryption, either because the
hardware is not capable of encryption or because the encryption method is set to NONE, you must relabel
the volumes.
Related tasks
Enabling and disabling 3592 Generation 2 and later drive encryption
With IBM Spectrum Protect, you can use the following types of drive encryption with drives that are 3592
Generation 2 and later: Application, System, and Library. These methods are defined through the
hardware.
Enabling and disabling drive encryption for LTO Generation 4 or later tape drives
IBM Spectrum Protect supports the three types of drive encryption that are available with LTO Generation
4 or later drives: Application, System, and Library. These methods are defined through the hardware.
Related information
DEFINE DEVCLASS (Define a device class)
UPDATE DEVCLASS (Update a device class)
Controlling the amount of time that the server waits for a drive
You can specify the maximum amount of time, in minutes, that the IBM Spectrum Protect server waits for
a drive to become available for the current mount request.
Procedure
1. From a command prompt, change to the server subdirectory of the server installation directory, for
example, C:\Program Files\Tivoli\TSM\server.
2. Run the tsmdlst.exe executable file.
Related information
QUERY SAN (Query the devices on the SAN)
tsmdlst (Display information about devices)
WORM-capable drives
To use WORM media in a library, all the drives in the library must be WORM-capable. A mount will fail if a
WORM cartridge is mounted in a read/write (RW) drive.
However, a WORM-capable drive can be used as a RW drive if the WORM parameter in the device class is
set to NO. Any type of library can have both WORM and RW media if all of the drives are WORM enabled.
The only exception to this rule is NAS-attached libraries in which WORM tape media cannot be used.
Related information
DEFINE DEVCLASS (Define a device class)
UPDATE DEVCLASS (Update a device class)
Conflicts with other applications. IBM Spectrum Protect requires a storage area Set up a storage area network.
network to share devices.
Attention: Data loss can occur if
multiple IBM Spectrum Protect
servers use the same device. Define
or use a device with only one IBM
Spectrum Protect server.
Other applications
can access IBM Spectrum Protect devices, by
using a SCSI tape driver.
Labeling fails. A device for labeling volumes cannot be used at You cannot overwrite existing volumes in a
the same time that the server uses the device storage pool.
for other processes.
You must resolve any hardware issues before
you label a volume.
Incorrect or incomplete license registration. Register the license for the device support that
was purchased.
Conflicts among device drivers. IBM Spectrum Protect issues messages about Windows device drivers and drivers that are
I/O errors when you define or use a sequential provided by other applications can interfere
access device. with the IBM Spectrum Protect device driver if
the IBM Spectrum Protect driver is not started
first. To check on the order that device drivers
are started by the system, complete the
following steps:
1. Click Control Panel.
2. Click Devices. Device drivers and their
startup types are listed.
Unable to preempt tape drive On a Linux platform, the IBM If the Data Path failover is
reservation conflict with persistent reserve on Spectrum Protect server or storage agent enabled in the IBM lin_tape driver, the /dev/
Linux platform. requires that the IBM lin_tape device driver is TSMtape file is created automatically and
configured for persistent reserve and an IBM persistent reserve can be used. Alternatively,
pseudo device file /dev/TSMtape is created. configure persistent reserve for tape drive
reservation on a Linux platform according to the
following procedure:
Tip: By default, the IBM lin_tape device driver
uses SCSI-2 reserve to reserve tape drives.
options lin_tape
tape_reserve_type=persistent
KERNEL=="TSMtape",
MODE="0666"
Procedure
1. Test backup operations to verify that your data is protected in the way that you expect.
a) On the Clients page of the Operations Center, select the clients that you want to back up, and click
Back Up.
b) On the Servers page of the Operations Center, select the server for which you want to back up the
database. Click Back Up, and follow the instructions in the Back Up Database window.
c) Verify that the backup operations completed successfully with no warning or error messages.
Tip: Alternatively, you can use the backup-archive client GUI to back up client data and you can
backup the server database by issuing BACKUP DB command from an administrative command-
line.
2. Set up monitoring for your solution by following the instructions in Part 3, “Monitoring a tape solution,”
on page 119.
Procedure
1. Complete daily monitoring tasks. For instructions, see Daily monitoring checklist.
2. Complete periodic monitoring tasks. For instructions, see Periodic monitoring checklist.
3. Verify that your system complies with licensing requirements. For instructions, see Verifying license
compliance.
4. Optional: Set up email reports of system status. For instructions, see “Tracking system status by using
email reports” on page 138
Tip: To run administrative commands for advanced monitoring tasks, use the Operations Center
command builder. The command builder provides a type-ahead function to guide you as you enter
1. To verify whether servers are at risk, Tip: If you detect an issue that is related to
Determine in the Servers area, look for an server properties, update the server
whether servers that Unavailable notification. properties:
are managed by the
Operations Center 2. To view additional information, click 1. In the Servers table, select a server and
are available to the Servers area. click Details.
provide data 3. Select a server in the Servers table 2. To update server properties, click
protection services to and click Details. Properties.
clients.
1. Click the Servers area. You can also look for related alerts on the
Determine Alerts page. For additional instructions about
whether sufficient 2. In the Status column of the table, troubleshooting, see Resolving server
space is available for view the status of the server and problems.
the server inventory, resolve any issues:
which consists of the
• Normal Sufficient space is
server database,
available for the server database,
active log, and
active log, and archive log.
archive log.
• Critical Insufficient space is
available for the server database,
active log, or archive log. You must
add space immediately, or the
data protection services that are
provided by the server will be
interrupted.
• Warning The server database,
active log, or archive log is running
out of space. If this condition
persists, you must add space.
• Unavailable Status cannot be
obtained. Ensure that the server is
running, and that there are no
network issues. This status is also
shown if the monitoring
administrator ID is locked or
otherwise unavailable on the
server. This ID is named IBM-OC-
hub_server_name.
• Unmonitored Unmonitored
servers are defined to the hub
server, but are not configured for
management by the Operations
Center. To configure an
unmonitored server, select the
server, and click Monitor Spoke.
query db f=d
• To obtain an overview of activity in • If more data was sent to the server than you
Verify that the the last 24 hours, view the Activity expected, determine which clients are
amount of data that area. backing up more data and investigate the
was recently sent to cause. It is possible that client-side data
and from servers is • To compare activity in the last 24
hours with activity in the previous 24 deduplication is not working correctly.
within the expected
range. hours, review the figures in the
Attention: If the amount of backed-
Current and Previous areas.
up data is significantly larger than
usual, it might indicate a
ransomware attack. When
ransomware encrypts data, the
system perceives the data as being
changed, and the changed data is
backed up. Thus, backup volumes
become larger. To determine which
clients are affected, click the
Applications, Virtual Machines, or
Systems tab.
• If less data was sent to the server than you
expected, investigate whether client backup
operations are proceeding on schedule.
1. If problems are indicated in the To view the storage-pool capacity that was
Verify that Storage & Data Availability area, used over the past two weeks, select a row in
storage pools are click Pools to view the details: the Storage Pools table and click Details.
available to back up
client data. • If the Critical status is
displayed, insufficient space is
available in the storage pool, or its
access status is unavailable.
Normal
The number of tiering rules that ran
without errors. Eligible data was
successfully tiered according to the rule's
specifications. The tiering process was
completed within the rule's time limit.
Warning
The number of tiering rules that
completed processing, but did not tier all
eligible data. Either some files were
skipped by the tiering process, the rule's
time limit was reached, or the tiering
process was canceled.
Failed
The number of tiering rules that did not
complete processing. The server could
not tier data. For example, the server
might be unable to tier data because the
target storage pool has insufficient space
or because the server cannot access the
storage pool.
Other states
The number of tiering rules that have
other states. The server on which the
tiering rule is defined might be
unavailable to provide the data, or might
be running an earlier version of IBM
Spectrum Protect that does not support
status. Status might not be applicable
because the tiering rule is not activated,
or the tiering rule was not run.
df -g instance_directory
where instance_directory
specifies the instance directory.
• To view available
space in the file system, on the
operating system command
line, issue the following
command:
df -h instance_directory
where instance_directory
specifies the instance directory.
• In the Windows
Explorer program, right-click the
file system and click Properties.
View the capacity information.
The preferred location of the
instance directory depends on the
operating system where the
server is installed:
• /home/
tsminst1/tsminst1
• C:\tsminst1
Tip: If you completed a planning
worksheet, the location of the
instance directory is recorded in
the worksheet.
Evaluate the timing of On the Operations Center Tip: You can receive a warning message if a
client schedules. Ensure Overview page, click Clients > client operation runs longer than expected.
that the start and end Schedules. Complete the following steps:
times of client schedules
In the Schedules table, the Start 1. On the Operations Center Overview page,
do not overlap with server
column displays the configured hover over Clients and click Schedules.
maintenance tasks. Limit
start time for the scheduled
the time for client backup 2. Select a schedule and click Details.
operation. To see when the most
operations to 8 - 12 hours.
recent operation was started, 3. View the details of a schedule by clicking
hover over the clock icon. the blue arrow next to the row.
4. In the Run time alert field, specify the
time when a warning message will be
issued if the scheduled operation is not
completed.
5. Click Save.
Evaluate the timing of On the Operations Center The preferred method is to ensure that each
maintenance tasks. Ensure Overview page, click Servers > maintenance task runs to completion before
that the start and end Maintenance. the next maintenance task starts. Examples
times of maintenance of maintenance tasks include inventory
In the Maintenance table, review
tasks do not overlap with expiration, copying of storage pools, space
the information in the Last Run
client schedules. reclamation, and database backup.
Time column. To see when the
last maintenance task was Tip: If a maintenance task is running too long,
started, hover over the clock icon. change the start time or the maximum
runtime. Complete the following steps:
1. On the Operations Center Overview page,
hover over the settings icon and click
Command Builder.
2. To change the start time or maximum
runtime for a task, issue the UPDATE
SCHEDULE command. For information
about this command, see UPDATE
SCHEDULE (Update a client schedule).
Procedure
• To enable tape alert messages, issue the SET TAPEALERTMSG command and specify the ON value:
set tapealertmsg on
• To check whether tape alert messages are enabled, issue the QUERY TAPEALERTMSG command:
query tapealertmsg
Procedure
To monitor license compliance, complete the steps that correspond to the provisions of your licensing
agreement.
Tip: The Operations Center provides an email report that summarizes front-end and back-end capacity
usage. Reports can be sent automatically to one or more recipients regularly. To configure and manage
email reports, click Reports on the Operations Center menu bar.
Option Description
a. On the Operations Center menu bar, hover over the settings icon and click
Front-end model
Licensing.
The front-end capacity estimate is displayed on the Front-end Usage page.
b. If a value is displayed in the Not Reporting column, click the number to identify
clients that did not report capacity usage.
c. To estimate capacity for clients that did not report capacity usage, go to the
following download site, which provides measuring tools and instructions:
https://public.dhe.ibm.com/storage/tivoli-storage-management/
front_end_capacity_measurement_tools
To measure front-end capacity by script, complete the instructions in the most
recently available licensing guide.
d. Add the Operations Center estimate and any estimates that you obtained by
using a script.
e. Verify that the estimated capacity complies with your licensing agreement.
Restriction: If the source and target replication servers do not use the same
Back-end model policy settings, you cannot use the Operations Center to monitor back-end
capacity usage for replicated clients. For information about how to estimate
capacity usage for these clients, see technote 1656476.
a. On the Operations Center menu bar, hover over the settings icon and click
Licensing.
b. Click the Back-end tab.
c. Verify that the estimated amount of data complies with your licensing
agreement.
PVU model For information about how to assess compliance with PVU licensing terms, see
Assessing compliance with the PVU licensing model.
Procedure
To set up and manage email reports, complete the following steps:
1. On the Operations Center menu bar, click Reports.
2. If an email server connection is not yet configured, click Configure Mail Server and complete the
fields.
After you configure the mail server, the general operations report and license compliance report are
enabled.
3. To change report settings, select a report, click Details, and update the form.
4. Optional: To add a custom report, click + Report, and complete the fields.
Tip: To immediately run and send a report, select the report and click Send.
Results
Enabled reports are sent according to the specified settings.
What to do next
The general operations report includes an attachment. To find more detailed information, expand the
sections in the attachment.
If you cannot view the image in a report, you might be using an email client that converts HTML to another
format. For information about restrictions, see the Operations Center online help.
Procedure
To diagnose and resolve client errors, take one of the following actions:
• If the client management service is installed on the client node, complete the following steps:
a) On the Operations Center Overview page, click Clients and select the client.
b) Click Details.
c) On the client Summary page, click the Diagnosis tab.
d) Review the retrieved log messages.
Tips:
– To show or hide the Client Logs pane, double-click the Client Logs bar.
– To resize the Client Logs pane, click and drag the Client Logs bar.
If suggestions are displayed on the Diagnosis page, select a suggestion. In the Client Logs pane,
client log messages to which the suggestion relates are highlighted.
e) Use the suggestions to resolve the problems that are indicated by the error messages.
Tip: Suggestions are provided for only a subset of client messages.
• If the client management service is not installed on the client node, review the error logs for the
installed client.
Procedure
Follow the instructions for the operating system that is installed on the client node:
AIX and Oracle Solaris
• To stop the client acceptor, complete the following steps:
a. Determine the process ID for the client acceptor by issuing the following command on the
command line:
Review the output. In the following sample output, 6764 is the process ID for the client
acceptor:
kill -9 PID
/usr/bin/dsmcad
Linux
• To stop the client acceptor (and not restart it), issue the following command:
• To stop and restart the client acceptor, issue the following command:
MAC OS X
Click Applications > Utilities > Terminal.
• To stop the client acceptor, issue the following command:
Windows
• To stop the client acceptor service, complete the following steps:
a. Click Start > Administrative Tools > Services.
Resetting passwords
If a password for a client node or an administrator ID is lost or forgotten, you can reset the password.
Multiple attempts to access the system with an incorrect password can cause a client node or
administrator ID to be locked. You can take steps to resolve the issue.
Procedure
To resolve password issues, take one of the following actions:
• If a backup-archive client is installed on a client node, and the password is lost or forgotten, complete
the following steps:
1. Generate a new password by issuing the UPDATE NODE command:
where node_name specifies the client node and new_password specifies the password that you
assign.
2. Inform the client node owner about the changed password. When the owner of the client node logs
in with the specified password, a new password is generated automatically. That password is
unknown to users to enhance security.
Tip: The password is generated automatically if you previously set the passwordaccess option to
generate in the client options file.
• If an administrator is locked out because of password issues, complete the following steps:
1. To provide the administrator with access to the server, issue the UNLOCK ADMIN command. For
instructions, see UNLOCK ADMIN (Unlock an administrator).
2. Set a new password by using the UPDATE ADMIN command:
where admin_name specifies the name of the administrator and new_password specifies the
password that you assign.
• If a client node is locked, complete the following steps:
1. Determine why the client node is locked and whether it must be unlocked. For example, if the client
node is decommissioned, the client node is being removed from the production environment. You
cannot reverse the decommission operation, and the client node remains locked. A client node also
might be locked if the client data is the subject of a legal investigation.
2. If you must unlock a client node, use the UNLOCK NODE command. For instructions, see UNLOCK
NODE (Unlock a client node).
3. Generate a new password by issuing the UPDATE NODE command:
Procedure
To upgrade the software, complete the instructions that are listed in the following table.
IBM Spectrum Protect for • Upgrading Data Protection for SQL Server
Databases
• Data Protection for Oracle installation
• Installing, upgrading, and migrating
IBM Spectrum Protect for Mail • Installation of Data Protection for IBM Domino on a UNIX, AIX, or Linux
system (V7.1.0)
• Installation of Data Protection for IBM Domino on a Windows system
(V7.1.0)
• Installing, upgrading, and migrating
Procedure
Take one of the following actions:
• To decommission a client in the background by using the Operations Center, complete the following
steps:
a) On the Operations Center Overview page, click Clients and select the client.
b) Click More > Decommission.
– To decommission an application or system client node in the foreground, issue the DECOMMISSION
NODE command and specify the wait=yes parameter. For example, if the client node is named
AUSTIN, issue the following command:
– To decommission a virtual machine in the background, issue the DECOMMISSION VM command. For
example, if the virtual machine is named AUSTIN, the file space is 7, and the file space name is
specified by the file space ID, issue the following command:
If the virtual machine name includes one or more spaces, enclose the name in double quotation
marks. For example:
– To decommission a virtual machine in the foreground, issue the DECOMMISSION VM command and
specify the wait=yes parameter. For example, issue the following command:
If the virtual machine name includes one or more spaces, enclose the name in double quotation
marks. For example:
What to do next
Watch for error messages, which might be displayed in the user interface or in the command output,
immediately after you run the process.
You can verify that the client node is decommissioned:
1. On the Operations Center Overview page, click Clients.
2. In the Clients table, in the At risk column, review the state:
• A DECOMMISSIONED state specifies that the node is decommissioned.
• A null value specifies that the node is not decommissioned.
• A PENDING state specifies that the node is being decommissioned, or the decommission process
failed.
Tip: If you want to determine the status of a pending decommission process, issue the following
command:
query process
• If no status is provided for the decommission process, and you did not receive an error message, the
process is incomplete. A process can be incomplete if files that are associated with the node are not
yet deactivated. After the files are deactivated, run the decommission process again.
• If no status is provided for the decommission process, and you receive an error message, the
process failed. Run the decommission process again.
Related information
DECOMMISSION NODE (Decommission a client node)
DECOMMISSION VM (Decommission a virtual machine)
Procedure
1. From the Operations Center Overview page, click Clients.
2. In the Clients table, select one or more clients and click More > Clean Up.
Command-line method: Deactivate data by using the DEACTIVATE DATA command.
Related information
DEACTIVATE DATA (Deactivate data for a client node)
Procedure
• To increase the disk space for the database, complete the following steps:
• Create one or more directories for the database on separate drives or file systems.
• Issue the EXTEND DBSPACE command to add the directory or directories to the database. The
directories must be accessible to the instance user ID of the database manager. By default, data is
redistributed across all database directories and space is reclaimed.
Tips:
- The time that is needed to complete redistribution of data and reclaiming of space is variable,
depending on the size of your database. Make sure that you plan adequately.
- Ensure that the directories that you specify are the same size as existing directories to ensure a
consistent degree of parallelism for database operations. If one or more directories for the
database are smaller than the others, they reduce the potential for optimized parallel prefetching
and distribution of the database.
• Halt and restart the server to fully use the new directories.
• Reorganize the database if necessary. Index and table reorganization for the server database can
help to avoid unexpected database growth and performance issues. For more information about
reorganizing the database, see technote 1683633.
• To decrease the size of the database for V7.1 servers and later, see the information in technote
1683633.
Restriction: The commands can increase I/O activity, and might affect server performance. To
minimize performance problems, wait until one command is completed before you issue the next
command. The Db2 commands can be issued when the server is running.
• To increase or decrease the size of the active log, complete the following steps:
To change the active log to its maximum size of 512 GB, enter the following server option:
activelogsize 524288
d) If you plan to use a new active log directory, update the directory name that is specified in the
ACTIVELOGDIRECTORY server option. The new directory must be empty and must be accessible to
the user ID of the database manager.
e) Restart the server.
• Compress the archive logs to reduce the amount of space that is required for storage.
Enable dynamic compression of the archive log by issuing the following command:
Restriction: Use caution when you enable the ARCHLOGCOMPRESS server option on systems with
sustained high volume usage and heavy workloads. Enabling this option in this system environment
can cause delays in archiving log files from the active log file system to the archive log file system. This
delay can cause the active log file system to run out of space. Be sure to monitor the available space in
the active log file system after archive log compression is enabled. If the active log directory file
system usage nears out of space conditions, the ARCHLOGCOMPRESS server option must be disabled.
You can use the SETOPT command to disable archive log compression immediately without halting the
server.
Related information
ACTIVELOGSIZE server option
EXTEND DBSPACE (Increase space for the database)
SETOPT (Set a server option for dynamic update)
Procedure
1. Monitor system performance regularly to ensure that backup and maintenance tasks are completing
successfully. For more information about monitoring, see Part 3, “Monitoring a tape solution,” on page
119.
2. If the monitoring information shows that the server workload increased, you might need to review the
planning information. Review whether the capacity of the system is adequate in the following cases:
Figure 6 on page 154 shows an example of collocation by group of client nodes. Three groups are defined,
and the data for each group is stored on separate volumes.
Figure 7 on page 154 shows an example of collocation by file space group. Six groups are defined. Each
group contains data from file spaces that belong to a single node. The data for each group is stored on a
separate volume.
When collocation is disabled, the server tries to use all available space on each volume before it selects a
new volume. While this process provides better use of individual volumes, user files can become
scattered across many volumes. Figure 8 on page 154 shows an example of collocation that is disabled,
with three clients that share space on single volume.
With collocation disabled, more media mount operations might be required to mount volumes when users
restore, retrieve, or recall many files.
Collocation by group is the IBM Spectrum Protect system default for primary sequential-access storage
pools. The default for copy storage pools is no collocation.
Storing data on tape The server attempts to use all The server attempts to use all
available tape volumes to separate available space on each tape
user files before it uses all available volume before the server use
space on every tape volume. another tape volume.
Media mount operations More mount operations are More mount operations are
required when user files are backed required during restore, retrieve,
up, archived, or migrated from and recall of client files.
client nodes directly to sequential-
access volumes.
More mount operations are
required during reclamation and
storage pool migration.
More volumes are managed
because volumes are not fully used.
Generating backup sets Less time is spent searching More time is spent searching
database entries, and fewer mount database entries and fewer mount
operations are required. operations are required.
When collocation is enabled for a group, single client node, or file space, all the data that belongs to the
group, the node, or the file space is moved or copied by one server process. For example, if data is
collocated by group, all data for all nodes that belong to the same collocation group is migrated by the
same process.
When collocating data, the IBM Spectrum Protect server tries to keep files together on a minimal number
of sequential-access storage volumes. However, when the server is backing up data to volumes in a
sequential-access storage pool, the backup process has priority over collocation settings. As a result, the
server completes the backup operation, but might not be able to collocate the data.
For example, suppose that you are collocating by node and you specify that a node can use two mount
points on the server. Suppose also that the data that is backed up from the node can easily fit on one tape
volume. During backup, the server might mount two tape volumes, and the node's data might be
Table 28. How the server selects volumes when collocation is enabled
Volume Selection When collocation is by When collocation is by When collocation is by file
Order group node space
1 A volume that already A volume that already A volume that already
contains files from the contains files from the same contains files from the same
collocation group to which client node file space of that client node
the client belongs
2 An empty predefined volume An empty predefined volume An empty predefined volume
3 An empty scratch volume An empty scratch volume An empty scratch volume
4 A volume with the most A volume with the most A volume that contains data
available free space among available free space among from the same client node
volumes that already contain volumes that already contain
data data
When the server must continue to store data on a second volume, it uses the following selection order to
acquire more space:
1. An empty predefined volume
2. An empty scratch volume
3. A volume with the most available free space among volumes that already contain data
4. Any available volume in the storage pool
When collocation is by client node or file space, the server tries to provide the best use of individual
volumes and minimizes file mixing from different clients or file spaces on volumes. This configuration is
depicted in Figure 9 on page 157, which shows that volume selection is horizontal, where all available
volumes are used before all available space on each volume is used. A, B, C, and D represent files from
four different client nodes.
Tips:
1. If collocation is by node and the node has multiple file spaces, the server does not attempt to
collocate those file spaces.
2. If collocation is by file space and a node has multiple file spaces, the server attempts to put data for
different file spaces on different volumes.
Figure 9. Using all available sequential-access storage volumes with collocation enabled at the node or file
space level
Collocation can be by file space group or node group. When collocation is by node group (node collocation
group), the server tries to collocate data from nodes that belong to the same collocation group. A file
space collocation group uses the same methods as a node collocation group, but can use more space
because of the granularity of file space sizes. As shown in Figure 10 on page 158, data for the following
groups of nodes was collocated:
• Group 1 consists of nodes A, B, and C
• Group 2 consists of nodes D and E
• Group 3 consists of nodes F, G, H, and I
Whenever possible, the IBM Spectrum Protect server collocates data that belongs to a group of nodes on
a single tape, as represented by Group 2 in the figure. Data for a single node can also be spread across
several tapes that are associated with a group (Group 1 and 2). If the nodes in the collocation group have
multiple file spaces, the server does not attempt to collocate those file spaces.
Normally, the IBM Spectrum Protect server always writes data to the current filling volume for the
operation that is running. However, occasionally you might notice more than one filling volume in a
collocated storage pool. Having more than one filling volume in a collocated storage pool can occur if
different server processes or client sessions try to store data into the collocated pool at the same time. In
this situation, IBM Spectrum Protect allocates a volume for each process or session that needs a volume
so that both operations are completed as quickly as possible.
Figure 11. Using all available space on sequential-access volumes with collocation disabled
Collocation settings
After you define a storage pool, you can change the collocation setting by updating the storage pool. The
change in collocation for the pool does not affect files that are already stored in the pool.
For example, if collocation is off for a storage pool and you turn it on, from then on client files that are
stored in the pool are collocated. Files that were previously stored in the storage pool are not moved to
collocate them. As volumes are reclaimed, the data in the pool tends to become more collocated. You can
Table 30. Collocation group options and effects on file space data
Collocation If a file space is not defined as a member If a file space is defined as a member of a
option of a collocation group collocation group
No The data for the file space is not collocated. The data for the file space is not collocated.
Group The server stores the data for the file space The server stores the data for the file space
on as few volumes in the storage pool as and other file spaces that belong to the
possible. same collocation group on as few volumes
as possible.
Node The server stores the data for the node on The server stores the data for the node on as
as few volumes as possible. few volumes as possible.
File space The server stores the data for the node's file The server stores the data for the file spaces
space on as few volumes as possible. If a on as few volumes as possible. If a node has
node has multiple file spaces, the server multiple file spaces, the server stores the
stores the data for different file spaces on data for different file spaces on different
different volumes in the storage pool. volumes in the storage pool.
Procedure
To determine whether and how to collocate data, complete the following steps:
1. Determine how to organize data, whether by client node, group of client nodes, or file space. To
collocate by group, you must decide how to group nodes:
• If the goal is to save space, you might want to group small nodes together to better use tapes.
• If the goal is potentially faster client restores, group nodes together so that they fill as many tapes
as possible. By grouping nodes together, the individual node data is distributed across two or more
tapes and that more tapes can be mounted simultaneously during a multi-session no-query restore
operation.
• If the goal is to departmentalize data, you can group nodes by department.
2. To collocate groups, complete the following steps:
a) Define collocation groups with the DEFINE COLLOCGROUP command.
b) Add client nodes to the collocation groups with the DEFINE COLLOCMEMBER command.
The following query commands are available to help in collocating groups:
QUERY COLLOCGROUP
Displays the collocation groups that are defined on the server.
What to do next
Tip: To reduce the number of media mounts, use space on sequential volumes more efficiently, and
enable collocation, complete the following steps:
• Define a storage pool hierarchy and policy to require that backed-up, archived, or space-managed files
are initially stored in disk storage pools.
When files are migrated from a disk storage pool, the server attempts to migrate all files that belong to
the client node or collocation group that is using the most disk space in the storage pool. This process
works well with the collocation option because the server tries to place all of the files from a particular
client on the same sequential-access storage volume.
• Use scratch volumes for sequential-access storage pools to allow the server to select new volumes for
collocation.
• Specify the client option COLLOCATEBYFILESPEC to limit the number of tapes to which objects
associated with one file specification are written. This collocation option makes collocation by the
server more efficient; it does not override collocation by file space or collocation by node.
Procedure
To prepare a volume for use, complete the following steps:
1. Label the volume by issuing the LABEL LIBVOLUME command.
2. For automated libraries, check the volume into the library. For instructions, see “Checking volumes
into an automated library” on page 165,
Tip: When you use the LABEL LIBVOLUME command with drives in an automated library, you can
label and check in the volumes with one command.
3. If the storage pool cannot contain scratch volumes (MAXSCRATCH=0), identify the volume to IBM
Spectrum Protect by name so that the volume can be accessed later.
If the storage pool can contain scratch volumes (MAXSCRATCH is set to a non-zero value), skip this
step.
Procedure
To label tape volumes before you check them in, complete the following steps:
1. Label tape volumes by issuing the LABEL LIBVOLUME command.
For example, to name a library volume VOLUME1 in a library that is named LIBRARY 1, issue the
following command:
Requirement: At least one drive must be available. The drive cannot be used by another IBM
Spectrum Protect process. If a drive is idle, the drive is considered to be unavailable.
2. To overwrite an existing label, specify the OVERWRITE=YES parameter. By default, the LABEL
LIBVOLUME command does not overwrite an existing label.
Procedure
1. Insert volumes into the entry/exit slot of the library when the server prompts you. The library mounts
each inserted volume into a drive.
2. For a SCSI library, enter a volume name when prompted. A label with the specified name is written to
the volume.
Tip: To prompt for the volume name for a SCSI library, issue the LABEL LIBVOLUME command and
specify the LABELSOURCE=PROMPT parameter.
3. If the library does not have an entry/exit port, you are prompted to remove the tape from a specified
slot number. Remove the tape from the specified slot.
If the library has an entry/exit port, the command by default returns each labeled volume to the entry/
exit port of the library.
Procedure
Overwrite the existing volume labels by issuing the LABEL LIBVOLUME command. For example, if the
name of the library is LIB1 and the volume name is VOLNAME, issue the following command:
Procedure
Issue the DEFINE LIBRARY or UPDATE LIBRARY command and specify the AUTOLABEL parameter.
Tip: If you use the AUTOLABEL parameter with a SCSI library, you must check in tapes by specifying
CHECKLABEL=BARCODE parameter on the CHECKIN LIBVOLUME command. The AUTOLABEL
parameter defaults to YES for all non-SCSI libraries and to NO for SCSI libraries. The
CHECKLABEL=BARCODE parameter is honored only if the library has a bar code reader.
Procedure
To search a library and label volumes, issue the LABEL LIBVOLUME command and specify the
SEARCH=YES parameter.
Tip: If you use a SCSI library and the library has a bar code reader, the LABEL LIBVOLUME command can
use the reader to obtain volume names, instead of prompting you for volume names. The
LABELSOURCE=BARCODE parameter is valid only for SCSI libraries.
For example, to label all volumes in a SCSI library, issue the following command:
IBM Spectrum Protect selects the next available drive so that you can continue your search.
Results
After a volume is labeled, the volume is returned to its original location in the library.
Related information
LABEL LIBVOLUME (Label a library volume)
Procedure
1. To check a storage volume into a library, issue the CHECKIN LIBVOLUME command.
Tip: The command always runs as a background process. Wait for the CHECKIN LIBVOLUME process
to complete processing before you define volumes, or the defining process fails. You can save time by
checking in volumes as part of the labeling operation.
Procedure
1. Issue the CHECKIN LIBVOLUME command.
For example, to check in volume VOL001, enter the following command:
ANR8306I 001: Insert 8MM volume VOL001 R/W in slot with element
address 5 of library TAPELIB within 60 minutes; issue 'REPLY' along
with the request ID when ready.
If you do not know the location of element address 5 in the library, check the worksheet for the
device. To find the worksheet, review the documentation for your library. After you insert the
volume as requested, respond to the message from an IBM Spectrum Protect administrative client.
Issue the REPLY command, followed by the request number (the number at the beginning of the
mount request) for example:
reply 1
Tip: Element addresses are sometimes numbered starting with a number other than 1. Check the
worksheet to be sure. If no worksheet is listed for your device in IBM Support Portal for IBM
Spectrum Protect, see the documentation for your library.
If you specify a wait time of 0 by using the optional WAITTIME parameter on the CHECKIN
LIBVOLUME command, a REPLY command is not required. The default wait time is 60 minutes.
Procedure
1. Open the library and place the new volumes in unused slots.
Procedure
Issue the CHECKIN LIBVOLUME command and specify the SEARCH=BULK parameter.
• To load a tape in a drive and read the label, specify the CHECKLABEL=YES parameter. After the server
reads the label, the server moves the tape from the drive to a storage slot.
• To have the server use the bar code reader to verify external labels on tapes, specify the
CHECKLABEL=BARCODE parameter. When bar code reading is enabled, the server reads the label
and moves the tape from the entry/exit port to a storage slot.
Procedure
Issue the CHECKIN LIBVOLUME command with the CHECKLABEL=BARCODE parameter.
For example, to use a bar code reader to search a library that is named TAPELIB and check in a scratch
tape, issue the following command:
Related tasks
Preparing removable media
You must prepare removable media before it can be used to store data. Typical preparation tasks include
labeling and checking in volumes.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
Procedure
• To swap volumes if an empty library slot is not available to check in a volume, issue the CHECKIN
LIBVOLUME command and specify the SWAP=YES parameter.
For example, to check in a volume that is named VOL1 into a library that is named AUTO and specify
swapping, issue the following command:
Related tasks
Managing a full library with an overflow location
As the demand for storage grows, the number of volumes that you need for a storage pool might exceed
the physical capacity of an automated library. To make space available for new volumes and to monitor
existing volumes, you can define an overflow location for a storage pool.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
Related tasks
Changing the status of a volume in an automated library
You can change the status of a volume from private to scratch or from scratch to private.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
DELETE VOLUME (Delete a storage pool volume)
Procedure
To control access to volumes, take any of the following actions:
• To prevent the server from mounting a volume, issue the UPDATE VOLUME command and specify the
ACCESS=UNAVAILABLE parameter.
• To make volumes unavailable and send them offsite for protection, use a copy storage pool or an
active-data storage pool.
• You can back up primary storage pools to a copy storage pool and then send the copy storage pool
volumes offsite.
• You can copy active versions of client backup data to active-data storage pools, and then send the
volumes offsite.
• You can track copy storage pool volumes and active-data pool volumes by changing their access mode
to offsite, and updating the volume history to identify their location.
Related information
UPDATE VOLUME (Update a storage pool volume)
Reusing tapes
To ensure an adequate supply of tapes, you can expire old files, reclaim volumes, and delete volumes that
reach end of life. You can also maintain a supply of scratch volumes.
Procedure
1. Delete unnecessary client data by regularly running expiration processing. Expiration processing
deletes data that is no longer valid either because it exceeds the retention specifications in the policy
or because users or administrators deleted the active versions of the data.
2. Reuse volumes in storage pools by running reclamation processing.
Reclamation processing consolidates any unexpired data by moving it from multiple volumes onto
fewer volumes. The media can then be returned to the storage pool and reused.
3. Reuse volumes that contain outdated database backups or exported data that is no longer required by
deleting volume history.
Procedure
When a storage pool needs more than the maximum number of scratch volumes, you can take one or both
of the following actions:
1. Increase the maximum number of scratch volumes by issuing the UPDATE STGPOOL command and
specifying the MAXSCRATCH parameter.
2. Make volumes available for reuse by running expiration processing and reclamation to consolidate
data onto fewer volumes.
a) Issue the EXPIRE INVENTORY command to run expiration processing.
Tip: By default this process automatically runs every day. You can also specify the EXPINTERVAL
server option in the server options file, dsmserv.opt, to run expiration processing automatically. A
value of 0 means that you must use the EXPIRE INVENTORY command to run expiration
processing.
b) Issue the RECLAIM STGPOOL command to run reclamation processing.
Tip: You can also specify reclamation thresholds when you define the storage pool by using the
DEFINE STGPOOL command and specifying the RECLAIMPROCESS parameter.
What to do next
If you need more volumes for future backup operations, label more scratch volumes by using the LABEL
LIBVOLUME command.
Related tasks
Maintaining a supply of scratch volumes in an automated library
When you define a storage pool that is associated with an automated library, you can specify a maximum
number of scratch volumes equal to the physical capacity of the library. If the server is using a greater
number of scratch volumes for the storage pool, you must ensure that enough volumes are available.
Related information
EXPIRE INVENTORY (Manually start inventory expiration processing)
LABEL LIBVOLUME (Label a library volume)
RECLAIM STGPOOL (Reclaim volumes in a sequential-access storage pool)
UPDATE STGPOOL (Update a storage pool)
Procedure
1. Ensure that the storage pool that is associated with the library has sufficient scratch volumes. Issue
the UPDATE STGPOOL command and specify the MAXSCRATCH parameter.
2. To manage the expected load, check in a sufficient number of scratch or private volumes to the library
by issuing the CHECKIN LIBVOLUME command.
3. To control transaction size, specify the TXNGROUPMAX server option and the TXNBYTELIMIT client
option. If your clients tend to store small files, controlling the transaction size can affect how WORM
volumes are used. Smaller transactions waste less space when a transaction such as a backup must
be canceled.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
UPDATE STGPOOL (Update a storage pool)
Txnbytelimit option
TXNGROUPMAX server option
Procedure
To change the status of a volume, issue the UPDATE LIBVOLUME command.
For example, to change the status of a volume that is named VOL1 to a private volume, issue the following
command:
Restrictions:
• You cannot change the status of a volume from private to scratch if the volume belongs to a storage
pool or is defined in the volume history file.
• Private volumes must be administrator-defined volumes with either no data or invalid data. They cannot
be partially written volumes that contain active data. Volume statistics are lost when volume statuses
are modified.
Procedure
• To remove a volume from an automated library, issue the CHECKOUT LIBVOLUME command.
• For automated libraries with multiple entry/exit ports, issue the CHECKOUT LIBVOLUME command
and specify the REMOVE=BULK parameter. The server ejects the volume to the next available entry/
exit port.
What to do next
If you check out a volume that is defined in a storage pool and the server must access the volume later,
the server requests that the volume be checked in. To return volumes to a library, issue the CHECKIN
LIBVOLUME command.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
CHECKOUT LIBVOLUME (Check a storage volume out of a library)
Procedure
If the number of scratch volumes that the server is using for the storage pool exceeds the number that is
specified in the storage pool definition, complete the following steps:
1. Add scratch volumes to the library by issuing the CHECKIN LIBVOLUME command.
Tip: You might have to use an overflow location to move volumes out of the library to make room for
these scratch volumes. For more information, see “Managing a full library with an overflow location”
on page 175.
What to do next
You might need more volumes for future recovery operations, so consider labeling and setting aside extra
scratch volumes.
Related tasks
Maintaining a supply of scratch volumes
You must set the maximum number of scratch volumes for a storage pool high enough for the expected
usage.
Procedure
1. Create a volume overflow location. Define or update the storage pool that is associated with the
automated library by issuing the DEFINE STGPOOL or UPDATE STGPOOL command and specifying the
OVFLOCATION parameter.
For example, to create an overflow location that is named ROOM2948 for a storage pool that is named
ARCHIVEPOOL, issue the following command:
2. When you need to create space in the library for scratch volumes, move full volumes to the overflow
location by issuing the MOVE MEDIA command.
For example, to move all full volumes in the specified storage pool out of the library, issue the
following command:
5. If the server requests additional volumes, locate and check in volumes from the overflow location.
To find volumes in an overflow location, issue the QUERY MEDIA command. You can also use the
QUERY MEDIA command to generate commands by checking in volumes.
For example, to list the volumes in the overflow location, and at the same time generate the
commands to check those volumes into the library, issue a command that is similar to the following
example:
Tips:
Procedure
1. Ensure that no volumes are mounted in the library drives. If any volumes are mounted in the IDLE
state, issue the DISMOUNT VOLUME command to dismount them.
2. Audit the volume inventory by issuing the AUDIT LIBRARY command. Take one of the following
actions:
• If the library has a bar code reader, you can save time by using the bar code reader to identify
volumes. For example, to audit the TAPELIB library by using its bar code reader, issue the following
command:
• If the library does not have a bar code reader, issue the AUDIT LIBRARY command without
specifying CHECKLABEL=BARCODE. The server mounts each volume to verify the label. After the
label is verified, the server completes auditing any remaining volumes.
Results
The server deletes missing volumes from the inventory and updates the locations of volumes that moved
since the last audit.
Restriction: The server cannot add new volumes to the inventory during an audit operation.
Related tasks
Labeling tape volumes
You must label tape volumes before the server can use them.
Related information
AUDIT LIBRARY (Audit volume inventories in an automated library)
DISMOUNT VOLUME (Dismount a volume by volume name)
Table 32. How SAN-enabled servers process IBM Spectrum Protect operations
Operation Library manager Library client
(Command)
Query library volumes Displays the volumes that are Not applicable.
checked into the library. For
(QUERY LIBVOLUME) private volumes, the owner
server is also displayed.
Check in and check out library Sends the commands to the Not applicable.
volumes library device.
When a check-in operation is
(CHECKIN LIBVOLUME, required because of a client
CHECKOUT LIBVOLUME) restore operation, a request is
sent to the library manager
server.
Move media and move DRM Valid only for volumes that are Requests that the library
media used by the library manager manager server completes the
server. operation. Generates a check-out
(MOVE MEDIA, process on the library manager
MOVE DRMEDIA) server.
Audit library inventory Synchronizes the inventory with Synchronizes the inventory with
the library device. the library manager server.
(AUDIT LIBRARY)
(LABEL LIBVOLUME)
Dismount a volume Sends the request to the library Requests that the library
device. manager server completes the
(DISMOUNT VOLUME) operation.
Query a volume Checks whether the volume is Requests that the library
owned by the requesting library manager server completes the
(QUERY VOLUME) client and checks whether the operation.
volume is in the library device.
Procedure
• The following table provides information about how to handle different server media tasks.
Task Details
Use the administrative client The server sends mount request status messages to the server console and to
for mount messages all administrative command-line clients in mount mode or console mode.
To start an administrative command-line client in mount mode, issue the
dsmadmc -mountmode command on the administrative command-line client.
Receive messages about You can view mount messages and error messages about automated libraries
automated libraries on administrative command-line clients in mount mode or console mode.
Mount messages are sent to the library and not to an operator. Messages about
problems with the library are sent to the mount message queue.
Get information about To get information about pending operator requests, issue the QUERY REQUEST
pending operator requests command or view the mount message queue on an administrative command-
line client that is started in mount mode. When you issue the QUERY REQUEST
command, the server displays requested actions and the amount of time that is
remaining before the requests time out.
Cancel an operator request To cancel a mount request for a library, issue the CANCEL REQUEST command.
For most requests that are associated with automated SCSI libraries, an
operator must complete a hardware or system action to cancel the requested
mount. For such requests, the CANCEL REQUEST command is not accepted by
the server.
The CANCEL REQUEST command must include the request identification
number. This number is included in the request message.
If you want to mark the requested volume as UNAVAILABLE, issue the CANCEL
REQUEST command and specify the PERMANENT parameter. If you specify the
PERMANENT parameter, the server does not try to mount the requested
volume again. This is useful if, for example, the volume is at a remote site or is
otherwise unavailable.
Respond to a volume check- If the server cannot find a particular volume to mount in an automated library,
in request the server requests that the operator check in the volume.
If the requested volume is available, place the volume in the library and check it
in. For more information, see “Checking volumes into an automated library” on
page 165.
If the requested volume is unavailable, update the access mode of the volume
by issuing the UPDATE VOLUME command and specifying the
ACCESS=UNAVAILABLE parameter. Then, cancel the check-in request by
using the CANCEL REQUEST command. Do not cancel the client process that
caused the request. Use the QUERY REQUEST command to obtain the ID of the
request that you want to cancel.
If you do not respond to the check-in request from the server within the mount-
wait period that is specified for the device class for the storage pool, the server
marks the volume as unavailable.
Determine which volumes For a report about all volumes that are currently mounted for use by the server,
are mounted issue the QUERY MOUNT command. The report shows which volumes are
mounted, which drives accessed them, and whether the volumes are in use.
Dismount idle volumes When a volume is idle, the server keeps it mounted for a time that is specified
by the mount retention parameter for the device class. Using a mount retention
value can reduce the access time when volumes are used repeatedly.
To dismount an idle volume from the drive where it is mounted, issue the
DISMOUNT VOLUME command.
For information about setting mount retention times, see “Controlling the
amount of time that a volume remains mounted” on page 110.
Related information
QUERY REQUEST (Query one or more pending mount requests)
Updating drives
You can change the attributes of a drive definition to take a drive offline or reconfigure it.
Procedure
• Change the element address of a drive by issuing the UPDATE DRIVE command.
For example, in a library that is named AUTO, change the element address of DRIVE3 to 119 by issuing
the following command:
• Change the device name of a drive by issuing the UPDATE PATH command.
For example, to change the device name of a drive that is named DRIVE3, issue the following
command:
Related information
UPDATE DRIVE (Update a drive)
UPDATE PATH (Change a path)
Procedure
• To change the status of a drive, issue the UPDATE DRIVE command and specify the ONLINE
parameter. For example, to update the DRIVE3 drive in the MANLIB library and take the drive offline,
issue the following command:
Restriction: Do not specify other optional parameters when you specify the ONLINE parameter. If you
do, the drive is not updated, and the command fails when the drive is in use.
Results
If you update all drives in a library to an offline status, processes that require a library mount point fail.
The updated state of the drive is retained even when the server is halted and restarted. If a drive is
marked offline when the server is restarted, a warning is issued stating that the drive must be manually
brought online.
Related information
UPDATE DRIVE (Update a drive)
Tips:
• To enable logical block protection for a tape volume and then reuse the volume to back up data, you
must enable logical block protection for the device class and the drive.
• If you have a 3592, LTO, or Oracle StorageTek drive that is not capable of logical block protection, you
can upgrade the drive with firmware that provides logical block protection.
Logical block protection is available for drives that are in SCSI libraries. For the most current information
about support for logical block protection, see technote 1568108.
To use logical block protection for write operations, all drives in the library must support logical block
protection. If a drive is not capable of logical block protection, volumes that have read/write access are
not mounted. However, the server can use the drive to mount volumes that have read-only access. The
protected data is read and validated by the IBM Spectrum Protect server if logical block protection is
enabled for read/write operations.
Procedure
1. To enable logical block protection for the 3592, LTO, and ECARTRIDGE device types, issue the DEFINE
DEVCLASS or the UPDATE DEVCLASS command and specify the LBPROTECT parameter.
For example, to specify logical block protection during read and write operations for a 3592 device
class that is named 3592_lbprotect, issue the following command:
Tips:
• If you update the value of the LBPROTECT parameter from NO to READWRITE or WRITEONLY and
the server selects a filling volume without logical block protection for write operations, the server
issues a message each time the volume is mounted. The message indicates that data is written to
the volume without logical block protection. To prevent this message from displaying or to have IBM
Spectrum Protect write data only with logical block protection, update the access of filling volumes
without logical block protection to read-only.
• To improve performance, do not specify the CRCDATA parameter on the DEFINE STGPOOL or
UPDATE STGPOOL command.
• When data is validated during read operations by both the drive and by the IBM Spectrum Protect
server, it can slow server performance during restore and retrieve operations. To reduce the time
that is required for restore and retrieve operations, change the setting of the LBPROTECT parameter
from READWRITE to WRITEONLY. After data is restored or retrieved, you can reset the LBPROTECT
parameter to READWRITE.
2. To disable logical block protection, issue the DEFINE DEVCLASS or the UPDATE DEVCLASS command
and specify the LBPROTECT=NO parameter.
Restriction: If logical block protection is disabled, the server does not write to an empty tape with
logical block protection. However, if a filling volume with logical block protection is selected, the
server continues to write to the volume with logical block protection. To prevent the server from
writing to tapes with logical block protection, change the access of filling volumes with logical block
protection to read-only. When data is read, the CRC results are not checked by the drive or server.
If a disaster occurs and the disaster recovery site does not have drives that support logical block
protection, you must specify the LBPROTECT=NO parameter. If the tape drives are used for write
operations, you must change the volume access for volumes with protected data to read-only to
prevent the server from using the volumes.
If the server must enable logical block protection, the server issues an error message that indicates
that the drive does not support logical block protection.
What to do next
To determine whether a volume has logical block protection, issue the QUERY VOLUME command and
review the value in the Logical Block Protection field.
Related information
DEFINE DEVCLASS (Define a device class)
DEFINE STGPOOL (Define a volume in a storage pool)
QUERY VOLUME (Query storage pool volumes)
UPDATE DEVCLASS (Update a device class)
UPDATE STGPOOL (Update a storage pool)
Related information
DEFINE DEVCLASS (Define a device class)
DEFINE LIBRARY (Define a library)
DEFINE STGPOOL (Define a volume in a storage pool)
Procedure
Define or update the drives in the library, by using the CLEANFREQUENCY parameter in the DEFINE
DRIVE or UPDATE DRIVE command.
For example, to clean a drive that is named DRIVE1 after 100 GB of data is processed, issue the following
command:
Results
After the cleaner cartridge is checked in, the server mounts the cleaner cartridge in a drive when the drive
needs cleaning. The server uses that cleaner cartridge for the number of specified cleanings. For more
information, see “Operations with cleaner cartridges” on page 136.
What to do next
Check the cleaner cartridge into the library volume inventory by following the instructions in “Checking a
cleaner cartridge into a library” on page 188.
Related information
DEFINE DRIVE (Define a drive to a library)
UPDATE DRIVE (Update a drive)
Procedure
To check a cleaner cartridge into a library, issue the CHECKIN LIBVOLUME command.
For example, to check in a cleaner cartridge that is named AUTOLIB1, issue the following command:
The server requests that the cartridge is placed in the entry/exit port, or into a specific slot.
Related information
CHECKIN LIBVOLUME (Check a storage volume into a library)
Procedure
1. Stop the IBM Spectrum Protect server and shut down the operating system.
2. Remove the old drive and follow the manufacturer's instructions to install the new drive.
3. Restart the operating system and the IBM Spectrum Protect server.
4. Delete the path from the server to the drive.
For example, to delete a path from SERVER1 to LIB1, issue the following command:
Related information
DELETE DRIVE (Delete a drive from a library)
DELETE PATH (Delete a path)
Procedure
1. Delete the path and drive definitions for the old drive. For example, to delete a drive that is named
DRIVE1 from a library that is named LIB1, enter the following command:
2. Power off the library, remove the original drive, replace it with the new drive, and power on the library.
3. Refresh the host system to ensure that the system detects the new drive.
4. Define the new drive and path. For example, to define a new drive, DRIVE2, and a path to it from
SERVER2, if you are using the IBM Spectrum Protect device driver, enter the following commands:
Tip: You can use your existing library, device class, and storage pool definitions.
Related information
DELETE DRIVE (Delete a drive from a library)
DELETE PATH (Delete a path)
2. Update the management-class definitions to store data in the DISK storage pool by using the UPDATE
MGMTCLASS command.
Related information
DEFINE STGPOOL (Define a volume in a storage pool)
UPDATE MGMTCLASS (Update a management class)
UPDATE STGPOOL (Update a storage pool)
Managing administrators
An administrator who has system authority can complete any task with the IBM Spectrum Protect server,
including assigning authority levels to other administrators. To complete some tasks, you must be granted
authority by being assigned one or more authority levels.
Procedure
Complete the following tasks to modify administrator settings.
Task Procedure
Add an administrator. To add an administrator, ADMIN1, with system
authority and specify a password, complete the
following steps:
a. Register the administrator and specify Pa$#
$twO as the password by issuing the following
command:
Temporarily prevent access to the server. Lock or unlock an administrator by using the LOCK
ADMIN or UNLOCK ADMIN command.
Related concepts
Planning for administrator roles
Procedure
Complete the following tasks to change password requirements for IBM Spectrum Protect servers.
Set a minimum length for passwords. a. On the Servers page in the Operations Center,
select the server.
b. Click Details and then click the Properties tab.
c. Set the number of characters in the Minimum
password length field.
Set the expiration period for passwords. a. On the Servers page in the Operations Center,
select the server.
b. Click Details and then click the Properties tab.
c. Set the number of days in the Password
common expiration field.
Procedure
Ensure that unauthorized users cannot access the directories for the server database and the server
instance. Keep the access settings for these directories that you configured during implementation.
Procedure
1. After you register an administrator by using the REGISTER ADMIN command, use the GRANT
AUTHORITY command to set the administrator's authority level.
For details about setting and changing authority, see “Managing administrators” on page 193.
2. To control the authority of an administrator to complete some tasks, use the following two server
options:
a) You can select the authority level that an administrator must have to issue QUERY and SELECT
commands with the QUERYAUTH server option. By default, no authority level is required. You can
change the requirement to one of the authority levels, including system.
b) You can specify that system authority is required for commands that cause the server to write to an
external file with the REQSYSAUTHOUTFILE server option. By default, system authority is required
for such commands.
3. You can restrict data backup on a client node to only root user IDs or authorized users.
For example, to limit backups to the root user ID, issue the REGISTER NODE or UPDATE NODE
command and specify the BACKUPINITIATION=root parameter:
Procedure
To prepare the system and stop the server, complete the following steps:
1. Prevent new client node sessions from starting by issuing the DISABLE SESSIONS command:
2. Determine whether any client node sessions or processes are in progress by completing the following
steps:
a. On the Overview page of the Operations Center, view the Activity area for the total numbers of
processes and sessions that are currently active. If numbers differ significantly from the usual
numbers that are displayed during your daily storage-management routine, view other status
indicators in the Operations Center to check whether there is a problem.
b. View the graph in the Activity area to compare the amount of network traffic over the following
periods:
• The current period, that is, the most recent 24-hour period
• The previous period, that is, the 24 hours before the current period
If the graph for the previous period represents the expected amount of traffic, significant
differences on the graph for the current period might indicate a problem.
c. On the Servers page, select a server for which you want to view processes and sessions, and click
Details. If the server is not registered as a hub or spoke server in the Operations Center, obtain
information about processes by using administrative commands. Issue the QUERY PROCESS
command to query processes and obtain information about sessions by issuing the QUERY
SESSION command.
3. Wait until the client node sessions are completed or cancel them. To cancel processes and sessions,
complete the following steps:
• On the Servers page, select a server for which you want to view processes and sessions, and click
Details.
• Click the Active Tasks tab, and select one or more processes, sessions, or a combination of both
that you want to cancel.
halt
Procedure
• To start the server in maintenance mode, issue the following command:
dsmserv maintenance
Tip: To view a video about starting the server in maintenance mode, see Starting a server in
maintenance mode.
What to do next
To resume server operations in production mode, complete the following steps:
1. Shut down the server by issuing the HALT command:
halt
2. Start the server by using the method that you use in production mode. Follow the instructions for your
operating system:
Procedure
1. Review the list of fix packs and interim fixes. See IBM Spectrum Protect Downloads - Latest Fix Packs
and Interim Fixes.
2. Review product improvements, which are described in readme files.
Tip: When you obtain the installation package file from the support site, you can also access the
readme file.
3. Ensure that the version that you upgrade your server to is compatible with other components, such as
storage agents and library clients. See technote 1302789.
4. If your solution includes servers or clients at a level that is earlier than V7.1, review the guidelines to
ensure that client backup and archive operations are not disrupted. See technote 1053218.
5. Review the upgrade instructions. Ensure that you back up the server database, the device
configuration information, and the volume history file.
What to do next
To install a fix pack or interim fix, follow the instructions for your operating system:
• Installing an server fix pack
• Installing an server fix pack
• Installing an server fix pack
Related information
Upgrade and Migration Process - Frequently Asked Questions Learn more about the IBM Spectrum
Protectupgrade and migration process and view relevant technotes.
Procedure
1. Cancel processes and sessions that are in progress by completing the following steps:
a. In the Operations Center, on the Servers page, select a server for which you want to view
processes and sessions, and click Details.
b. Click the Active Tasks tab, and select one or more processes, sessions, or a combination of both
that you want to cancel.
c. Click Cancel.
2. Stop the server by issuing the HALT command:
halt
Tip: You can issue the halt command from the Operations Center by hovering over the Settings icon
and clicking Command Builder. Then, select the server, type halt, and press Enter.
Related information
HALT (Shut down the server)
SERVER.REQUIREMENTS Identifies the database and recovery log storage requirements for
the server.
RECOVERY.INSTRUCTIONS.OFFSITE Contains instructions that the administrator enters in the file that is
identified by the prefix RECOVERY.INSTRUCTIONS.OFFSITE. The
instructions describe the name and location of the offsite vault, and
how to contact the vault administrator (for example, a name and
phone number).
RECOVERY.INSTRUCTIONS.INSTALL Contains instructions that the administrator enters in the file that is
identified by the prefix RECOVERY.INSTRUCTIONS.INSTALL. The
instructions describe how to rebuild the base server and provide the
location of the system image backup copies.
RECOVERY.INSTRUCTIONS.DATABASE Contains instructions that the administrator enters in the file that is
identified by the prefix RECOVERY.INSTRUCTIONS.DATABASE. The
instructions describe how to prepare for the database recovery. For
example, you might enter instructions about how to initialize or load
the backup volumes for an automated library. No sample of this
stanza is provided.
RECOVERY.INSTRUCTIONS.STGPOOL Contains instructions that the administrator enters in the file that is
identified by the prefix RECOVERY.INSTRUCTIONS.STGPOOL. The
instructions include the names of your software applications and
the copy storage pool names that contain the backups of these
applications. No sample of this stanza is provided.
RECOVERY.VOLUMES.REQUIRED Provides a list of the database backup and copy storage pool
volumes that are required to recover the server. A database backup
volume is included if it is part of the most recent database backup
series. A copy storage pool volume is included if it is not empty and
not marked destroyed.
RECOVERY.DEVICES.REQUIRED Provides details about the devices that are required to read the
backup volumes.
RECOVERY.SCRIPT.DISASTER.RECOVERY.MODE Contains a script with the commands that are required to recover
the server.
RECOVERY.SCRIPT.NORMAL.MODE Contains a script with the commands that are required to restore
the server primary storage pools.
DB.STORAGEPATHS Identifies the directories for the IBM Spectrum Protect database.
COPYSTGPOOL.VOLUMES.AVAILABLE Contains a macro to mark copy storage pool volumes that were
moved offsite and then moved back onsite. You can use the
information as a guide and issue the administrative commands.
Alternatively, copy, modify, and run the macro to a file. This macro is
started by the RECOVERY.SCRIPT.DISASTER.RECOVERY.MODE
script.
STGPOOLS.RESTORE Contains a macro to restore the primary storage pools. You can use
the stanza as a guide and run the administrative commands from a
command line. You can also copy, modify, and run it to a file. This
macro is started by the RECOVERY.SCRIPT.NORMAL.MODE script.
DSMSERV.OPT.FILE Contains a copy of the server options file. This stanza is used by the
RECOVERY.SCRIPT.DISASTER.RECOVERY.MODE script.
LICENSE.INFORMATION Contains a copy of the latest license audit results and the server
license terms.
MACHINE.GENERAL.INFORMATION Provides information for the server machine, such as its location,
which is needed to rebuild the server machine. This stanza is
included in the plan file if the machine information is saved in the
database by using the DEFINE MACHINE command and specifying
the ADSMSERVER=YES.
MACHINE.RECOVERY.INSTRUCTIONS Provides the recovery instructions about the server machine. This
stanza is included in the plan file if the machine recovery
instructions are saved in the database.
MACHINE.RECOVERY.CHARACTERISTICS Provides the hardware and software characteristics for the server
machine. This stanza is included in the plan file if the machine
characteristics are saved in the database.
MACHINE.RECOVERY.MEDIA Provides information about the media that are required for
rebuilding the machine that contains the server. This stanza is
included in the plan file if recovery media information is saved in the
database and it is associated with the machine that contains the
server.
Procedure
1. Get the latest recovery plan.
2. Review the recovery steps that are described in the RECOVERY.INSTRUCTIONS.GENERAL stanza of
the plan.
3. Separate the stanzas of the plan file into individual files for general preliminary instructions, IBM
Spectrum Protect server recovery scripts, and client recovery instructions.
4. Retrieve all required recovery volumes (as listed in the plan) from the vault.
5. Review the device configuration file to ensure that the hardware configuration at the recovery site is
the same as the original site. Any differences must be updated in the device configuration file. The
following example configuration changes require updates to the configuration information:
• Different device names.
Chapter 10. Preparing for and recovering from a disaster by using DRM 207
• For automated libraries, the requirement of manually placing the database backup volumes in the
automated library and updating the configuration information to identify the element within the
library. This allows the server to locate the required database backup volumes.
6. Set up replacement hardware for the IBM Spectrum Protect server, including the operating system and
the IBM Spectrum Protect base release installation.
7. Run the IBM Spectrum Protect server recovery scripts from the recovery plan. The
RECOVERY.SCRIPT.DISASTER.RECOVERY.MODE and RECOVERY.SCRIPT.NORMAL.MODE stanzas
contain executable command files that can be used to drive the recovery of the IBM Spectrum Protect
server by calling other command files that were generated in the plan. The
RECOVERY.SCRIPT.DISASTER.RECOVERY.MODE script recovers the server to the point where clients
can begin restores directly from the copy storage pool volumes.
8. Restore the primary storage pools by using the RECOVERY.SCRIPT.NORMAL.MODE script.
9. Start client restore operations in order of highest priority, as defined in your high-level planning.
What to do next
The IBM Spectrum Protect server can now be used for normal server operations. Ensure that all required
operations are scheduled. For instructions, see “Defining schedules for server maintenance activities” on
page 53 and Scheduling backup and archive operations.
Related information
PREPARE (Create a recovery plan file)
Repairing and recovering data in directory-container storage pools
Procedure
1. Ensure that tapes are available onsite. Issue the QUERY LIBVOLUME command to identify volumes
that are checked into an automated library.
2. Back up the database to the onsite tapes by completing the following steps:
a. On the Servers page of the Operations Center, select the server whose database you want to back
up.
b. Click Back Up, and follow the instructions in the Back Up Database window.
3. Copy the following files to the home directory of the server at the recovery site:
• Disaster recovery plan file
• Volume history file
• Device configuration file
• Optional: dsmserv.opt server options file
4. Move the tape to the offsite recovery location.
5. Restore the server database by using the DSMSERV RESTORE DB utility on the recovery server. For
more information about restoring the server database, see t_tape_db_restore.dita.
6. Issue the UPDATE VOLUME command and specify the ACCESS=DESTROYED parameter to indicate
that an entire volume must be restored.
7. On the recovery server, restore the storage pool volumes by using the RESTORE STGPOOL command.
What to do next
Ensure that you can access the data in the library by auditing a tape volume in the restored storage pool
to verify that the data is consistent. Issue the AUDIT VOLUME command to audit a tape volume. For faster
performance, audit restored data only.
Related tasks
Auditing the volume inventory in a library
You can audit an automated library to ensure that the library volume inventory is consistent with the
volumes that are physically in the library. You might want to audit a library if the library volume inventory
is distorted due to manual movement of volumes in the library or to database problems.
Related information
AUDIT VOLUME (Verify database information for a storage pool volume)
DSMSERV RESTORE DB (Restore the database)
RESTORE STGPOOL (Restore storage pool data)
Chapter 10. Preparing for and recovering from a disaster by using DRM 209
Restoring the database
If you have the disaster recovery manager (DRM) function enabled and you followed the procedure to
prepare for a disaster, you can restore the database after a disaster. If you do not have DRM configured,
you can still restore the database, provided that you have the required backup files.
Procedure
Use the DSMSERV RESTORE DB server utility to restore the database. Depending on the version of the
database that you want to restore, choose one of the following methods:
• Restore a database to its latest version. For example, use the following command:
dsmserv restore db
• Restore a database to a point in time. For example, to restore the database to a backup series that was
created on 19 April 2017, use the following command:
Related information
DSMSERV RESTORE DB (Restore the database)
Overview
The IBM Spectrum Protect family of products includes the following major accessibility features:
• Keyboard-only operation
• Operations that use a screen reader
The IBM Spectrum Protect family of products uses the latest W3C Standard, WAI-ARIA 1.0
(www.w3.org/TR/wai-aria/), to ensure compliance with US Section 508 (www.access-board.gov/
guidelines-and-standards/communications-and-it/about-the-section-508-standards/section-508-
standards) and Web Content Accessibility Guidelines (WCAG) 2.0 (www.w3.org/TR/WCAG20/). To take
advantage of accessibility features, use the latest release of your screen reader and the latest web
browser that is supported by the product.
The product documentation in IBM Knowledge Center is enabled for accessibility. The accessibility
features of IBM Knowledge Center are described in the Accessibility section of the IBM Knowledge Center
help (www.ibm.com/support/knowledgecenter/about/releasenotes.html?view=kc#accessibility).
Keyboard navigation
This product uses standard navigation keys.
Interface information
User interfaces do not have content that flashes 2 - 55 times per second.
Web user interfaces rely on cascading style sheets to render content properly and to provide a usable
experience. The application provides an equivalent way for low-vision users to use system display
settings, including high-contrast mode. You can control font size by using the device or web browser
settings.
Web user interfaces include WAI-ARIA navigational landmarks that you can use to quickly navigate to
functional areas in the application.
Vendor software
The IBM Spectrum Protect product family includes certain vendor software that is not covered under the
IBM license agreement. IBM makes no representation about the accessibility features of these products.
Contact the vendor for accessibility information about its products.
TTY service
800-IBM-3383 (800-426-3383)
(within North America)
For more information about the commitment that IBM has to accessibility, see IBM Accessibility
(www.ibm.com/able).
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs
in any form without payment to IBM, for the purposes of developing, using, marketing or distributing
application programs conforming to the application programming interface for the operating platform for
which the sample programs are written. These examples have not been thoroughly tested under all
conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these
programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be
liable for any damages arising out of your use of the sample programs.
Each copy or any portion of these sample programs or any derivative work must include a copyright notice
as follows: © (your company name) (year). Portions of this code are derived from IBM Corp. Sample
Programs. © Copyright IBM Corp. _enter the year or years_.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe is a registered trademark of Adobe Systems Incorporated in the United States, and/or other
countries.
Linear Tape-Open, LTO, and Ultrium are trademarks of HP, IBM Corp. and Quantum in the U.S. and other
countries.
Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the
United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Java™ and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, VMware vCenter Server, and VMware vSphere are registered trademarks or trademarks of
VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.
214 Notices
Terms and conditions for product documentation
Permissions for the use of these publications are granted subject to the following terms and conditions.
Applicability
These terms and conditions are in addition to any terms of use for the IBM website.
Personal use
You may reproduce these publications for your personal, noncommercial use provided that all
proprietary notices are preserved. You may not distribute, display or make derivative work of these
publications, or any portion thereof, without the express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within your enterprise provided
that all proprietary notices are preserved. You may not make derivative works of these publications,
or reproduce, distribute or display these publications or any portion thereof outside your enterprise,
without the express consent of IBM.
Rights
Except as expressly granted in this permission, no other permissions, licenses or rights are granted,
either express or implied, to the publications or any information, data, software or other intellectual
property contained therein.
IBM reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use
of the publications is detrimental to its interest or, as determined by IBM, the above instructions are
not being properly followed.
You may not download, export or re-export this information except in full compliance with all
applicable laws and regulations, including all United States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS
ARE PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-
INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE.
Notices 215
216 IBM Spectrum Protect: Tape Solution Guide
Glossary
A glossary is available with terms and definitions for the IBM Spectrum Protect family of products.
See the IBM Spectrum Protect glossary.
219
collocation (continued) device driver (continued)
enabling 159 configuring 69, 70, 73, 74
enabling for sequential storage pool 153 for automated library devices 61
how the server selects volumes when disabled 158 IBM Spectrum Protect, installing 61
planning 159 installing 60
selecting volumes when enabled 156 requirements 60
commands device drivers
HALT 197 installing 64
commands, administrative device type
AUDIT LIBVOLUME 176 LTO 79
CHECKIN LIBVOLUME 165, 167 multiple in a single library 17, 19
CHECKOUT LIBVOLUME 174 device, storage
CLEAN DRIVE 185 device information 113
DEFINE DEVCLASS replacing tape drive 189
3592 82 required IBM Spectrum Protect definitions 19
LTO device classes 79 devices
DEFINE DRIVE 77 defining 76
DEFINE LIBRARY 76 diagnostics, for device 113
UPDATE DRIVE 181 disability 211
UPDATE LIBVOLUME 174 disaster recovery 58, 59, 205
UPDATE VOLUME 170 disaster recovery manager 58, 59, 205
VALIDATE LANFREE 103 DISMOUNT VOLUME command 178
configuration DLT WORM media 113
changing 144 drive
clients 98 cleaning 185, 189
configuring defining 77
shared library 85 detecting changes on a SAN 112
configuring libraries element address 77
SCSI 74 serial number 77
updating 181
drive cleaning 186
D DRIVEENCRYPTION parameter
daily checklist of monitoring tasks 119 3592 device class 84
data LTO device class 81
deactivating 149 driver, device
data encryption 104 configuring 69
data migration 2 for automated library devices 61
data protection with WORM media 113 IBM Spectrum Protect, installing 61
data recovery installing 60
strategy 208 requirements 60
data retention rules driver, tape device
define 53 installing 62
database capacity 151 requirements 62
database restore 210 drivers, device 65
deactivation process DRM 58, 59, 205
backup data 149 DSMSERV RESTORE DB 210
decommission process
client node 147 E
define drive 190
DEFINE DRIVE command 77 electronic vaulting 22
DEFINE LIBRARY command 76 element address 77, 169
DELETE DRIVE 189 email reports
determining configuring 138
the time interval for volume check in 110 encryption
device DRIVEENCRYPTION parameter
multiple types in a library 17, 19 3592 Generation 2 84
name 63 LTO-4 or later 81
zfcp device driver 72 methods 104, 106
device class options 24
defining 78 error checking
FORMAT parameter 108 clean drive 189
LTO 79 error logs
device diagnostics 113 evaluating 143
device driver
220
F label (continued)
checking in 167
fibre channel devices 68 checking media 167
fibre channel SAN-attached devices 70 overwriting existing labels 163, 164
file name for a device 63 sequential storage pools 163
file systems volume examples 164
[preparing, AIX server systems 39 volumes using a library device 164
planning for 8 LABEL LIBVOLUME command
preparing, Linux server systems 40 identifying drives 163
preparing, Windows server systems 41 labeling sequential storage pool volumes 163
firewall 25 overwriting existing volume labels 163
firewalls removable media volumes 163
configuring communications through 102 using a library device 164
front-end capacity licensing 136 volume labeling examples 164
LAN-free data movement
description 15, 16
G LDAP
graphical wizard password requirements 194
prerequisite RPM files 43 library
adding volumes 165
auditing volume inventory 176
H automated 173
configuration 74
halting
configure for more than one device type 17, 19
server 197
defining 76
hardware requirements 3
detecting changes to, on a SAN 77, 112
mixing device types 17, 19, 79, 82
I mode, random or sequential 61
SCSI 14
IBM device drivers serial number 77
configuring 65 shared 14
installing 65 sharing among servers 85
IBM Knowledge Center vii volume inventory 176
IBM Spectrum Protect device driver 62 library client, shared library 15, 89
IBM Spectrum Protect device drivers 62 library manager, shared library 15, 87
IBM Spectrum Protect directories library sharing 16
planning for 8 library storage slot 169
IBM tape device drivers 62 library storage slots 166
implementation license compliance
test operations 117 verifying 136
installation logical block protection
clients 98 enabling 183
installing IBM Spectrum Protect overview 182
AIX systems 42 read/write operations 185
Linux systems 42 storage pool management 185
Windows systems 43 supported drives 183
installing the operating system LTO Ultrium devices and media
AIX server systems 29 device class, defining and updating 79
Linux server systems 30 encryption 81, 106
Windows server systems 34 WORM 113
inventory capacity 151
issues
diagnosing 119 M
maintenance
K define schedule 53
maintenance mode
keyboard 211 start server 197
Knowledge Center vii maintenance tasks
scheduling 152
L start the server in maintenance mode 198
managing
label access levels 195
automatic labeling in SCSI libraries 164 administrators 193
bar code reader 167 authority 193
221
managing security 47 outage
media prepare 203
tape rotation 170
media incompatibility 135
media label
P
checking 167 passthru driver 62
for tape 163 password requirements
recording 163 LDAP 194
messages passwords
for automated libraries 178 changing 194
migrating drives 190 resetting 145
mixed device types in a library 17, 19, 79, 82 paths
mode defining 76
library (random or sequential) 61 performance
monitoring volume frequently used, improve with longer mount
daily checklist 119 retention 110
goals 119 periodic checklist of monitoring tasks 128
periodic checklist 128 planning solutions
tasks tape 1
daily checklist 119 planning worksheet 8
periodic checklist 128 policies
mount editing 95
library 109 specifying 93
limit 109 viewing 94
operations 178 policy domains
query 178 specifying 93
retention period 110 pool, storage
wait period 110 3592, special considerations for 82
mount point determining whether to use collocation 153
preemption 111 LTO Ultrium, special considerations for 79
relationship to mount limit in a device class 109 preemption
move data 58 mount point 111
move media 58, 59 volume access 112
multipath I/O privilege class
configure for AIX systems 35 system privilege 193
configure for Linux systems 36 processor value unit (PVU) licensing 136
configure for Windows systems 37 product license
register 52
N protecting your data 113
publications vii
name of device 63
network bandwidth 2
new tape drive 189
Q
NOPREEMPT server option 111 QUERY SAN 113
O R
offsite storage 22 random mode for libraries 61
offsite vaulting 22 reconfiguration tasks
offsite volume 58 start the server in maintenance mode 198
onsite volume 59 recovery drill 208
operating system registration
install on AIX server systems 29 clients 97
install on Linux server systems 30 remove drive 189
install on Windows server systems 34 replace drive 190
security 195 replacing tape drive 189
Operations Center reports
configure 50 email
secure communications 50 configuring 138
option, server restricting
NOPREEMPT 111 user access 195
options RPM files
set for server 45 install for graphical wizard 43
222
rules software (continued)
editing 95 selecting 92
specifying software requirements 6
backup and archive operations 93 solution
viewing 94 expanding 91
Sony WORM media (AIT50 and AIT100) 113
special file names 63
S SSL 49
SAN (storage area network) starting server
client access to devices 15, 16 maintenance mode 197
device changes, detecting 112 status reports
LAN-free data movement 15, 16 obtaining 138
sharing a library among servers 15, 85 stopping
storage agent role 15, 16 server 197
scale capacity 83 storage
scheduled activities planning for 12, 14
tuning 152 storage agent 15, 16
schedules storage area network (SAN)
backup and archive operations 97 client access to devices 15, 16
scratch volume 174 device changes, detecting 112
scratch volumes 172 LAN-free data movement 15, 16
SCSI sharing a library among servers 15, 85
automatic labeling of volumes 164 storage agent role 15, 16
library with different tape technologies 82 storage configuration
SCSI devices 68 planning for 8
SCSI libraries storage devices 78
define a library client 86, 87 storage hardware
define a library server 86, 87 configure 28
secure communications storage pool
configure with SSL and TLS 49 3592, special considerations for 82
security determining whether to use collocation 153
data encryption LTO Ultrium, special considerations for 79
3592 Generation 2 84 storage pool capacity 2
IBM LTO Generation 4 106 storage pool hierarchies
IBM LTO Generation 4 or later 81 planning 20
Oracle StorageTek T10000B 106 setting up 90
Oracle StorageTek T10000C 106 storage space
Oracle StorageTek T10000D 106 releasing 149
data encryption, 3592 Generation 2, TS1120, TS1130, storage volume
TS1140, TS1150 106 labeling sequential access 163
sequential mode for libraries 61 preparing sequential access 163
serial number swapping volumes in automated library 168
automatic detection by the server 77, 112 system requirements
for a drive 77 hardware 3
for a library 77 system status
server tracking 138
configure 44 system update
create user ID for 38 prepare 203
define maintenance schedule 53
plan upgrade 201 T
set options 45
start in maintenance mode 197 tape
stop 197 capacity 107
server option compatibility between drives 189
NOPREEMPT 111 recording format 108
servers rotation 170
start in maintenance mode 198 setting mount retention period 110
setting tape device driver
library mode 61 installing 62
time interval for checking in volumes 110 requirements 62
shared SCSI library 85 tape drive, replacing 189
shutting down tape drives 2
server 197 tape labels
software overwriting 72
223
tape requirements 2 WORM devices and media (continued)
tape solution Oracle StorageTek T10000D drives 114
planning for 1 Quantum LTO3 113
time interval, setting for checking in volumes 110 Sony AIT50 and AIT100 113
TLS 49 special considerations for WORM media 113
troubleshooting VolSafe
administrator IDs 145 considerations for media 113
errors in client operations 143 worm volumes 115
locked client nodes 145
password issues 145
tsmdlst utility 113
type, device
LTO 79
multiple in a single library 17, 19
U
Ultrium, LTO device type
device class, defining and updating 79
encryption 81, 106
WORM 113
unavailable access mode
marked with PERMANENT parameter 178
UPDATE DRIVE command 181
UPDATE LIBVOLUME command 174
upgrade
server 201
upgrading tape drives 189
user ID
create for server 38
V
VALIDATE LANFREE command 103
validating data
logical block protection 182
volume capacity 108
volumes
access preemption 112
access, controlling 170
auditing 176
automated library inventory 176
checking in new volumes to library 165
checking out 174
determining which are mounted 178
dismounting 178
inventory maintenance 170
managing 173
mount retention time 110
removing from a library 174
sequential storage pools 163
swapping 168
updating 174
W
WORM devices and media
DLT WORM 113
IBM 3592 113
LTO WORM 113
maintaining volumes in a library 172
Oracle StorageTek T10000B drives 114
Oracle StorageTek T10000C drives 114
224
IBM®