578
ibm.com/redbooks Front cover IBM ProtecTIER Implementation and Best Practices Guide Karen Orlando Mara Miranda Bautista Jose Roberto Mosqueda Mejia Rosane Goldstein Langnor Implement scenarios for backup recovery applications with ProtecTIER Optimize data deduplication and storage efficiency Exploit the File System Interface using CIFS and NFS

Sg 248025

Embed Size (px)

DESCRIPTION

Sg 248025

Citation preview

  • ibm.com/redbooks

    Front cover

    IBM ProtecTIER Implementation and Best Practices Guide

    Karen OrlandoMara Miranda Bautista

    Jose Roberto Mosqueda MejiaRosane Goldstein Langnor

    Implement scenarios for backup recovery applications with ProtecTIER

    Optimize data deduplication and storage efficiency

    Exploit the File System Interface using CIFS and NFS

  • International Technical Support Organization

    IBM ProtecTIER Implementation and Best Practices Guide

    August 2014

    SG24-8025-02

  • Copyright International Business Machines Corporation 2012, 2014. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP ScheduleContract with IBM Corp.

    Third Edition (August 2014)This edition applies to ProtecTIER Version physical general availability (pGA) 3.3.x

    Note: Before using this information and the product it supports, read the information in Notices on page xv.

  • Contents

    Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi

    Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviiAuthors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviiiNow you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xixComments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxStay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xx

    Part 1. General best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    Chapter 1. IBM ProtecTIER basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    1.1.1 ProtecTIER Appliance terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51.1.2 ProtecTIER Gateway terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61.1.3 ProtecTIER replication terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    1.2 ProtecTIER fundamental concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.2.1 ProtecTIER with deduplication disabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

    1.3 ProtecTIER models for open systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.3.1 ProtecTIER appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.3.2 ProtecTIER deduplication gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    1.4 Remote support and Call Home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151.4.1 How to set up Call Home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

    1.5 Simple Network Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191.5.1 Alert filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191.5.2 Space thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201.5.3 Email alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

    1.6 ProtecTIER command-line interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    Chapter 2. Deduplication considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252.1 HyperFactor data deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

    2.1.1 HyperFactor, deduplication, and bandwidth savings. . . . . . . . . . . . . . . . . . . . . . . 272.2 ProtecTIER HyperFactor deduplication processing . . . . . . . . . . . . . . . . . . . . . . . . . . . 282.3 Components of a ProtecTIER system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

    2.3.1 ProtecTIER server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292.3.2 HyperFactor deduplication algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302.3.3 Disk storage subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

    2.4 Benefits of ProtecTIER HyperFactor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302.4.1 Flexibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312.4.2 High availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312.4.3 High performance, low storage requirements, and lower environmental costs. . . 31

    2.5 General ProtecTIER deduplication considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322.5.1 Rethinking your overall backup strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322.5.2 Data reduction technologies should not be combined . . . . . . . . . . . . . . . . . . . . . 332.5.3 Data streams must be in order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332.5.4 Data organization in your ProtecTIER repository . . . . . . . . . . . . . . . . . . . . . . . . . 342.5.5 The dynamics of the ProtecTIER repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342.5.6 ProtecTIER repository usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352.5.7 Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Copyright IBM Corp. 2012, 2014. All rights reserved. iii

  • 2.5.8 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372.5.9 Database logs and other data types with high data change rates . . . . . . . . . . . . 382.5.10 Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382.5.11 Tape block size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382.5.12 File size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    2.6 Data types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392.6.1 Candidates for a high factoring ratio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392.6.2 Candidates for a low factoring ratio. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

    Chapter 3. Networking essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413.1 Network terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423.2 General configuration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433.3 Bonding and teaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

    3.3.1 The three different bonding modes of ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . . 443.4 Preferred ProtecTIER bonding configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

    3.4.1 Single team/bond (Layer 2) configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483.4.2 Individual IPs (Layer 3) configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483.4.3 Dual/Three teams (Layer 2+3) configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493.4.4 VLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513.4.5 IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543.4.6 Routing the IP traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

    Chapter 4. Virtual Tape Library guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574.1 ProtecTIER Virtual Tape Library introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584.2 General preferred practices for the Virtual Tape Library . . . . . . . . . . . . . . . . . . . . . . . . 584.3 Setting up the virtual library and cartridges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

    4.3.1 Creating libraries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

    Chapter 5. ProtecTIER File System Interface: General introduction . . . . . . . . . . . . . . 735.1 ProtecTIER FSI network overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

    5.1.1 ProtecTIER network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745.1.2 Network configuration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755.1.3 Connecting a ProtecTIER server to the network. . . . . . . . . . . . . . . . . . . . . . . . . . 75

    5.2 Configuring components for ProtecTIER FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785.2.1 Configuring a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795.2.2 Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815.2.3 Disaster recovery: Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825.2.4 Disaster recovery: Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825.2.5 General FSI suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

    5.3 File System Interface guidelines for NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835.3.1 ProtecTIER NFS authentication and security management . . . . . . . . . . . . . . . . . 835.3.2 Configuration of a ProtecTIER FSI-NFS export . . . . . . . . . . . . . . . . . . . . . . . . . . 865.3.3 Understanding root squash. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

    5.4 File System Interface guidelines for CIFS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 915.4.1 ProtecTIER authentication and user management . . . . . . . . . . . . . . . . . . . . . . . . 915.4.2 Configuring your ProtecTIER system for FSI-CIFS. . . . . . . . . . . . . . . . . . . . . . . . 92

    5.5 FSI File System Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

    Chapter 6. OpenStorage guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036.1 OpenStorage overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

    6.1.1 Main components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1046.2 Networking overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

    6.2.1 Definitions and acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105iv IBM ProtecTIER Implementation and Best Practices Guide

    6.2.2 Load distribution methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

  • 6.2.3 Bonding configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.4 Broadcom NICs with Microsoft platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.5 IBM AIX platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.6 Solaris platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.7 Configuring the network interfaces on the host media server . . . . . . . . . . . . . . . 1066.2.8 Configuring a ProtecTIER server to work with the OpenStorage environment . . 106

    6.3 Performance optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1066.4 NetBackup Storage Lifecycle Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076.5 Symantec OST functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

    6.5.1 Optimized duplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096.5.2 Granular Recovery Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096.5.3 Auto Image Replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106.5.4 Accelerator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106.5.5 Optimized Synthetic Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

    Chapter 7. Host attachment considerations for Virtual Tape Library. . . . . . . . . . . . . 1117.1 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1127.2 Device driver specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

    7.2.1 AIX specifications to work with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137.2.2 Solaris specifications to work with VTL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.3 Linux specifications to work with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.4 Windows specifications to work with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.5 IBM Tape Device Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.6 Control path failover and data path failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157.2.7 Persistent device naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    7.3 LUN masking for VTL systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1227.3.1 LUN masking methods and preferred practices . . . . . . . . . . . . . . . . . . . . . . . . . 1237.3.2 LUN masking configuration steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

    Part 2. Back-end storage subsystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

    Chapter 8. Back-end storage overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1338.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1348.2 Dependencies from a back-end storage subsystem view. . . . . . . . . . . . . . . . . . . . . . 1368.3 Dependencies from a ProtecTIER view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1378.4 Smart storage subsystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1378.5 Key rules for a ProtecTIER server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1388.6 Storage arrays configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

    8.6.1 General requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1398.6.2 RAID considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1408.6.3 LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1428.6.4 Expanding the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

    8.7 Storage area network fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1438.7.1 Two Fibre Channel paths to each storage controller . . . . . . . . . . . . . . . . . . . . . 1438.7.2 Inter-switch link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1438.7.3 Dedicated zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1448.7.4 Front-end zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1448.7.5 Back-end zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1448.7.6 SAN paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

    Chapter 9. IBM FlashSystem with System Storage TS7650G ProtecTIER Deduplication Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

    9.1 IBM FlashSystem overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Contents v

    9.2 General FlashSystem considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

  • 9.3 Deploying the IBM FlashSystem 840 with IBM ProtecTIER . . . . . . . . . . . . . . . . . . . . 1509.3.1 Creating user data and metadata Volumes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1509.3.2 Mapping the FlashSystem Volumes to the ProtecTIER System. . . . . . . . . . . . . 1529.3.3 Creating file systems and building the ProtecTIER repository . . . . . . . . . . . . . . 153

    9.4 General FlashSystem 840 Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1569.4.1 ProtecTIER Metadata Planner preferred practices for FlashSystem 840 . . . . . . 157

    Chapter 10. IBM Storwize V3700 and V5000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15910.1 V3700 and V5000 overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16010.2 General V3700 and V5000 considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16010.3 Configuration steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

    10.3.1 Creating empty user data and metadata storage pools . . . . . . . . . . . . . . . . . . 16110.3.2 Creating the MDisk arrays or discovering unmanaged MDisks . . . . . . . . . . . . 16310.3.3 Creating volumes with a sequential virtualization type . . . . . . . . . . . . . . . . . . . 16710.3.4 Creating a host connection for the ProtecTIER nodes by using the GUI . . . . . 17110.3.5 Mapping volumes to a host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17510.3.6 Creating file systems and building the ProtecTIER repository . . . . . . . . . . . . . 17610.3.7 Expanding the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

    Chapter 11. IBM System Storage SAN Volume Controller, IBM Storwize V7000, and V7000 Unified Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

    11.1 Storage virtualization introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18211.1.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

    11.2 General notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18511.3 Firmware level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18611.4 Fibre Channel connection topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18711.5 User data and metadata pool: General suggestions. . . . . . . . . . . . . . . . . . . . . . . . . 190

    11.5.1 Metadata pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19011.5.2 User data pool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191

    11.6 Configuration steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19111.6.1 Creating empty user data and metadata storage pools . . . . . . . . . . . . . . . . . . 19211.6.2 Creating the MDisk arrays or discovering unmanaged MDisks . . . . . . . . . . . . 19311.6.3 Creating volumes with a sequential virtualization type . . . . . . . . . . . . . . . . . . . 19811.6.4 Creating a host connection for ProtecTIER nodes in Storwize V7000 GUI . . . 20011.6.5 Mapping volumes to a host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20411.6.6 Creating file systems and building the ProtecTIER repository . . . . . . . . . . . . . 20511.6.7 Expanding the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

    Chapter 12. IBM XIV Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21112.1 XIV Storage System hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21212.2 Fibre Channel switch cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

    12.2.1 Zoning configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21412.2.2 Configuring the XIV Storage System for a ProtecTIER server . . . . . . . . . . . . . 215

    Chapter 13. IBM System Storage DS8000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22113.1 DS8000 series overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

    13.1.1 Disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22413.1.2 RAID levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224

    13.2 General considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.1 Planning tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.2 Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.3 User data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.4 Firmware levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22713.2.5 Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227vi IBM ProtecTIER Implementation and Best Practices Guide

  • 13.3 Rotate extents: Striping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22713.3.1 When not to use rotate extents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

    Part 3. Backup management, VTL, OST, and FSI preferred practices . . . . . . . . . . . . . . . . . . . . . . . . . 233

    Chapter 14. Backup management introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23514.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23614.2 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236

    14.2.1 Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23614.2.2 Software compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23614.2.3 Software, backup application, and operating system . . . . . . . . . . . . . . . . . . . . 23614.2.4 Tape library zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23714.2.5 Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.6 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.7 Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.8 Tape block sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.9 Type of data that is backed up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

    14.3 General advice for backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23914.4 ProtecTIER integration with backup applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 23914.5 Backup application vocabulary cross-reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24014.6 Backup application catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24014.7 Remote cloning of virtual tapes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

    Chapter 15. IBM Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24315.1 Tivoli Storage Manager VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24415.2 Tivoli Storage Manager: Preferred options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

    15.2.1 LAN-free backups with the ProtecTIER product . . . . . . . . . . . . . . . . . . . . . . . . 24515.2.2 Data streams. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24515.2.3 Reclamation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24615.2.4 Collocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24715.2.5 Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24715.2.6 Backing up your Tivoli Storage Manager database . . . . . . . . . . . . . . . . . . . . . 24715.2.7 Physical tape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24715.2.8 Avoiding mount conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24815.2.9 Multiple streams from the client with the resourceutilization parameter . . . . . . 24815.2.10 Accommodating increased sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25015.2.11 Tivoli Storage Manager storage pool selection . . . . . . . . . . . . . . . . . . . . . . . . 25015.2.12 Technical overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25115.2.13 Advantages of a Tivoli Storage Manager environment with ProtecTIER . . . . 25215.2.14 Tivoli Storage Manager configuration with VTL . . . . . . . . . . . . . . . . . . . . . . . 25215.2.15 Updating to a VTL library type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25515.2.16 Defining and deleting Tivoli Storage Manager libraries with many drives. . . . 255

    15.3 Tivoli Storage Manager: FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25615.3.1 Setting up backup and restore on Tivoli Storage Manager . . . . . . . . . . . . . . . . 25715.3.2 Performing backup and restore on Tivoli Storage Manager . . . . . . . . . . . . . . . 26115.3.3 Parameters for best performance with ProtecTIER FSI . . . . . . . . . . . . . . . . . . 263

    Chapter 16. Symantec NetBackup and BackupExec . . . . . . . . . . . . . . . . . . . . . . . . . . 26516.1 NetBackup overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26616.2 Suggestions for NetBackup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

    16.2.1 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26716.3 NetBackup in a VTL environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26816.4 NetBackup in an OST environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Contents vii

    16.5 NetBackup in an FSI environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

  • 16.5.1 NetBackup in an FSI-CIFS environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26916.5.2 NetBackup in an FSI-NFS environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

    16.6 Symantec BackupExec in an FSI environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27716.6.1 Setting up backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

    Chapter 17. EMC NetWorker. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28117.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28217.2 EMC NetWorker in a VTL environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283

    17.2.1 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28317.2.2 Suggestion if a ProtecTIER server is used as a VTL . . . . . . . . . . . . . . . . . . . . 283

    17.3 EMC NetWorker in an FSI environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28417.3.1 Creating a Windows user for EMC NetWorker . . . . . . . . . . . . . . . . . . . . . . . . . 28417.3.2 Setting up for backup and restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28517.3.3 General configuration suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28517.3.4 Setting the information to be backed up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28617.3.5 Setting the time for the backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28717.3.6 Performing a restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28717.3.7 Parameters for best performance with ProtecTIER FSI . . . . . . . . . . . . . . . . . . 287

    Chapter 18. HP Data Protector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28918.1 HP Data Protector with ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

    18.1.1 HP Data Protector architecture with ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . 29018.2 HP Data Protector in a VTL environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291

    18.2.1 Enabling the robotic bar code reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29218.2.2 Increasing the tape block size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29218.2.3 Enabling the lock name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29418.2.4 Disabling compression, encryption, and CRC chksum . . . . . . . . . . . . . . . . . . . 29518.2.5 Hosts multipath support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29618.2.6 Load balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29818.2.7 Using a mirroring functionality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29918.2.8 Troubleshooting logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300

    Chapter 19. IBM i and Backup, Recovery, and Media Services . . . . . . . . . . . . . . . . . 30119.1 IBM i overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302

    19.1.1 Integrated file system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.2 Integrated database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.3 Object-based architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.4 Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.5 Backup considerations in IBM i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

    19.2 Integration of IBM i and ProtecTIER in a VTL environment . . . . . . . . . . . . . . . . . . . 30319.2.1 Backup considerations with ProtecTIER. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30319.2.2 Suggested ProtecTIER and IBM i configuration . . . . . . . . . . . . . . . . . . . . . . . . 304

    19.3 Configuration of BRMS for ProtecTIER. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30619.3.1 BRMS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30619.3.2 Suggested configurations of BRMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

    19.4 Deploying ProtecTIER with BRMS for disaster recovery . . . . . . . . . . . . . . . . . . . . . 30819.4.1 BRMS available at the production site and DR site . . . . . . . . . . . . . . . . . . . . . 30819.4.2 No BRMS at the DR site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

    19.5 Use DUPMEDBRM to duplicate media from ProtecTIER to physical media. . . . . . . 31319.5.1 Enable append to multiple parallel volumes during DUPMEDBRM . . . . . . . . . 31319.5.2 Support multiple batch jobs for the DUPMEDBRM command . . . . . . . . . . . . . 314

    19.6 Device configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31519.7 BRMS movement of replicated volumes - considerations. . . . . . . . . . . . . . . . . . . . . 315viii IBM ProtecTIER Implementation and Best Practices Guide

  • Chapter 20. CommVault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31720.1 CommVault introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

    20.1.1 CommVault components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31820.2 CommVault with ProtecTIER VTL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320

    20.2.1 CommVault configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32020.2.2 Data multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32720.2.3 Hardware compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32820.2.4 Data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32920.2.5 Alternative data paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

    20.3 CommVault FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33120.3.1 Setting up backup and restore in a CIFS environment . . . . . . . . . . . . . . . . . . . 33120.3.2 Parameters for best performance with ProtecTIER FSI-CIFS . . . . . . . . . . . . . 33220.3.3 Setting up backup and restore in an NFS environment . . . . . . . . . . . . . . . . . . 33720.3.4 Parameters for best performance with ProtecTIER FSI-NFS . . . . . . . . . . . . . . 341

    Chapter 21. Veeam FSI-CIFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34321.1 Setting up backup infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

    21.1.1 Creating backup repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34421.1.2 Adding VMware backup proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34521.1.3 Adding a VMware Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

    21.2 Setting up backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34721.2.1 Creating a new backup job for backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34721.2.2 Performing backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34821.2.3 Performing restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348

    21.3 Parameters for best performance with ProtecTIER-CIFS . . . . . . . . . . . . . . . . . . . . . 34921.3.1 Disabling data de-duplication and compression . . . . . . . . . . . . . . . . . . . . . . . . 34921.3.2 Setting data block size for backup to SAN or local storage . . . . . . . . . . . . . . . 34921.3.3 Setting Incremental backup mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350

    21.4 Advanced backup repository settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35121.4.1 Setting data blocks alignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35121.4.2 Setting data blocks decompression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351

    21.5 Summary of parameters for best performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352

    Part 4. Application considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353

    Chapter 22. Application considerations and data types . . . . . . . . . . . . . . . . . . . . . . . 35522.1 Lotus Domino . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356

    22.1.1 Common server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35622.1.2 Existing backup and disk space usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35622.1.3 Domino attachments and object service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35722.1.4 Applying the DAOS solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35922.1.5 ProtecTIER considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361

    22.2 Microsoft Exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36422.2.1 Defragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36422.2.2 Suggestions for Microsoft Exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36422.2.3 Microsoft Exchange 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365

    22.3 Microsoft SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36522.3.1 Integrating the ProtecTIER server with Microsoft SQL Server backup . . . . . . . 36522.3.2 Index defragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36722.3.3 Suggestions for Microsoft SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36722.3.4 LiteSpeed for SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368

    22.4 DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36822.4.1 Combining DB2 compression and ProtecTIER deduplication. . . . . . . . . . . . . . 368 Contents ix

    22.4.2 Upgrading the DB2 database to improve deduplication . . . . . . . . . . . . . . . . . . 369

  • 22.4.3 DB2 DEDUP_DEVICE setting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37122.4.4 Example of DEDUP_DEVICE setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37222.4.5 Excluding logs from the DB2 database backup . . . . . . . . . . . . . . . . . . . . . . . . 37322.4.6 DB2 suggested settings without DEDUP_DEVICE. . . . . . . . . . . . . . . . . . . . . . 373

    22.5 Oracle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37422.5.1 Suggested RMAN settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37422.5.2 Mounting NFS Oracle Server to ProtecTIER NAS . . . . . . . . . . . . . . . . . . . . . . 37722.5.3 Using ProtecTIER NAS to run RMAN incremental merge backups . . . . . . . . . 37822.5.4 Using ProtecTIER NAS to store Oracle DataPump exports . . . . . . . . . . . . . . . 38022.5.5 Using ProtecTIER NAS to store Oracle database files and offline redo logs . . 38122.5.6 Other suggestions for RMAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

    22.6 SAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38222.6.1 SAP introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38222.6.2 Data protection for SAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38222.6.3 Integration of Tivoli Storage Manager for ERP with SAP . . . . . . . . . . . . . . . . . 38522.6.4 Tivoli Storage Manager for ERP for Oracle database. . . . . . . . . . . . . . . . . . . . 38522.6.5 Tivoli Storage Manager for ERP for DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38822.6.6 SAP BR*Tools for Oracle using BACKINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39022.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager . . . . . . . . 39222.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage

    Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39322.6.9 Best practices for Tivoli Storage Manager for ERP with ProtecTIER . . . . . . . . 394

    22.7 VMware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39522.7.1 Technical overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39522.7.2 Settings and tuning for VMware and Tivoli Storage Manager. . . . . . . . . . . . . . 39622.7.3 Backup solutions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39722.7.5 Configuring the ProtecTIER server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40022.7.8 Tivoli Storage Manager server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 40622.7.9 Tivoli Storage Manager client installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40822.7.10 Disabling compression and deduplication on Tivoli Storage Manager . . . . . . 40922.7.11 Configuring a full VM backup through the vStorage API. . . . . . . . . . . . . . . . . 41122.7.12 VMware Guest OS backup to ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . . . . . 412

    Part 5. Replication and disaster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417

    Chapter 23. ProtecTIER replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41923.1 ProtecTIER IP replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42023.2 Native replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

    23.2.1 One-to-one replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.2 Many-to-one replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.3 Many-to-many replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.4 VTL replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.5 OST replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.6 FSI replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42223.2.7 Replication grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42223.2.8 Replication topology group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423

    23.3 Replication policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42423.4 Visibility switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42523.5 Principality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42523.6 Replication Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42523.7 Initial synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42723.8 Replication schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

    23.8.1 Continuous replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428x IBM ProtecTIER Implementation and Best Practices Guide

  • 23.8.2 Scheduled replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42923.8.3 Centralized Replication Schedule Management . . . . . . . . . . . . . . . . . . . . . . . . 43023.8.4 Replication rate control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43123.8.5 Setting replication rate limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43323.8.6 Limiting port bandwidth consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434

    23.9 Replication backlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43523.9.1 SNMP alerts for replication backlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436

    23.10 Replication planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43723.10.1 Bandwidth sizing and requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43823.10.2 Replication throughput barriers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43823.10.3 Calculating the replication data transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43923.10.4 Calculating replication bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43923.10.5 Ports for replication in firewalled environments. . . . . . . . . . . . . . . . . . . . . . . . 440

    23.11 Bandwidth validation utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44023.11.1 Using the bandwidth validation utility to test the data flow . . . . . . . . . . . . . . . 44123.11.2 Interpreting the results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44323.11.3 Repository replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445

    23.12 Planning ProtecTIER replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44623.12.1 Deployment planning scenario: many-to-many. . . . . . . . . . . . . . . . . . . . . . . . 44623.12.2 Many-to-one replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452

    23.13 The backup application database backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45423.14 ProtecTIER Planner tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455

    Chapter 24. Disaster recovery deployment with backup applications. . . . . . . . . . . . 45724.1 Disaster recovery operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45824.2 ProtecTIER replication overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45824.3 Disaster recovery operations with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459

    24.3.1 Replication data transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45924.3.2 Managing cartridges after replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45924.3.3 Cartridge replication requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.4 Importing/exporting slots allocation in VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.5 Import/export slots searching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.6 Automation of daily operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.7 Gauging the replication completion status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462

    24.4 Disaster recovery operations with FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46424.4.1 Replication Destination Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46524.4.2 ProtecTIER FSI cloning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46524.4.3 Replication preferred practices for FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466

    24.5 Entering ProtecTIER DR mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46624.5.1 Working at the disaster recovery site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46724.5.2 Inventory command options for a VTL disaster recovery scenario . . . . . . . . . . 46724.5.3 Commonly used disaster recovery queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46824.5.4 Returning to normal operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469

    24.6 The backup application catalog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47024.6.1 ProtecTIER replication with Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . 47124.6.2 Recovering the backup application catalog. . . . . . . . . . . . . . . . . . . . . . . . . . . . 47224.6.3 Tivoli Storage Manager reclamation and housekeeping. . . . . . . . . . . . . . . . . . 473

    24.7 Single domain and multiple domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47424.7.1 Single domain environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47424.7.2 Multiple domain environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474

    24.8 Replication preferred practices for OST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47424.8.1 The OpenStorage operating environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475

    24.9 Deploying replication with specific backup applications . . . . . . . . . . . . . . . . . . . . . . 475 Contents xi

  • 24.9.1 Recovery point objective. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47624.10 Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476

    24.10.1 Scenario 1: Replication complete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47724.10.2 Scenario 2: Replication incomplete. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47724.10.3 Scenario 3: Auditing tapes and fixing the Tivoli Storage Manager database . 47824.10.4 Reclamation considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47824.10.5 Determining what is available for restoration at the DR site . . . . . . . . . . . . . . 480

    24.11 Symantec NetBackup deployment with ProtecTIER replication . . . . . . . . . . . . . . . 48124.11.1 Scripting the inject/eject commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.2 Scripting the inventory commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.3 Setting up NetBackup for backup and restore . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.4 Setting up NetBackup for disaster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.5 Cross-site backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48224.11.6 ProtecTIER disaster recovery with Symantec NetBackup . . . . . . . . . . . . . . . 48324.11.7 Single domain versus two separate domains . . . . . . . . . . . . . . . . . . . . . . . . . 48324.11.8 Disaster recovery scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48424.11.9 Determining what is available for restore at the disaster recovery site . . . . . . 48624.11.10 Eject and inject commands from NetBackup software . . . . . . . . . . . . . . . . . 48624.11.11 Disaster Recovery operations with OpenStorage . . . . . . . . . . . . . . . . . . . . . 487

    24.12 EMC NetWorker deployment with ProtecTIER replication . . . . . . . . . . . . . . . . . . . 48824.12.1 Cloning physical tapes with ProtecTIER replication . . . . . . . . . . . . . . . . . . . . 48924.12.2 Disaster recovery with ProtecTIER replication . . . . . . . . . . . . . . . . . . . . . . . . 492

    24.13 CommVault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49524.13.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49524.13.2 Running the CommVault backup operation . . . . . . . . . . . . . . . . . . . . . . . . . . 49524.13.3 CommVault resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497

    Appendix A. ProtecTIER parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499The ProtecTIER parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500

    Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500Explanation of how metadata from the backup application hinders deduplication . . . . 500ProtecTIER parser functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502ProtecTIER parsers: Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502What workloads benefit from the ProtecTIER parsers . . . . . . . . . . . . . . . . . . . . . . . . . 503Background information: Causes of low deduplication ratios . . . . . . . . . . . . . . . . . . . . 503Estimating the benefit of a parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504Environments that benefit from parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Experience from one user site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507Using analyze_sessions to monitor the benefit of a ProtecTIER parser . . . . . . . . . . . . 507

    Appendix B. Entry-level and midrange disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509General considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510

    Using the current version of software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510General settings on System Storage DS storage subsystems . . . . . . . . . . . . . . . . . . . 510Disabling Automatic Volume Transfer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511Direct cabling without SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517Cabling and zoning in SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519

    The DS3000 series . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526EXP3500 attachment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527Cache upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528Turbo Performance feature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528Media scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529xii IBM ProtecTIER Implementation and Best Practices Guide

    Appendix C. Networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531

  • Bonding on Linux and UNIX machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532Bonding on Linux computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532Bonding on UNIX computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532

    Teaming on Microsoft-based computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533Broadcom NICs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533Intel NICs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533

    Link aggregation and similar technologies on the LAN switches . . . . . . . . . . . . . . . . . . . . 534

    Appendix D. Managing cartridge sizes with ProtecTIER. . . . . . . . . . . . . . . . . . . . . . . 535Effects of dynamic cartridge sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536The mechanism behind fluctuating cartridge sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536

    Appendix E. Replacement from Generic to Gateway Model . . . . . . . . . . . . . . . . . . . . 539General Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540Replacing from Generic to Gateway Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540

    Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

    Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549

    Publications common to the TS7650 Appliance and TS7650G . . . . . . . . . . . . . . . . . . 549TS7650 Appliance publications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550TS7610 Appliance Express and TS7620 Appliance Express publications . . . . . . . . . . 550Integrated Management Module and Remote Supervisor Adaptor publications. . . . . . 551

    Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552 Contents xiii

  • xiv IBM ProtecTIER Implementation and Best Practices Guide

  • Notices

    This information was developed for products and services offered in the U.S.A.

    IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information about the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

    IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.

    The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.

    This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

    Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk.

    IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

    Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.

    Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

    This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental.

    COPYRIGHT LICENSE:

    This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. Copyright IBM Corp. 2012, 2014. All rights reserved. xv

  • TrademarksIBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. These and other IBM trademarked terms are marked on their first occurrence in this information with the appropriate symbol ( or ), indicating US registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml

    The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both:

    AIXAS/400DB2DB2 ConnectDB2 Universal DatabaseDominoDS4000DS5000DS8000Easy TiereServerFlashCopyFlashSystem

    Global Technology ServicesHyperFactorHyperSwapIBMInformixiNotesiSeriesLotusLotus NotesMicroLatencyNotesPOWERProtecTIER

    RedbooksRedbooks (logo) RETAINSametimeStorwizeSystem iSystem pSystem StorageSystem Storage DSSystem xTivoliXIVz/OS

    The following terms are trademarks of other companies:

    Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

    Linux is a trademark of Linus Torvalds in the United States, other countries, or both.

    Ultrium, the LTO Logo and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.

    Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

    Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.

    UNIX is a registered trademark of The Open Group in the United States and other countries.

    Other company, product, or service names may be trademarks or service marks of others. xvi IBM ProtecTIER Implementation and Best Practices Guide

  • Preface

    This IBM Redbooks publication provides best practice guidance for planning, installing, and configuring the IBM System Storage TS7600 ProtecTIER family of products. This guide provides the current best practices for using ProtecTIER software version physical general availability (pGA) 3.3 and the revolutionary and patented IBM HyperFactor deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation.

    The System Storage TS7650G ProtecTIER Deduplication Gateway and the System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems that are configured for three available interfaces: The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates

    traditional automated tape libraries. The OpenStorage (OST) application programming interface (API) can be integrated with

    Symantec NetBackup to provide backup-to-disk without having to emulate traditional tape libraries.

    The File System Interface (FSI) supports Common Internet File System (CIFS) and Network File System (NFS) as backup targets.

    For your existing ProtecTIER solution, this guide provides preferred practices and suggestions to boost the performance and the effectiveness of the data deduplication with regards to your application platforms for your VTL, OST, and FSI systems.

    When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best options and scenarios for data deduplication for their environments. This guide helps you optimize your deduplication ratio, and at the same time reduce the hardware, power and cooling, and management costs.

    This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS) group, development, and quality assurance (QA) teams. .

    Note: The following ProtecTIER products are withdrawn and can no longer be directly ordered: System Storage TS7650 ProtecTIER Deduplication Appliance, 3958-AP1. System Storage TS7610 ProtecTIER Deduplication Appliance Express, 3959-SM1.

    This product was replaced by the TS7620 ProtecTIER Deduplication Appliance Express, 3959-SM2.

    For more information, see the following website:http://www.ibm.com/common/ssi/index.wss Copyright IBM Corp. 2012, 2014. All rights reserved. xvii

  • AuthorsThis book was produced by a team of specialists from around the world working at the International Technical Support Organization (ITSO), Poughkeepsie Center.

    Karen Orlando is a Project Leader at the ITSO, Tucson, Arizona Center. Karen has over 25 years in the information technology (IT) industry with extensive experience in open systems, and Information and Software development of IBM hardware and software storage. She holds a degree in Business Information Systems from the University of Phoenix, and is Project Management Professional (PMP) certified since 2005.

    Mara Miranda Bautista is a Level 3 Support engineer for the ProtecTIER team in Guadalajara, at the IBM Mexico Software Lab. Mara has seven years of experience in the storage systems field. She joined IBM in 2011, and has worked with the Level 3 Support team ever since. Mara holds a B.A. in Computer Science from Universidad Autonoma de Baja California in Mexico.

    Jose Roberto Mosqueda Mejia is a Storage Test Engineer from IBM Mexico Software Lab, where he joined IBM in 2008. Roberto has six years of experience in the QA field. He joined the IBM ProtecTIER team in 2010, and worked on functional verification testing for several ProtecTIER releases, performing testing for the VTL, OST, and FSI. Roberto holds a bachelors degree in computer systems engineering from the Instituto Tecnologico de Morelia in Michoacan, Mexico. He is an International Software Testing Qualifications Board (ISTQB) Certified Tester Advanced Level - Full Level.

    Rosane Goldstein Langnor is an IBM Certified IT Specialist in the storage discipline, and has more than 15 years of experience in IT. Rosane works in the IBM Systems and Technology Group (STG) Lab Services and Training organization in Brazil, providing implementations, technical assessments, pre-sales support, consulting services, and training for storage products for Latin American customers. She has extensive experience with ProtecTIER, having performed several implementations, configurations, consulting, and troubleshooting for all of the TS7600 family.xviii IBM ProtecTIER Implementation and Best Practices Guide

  • Thanks to the following people for their contributions to this project:Tommy HueberIBM Software Group, Cloud & Smarter Infrastructure, IBM Netherlands

    Lee CockrellFederal Storage Technical PreSales FTSS (IBM XIV Specialist), IBM Sales & Distribution, STG Sales, IBM US

    Christina CouttsIT Technical Specialist (removable and virtual media products), IBM Sales & Distribution, STG Sales, IBM UK

    Ron HerrmannIBM Systems and Technology Group, Storage Platform, IBM US

    Adriana Furnielis PelligriniIBM Systems and Technology Group, Lab Services, IBM Brazil

    Emmanuel Barajas GonzalesFranco Josue Morales JimenezIrving Yukio Hayashi LeonEmilio Perez MunozCuauhtli Alfonso Tello SaldanaIBM Systems and Technology Group, Storage Systems Development, IBM Mexico

    Mikael LindstromIBM Global Technology Services (GTS), Delivery Technology Engineering, IBM SwedenDoron TalIBM Systems and Technology Group, Storage Systems Development, IBM Israel

    Neale BarretRichard HutzlerDennis HuffMervyn VenterIBM Systems and Technology Group, Client Enablement & Systems Assurance, IBM US

    The authors of the second edition, IBM ProtecTIER Implementation and Best Practices Guide published on May 22, 2013:

    Karen Orlando, Mathias Defiebre, Dan Riedel, Daniel Wendler

    Now you can become a published author, too!This is an opportunity to spotlight your skills, grow your career, and become a published authorall at the same time! Join an ITSO residency project and help write a book in your area of expertise, while honing your experience using leading-edge technologies.

    Your efforts will help to increase product acceptance and customer satisfaction, as you expand your network of technical contacts and relationships. Residencies run from two to six weeks in length, and you can participate either in person or as a remote resident working from your home base. Preface xix

  • Obtain more information about the residency program, browse the residency index, and apply online:ibm.com/redbooks/residencies.html

    Comments welcomeYour comments are important to us!

    We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks publications in one of the following ways: Use the online Contact us review Redbooks form:

    ibm.com/redbooks

    Send your comments in an email:[email protected]

    Mail your comments:IBM Corporation, International Technical Support OrganizationDept. HYTD Mail Station P0992455 South RoadPoughkeepsie, NY 12601-5400

    Stay connected to IBM Redbooks Find us on Facebook:

    http://www.facebook.com/IBMRedbooks

    Follow us on Twitter:http://twitter.com/ibmredbooks

    Look for us on LinkedIn:http://www.linkedin.com/groups?home=&gid=2130806

    Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks weekly newsletter:https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm

    Stay current on recent Redbooks publications with RSS Feeds:http://www.redbooks.ibm.com/rss.htmlxx IBM ProtecTIER Implementation and Best Practices Guide

  • Part 1 General best practices

    This part describes the general best practices that users of IBM ProtecTIER can employ, such as recovery management and back-end storage concepts. This part also describes guidelines for Virtual Tape Library (VTL), File System Interface (FSI) for the Common Internet System (FSI-CIFS) and for the Network File System (FSI-NFS), and for OpenStorage (OST). This part describes configuration options with regards to host attachment.This part describes the following topics: ProtecTIER basics Deduplication considerations Virtual Tape Library guidelines ProtecTIER File System Interface: General introduction and NFS OpenStorage guidelines Host attachment considerations for Virtual Tape Library

    Part 1 Copyright IBM Corp. 2012, 2014. All rights reserved. 1

  • 2 IBM ProtecTIER Implementation and Best Practices Guide

  • Chapter 1. IBM ProtecTIER basics

    This chapter describes the general concepts of IBM ProtecTIER as related to its fundamental operation, including a list of terms and definitions that are used in this book and in the ProtecTIER environment. In addition to the ProtecTIER Management Interface, a brief overview is also provided about the existing models, and the benefits of the ProtecTIER command-line interface (ptcli).In addition, this chapter provides readers with an introduction to the ProtecTIER engine for deduplication, which is IBM HyperFactor. This chapter also describes the Remote Support and Call Home capabilities, and the Simple Network Management Protocol (SNMP) functionality.

    The following topics are discussed: Terminology used in the ProtecTIER environment ProtecTIER fundamental concepts ProtecTIER models for open systems Remote support and Call Home SNMP ProtecTIER command-line interface (CLI) overview

    1 Copyright IBM Corp. 2012, 2014. All rights reserved. 3

  • 1.1 TerminologyThe following terms and definitions are used in this publication, and are common for all products from the ProtecTIER family:ProtecTIER When used alone, this expression points to the IBM patented

    deduplication solution based on HyperFactor. Depending on the context, it can mean the family of products, a specific device, or just the deduplication engine.

    TS7600 When used alone, this term signifies the IBM System Storage family of virtualization solutions that operate on the ProtecTIER platform, including the ProtecTIER appliances and gateways.

    Factoring ratio The factoring ratio is the ratio of nominal capacity to physical capacity in the ProtecTIER repository. For example, if you have 100 terabytes (TB) of user data (nominal capacity) and it is stored on 10 TB of physical capacity, your factoring ratio is 10:1.

    HyperFactor The patented IBM algorithm that eliminates data duplicates from the incoming backup data streams. The factoring ratios are the result of HyperFactor processing and compression.

    VTL Virtual Tape Library. The ProtecTIER VTL service emulates traditional tape libraries. By emulating tape libraries, you can use ProtecTIER VTL to migrate to disk backup without having to replace your entire backup environment.

    Shelf A container of VTL cartridges in a ProtecTIER repository. This container is analogous to a shelf or a rack where physical tapes are kept outside of the automated tape library (ATL) in cartridge slots. This container is only applicable with the VTL configuration option, and is not available in OST or FSI configuration options.

    OST OpenStorage. This configuration option enables ProtecTIER to be integrated with Symantec NetBackup to provide a backup-to-disk capability without using a VTL emulation. Using a plug-in that is installed on an OST-enabled media server, you can use ProtecTIER to implement a communication protocol that supports data transfer and control between the backup server and the ProtecTIER server. Therefore, you use ProtecTIER to implement a storage server emulation.

    FSI File System Interface. This configuration option enables ProtecTIER to present disk repository storage as a virtualized hierarchy of file systems.

    FSI-CIFS FSI Common Internet File System. ProtecTIER emulates Windows file system behavior and presents a virtualized hierarchy of file systems, directories, and files to Windows CIFS clients. When configured for FSI-CIFS, ProtecTIER emulates a network-attached storage (NAS) backup target capable of using both HyperFactor and ProtecTIER native replication bandwidth reduction techniques for storing and replicating deduplicated data.

    FSI-NFS FSI Network File System. ProtecTIER emulates UNIX file system behavior and presents a virtualized hierarchy of file systems, directories, and files to UNIX-based clients using the NFS protocol. 4 IBM ProtecTIER Implementation and Best Practices Guide

  • When configured for FSI-NFS, ProtecTIER emulates an NAS backup target that can use both HyperFactor and ProtecTIER native replication bandwidth reduction techniques for storing and replicating deduplicated data.

    System console The system console that is used with the System Storage TS7650 ProtecTIER Appliance products and System Storage TS7650G ProtecTIER Deduplication Gateway (TS7650G, or ProtecTIER Gateway) is the IBM System Storage TS3000 System Console (TSSC). The System Storage TS7620 ProtecTIER small and medium business (SMB) appliance has included system console functions, and therefore does not require a TSSC.

    Metadata Metadata is the information used to track the user data sent from the backup servers, including where it is stored on the disk.

    User data User data consists of the backup files and data sets that are stored in the ProtecTIER system. It is the data that the backup applications are storing on disk.

    Repository The repository is the physical disk that holds the ProtecTIER factored data. There are two types of file systems that make up the ProtecTIER Repository:

    MetadataUser data

    Front-end The connection from ProtecTIER to the backup server.Back-end The connection from ProtecTIER to the attached disk storage

    subsystem that acts as a repository.Node and server A single ProtecTIER system. It can be either a TS7650G or System

    Storage TS7620 ProtecTIER Appliance Express (TS7620) or one of the previous models, and is represented as a node from the ProtecTIER Manager software. Stand-alone node or dual-node cluster configurations are available. This book uses the terms node and server interchangeably.

    IBM Tivoli Assist On-site (AOS)A web-based tool that enables a remote support representative in IBM to view or control the management node desktop. For more information, go to the Tivoli AOS website:http://www.ibm.com/support/assistonsite

    1.1.1 ProtecTIER Appliance terminologyThe System Storage TS7650 ProtecTIER Appliance is the IBM self-contained virtualization solution that includes an embedded, pre-configured disk storage repository. The following terms are specific to the ProtecTIER Appliance:Disk controller The disk controller for the ProtecTIER Appliance is the 4.8 TB Fibre

    Channel (FC) Disk Controller (Feature Code 3708). Use this feature code for service purposes.

    Disk expansion unit The disk expansion unit for the ProtecTIER Appliance is the 4.8 TB Fibre Channel Disk Expansion Unit (Feature Code 3707). Use this feature code for service purposes. Chapter 1. IBM ProtecTIER basics 5

  • 3958 AP1 The 3958 AP1 server, which is based on the IBM System x3850 X5 Type 7145-AC1, was withdrawn from marketing as of November 30, 2012.

    3959 SM1 System Storage TS7610 ProtecTIER Deduplication Appliance Express. A self-contained virtualization solution that includes an embedded pre-configured disk storage repository. It was withdrawn from marketing as of August 31, 2012.

    3959 SM2 TS7620. A self-contained virtualization solution that includes an embedded pre-configured disk storage repository. It has a base unit, which has two capacity versions (6 TB and 12 TB), and it can have up to two expansion units providing more capacity (23 TB and 35 TB).

    3959 EXP The 3959 EXP expansion drawer enhances the capacity and improves the performance of the TS7620. The base unit with one field expansion drawer offers 23 TB repository capacity. The base unit with two field expansion drawers offers 35 TB of repository capacity.

    1.1.2 ProtecTIER Gateway terminologyThe TS7650G is the IBM virtualization solution that does not include a disk storage repository. The customer can choose a solution from various storage options to build the back-end disk repository. IBM supports two clustered pairs of TS7650G servers in a single frame.

    There are four types of servers that can be used in the TS7650G: 3958 DD5 This server is the newest high-performance server (available since

    May 2012), and is included with ProtecTIER Version 3.2 or higher. This server is based on the IBM System x7145 model. When used as a server in the TS7650G, its machine type and model are 3958 DD5. Use this machine type and model for service purposes.

    3958 DD4 This server (available since December 2010) is based on the IBM System x3850 X5 Type 7145-AC1 (or 7145-PBR). When used as a server in the TS7650G, its machine type and model are 3958 DD4. Use this machine type and model for service purposes.

    Tip: The link for the withdrawal announcements can be found on the following website:

    http://www-01.ibm.com/common/ssi/index.wss?request_locale=en.

    For AP1, look for announcement number 912-173. For SM1, look for 912-096.

    Restriction: Effective August 31, 2012, IBM withdrew the 3958 DD4 from marketing. For more information, see the IBM United States Withdrawal Announcement 912-096. 6 IBM ProtecTIER Implementation and Best Practices Guide

  • 3958 DD3 This server (available since March 2009) is based on the IBM System x3850 M2 Type 7233. When used as a server in the TS7650G, its machine type and model are 3958 DD3. It is no longer available for purchase.

    3958 DD1 This server is the original server (available since August 2008). This server is based on the IBM System x3850 M2 Type 7141. When used as a server in the TS7650G, its machine type and model are 3958 DD1. IBM withdrew this product from market and ended support.

    Disk controller The customer must choose a disk controller for use with the TS7650G (ProtecTIER Gateway). A list of compatible controllers is on the IBM Tape Systems Resource Library website:http://www.ibm.com/systems/storage/tape/library.html

    Click the ProtecTIER model that you are working with, and the detailed list of specifications and description for that model is shown.

    Disk expansion unit The customer must choose a disk expansion unit for use with the TS7650G. A list of compatible expansion units is on the IBM Tape Systems Resource Library website:http://www.ibm.com/systems/storage/tape/library.html

    Click the ProtecTIER model that you are working with and the detailed list of specifications and description for that model is shown.

    1.1.3 ProtecTIER replication terminology Replication enables you to set rules (depending on your required replication needs) for replicating data objects across ProtecTIER repositories. The ProtecTIER repositories can be different in size and physical layout. Because ProtecTIER deduplicates data before storing it, only the changes are transferred to the remote site. These rules for replicating data objects are defined in replication policies on each ProtecTIER system.

    Restriction: Effective December 3, 2010, IBM withdrew the 3958 DD3 from marketing. For more information, see the IBM United States Withdrawal Announcement WG10-0109.

    Restriction: Effective March 28, 2009, IBM withdrew the 3958 DD1 from marketing. For more information, see the IBM United States Withdrawal Announcement WG09-0016.

    Important: The ProtecTIER replication policies are only available on VTL and FSI environments. For details about how to configure the replication rules on OST environments, see section 6.4, NetBackup Storage Lifecycle Policies on page 107.Chapter 1. IBM ProtecTIER basics 7

  • The replication function enables System Storage TS7600 deployment to be distributed across sites. Each site has a stand-alone or clustered ProtecTIER environment. Each ProtecTIER environment has at least one ProtecTIER server. ProtecTIER servers come with two dedicated replica