Upload
maria-segovia
View
252
Download
6
Tags:
Embed Size (px)
DESCRIPTION
Sg 248025
Citation preview
ibm.com/redbooks
Front cover
IBM ProtecTIER Implementation and Best Practices Guide
Karen OrlandoMara Miranda Bautista
Jose Roberto Mosqueda MejiaRosane Goldstein Langnor
Implement scenarios for backup recovery applications with ProtecTIER
Optimize data deduplication and storage efficiency
Exploit the File System Interface using CIFS and NFS
International Technical Support Organization
IBM ProtecTIER Implementation and Best Practices Guide
August 2014
SG24-8025-02
Copyright International Business Machines Corporation 2012, 2014. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP ScheduleContract with IBM Corp.
Third Edition (August 2014)This edition applies to ProtecTIER Version physical general availability (pGA) 3.3.x
Note: Before using this information and the product it supports, read the information in Notices on page xv.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviiAuthors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviiiNow you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xixComments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xxStay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xx
Part 1. General best practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 1. IBM ProtecTIER basics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1.1 ProtecTIER Appliance terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51.1.2 ProtecTIER Gateway terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61.1.3 ProtecTIER replication terminology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2 ProtecTIER fundamental concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101.2.1 ProtecTIER with deduplication disabled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.3 ProtecTIER models for open systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.3.1 ProtecTIER appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.3.2 ProtecTIER deduplication gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
1.4 Remote support and Call Home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151.4.1 How to set up Call Home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.5 Simple Network Management Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191.5.1 Alert filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191.5.2 Space thresholds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201.5.3 Email alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.6 ProtecTIER command-line interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Chapter 2. Deduplication considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252.1 HyperFactor data deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
2.1.1 HyperFactor, deduplication, and bandwidth savings. . . . . . . . . . . . . . . . . . . . . . . 272.2 ProtecTIER HyperFactor deduplication processing . . . . . . . . . . . . . . . . . . . . . . . . . . . 282.3 Components of a ProtecTIER system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3.1 ProtecTIER server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292.3.2 HyperFactor deduplication algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302.3.3 Disk storage subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
2.4 Benefits of ProtecTIER HyperFactor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302.4.1 Flexibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312.4.2 High availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312.4.3 High performance, low storage requirements, and lower environmental costs. . . 31
2.5 General ProtecTIER deduplication considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322.5.1 Rethinking your overall backup strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322.5.2 Data reduction technologies should not be combined . . . . . . . . . . . . . . . . . . . . . 332.5.3 Data streams must be in order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332.5.4 Data organization in your ProtecTIER repository . . . . . . . . . . . . . . . . . . . . . . . . . 342.5.5 The dynamics of the ProtecTIER repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342.5.6 ProtecTIER repository usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352.5.7 Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Copyright IBM Corp. 2012, 2014. All rights reserved. iii
2.5.8 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372.5.9 Database logs and other data types with high data change rates . . . . . . . . . . . . 382.5.10 Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382.5.11 Tape block size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382.5.12 File size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.6 Data types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392.6.1 Candidates for a high factoring ratio . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392.6.2 Candidates for a low factoring ratio. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Chapter 3. Networking essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413.1 Network terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423.2 General configuration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433.3 Bonding and teaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.3.1 The three different bonding modes of ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . . 443.4 Preferred ProtecTIER bonding configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.4.1 Single team/bond (Layer 2) configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483.4.2 Individual IPs (Layer 3) configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483.4.3 Dual/Three teams (Layer 2+3) configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493.4.4 VLANs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513.4.5 IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543.4.6 Routing the IP traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Chapter 4. Virtual Tape Library guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 574.1 ProtecTIER Virtual Tape Library introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584.2 General preferred practices for the Virtual Tape Library . . . . . . . . . . . . . . . . . . . . . . . . 584.3 Setting up the virtual library and cartridges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
4.3.1 Creating libraries. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Chapter 5. ProtecTIER File System Interface: General introduction . . . . . . . . . . . . . . 735.1 ProtecTIER FSI network overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
5.1.1 ProtecTIER network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745.1.2 Network configuration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755.1.3 Connecting a ProtecTIER server to the network. . . . . . . . . . . . . . . . . . . . . . . . . . 75
5.2 Configuring components for ProtecTIER FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785.2.1 Configuring a network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795.2.2 Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815.2.3 Disaster recovery: Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825.2.4 Disaster recovery: Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825.2.5 General FSI suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
5.3 File System Interface guidelines for NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835.3.1 ProtecTIER NFS authentication and security management . . . . . . . . . . . . . . . . . 835.3.2 Configuration of a ProtecTIER FSI-NFS export . . . . . . . . . . . . . . . . . . . . . . . . . . 865.3.3 Understanding root squash. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
5.4 File System Interface guidelines for CIFS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 915.4.1 ProtecTIER authentication and user management . . . . . . . . . . . . . . . . . . . . . . . . 915.4.2 Configuring your ProtecTIER system for FSI-CIFS. . . . . . . . . . . . . . . . . . . . . . . . 92
5.5 FSI File System Scalability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Chapter 6. OpenStorage guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1036.1 OpenStorage overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
6.1.1 Main components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1046.2 Networking overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
6.2.1 Definitions and acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105iv IBM ProtecTIER Implementation and Best Practices Guide
6.2.2 Load distribution methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
6.2.3 Bonding configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.4 Broadcom NICs with Microsoft platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.5 IBM AIX platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.6 Solaris platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1056.2.7 Configuring the network interfaces on the host media server . . . . . . . . . . . . . . . 1066.2.8 Configuring a ProtecTIER server to work with the OpenStorage environment . . 106
6.3 Performance optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1066.4 NetBackup Storage Lifecycle Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1076.5 Symantec OST functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
6.5.1 Optimized duplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096.5.2 Granular Recovery Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096.5.3 Auto Image Replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106.5.4 Accelerator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106.5.5 Optimized Synthetic Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Chapter 7. Host attachment considerations for Virtual Tape Library. . . . . . . . . . . . . 1117.1 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1127.2 Device driver specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
7.2.1 AIX specifications to work with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137.2.2 Solaris specifications to work with VTL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.3 Linux specifications to work with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.4 Windows specifications to work with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.5 IBM Tape Device Driver . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1147.2.6 Control path failover and data path failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1157.2.7 Persistent device naming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
7.3 LUN masking for VTL systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1227.3.1 LUN masking methods and preferred practices . . . . . . . . . . . . . . . . . . . . . . . . . 1237.3.2 LUN masking configuration steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Part 2. Back-end storage subsystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Chapter 8. Back-end storage overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1338.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1348.2 Dependencies from a back-end storage subsystem view. . . . . . . . . . . . . . . . . . . . . . 1368.3 Dependencies from a ProtecTIER view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1378.4 Smart storage subsystems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1378.5 Key rules for a ProtecTIER server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1388.6 Storage arrays configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
8.6.1 General requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1398.6.2 RAID considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1408.6.3 LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1428.6.4 Expanding the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
8.7 Storage area network fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1438.7.1 Two Fibre Channel paths to each storage controller . . . . . . . . . . . . . . . . . . . . . 1438.7.2 Inter-switch link . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1438.7.3 Dedicated zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1448.7.4 Front-end zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1448.7.5 Back-end zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1448.7.6 SAN paths. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Chapter 9. IBM FlashSystem with System Storage TS7650G ProtecTIER Deduplication Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
9.1 IBM FlashSystem overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Contents v
9.2 General FlashSystem considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
9.3 Deploying the IBM FlashSystem 840 with IBM ProtecTIER . . . . . . . . . . . . . . . . . . . . 1509.3.1 Creating user data and metadata Volumes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1509.3.2 Mapping the FlashSystem Volumes to the ProtecTIER System. . . . . . . . . . . . . 1529.3.3 Creating file systems and building the ProtecTIER repository . . . . . . . . . . . . . . 153
9.4 General FlashSystem 840 Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1569.4.1 ProtecTIER Metadata Planner preferred practices for FlashSystem 840 . . . . . . 157
Chapter 10. IBM Storwize V3700 and V5000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15910.1 V3700 and V5000 overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16010.2 General V3700 and V5000 considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16010.3 Configuration steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
10.3.1 Creating empty user data and metadata storage pools . . . . . . . . . . . . . . . . . . 16110.3.2 Creating the MDisk arrays or discovering unmanaged MDisks . . . . . . . . . . . . 16310.3.3 Creating volumes with a sequential virtualization type . . . . . . . . . . . . . . . . . . . 16710.3.4 Creating a host connection for the ProtecTIER nodes by using the GUI . . . . . 17110.3.5 Mapping volumes to a host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17510.3.6 Creating file systems and building the ProtecTIER repository . . . . . . . . . . . . . 17610.3.7 Expanding the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180
Chapter 11. IBM System Storage SAN Volume Controller, IBM Storwize V7000, and V7000 Unified Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
11.1 Storage virtualization introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18211.1.1 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
11.2 General notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18511.3 Firmware level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18611.4 Fibre Channel connection topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18711.5 User data and metadata pool: General suggestions. . . . . . . . . . . . . . . . . . . . . . . . . 190
11.5.1 Metadata pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19011.5.2 User data pool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
11.6 Configuration steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19111.6.1 Creating empty user data and metadata storage pools . . . . . . . . . . . . . . . . . . 19211.6.2 Creating the MDisk arrays or discovering unmanaged MDisks . . . . . . . . . . . . 19311.6.3 Creating volumes with a sequential virtualization type . . . . . . . . . . . . . . . . . . . 19811.6.4 Creating a host connection for ProtecTIER nodes in Storwize V7000 GUI . . . 20011.6.5 Mapping volumes to a host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20411.6.6 Creating file systems and building the ProtecTIER repository . . . . . . . . . . . . . 20511.6.7 Expanding the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Chapter 12. IBM XIV Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21112.1 XIV Storage System hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21212.2 Fibre Channel switch cabling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
12.2.1 Zoning configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21412.2.2 Configuring the XIV Storage System for a ProtecTIER server . . . . . . . . . . . . . 215
Chapter 13. IBM System Storage DS8000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22113.1 DS8000 series overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
13.1.1 Disk drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22413.1.2 RAID levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
13.2 General considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.1 Planning tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.2 Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.3 User data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22613.2.4 Firmware levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22713.2.5 Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227vi IBM ProtecTIER Implementation and Best Practices Guide
13.3 Rotate extents: Striping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22713.3.1 When not to use rotate extents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Part 3. Backup management, VTL, OST, and FSI preferred practices . . . . . . . . . . . . . . . . . . . . . . . . . 233
Chapter 14. Backup management introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23514.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23614.2 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
14.2.1 Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23614.2.2 Software compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23614.2.3 Software, backup application, and operating system . . . . . . . . . . . . . . . . . . . . 23614.2.4 Tape library zoning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23714.2.5 Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.6 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.7 Multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.8 Tape block sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23814.2.9 Type of data that is backed up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
14.3 General advice for backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23914.4 ProtecTIER integration with backup applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 23914.5 Backup application vocabulary cross-reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24014.6 Backup application catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24014.7 Remote cloning of virtual tapes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Chapter 15. IBM Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24315.1 Tivoli Storage Manager VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24415.2 Tivoli Storage Manager: Preferred options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
15.2.1 LAN-free backups with the ProtecTIER product . . . . . . . . . . . . . . . . . . . . . . . . 24515.2.2 Data streams. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24515.2.3 Reclamation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24615.2.4 Collocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24715.2.5 Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24715.2.6 Backing up your Tivoli Storage Manager database . . . . . . . . . . . . . . . . . . . . . 24715.2.7 Physical tape. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24715.2.8 Avoiding mount conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24815.2.9 Multiple streams from the client with the resourceutilization parameter . . . . . . 24815.2.10 Accommodating increased sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25015.2.11 Tivoli Storage Manager storage pool selection . . . . . . . . . . . . . . . . . . . . . . . . 25015.2.12 Technical overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25115.2.13 Advantages of a Tivoli Storage Manager environment with ProtecTIER . . . . 25215.2.14 Tivoli Storage Manager configuration with VTL . . . . . . . . . . . . . . . . . . . . . . . 25215.2.15 Updating to a VTL library type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25515.2.16 Defining and deleting Tivoli Storage Manager libraries with many drives. . . . 255
15.3 Tivoli Storage Manager: FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25615.3.1 Setting up backup and restore on Tivoli Storage Manager . . . . . . . . . . . . . . . . 25715.3.2 Performing backup and restore on Tivoli Storage Manager . . . . . . . . . . . . . . . 26115.3.3 Parameters for best performance with ProtecTIER FSI . . . . . . . . . . . . . . . . . . 263
Chapter 16. Symantec NetBackup and BackupExec . . . . . . . . . . . . . . . . . . . . . . . . . . 26516.1 NetBackup overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26616.2 Suggestions for NetBackup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
16.2.1 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26716.3 NetBackup in a VTL environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26816.4 NetBackup in an OST environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268 Contents vii
16.5 NetBackup in an FSI environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
16.5.1 NetBackup in an FSI-CIFS environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26916.5.2 NetBackup in an FSI-NFS environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
16.6 Symantec BackupExec in an FSI environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27716.6.1 Setting up backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
Chapter 17. EMC NetWorker. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28117.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28217.2 EMC NetWorker in a VTL environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
17.2.1 General suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28317.2.2 Suggestion if a ProtecTIER server is used as a VTL . . . . . . . . . . . . . . . . . . . . 283
17.3 EMC NetWorker in an FSI environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28417.3.1 Creating a Windows user for EMC NetWorker . . . . . . . . . . . . . . . . . . . . . . . . . 28417.3.2 Setting up for backup and restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28517.3.3 General configuration suggestions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28517.3.4 Setting the information to be backed up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28617.3.5 Setting the time for the backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28717.3.6 Performing a restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28717.3.7 Parameters for best performance with ProtecTIER FSI . . . . . . . . . . . . . . . . . . 287
Chapter 18. HP Data Protector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28918.1 HP Data Protector with ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
18.1.1 HP Data Protector architecture with ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . 29018.2 HP Data Protector in a VTL environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
18.2.1 Enabling the robotic bar code reader . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29218.2.2 Increasing the tape block size. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29218.2.3 Enabling the lock name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29418.2.4 Disabling compression, encryption, and CRC chksum . . . . . . . . . . . . . . . . . . . 29518.2.5 Hosts multipath support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29618.2.6 Load balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29818.2.7 Using a mirroring functionality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29918.2.8 Troubleshooting logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
Chapter 19. IBM i and Backup, Recovery, and Media Services . . . . . . . . . . . . . . . . . 30119.1 IBM i overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
19.1.1 Integrated file system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.2 Integrated database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.3 Object-based architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.4 Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30219.1.5 Backup considerations in IBM i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
19.2 Integration of IBM i and ProtecTIER in a VTL environment . . . . . . . . . . . . . . . . . . . 30319.2.1 Backup considerations with ProtecTIER. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30319.2.2 Suggested ProtecTIER and IBM i configuration . . . . . . . . . . . . . . . . . . . . . . . . 304
19.3 Configuration of BRMS for ProtecTIER. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30619.3.1 BRMS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30619.3.2 Suggested configurations of BRMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
19.4 Deploying ProtecTIER with BRMS for disaster recovery . . . . . . . . . . . . . . . . . . . . . 30819.4.1 BRMS available at the production site and DR site . . . . . . . . . . . . . . . . . . . . . 30819.4.2 No BRMS at the DR site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
19.5 Use DUPMEDBRM to duplicate media from ProtecTIER to physical media. . . . . . . 31319.5.1 Enable append to multiple parallel volumes during DUPMEDBRM . . . . . . . . . 31319.5.2 Support multiple batch jobs for the DUPMEDBRM command . . . . . . . . . . . . . 314
19.6 Device configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31519.7 BRMS movement of replicated volumes - considerations. . . . . . . . . . . . . . . . . . . . . 315viii IBM ProtecTIER Implementation and Best Practices Guide
Chapter 20. CommVault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31720.1 CommVault introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
20.1.1 CommVault components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31820.2 CommVault with ProtecTIER VTL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
20.2.1 CommVault configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32020.2.2 Data multiplexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32720.2.3 Hardware compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32820.2.4 Data encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32920.2.5 Alternative data paths . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
20.3 CommVault FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33120.3.1 Setting up backup and restore in a CIFS environment . . . . . . . . . . . . . . . . . . . 33120.3.2 Parameters for best performance with ProtecTIER FSI-CIFS . . . . . . . . . . . . . 33220.3.3 Setting up backup and restore in an NFS environment . . . . . . . . . . . . . . . . . . 33720.3.4 Parameters for best performance with ProtecTIER FSI-NFS . . . . . . . . . . . . . . 341
Chapter 21. Veeam FSI-CIFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34321.1 Setting up backup infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
21.1.1 Creating backup repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34421.1.2 Adding VMware backup proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34521.1.3 Adding a VMware Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
21.2 Setting up backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34721.2.1 Creating a new backup job for backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34721.2.2 Performing backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34821.2.3 Performing restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
21.3 Parameters for best performance with ProtecTIER-CIFS . . . . . . . . . . . . . . . . . . . . . 34921.3.1 Disabling data de-duplication and compression . . . . . . . . . . . . . . . . . . . . . . . . 34921.3.2 Setting data block size for backup to SAN or local storage . . . . . . . . . . . . . . . 34921.3.3 Setting Incremental backup mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
21.4 Advanced backup repository settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35121.4.1 Setting data blocks alignment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35121.4.2 Setting data blocks decompression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
21.5 Summary of parameters for best performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Part 4. Application considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Chapter 22. Application considerations and data types . . . . . . . . . . . . . . . . . . . . . . . 35522.1 Lotus Domino . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
22.1.1 Common server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35622.1.2 Existing backup and disk space usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35622.1.3 Domino attachments and object service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35722.1.4 Applying the DAOS solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35922.1.5 ProtecTIER considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
22.2 Microsoft Exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36422.2.1 Defragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36422.2.2 Suggestions for Microsoft Exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36422.2.3 Microsoft Exchange 2010 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
22.3 Microsoft SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36522.3.1 Integrating the ProtecTIER server with Microsoft SQL Server backup . . . . . . . 36522.3.2 Index defragmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36722.3.3 Suggestions for Microsoft SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36722.3.4 LiteSpeed for SQL Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
22.4 DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36822.4.1 Combining DB2 compression and ProtecTIER deduplication. . . . . . . . . . . . . . 368 Contents ix
22.4.2 Upgrading the DB2 database to improve deduplication . . . . . . . . . . . . . . . . . . 369
22.4.3 DB2 DEDUP_DEVICE setting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37122.4.4 Example of DEDUP_DEVICE setting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37222.4.5 Excluding logs from the DB2 database backup . . . . . . . . . . . . . . . . . . . . . . . . 37322.4.6 DB2 suggested settings without DEDUP_DEVICE. . . . . . . . . . . . . . . . . . . . . . 373
22.5 Oracle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37422.5.1 Suggested RMAN settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37422.5.2 Mounting NFS Oracle Server to ProtecTIER NAS . . . . . . . . . . . . . . . . . . . . . . 37722.5.3 Using ProtecTIER NAS to run RMAN incremental merge backups . . . . . . . . . 37822.5.4 Using ProtecTIER NAS to store Oracle DataPump exports . . . . . . . . . . . . . . . 38022.5.5 Using ProtecTIER NAS to store Oracle database files and offline redo logs . . 38122.5.6 Other suggestions for RMAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
22.6 SAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38222.6.1 SAP introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38222.6.2 Data protection for SAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38222.6.3 Integration of Tivoli Storage Manager for ERP with SAP . . . . . . . . . . . . . . . . . 38522.6.4 Tivoli Storage Manager for ERP for Oracle database. . . . . . . . . . . . . . . . . . . . 38522.6.5 Tivoli Storage Manager for ERP for DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38822.6.6 SAP BR*Tools for Oracle using BACKINT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39022.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager . . . . . . . . 39222.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage
Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39322.6.9 Best practices for Tivoli Storage Manager for ERP with ProtecTIER . . . . . . . . 394
22.7 VMware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39522.7.1 Technical overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39522.7.2 Settings and tuning for VMware and Tivoli Storage Manager. . . . . . . . . . . . . . 39622.7.3 Backup solutions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39722.7.5 Configuring the ProtecTIER server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40022.7.8 Tivoli Storage Manager server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 40622.7.9 Tivoli Storage Manager client installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40822.7.10 Disabling compression and deduplication on Tivoli Storage Manager . . . . . . 40922.7.11 Configuring a full VM backup through the vStorage API. . . . . . . . . . . . . . . . . 41122.7.12 VMware Guest OS backup to ProtecTIER . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Part 5. Replication and disaster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 417
Chapter 23. ProtecTIER replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41923.1 ProtecTIER IP replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42023.2 Native replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
23.2.1 One-to-one replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.2 Many-to-one replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.3 Many-to-many replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.4 VTL replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.5 OST replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42123.2.6 FSI replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42223.2.7 Replication grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42223.2.8 Replication topology group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
23.3 Replication policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42423.4 Visibility switching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42523.5 Principality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42523.6 Replication Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42523.7 Initial synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42723.8 Replication schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
23.8.1 Continuous replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428x IBM ProtecTIER Implementation and Best Practices Guide
23.8.2 Scheduled replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42923.8.3 Centralized Replication Schedule Management . . . . . . . . . . . . . . . . . . . . . . . . 43023.8.4 Replication rate control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43123.8.5 Setting replication rate limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43323.8.6 Limiting port bandwidth consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
23.9 Replication backlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43523.9.1 SNMP alerts for replication backlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
23.10 Replication planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43723.10.1 Bandwidth sizing and requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43823.10.2 Replication throughput barriers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43823.10.3 Calculating the replication data transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43923.10.4 Calculating replication bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43923.10.5 Ports for replication in firewalled environments. . . . . . . . . . . . . . . . . . . . . . . . 440
23.11 Bandwidth validation utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44023.11.1 Using the bandwidth validation utility to test the data flow . . . . . . . . . . . . . . . 44123.11.2 Interpreting the results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44323.11.3 Repository replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
23.12 Planning ProtecTIER replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44623.12.1 Deployment planning scenario: many-to-many. . . . . . . . . . . . . . . . . . . . . . . . 44623.12.2 Many-to-one replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
23.13 The backup application database backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45423.14 ProtecTIER Planner tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
Chapter 24. Disaster recovery deployment with backup applications. . . . . . . . . . . . 45724.1 Disaster recovery operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45824.2 ProtecTIER replication overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45824.3 Disaster recovery operations with VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
24.3.1 Replication data transfer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45924.3.2 Managing cartridges after replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45924.3.3 Cartridge replication requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.4 Importing/exporting slots allocation in VTL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.5 Import/export slots searching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.6 Automation of daily operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46124.3.7 Gauging the replication completion status . . . . . . . . . . . . . . . . . . . . . . . . . . . . 462
24.4 Disaster recovery operations with FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46424.4.1 Replication Destination Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46524.4.2 ProtecTIER FSI cloning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46524.4.3 Replication preferred practices for FSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
24.5 Entering ProtecTIER DR mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46624.5.1 Working at the disaster recovery site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46724.5.2 Inventory command options for a VTL disaster recovery scenario . . . . . . . . . . 46724.5.3 Commonly used disaster recovery queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46824.5.4 Returning to normal operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
24.6 The backup application catalog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47024.6.1 ProtecTIER replication with Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . 47124.6.2 Recovering the backup application catalog. . . . . . . . . . . . . . . . . . . . . . . . . . . . 47224.6.3 Tivoli Storage Manager reclamation and housekeeping. . . . . . . . . . . . . . . . . . 473
24.7 Single domain and multiple domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47424.7.1 Single domain environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47424.7.2 Multiple domain environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
24.8 Replication preferred practices for OST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47424.8.1 The OpenStorage operating environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
24.9 Deploying replication with specific backup applications . . . . . . . . . . . . . . . . . . . . . . 475 Contents xi
24.9.1 Recovery point objective. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47624.10 Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
24.10.1 Scenario 1: Replication complete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47724.10.2 Scenario 2: Replication incomplete. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47724.10.3 Scenario 3: Auditing tapes and fixing the Tivoli Storage Manager database . 47824.10.4 Reclamation considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47824.10.5 Determining what is available for restoration at the DR site . . . . . . . . . . . . . . 480
24.11 Symantec NetBackup deployment with ProtecTIER replication . . . . . . . . . . . . . . . 48124.11.1 Scripting the inject/eject commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.2 Scripting the inventory commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.3 Setting up NetBackup for backup and restore . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.4 Setting up NetBackup for disaster recovery . . . . . . . . . . . . . . . . . . . . . . . . . . 48124.11.5 Cross-site backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48224.11.6 ProtecTIER disaster recovery with Symantec NetBackup . . . . . . . . . . . . . . . 48324.11.7 Single domain versus two separate domains . . . . . . . . . . . . . . . . . . . . . . . . . 48324.11.8 Disaster recovery scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48424.11.9 Determining what is available for restore at the disaster recovery site . . . . . . 48624.11.10 Eject and inject commands from NetBackup software . . . . . . . . . . . . . . . . . 48624.11.11 Disaster Recovery operations with OpenStorage . . . . . . . . . . . . . . . . . . . . . 487
24.12 EMC NetWorker deployment with ProtecTIER replication . . . . . . . . . . . . . . . . . . . 48824.12.1 Cloning physical tapes with ProtecTIER replication . . . . . . . . . . . . . . . . . . . . 48924.12.2 Disaster recovery with ProtecTIER replication . . . . . . . . . . . . . . . . . . . . . . . . 492
24.13 CommVault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49524.13.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49524.13.2 Running the CommVault backup operation . . . . . . . . . . . . . . . . . . . . . . . . . . 49524.13.3 CommVault resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
Appendix A. ProtecTIER parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499The ProtecTIER parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500Explanation of how metadata from the backup application hinders deduplication . . . . 500ProtecTIER parser functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502ProtecTIER parsers: Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502What workloads benefit from the ProtecTIER parsers . . . . . . . . . . . . . . . . . . . . . . . . . 503Background information: Causes of low deduplication ratios . . . . . . . . . . . . . . . . . . . . 503Estimating the benefit of a parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 504Environments that benefit from parsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505Experience from one user site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507Using analyze_sessions to monitor the benefit of a ProtecTIER parser . . . . . . . . . . . . 507
Appendix B. Entry-level and midrange disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509General considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510
Using the current version of software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 510General settings on System Storage DS storage subsystems . . . . . . . . . . . . . . . . . . . 510Disabling Automatic Volume Transfer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511Direct cabling without SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517Cabling and zoning in SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
The DS3000 series . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526EXP3500 attachment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527Cache upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528Turbo Performance feature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528Media scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 529xii IBM ProtecTIER Implementation and Best Practices Guide
Appendix C. Networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531
Bonding on Linux and UNIX machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532Bonding on Linux computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532Bonding on UNIX computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
Teaming on Microsoft-based computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533Broadcom NICs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533Intel NICs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Link aggregation and similar technologies on the LAN switches . . . . . . . . . . . . . . . . . . . . 534
Appendix D. Managing cartridge sizes with ProtecTIER. . . . . . . . . . . . . . . . . . . . . . . 535Effects of dynamic cartridge sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536The mechanism behind fluctuating cartridge sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Appendix E. Replacement from Generic to Gateway Model . . . . . . . . . . . . . . . . . . . . 539General Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540Replacing from Generic to Gateway Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Publications common to the TS7650 Appliance and TS7650G . . . . . . . . . . . . . . . . . . 549TS7650 Appliance publications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550TS7610 Appliance Express and TS7620 Appliance Express publications . . . . . . . . . . 550Integrated Management Module and Remote Supervisor Adaptor publications. . . . . . 551
Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 552 Contents xiii
xiv IBM ProtecTIER Implementation and Best Practices Guide
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information about the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. Copyright IBM Corp. 2012, 2014. All rights reserved. xv
TrademarksIBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. These and other IBM trademarked terms are marked on their first occurrence in this information with the appropriate symbol ( or ), indicating US registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at http://www.ibm.com/legal/copytrade.shtml
The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both:
AIXAS/400DB2DB2 ConnectDB2 Universal DatabaseDominoDS4000DS5000DS8000Easy TiereServerFlashCopyFlashSystem
Global Technology ServicesHyperFactorHyperSwapIBMInformixiNotesiSeriesLotusLotus NotesMicroLatencyNotesPOWERProtecTIER
RedbooksRedbooks (logo) RETAINSametimeStorwizeSystem iSystem pSystem StorageSystem Storage DSSystem xTivoliXIVz/OS
The following terms are trademarks of other companies:
Intel, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Ultrium, the LTO Logo and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and other countries.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Other company, product, or service names may be trademarks or service marks of others. xvi IBM ProtecTIER Implementation and Best Practices Guide
Preface
This IBM Redbooks publication provides best practice guidance for planning, installing, and configuring the IBM System Storage TS7600 ProtecTIER family of products. This guide provides the current best practices for using ProtecTIER software version physical general availability (pGA) 3.3 and the revolutionary and patented IBM HyperFactor deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation.
The System Storage TS7650G ProtecTIER Deduplication Gateway and the System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems that are configured for three available interfaces: The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates
traditional automated tape libraries. The OpenStorage (OST) application programming interface (API) can be integrated with
Symantec NetBackup to provide backup-to-disk without having to emulate traditional tape libraries.
The File System Interface (FSI) supports Common Internet File System (CIFS) and Network File System (NFS) as backup targets.
For your existing ProtecTIER solution, this guide provides preferred practices and suggestions to boost the performance and the effectiveness of the data deduplication with regards to your application platforms for your VTL, OST, and FSI systems.
When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best options and scenarios for data deduplication for their environments. This guide helps you optimize your deduplication ratio, and at the same time reduce the hardware, power and cooling, and management costs.
This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS) group, development, and quality assurance (QA) teams. .
Note: The following ProtecTIER products are withdrawn and can no longer be directly ordered: System Storage TS7650 ProtecTIER Deduplication Appliance, 3958-AP1. System Storage TS7610 ProtecTIER Deduplication Appliance Express, 3959-SM1.
This product was replaced by the TS7620 ProtecTIER Deduplication Appliance Express, 3959-SM2.
For more information, see the following website:http://www.ibm.com/common/ssi/index.wss Copyright IBM Corp. 2012, 2014. All rights reserved. xvii
AuthorsThis book was produced by a team of specialists from around the world working at the International Technical Support Organization (ITSO), Poughkeepsie Center.
Karen Orlando is a Project Leader at the ITSO, Tucson, Arizona Center. Karen has over 25 years in the information technology (IT) industry with extensive experience in open systems, and Information and Software development of IBM hardware and software storage. She holds a degree in Business Information Systems from the University of Phoenix, and is Project Management Professional (PMP) certified since 2005.
Mara Miranda Bautista is a Level 3 Support engineer for the ProtecTIER team in Guadalajara, at the IBM Mexico Software Lab. Mara has seven years of experience in the storage systems field. She joined IBM in 2011, and has worked with the Level 3 Support team ever since. Mara holds a B.A. in Computer Science from Universidad Autonoma de Baja California in Mexico.
Jose Roberto Mosqueda Mejia is a Storage Test Engineer from IBM Mexico Software Lab, where he joined IBM in 2008. Roberto has six years of experience in the QA field. He joined the IBM ProtecTIER team in 2010, and worked on functional verification testing for several ProtecTIER releases, performing testing for the VTL, OST, and FSI. Roberto holds a bachelors degree in computer systems engineering from the Instituto Tecnologico de Morelia in Michoacan, Mexico. He is an International Software Testing Qualifications Board (ISTQB) Certified Tester Advanced Level - Full Level.
Rosane Goldstein Langnor is an IBM Certified IT Specialist in the storage discipline, and has more than 15 years of experience in IT. Rosane works in the IBM Systems and Technology Group (STG) Lab Services and Training organization in Brazil, providing implementations, technical assessments, pre-sales support, consulting services, and training for storage products for Latin American customers. She has extensive experience with ProtecTIER, having performed several implementations, configurations, consulting, and troubleshooting for all of the TS7600 family.xviii IBM ProtecTIER Implementation and Best Practices Guide
Thanks to the following people for their contributions to this project:Tommy HueberIBM Software Group, Cloud & Smarter Infrastructure, IBM Netherlands
Lee CockrellFederal Storage Technical PreSales FTSS (IBM XIV Specialist), IBM Sales & Distribution, STG Sales, IBM US
Christina CouttsIT Technical Specialist (removable and virtual media products), IBM Sales & Distribution, STG Sales, IBM UK
Ron HerrmannIBM Systems and Technology Group, Storage Platform, IBM US
Adriana Furnielis PelligriniIBM Systems and Technology Group, Lab Services, IBM Brazil
Emmanuel Barajas GonzalesFranco Josue Morales JimenezIrving Yukio Hayashi LeonEmilio Perez MunozCuauhtli Alfonso Tello SaldanaIBM Systems and Technology Group, Storage Systems Development, IBM Mexico
Mikael LindstromIBM Global Technology Services (GTS), Delivery Technology Engineering, IBM SwedenDoron TalIBM Systems and Technology Group, Storage Systems Development, IBM Israel
Neale BarretRichard HutzlerDennis HuffMervyn VenterIBM Systems and Technology Group, Client Enablement & Systems Assurance, IBM US
The authors of the second edition, IBM ProtecTIER Implementation and Best Practices Guide published on May 22, 2013:
Karen Orlando, Mathias Defiebre, Dan Riedel, Daniel Wendler
Now you can become a published author, too!This is an opportunity to spotlight your skills, grow your career, and become a published authorall at the same time! Join an ITSO residency project and help write a book in your area of expertise, while honing your experience using leading-edge technologies.
Your efforts will help to increase product acceptance and customer satisfaction, as you expand your network of technical contacts and relationships. Residencies run from two to six weeks in length, and you can participate either in person or as a remote resident working from your home base. Preface xix
Obtain more information about the residency program, browse the residency index, and apply online:ibm.com/redbooks/residencies.html
Comments welcomeYour comments are important to us!
We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks publications in one of the following ways: Use the online Contact us review Redbooks form:
ibm.com/redbooks
Send your comments in an email:[email protected]
Mail your comments:IBM Corporation, International Technical Support OrganizationDept. HYTD Mail Station P0992455 South RoadPoughkeepsie, NY 12601-5400
Stay connected to IBM Redbooks Find us on Facebook:
http://www.facebook.com/IBMRedbooks
Follow us on Twitter:http://twitter.com/ibmredbooks
Look for us on LinkedIn:http://www.linkedin.com/groups?home=&gid=2130806
Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks weekly newsletter:https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm
Stay current on recent Redbooks publications with RSS Feeds:http://www.redbooks.ibm.com/rss.htmlxx IBM ProtecTIER Implementation and Best Practices Guide
Part 1 General best practices
This part describes the general best practices that users of IBM ProtecTIER can employ, such as recovery management and back-end storage concepts. This part also describes guidelines for Virtual Tape Library (VTL), File System Interface (FSI) for the Common Internet System (FSI-CIFS) and for the Network File System (FSI-NFS), and for OpenStorage (OST). This part describes configuration options with regards to host attachment.This part describes the following topics: ProtecTIER basics Deduplication considerations Virtual Tape Library guidelines ProtecTIER File System Interface: General introduction and NFS OpenStorage guidelines Host attachment considerations for Virtual Tape Library
Part 1 Copyright IBM Corp. 2012, 2014. All rights reserved. 1
2 IBM ProtecTIER Implementation and Best Practices Guide
Chapter 1. IBM ProtecTIER basics
This chapter describes the general concepts of IBM ProtecTIER as related to its fundamental operation, including a list of terms and definitions that are used in this book and in the ProtecTIER environment. In addition to the ProtecTIER Management Interface, a brief overview is also provided about the existing models, and the benefits of the ProtecTIER command-line interface (ptcli).In addition, this chapter provides readers with an introduction to the ProtecTIER engine for deduplication, which is IBM HyperFactor. This chapter also describes the Remote Support and Call Home capabilities, and the Simple Network Management Protocol (SNMP) functionality.
The following topics are discussed: Terminology used in the ProtecTIER environment ProtecTIER fundamental concepts ProtecTIER models for open systems Remote support and Call Home SNMP ProtecTIER command-line interface (CLI) overview
1 Copyright IBM Corp. 2012, 2014. All rights reserved. 3
1.1 TerminologyThe following terms and definitions are used in this publication, and are common for all products from the ProtecTIER family:ProtecTIER When used alone, this expression points to the IBM patented
deduplication solution based on HyperFactor. Depending on the context, it can mean the family of products, a specific device, or just the deduplication engine.
TS7600 When used alone, this term signifies the IBM System Storage family of virtualization solutions that operate on the ProtecTIER platform, including the ProtecTIER appliances and gateways.
Factoring ratio The factoring ratio is the ratio of nominal capacity to physical capacity in the ProtecTIER repository. For example, if you have 100 terabytes (TB) of user data (nominal capacity) and it is stored on 10 TB of physical capacity, your factoring ratio is 10:1.
HyperFactor The patented IBM algorithm that eliminates data duplicates from the incoming backup data streams. The factoring ratios are the result of HyperFactor processing and compression.
VTL Virtual Tape Library. The ProtecTIER VTL service emulates traditional tape libraries. By emulating tape libraries, you can use ProtecTIER VTL to migrate to disk backup without having to replace your entire backup environment.
Shelf A container of VTL cartridges in a ProtecTIER repository. This container is analogous to a shelf or a rack where physical tapes are kept outside of the automated tape library (ATL) in cartridge slots. This container is only applicable with the VTL configuration option, and is not available in OST or FSI configuration options.
OST OpenStorage. This configuration option enables ProtecTIER to be integrated with Symantec NetBackup to provide a backup-to-disk capability without using a VTL emulation. Using a plug-in that is installed on an OST-enabled media server, you can use ProtecTIER to implement a communication protocol that supports data transfer and control between the backup server and the ProtecTIER server. Therefore, you use ProtecTIER to implement a storage server emulation.
FSI File System Interface. This configuration option enables ProtecTIER to present disk repository storage as a virtualized hierarchy of file systems.
FSI-CIFS FSI Common Internet File System. ProtecTIER emulates Windows file system behavior and presents a virtualized hierarchy of file systems, directories, and files to Windows CIFS clients. When configured for FSI-CIFS, ProtecTIER emulates a network-attached storage (NAS) backup target capable of using both HyperFactor and ProtecTIER native replication bandwidth reduction techniques for storing and replicating deduplicated data.
FSI-NFS FSI Network File System. ProtecTIER emulates UNIX file system behavior and presents a virtualized hierarchy of file systems, directories, and files to UNIX-based clients using the NFS protocol. 4 IBM ProtecTIER Implementation and Best Practices Guide
When configured for FSI-NFS, ProtecTIER emulates an NAS backup target that can use both HyperFactor and ProtecTIER native replication bandwidth reduction techniques for storing and replicating deduplicated data.
System console The system console that is used with the System Storage TS7650 ProtecTIER Appliance products and System Storage TS7650G ProtecTIER Deduplication Gateway (TS7650G, or ProtecTIER Gateway) is the IBM System Storage TS3000 System Console (TSSC). The System Storage TS7620 ProtecTIER small and medium business (SMB) appliance has included system console functions, and therefore does not require a TSSC.
Metadata Metadata is the information used to track the user data sent from the backup servers, including where it is stored on the disk.
User data User data consists of the backup files and data sets that are stored in the ProtecTIER system. It is the data that the backup applications are storing on disk.
Repository The repository is the physical disk that holds the ProtecTIER factored data. There are two types of file systems that make up the ProtecTIER Repository:
MetadataUser data
Front-end The connection from ProtecTIER to the backup server.Back-end The connection from ProtecTIER to the attached disk storage
subsystem that acts as a repository.Node and server A single ProtecTIER system. It can be either a TS7650G or System
Storage TS7620 ProtecTIER Appliance Express (TS7620) or one of the previous models, and is represented as a node from the ProtecTIER Manager software. Stand-alone node or dual-node cluster configurations are available. This book uses the terms node and server interchangeably.
IBM Tivoli Assist On-site (AOS)A web-based tool that enables a remote support representative in IBM to view or control the management node desktop. For more information, go to the Tivoli AOS website:http://www.ibm.com/support/assistonsite
1.1.1 ProtecTIER Appliance terminologyThe System Storage TS7650 ProtecTIER Appliance is the IBM self-contained virtualization solution that includes an embedded, pre-configured disk storage repository. The following terms are specific to the ProtecTIER Appliance:Disk controller The disk controller for the ProtecTIER Appliance is the 4.8 TB Fibre
Channel (FC) Disk Controller (Feature Code 3708). Use this feature code for service purposes.
Disk expansion unit The disk expansion unit for the ProtecTIER Appliance is the 4.8 TB Fibre Channel Disk Expansion Unit (Feature Code 3707). Use this feature code for service purposes. Chapter 1. IBM ProtecTIER basics 5
3958 AP1 The 3958 AP1 server, which is based on the IBM System x3850 X5 Type 7145-AC1, was withdrawn from marketing as of November 30, 2012.
3959 SM1 System Storage TS7610 ProtecTIER Deduplication Appliance Express. A self-contained virtualization solution that includes an embedded pre-configured disk storage repository. It was withdrawn from marketing as of August 31, 2012.
3959 SM2 TS7620. A self-contained virtualization solution that includes an embedded pre-configured disk storage repository. It has a base unit, which has two capacity versions (6 TB and 12 TB), and it can have up to two expansion units providing more capacity (23 TB and 35 TB).
3959 EXP The 3959 EXP expansion drawer enhances the capacity and improves the performance of the TS7620. The base unit with one field expansion drawer offers 23 TB repository capacity. The base unit with two field expansion drawers offers 35 TB of repository capacity.
1.1.2 ProtecTIER Gateway terminologyThe TS7650G is the IBM virtualization solution that does not include a disk storage repository. The customer can choose a solution from various storage options to build the back-end disk repository. IBM supports two clustered pairs of TS7650G servers in a single frame.
There are four types of servers that can be used in the TS7650G: 3958 DD5 This server is the newest high-performance server (available since
May 2012), and is included with ProtecTIER Version 3.2 or higher. This server is based on the IBM System x7145 model. When used as a server in the TS7650G, its machine type and model are 3958 DD5. Use this machine type and model for service purposes.
3958 DD4 This server (available since December 2010) is based on the IBM System x3850 X5 Type 7145-AC1 (or 7145-PBR). When used as a server in the TS7650G, its machine type and model are 3958 DD4. Use this machine type and model for service purposes.
Tip: The link for the withdrawal announcements can be found on the following website:
http://www-01.ibm.com/common/ssi/index.wss?request_locale=en.
For AP1, look for announcement number 912-173. For SM1, look for 912-096.
Restriction: Effective August 31, 2012, IBM withdrew the 3958 DD4 from marketing. For more information, see the IBM United States Withdrawal Announcement 912-096. 6 IBM ProtecTIER Implementation and Best Practices Guide
3958 DD3 This server (available since March 2009) is based on the IBM System x3850 M2 Type 7233. When used as a server in the TS7650G, its machine type and model are 3958 DD3. It is no longer available for purchase.
3958 DD1 This server is the original server (available since August 2008). This server is based on the IBM System x3850 M2 Type 7141. When used as a server in the TS7650G, its machine type and model are 3958 DD1. IBM withdrew this product from market and ended support.
Disk controller The customer must choose a disk controller for use with the TS7650G (ProtecTIER Gateway). A list of compatible controllers is on the IBM Tape Systems Resource Library website:http://www.ibm.com/systems/storage/tape/library.html
Click the ProtecTIER model that you are working with, and the detailed list of specifications and description for that model is shown.
Disk expansion unit The customer must choose a disk expansion unit for use with the TS7650G. A list of compatible expansion units is on the IBM Tape Systems Resource Library website:http://www.ibm.com/systems/storage/tape/library.html
Click the ProtecTIER model that you are working with and the detailed list of specifications and description for that model is shown.
1.1.3 ProtecTIER replication terminology Replication enables you to set rules (depending on your required replication needs) for replicating data objects across ProtecTIER repositories. The ProtecTIER repositories can be different in size and physical layout. Because ProtecTIER deduplicates data before storing it, only the changes are transferred to the remote site. These rules for replicating data objects are defined in replication policies on each ProtecTIER system.
Restriction: Effective December 3, 2010, IBM withdrew the 3958 DD3 from marketing. For more information, see the IBM United States Withdrawal Announcement WG10-0109.
Restriction: Effective March 28, 2009, IBM withdrew the 3958 DD1 from marketing. For more information, see the IBM United States Withdrawal Announcement WG09-0016.
Important: The ProtecTIER replication policies are only available on VTL and FSI environments. For details about how to configure the replication rules on OST environments, see section 6.4, NetBackup Storage Lifecycle Policies on page 107.Chapter 1. IBM ProtecTIER basics 7
The replication function enables System Storage TS7600 deployment to be distributed across sites. Each site has a stand-alone or clustered ProtecTIER environment. Each ProtecTIER environment has at least one ProtecTIER server. ProtecTIER servers come with two dedicated replica