Академический Документы
Профессиональный Документы
Культура Документы
G V SHYAM SWAROOP
Why BACKUP
Data Backups: A necessary part of risk management
Sizing Considerations
How much data is changing nightly
Retention policies (how long data is kept and how many copies of each
file)
Point-in-Time Restore requirements (increases the number of copies of
each file that must be kept)
How many nodes will be backed up
What are restore requirements
Network bandwidth
Backup Target
Backup target device is where you want your backups to be saved. Backup
target is chosen wrt following parameters :
1. Criticality of Data
2. Backup Window Availability
3. Backup and Restore Performance
4. Backup Retention
5. Cost Incurred
Welcome to TSM
TSM (Tivoli Storage Manager), a backup tool developed by IBM.
The name Tivoli came from (Reverse of I LOVe IT) and works on the concept of
Manager of Managers.
For a backup to happen we need,
i) TSM server.
ii) TSM client.
iii) Tape library.
TSM server is software that is installed on any of the Windows or UNIX server.
TSM server is responsible for taking backups of all the TSM clients connected to it.
TSM clients can be other Windows or UNIX servers for which backups are taken.
Introduction
IBM Tivoli Storage Manager was earlier called as ADSM (Adstar Distributed Storage
Manager), till IBM took it over.
The product was known as ADSTAR Distributed Storage Manager (ADSM) before its 1999 rebranding, and was originally known as Workstation Data Save Facility (WDSF).
IBM Tivoli Storage Manager is a client/server program that provides centralized, automated
data protection and storage management solutions to customers in a multivendor computer
environment.
IBM Tivoli Storage Manager provides a policy-managed backup, archive, and spacemanagement facility for file servers, workstations, applications, and application servers.
TSM Introduction
TSM is the primary backup & data management solution used into the enterprise today. In the
other hand, its a clear winner when it come to the enterprise for many reasons just summarizing
few of them below:
1
TSM Can easily scale up to thousands of nodes without any problem. It has been designed with
enterprise scalability in mind. Most other backup solutions fail to scale up after couple of
hundreds of nodes, but with TSM scalability is a major advantage.
IBM Tivoli Storage manager support heterogeneous environment. It support so many platforms
including (Mainframe , AIX, Linux, HP UX, Windows,.etc). It support way more operating systems
& applications than any other backup solution in the market today.
TSM have many intelligent data movement and store techniques, that make building a hierarchical
backup .Something which can be very difficult to achieve with other solutions.
4 Its an off-site backup ready, which can be used to build up a disaster recovery plan.
Audience
System Admins / Backup Admins
Those who are new to IBM TSM
This presentation may serve as notes to recall / refresh your concepts
It should give you basic understanding
9
Tivoli Storage Manager
Administrator
Server
Storage Devices
Offsite Storage
Client Nodes
Basic Concepts
IBM Tivoli Storage Manager have 9 Components. Six of these components reside on the TSM
Server it self & another 3 are a part of the solution, but does not reside on the TSM Server.
The first Six components in the list below are the TSM Components which reside on the TSM
Server, where the last 3 components which has been colored in Blue are components which does
not reside on the TSM Server.
TSM Components:
Administrative Interface
Tivoli Storage Manager Server
Scheduler
Tivoli Storage Manager Database
Tivoli Storage Manager Recovery Log
Policy-Based Management
Storage Pools
Tape Library
Backup-Archive Client (BA Client)
Unlike many other backup software, TSM offers multiple management interfaces. Below is a brief of
each
Administration Center GUI: It is the main GUI interface of TSM. It integrates into the Integrated
Solutions Consonle. From it you can do most of the TSM tasks including Managing storage devices,
Domain Policies, Schedules, users, and health monitor, and many more tasks. Its your full
management through the GUI. If you are a GUI lover then this is the interface for you.
TSM Server Command Line: Its the command line interface equivalent of the administration
center. Its the most powerful TSM interface & a great interface for command line lovers. This
interface is accessed by running dsmadmc at the command line.
Backup-Archive Client GUI: it is the GUI interface used to run a manual backup or restore on a
certain client, or to create a customized options for a certain client. Backup-Archive Client is
installed and run on the client server not the TSM Server. It can be accessed by running dsm on
Windows or by running dsmj on Unix.
BA Client Command Line: If you dont like the GUI & prefer command line then this is the interface
to perform all the tasks managed by the Backup-Archive Client GUI, though using command line.
This can be accessed by running dsmc at the windows command line.
Web Client GUI: Well this is nothing more than a web interface access to the Backup-Archive Client
GUI. It actually look exactly the same as the Backup-Archive Client GUI, beside of being running in a
web browser.
dsmadmc: is to call the TSM Server Command line. You will need this interface when you are
planning to perform administration tasks on the TSM Server.
dsmc: to call the BA Client Command Line to perform tasks on the client server (the servers you
want to backup).
dsm: to call the BA Client GUI. Again to perform tasks on the client server (the server you want to
backup).
So dsm & dsmc is interfaces which manage tasks on the client (the server you want to backup)
where dsmadmc is to manage tasks on the TSM Server.
Please make sure to get this straighten up before proceeding as this will make your life a lot easier
while switching between these interfaces in future chapters
Accessing TSM
Methods of accessing TSM server
GUI [ Graphical Interface ]
CLI [ Command Line Interface ]
ISC Admin [ Integrated Solution Console ]
- Now renamed : Tivoli Portal [ Centralized administration ]
Administrative Interface
(Administrative Client)
The administrative interface allows administrators to control and monitor
server activities, define management policies for clients, set up schedules
for clients, and other functions.
Backup-Archive Client
The TSM backup-archive client must be installed on every machine that needs to
transfer data to server-managed storage called storage pools.
The TSM server uses a unique node name to identify each TSM backup-archive client
instance.
The TSM client can be installed and used on various operating system platforms.
Regardless of operating system platform or file format specifications of either the TSM
client or TSM server, TSM clients can send data (such as a backed-up file) to be stored
by any TSM server on the same
network.
For example, a TSM client on a Microsoft Windows system can back up files to a
TSM server on an AIX system.
Archive and Retrieve: Used for long-term storage, archive has no versioning. The archive
feature enables users to keep a copy of their data for long-term storage and to retrieve
the data if necessary.
Examples of this need might be to meet legal requirements for data retention, or to
archive files that are not needed locally on a workstation.
Interactive (or loop) mode is used to issue a series of commands. you can process
a series of commands more quickly in interactive mode than in batch mode.
Simply issue dsmc to start the interactive mode.
The TSM client will establish a session with the TSM server and then display a
prompt on your screen
If the recovery log is reaching 100% full you can perform a database backup,
and then extend the log so that there is minimal risk of the database reaching
100% full again.
It is a good idea to have a sequential disk device class to perform backups to
disk as well as to a daily tape
To check the size of the database you would use the query db command:
To check the size of the recovery log the query log command is used
The command to format a new database volume is:
Define dbvolume /var/tsm/tsmdb/dbvol05.dsm formatsize=megabytes
LOG & DB
* Full / Inc / Snapshot Backups
DB
LOG
5.x version
RDBMS
530GB
5.x version
13 GB
6.x version
DB2 9.7
1 TB
6.x version
128 GB
For example :
suppose a client performs a backup operation.
It first notifies the TSM server to start a transaction and the TSM server marks
the start of the transaction in the recovery log.
The client then sends data to the TSM storage pool in blocks.
After all of the data is sent, the client notifies the TSM server that the
transaction is complete.
After successfully completing the transaction, the TSM server commits the
transaction from the recovery log to the TSM server database.
A primary reason for using a recovery log is for error handling. If a file transfer is
interrupted, the TSM server will not erroneously commit information to the
database.
Using the recovery log allows the TSM server to maintain a consistent database
image in case of interruption.
Utilization is the percent of the assigned capacity in use at a specific time. The
value represented by Max % Util is the highest utilization since the statistics
were reset.
For example, assume that
a TSM environment performs most backups after midnight. Examine the three
examples in the following graphic. The first picture (far left) shows the
utilization statistics for the recovery log after being reset at 9:00 p.m. the
previous evening. The middle picture shows the maximum utilization occurring
at 12:58 a.m. The last picture shows the utilization at the current time.
In Precise :
Normal - can restore to last database backup and consists of uncommitted
transactional data.
Where as roll -- can restore to most recent state and consists of all transactional
data since last backup
Syntax
>>-Set LOGMode-+- Normal------+--------------------------------><
'- Rollforward-'
TSM Database
The TSM database contains all information required to perform
backup and restore functions.
Restore
If you lose the TSM database, you can no longer restore files.
The database contains information about the client data and information regarding the
location of that data within your storage pools.
Note: If you lose the database, you lose all of your client data.
If the TSM database were destroyed or corrupted, client files within the storage pools
would still exist.
However, you would not be able to locate any of the files within the storage
pools.
To recover from disasters involving the TSM database volumes, regular backups of the
database must be performed with the backup db administrative command. A TSM
administrator can perform a database backup to sequential access storage volumes.
DB Restore
PIT recovery : can not restore to the current state / Auditing of storage pool is required post restoration.
Example :
Restore the database to the time of its most recent incremental backup. The volume history file is not
available. Tape volumes FULL1, FULL2, INCR1, and INCR2 contain the database backup series.
Restore a database to the time of its most recent snapshot backup. The volume history file is not
available. Tape volumes TAPE01 and TAPE02 are snapshot volume names in a volume sequence that spans
two tapes.
Tape Library
IBM Tivoli Storage Manager supports a variety of library types, including
manual libraries, SCSI libraries, 349X and 358X (LTO) libraries, and external
libraries. A tape library is essentially a box that holds drives and cartridges,
and provides automation for tape operation.
Sequential Access:
C
A
Sequential-access
Objects stored sequentially in volumes
Tape Backups
Tape remains the most Ideal backup target
Tape is an ideal medium for backing up data because of its high storage
capacities, low cost, and the ability to store cartridges off-site.
A tape drive is a data storage device that reads and writes data on
a magnetic tape. Tape drive can be a standalone external tape drive or
Library based tape drive supported by robotic control.
Tape media generally has a favorable unit cost and long archival stability.
A tape drive provides sequential access storage
LTO-1
2000
LTO-2
2003
LTO-3
2005
LTO-4
2007
LTO-5
2010
Native Data
Capacity [GB]
100
200
400
800
1.5 TB
40
80
120
140
Max Speed
(MB/s)
20
PRIVATE VOLUMES:
May contain valid data.
Are used or owned by an application.
Can only be used to satisfy a request to mount the specified volume.
Disk Backups
A disk drive can move its read/write head(s) to any random part of the disk in a
very short amount of time.
A Disk provides random access storage.
In several scenarios disks are used as intermediately storage devices to
speed up the backups.
Disk can also be used for backups which need to be retained only for short
duration.
Disk Drives, CD, DVD, Flash-disk etc can be used as backup targets.
Advantages :
1. Fast Backup & Restores
2. Reliability
Disk Backups
A typical implementation has these pools:
more expensive
slower
less expensive
81
88
You can move files from one volume to another volume in the same
or a different storage pool using the MOVE DATA command.
Although these concepts seem easy to most, many new admins have a hard time distinguishing
between backup & archive. Here, you will find a brief of each as being defined by IBM Tivoli Team.
Backup: Creates a copy of a file to protect against the operational loss of destruction of that file.
Customers control backups by defining the backup frequency and number of versions.
Restore: Places backup copies of files into a customer-designed system or workstation after the
loss of a file. by default, the most recent version of each active file requested is replaced.
Archive: Create a copy of a file or set of files for vital record retention of data, such as patent
information, financial information, or customer records. Customers control archive by defining the
retention period. This feature enables customers to keep unlimited archive copies of a file.
Retrieve: Allows users to copy an archive file from the storage pool to the workstation. The Archive
copy in the storage pool is not affected.
Basically the main difference between archive and backup, is backup meant for the situation where
you loose the data and you need to recover. In the other hand, you require the archive to meet
certain auditing requirement of keeping certain data for a certain period of time.
Backups
Recovery from oops situations
Different parameters to control how many versions of each file are needed
Point-in-Time Recovery
Archives
Long-term storage or package backups
Single parameter: How many days to retain
Example: Long Term Month-End and Year-End Backups
Example: Maintain files for an ex-employee for 90 days
Backup-Archive
Command Line
Web Client Session
Backup-Archive GUI
TSM
server
dsmc
backup-archive
command line
Start the client command line at the operating system prompt. Your path may
vary, but the default paths are as follows:
Windows:
Program Files > Tivoli > TSM > baclient
AIX:
/usr/tivoli/tsm/client/ba/bin
( or )
/usr/tivoli/tsm/client/ba/bin/
BACKUP
The backup-archive
clients send copies of
files to Tivoli Storage
Manager server.
RESTORE
The files are returned
to the backup-archive
client.
.
Incremental Methodology
Full vs Incremental
Incremental Methodology
During incremental processing, the TSM client queries the TSM server to determine the exact
state of your files.
A new copy of the file is sent to the TSM server if changes are observed on any of the following
attributes:
File size.
Date or time of last modification.
Extended attributes.
Access control list.
NTFS file security descriptors. These are the Owner Security Identifier (SID), Group
SID, Discretionary Access Control List (ACL), and System ACL.
Depending on the operating system, other characteristics such as NTFS file security descriptors
and extended attributes can be evaluated.
If any object exists in the list of objects from the TSM server but not in the list of objects from the
client, the active object on the TSM server is marked inactive.
Windows
UNIX
dsm.sys
dsm.opt
dsm.opt
Aix
dsm_ARISAM_tdpo.opt
SERVERNAME ARISAM_tdpo
dsm_ARIS62_tdpo.opt
SERVERNAME ARIS62_tdpo
Windows
Option file #1 (c:\tsm\dsm.opt1)
Example of DSM.OPT
From the Utilities menu, select Setup Wizard. This will launch the Tivoli
Storage Manager Client Configuration Wizard.
On the first panel of the Tivoli Storage Manager Client Configuration
Wizard, make sure Help me configure the TSM Backup Archive Client is
selected.
communication method
TCP port
TCP server address
node name
TCPPORT
TCPServeraddress
COMMMethod
NODename
PASSWORDACCESS GENERATE
Passwordaccess generate support is activated by specifying
PASSWORDACCESS GENERATE in a client option file.
PASSWORDACCESS
GENERATE
STOP
(when
you make
a match).
1
2
If it is not
EXCLUDED,
it is
INCLUDED.
Include-Exclude Example
C:\TSM\critproj1\my.doc
(rule 3)
Yes
C:\TSM\critproj2\user.doc
(rule 2)
D:\TSM\critproj1\form.txt
(default)
Yes
Yes
E:\TSM\data\base.doc
(rule 1)
No
TSM server
You can assign a management class for a file or file group by using an INCLUDE
statement in your client options file.
For example, to associate all the files in the costs directory with a management
class named critproj, you would enter:
Include c:\tsm\critproj2\costs\* critproj
Exclude Include
Click on Add and the Define Include-Exclude Options window will appear.
Under Category select Backup, and under Type select Exclude:
Under File or Pattern >> click Browse, and a window headed File or Pattern will appear in which
>> you can browse to a file that you want to exclude.
In line to our previous slide - Depending on how many files you need to exclude, proceed as follows:
If this is the only file you wish to exclude, proceed to the next step.
If there are a few more files to exclude, repeat the previous three steps as often as is needed.
If there is a range of similarly-named or similarly-located files that you wish to exclude,
>> you can edit the exclude line to match a range of files before clicking OK.
examples of exclude rule syntax
The default is to include a file for backup.
If a file does not match either an Exclude or Include directive in the configuration file then it will be
included for backup.
The include/exclude list is processed bottom up. If you add the following two lines to the bottom of
the configuration file
Include C:\XYZ.DOC
Exclude C:\XYZ.DOC
then the file XYZ.DOC will not be backed up. The processor will read the list from bottom up, and acts
on the first, and only the first, directive that applies. In this case, the Exclude directive is read first,
applied and the processor then grabs the next file and so on.
To specify a directory path or filename with spaces in it, enclose it fully in quotation marks, as
below:
Exclude "C:\My Documents\tempfiles\*"
Exclude "C:\Program Files\xyz\*
To exclude the contents of a directory and all its subdirectories, use the Exclude.dir directive:
Exclude.dir C:\testdata
Schedules
TSM has 2 types of schedules and they are as follows:
Backup/Archive Schedules
Admin Schedules
Backup/Archive Schedules are used to automate client backups and archives. Upon defining a
backup/archive schedule >> you will have to associate the client(s) to that schedule for the
backups/archives to run automated.
Admin Schedules are designed to automate admin tasks such backing up the DB, copying data from
the primary backup pools to the copy pools, reclamation, backup volhistory file, backup devconfig file
etc.
Overview of Schedules
Two types of scheduling:
Client scheduling
reclamation processing
TSM Schedules
TSM maintains backup schedules on the server. These schedules are independent of any
given node, and must be associated with the nodes
Example :
To create a schedule for running an incremental backup at 8:00 PM every day. Name of the
schedule 'MY-SCHED
Domain name : MY-DOM [ similar to win / aix ]
Node name : MY-NODE
DEFine SCHedule MY-DOM MY-SCHED startt=20:00
DEFine ASSOCiation MY-DOM MY-SCHED MY-NODE
Client Schedule
The define schedule command is used on the TSM server to set up the schedule parameters that
will be used for scheduled client operations. Such operations include backing up or archiving
client data in a specified policy domain.
For example, assume the following command is run:
define schedule tsm101 daily_backup starttime=21:00 duration=2 durunits=hours
Domain name : tsm101
Schedule name : daily_backup
Start time : 09:00 pm
Node name : eli
The results are as follows:
Schedule daily backup is defined for policy domain tsm101.
The scheduled action is an incremental backup (default).
The schedule window begins at 9:00 p.m. and has 2 hours to start. The schedule will run every
day (default).
[The startup window is the time period during which the schedule must be initiated. If the
schedule must be retried for any reason, the retry attempt must begin before the startup
window elapses, or the operation will not restart.
The schedule never expires (default).
Client nodes process operations according to the schedules associated with the nodes.
To associate client nodes with a schedule, use the define association command.
A client node can be associated with more than one schedule, and multiple nodes can be
associated to a single schedule.
To associate the eli client node with the daily_backup schedule, both of which belong to the
tsm101 policy domain, enter this command:
define association tsm101 daily_backup eli
Modes of Communication
There are 2 Types of communication between the TSM SERVER and TSM CLIENT :
POLLING The TSM client contacts with the TSM server for specified duration [ depending
on the value provided in polling interval ]
If it is set to polling >> then the TSM client keeps contacting the TSM server as per the
duration interval.
**polling means the client will "ask" the TSM server "is it time to back up yet?"
PROMPTED TSM server tells the client when its next backup is scheduled
If the communication method is set to prompted then it will increase the load of the TSM
server as it has to keep informing its clients about the start time for backup.
** prompted means the TSM server will more or less tell the client "its time to back up"
Modes of Communication
If the communication method is set to prompted then it will increase the load of the TSM
server as it has to keep informing its clients about the start time for backup.
If it is set to polling method then the TSM client keeps contacting the TSM server as per the
duration interval and hence there is comparatively less load on the TSM server.
The retry period duration and the maximum number of retries value will come into picture
when the session with the TSM server has been lost and the TSM client tries to establish the
session back as per the values set on the TSM server
For any backup to trigger there should be a proper communication between TSM server &
TSM client, for this TSM scheduler service should be running always.
drives
TSM client
TSM server
disk storage
device
drives
TSM client
TSM server
disk storage
device
TSM database
drives
TSM client
TSM server
disk storage
device
TSM database
Register
Schedule
Start
TSM server
DSM.OPT
SCHEDMODE
COMMMETHOD
backup-archive
client
DSM.SYS (UNIX)
PROMPTED
TCPIP
Dsmsched.log
Scheduler :
Dsm.sys >> managedservice option : schedule
-Add the following to the system startup file /etc/inittab/
Tsmsched :: once : /usr/bin/dsmc sched > /dev/null 2>&1 # Tsm scheduler
ps -ef|grep dsm
then give below command
nohup /usr/tivoli/tsm/client/ba/bin/dsmc schedule > /dev/null &
Dsmsched.log
ps -ef|grep dsm
then give below command
nohup /usr/tivoli/tsm/client/ba/bin/dsmc schedule > /dev/null &
Schedule Example
24:00
Backup
Backup
Start
startup
window
01:00
01:00
actual
backup
time
Start
DATE=mm/dd/yyyy
DATE=TODAY
DATE= + number of days
DATE= - number of days
Reporting
Actions from client schedules are recorded as events
Can query events for scheduled and actual start times and end times, and a
status
All Activity is logged into the TSM Activity Log
Part of the TSM Database
TSM logs server messages into a database table called the activity log.
The log keeps track of many important messages, such as
incoming client connections,
information about background processes and commands,
scheduled events, and errors that might occur.
The log can be viewed
with the administrative client command query actlog.
Some important parameters can be specified with the query actlog
command:
Reporting
Query actlog begindate=MM/DD/YYYY
This specifies a begin date for the query. When trying to look for errors from
previous days, a begin date is necessary. Values such as today and today-2 can be
used also. The enddate parameter specifies the ending date for the query and
works in the same way.
Query actlog begintime=HH:MM
This specifies a begin time for the query. Values such as now and now-7:00 can
be used also. The endtime parameter specifies the ending time for the query
and
works in the same way.
Query actlog search=(search phrase)
This specifies a search phrase to scan on. Only lines containing the phrase will be
returned.
Completed
Started
Restarted
In Progress
Failed
Pending
Missed
Future
(?)
Backup completed
Backup in progress
Backup in progress (was restarted)
Usually because Client was rebooted during
backup
May or may not have completed (no
tapes, no drives, etc.)
Backup is waiting to start; still within
window
Backup never started; window has
expired
Backup schedule window not arrived
yet
Backup status unknown
Restore
If you do not specify a destination, the files are restored to their original
location.
163
165
Point-in-Time Restore
A Point-in-Time Restore restores files to a past state that existed at a
specific date and time, as opposed to the current state of the last
backup.
ARCHIVE
RETRIEVE
The backup-archive
clients send copies of
files for retention to
Tivoli Storage Manager
server.
Must be
generated by an
administrator.
170
Versioning
The active version is the most recent backup copy of a file.
Inactive versions are earlier copies of the file.
Inactive Version
172
Versioning, continued
When a backup session is performed, and TSM detects that the file has been
deleted from the client, then TSM changes all the backed up versions to
inactive.
Inactive Version
Policy Management
Centrally Managed by Business Policy
Policy Domain 1
Backup Policy
Archive Policy
Disk pools
Optical pools
Tape pools
Policy Domain 2
Backup Policy
Archive Policy
Centrally
data
What data?
Where to store?
How long to keep
Allow
Domain 1
Domain 2
Policy Domain
You can create multiple domains when there are multiple groups of nodes having
similar storage requirements.
For example, assume an environment contains a group of user workstations and a
group of file servers. With this environment containing two distinct groups, you
would likely
create two separate policy domains such as:
Policy domain WIN-DOM, to which you would assign the workstation nodes
Policy domain UNIX-DOM, to which you would assign the file server nodes
Policy Domain
Policy Sets
A policy set is a container of rules for a domain. Although there can be several
policy sets in a domain, only one policy set can be considered active at any
particular point.
A domain will only use the policy set named active, which is reserved by TSM.
An administrator must use the validate policyset and activate policyset command
to make a policy set active and available for use.
When activate policyset runs, it verifies that the policy set contains a default
management class and that the copy group definitions specify a valid primary
storage pool.
Management Classes
** Specifies how files are manged
The management classes contain the backup and archive copy groups.
Every file sent to the TSM server will bind to a management class.
If the class is not specified, files will bind to the default management class and
directory information will bind to the management class that contains the longest
retention settings.
Copy Groups
A management class can contain up to two copy groups: one for backups and one
for archives.
Copy groups actually define the rules used to govern the retention of client data.
Copy Groups
The backup copy group is concerned with two logical objects: the file and the file
copy.
A file is the current data on the client machine.
A file copy is a copy of the file stored in the TSM storage hierarchy. It is also
sometimes referred to as a version.
A file copy in TSM can be in one of three states:
Active: The most recent version of a file
Inactive: A previous version of a file
Expired: A file marked for Expiration [ set for purging ]
Copy Groups
Versions will be removed from TSM in the same order in which they were created.
The most recent copy will always be the last copy removed from TSM; the oldest
copy will always be the first copy removed from TSM.
The first time a client file is backed up, the file copy will start out
as active because it will be the most current copy. If another backup occurs, the
first file copy will change to inactive and the more recent copy becomes the active
copy.
Verexists
Retextra
Verdeleted
Retonly
The following two parameters in the copy group determine how long each
version of the file is kept, including the last active version:
Verexists specifies the maximum number of versions to maintain,
counting both the one active and variable number of inactive copies.
Retextra specifies the number of days to retain a file copy.
This retention period applies to the number of days that an inactive copy
has been marked inactive.
Syntax
def policyset < domain name > < policyset name >
def mgmnt class < domain name > < policyset name > < mgmtclass name >
Define copygroup type=<archive / backup > <domain name> <policyset> <mgmtclass>
destination=<destination stg pool name> verdataexists=<value> verdeleted=<value> retextra=<value>
retonly=<value>
Basic Concepts
Collocation
In order to reduce no. of sequential devices required we may need to collocate
the data.
Collocation need may also arise if we want to avoid reclamation situations.
Collocation types: By node , By Group, By application
Expiration
Versions keep changing states: Active => Inactive => Obsolete
You need to start a process to remove pointers of Obsolete files in Meta Data DB
That process is called as expiration
Reclamation
Once you have expired files from your sequential devices, the space has invalid
data.
In order to use the space, you have to move data from one / more sequential
devices to other devices (This is very similar to defragmentation, but as
defragmentation does not work on sequential devices; you have to Move the
data)
Collocation - Advantages
Reduce tape mounts during restore
Keeps all files together for a node or filesystem
Can be done at a file system level
Can be done by a group of nodes rather than a single node
Requires more scratch tapes
Collocation
Collocation by Groups
Groups of nodes can be defined, and the server can then collocate data based
on these groups.
Accounting
Production
Expiration
During expiration processing, older versions of files are expired according to
the rules of the policy domain.
Expiration processing will remove file versions marked for deletion
An active file will never be expired
Expired Version
Reclamation
Expiring data leaves media partially full. Reclamation processing consolidates
data onto fewer new volumes.
Reclamation
Expiring data leaves media partially full. Reclamation processing consolidates
data onto fewer new volumes.
Reclamation Processing
Reclamation is a process of consolidating the remaining data from many
sequential access volumes onto fewer new sequential access volumes.
Lower threshold = more tapes; faster reclamation. Higher threshold =
fewer tapes, longer reclamation.
TAPE_SP1
100%
Reclamation, continued
Reclaim volumes in
tapepool with at least
30 % reclaimable
space
Reclamation, continued
Reclamation process
starts for tapepool
volume 501154
Reclamation, continued
Input volume is
501154
Output volume is
002532
Reclamation, continued
Messages are sent to the console and stored in the activity log.
Reclamation, continued
Reclamation changes the percent utilized.
Before reclamation:
After reclamation:
501154 no longer
contains valid data, and
has been deleted from
tapepool
Migration
Accounting
backup-archive clients
backup-archive clients
Sales
Accounting
Migration Path:
1. SP_A (disk)
2. SP_B (file)
3. SP_C (tape)
Sales Migration
Path:
1. SP_A (disk)
2. SP_C (tape)
203
Because the percent of migratable data has reached or exceeded the high migration
threshold of 70%, the server initiates the migration process by performing the
following tasks :
After all backed-up files that belong to TODD are migrated to the next storage
pool, the server checks the low migration threshold. Because the low migration
threshold has not been reached (% migratable is now 50; the low migration
threshold is 30), the server starts the selection process again.
In this case, the server determines that the file space /mp3 for node ROBERT is
consuming the most space.
The server therefore chooses to migrate all of the backup file spaces (/usr, /home,
and /mp3) for the node ROBERT.
After all the files for node ROBERT are migrated to TAPEPOOL, the server checks
the low migration threshold again. The low migration threshold is greater than the
current % of migratable data and migration ends.
Migration
MIGDELAY = YES : TSM will take first those files which are taken more space in file
spaces
MIGCONTINUE : TSM migrates files which are existing from longer period
PRIVATE VOLUMES:
May contain valid data.
Are used or owned by an application.
Can only be used to satisfy a request to mount the specified volume.
Labeling Tapes
The label libvolume command:
label libvolume storagelibname checkin=scratch search=bulk labelsource=barcode
Search=yes Specifies that the server labels only volumes that are stored in the library
Search=Bulk Specifies that the server searches the library entry/exit ports for usable volumes to
label.
If you specify LABELSOURCE=BARCODE, the volume bar code is read,
checkout libvolume
checkout libvolume tapelib volx checklabel=yes remove=bulk
Checking In Volumes
Checklabel
Yes : server reads the media label during check-in
No : Doesnt read the media label during check-in
Barcode : server reads the barcode label during check-in [ decrease the
check-in time by using the barcode ]
Scenario :
After the scratches are requested - to have them loaded in library
tsm: DLFTSM_PRI>checkin libvol 3576LIB checklabel=barcode search=bulk status=scratch
ANS8003I Process number 123 started.
tsm: DLFTSM_PRI>q req
ANR8352I Requests outstanding:
ANR8373I 001: Fill the bulk entry/exit port of library 3576LIB with all LTO volumes to be processed
within 60 minute(s); issue 'REPLY' along with the request ID when ready.
tsm: DLFTSM_PRI>rep 001
ANR8499I Command accepted.
Auditing a Library
vol002
vol007
vol002
vol008
vol008
vol007
.
.
.
SAN
(client data)
LAN-free backups and restores use storage area networks (SANs) for data
movement between clients and the server, decreasing the network traffic on the
local area network (LAN). Shared storage resources (disk, tape) are accessible to
both the client and the server over the SAN.
Storage intensive
applications
Database
Tivoli Storage
Manager API
Tivoli Storage
Manager
SERVER
Problem Determination
The following questions should be considered and if possible answered when trying to
diagnose a problem:
What is the problem?
Where did it occur?
When did it begin happening?
What action was being performed?
Were any messages issued?
Check the server activity log and the client logs for error messages.
If error messages are in the server activity log, check 30 minutes before and after the time
that the error message was issued. Often the problem encountered is actually a symptom
of another problem and seeing the other error messages that were issued may help to
isolate this.
Did the Explanation or User Response section of the TSM message offer any suggestions on
how to resolve the problem?
How frequently does this error occur?
Check any system error logs:
On Windows(R) Check the Windows Event logs. These are comprised of the System and Application event
logs, but can also include other event logs depending on the Windows operating system.
On AIX(R) and other UNIX(R) platforms Check the error report.
Problem Determination
Check with others that may have made changes in the environment that could affect TSM.
Some others in a typical IT environment include:
SAN Administrator
Network Administrator
Database Administrator
Client or machine owners
Check the TSM logs:
dsmserv.err Server error file. This is located on the same machine as the server. The
dsmserv.err file is typically in the server install directory. Note that the storage agent may
also create a dsmserv.err file to report errors.
dsmsvc.err Server error file. This is located on the same machine as the server. This file is
equivalent to the dsmserv.err file when TSM is running as a Windows Service.
dsmcrash.log, dsmcrash.dmp Client crash log. This is located on the same machine as the
client. These files are for Windows clients only. dsmcrash.log and dsmcrash.dmp contain
diagnostic information that is written to the client machine when a client program
exception (crash) occurs. When reporting a Windows client crash problem to IBM Technical
Support, send these files to the IBM support engineer for analysis.
Problem Determination
dsmerror.log : Client error log. This is located on the same machine as the client.
dsmsched.log Client log for scheduled client operations. This is located on the same
machine as the client.
dsmwebcl.log This log file contains messages related to the client acceptor daemon
(dsmcad) and the remote client agent (dsmagent).
db2diag.log, db2alert.log, userexit.log DB2(R) log files. These are useful when
troubleshooting a problem when backing up a DB2 database using Tivoli Data Protection
for DB2. These are located on the same machine where DB2 is installed. See the DB2
documentation for additional information about what is in these files and where they are
located.
tdpess.log Default error log file used by the Data Protection for Enterprise Storage Server(R)
client.
tdpexc.log Default error log file used by the Data Protection for Exchange client.
dsierror.log Default error log for the client API.
domdsm.log Default error log for the Data Protection for Domino client.
tdpoerror.log Default error log for the Data Protection for Oracle client.
tdpsql.log Default error log for the Data Protection for SQL client.
Verify that devices are still accessible to the system and to TSM.
Problem Determination
Other useful tips:
Search the online Knowledge Base for matching error messages or problem
descriptions
http://www306.ibm.com/software/sysmgmt/products/support/IBMTivoliStorageManager.html
http://publib.boulder.ibm.com/tividd/td/TSMM/SC32-9103-01/en_US/HTML/info_pd.html
TSM - Licence
IBM TSM come with three license schema as below:
IBM Tivoli Storage Manager 5.x Basic Version requires tsmbasic.lic license
file
IBM Tivoli Storage Manager 5.x Extended Edition requires tsmee.lic
license file
IBM Tivoli Storage Manager 5.x Retention Edition requires dataret.lic
licesne file.
Note: License cant be mixed at the site level.
Thank You
Shyam Swaroop