TSM Concepts overview

download TSM Concepts overview

of 8

Transcript of TSM Concepts overview

  • 7/28/2019 TSM Concepts overview

    1/8

    TSM Concepts

    Futures of TSM Basic Edition

    Progressive Backup methodology

    The progressive backup feature uses its own relational database to track data wherever it is stored, delivering direct one-step file restore. This eliminates theneed for base-plus-incremental tapes, commonly used for restore procedures in other storage management products. Makes sense if used with tapereclamation etc.

    Tape resource sharing

    Network-free rapid recovery

    Lan-free data transfer

    Dynamic multithreaded transfer

    Adaptive difference technology

    Means byte,block,file level transfers across lan, wan , san & dial-up connections

    Enterprise administration

    IBM TSM Extended Edition

    1. Disas ter Recovery Manager for TSM server

    2. NDMP backup for network attached s torage. Network data management protocol supports full & differential FS image backup & restore.

    IBM TSM for Space Mgmt

    Provides HSM via ILM policies

    IBM TSM for SAN

    LAN-free backups

    SAN connected tape libraries provide server-free backups

    IBM TSM for System Backup & Recovery (SysBack)

    Sysback supports installation image backups, volume group, FS, file or directory, raw logical volume. Supports cloning by allowing installation on system baclup recovering

    on another similar h/w config server.

    Central Mgmt & Automation tool

    Network boot & install futures

    SysBack uses NIM (network installation module)

    Offline Mirror Backup option ( mirror copies are splits after sync and allow inactive copies for backup & another mirror copy was allowed access by user & applications.

    Data Protection Product family

    These products interface directly with the applications using their backup-certified utilities and interfaces, simplifying online backup and restore procedures.

    TSM for application servers, databases, H/W, mail , ERP

    Chapter 2: Business Requirements

    Problems for business are Stroage Consolidation provides mgmt convenience, Data Sharing, Data Protection & Disaster recovery

    IBM Storage Network solutions like NAS,SAN, iSCSI products offer storage consolidation and manage it by TSM

    Data sharing above SAN via Tivoli SANergy.

    Chapter 3. Architecture

    TSM is client / Server model consists of TSM Server Component, Backup-Archive Client Component & other products.

    Server does :

    TSM Concepts 5/9/2013

    http://dc399.4shared.com/doc/7k-aHcHN/preview.html 1 / 8

  • 7/28/2019 TSM Concepts overview

    2/8

    Manages storage H/w, provide secure env, provide automation, reporting & monitoring futures

    Implements storage policy. Maintains objects inventory in a RDBMS database

    Client & Other products does:

    Backup & recovery. Archival, HSM, Disaster Recovery,

    TSM Server exploits SAN future can dynamically share a tape library connected to SAN across multiple TSM Servers.

    Supports various storage devices like tape,disk,DVD,optical etc.

    Basic concepts :

    Backup data protection

    Archival record retention backed up & original removed. Dont treat this as space mgmt function , since transparent auto recovery not possible in archrivals.TSM allows user to name archives and while recovering from archive u have to search in server repository by using the name.

    Therefore, the difference between backup and archive is that backup creates and

    controls multiple backup versions that are directly attached to the original file; whereas archive creates an additional file that is normally kept for a specificperiod of time, as in the case of vital records.

    IBM TSM offers hierarchical Storage Pools for supporting HSM.

    TSM offers one more imp future to copy data objects from one storage pool to other on same server instance or another server instance. This is useful in

    disaster recovery reasons to have 2ndcopy of data some other physical location. This is transparent to the client.

    Collocation:

    The reorganization of the data and storage media for fast recovery happens completely within the server. For this purpose, IBM Tivoli Storage Manager hasimplemented functions to relocate data objects from one volume to another and to collocate data objects that belong together, either

    at the client system level or at the data group level.

    The collocation function is designed to optimize the performance of the storage pool for multiple clients. It gives administrators a way to store all of the filesbelonging to a specific client on a minimal number of sequential access volumes (usually tapes).

    The collocation option generally would be used in situations where the client requires a fully optimized recovery time. Collocation also makes it possible toavoid conflicts in the restore process, such as when a single tape volume would have to be mounted to restore data for two different clients. When thecollocation feature is used, each clients restore can be completed simultaneously and independently.

    Tape reclamation

    Often a particular tape volume will contain files that expire on different dates. As a result, when these files reach their expiry date, virtual empty spaces beginto appear on the tape volume; this fragmentation wastes space on the tapes and slows the restore process because of the time required to skip over emptyspaces. Because tapes are sequential

    media (that is, they can be written only from beginning to end), it is not possible to rewrite new data into the spaces occupied by expired files.

    IBM Tivoli Storage Manager addresses this challenge with an innovative tape reclamation feature used to free up entire tape (or optical) volumes in sequentialstorage pools. As individual files get marked for expiration, the amount of space that can be reclaimed on a volume increases over time. After this availablespace reaches a specified threshold, IBM Tivoli Storage Manager automatically initiates a process to reclaim the volume. Remaining active files on the tapevolume are rewritten to other tape volumes, then the original volume is returned to scratch.

    Security Concepts

    To ensure that data can only be accessed from the owning client or an authorized party, IBM Tivoli Storage Manager implements, for authentication purposes,a mutual suspicion algorithm,

    To do this, all clients have a password, which is stored at the server side as well as at the client side. In the authentication dialog these passwords are used toencrypt the communication. The passwords are not sent over the network, to prevent hackers from intercepting them. A communication session will beestablished only if both sides are able to decrypt the dialog. If the communication has ended, or if a timeout period without activity is passed, the session willbe

    terminated automatically and a new authentication will be necessary.

    TSM Concepts 5/9/2013

    http://dc399.4shared.com/doc/7k-aHcHN/preview.html 2 / 8

  • 7/28/2019 TSM Concepts overview

    3/8

    TSM product highlights

    Its database, progressive backup methodology, collocation & tape reclamation

    Enterprise administration:

    Single console for managing multiple TSM Servers.

    Raped recovery.

    Instant archive facility creates virtually full backup of client from TSM server to any media. This can be used for rapid recovery of lcient without involving the TSMserver while restore.

    SAN tape resource sharing

    LAN- free data transfer

    Chapter 4 : Planning Concepts

    Planning the environment before implementing the TSM is must. Planning covers H/W, processor size, network connectivity ie bandwidth available (think aboutEthernet trunking/ link aggregation ), tape library etc.

    1st Understand importance of data . give priories from enterprise view.

    Business needs depend on many factors like govt regulations, regional demands, and industry competition. Backup and restoration requirements varies fromindustry to industry , dept to dept. one-fit-all doesnt suite.

    Backups dont matter only restore matters (good,quality,fast) from business view.

    TSM manages database of there logical parts. Rules & policies, files & data info and location tracking

    *** what u want backup & how long u want to keep it. **** first know ur data (mantra1)

    Qs about data: how it is created, used, accessed, & what happens it u looses the data, from this u can find how long it takes to recreated data, first of all withthe inputs available can we recreate the data with out backup. If it is painful costlier or not possible t hen backup data.

    Understanding your customers, your environment, your business, your needs and your requirements are key to success, in storage management as well asbusiness in general

    Client ArchitectureChapter 5 Backup & Restore operations

    Issues to be concerned while doing operations on client are backup & restore efficiencies, retention periods, portability, CPU utilization, connection time andnetwork utilization.

    Read entire chapter good one.

    Chapter 6 Backup-archive client

    Are machines whose backup we are going to take. It needs some configuration files which specify what are TSM servers it can communicate , authorizationoptions,backup/archive options,schedule options, TSM space Mgmt options.

    On unix : 2 files client system options file (dsm.sys)

    TSM Concepts 5/9/2013

    http://dc399.4shared.com/doc/7k-aHcHN/preview.html 3 / 8

  • 7/28/2019 TSM Concepts overview

    4/8

    Client options file (dsm.opt)

    On other platforms only one file dsm.opt

    Min config params are

    Communication protocol: client & server using the same

    TSM server address

    Node/client name: the name by which TSM server knows the client.

    Node name & passwd are set up on server. They are also added in client options file.

    While sending files from client to TSM server for backup group of files are sent as one transaction. Means all files are successfully stored and failed in total.

    6.4 backup

    Adaptive sub-file backup:

    daptive sub-file backup useful for mobile users using laptops. Since bandwidth issues. In this type of backup first it takes full backup ofhe file and later on differential backups (delta file) judiciously means if lot of changes happen it does full backup rather than incrementalackup.

    Journal-based backup

    Here what to be backedup are maintained in a journal after the last backup by a journal agent. So the backup client need not search though the client FS &TSM server database for already backedup data to find which one have to backup. It improves performance.

    Backup Binding

    How long u keep a backedup file in TSM server is depends on how u set retention policies in Management class. The link process between the file & themanagement class is called backup binding.

    Rebinding

    Since a file bound to 1 single mgmt class, every time u run a new incremental backup server checks to see if the file still bound to same mgmt class. Thisprocess is called rebinding.

    6.5 Archive

    The IBM Tivoli Storage Manager Archive function stores selected files unconditionally on the server according to the applicable management class limits.Unconditionally means that there is no version limit and they will be retained for the defined time period regardless of whether they are deleted on the client.

    6.5.1 Packages

    Packages are group of files archived together with a common description. That description is used for easy search while retrieving.

    Archived files with common description Archive or retrieve complete package

    Retrieve individual files in package

    Add files to existing package

    Delete files from package

    Package Description Created using unique archive description

    Default descriptionArchive Date: mm/dd/yyyyTime: hh:mm:ss

    Retrieve using the GUI client

    Display archived files hierarchically

    Grouped by archive descriptions

    6.5.2 Client Space Reduction

    3. Retention

    Archiving is different from file backup in that the user may select from the available management classes to determine the retention. For file backup,the user may not control the management class to which the files are bound.

    TSM Concepts 5/9/2013

    http://dc399.4shared.com/doc/7k-aHcHN/preview.html 4 / 8

  • 7/28/2019 TSM Concepts overview

    5/8

    5. Backup Set or Instant Archive

    IBM Tivoli Storage Manager enables you to generate a copy of your clients most recent backup from the IBM Tivoli StorageManager server onto sequential media. This copy of the backup, also called backup set or portable backup, is self-contained and canbe used independent from IBM Tivoli Storage Manager to restore the clients data from a locally attached device that can also readthis media, such as a CD-ROM. This provides rapid recovery. This rapid recovery still needs TSM client s/w. this doesnt provide baremetal recovery.

    However, because each backup set is self-describing, the retention period has no significance to the backup set as long as the backup set volumes have notbeen reused,

    6.6.2 Server/client media support

    since media where we have taken backup set is used at client choose such a media set that will work with both the TSM server & client where we r going torecover it.

    5. Restore

    6.7.2 Point-in-time restore

    A point-in-time operation restores the specified objects to the state that existed at a specific date/time.

    4. Logical Volume Restore

    Full backups are allowed for raw logical volumes. File systems built over a logical volume can be backed full as well aspreogressive. Raw logical volumes only full backup & full restore.

    Part II Server Concepts

    Chapter 8 Policy Mgmt

    Data storage environment primarily comprises of 3 types of resources

    Machine, rules & data.

    Policy defines the relationship between these resources.

    Policy domain {policy set {Mgmt Classes {copy groups}

    }

    node groups}

    Hierarchy is left to right

    Copy groups have rules used to govern the data. 2 types backup & archive.

    Copy group destination parameter specifies the storage pool.

    Copy group bridges data & storage pool

    Copy group serialization parameter talks about treatment of modified files while doing backup.

    Backup copy group has 2 logical concepts file & file copy. File is actual file on node. File copy is the point-in-time copy of the file stored in TSM server. A filecan be in 2 states, Existing & deleted. Existing means already backed up & still exists on node. Deleted means backed up but deleted on node. Imp for rulebuilding.

    One more difference, File copy lies in TSM server. File lies in node.

    File copy has 3 states active, inactive and expired. Active file copy is the most current backed up file. Inactive file copy means previous version or copyof the file and expired file copy means the copy that is going to be removed from TSM server. Backup file copy is set to expire state when it doesnt obey therules specified in the copy group.

    TSM Concepts 5/9/2013

    http://dc399.4shared.com/doc/7k-aHcHN/preview.html 5 / 8

  • 7/28/2019 TSM Concepts overview

    6/8

    File copy life cycle movement active -> inactive -> expired.

    Expires based on 2 rules no of copies or retention period.

    No of copies includes active copy also.

    Retention period applies for inactive file copies only. *** no retention period for active file copies. They exist as long as the file exists on the node.

    If file exists on the node the 2 parameters ofbackup copy group are in effect

    Verexists: no of versions to keep.

    Retextra : how long to keep inactive copies. ***It starts from the day the file copy becomes inactive, not from the day it is backed up.****

    If file is deleted the file copy active become inactive. At this point we have inactive copies only.

    Verdeleted : no of copies to keep after file has been deleted.

    Retonly : how long to maintain the last file copy. Applicable to last file copy only.

    Backup copy group defines two other attributes to control the way backup to be done: mode & frequency. Mode talks about how files are to be picked forincremental backup.

    Mode = modifiedmeans backup only if the file changes since last baclup.

    = absolute means backup irrespective of backed up or not

    frequency talks about how often to allow a file to be backed up.

    Archive Copy Group.Only one version maintained. Retention period for archive object retversetting.

    Mode = archive

    Freq=CMD means on demand

    Copyserialization = treatment of modified files.

    9.4 Management Class & Explicit Binding

    The management class serves two purposes: it contains copy groups and associates data to them. A management class must contain at least one copygroup. This copy group could be for backup or archive, or the management class could contain both a backup and an archive copy group. There is only one foreach logical grouping of nodes (policy domain), and it contains the rules that you want used for your data unless you explicitly bind it to another managementclass. Therefore, there are two ways of binding data to a management class: default and explicit. Unless an object is explicitly defined, the default

    management class is used.

    Backup data is bound to a management class using the include option of the IBM Tivoli Storage

    Manager clients include-exclude list.

    Example 9-1 shows an example of an include statement that assigns the backup file /home/admin/redbook.script to a management class called redbookwhile allowing the rest of the backup files in /home/admin to go to the default management class. The binding is actually

    done during the backup operation.

    Example 9-1 Include option example

    include /home/admin/.../*

    include /home/admin/redbook.script redbook

    Image backups are also bound using the include/exclude list, however, the include.image directive is used. Example 9-2 shows how to bind all image backupsto the imageMC management class.

    Example 9-2 Image management class example

    include.image /. ../* imageMC

    Archive data is bound to a management class using the archmc command line option as illustrated in Example 9-3 on page 169. The file/home/admin/redbook.doc will be bound to the management class redbookarchive. Without the archmc option, this data would have been bound to the defaultmanagement class.

    TSM Concepts 5/9/2013

    http://dc399.4shared.com/doc/7k-aHcHN/preview.html 6 / 8

  • 7/28/2019 TSM Concepts overview

    7/8

    Example 9-3 Archive management class example

    dsmc archive -archmc=redbookarchive /home/admin/redbook.doc

    Therefore, the difference between backup and archive is that backup creates and

    controls multiple backup versions that are directly attached to the original file;

    where as archive creates an additional file that is normally kept for a specific

    period of time, as in the case of vital records.

    Full: All files that match your selection are included into the backup.

    Incremental: Only those files will be included which have been changed since the last backup.

    Differential: Only those files will be included which have been changed since the last FULL backup

    Policy Management : ***** refer Page 70 of Tivoli concepts & figure 3-12 TSM Concepts

    Client systems, or nodes in IBM Tivoli Storage Manager terminology, are grouped together with

    other nodes with common storage management requirements into a policy domain.

    The policy domain links the nodes to a policy set, a collection of storage management rules for different storage management activities. A policy set consistsof one or more management classes. A management class contains the rule descriptions called copy groups and links these to the data objects to bemanaged. A copy group is the place where all the storage management

    parameters, such as number of stored copies, retention period, storage media,and so on, are defined. When the data is linked to particular rules, it is said tobe bound to the management class that contains those rules.

    Another way to look at the components that make up a policy is to consider them in the hierarchical fashion in which they are defined; that iss, consider thepolicy domain containing the policy set, the policy set containing the management classes, and the management classes containing the copy groups and thestorage management parameters.

    Applying the discipline of storage management, combined with the appropriate technology and a well-crafted set of storage management best practices, canprovide significant business value by helping enterprises increase revenues and decrease costs.

    think of the database as having three sections, as shown in Figure 4-1 on page 58: rules and policies, files and data information, and location tracking.

    The progressive backup feature uses its own relational database to track data wherever it is stored, delivering direct one-step file restore. This eliminates theneed for base-plus-incremental tapes, commonly used for restore procedures in other storage management products.

    Planning :

    Know ur data: what data to be backed up.

    IBM Tivoli Storage Manager saves changed files; how long it saves those files is determined in the policies you set for each customer. Every end user is acustomer and every policy contains the service level agreement that you provide to that customer.

    Requesting point-in-time restores allows for automatic selection of all of the files that were present at the selected time and should be restored. IBM TivoliStorage Manager database

    selects each file using the data that was backed up closest in time to the request (or using a file that was backed up much sooner but did not change beforethe point in time requested.

    TSM Concepts 5/9/2013

    http://dc399.4shared.com/doc/7k-aHcHN/preview.html 7 / 8

  • 7/28/2019 TSM Concepts overview

    8/8

    Planning for TSM solution should be top down approach. Find what are the deliverables like how fast user wants restore. Multiple copies of the files he wants ornot.

    TSM Concepts 5/9/2013