Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

Book description

Tivoli Continuous Data Protection for Files is specifically targeted at user computers, such as mobile computers and workstations, as well as file servers. It provides continuous data protection of files, providing the highest level of protection possible, yet is simple to use and administer.

This IBM Redbooks® publication presents a deployment guide for Tivoli Continuous Data Protection for Files Version 3.1. We cover planning, installing, and troubleshooting of Tivoli Continuous Data Protection for Files for several use case scenarios. In addition, we provide some case studies, including integration with IBM Tivoli Storage Manager, that can be used as a proof of concept or demonstration of the product at a client environment.

The target audience for this documentation is IT Specialists who will be working on Tivoli Continuous Data Protection for Files installations and proof of concepts.

Table of contents

  1. Figures (1/2)
  2. Figures (2/2)
  3. Tables
  4. Examples
  5. Notices
    1. Trademarks
  6. Preface
    1. The team that wrote this book
    2. Become a published author
    3. Comments welcome
  7. Part 1: Planning and architecture
  8. Chapter 1: Introduction to Tivoli Continuous Data Protection for Files
    1. 1.1: General overview of Tivoli Continuous Data Protection for Files
      1. What is Tivoli Continuous Data Protection for Files?
      2. Why Tivoli Continuous Data Protection for Files is needed
      3. Who should use Tivoli Continuous Data Protection for Files?
    2. 1.2: How Tivoli Continuous Data Protection for Files works
    3. 1.3: Main features of Tivoli Continuous Data Protection for Files
    4. 1.4: Value proposition of Tivoli Continuous Data Protection for Files
      1. Benefits of using Tivoli Continuous Data Protection for Files
      2. Unique differentiators
  9. Chapter 2: Product architecture, planning, and deployment
    1. 2.1: Product architecture
      1. Main components
      2. Capabilities
      3. Daemon architecture
    2. 2.2: Planning for deployment
      1. What are my critical files?
      2. Where should I back my files up to?
      3. How often do I need to back up different types of files?
      4. Do I need e-mail and scheduled backups?
      5. Do I need the Vault feature?
      6. Summary of protection methods
    3. 2.3: Best practices and sizing considerations
      1. Overall summary
      2. Corporate scenario- Tivoli Continuous Data Protection for Files with Tivoli Storage Manager
      3. Corporate scenario- file server as remote storage target for Tivoli Continuous Data Protection for Files workstations
      4. Corporate scenario- Tivoli Continuous Data Protection for Files loaded on file server
      5. Home user scenario
    4. 2.4: Tivoli Continuous Data Protection for Files installation requirements
      1. Basic installation
      2. System requirements
  10. Part 2: Deployment
  11. Chapter 3: Installation and configuration
    1. 3.1: Basic installation and configuration
      1. Installing Tivoli Continuous Data Protection for Files
      2. Configuration using the Initial Configuration Wizard (1/4)
      3. Configuration using the Initial Configuration Wizard (2/4)
      4. Configuration using the Initial Configuration Wizard (3/4)
      5. Configuration using the Initial Configuration Wizard (4/4)
    2. 3.2: Advanced installation options
      1. Installation using command-line parameters
      2. Silent installation
      3. Push installation
      4. Pull installation (upgrade)
      5. Providing a configuration file
    3. 3.3: Advanced configuration
      1. Settings Notebook (1/5)
      2. Settings Notebook (2/5)
      3. Settings Notebook (3/5)
      4. Settings Notebook (4/5)
      5. Settings Notebook (5/5)
      6. Central Administration Settings (1/2)
      7. Central Administration Settings (2/2)
    4. 3.4: Additional considerations
      1. Installation and data directories
      2. Interpreting file and folder patterns
      3. Including and excluding files from protection
      4. Vault duration
      5. Default protection settings (Settings Notebook)
  12. Chapter 4: Proof of concept scenarios
    1. 4.1: Product features
    2. 4.2: Single user environment
      1. Single computer, local disk only
      2. Single computer with external storage (1/2)
      3. Single computer with external storage (2/2)
      4. Single computer with ISP connection (1/2)
      5. Single computer with ISP connection (2/2)
    3. 4.3: Multiple computers in a home or small business
      1. Home network with a file server
      2. Small business with Tivoli Storage Manager Express (1/4)
      3. Small business with Tivoli Storage Manager Express (2/4)
      4. Small business with Tivoli Storage Manager Express (3/4)
      5. Small business with Tivoli Storage Manager Express (4/4)
      6. Small business with a file server (1/3)
      7. Small business with a file server (2/3)
      8. Small business with a file server (3/3)
    4. 4.4: Tivoli Continuous Data Protection for Files in an enterprise environment
      1. Enterprise environment with Tivoli Storage Manager
      2. Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers (1/6)
      3. Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers (2/6)
      4. Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers (3/6)
      5. Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers (4/6)
      6. Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers (5/6)
      7. Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers (6/6)
      8. Enterprise and remote offices
    5. 4.5: Restore scenarios
      1. Restore from local disk
      2. Restore from remote storage (1/4)
      3. Restore from remote storage (2/4)
      4. Restore from remote storage (3/4)
      5. Restore from remote storage (4/4)
      6. Restore from Tivoli Storage Manager or Tivoli Storage Manager Express to a file server
  13. Chapter 5: Troubleshooting, hints, and tips
    1. 5.1: Installation issues
      1. Disk space
      2. Non-privileged users
      3. Port conflicts (1/4)
      4. Port conflicts (2/4)
      5. Port conflicts (3/4)
      6. Port conflicts (4/4)
      7. Push installation (1/2)
      8. Push installation (2/2)
      9. Pull installation
    2. 5.2: Replication issues
      1. Removable disk issues (1/2)
      2. Removable disk issues (2/2)
      3. File server issues
      4. WebDAV issues (1/2)
      5. WebDAV issues (2/2)
      6. Tivoli Storage Manager issues (1/7)
      7. Tivoli Storage Manager issues (2/7)
      8. Tivoli Storage Manager issues (3/7)
      9. Tivoli Storage Manager issues (4/7)
      10. Tivoli Storage Manager issues (5/7)
      11. Tivoli Storage Manager issues (6/7)
      12. Tivoli Storage Manager issues (7/7)
      13. Transient conditions (remote storage location not reachable)
    3. 5.3: System operation and log files
      1. Tivoli Continuous Data Protection for Files system operation files
      2. Tivoli Continuous Data Protection for Files logs
      3. Tivoli Storage Manager specific log files
    4. 5.4: Tracing
      1. Before you start
      2. How to run a trace
      3. Tracing example
  14. Part 3: Planning for a client engagement
  15. Appendix A: Project planning
    1. Required skills
    2. Available resources
    3. Solution description
    4. Solution deployment tasks (1/2)
    5. Solution deployment tasks (2/2)
    6. Strategies for successful implementation
    7. Summary
  16. Appendix B: Sample Statement of Work for Tivoli Continuous Data Protection for Files deployment
    1. Building a protected environment for user workstations
  17. Abbreviations and Acronyms
  18. Related publications
    1. Publications
    2. Online resources
    3. How to get IBM Redbooks
    4. Help from IBM
  19. Index (1/2)
  20. Index (2/2)
  21. Back cover

Product information

  • Title: Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  • Author(s): Vasfi Gucer, Greg Bass, Wolfgang Beuttler, Marcia Kubo
  • Release date: August 2007
  • Publisher(s): IBM Redbooks
  • ISBN: None