Book description
This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM TS7600 ProtecTIER® family of products. This guide provides all the latest best practices for using ProtecTIER Software Version 3.3 and the revolutionary and patented IBM HyperFactor® deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation.
The IBM System Storage® TS7650G ProtecTIER Deduplication
Gateway and the IBM System Storage TS7620 ProtecTIER Deduplication
Appliance Express are disk-based data storage systems that are
configured for three available interfaces:
The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates traditional automated tape libraries.
The Symantec NetBackup OpenStorage (OST) API can be integrated with Symantec NetBackup to provide backup-to-disk without having to emulate traditional tape libraries.
The newly available File System Interface (FSI) supports Common Internet File System (CIFS) and Network File System (NFS) as backup targets.
For your existing ProtecTIER solution, this guide provides best
practices and suggestions to boost the performance and the
effectiveness of the data deduplication with regards to your
application platforms for your VTL, OST, and FSI systems.
When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best option and scenario for data deduplication for their environments. This guide helps you optimize your deduplication ratio, while reducing the hardware, power and cooling, and management costs.
This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS/CSS) Group, development, and Quality Assurance teams.
Table of contents
- Front cover
- Notices
- Preface
- Part 1 General best practices
- Chapter 1. ProtecTIER basics
-
Chapter 2. Deduplication considerations
- 2.1 HyperFactor data deduplication
- 2.2 ProtecTIER HyperFactor deduplication processing
- 2.3 Components of a ProtecTIER system
- 2.4 Benefits of ProtecTIER HyperFactor
-
2.5 General ProtecTIER deduplication considerations
- 2.5.1 Rethinking your overall backup strategy
- 2.5.2 The number 32: The ProtecTIER product is not physical tape
- 2.5.3 Data reduction technologies should not be combined
- 2.5.4 Data streams must be in order
- 2.5.5 Data organization within your ProtecTIER repository
- 2.5.6 The dynamics of the ProtecTIER repository
- 2.5.7 ProtecTIER repository usage
- 2.5.8 Compression
- 2.5.9 Encryption
- 2.5.10 Database logs and other data types with high data change rates
- 2.5.11 Multiplexing
- 2.5.12 Tape block size
- 2.5.13 File size
- 2.6 Data types
- Chapter 3. Virtual Tape Library guidelines
- Chapter 4. ProtecTIER File System Interface: General introduction
- Chapter 5. Networking essentials
-
Chapter 6. OpenStorage guidelines
- 6.1 OpenStorage overview
-
6.2 Networking overview
- 6.2.1 Definitions and acronyms
- 6.2.2 Load distribution methodology
- 6.2.3 Bonding configuration
- 6.2.4 Broadcom NICs with Microsoft platforms
- 6.2.5 IBM AIX platforms
- 6.2.6 Solaris platforms
- 6.2.7 Configuring the network interfaces on the host media server
- 6.2.8 Configuring a ProtecTIER server to work with the OpenStorage environment
- 6.3 Performance optimization
- 6.4 NetBackup Storage Lifecycle Policies
- 6.5 OST functionality
- Chapter 7. Host attachment considerations for VTL
- Part 2 Back-end storage subsystems
- Chapter 8. Back-end storage overview
-
Chapter 9. IBM Storwize V3700
- 9.1 V3700 overview
- 9.2 General V3700 considerations
-
9.3 Configuration steps
- 9.3.1 Creating empty user data and metadata storage pools
- 9.3.2 Creating the MDisk arrays or discovering unmanaged MDisks
- 9.3.3 Creating volumes with a sequential virtualization type
- 9.3.4 Creating a host connection for the ProtecTIER nodes by using the Storwize V3700 GUI
- 9.3.5 Mapping volumes to a host
- 9.3.6 Creating file systems and building the ProtecTIER repository
- 9.3.7 Expanding the repository
-
Chapter 10. IBM SAN Volume Controller, IBM Storwize V7000, and IBM Storwize V7000 Unified Storage
- 10.1 Storage virtualization introduction
- 10.2 General notes
- 10.3 Firmware level
- 10.4 Fibre Channel connection topology
- 10.5 User data and metadata pool: General recommendations
-
10.6 Configuration steps
- 10.6.1 Creating empty user data and metadata storage pools
- 10.6.2 Creating the MDisk arrays or discovering unmanaged MDisks
- 10.6.3 Creating volumes with a sequential virtualization type
- 10.6.4 Creating a host connection for ProtecTIER nodes in Storwize V7000 GUI
- 10.6.5 Mapping volumes to a host
- 10.6.6 Creating file systems and building the ProtecTIER repository
- 10.6.7 Expanding the repository
- Chapter 11. IBM XIV Storage System
- Chapter 12. IBM System Storage DS8000
- Part 3 Backup management, VTL, OST, and FSI best practices
- Chapter 13. Backup management introduction
-
Chapter 14. IBM Tivoli Storage Manager
- 14.1 Tivoli Storage Manager VTL
-
14.2 Tivoli Storage Manager: Preferred options
- 14.2.1 LAN-free backups with the ProtecTIER product
- 14.2.2 Data streams
- 14.2.3 Reclamation
- 14.2.4 Collocation
- 14.2.5 Physical tape
- 14.2.6 Avoiding mount conflicts
- 14.2.7 Multiple streams from the client with resourceutilization parameter
- 14.2.8 Accommodating increased sessions
- 14.2.9 Tivoli Storage Manager storage pool selection
- 14.2.10 Technical overview
- 14.2.11 Advantages of a Tivoli Storage Manager environment with ProtecTIER
- 14.2.12 Tivoli Storage Manager version with VTL
- 14.2.13 Updating to a VTL library type
- 14.2.14 Defining and deleting Tivoli Storage Manager libraries with many drives
- 14.3 Tivoli Storage Manager: FSI
- Chapter 15. Symantec NetBackup and BackupExec
-
Chapter 16. EMC NetWorker
- 16.1 Overview
- 16.2 EMC NetWorker in a VTL environment
-
16.3 EMC NetWorker in an FSI environment
- 16.3.1 Creating a Windows user for EMC NetWorker
- 16.3.2 Setting up for backup and restore
- 16.3.3 General configuration recommendations
- 16.3.4 Setting the information to be backed up
- 16.3.5 Setting the time for the backup
- 16.3.6 Performing a restore
- 16.3.7 Parameters for best performance with ProtecTIER FSI
- Chapter 17. HP Data Protector
- Chapter 18. IBM i and Backup, Recovery, and Media Services
- Chapter 19. CommVault
- Part 4 Application considerations
-
Chapter 20. Application considerations and data types
- 20.1 Lotus Domino
- 20.2 Microsoft Exchange
- 20.3 Microsoft SQL Server
-
20.4 DB2
- 20.4.1 Combining DB2 compression and ProtecTIER deduplication
- 20.4.2 Upgrading the DB2 database to improve deduplication
- 20.4.3 DB2 DEDUP_DEVICE setting
- 20.4.4 Example of DEDUP_DEVICE setting
- 20.4.5 Excluding logs from the DB2 database backup
- 20.4.6 DB2 recommended settings without DEDUP_DEVICE
- 20.4.7 Example of DB2 command using sessions, buffers, and parallelism
- 20.5 Oracle
-
20.6 SAP
- 20.6.1 SAP introduction
- 20.6.2 Data protection for SAP
- 20.6.3 Integration of Tivoli Storage Manager for ERP with SAP
- 20.6.4 Tivoli Storage Manager for ERP for Oracle database
- 20.6.5 Tivoli Storage Manager for ERP for DB2
- 20.6.6 SAP BR*Tools for Oracle using BACKINT
- 20.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager
- 20.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage Manager
- 20.6.9 Best practices for Tivoli Storage Manager for ERP with ProtecTIER
-
20.7 VMware
- 20.7.1 Technical overview
- 20.7.2 Settings and tuning for VMware and Tivoli Storage Manager
- 20.7.3 Backup solutions
- 20.7.4 Zoning
- 20.7.5 Configuring the ProtecTIER server
- 20.7.6 Installing the tape driver on the Tivoli Storage Manager server and the Tivoli Storage Manager storage agent
- 20.7.7 Tivoli Storage Manager storage agent configuration
- 20.7.8 Tivoli Storage Manager server configuration
- 20.7.9 Tivoli Storage Manager client installation
- 20.7.10 Disabling compression and deduplication on Tivoli Storage Manager
- 20.7.11 Configuring a full VM backup through the vStorage API
- 20.7.12 VMware Guest OS backup to ProtecTIER
- Part 5 Replication and disaster recovery
-
Chapter 21. ProtecTIER replication
- 21.1 ProtecTIER IP replication
- 21.2 Native replication
- 21.3 Replication policies
- 21.4 Visibility switching
- 21.5 Principality
- 21.6 Replication Manager
- 21.7 Initial synchronization
- 21.8 Replication schedules
- 21.9 Replication backlog
- 21.10 Replication planning
- 21.11 Bandwidth validation utility
- 21.12 Planning ProtecTIER replication
- 21.13 The backup application database backup
- 21.14 ProtecTIER Planner tool
-
Chapter 22. Disaster recovery deployment with backup applications
- 22.1 Disaster recovery operations
- 22.2 ProtecTIER replication overview
- 22.3 Disaster recovery operations with VTL
- 22.4 Disaster recovery operations with FSI
- 22.5 Entering ProtecTIER DR mode
- 22.6 The backup application catalog
- 22.7 Single domain and multiple domains
- 22.8 Replication best practices for OST
- 22.9 Deploying replication with specific backup applications
-
22.10 Symantec NetBackup deployment with ProtecTIER replication
- 22.10.1 Scripting the inject/eject commands
- 22.10.2 Scripting the inventory commands
- 22.10.3 Setting up NetBackup for backup and restore
- 22.10.4 Setting up NetBackup for disaster recovery
- 22.10.5 Cross-site backups
- 22.10.6 ProtecTIER disaster recovery with Symantec NetBackup
- 22.10.7 Single domain versus two separate domains
- 22.10.8 Disaster recovery scenarios
- 22.10.9 Determining what is available for restore at the disaster recovery site
- 22.10.10 Eject and inject commands from NetBackup software
- 22.11 EMC NetWorker deployment with ProtecTIER replication
- 22.12 CommVault
- Appendix A. ProtecTIER parsers
- Appendix B. Entry-level and midrange disks
- Appendix C. Networking
- Appendix D. Managing cartridge sizes with ProtecTIER
- Glossary
- Related publications
- Back cover
Product information
- Title: IBM ProtecTIER Implementation and Best Practices Guide
- Author(s):
- Release date: May 2013
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
IBM ProtecTIER Implementation and Best Practices Guide
This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM System …
book
IBM ProtecTIER Implementation and Best Practices Guide
This IBM® Redbooks® publication provides best practice guidance for planning, installing, configuring, and employing the IBM …
book
IBM ProtecTier Implementation and Best Practices Guide
The IBM® System Storage® TS7650G ProtecTIER® Deduplication Gateway and the IBM System Storage TS7650 ProtecTIER Deduplication …
book
Implementing the IBM Storwize V7000 V7.2
Continuing its commitment to developing and delivering industry-leading storage technologies, IBM® introduces the IBM Storwize® V7000 …