IBM ProtecTIER Implementation and Best Practices Guide

Book description

This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM System Storage® TS7600 ProtecTIER® family of products. This guide provides the current best practices for using ProtecTIER software version physical general availability (pGA) 3.3 and the revolutionary and patented IBM HyperFactor® deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation.

The System Storage TS7650G ProtecTIER Deduplication Gateway and the System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems that are configured for three available interfaces:

  • The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates traditional automated tape libraries.

  • The OpenStorage (OST) application programming interface (API) can be integrated with Symantec NetBackup to provide backup-to-disk without having to emulate traditional tape libraries.

  • The File System Interface (FSI) supports Common Internet File System (CIFS) and Network File System (NFS) as backup targets.


  • For your existing ProtecTIER solution, this guide provides preferred practices and suggestions to boost the performance and the effectiveness of the data deduplication with regards to your application platforms for your VTL, OST, and FSI systems.

    When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best options and scenarios for data deduplication for their environments. This guide helps you optimize your deduplication ratio, and at the same time reduce the hardware, power and cooling, and management costs.

    This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS) group, development, and quality assurance (QA) teams.

    Table of contents

    1. Front cover
    2. Notices
      1. Trademarks
    3. Preface
      1. Authors
      2. Now you can become a published author, too!
      3. Comments welcome
      4. Stay connected to IBM Redbooks
    4. Part 1 General best practices
    5. Chapter 1. IBM ProtecTIER basics
      1. 1.1 Terminology
        1. 1.1.1 ProtecTIER Appliance terminology
        2. 1.1.2 ProtecTIER Gateway terminology
        3. 1.1.3 ProtecTIER replication terminology
      2. 1.2 ProtecTIER fundamental concepts
        1. 1.2.1 ProtecTIER with deduplication disabled
      3. 1.3 ProtecTIER models for open systems
        1. 1.3.1 ProtecTIER appliances
        2. 1.3.2 ProtecTIER deduplication gateways
      4. 1.4 Remote support and Call Home
        1. 1.4.1 How to set up Call Home
      5. 1.5 Simple Network Management Protocol
        1. 1.5.1 Alert filtering
        2. 1.5.2 Space thresholds
        3. 1.5.3 Email alerts
      6. 1.6 ProtecTIER command-line interface
    6. Chapter 2. Deduplication considerations
      1. 2.1 HyperFactor data deduplication
        1. 2.1.1 HyperFactor, deduplication, and bandwidth savings
      2. 2.2 ProtecTIER HyperFactor deduplication processing
      3. 2.3 Components of a ProtecTIER system
        1. 2.3.1 ProtecTIER server
        2. 2.3.2 HyperFactor deduplication algorithm
        3. 2.3.3 Disk storage subsystem
      4. 2.4 Benefits of ProtecTIER HyperFactor
        1. 2.4.1 Flexibility
        2. 2.4.2 High availability
        3. 2.4.3 High performance, low storage requirements, and lower environmental costs
      5. 2.5 General ProtecTIER deduplication considerations
        1. 2.5.1 Rethinking your overall backup strategy
        2. 2.5.2 Data reduction technologies should not be combined
        3. 2.5.3 Data streams must be in order
        4. 2.5.4 Data organization in your ProtecTIER repository
        5. 2.5.5 The dynamics of the ProtecTIER repository
        6. 2.5.6 ProtecTIER repository usage
        7. 2.5.7 Compression
        8. 2.5.8 Encryption
        9. 2.5.9 Database logs and other data types with high data change rates
        10. 2.5.10 Multiplexing
        11. 2.5.11 Tape block size
        12. 2.5.12 File size
      6. 2.6 Data types
        1. 2.6.1 Candidates for a high factoring ratio
        2. 2.6.2 Candidates for a low factoring ratio
    7. Chapter 3. Networking essentials
      1. 3.1 Network terminology
      2. 3.2 General configuration considerations
      3. 3.3 Bonding and teaming
        1. 3.3.1 The three different bonding modes of ProtecTIER
      4. 3.4 Preferred ProtecTIER bonding configuration
        1. 3.4.1 Single team/bond (Layer 2) configuration
        2. 3.4.2 Individual IPs (Layer 3) configuration
        3. 3.4.3 Dual/Three teams (Layer 2+3) configuration
        4. 3.4.4 VLANs
        5. 3.4.5 IP addresses
        6. 3.4.6 Routing the IP traffic
    8. Chapter 4. Virtual Tape Library guidelines
      1. 4.1 ProtecTIER Virtual Tape Library introduction
      2. 4.2 General preferred practices for the Virtual Tape Library
      3. 4.3 Setting up the virtual library and cartridges
        1. 4.3.1 Creating libraries
    9. Chapter 5. ProtecTIER File System Interface: General introduction
      1. 5.1 ProtecTIER FSI network overview
        1. 5.1.1 ProtecTIER network
        2. 5.1.2 Network configuration considerations
        3. 5.1.3 Connecting a ProtecTIER server to the network
      2. 5.2 Configuring components for ProtecTIER FSI
        1. 5.2.1 Configuring a network
        2. 5.2.2 Replication
        3. 5.2.3 Disaster recovery: Test
        4. 5.2.4 Disaster recovery: Event
        5. 5.2.5 General FSI suggestions
      3. 5.3 File System Interface guidelines for NFS
        1. 5.3.1 ProtecTIER NFS authentication and security management
        2. 5.3.2 Configuration of a ProtecTIER FSI-NFS export
        3. 5.3.3 Understanding root squash
      4. 5.4 File System Interface guidelines for CIFS
        1. 5.4.1 ProtecTIER authentication and user management
        2. 5.4.2 Configuring your ProtecTIER system for FSI-CIFS
      5. 5.5 FSI File System Scalability
    10. Chapter 6. OpenStorage guidelines
      1. 6.1 OpenStorage overview
        1. 6.1.1 Main components
      2. 6.2 Networking overview
        1. 6.2.1 Definitions and acronyms
        2. 6.2.2 Load distribution methodology
        3. 6.2.3 Bonding configuration
        4. 6.2.4 Broadcom NICs with Microsoft platforms
        5. 6.2.5 IBM AIX platforms
        6. 6.2.6 Solaris platforms
        7. 6.2.7 Configuring the network interfaces on the host media server
        8. 6.2.8 Configuring a ProtecTIER server to work with the OpenStorage environment
      3. 6.3 Performance optimization
      4. 6.4 NetBackup Storage Lifecycle Policies
      5. 6.5 Symantec OST functionality
        1. 6.5.1 Optimized duplication
        2. 6.5.2 Granular Recovery Technology
        3. 6.5.3 Auto Image Replication
        4. 6.5.4 Accelerator
        5. 6.5.5 Optimized Synthetic Backup
    11. Chapter 7. Host attachment considerations for Virtual Tape Library
      1. 7.1 General suggestions
      2. 7.2 Device driver specifications
        1. 7.2.1 AIX specifications to work with VTL
        2. 7.2.2 Solaris specifications to work with VTL
        3. 7.2.3 Linux specifications to work with VTL
        4. 7.2.4 Windows specifications to work with VTL
        5. 7.2.5 IBM Tape Device Driver
        6. 7.2.6 Control path failover and data path failover
        7. 7.2.7 Persistent device naming
      3. 7.3 LUN masking for VTL systems
        1. 7.3.1 LUN masking methods and preferred practices
        2. 7.3.2 LUN masking configuration steps
    12. Part 2 Back-end storage subsystems
    13. Chapter 8. Back-end storage overview
      1. 8.1 Overview
      2. 8.2 Dependencies from a back-end storage subsystem view
      3. 8.3 Dependencies from a ProtecTIER view
      4. 8.4 Smart storage subsystems
      5. 8.5 Key rules for a ProtecTIER server
      6. 8.6 Storage arrays configuration
        1. 8.6.1 General requirements
        2. 8.6.2 RAID considerations
        3. 8.6.3 LUNs
        4. 8.6.4 Expanding the repository
      7. 8.7 Storage area network fabric
        1. 8.7.1 Two Fibre Channel paths to each storage controller
        2. 8.7.2 Inter-switch link
        3. 8.7.3 Dedicated zones
        4. 8.7.4 Front-end zones
        5. 8.7.5 Back-end zones
        6. 8.7.6 SAN paths
    14. Chapter 9. IBM FlashSystem with System Storage TS7650G ProtecTIER Deduplication Gateway
      1. 9.1 IBM FlashSystem overview
      2. 9.2 General FlashSystem considerations
      3. 9.3 Deploying the IBM FlashSystem 840 with IBM ProtecTIER
        1. 9.3.1 Creating user data and metadata Volumes
        2. 9.3.2 Mapping the FlashSystem Volumes to the ProtecTIER System
        3. 9.3.3 Creating file systems and building the ProtecTIER repository
      4. 9.4 General FlashSystem 840 Best Practices
        1. 9.4.1 ProtecTIER Metadata Planner preferred practices for FlashSystem 840
    15. Chapter 10. IBM Storwize V3700 and V5000
      1. 10.1 V3700 and V5000 overview
      2. 10.2 General V3700 and V5000 considerations
      3. 10.3 Configuration steps
        1. 10.3.1 Creating empty user data and metadata storage pools
        2. 10.3.2 Creating the MDisk arrays or discovering unmanaged MDisks
        3. 10.3.3 Creating volumes with a sequential virtualization type
        4. 10.3.4 Creating a host connection for the ProtecTIER nodes by using the GUI
        5. 10.3.5 Mapping volumes to a host
        6. 10.3.6 Creating file systems and building the ProtecTIER repository
        7. 10.3.7 Expanding the repository
    16. Chapter 11. IBM System Storage SAN Volume Controller, IBM Storwize V7000, and V7000 Unified Storage
      1. 11.1 Storage virtualization introduction
        1. 11.1.1 Terminology
      2. 11.2 General notes
      3. 11.3 Firmware level
      4. 11.4 Fibre Channel connection topology
      5. 11.5 User data and metadata pool: General suggestions
        1. 11.5.1 Metadata pool
        2. 11.5.2 User data pool
      6. 11.6 Configuration steps
        1. 11.6.1 Creating empty user data and metadata storage pools
        2. 11.6.2 Creating the MDisk arrays or discovering unmanaged MDisks
        3. 11.6.3 Creating volumes with a sequential virtualization type
        4. 11.6.4 Creating a host connection for ProtecTIER nodes in Storwize V7000 GUI
        5. 11.6.5 Mapping volumes to a host
        6. 11.6.6 Creating file systems and building the ProtecTIER repository
        7. 11.6.7 Expanding the repository
    17. Chapter 12. IBM XIV Storage System
      1. 12.1 XIV Storage System hardware
      2. 12.2 Fibre Channel switch cabling
        1. 12.2.1 Zoning configuration
        2. 12.2.2 Configuring the XIV Storage System for a ProtecTIER server
    18. Chapter 13. IBM System Storage DS8000
      1. 13.1 DS8000 series overview
        1. 13.1.1 Disk drives
        2. 13.1.2 RAID levels
      2. 13.2 General considerations
        1. 13.2.1 Planning tools
        2. 13.2.2 Metadata
        3. 13.2.3 User data
        4. 13.2.4 Firmware levels
        5. 13.2.5 Replication
      3. 13.3 Rotate extents: Striping
        1. 13.3.1 When not to use rotate extents
    19. Part 3 Backup management, VTL, OST, and FSI preferred practices
    20. Chapter 14. Backup management introduction
      1. 14.1 Introduction
      2. 14.2 General suggestions
        1. 14.2.1 Interoperability
        2. 14.2.2 Software compatibility
        3. 14.2.3 Software, backup application, and operating system
        4. 14.2.4 Tape library zoning
        5. 14.2.5 Compression
        6. 14.2.6 Encryption
        7. 14.2.7 Multiplexing
        8. 14.2.8 Tape block sizes
        9. 14.2.9 Type of data that is backed up
      3. 14.3 General advice for backups
      4. 14.4 ProtecTIER integration with backup applications
      5. 14.5 Backup application vocabulary cross-reference
      6. 14.6 Backup application catalog
      7. 14.7 Remote cloning of virtual tapes
    21. Chapter 15. IBM Tivoli Storage Manager
      1. 15.1 Tivoli Storage Manager VTL
      2. 15.2 Tivoli Storage Manager: Preferred options
        1. 15.2.1 LAN-free backups with the ProtecTIER product
        2. 15.2.2 Data streams
        3. 15.2.3 Reclamation
        4. 15.2.4 Collocation
        5. 15.2.5 Migration
        6. 15.2.6 Backing up your Tivoli Storage Manager database
        7. 15.2.7 Physical tape
        8. 15.2.8 Avoiding mount conflicts
        9. 15.2.9 Multiple streams from the client with the resourceutilization parameter
        10. 15.2.10 Accommodating increased sessions
        11. 15.2.11 Tivoli Storage Manager storage pool selection
        12. 15.2.12 Technical overview
        13. 15.2.13 Advantages of a Tivoli Storage Manager environment with ProtecTIER
        14. 15.2.14 Tivoli Storage Manager configuration with VTL
        15. 15.2.15 Updating to a VTL library type
        16. 15.2.16 Defining and deleting Tivoli Storage Manager libraries with many drives
      3. 15.3 Tivoli Storage Manager: FSI
        1. 15.3.1 Setting up backup and restore on Tivoli Storage Manager
        2. 15.3.2 Performing backup and restore on Tivoli Storage Manager
        3. 15.3.3 Parameters for best performance with ProtecTIER FSI
    22. Chapter 16. Symantec NetBackup and BackupExec
      1. 16.1 NetBackup overview
      2. 16.2 Suggestions for NetBackup
        1. 16.2.1 General suggestions
      3. 16.3 NetBackup in a VTL environment
      4. 16.4 NetBackup in an OST environment
      5. 16.5 NetBackup in an FSI environment
        1. 16.5.1 NetBackup in an FSI-CIFS environment
        2. 16.5.2 NetBackup in an FSI-NFS environment
      6. 16.6 Symantec BackupExec in an FSI environment
        1. 16.6.1 Setting up backup and restore
    23. Chapter 17. EMC NetWorker
      1. 17.1 Overview
      2. 17.2 EMC NetWorker in a VTL environment
        1. 17.2.1 General suggestions
        2. 17.2.2 Suggestion if a ProtecTIER server is used as a VTL
      3. 17.3 EMC NetWorker in an FSI environment
        1. 17.3.1 Creating a Windows user for EMC NetWorker
        2. 17.3.2 Setting up for backup and restore
        3. 17.3.3 General configuration suggestions
        4. 17.3.4 Setting the information to be backed up
        5. 17.3.5 Setting the time for the backup
        6. 17.3.6 Performing a restore
        7. 17.3.7 Parameters for best performance with ProtecTIER FSI
    24. Chapter 18. HP Data Protector
      1. 18.1 HP Data Protector with ProtecTIER
        1. 18.1.1 HP Data Protector architecture with ProtecTIER
      2. 18.2 HP Data Protector in a VTL environment
        1. 18.2.1 Enabling the robotic bar code reader
        2. 18.2.2 Increasing the tape block size
        3. 18.2.3 Enabling the lock name
        4. 18.2.4 Disabling compression, encryption, and CRC chksum
        5. 18.2.5 Hosts multipath support
        6. 18.2.6 Load balancing
        7. 18.2.7 Using a mirroring functionality
        8. 18.2.8 Troubleshooting logs
    25. Chapter 19. IBM i and Backup, Recovery, and Media Services
      1. 19.1 IBM i overview
        1. 19.1.1 Integrated file system
        2. 19.1.2 Integrated database
        3. 19.1.3 Object-based architecture
        4. 19.1.4 Libraries
        5. 19.1.5 Backup considerations in IBM i
      2. 19.2 Integration of IBM i and ProtecTIER in a VTL environment
        1. 19.2.1 Backup considerations with ProtecTIER
        2. 19.2.2 Suggested ProtecTIER and IBM i configuration
      3. 19.3 Configuration of BRMS for ProtecTIER
        1. 19.3.1 BRMS overview
        2. 19.3.2 Suggested configurations of BRMS
      4. 19.4 Deploying ProtecTIER with BRMS for disaster recovery
        1. 19.4.1 BRMS available at the production site and DR site
        2. 19.4.2 No BRMS at the DR site
      5. 19.5 Use DUPMEDBRM to duplicate media from ProtecTIER to physical media
        1. 19.5.1 Enable append to multiple parallel volumes during DUPMEDBRM
        2. 19.5.2 Support multiple batch jobs for the DUPMEDBRM command
      6. 19.6 Device configuration
      7. 19.7 BRMS movement of replicated volumes - considerations
    26. Chapter 20. CommVault
      1. 20.1 CommVault introduction
        1. 20.1.1 CommVault components
      2. 20.2 CommVault with ProtecTIER VTL
        1. 20.2.1 CommVault configuration
        2. 20.2.2 Data multiplexing
        3. 20.2.3 Hardware compression
        4. 20.2.4 Data encryption
        5. 20.2.5 Alternative data paths
      3. 20.3 CommVault FSI
        1. 20.3.1 Setting up backup and restore in a CIFS environment
        2. 20.3.2 Parameters for best performance with ProtecTIER FSI-CIFS
        3. 20.3.3 Setting up backup and restore in an NFS environment
        4. 20.3.4 Parameters for best performance with ProtecTIER FSI-NFS
    27. Chapter 21. Veeam FSI-CIFS
      1. 21.1 Setting up backup infrastructure
        1. 21.1.1 Creating backup repository
        2. 21.1.2 Adding VMware backup proxy
        3. 21.1.3 Adding a VMware Server
      2. 21.2 Setting up backup and restore
        1. 21.2.1 Creating a new backup job for backup
        2. 21.2.2 Performing backup
        3. 21.2.3 Performing restore
      3. 21.3 Parameters for best performance with ProtecTIER-CIFS
        1. 21.3.1 Disabling data de-duplication and compression
        2. 21.3.2 Setting data block size for backup to SAN or local storage
        3. 21.3.3 Setting Incremental backup mode
      4. 21.4 Advanced backup repository settings
        1. 21.4.1 Setting data blocks alignment
        2. 21.4.2 Setting data blocks decompression
      5. 21.5 Summary of parameters for best performance
    28. Part 4 Application considerations
    29. Chapter 22. Application considerations and data types
      1. 22.1 Lotus Domino
        1. 22.1.1 Common server
        2. 22.1.2 Existing backup and disk space usage
        3. 22.1.3 Domino attachments and object service
        4. 22.1.4 Applying the DAOS solution
        5. 22.1.5 ProtecTIER considerations
      2. 22.2 Microsoft Exchange
        1. 22.2.1 Defragmentation
        2. 22.2.2 Suggestions for Microsoft Exchange
        3. 22.2.3 Microsoft Exchange 2010
      3. 22.3 Microsoft SQL Server
        1. 22.3.1 Integrating the ProtecTIER server with Microsoft SQL Server backup
        2. 22.3.2 Index defragmentation
        3. 22.3.3 Suggestions for Microsoft SQL Server
        4. 22.3.4 LiteSpeed for SQL Server
      4. 22.4 DB2
        1. 22.4.1 Combining DB2 compression and ProtecTIER deduplication
        2. 22.4.2 Upgrading the DB2 database to improve deduplication
        3. 22.4.3 DB2 DEDUP_DEVICE setting
        4. 22.4.4 Example of DEDUP_DEVICE setting
        5. 22.4.5 Excluding logs from the DB2 database backup
        6. 22.4.6 DB2 suggested settings without DEDUP_DEVICE
      5. 22.5 Oracle
        1. 22.5.1 Suggested RMAN settings
        2. 22.5.2 Mounting NFS Oracle Server to ProtecTIER NAS
        3. 22.5.3 Using ProtecTIER NAS to run RMAN incremental merge backups
        4. 22.5.4 Using ProtecTIER NAS to store Oracle DataPump exports
        5. 22.5.5 Using ProtecTIER NAS to store Oracle database files and offline redo logs
        6. 22.5.6 Other suggestions for RMAN
      6. 22.6 SAP
        1. 22.6.1 SAP introduction
        2. 22.6.2 Data protection for SAP
        3. 22.6.3 Integration of Tivoli Storage Manager for ERP with SAP
        4. 22.6.4 Tivoli Storage Manager for ERP for Oracle database
        5. 22.6.5 Tivoli Storage Manager for ERP for DB2
        6. 22.6.6 SAP BR*Tools for Oracle using BACKINT
        7. 22.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager
        8. 22.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage Manager
        9. 22.6.9 Best practices for Tivoli Storage Manager for ERP with ProtecTIER
      7. 22.7 VMware
        1. 22.7.1 Technical overview
        2. 22.7.2 Settings and tuning for VMware and Tivoli Storage Manager
        3. 22.7.3 Backup solutions
        4. 22.7.5 Configuring the ProtecTIER server
        5. 22.7.8 Tivoli Storage Manager server configuration
        6. 22.7.9 Tivoli Storage Manager client installation
        7. 22.7.10 Disabling compression and deduplication on Tivoli Storage Manager
        8. 22.7.11 Configuring a full VM backup through the vStorage API
        9. 22.7.12 VMware Guest OS backup to ProtecTIER
    30. Part 5 Replication and disaster recovery
    31. Chapter 23. ProtecTIER replication
      1. 23.1 ProtecTIER IP replication
      2. 23.2 Native replication
        1. 23.2.1 One-to-one replication
        2. 23.2.2 Many-to-one replication
        3. 23.2.3 Many-to-many replication
        4. 23.2.4 VTL replication
        5. 23.2.5 OST replication
        6. 23.2.6 FSI replication
        7. 23.2.7 Replication grid
        8. 23.2.8 Replication topology group
      3. 23.3 Replication policies
      4. 23.4 Visibility switching
      5. 23.5 Principality
      6. 23.6 Replication Manager
      7. 23.7 Initial synchronization
      8. 23.8 Replication schedules
        1. 23.8.1 Continuous replication
        2. 23.8.2 Scheduled replication
        3. 23.8.3 Centralized Replication Schedule Management
        4. 23.8.4 Replication rate control
        5. 23.8.5 Setting replication rate limits
        6. 23.8.6 Limiting port bandwidth consumption
      9. 23.9 Replication backlog
        1. 23.9.1 SNMP alerts for replication backlog
      10. 23.10 Replication planning
        1. 23.10.1 Bandwidth sizing and requirements
        2. 23.10.2 Replication throughput barriers
        3. 23.10.3 Calculating the replication data transfer
        4. 23.10.4 Calculating replication bandwidth
        5. 23.10.5 Ports for replication in firewalled environments
      11. 23.11 Bandwidth validation utility
        1. 23.11.1 Using the bandwidth validation utility to test the data flow
        2. 23.11.2 Interpreting the results
        3. 23.11.3 Repository replacement
      12. 23.12 Planning ProtecTIER replication
        1. 23.12.1 Deployment planning scenario: many-to-many
        2. 23.12.2 Many-to-one replication
      13. 23.13 The backup application database backup
      14. 23.14 ProtecTIER Planner tool
    32. Chapter 24. Disaster recovery deployment with backup applications
      1. 24.1 Disaster recovery operations
      2. 24.2 ProtecTIER replication overview
      3. 24.3 Disaster recovery operations with VTL
        1. 24.3.1 Replication data transfer
        2. 24.3.2 Managing cartridges after replication
        3. 24.3.3 Cartridge replication requirements
        4. 24.3.4 Importing/exporting slots allocation in VTL
        5. 24.3.5 Import/export slots searching
        6. 24.3.6 Automation of daily operation
        7. 24.3.7 Gauging the replication completion status
      4. 24.4 Disaster recovery operations with FSI
        1. 24.4.1 Replication Destination Directory
        2. 24.4.2 ProtecTIER FSI cloning
        3. 24.4.3 Replication preferred practices for FSI
      5. 24.5 Entering ProtecTIER DR mode
        1. 24.5.1 Working at the disaster recovery site
        2. 24.5.2 Inventory command options for a VTL disaster recovery scenario
        3. 24.5.3 Commonly used disaster recovery queries
        4. 24.5.4 Returning to normal operations
      6. 24.6 The backup application catalog
        1. 24.6.1 ProtecTIER replication with Tivoli Storage Manager
        2. 24.6.2 Recovering the backup application catalog
        3. 24.6.3 Tivoli Storage Manager reclamation and housekeeping
      7. 24.7 Single domain and multiple domains
        1. 24.7.1 Single domain environment
        2. 24.7.2 Multiple domain environment
      8. 24.8 Replication preferred practices for OST
        1. 24.8.1 The OpenStorage operating environment
      9. 24.9 Deploying replication with specific backup applications
        1. 24.9.1 Recovery point objective
      10. 24.10 Tivoli Storage Manager
        1. 24.10.1 Scenario 1: Replication complete
        2. 24.10.2 Scenario 2: Replication incomplete
        3. 24.10.3 Scenario 3: Auditing tapes and fixing the Tivoli Storage Manager database
        4. 24.10.4 Reclamation considerations
        5. 24.10.5 Determining what is available for restoration at the DR site
      11. 24.11 Symantec NetBackup deployment with ProtecTIER replication
        1. 24.11.1 Scripting the inject/eject commands
        2. 24.11.2 Scripting the inventory commands
        3. 24.11.3 Setting up NetBackup for backup and restore
        4. 24.11.4 Setting up NetBackup for disaster recovery
        5. 24.11.5 Cross-site backups
        6. 24.11.6 ProtecTIER disaster recovery with Symantec NetBackup
        7. 24.11.7 Single domain versus two separate domains
        8. 24.11.8 Disaster recovery scenarios
        9. 24.11.9 Determining what is available for restore at the disaster recovery site
        10. 24.11.10 Eject and inject commands from NetBackup software
        11. 24.11.11 Disaster Recovery operations with OpenStorage
      12. 24.12 EMC NetWorker deployment with ProtecTIER replication
        1. 24.12.1 Cloning physical tapes with ProtecTIER replication
        2. 24.12.2 Disaster recovery with ProtecTIER replication
      13. 24.13 CommVault
        1. 24.13.1 Prerequisites
        2. 24.13.2 Running the CommVault backup operation
        3. 24.13.3 CommVault resources
    33. Appendix A. ProtecTIER parsers
      1. The ProtecTIER parser
    34. Appendix B. Entry-level and midrange disks
      1. General considerations
      2. The DS3000 series
    35. Appendix C. Networking
      1. Bonding on Linux and UNIX machines
      2. Teaming on Microsoft-based computers
      3. Link aggregation and similar technologies on the LAN switches
    36. Appendix D. Managing cartridge sizes with ProtecTIER
      1. Effects of dynamic cartridge sizes
      2. The mechanism behind fluctuating cartridge sizes
    37. Appendix E. Replacement from Generic to Gateway Model
      1. General Considerations
      2. Replacing from Generic to Gateway Model
    38. Glossary
    39. Related publications
      1. IBM Redbooks
      2. Other publications
      3. Online resources
      4. Help from IBM
    40. Back cover
    41. IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
      1. Introduction
      2. Business problem and business value
      3. Reference architecture use
      4. Requirements
      5. InfoSphere BigInsights predefined configuration
      6. InfoSphere BigInsights HBase predefined configuration
      7. Deployment considerations
      8. Customizing the predefined configurations
      9. Predefined configuration bill of materials
      10. References
      11. The team who wrote this paper
      12. Now you can become a published author, too!
      13. Stay connected to IBM Redbooks
    42. Notices
      1. Trademarks

    Product information

    • Title: IBM ProtecTIER Implementation and Best Practices Guide
    • Author(s):
    • Release date: August 2014
    • Publisher(s): IBM Redbooks
    • ISBN: None