Book description
This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM System Storage® TS7600 ProtecTIER® family of products. This guide provides the current best practices for using ProtecTIER software version physical general availability (pGA) 3.3 and the revolutionary and patented IBM HyperFactor® deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation.
The System Storage TS7650G ProtecTIER Deduplication Gateway and
the System Storage TS7620 ProtecTIER Deduplication Appliance
Express are disk-based data storage systems that are configured for
three available interfaces:
The Virtual Tape Library (VTL) interface is the foundation of
ProtecTIER and emulates traditional automated tape
libraries.
The OpenStorage (OST) application programming interface (API)
can be integrated with Symantec NetBackup to provide backup-to-disk
without having to emulate traditional tape libraries.
The File System Interface (FSI) supports Common Internet File
System (CIFS) and Network File System (NFS) as backup
targets.
For your existing ProtecTIER solution, this guide provides
preferred practices and suggestions to boost the performance and
the effectiveness of the data deduplication with regards to your
application platforms for your VTL, OST, and FSI systems.
When you build a ProtecTIER data deduplication environment, this guide helps your IT architects and solution designers plan for the best options and scenarios for data deduplication for their environments. This guide helps you optimize your deduplication ratio, and at the same time reduce the hardware, power and cooling, and management costs.
This guide provides expertise that was gained from the IBM ProtecTIER Field Technical Sales Support (FTSS) group, development, and quality assurance (QA) teams.
Table of contents
- Front cover
- Notices
- Preface
- Part 1 General best practices
- Chapter 1. IBM ProtecTIER basics
-
Chapter 2. Deduplication considerations
- 2.1 HyperFactor data deduplication
- 2.2 ProtecTIER HyperFactor deduplication processing
- 2.3 Components of a ProtecTIER system
- 2.4 Benefits of ProtecTIER HyperFactor
-
2.5 General ProtecTIER deduplication considerations
- 2.5.1 Rethinking your overall backup strategy
- 2.5.2 Data reduction technologies should not be combined
- 2.5.3 Data streams must be in order
- 2.5.4 Data organization in your ProtecTIER repository
- 2.5.5 The dynamics of the ProtecTIER repository
- 2.5.6 ProtecTIER repository usage
- 2.5.7 Compression
- 2.5.8 Encryption
- 2.5.9 Database logs and other data types with high data change rates
- 2.5.10 Multiplexing
- 2.5.11 Tape block size
- 2.5.12 File size
- 2.6 Data types
- Chapter 3. Networking essentials
- Chapter 4. Virtual Tape Library guidelines
- Chapter 5. ProtecTIER File System Interface: General introduction
-
Chapter 6. OpenStorage guidelines
- 6.1 OpenStorage overview
-
6.2 Networking overview
- 6.2.1 Definitions and acronyms
- 6.2.2 Load distribution methodology
- 6.2.3 Bonding configuration
- 6.2.4 Broadcom NICs with Microsoft platforms
- 6.2.5 IBM AIX platforms
- 6.2.6 Solaris platforms
- 6.2.7 Configuring the network interfaces on the host media server
- 6.2.8 Configuring a ProtecTIER server to work with the OpenStorage environment
- 6.3 Performance optimization
- 6.4 NetBackup Storage Lifecycle Policies
- 6.5 Symantec OST functionality
- Chapter 7. Host attachment considerations for Virtual Tape Library
- Part 2 Back-end storage subsystems
- Chapter 8. Back-end storage overview
- Chapter 9. IBM FlashSystem with System Storage TS7650G ProtecTIER Deduplication Gateway
-
Chapter 10. IBM Storwize V3700 and V5000
- 10.1 V3700 and V5000 overview
- 10.2 General V3700 and V5000 considerations
-
10.3 Configuration steps
- 10.3.1 Creating empty user data and metadata storage pools
- 10.3.2 Creating the MDisk arrays or discovering unmanaged MDisks
- 10.3.3 Creating volumes with a sequential virtualization type
- 10.3.4 Creating a host connection for the ProtecTIER nodes by using the GUI
- 10.3.5 Mapping volumes to a host
- 10.3.6 Creating file systems and building the ProtecTIER repository
- 10.3.7 Expanding the repository
-
Chapter 11. IBM System Storage SAN Volume Controller, IBM Storwize V7000, and V7000 Unified Storage
- 11.1 Storage virtualization introduction
- 11.2 General notes
- 11.3 Firmware level
- 11.4 Fibre Channel connection topology
- 11.5 User data and metadata pool: General suggestions
-
11.6 Configuration steps
- 11.6.1 Creating empty user data and metadata storage pools
- 11.6.2 Creating the MDisk arrays or discovering unmanaged MDisks
- 11.6.3 Creating volumes with a sequential virtualization type
- 11.6.4 Creating a host connection for ProtecTIER nodes in Storwize V7000 GUI
- 11.6.5 Mapping volumes to a host
- 11.6.6 Creating file systems and building the ProtecTIER repository
- 11.6.7 Expanding the repository
- Chapter 12. IBM XIV Storage System
- Chapter 13. IBM System Storage DS8000
- Part 3 Backup management, VTL, OST, and FSI preferred practices
- Chapter 14. Backup management introduction
-
Chapter 15. IBM Tivoli Storage Manager
- 15.1 Tivoli Storage Manager VTL
-
15.2 Tivoli Storage Manager: Preferred options
- 15.2.1 LAN-free backups with the ProtecTIER product
- 15.2.2 Data streams
- 15.2.3 Reclamation
- 15.2.4 Collocation
- 15.2.5 Migration
- 15.2.6 Backing up your Tivoli Storage Manager database
- 15.2.7 Physical tape
- 15.2.8 Avoiding mount conflicts
- 15.2.9 Multiple streams from the client with the resourceutilization parameter
- 15.2.10 Accommodating increased sessions
- 15.2.11 Tivoli Storage Manager storage pool selection
- 15.2.12 Technical overview
- 15.2.13 Advantages of a Tivoli Storage Manager environment with ProtecTIER
- 15.2.14 Tivoli Storage Manager configuration with VTL
- 15.2.15 Updating to a VTL library type
- 15.2.16 Defining and deleting Tivoli Storage Manager libraries with many drives
- 15.3 Tivoli Storage Manager: FSI
- Chapter 16. Symantec NetBackup and BackupExec
-
Chapter 17. EMC NetWorker
- 17.1 Overview
- 17.2 EMC NetWorker in a VTL environment
-
17.3 EMC NetWorker in an FSI environment
- 17.3.1 Creating a Windows user for EMC NetWorker
- 17.3.2 Setting up for backup and restore
- 17.3.3 General configuration suggestions
- 17.3.4 Setting the information to be backed up
- 17.3.5 Setting the time for the backup
- 17.3.6 Performing a restore
- 17.3.7 Parameters for best performance with ProtecTIER FSI
- Chapter 18. HP Data Protector
-
Chapter 19. IBM i and Backup, Recovery, and Media Services
- 19.1 IBM i overview
- 19.2 Integration of IBM i and ProtecTIER in a VTL environment
- 19.3 Configuration of BRMS for ProtecTIER
- 19.4 Deploying ProtecTIER with BRMS for disaster recovery
- 19.5 Use DUPMEDBRM to duplicate media from ProtecTIER to physical media
- 19.6 Device configuration
- 19.7 BRMS movement of replicated volumes - considerations
- Chapter 20. CommVault
- Chapter 21. Veeam FSI-CIFS
- Part 4 Application considerations
-
Chapter 22. Application considerations and data types
- 22.1 Lotus Domino
- 22.2 Microsoft Exchange
- 22.3 Microsoft SQL Server
- 22.4 DB2
-
22.5 Oracle
- 22.5.1 Suggested RMAN settings
- 22.5.2 Mounting NFS Oracle Server to ProtecTIER NAS
- 22.5.3 Using ProtecTIER NAS to run RMAN incremental merge backups
- 22.5.4 Using ProtecTIER NAS to store Oracle DataPump exports
- 22.5.5 Using ProtecTIER NAS to store Oracle database files and offline redo logs
- 22.5.6 Other suggestions for RMAN
-
22.6 SAP
- 22.6.1 SAP introduction
- 22.6.2 Data protection for SAP
- 22.6.3 Integration of Tivoli Storage Manager for ERP with SAP
- 22.6.4 Tivoli Storage Manager for ERP for Oracle database
- 22.6.5 Tivoli Storage Manager for ERP for DB2
- 22.6.6 SAP BR*Tools for Oracle using BACKINT
- 22.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager
- 22.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage Manager
- 22.6.9 Best practices for Tivoli Storage Manager for ERP with ProtecTIER
-
22.7 VMware
- 22.7.1 Technical overview
- 22.7.2 Settings and tuning for VMware and Tivoli Storage Manager
- 22.7.3 Backup solutions
- 22.7.5 Configuring the ProtecTIER server
- 22.7.8 Tivoli Storage Manager server configuration
- 22.7.9 Tivoli Storage Manager client installation
- 22.7.10 Disabling compression and deduplication on Tivoli Storage Manager
- 22.7.11 Configuring a full VM backup through the vStorage API
- 22.7.12 VMware Guest OS backup to ProtecTIER
- Part 5 Replication and disaster recovery
-
Chapter 23. ProtecTIER replication
- 23.1 ProtecTIER IP replication
- 23.2 Native replication
- 23.3 Replication policies
- 23.4 Visibility switching
- 23.5 Principality
- 23.6 Replication Manager
- 23.7 Initial synchronization
- 23.8 Replication schedules
- 23.9 Replication backlog
- 23.10 Replication planning
- 23.11 Bandwidth validation utility
- 23.12 Planning ProtecTIER replication
- 23.13 The backup application database backup
- 23.14 ProtecTIER Planner tool
-
Chapter 24. Disaster recovery deployment with backup applications
- 24.1 Disaster recovery operations
- 24.2 ProtecTIER replication overview
- 24.3 Disaster recovery operations with VTL
- 24.4 Disaster recovery operations with FSI
- 24.5 Entering ProtecTIER DR mode
- 24.6 The backup application catalog
- 24.7 Single domain and multiple domains
- 24.8 Replication preferred practices for OST
- 24.9 Deploying replication with specific backup applications
- 24.10 Tivoli Storage Manager
-
24.11 Symantec NetBackup deployment with ProtecTIER replication
- 24.11.1 Scripting the inject/eject commands
- 24.11.2 Scripting the inventory commands
- 24.11.3 Setting up NetBackup for backup and restore
- 24.11.4 Setting up NetBackup for disaster recovery
- 24.11.5 Cross-site backups
- 24.11.6 ProtecTIER disaster recovery with Symantec NetBackup
- 24.11.7 Single domain versus two separate domains
- 24.11.8 Disaster recovery scenarios
- 24.11.9 Determining what is available for restore at the disaster recovery site
- 24.11.10 Eject and inject commands from NetBackup software
- 24.11.11 Disaster Recovery operations with OpenStorage
- 24.12 EMC NetWorker deployment with ProtecTIER replication
- 24.13 CommVault
- Appendix A. ProtecTIER parsers
- Appendix B. Entry-level and midrange disks
- Appendix C. Networking
- Appendix D. Managing cartridge sizes with ProtecTIER
- Appendix E. Replacement from Generic to Gateway Model
- Glossary
- Related publications
- Back cover
-
IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
- Introduction
- Business problem and business value
- Reference architecture use
- Requirements
- InfoSphere BigInsights predefined configuration
- InfoSphere BigInsights HBase predefined configuration
- Deployment considerations
- Customizing the predefined configurations
- Predefined configuration bill of materials
- References
- The team who wrote this paper
- Now you can become a published author, too!
- Stay connected to IBM Redbooks
- Notices
Product information
- Title: IBM ProtecTIER Implementation and Best Practices Guide
- Author(s):
- Release date: August 2014
- Publisher(s): IBM Redbooks
- ISBN: None
You might also like
book
IBM ProtecTIER Implementation and Best Practices Guide
This IBM® Redbooks® publication provides best practice guidance for planning, installing, and configuring the IBM TS7600 …
book
IBM ProtecTIER Implementation and Best Practices Guide
This IBM® Redbooks® publication provides best practice guidance for planning, installing, configuring, and employing the IBM …
book
IBM i and IBM Storwize Family: A Practical Guide to Usage Scenarios
The use of external storage and the benefits of virtualization became a topic of discussion in …
book
IBM TS4500 R8 Tape Library Guide
The IBM® TS4500 (TS4500) tape library is a next-generation tape solution that offers higher storage density …