IBM System Storage TS7650, TS7650G, and TS7610

Book description

This IBM® Redbooks® publication describes the IBM solution for data deduplication, the IBM System Storage® TS7650G ProtecTIER® Deduplication Gateway, and the IBM System Storage TS7650 ProtecTIER Deduplication Appliance. This solution consists of IBM System Storage ProtecTIER Enterprise Edition V2.3 software and the IBM System Storage TS7650G Deduplication Gateway (3958-DD1 and DD3) hardware, as well as the IBM System Storage TS7650 Deduplication Appliance (3958-AP1). They are designed to address the disk-based data protection needs of enterprise data centers.

We introduce data deduplication and IP replication and describe in detail the components that make up IBM System Storage TS7600 with ProtecTIER. We provide extensive planning and sizing guidance that enables you to determine your requirements and the correct configuration for your environment. We then guide you through the basic setup steps on the system and on the host, and describe all operational tasks that might be required during normal day-to-day operation or when upgrading the TS7650G and TS7650.

This publication is intended for system programmers, storage administrators, hardware and software planners, and other IT personnel involved in planning, implementing, and using the IBM deduplication solution, as well as anyone seeking detailed technical information about the IBM System Storage TS7600 with ProtecTIER.

Table of contents

  1. Notices
    1. Trademarks
  2. Preface
    1. The team who wrote this book
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  3. Summary of changes
    1. August 2011, Fourth Edition
    2. August 2010, Third Edition
    3. March 2010, Second Edition
  4. Part 1: Introduction and architecture
    1. Chapter 1: Concepts of data deduplication
      1. Data deduplication
      2. Types of data deduplication
        1. Hash-based data deduplication
        2. Content aware
        3. HyperFactor, deduplication, and bandwidth savings
      3. Data deduplication processing
        1. Inline method
        2. Post-processing method
      4. Components of a data deduplication system
        1. Server
        2. Data deduplication software
        3. Disk array
      5. Benefits of data deduplication
        1. Reduction of storage requirements
        2. Reduction of environmental costs
    2. Chapter 2: IBM System Storage ProtecTIER architecture
      1. General overview of ProtecTIER
        1. Types of ProtecTIER models
        2. ProtecTIER service modes
        3. ProtecTIER Manager
        4. ProtecTIER Replication Manager
      2. Terms and definitions
      3. TS7650G ProtecTIER Deduplication Gateway (1/2)
      4. TS7650G ProtecTIER Deduplication Gateway (2/2)
        1. TS7650G Gateway models
        2. TS7650G ProtecTIER Deduplication Gateway (3958-DD4)
        3. Disk array
        4. Deployment
      5. TS7650 ProtecTIER Deduplication Appliance
        1. TS7650 Deduplication Appliance
        2. TS7650 ProtecTIER Deduplication Appliance features
        3. Available models
        4. Deployment
      6. TS7610 ProtecTIER Deduplication SMB Appliance
        1. TS7610 hardware components
        2. Deployment
      7. ProtecTIER virtual tape library
        1. ProtecTIER VTL concepts
        2. Steady state
      8. ProtecTIER OpenStorage
      9. Data deduplication
        1. Virtual tape library concept
        2. HyperFactor
        3. ProtecTIER data ingest flow
      10. ProtecTIER native replication
        1. Replication licensing
        2. Hardware
        3. Replication grid
      11. ProtecTIER Manager
        1. Virtual libraries
        2. Virtual drives
        3. Virtual cartridges
      12. IBM TS3000 System Console
      13. Operating system
  5. Part 2: Planning for data deduplication and replication
    1. Chapter 3: Planning for deduplication and replication
      1. Planning for deduplication (1/2)
      2. Planning for deduplication (2/2)
        1. Sizing inputs
      3. APTARE overview (1/2)
      4. APTARE overview (2/2)
        1. APTARE StorageConsole Backup Manager
        2. APTARE architecture
        3. Managed backup environment security
        4. APTARE setup
        5. APTARE reports
      5. Throughput considerations (1/5)
      6. Throughput considerations (2/5)
      7. Throughput considerations (3/5)
      8. Throughput considerations (4/5)
      9. Throughput considerations (5/5)
        1. Attached host systems
        2. SAN connectivity
        3. Disk array
        4. Data type
        5. Local repository sizing
        6. Factoring ratio considerations
        7. Storage sizing
      10. Replication considerations (1/3)
      11. Replication considerations (2/3)
      12. Replication considerations (3/3)
        1. Supported replication configurations
        2. Virtual shelf
        3. Replication parallelism scheme
        4. Initial synchronization considerations
        5. Bandwidth sizing and requirements
        6. Network bandwidth sizing tips
        7. Bandwidth validation tool
        8. Repository sizing for replication with performance
      13. Planning for OpenStorage (1/2)
      14. Planning for OpenStorage (2/2)
        1. Replication for OST
        2. Deployment planning guidelines example
        3. Replication policy
      15. Choosing a replication mode of operation: Time frame versus continuous
        1. Operation
        2. Best practices for choosing the mode of operation
        3. Remote repository
      16. Tips for using the visibility switch control feature
      17. Planning for OST
      18. Planning for cartridges
        1. Capacity management in the traditional tape library paradigm
        2. ProtecTIER systems versus traditional tape libraries
        3. How the TS7600 with ProtecTIER manages changes in nominal capacity
        4. Managing capacity fluctuations
        5. Capacity management implications for the TS7650, TS7610, or TS7650G
        6. Capacity management implications: Initialization phase
        7. Management of IBM System Storage TS7600 with ProtecTIER
        8. Capacity management implications: Adding new data sets to an existing IBM System Storage TS7600 with ProtecTIER
        9. Space reclamation and steady state
        10. Summary of TS7600 with ProtecTIER capacity management
    2. Chapter 4: Hardware planning for IBM System Storage ProtecTIER
      1. General overview of the TS7610, TS7650, and TS7650G
      2. Hardware and software components for 3959-SM1, 3958-AP1, and 3958-DD4 (1/2)
      3. Hardware and software components for 3959-SM1, 3958-AP1, and 3958-DD4 (2/2)
        1. The 3958-SM1 server features
        2. 3959-SM1 server characteristics
        3. 3958-AP1 server features
        4. 3958-AP1 server characteristics
        5. 3958-DD4 server features
        6. 3958-DD4 server characteristics
        7. TS3000 System Console
      4. 3959-SM1, 3958-AP1, and 3958-DD4 feature codes (1/2)
      5. 3959-SM1, 3958-AP1, and 3958-DD4 feature codes (2/2)
        1. Features codes for 3959-SM1
        2. Features codes for 3958-AP1 server
        3. Feature codes for 3958-DD4 server
      6. IBM System Storage TS7600 with ProtecTIER software
        1. 5639-XXB ProtecTIER Enterprise Edition (EE) V2.5 Base Software
        2. 5639-XXP ProtecTIER Appliance Edition (AE) V2.5 Software
        3. ProtecTIER Manager V2.5 console software
      7. Feature codes for Red Hat Linux
        1. ProtecTIER Enterprise Edition V2.5
      8. 3958-DD4 server configuration options (1/3)
      9. 3958-DD4 server configuration options (2/3)
      10. 3958-DD4 server configuration options (3/3)
        1. Single node configuration
        2. Two-node cluster configuration
        3. Host attachment ports configuration for VTL and OST
      11. Usage considerations
        1. Virtual tape libraries and drives
        2. Fibre Channel ports and host assignment considerations
        3. Firewall environments: Ports assignments in ProtecTIER Replication Manager
      12. Installation planning (1/3)
      13. Installation planning (2/3)
      14. Installation planning (3/3)
        1. Installation worksheets
        2. Supported backup server operating environments
        3. Planning the ProtecTIER installation
        4. Installation tasks
        5. Host attachment considerations
        6. SAN configuration
  6. Part 3: Implementing and administering the IBM System Storage TS7650G and TS7650 servers
    1. Chapter 5: IBM System Storage TS7600 with ProtecTIER initial setup
      1. Enabling ProtecTIER SNMP support
        1. Defining the IP address
        2. IBM MIB definition file
        3. SNMP compatibility
      2. Installing ProtecTIER Manager (1/4)
      3. Installing ProtecTIER Manager (2/4)
      4. Installing ProtecTIER Manager (3/4)
      5. Installing ProtecTIER Manager (4/4)
        1. Prerequisites
        2. Installing on Windows
        3. Installing ProtecTIER Manager on Linux
      6. Getting started (1/2)
      7. Getting started (2/2)
        1. Adding nodes to ProtecTIER Manager
        2. Logging in and out
        3. TS7610 start message
        4. Saving and printing data
        5. Refreshing ProtecTIER Manager
        6. Renaming the system
      8. Initial setup for the TS7610 model (1/2)
      9. Initial setup for the TS7610 model (2/2)
        1. TS7610 configuration wizard setup
      10. Creating a ProtecTIER repository for TS7650G (1/5)
      11. Creating a ProtecTIER repository for TS7650G (2/5)
      12. Creating a ProtecTIER repository for TS7650G (3/5)
      13. Creating a ProtecTIER repository for TS7650G (4/5)
      14. Creating a ProtecTIER repository for TS7650G (5/5)
        1. Creating file systems
        2. fsCreate parameters
        3. Creating the repository
        4. Renaming the repository
        5. Deleting existing repository and file systems
      15. Setting up the virtual library and cartridges (1/2)
      16. Setting up the virtual library and cartridges (2/2)
        1. Creating libraries
      17. Working with OpenStorage using ProtecTIER (1/3)
      18. Working with OpenStorage using ProtecTIER (2/3)
      19. Working with OpenStorage using ProtecTIER (3/3)
        1. The OpenStorage operating environment
        2. Installing the ProtecTIER storage appliance
        3. Configuring ProtecTIER to work with the OpenStorage environment
        4. Configuring a storage server
        5. Modifying the storage server credentials
        6. Deleting a storage server
        7. Configuring a logical storage unit
        8. Adding an logical storage unit
        9. Modifying an logical storage unit configuration
        10. Managing the logical storage unit configuration
      20. Setting up native replication (1/5)
      21. Setting up native replication (2/5)
      22. Setting up native replication (3/5)
      23. Setting up native replication (4/5)
      24. Setting up native replication (5/5)
        1. Replication throughput control
        2. ProtecTIER Replication Manager
        3. Adding replication to an existing production system
        4. Planning for a new installation
        5. Activating the ProtecTIER Replication Manager
        6. Deactivating the ProtecTIER Replication Manager
        7. Adding the repository to the grid
        8. Setting up the replication policies
        9. Enabling and disabling a policy
        10. Running a policy
      25. Setup replication on OpenStorage systems
    2. Chapter 6: Host implementation for virtual tape libraries
      1. Connecting hosts to ProtecTIER systems (1/5)
      2. Connecting hosts to ProtecTIER systems (2/5)
      3. Connecting hosts to ProtecTIER systems (3/5)
      4. Connecting hosts to ProtecTIER systems (4/5)
      5. Connecting hosts to ProtecTIER systems (5/5)
        1. What bandwidth you need for ProtecTIER
        2. Multiple paths to tape drives
        3. Tape and disk on the same HBA
        4. SAN zoning
        5. LUN Masking for VTL systems
        6. Deduplication rate consideration
        7. Path failover
      6. Installing and configuring the device driver in OS (1/7)
      7. Installing and configuring the device driver in OS (2/7)
      8. Installing and configuring the device driver in OS (3/7)
      9. Installing and configuring the device driver in OS (4/7)
      10. Installing and configuring the device driver in OS (5/7)
      11. Installing and configuring the device driver in OS (6/7)
      12. Installing and configuring the device driver in OS (7/7)
        1. Getting device drivers
        2. Installing IBM tape device drivers for AIX
        3. Installing IBM tape device drivers for Windows 2003 and 2008
        4. Installing the IBM lin_tape driver for Red Hat Linux
        5. Open source device driver: lin_tape
      13. Setting up ProtecTIER on IBM i (1/3)
      14. Setting up ProtecTIER on IBM i (2/3)
      15. Setting up ProtecTIER on IBM i (3/3)
        1. Prerequisites and test environment
        2. Interoperability
        3. Connecting the ProtecTIER FC ports to IBM i Fibre Channel adapters
        4. Creating a VTL for IBM i
        5. Managing the virtual devices in IBM i
    3. Chapter 7: Backup and restore applications
      1. Considerations for all backup servers (1/2)
      2. Considerations for all backup servers (2/2)
        1. General considerations
        2. Additional factors
        3. Assessing cartridge status and synchronizing with the catalog
      3. IBM Tivoli Storage Manager (1/7)
      4. IBM Tivoli Storage Manager (2/7)
      5. IBM Tivoli Storage Manager (3/7)
      6. IBM Tivoli Storage Manager (4/7)
      7. IBM Tivoli Storage Manager (5/7)
      8. IBM Tivoli Storage Manager (6/7)
      9. IBM Tivoli Storage Manager (7/7)
        1. ProtecTIER IP replication in the Tivoli Storage Manager environment
        2. Implementing a virtual tape library
        3. The ProtecTIER virtual tape library definition
        4. Defining the virtual tape library to AIX with IBM Tivoli Storage Manager
        5. ProtecTIER and Tivoli Storage Manager attachment on Windows 2008
        6. Tivoli Storage Manager database replication status
        7. Reclamation considerations
        8. Summary
      10. Determining what is available for restore at the DR site (1/2)
      11. Determining what is available for restore at the DR site (2/2)
        1. Which database copy at the remote site is valid
        2. Determining which cartridges at the remote are valid for restore
        3. Configuration changes
        4. LAN-free backup to disk with ProtecTIER
        5. Moving data between real tape libraries and ProtecTIER systems
      12. Symantec NetBackup (1/2)
      13. Symantec NetBackup (2/2)
        1. Setting up NetBackup for backup and restore implementation
        2. Before you start
        3. Setting up NetBackup for disaster recovery
        4. Disaster recovery scenarios
        5. Determining what is available for restoration at the disaster recovery site
        6. NBU procedure to recover a master server from an existing DB copy
        7. Configuration changes
      14. EMC NetWorker
        1. EMC Legato NetWorker and ProtecTIER Replication in a LAN/WAN
        2. Implementation steps
        3. Replicating NetWorker database (bootstrap) backups
        4. Legato disaster recover procedures at the DR site
        5. Determining which cartridges at the remote site are valid for restore
      15. Backup, Recovery, and Media Services (1/2)
      16. Backup, Recovery, and Media Services (2/2)
        1. Advantages of ProtecTIER replication for an IBM i data center
        2. Setting up BRMS for backups to ProtecTIER
      17. Data types
        1. Oracle database data
    4. Chapter 8: IBM System Storage ProtecTIER native replication operation
      1. How replication works (1/2)
      2. How replication works (2/2)
        1. Replication features
        2. Typical deployment
        3. ProtecTIER native replication Management Interface
      3. Normal operation concepts
        1. Replication
        2. Replication data transfer
        3. Visibility switch control
        4. Single domain and multiple domain backup application environments
      4. Many to one replication (1/3)
      5. Many to one replication (2/3)
      6. Many to one replication (3/3)
        1. ProtecTIER with Virtual Tape Library
        2. ProtecTIER with OpenStorage
        3. Replication management
    5. Chapter 9: IBM System Storage ProtecTIER with Symantec OpenStorage
      1. OpenStorage setup
        1. OpenStorage elements
        2. The OpenStorage operating environment
        3. OpenStorage network configuration
      2. Configuring OpenStorage with ProtecTIER Manager (1/2)
      3. Configuring OpenStorage with ProtecTIER Manager (2/2)
        1. Configuring the storage server
        2. Configuring a logical storage unit
      4. The ProtecTIER OpenStorage plug-in (1/2)
      5. The ProtecTIER OpenStorage plug-in (2/2)
        1. Installing the OpenStorage plug-in on a NetBackup media server
        2. Configuring the OpenStorage plug-in on a NetBackup media server
      6. Configuring ProtecTIER OpenStorage on NetBackup (1/3)
      7. Configuring ProtecTIER OpenStorage on NetBackup (2/3)
      8. Configuring ProtecTIER OpenStorage on NetBackup (3/3)
      9. Replication settings for OpenStorage
        1. Working with application groups in OpenStorage
      10. Native replication with OpenStorage
      11. The replication grid
    6. Chapter 10: Managing IBM System Storage ProtecTIER systems
      1. Managing nodes in ProtecTIER Manager
        1. Adding a node and adding node subnetworks
        2. Removing a node from ProtecTIER Manager
      2. Managing repositories (1/3)
      3. Managing repositories (2/3)
      4. Managing repositories (3/3)
        1. Planning an expansion of the repository
        2. Expanding existing file systems
        3. Expanding the repository
        4. Deleting the repository
      5. Managing virtual libraries and cartridges (1/6)
      6. Managing virtual libraries and cartridges (2/6)
      7. Managing virtual libraries and cartridges (3/6)
      8. Managing virtual libraries and cartridges (4/6)
      9. Managing virtual libraries and cartridges (5/6)
      10. Managing virtual libraries and cartridges (6/6)
        1. Editing library parameters
        2. Reassigning devices
        3. Adding cartridges
        4. Deleting cartridges
        5. Switching cartridges to read-only mode
        6. Renaming libraries
        7. Deleting libraries
      11. Viewing the alerts and event log windows
        1. Access alerts
        2. Access events
        3. Grid Manager log
      12. Wizard error messages
      13. Generating a service report
        1. Creating a problem report in Systems Management
        2. Creating a problem report in Grids Management
      14. Adding and removing cluster members using the ProtecTIER Manager (1/3)
      15. Adding and removing cluster members using the ProtecTIER Manager (2/3)
      16. Adding and removing cluster members using the ProtecTIER Manager (3/3)
        1. Adding a cluster member
        2. Removing a cluster member
      17. Common maintenance tasks (1/6)
      18. Common maintenance tasks (2/6)
      19. Common maintenance tasks (3/6)
      20. Common maintenance tasks (4/6)
      21. Common maintenance tasks (5/6)
      22. Common maintenance tasks (6/6)
        1. Starting and stopping the server
        2. Rebooting a node
        3. Disabling defragmentation
        4. Disabling compression
        5. Changing the HyperFactor mode
        6. Modifying the trace buffer
        7. Resetting drives
        8. Resetting robot
        9. Unloading and moving cartridges
        10. Modifying port attributes
        11. Checking the system
        12. Cartridge metadata verification
        13. Cartridge integrity verification
      23. Exchanging tape cartridges using the shelf
      24. Replication bandwidth throttling
      25. Automation of daily operations
      26. Updating the ProtecTIER Manager
    7. Chapter 11: Native replication and disaster recovery
      1. Moving to ProtecTIER DR mode
      2. Failback for all data at the DR site (1/2)
      3. Failback for all data at the DR site (2/2)
        1. Splitting the failback according to priorities
        2. Creating a failback policy
      4. Recovery management
        1. Dirty bit attribute
        2. ProtecTIER command-line interface
      5. Disaster recovery with TS7650 OpenStorage and Symantec NetBackup (1/2)
      6. Disaster recovery with TS7650 OpenStorage and Symantec NetBackup (2/2)
        1. NetBackup background
        2. Disaster recovery scenarios
      7. Completing failback and leaving DR mode
      8. Principality
        1. Taking over principality
      9. Repository replacement
        1. Replacing a destroyed VTL repository
      10. Restoring the ProtecTIER Replication Manager
        1. Restoring from default backup
        2. Restoring from file
        3. Restoring from IP address
      11. Returning to normal operations
      12. Flushing the replication backlog after a long link outage/unavailability (1/3)
      13. Flushing the replication backlog after a long link outage/unavailability (2/3)
      14. Flushing the replication backlog after a long link outage/unavailability (3/3)
        1. Replication modes of operation: Visibility switch versus basic DR
        2. Use cases to demonstrate features of replication/DR operation
    8. Chapter 12: Monitoring and reporting of the IBM System Storage TS7600 with ProtecTIER
      1. ProtecTIER Manager user management
      2. Monitoring ProtecTIER (1/4)
      3. Monitoring ProtecTIER (2/4)
      4. Monitoring ProtecTIER (3/4)
      5. Monitoring ProtecTIER (4/4)
        1. The status line
        2. The Navigation pane
        3. The Systems window
        4. The Nodes window
        5. The Repository window
      6. Monitoring the ProtecTIER virtual tape libraries service (1/2)
      7. Monitoring the ProtecTIER virtual tape libraries service (2/2)
        1. The Library window
        2. The General tab
        3. The Drives tab
        4. The Cartridges tab
        5. The Slots tab
        6. The Import/Exports tab
        7. Monitoring the shelf
      8. Reporting on ProtecTIER activity (1/2)
      9. Reporting on ProtecTIER activity (2/2)
        1. The ANALYZE_SESSIONS utility
        2. Long-term statistical data report
      10. Monitoring replication policies and activities (1/3)
      11. Monitoring replication policies and activities (2/3)
      12. Monitoring replication policies and activities (3/3)
        1. Replication Policies window
        2. Replication Activities window
        3. Cartridge replication status information
        4. Cartridge verification after replication
        5. Replication long-term statistics
        6. Remote Cartridges report
      13. Network replication performance validation
        1. Interpreting the test results
      14. Managing and reporting TS7650 and TS7650G using the command-line interface (1/3)
      15. Managing and reporting TS7650 and TS7650G using the command-line interface (2/3)
      16. Managing and reporting TS7650 and TS7650G using the command-line interface (3/3)
        1. Command-line interface
  7. Part 4: Appendixes
    1. Appendix A: Installation and implementation checklists
      1. Customer installation responsibilities
      2. Customer information work sheet
      3. Customer network settings work sheets
      4. TSSC network IP scheme
      5. IP address worksheet
      6. Customer IP addresses
      7. Customer and replication IP addresses
      8. Host names and DNS settings
      9. Replication settings worksheet
    2. Appendix B: Western Telmatic Inc. Network Power Switch (1/2)
    3. Appendix B: Western Telmatic Inc. Network Power Switch (2/2)
  8. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  9. Index (1/4)
  10. Index (2/4)
  11. Index (3/4)
  12. Index (4/4)
  13. Back cover

Product information

  • Title: IBM System Storage TS7650, TS7650G, and TS7610
  • Author(s): Alex Osuna, Eva Balogh, Daesung Kim, Kai Lanzmich, Karen Orlando, Siew Chin Wong
  • Release date: August 2011
  • Publisher(s): IBM Redbooks
  • ISBN: 9780738435848