Académique Documents
Professionnel Documents
Culture Documents
3 Technical Overview
Speaker: Tricia Jiang
10-18-2011
TDP for Domino TDP Client Scalability Improvement - eliminate memory constraints caused by in memory lists for large numbers of objects TDP Domino - Indicate whether a backup was encrypted, compressed, LAN-free or De-duped TDP for Domino - Reversion to V6 TDP for Domino - Implement Inventory Tagging as required by SWG TDP for Domino - upgrade install programs to use InstallAnywhere 2010 / InstallShield 2010 TDP Domino & Oracle - UTF-8 message catalog support TDP for Domino - communication failure enhancement TDP for Domino - UTF-8 message catalog support
TDP for SAP DP for SAP - Add support for RMAN incremental backups of Oracle
TDP for ERP TSM for ERP Implement SWG Inventory Tagging
Facilitate access to new technology protecting customer investment in FICON attached tape
New FICON TAPE technology can be part of TSM storage hierarchy
In addition to accessing z/OS 5.5 tape inventory from 6.3 server ( AIX or zLinux )
Leverage z/OS Tape Management System for SCRATCH tape selection Benefit from automated offsite tape management ( e.g., Iron Mountain ) Exploit DFSMS for sequential FILE storage ( upto 16 TB volume size ) Dynamic allocation eliminates JCL for FILE volume allocation (TSM 5.5 used physical sequential data sets) Transparent performance benefit of VSAM striping
TSM client
DB2 database
The TSM V5 z/OS server performs a cross platform upgrade which effectively migrates their DB to TSM 6.3 on AIX or zLinux. Then they install a new PID TSM for z/OS Media on z/OS. 6
TSM for z/OS media server Receives/sends data from/to TSM v6 server Performs I/O to tape and/or sequential disk Supports same storage devices as z/OS server, including non-IBM hardware Interacts with z/OS DFSMS and TMS exactly as TSM z/OS server
3592, 3590, ECARTRIDGE (legacy z/OS lan-free), CARTRIDGE (legacy VTS) Same as z/OS TSM 5.5 devclass
Enhanced FILE device class
Adjustable MAXCAP Format/Write via Media Manager to VSAM linear data sets (format not required) Allocation parameters
Node Replication
Site A
Database TSM Server A
DB2 Node C Node B Node A
Site B
TSM Server B Database
DB2
Storage Hierarchy
Storage Hierarchy
Provides the ability to incrementally replicate a nodes data to a remote target server for disaster recovery purposes
True incremental replicationOnly replicates directories and files that do not exist on target server Deletes data on target server that has been deleted on the source server Can recover client data directly from hot standby server Can use with or without deduplication Can have multiple servers replicate to one server
Remote vaulting without manual tape transfer Efficient use of bandwidth through deduplicated replication Allows hot standby at remote site
8
Node Replication
Source TSM Server Target TSM Server
Set target server as default target for replication Enable nodes to replicate and modify default and filespace replication rules if needed
4
At proper time, preview and initiate replication for desired nodes and data (REPLICATE NODE)
Node Replication
TSM server replicates data & metadata for specified nodes to another server
Can select which nodes replicate Can select what type of data (backup, archive, HSM, active) Can set priority for nodes, and filespaces Can currently only restore data from target, can not use target as failover backup location (unless use remove replnode command)
Node Replication
Deduplication
If source has dedupe enabled but target does not
Data is reconstructed before being sent Only the chunks not already on the destination server will be sent Only the chunks of data that are not stored already in the destination pool are transferred
If target has dedupe enabled but source does not If both source and target have dedup enabled
Expiration
Files bound to same mgmt class, if exists, on target server, otherwise to target servers default mgmtclass Source server manages file expiration and deletion for the replicated files on the target server
Flexible Implementation
Many-to-1 transfer to target server (can only have one target server) Can have server A and server B protect each other If import/export data exists, can utilize forcesync
Admin Console or Command line configuration / monitoring Scheduled or manual node replication
Single process is started for replication High priority data is replicated before data with normal priority Only one replicate node process at a time
11
6 replication rules:
4 general use (ALL_DATA, ACTIVE_DATA, ALL_DATA_HIGH_PRIORTY, ACTIVE_DATA_HIGH_PRIORITY)
Default follow the replication rule hierarchy until a non-Default rule is specified None replication not performed, no data replicated
Attributes of the rule tell the process how to process the file
Priority (High or Normal) Replicate active-data only? State (enabled or disabled)
12
13
SSL ensures that data cannot be captured in-flight SSL security overhead means lower throughput standard trade-off Source & Target servers can be configured to use SSL
Target servers cert must reside in source servers key db Source servers cert must reside in target servers key db Must use SSLTCPPORT / SSLTCPADMINPORT in option files Define Servers with SSL=YES parameter Import certificate in both directions with gsk8capicmd_64 Restart servers
14
Demo time
15
Before
After
16
16
If #drives available = > numstreams, backup uses requested # of streams If #drives available < numstreams, backup uses the available drives dbbackup will preempt some other operations
Restore
If #drives =numstreams used for the backup, then that # of streams are used If #drives < numstreams used, then restore is done using the available # of drives Restore process never uses more drives than the # streams used by the backup If full and incremental used different numstreams, restore will use smaller #
17
Demo time
18
Installation install, configure and use reporting and monitoring within 2 hours
An aggregated view of reporting and monitoring for the entire TSM environment
Automated post-installation configuration Additional out of the box' reports Integrated Cognos reporting engine providing better creation of 'custom reports' capabilities
Create custom report in 30 mins or less
Ability to build custom data collection agents with the newest IBM Tivoli Monitoring end-user license More TSM data-collection agent performance features TSM activity log custom-data collection in the TSM data-collection agent Ability to email reports
Storage Manager 6 Storage Manager 6 Storage Manager 6 Storage Manager 6
19
IBM Cognos Business Intelligence 8.4 query studio and report studio
Cognos is a chargeable component, but is included with TSM TSM license allows reporting on multiple Tivoli products (TPC in the works)
Ad-Hoc reports available (using Cognos) Customization simple (using Cognos) Additional formats: XML, Excel, CSV TCR customizes schedules to generate, store and send out reports
20
22
TSM Monitoring
Tivoli Monitoring Agent is the Data collection agent
Small java agent recommended to be installed on TSM server Can monitor 100s of servers, but run data collections at different times Could be installed just on reporting server, but could only monitor a few TSM servers New data collected: actlog, occupancy, PVU, replication, library, drives, trace log Tivoli Enterprise Portal makes data viewable realtime (monitoring dashboard)
Collects activity log entries based on Message type and Message code Can use data for monitoring or for historical db
Operational reporting
All functions were implemented in the TSM monitoring functions The queries are out there for TSM 6.3, but not packaged with TSM
23
Simulated backup and restore Helps with tuning TSM for products for optimal throughput
24
24
Demo time
25
AIX
new
Solaris HP Linux
Client updates
Storage Manager 6
Mac
26
26
(Coming soon)
Solaris 11 coming soon Client platforms must support TSM client API version 6.2.0.0 Not all platforms support client upgrade to the latest (6.3.0.0). For example, We will not have support for Mac OS X 10.5 or XP in 6.3
28
29
Demo time
30
Information on # of client and server devices managed by the TSM server Information on utilization of processor value units by server devices Useful when assessing licensing requirements for the TSM system
31
31
32
On one tape:
10.000 files
140 minutes 11 minutes (2.3 hrs) 816 minutes 170.000 min (13.6 hrs) (118 days) *
500.000 files
On two tapes:
10.000 files
33
34
Better assumptions made & unnecessary SCSI validations skipped 300-500 maximum drives
Depending on OS, 256-1024 drives may run into OS limitations
Cannot have mixed media: drives with different device types or device generations within the same library (e.g. LTO2 and LTO3) Requires online path defined for servers & storage agents to all drives in the library
If paths are missing or offline, mount performance degrade to SCSI library type performance levels
Shares the same code as the installation wizard Customer can choose locale to display info in
36
37
TSM Storage Agent - Gskit 8.0.14.11 TSM Admin Center Installer Components
TIP 2.1 + fix pack 2.1.0.5 Ewas, ISC, TIPCore
Supports IE8, FF3.5 and FF3.6 Skin update visual change of what is displayed Newer version of Dojo that produces a faster UI Java 1.6
TCR 2.1: ifix 3 & ifix 5 Birt Reports TSM admin center TSM client performance
38
39
Communication Functions
SSL Library Certificate Utilities
Install
GSKIT 8 is installed; GSKIT 7 remains on the system, must manually remove DB2 user profile is updated to point to new system GSKIT
40
GSKIT
DB2 9.7 (in TSM 6.2/6.3) has a private/standard version of GSKIT 8.0.13.3
TSM 6.3 ships with GSKIT 8.0.14.11
These two version are not compatible for certain functions When a DB2 user logons on, db2profile script sets up the DB2 environment Script calls userprofile script to set environment variable LD LIBRARY PATH
This favors the system GSKIT over the DB2 private version
Soon a DB2 fix pack will provide an 8.0.14.x version of GSKIT, which will be compatible
41
Listed in the tables of the TSM Wiki link Identifies as specifically as possible the installed product or component that has its own service stream Two types of inventory tags:
1. Product level tags: identifies an IBM software product 2. Component level tags: identifies a significant component of a product which has a separately installable part:
TSM Server, TSM Client, TSM Storage Agent Many TSM "products" won't have a product tag as they dont have a unique installation part for the product TSM Server component tag:
Tag File Name: Tivoli_Storage_Manager_Server.cmptagTag Type: Component Tag Tag File Location: > AIX: /opt/tivoli/tsm/server/properties/version > Solaris: /opt/tivoli/tsm/server/properties/version > HP: /opt/tivoli/tsm/server/properties/version > Linux: /opt/tivoli/tsm/server/properties/version > Windows: C:\Program Files\Tivoli\TSM\server\properties\version Tag File Contents: > <Component> > <ComponentName>Tivoli Storage Manager Server</ComponentName> > <ComponentVersion>6.3.0</ComponentVersion> > <SWGFMIDX>to_be_requested</SWGFMIDX> > </Component>
42
Persistent Reserve
Newer SCSI/Fiber/SAS tape drives allows a host or set of hosts to protect against multiple accesses to a drive
Finer grained recovery than older drives reserve/release support
43
TSM Configuration Wizard launches the wizard to configure the TSM B/A client to backup data in a cluster environment
44
44
Linux vs AIX*
Similarities
46
For example:
[JournaledFileSystems.Extended]
/fs1 /fs2
Existing JournaledFileSystems setting still supported The older setting ignored if the newer JournaledFileSystems.Extended setting is specified
47
48
49
Tool that moves the stub with out recall and updates the path in the stub and the TSM data object
DSMMOVE.EXE
Tool to copy the TSM data objects from one server to the other and updates the path in the stub and the TSM data object
HSM Tasks Service
50
51
Space Management on Unix Multiple Server support on GPFS What does multiple server support do?
Enables HSM to migrate files to multiple TSM servers, increasing scalability and performance Server distribution works automatically via GPFS policies Transparent recall from multiple servers is possible Backup is integrated into server distribution GPFS
Migration / Recall / Reconciliation
Previously:
Limited to handle one TSM Server for each single file system Limited to handle 1 billion files per TSM Server instance
In GPFS v3.3 the number of object in a single file system limited to 4 billion Single GPFS v3.4 or later can migrate to 2 or more TSM servers As FS exceeds capacity of TSM servers, can add more servers Essential part of high scaling archiving solutions like SoNAS and IIA in conjunction with GPFS Function coded in TSM 6.2 for SONAS, made external in TSM 6.3
52
53
Adding a TSM server For each additional server: dsmmigfs addmultiserver -server=server_name file_system_name
Adds the server name and server specific paramaters to a internal server list dsmmigfs querymultiserver file_system_name used to query the content of the server list
Automatically generated GPFS policy dsmmigfs addmultiserver command generates a GPFS policy which can be used for GPFS driven threshold migration For each added server a new rule is genrated in the policy file under /<FSname>/.SpaceMan/ multiserver/ruleset/BasicRuleSet To activate GPFS driven threshold migration with multiple servers:
mmchpolicy Device /<FSname>/.SpaceMan/multiserver/ruleset/BasicRuleSet If GPFS policy already in place, must merge actual policy file with the generated HSM policy file
54
Recall from multiple servers: Rrecall daemon gets the server from a EA stored with the file. dsmrecall -SErver = <servername> command can be used for selective recalls of files Reconciliation from multiple servers: Reconciliation uses two way orphan check reconciliation in script dsmreconcileGPFS.pl For full reconciliation of the fs, script must be started against all TSM servers in the environment Backup: dsmc incr/sel server=<servername> (If no server name is specified the default server used) The first backup of a file will couple the file to the specified TSM server Restore: dsmc rest server=<servername> To find right server for the restore use command dsmc query backup <fileName To restore whole directory structures use a script to restore from all servers
55
Sample Results
07/06/2011 20:59:18 File system statistics node: PIRATES pid: 9444 file system: /gpfs1 state: active migrated bytes: 29360128 premigrated bytes: 24721408 migrated files: 28 premigrated files: 285 unused inodes: 1901634 free bytes: 1996578095104 07/06/2011 21:00:55 File selective migrate begin node: PIRATES pid: 11040 file: /gpfs1/dsn1 handle: 099B34284D593EB1-000000000004B403-0000000000000000-0001000200000000 07/06/2011 21:00:55 File migration end node: PIRATES pid: 11040 file: /gpfs1/dsn1 handle: 099B34284D593EB1-000000000004B403-0000000000000000-0001000200000000 extobjid: 0101020C00000000-9B0928340266606F-01939077F352BF20-866064A4 result: 0 bytes: 1048576 state: migrated 07/06/11 21:04:06 File transparent recall begin node: PIRATES pid: 14115 handle: 099B34284D593EB1-000000000004B408-0000000000000000-0001000200000000 extobjid: 0101020C00000000-9B0928340E66606F-037F863124302D98-43C22CA4 07/06/11 21:04:06 File transparent recall end node: PIRATES pid: 14115 handle: 099B34284D593EB1-000000000004B408-0000000000000000-0001000200000000 bytes: 1048576 56
Thank You
Disclaimers
Product data has been reviewed for accuracy as of the date of initial publication. Product data is subject to change without notice. This information could include technical inaccuracies or typographical errors. IBM may make improvements and/or changes in the product(s) and/or program(s) at any time without notice. Any statements regarding IBM's future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. The performance data contained herein was obtained in a controlled, isolated environment. Actual results that may be obtained in other operating environments may vary significantly. While IBM has reviewed each item for accuracy in a specific situation, there is no guarantee that the same or similar results will be obtained elsewhere. Customer experiences described herein are based upon information and opinions provided by the customer. The same results may not be obtained by every user. Reference in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Any reference to an IBM Program Product in this document is not intended to state or imply that only that program product may be used. Any functionally equivalent program, that does not infringe IBM's intellectual property rights, may be used instead. It is the user's responsibility to evaluate and verify the operation on any non-IBM product, program or service. THE INFORMATION PROVIDED IN THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IBM EXPRESSLY DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR INFRINGEMENT. IBM shall have no responsibility to update this information. IBM products are warranted according to the terms and conditions of the agreements (e.g. IBM Customer Agreement, Statement of Limited Warranty, International Program License Agreement, etc.) under which they are provided. IBM is not responsible for the performance or interoperability of any non-IBM products discussed herein. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. The providing of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents or copyrights. Inquiries regarding patent or copyright licenses should be made, in writing, to:
IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 USA
58
Trademarks
The following terms are trademarks or registered trademarks of the IBM Corporation in either the United States, other countries or both. AIX AIX 5L BladeCenter Chipkill DB2 DB2 Universal Database DFSMSdss DFSMShsm DFSMSrmm Domino e-business logo Enterprise Storage Server ESCON eServer FICON FlashCopy GDPS Geographically Dispersed Parallel Sysplex HiperSockets i5/OS IBM IBM eServer IBM logo iSeries Lotus ON (button device) On demand business OnForever OpenPower OS/390 OS/400 Parallel Sysplex POWER POWER5 Predictive Failure Analysis pSeries S/390 Seascape ServerProven System z9 System p5 System Storage Tivoli TotalStorage TotalStorage Proven TPF Virtualization Engine X-Architecture xSeries z/OS z/VM zSeries
Linear Tape-Open, LTO, LTO Logo, Ultrium logo, Ultrium 2 Logo and Ultrium 3 logo are trademarks in the United States and other countries of Certance, HewlettPackard, and IBM. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States and/or other countries. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. Intel, Intel Inside (logos), MMX and Pentium are trademarks of Intel Corporation in the United States and/or other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is a trademark of Linus Torvalds in the United States and other countries. Other company, product, or service names may be trademarks or service marks of others.
59