background image

Accessibility

The publications for this product are in Adobe Portable Document Format (PDF)
and should be compliant with accessibility standards.

If you experience difficulties when you use the PDF files and want to request a
Web-based format for a publication, send your request to the following address:

International Business Machines Corporation
Information Development
Department GZW
9000 South Rita Road
Tucson, Arizona 85744-001 U.S.A

In the request, be sure to include the publication number and title. When you send
information to IBM, you grant IBM a nonexclusive right to use or distribute the
information in any way it believes appropriate without incurring any obligation to
you.

© Copyright IBM Corp. 2012, 2016

213

Summary of Contents for TS7650G PROTECTIER DEDUPLICATION GATEWAY

Page 1: ...IBM TS7650G Deduplication Gateway for ProtecTIER V3 4 1 User s Guide for FSI Systems GA32 2235 08 IBM ...

Page 2: ...es sections of this publication Edition notices This edition applies to IBM TS7650G Deduplication Gateway for ProtecTIER and to all subsequent releases and modifications until otherwise indicated in new editions Copyright IBM Corporation 2012 2016 US Government Users Restricted Rights Use duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp ...

Page 3: ...d with ProtecTIER Manager 33 Running the ProtecTIER Manager 33 Managing users 33 Adding user accounts 33 Changing the user account password 34 Changing the Support System settings 35 Saving and printing data 35 Refreshing ProtecTIER Manager 35 Running operations in the background 36 Chapter 6 Managing nodes 37 Adding and removing nodes from ProtecTIER Manager 37 Adding nodes 37 Adding node subnetw...

Page 4: ...rate limit 116 Limiting the network interface bandwidth 118 Restoring backup data from a policy replication directory 119 Taking ownership of a replication destination directory 120 Cloning an FSI replication directory 120 Controlling replication traffic in FSI 121 Suspending replication activity 121 Blocking replication activity 122 Stopping activities running in FSI 122 Chapter 14 Monitoring Pro...

Page 5: ...odes 201 Accessibility 213 Notices 215 Trademarks 216 Electronic emission notices 217 Federal Communications Commission statement 217 Industry Canada compliance statement 218 European Union Electromagnetic Compatibility Directive 218 Australia and New Zealand Class A Statement 218 Germany Electromagnetic compatibility directive 218 People s Republic of China Class A Electronic Emission statement 2...

Page 6: ...vi IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 7: ...4 Nominal data size graph 129 25 HyperFactor ratio over time graph 130 26 Utilization graph 130 27 Backup read graph 131 28 Marginal HyperFactor ratio graph 131 29 Backup write graph 131 30 Incoming replication graph 132 31 Outgoing replication graph 133 32 Backlog replication graph 133 33 Activities view in FSI 134 34 Additional activities information in FSI 135 35 SNMP trap report 148 36 Registr...

Page 8: ...viii IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 9: ...2 21 ListSharedPaths command 63 22 RemoveSharedPath command 63 23 CreateExportPath command 63 24 ModifyExportPath command 64 25 ListExportPaths command 65 26 RemoveExportPath command 66 27 CreateFsiPolicy command 66 28 ReplicationStatistics command 67 29 ReplicationStatistics output parameters 67 30 CloneDirectory command 68 31 Bonding methods supported by the ProtecTIER server 73 32 Combined repl...

Page 10: ...x IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 11: ...ountry for connection by any means whatsoever to interfaces of public telecommunications networks Further certification may be required by law prior to making any such connection Contact an IBM representative or reseller if you have any questions Copyright IBM Corp 2012 2016 xi ...

Page 12: ...xii IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 13: ...assis has space for two controller nodes in the rear which accommodates a cluster configuration in a 2u platform and eliminates the external cluster connection kit In the front the 3958 DD6 contains 24 SAS drive slots only 2 of which actually contain SAS drives The 3958 DD6 also includes edundant power supplies in the rear of the unit 3958 DD5 This server which first shipped in May 2012 is based o...

Page 14: ... default replication grid A set of repositories that share a common ID and can potentially transmit and receive logical objects through replication A replication grid defines a set of ProtecTIER repositories and actions between them It is configured by using the ProtecTIER Replication Manager The ProtecTIER Replication Manager is a software component installed on a ProtecTIER server or a dedicated...

Page 15: ...idge must be ejected to the shelf from the destination library The cartridge will then disappear from the destination library and reappear at the source I E slot ACL Access Control List A list of permissions attached to an object file directory etc An ACL specifies which users are allowed to access an object and which operations are allowed on the object AD Windows Active Directory Windows based s...

Page 16: ...IFS share Getting information help and service IBM provides several options for obtaining help service and information about the TS7600 ProtecTIER Deduplication Solutions V3 4 1 If you need help service technical assistance or want more information about IBM products a wide variety of IBM sources are available to assist you Available services telephone numbers and Web links are subject to change w...

Page 17: ...u can use the Browse for a product link 1 Click Browse for a product 2 Expand System Storage 3 Expand Tape systems 4 Expand Tape virtualization The page shows a list of products 5 Select your product from the list The product you select appears below the Search field in the Search supports and downloads section Help and service When you call for service you must provide certain identifying informa...

Page 18: ...tions Ordering System at the following Web site www elink ibmlink ibm com publications servlet pbi wss v Access the IBM System Storage ProtecTIER TS7650 Customer Information Center at http publib boulder ibm com infocenter ts7650 cust index jsp v Access installation and technical support information via the Web at www ibm com support v The IBM Web site for Independent Software Vendor ISV support i...

Page 19: ...se updates are available from the IBM Web site Complete the following steps to check for updated documentation and technical updates 1 In a Web browser navigate to http www ibm com support publications us library 2 Click Information Centers Systems xSeries 3 Click Product information Servers xSeries 4 From the Product family list select System x3850 5 From the Type list select System 7141 6 Click ...

Page 20: ...Mail Download complete and return this Readers Comment Form xx IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 21: ...scribes the steps for completing the ProtecTIER system setup for new installations and upgrading ProtecTIER servers In addition this part describes how to install and configure the ProtecTIER Manager software and how to manage repositories Copyright IBM Corp 2012 2016 1 ...

Page 22: ...2 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 23: ...ckup performance of the virtual tape engine v Data integrity is not compromised not even statistically v Merged data is stored in a format that preserves restore performance HyperFactor saves space by taking advantage of the fact that only a small percentage of data actually changes from backup to backup Incremental backups include all files with modification dates that have changed since the last...

Page 24: ... clusters in your ProtecTIER system along with the accompanying repositories and services ProtecTIER Manager is used to initially configure your ProtecTIER system and to change the configuration Configuration This topic provides an overview of ProtecTIER system configuration ProtecTIER systems can be set up with either one node or two nodes arranged in a cluster Each cluster operates independently...

Page 25: ...the following figure A two node system uses two servers in an active active cluster and enables you to build a more sophisticated system as illustrated in the following figure Backup Servers Disk Arrays ts760432 Storage Fabric Storage Fabric ProtecTIER Server Node 1 Figure 2 One node system Chapter 1 Introduction 5 ...

Page 26: ...o servers can share the backup load and increase the performance of ProtecTIER The following diagram illustrates the details of the ProtecTIER cluster setup Backup Servers Storage Fabric ProtecTIER Server Node 1 Disk Arrays ts760433 ProtecTIER Server Node 2 Storage Fabric Cluster Internal Network Switch 1 Cluster Internal Network Switch 2 Figure 3 Two node system 6 IBM TS7650G Deduplication Gatewa...

Page 27: ... before storing it only the changes are transferred to the remote site You define the rules for replicating data objects in replication policies on a repository A replication grid is a logical set of repositories that can replicate from one to the other The ProtecTIER Replication Manager is a server that remotely manages the configuration of the grid for example grid creation or deletion repositor...

Page 28: ...tion repository can then act as a Disaster Recovery site for any number of the source repositories and still allow local backups as well as replication from the active source repositories In a many to many topology you create replication groups where multiple repositories can replicate to each other You can define a many to many replication group where each repository assumes the responsibility of...

Page 29: ...e used interchangeably depending upon the task being performed Accessing the ProtecTIER Service menu Complete this task to access the ProtecTIER Service menu Procedure 1 If you are in a single node configuration connect the USB keyboard and graphics capable monitor to the server 2 Verify that the server is running 3 At the localhost Login prompt type ptconfig and press Enter 4 At the Password prom...

Page 30: ...gle Node code upgrade 14 OS images Management 15 Replace SAS drive B Back E Exit Your choice 3 Select the IP Network configuration option Type the corresponding number and press Enter The IP Network configuration menu appears ProtecTIER Service Menu running on rasddx ProtecTIER Configuration IP Network Configuration 1 Configure hostname 2 Configure ProtecTIER s IP interfaces 3 Configure Static Rou...

Page 31: ...t For example PORTLAND After you enter the system name the system automatically starts the Update the System Name process The following status message appears Changing system name Done Updated system name successfully UpdateSystemName ended successfully End Processing Procedure Successfully Press Enter to continue and return to the command prompt 7 When you are finished go on to Chapter 4 Installi...

Page 32: ...SG24 8025 available at http www redbooks ibm com Redbooks nsf RedpieceAbstracts sg248025 html Open The following procedure describes how to perform the tasks described in the previous paragraph Procedure 1 On the server if it is not already displayed access the ProtecTIER Service menu See Accessing the ProtecTIER Service menu on page 9 2 Select the ProtecTIER Configuration option Type the correspo...

Page 33: ...layed Please choose the ID of the virtual interface you wish to edit 6 Choose a virtual interface to edit and type the requested information at each prompt For example type 1 and press Enter Available Options e edit a virtual interface r re assign a physical interface c commit changes q quit Please Choose e r c q e Please choose the ID of the virtual interface you wish to edit 1 The system display...

Page 34: ...o define the static routes For assistance with this task refer to the information on your completed Configure Static Route for Replication worksheet s Run this procedure on the source server s to configure the addresses of all the destination systems and the node on which the ProtecTIER Replication Manager is activated On the destination server s run this procedure to configure the addresses of th...

Page 35: ... is displayed ProtecTIER Service Menu running on rasddx ProtecTIER Configuration Configure Replication 1 Configure Unconfigure ProtecTIER Replication Manager on this node 2 Configure Static Routes B Back E Exit Your choice 4 Select Configure Static routes Type the corresponding number and press Enter The message Gathering System information Done displays followed by a summary of the information th...

Page 36: ...0 255 255 255 0 10 11 195 1 Note The addresses in the above summary are examples Your actual values will vary The Available Options prompt displays a second time Available Options a dd a new record e dit a record d elete a record c ommit changes q uit Please Choose a e d c q 7 Type a and press Enter You are prompted for the information for the second destination target ETH2 server and the local ne...

Page 37: ...r and the destination server is now complete Confirm that your replication configuration was successful To do so refer to the instructions in Chapter 13 Native replication management for FSI on page 99 14 To configure additional servers for a many to one configuration or many to many configuration repeat the steps in Configuring the application IP interfaces on page 11 until each of your remaining...

Page 38: ...1 Set date time 2 Set Timezone 3 Set Timeserver s c Commit changes and exit q Exit without committing changes Please Choose Figure 5 Date Time Timezone Timeserver s configuration menu Time zones under US 1 America New_York 2 America Detroit 3 America Kentucky Louisville 4 America Kentucky Monticello 5 America Indiana Indianapolis 6 America Indiana Vincennes 7 America Indiana Winamac 8 America Indi...

Page 39: ...he settings to match the time and date at your location Important With Version 3 3 6 and later you must apply each change you make to the timezone date and time and time server individually before proceeding to the next task Procedure 1 On the ProtecTIER Configuration menu select the Update Time Date Timezone Timeserver s option Type the corresponding number for this selection and press Enter The ...

Page 40: ... series of status messages appears as the services are stopped and restarted This process might take up to 10 minutes When the service restart is complete the Press the ENTER key to continue message displays 7 Press Enter to continue and return to the ProtecTIER Configuration menu 20 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 41: ...rts and the external LAN port on the same subnet may cause replication errors In addition IBM recommends that on all ProtecTIER nodes or servers involved in Native Replication you configure all rep1 ports on one subnet and you configure all rep2 ports on a different subnet v Identify the person or persons responsible for completing the planning worksheets It is strongly recommended that the worksh...

Page 42: ...tion on the server that remotely manages the replication grid or grids within your organization IBM recommends configuring the ProtecTIER Replication Manager application on the TARGET server at the remote destination site By doing so the Replication Manager will remain available in a disaster recovery situation Note This task may be completed at any time during the replication configuration proces...

Page 43: ...4 Select Config Unconfig ProtecTIER Replication Manager on this node Type the corresponding number and press Enter 5 When the Replication Manager is currently unconfigured do you wish to configue it yes no prompt displays type yes and press Enter The warning below displays Warning You should not configure Replication Manager on more than one server in a grid as doing so may cause conflicts within ...

Page 44: ...24 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 45: ...rder to install and run ProtecTIER Manager effectively v One of the following operating systems Windows 7 Windows 8 2012 Linux Red Hat 64 ES AS 4 5 and 6 v At least 1 2 GB of available disk space v At least 256 MB of RAM v Workstation access to the ProtecTIER service nodes IP addresses ports 3501 and 3503 are open on the firewall IBM recommends that you use the following settings to configure the ...

Page 46: ...nager DVD into the CD ROM drive of the designated ProtecTIER Manager workstation v If the ProtecTIER Manager installer launches and starts the installation go on to step 2 v If the ProtecTIER Manager installer process does not launch automatically do the following a On the Windows task bar click Start Run The Run dialog box opens b In the Open box type D where D is the CD ROM drive of the server c...

Page 47: ...s is complete What to do next Go on to the next chapter Installing on Linux Complete this task to install ProtecTIER Manager on a Linux system About this task Perform the following steps to install ProtecTIER Manager on Linux Procedure 1 Insert the IBM ProtecTIER Manager DVD into the CD ROM drive of the designated ProtecTIER Manager workstation 2 Run the ProtecTIER Manager installer Note This proc...

Page 48: ...he user files are typically stored For example home bill v Other Creates the links in the default location opt IBM PTManager To specify a different location click Choose and select a directory on the workstation hard disk drive v Don t create links No links are created 8 Click Next The Pre Installation Summary screen is displayed 9 Click Install The Installing ProtecTIER Manager screen is displaye...

Page 49: ...ing a clustered configuration verify that both Server A and Server B are running v Yes continue to step 3 v No power on any servers that are not running wait for the boot cycle to complete and then continue to step 3 3 At the localhost Login prompt type the user ID ptconfig and the password ptconfig press enter The ProtecTIER System Menu displays ProtecTIER Service Menu running on rassmx 1 ProtecT...

Page 50: ...ponents 3 Upgrade Firmware Version for BMC and GEM Components B Back E Exit Your choice 6 Select Display Firmware Version for BMC and GEM Components Type the corresponding number and press enter Wait for the process to complete Your choice 2 Begin Processing Procedure Jan 31 11 36 18 Firmware Component Version BMC 2 0 003C CPLD 0 6 0004 BIOS 0 3 0016 FLASH CONFIG 0xAD9E52D7 DISRUPTIVE 0x30E4C1D4 E...

Page 51: ...ion 6 Generate a service report 7 Generate a system view 8 Update ProtecTIER code 9 ProtecTIER Analysis E Exit Your choice 4 Select Protectier Configuration Type the corresponding number and press enter The ProtecTIER Configuration screen displays ProtecTIER Service Menu running on rassmx ProtecTIER Configuration 1 Configure ProtecTIER node 2 Recover Configuration for a replaced server 3 Configure...

Page 52: ...essingProcedure Jan 30 07 47 33 Checkcurrent Firmware Versions Done In ordertoupdatetheNode s firmware level alltheserviceswill be stopped The firmware upgradeprocesswill requiere 1 reboot Do youwanttocontinue yes no yes Stoppingptrasd Done Stoppingvtfd Done Stoppingptcluster Done Updating BMC firmware Done Updating CPLD firmware Done Updating BIOS firmware Done Machine will be rebooted 7 Once the...

Page 53: ...on a Navigate to the directory where you installed ProtecTIER Manager The default installation directory is opt IBM PTManager b Double click the ProtecTIER Manager icon The ProtecTIER Manager window is displayed 2 Go on to Chapter 6 Managing nodes on page 37 Managing users The topics in this section describe how to manage users of the ProtecTIER Manager system ProtecTIER Manager enables you to cre...

Page 54: ...eld select a permission level Administrator Operator or User you want to assign to the user account Note Before processing record this information in a manner that allows you to notify the new user Remind the new user to record the password because you nor the system stores the passwords for later use 7 Click Ok The Add account dialog closes and the account is added to the ProtecTIER Manager syste...

Page 55: ...tion mode and color palette Instructions for installing JAWS and the Java based accessibility tools and for setting the contrast resolution mode and color palette are available in Accessibility on page 213 Saving and printing data This task describes how to save or print the data displayed in informational ProtecTIER Manager windows About this task Follow these steps to save or print data in Prote...

Page 56: ...ecTIER Manager to work with multiple ProtecTIER systems while a specific ProtecTIER Manager operation runs in the background You cannot however run multiple operations in the same ProtecTIER system For instance if you are running a Delete library operation the wizard prompts you to wait while the system goes offline to run the required operation That system will be busy until it completes thereby ...

Page 57: ...ce of ProtecTIER Manager at your workstation To add a node to your ProtecTIER system Procedure 1 Run the ProtecTIER Manager application v For a Windows based ProtecTIER Manager workstation run the ProtecTIER Manager application Click Start All Programs IBM ProtecTIER Manager IBM ProtecTIER Manager v For a Linux based ProtecTIER Manager workstation click the icon for ProtecTIER Manager on the Deskt...

Page 58: ...atically added to the ProtecTIER Manager Removing nodes This topic describes how to remove a node from your ProtecTIER system using the ProtecTIER Manager About this task Removing a node stops the instance of ProtecTIER Manager at your workstation from registering the node and being able to manage it The node itself is unaffected by removing a node in this way Perform the following steps to remove...

Page 59: ...balancing method The available load balancing methods are displayed RR Round robin Outgoing traffic is spread evenly across all of the adapter ports in the bond L2 Outgoing traffic is spread using a default transmit hash policy of layer 2 L2L3 Outgoing traffic is spread using a transmit hash policy of MAC addresses and IP addresses of the source and the destination L3L4 Outgoing traffic is spread ...

Page 60: ...cTIER Manager Procedure 1 Click the Login button The Login dialog box is displayed 2 Enter your username and password 3 Click Ok The Login dialog box closes and ProtecTIER Manager displays the information for that node Results IBM recommends that you change or replace these default user accounts For more information see Managing users on page 33 Note Only one Administrator can be logged in to a Pr...

Page 61: ...d with ProtecTIER v2 3 and above Replication is disabled on repositories upgraded from v2 2 and below versions When you enable replication you must assign files systems set the estimated factoring ratio MD raid configuration and disk size The procedure allocates metadata for replication and then you can add file systems to the repository as needed If more storage is required you can select additio...

Page 62: ...d beyond the original growth projections and you are running out of user data space The increase capacity steps described in this task appear in the order in which they should be performed 1 Plan the expansion using ProtecTIER Manager 2 Create new file systems or extend existing ones on the backend storage using the ProtecTIER Service menu and verify that the devices are displayed 3 Run the Increa...

Page 63: ...e If you need to expand an existing file system refer to Using the ProtecTIER Service Menu to expand existing file systems If not go on to Using the ProtecTIER Service Menu to create file systems on page 46 Using the ProtecTIER Service Menu to create and extend file systems Use the ProtecTIER Service Menu to create or extend the required file systems When you select a given option an interactive d...

Page 64: ...e ProtecTIER Configuration menu displays ProtecTIER Service Menu running on rasddx ProtecTIER Configuration 1 Configure ProtecTIER node 2 Recover Configuration for a replaced server 3 Configure machine serial number for a replaced server 4 Configure RAS 5 Update Time Date Timezone Timeserver s 6 Scan storage interconnections 7 File Systems Management 8 Configure replication 9 IP Network configurat...

Page 65: ... numeral corresponding to Display GFS repository file systems and press Enter An example follows Device Size MountPoint vg01 lv_vg01 2044 00M mnt vg01 lv_vg01 vg11 lv_vg11 2285196 00M mnt vg11 lv_vg11 vg21 lv_vg21 3430864 00M mnt vg21 lv_vg21 v To display the list of available new multipath devices type the numeral corresponding to Display unused devices and press Enter An example follows Device S...

Page 66: ...r repository user data and metadata storage proceed to Using the ProtecTIER Service Menu to create file systems Otherwise go to Expanding the repository on page 48 Using the ProtecTIER Service Menu to create file systems About this task Use the File Systems Management menu to create file systems for repository user data and metadata storage based on the output of the Plan repository increase wizar...

Page 67: ...ons 7 File Systems Management 8 Configure replication 9 IP Network configuration 10 Update Firmware 11 Update the system s name 12 Validate configuration 13 Single Node code upgrade 14 OS images Management 15 Replace SAS drive B Back E Exit Your choice 4 Type the numeral corresponding to File Systems Management and press Enter The File Systems Management menu displays ProtecTIER Service Menu runni...

Page 68: ...capacity completion operation on Server B In this case vtfd must be offline Access ProtecTIER Manager to expand the repository Procedure 1 In the Systems Management view expand the drop down list and select the system for which you want to expand the repository 2 Select Repository Increase capacity The Increase capacity wizard Welcome screen is displayed 3 Click Next The Repository size properties...

Page 69: ...e you can resume use of your ProtecTIER system What to do next Defragmentation on a repository Defragmentation is the process to allocate fragmented space on a repository as defragmented so that this space can be used to write new data Important Contact a trained ProtecTIER specialist before performing this operation A ProtecTIER repository becomes fragmented over time The Defragmentation control ...

Page 70: ...the repository Perform the following steps to delete a repository Procedure 1 Select the repository 2 Choose Repository Delete repository A confirmation message box is displayed 3 Click Yes The Data Loss Confirmation dialog box is displayed 4 In the field type data loss and click Ok A confirmation message box is displayed 5 Click Yes The ProtecTIER system temporarily goes offline to delete the rep...

Page 71: ... using these elements Syntax diagrams Main path line Begins on the left with double arrowheads and ends on the right with two arrowheads facing each other If a diagram is longer than one line each line to be continued ends with a single arrowhead and the next line begins with a single arrowhead Read the diagrams from left to right top to bottom following the main path line Keyword ptcli Represents...

Page 72: ...w to use ptcli through the command line interface CLI The ptcli is loaded during the installation of ProtecTIER software and ProtecTIER Manager software Usage When ptcli is running the available ptcli commands are listed according to the version of ProtecTIER that is installed If the ptcli for version 3 4 1 is running on older versions of ProtecTIER several operations might not be supported Use pt...

Page 73: ...e In the following example ptcli is the root directory Keep in mind that running the command does not create the directory path Therefore for the command to work the root directory in this case ptcli must be created before activating the command ptcli p h ptcli ptuser User name ptuser Password xml version 1 0 encoding UTF 8 response command createprofile status success Processing options This topi...

Page 74: ...gement server This field is required if you are running ptcli from a server or PC that is not the ProtecTIER server to which you want to connect port PORT Specify the port of the management server The default is 3501 Note This is optional loginFile FILE Specify a user profile file for login Notes v This is optional v When specifying loginFile using loginInline is mutually exclusive loginInline USE...

Page 75: ...ions output metadata MOUNT_POINTS List of GFS global file system mounted file systems used to store ProtecTIER repository metadata userdata MOUNT_POINTS List of GFS mounted file systems used to store ProtecTIER repository user data Example CreateRepository ptcli CreateRepository ip 9 148 220 101 loginFile h ptcli ptadmin Command Specific Options Command Specific Options name PTCLI_REP system PTCLI...

Page 76: ...mple ServerVersion ptcli ServerVersion ip 9 148 220 101 loginFile h ptcli ptadmin ProtecTIER FSI commands The following tables contain lists of commands to invoke for the file system interface FSI ptcli File system interface commands This topic describes how to use the ProtecTIER server through the command line interface CLI using FSI file system commands FSI related commands Table 9 CreateFsiFile...

Page 77: ...ME The new unique name to be set for the file system size NUM The new unique name to be set for the file system size NUM Maximum file system size in GB to be set hyperFactor MODE The HyperFactor mode to be set Valid values are enabled disabled baseline compression TYPE The compression type to be set Valid values are enabled disabled Example ModifyFsiFileSystem ptcli ModifyFsiFileSystem ip 9 148 22...

Page 78: ...xplanation Command Specific Options DeleteFsiDirectory Delete a File System directory Name Explanation path PATH The path of the directory to delete fsName NAME File system name taken from ListFileSystems output Example DeleteFsiDirectory ptcli DeleteFsiDirectory ip 9 148 220 45 loginFile h ptcli ptadmin Command Specific Options Command Specific Options path PATH fsName NAME Table 14 ListReplicati...

Page 79: ...a user password uid ID User ID Example AddSambaUser ptcli AddSambaUser ip 9 148 220 45 loginFile h ptcli ptadmin Command Specific Options Command Specific Options name NAME password PASSWORD uid ID Table 16 ChangeSambaUserEnablement command Command Explanation Command Specific Options ChangeSambaUserEnablement Update enablement Name Explanation name NAME Samba username taken from ListSambaUsers ou...

Page 80: ...ME uid ID Table 18 ListSambaUsers command Command Explanation Command Specific Options ListSambaUsers Prints the list of Samba users in the system Name Explanation None Example ListSambaUsers ptcli ListSambaUsers ip 9 148 220 45 loginFile h ptcli ptadmin ListSambaUsers Table 19 CreateSharedPath command Command Explanation Command Specific Options CreateSharedPath Create a CIFS share Name Explanati...

Page 81: ...st of user names to be set to Read and Write permissions taken from ListSambaUsers output Note that this option is only optional if userReadOnly is supplied otherwise it is required uid ID The user ID to use for anonymous users when squash is enabled gid ID The group ID to use for anonymous users when squash is enabled Example CreateSharedPath ptcli CreateSaredPath ip 9 148 220 45 loginFile h ptcl...

Page 82: ... hosts are allowed userReadOnly NAME NAME Comma delimited list of user names to be set Read Only permission taken from ListSambaUsers output userReadWrite NAME NAME Comma delimited list of user names to be set Read mand Write permissions taken from ListSambaUsers output Example ModifySharedPath ptcli ModifySharedPath ip 9 148 220 45 loginFile h ptcli ptadmin fsName NAME Command Specific Options Co...

Page 83: ...e Name Explanation fsName NAME File system name taken from ListFileSystems output shareName NAME Shared path name taken from ListSharedPaths output Example RemoveSharedPath ptcli RemoveSharedPath ip 9 148 220 45 loginFile h ptcli ptadmin Command Specific Options Command Specific Options fsName NAME shareName NAME path PATH NFS related commands Table 23 CreateExportPath command Command Explanation ...

Page 84: ...rw mapping root_squash no_root_squash Note Linux users must add the backslash character before special characters such as and Example CreateExportPath ptcli CreateExportPath ip 9 148 220 45 fsName NAME exportName NAME path path Command Specific Options Command Specific Options Command Specific Options secured STATUS uid ID gid ID Command Specific Options allowedHosts IP Table 24 ModifyExportPath c...

Page 85: ...uple with the following required fields IP permission r rw mapping root_squash no_root_squash Note Linux users must add the backslash character before special characters such as and Example ModifyExportPath ptcli ModifyExportPath ip 9 148 220 45 loginFile h ptcli ptadmin Command Specific Options Command Specific Options Command Specific Options fsName NAME exportName NAME newExportName NAME Comman...

Page 86: ... ptcli ptadmin Command Specific Options Command Specific Options fsName NAME exportName NAME ptcli Replication commands This topic describes how to use the ProtecTIER server through the command line interface CLI using FSI replication commands Table 27 CreateFsiPolicy command Command Explanation Command Specific Options CreateFsiPolicy Create FSI replication policy Name Explanation name NAME Polic...

Page 87: ...le h ptcli ptadmin Command Specific Options Command Specific Options hours NUM Note See Table 29 for examples of the ReplicationStatistics output parameters Table 29 ReplicationStatistics output parameters Output Parameter Name Description Backlog avg Average backlog size during the chronicle period NetIncBytesPerSec avg Physical throughput average incoming NetOutBytesPerSec avg Physical throughpu...

Page 88: ... NAME The file system name of the source directory taken from ListFileSystems output targetFS NAME The file system name of the target directory taken from ListFileSystems output sourceDir NAME Source directory name targetDir NAME Target directory name Example CloneDirectory ptcli CloneDirectory loginInline h ptcli ID PASSWORD Command Specific Options Command Specific Options sourceFS NAME targetFS...

Page 89: ...Part 2 Working with ProtecTIER FSI This section of the guide describes how to work with ProtecTIER for FSI Copyright IBM Corp 2012 2016 69 ...

Page 90: ...70 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 91: ...g of multiples devices such as printers files and even serial ports among various users and administrators The CIFS protocol supports remote mounts over TCP IP using the samba server message block SMB protocol Note ProtecTIER FSI support is intended for backup images produced by backup applications and not for primary storage deduplication FSI network configuration for the ProtecTIER backup server...

Page 92: ...R server configuration ProtecTIER servers have several physical network ports The number of ports vary based on the ProtecTIER model Ports might be used for management replication and or file system related operations from the hosts Each port is designated to one of these usages by assigning the physical ports to a virtual interface on ProtecTIER When DD6 is configured with 1GB cards there are 4 v...

Page 93: ...es of the source and the destination L3L4 Outgoing traffic is spread using a transmit hash policy of IP addresses and ports of the source and the destination To modify the load balancing configuration refer to Configuring the application IP interfaces on page 11 Subnetwork and VLAN separation This section describes the recommended bonding to be used in FSI that is Application1 ApplicationN It is v...

Page 94: ...ollowing is recommended v In a one to one setup one host to one ProtecTIER if the ProtecTIER is using 1 Gigabit ports and the performance target is beyond 125 MB Sec consider changing the default setup and define several application interfaces Divide the physical ports between the interfaces and define different IP addresses and subnetworks for each IP In this case note that the host must choose t...

Page 95: ... Modifying properties of a file system This topic describes how to change file system attributes About this task Modify the properties of a file system such as the file system name the maximum size of the file system the Hyperfactor and compression settings and the SNMP threshold setting Procedure 1 From the Systems Management view select an existing file system under the File System category in t...

Page 96: ...es for the upper and lower file system usage threshold limits in the input fields 8 When you finish setting the file system usage threshold limits click Ok to close the window The new parameters are displayed in the File system view pane Deleting a file system This topic describes how to delete file systems About this task You can delete a file system and all of its data Note Before a file system ...

Page 97: ...ntication setup wizard to set the authentication that the ProtecTIER system uses for working with CIFS clients About this task To begin managing data with CIFS you must set the authentication to either Workgroup or Active Directory In a Workgroup configuration users are added using the Users Management wizard in ProtecTIER Manager In an Active Directory configuration users are obtained from the ac...

Page 98: ...es window is displayed 2 Use the Properties window to assign a descriptive name for the workgroup Type a name in the Workgroup name field and click Next The Preview window displays the Authentication type and Workgroup name 3 Click Finish to save and exit the Authentication setup wizard 4 After a workgroup is successfully configured a popup window prompts the user to assign users via the Users Man...

Page 99: ...ssign a password in the Password field 6 Define the Active Directory server s IP addresses a Type the primary IP server address in the Primary active directory server address field b Optional Type the secondary IP server address in the Secondary active directory server address field Click Next The WINS Servers window is displayed Note If CIFS clients are using NetBIOS use the WINS Servers window t...

Page 100: ...ld b In the Schema config pane select either RFC2307 meaning that your network s password and NIS attributes can be resolved by the LDAP or SFU achieves Active Directory integration with Linux and UNIX systems as the desired schema 13 Click Next to preview the Summary report The parameters defined for the set authentication are displayed 14 Click Finish to submit the settings to the server What to...

Page 101: ...t step 6 Click Ok The new user is added to the Users list in the Users Management for Workgroups window What to do next Continue with one or all of the following tasks v Changing a user password v Changing a user ID v Activating or deactivating CIFS user access on page 82 Changing a user password Use this task to change a user s password for CIFS access About this task To change the password of a ...

Page 102: ...is task To enable or disable user permissions Procedure 1 From the Users Management for Workgroups window select a user from the Users list and click Activate if the user access is deactivated or click Deactivate if the user access is enabled 2 If you click Deactivate a warning message is displayed that the user will not be able to access shared paths Click Yes at the Are you sure prompt The user ...

Page 103: ...e existing file system directories c Select a path directory and click OK d Click Next The Host Access window is displayed 4 From the Host Access window select one of the following options v Allow all hosts grants all hosts access to the share Note This option is the default v Allow selected hosts grants access only to specified hosts that appear in the Allowed hosts list 5 To allow selected hosts...

Page 104: ...plete Go on to Configuring static routes on page 14 To modify the properties of a CIFS share go on to Modifying a CIFS share on ProtecTIER Modifying a CIFS share on ProtecTIER About this task This topic describes how to modify a CIFS share Procedure Follow these steps to modify the properties access and permissions of a CIFS share 1 From the Systems Management view select an existing file system u...

Page 105: ... Allowed hosts list and click Remove 9 Click on Users in the navigation pane to display the User permissions 10 Click on the Allow checkbox to activate or deactivate user access to the shared path Users which have been deactivated through the User s Management cannot be associated with this share 11 Assign the user permissions by selecting Write enabled or Read only from the Permissions dropdown l...

Page 106: ...or add users and set user permissions The following task explains how to migrate between authentication types beginning with migration from Workgroup authentication to Active Directory Note It is possible that migrating between authentication types can cause data files to become inaccessible When setting authentication each user has its own UID and GID When changing the authentication if the new u...

Page 107: ...hema Extension is used only if your Active Directory server uses RFC2307 or SFU schema extensions for ID mappings If you choose RID go on to 10 If you choose Schema Extension go on to 12 10 Click Next The RID Configuration window is displayed 11 Use the RID Configuration window to set the range mapping and the trusted domains a Enter the User ID range in the from and to fields Note The value in th...

Page 108: ...odify share from the CIFS Path Sharing menu The Modify share wizard is displayed 3 Click on Users in the navigation pane to display the User permissions 4 Click on the Allow checkbox to activate or deactivate user access to the shared path Users with deactivated user access cannot be associated with this share 5 Assign the user permissions by selecting Write enabled or Read only from the Permissio...

Page 109: ... Workgroup name 7 Click Finish to save and exit the Authentication setup wizard A message displays that the workgroup was configured successfully 8 From the Set authentication mode dialog click Yes to assign users via the User s Management wizard 9 From the User s Management wizard activate the users or add new users For more detailed information go to User s management for CIFS workgroups on page...

Page 110: ...90 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 111: ...gy group is supported Working with NFS exports To enable NFS access and share data you must grant a host access to shared directories by creating and configuring an NFS export All the users within the defined host have access to the export Working with NFS exports sharing involves tasks such as creating modifying and deleting NFS exports Creating an NFS export on ProtecTIER About this task This to...

Page 112: ... window displays the Host name Access Type and Anonymous Mapping 5 Click Add to add host access from the Host Access window From the Add Host Access window you can v Allow all hosts grants all hosts access to the export v Allow selected hosts grants access only to specified hosts that appear in the Allowed hosts list 6 Type the selected Host IP address or partial address in the Host IP field Note ...

Page 113: ...inish The Summary report displays the details of the NFS export and the allowed hosts and user permissions What to do next Creating an NFS export is now complete Go on to Configuring static routes on page 14 To modify the properties of an NFS export go on to Modifying an NFS export on ProtecTIER Modifying an NFS export on ProtecTIER About this task This topic describes how to modify an NFS export ...

Page 114: ...NFS export on ProtecTIER on page 91 7 To modify a host select the host and click Modify from the Allowed hosts window 8 Type the selected Host IP address or partial address in the Host IP field Note To allow host access to all hosts type a wildcard or in the Host IP field to allow access to some hosts and not all of them 9 Choose the host Permissions v Write enabled v Read only 10 Choose the User ...

Page 115: ... this task The mount command instructs the operating system to make a file system available for use at a specified location or the mount point In addition you can use the mount command to build other file trees made up of directory and file mounts The mount command mounts a file system expressed as a device by using the device or node directory parameter on the directory specified by the directory...

Page 116: ...ping command 4 Type the mount command mount o rw soft intr nolock timeo 3000 nfsvers 3 proto tcp NFS server address exportName mount point Results Verify that the NFS export has been successfully mounted Mounting an NFS file system on AIX Procedure 1 Before you begin make sure your network is configured on the client as well as ProtecTIER as described in Chapter 2 Completing the ProtecTIER system ...

Page 117: ...network configuration for the ProtecTIER backup server on page 71 2 From the root prompt command line of the host server type mkdir mnt local directory path or mount point to create a mount point and press Enter 3 Type ping NFS server address and press Enter 4 Type the mount command mount o rw soft intr llock timeo 3000 vers 3 proto tcp NFS server address exportName mount point Results Verify that...

Page 118: ...98 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 119: ... replicate to single as well as multiple targets These targets can then act as Disaster Recovery sites for any number of the sources while still allowing local backups as well as replication from the active source repositories Working with ProtecTIER Replication Manager This section describes how to manage ProtecTIER Replication Manager by working with ProtecTIER Manager Connecting to a ProtecTIER...

Page 120: ...d can manage up to one grid with up to 24 repositories In a many to many environment a replication grid can have up to 2 groups of 4 target source repositories replicating to each other per group So it can have up to two topology groups for a total of 8 members Creating a replication grid Use the following procedure to create a replication grid Note Grid IDs and repository IDs are numbers that are...

Page 121: ... grid Note Repositories can replicate to each other only if they are part of the same grid and the same group In addition a repository cannot be a member of more than one grid Adding a repository to a replication grid This task explains how to add a repository to a grid About this task When you add a repository to a replication grid the repository can be defined as a source or a destination To add...

Page 122: ...nd all data should be replicated from beginning by new policies Therefore removing a repository from a grid is an operation you should plan with a PT specialist A repository can be removed from a grid only if it is a single node repository See Modifying a Replication Group for FSI on page 105 To remove a repository from a grid Procedure 1 From the Grids Management view click the repository you wan...

Page 123: ...a replication group in a replication grid for FSI About this task Follow this procedure to connect up to 8 repositories in a many to many replication group Before defining any replication policy you must create a replication group with a physical connection between the repositories Procedure 1 From the Grids Management view click on a single node repository 2 Select Group Replication group managem...

Page 124: ...Existing Replication Group If you are adding a repository to a new replication group continue with step 4 4 Select Creating a new replication group 5 Click Next The Repositories selection window is displayed 6 Select the repositories to be added to the replication group 7 Click Next A preview of the replication group is displayed 8 Type the appropriate name of the replication group and click Finis...

Page 125: ...ght click on a repository v Click the Replication group management icon on the toolbar v Select Group Replication group management 3 Click Next The Repositories selection window is displayed Repositories that are already members of the replication group are checked and standalone grid members appear cleared Note In a many to one topology this window will appear as Spokes selection 4 Select or clea...

Page 126: ... source up to 64 directories can be selected per policy and up to 256 policies per source repository are supported A replication policy supports a source repository replicating data to up to three different destination repositories When replicating to multiple destination repositories via a replication policy each destination repository must have a specific replication destination directory define...

Page 127: ...in the folder path in the Path field Note A directory or file on the source can be associated with only one policy If the directory or file is already linked to an existing policy this action fails 8 Click Ok The file system and directory path are displayed in the Source directories window ts761378 Figure 17 Create policy source directories ts761379 Figure 18 Create policy Add source directory bro...

Page 128: ...eate a new remote replication directory choose Create a remote replication directory on destination Then type a name for the directory in the Directory name field The replication destination directory is automatically created on the destination repository v To use an existing remote replication directory select an existing remote replication directory from the Choose an existing directory from des...

Page 129: ...urce directory Note A warning message displays that once a source directory is disabled and saved it cannot be reactivated To replicate again the source must be removed and added back again b Remove the source directory in its entirety from the policy configuration This results in deletion of the directory and all its data on the replication destination directory or directories Note Removing the s...

Page 130: ... repository file system If you select Create a remote replication directory on destination then type a name for the directory in the Directory name field Note A replication destination directory is per repository and per policy If you have not created a replication destination directory there will not be any existing directories to choose from 15 Click Add The repository and directory path are dis...

Page 131: ... confirm deleting the policy The replication policy is deleted and removed from the Replication Policies list Running a replication policy in FSI This task explains how to run a replication policy in an FSI environment About this task Running a replication policy allows you to replicate all policy source directory data without having to wait for a backup trigger All data contained on the directori...

Page 132: ...commended When a replication policy is disabled in FSI the replication destination directory rdd that is associated with the policy becomes unusable for any additional policies A new or modified rdd must be used when the policy is reactivated Procedure Follow the steps to disable an FSI replication policy 1 From the Systems Management view select Replication Policies from the navigation pane 2 Fro...

Page 133: ... create a new remote destination directory 6 Click Modify The destination repository is displayed with the updated path 7 Click Ok The replication policy is enabled Creating a replication directory This topic describes how to create a replication destination directory in an FSI environment About this task A replication directory is a specific directory on the destination repository to which all su...

Page 134: ...ppropriate command for your operating system to delete all files and subdirectories from the replication directory 6 From the Systems Management view select an existing file system under the File System category in the navigation pane 7 Choose Replication Replication Directory Delete a replication directory Alternatively you can right click on a Replication directory in the Folders navigation tab ...

Page 135: ... runs continuously all day but on low priority thereby consuming minimal resources from the system You can also limit the replication throughput through the Replication Rate Limits window see Setting the replication rate limit on page 116 Note If you define a timeframe both on the source and on the destination repositories you need to adjust both to the same time settings To set the replication ti...

Page 136: ...oup menu The Centralized Time Frame window displays with the repositories in the replication grid 3 Select the Time frame direction from the dropdown list to display the time frames scheduled for each replication task or you can schedule a time frame for incoming outgoing or bi directional replication tasks 4 Define the task precedence by selecting Replication timeframe to activate replication wit...

Page 137: ...Combined settings v Individual settings 3 Select the checkbox next to the desired option and enter a value in MB Sec If a checkbox is not selected the value will revert to an unlimited replication rate Note When replication time frames are defined and replication is taking place with the time frame replication will not be limited If the system is not within the replication time frame no replicatio...

Page 138: ...e that is running replication About this task Note This task should be performed only if it is important to limit each one of the interfaces separately If you want to limit the total throughput over the networks refer to Setting the replication rate limit on page 116 and set the physical replication rate limit of the repository Procedure 1 From the Systems Management view select a system that is b...

Page 139: ...bandwidth limitation change the effect is immediate What to do next Go on to Restoring backup data from a policy replication directory This topic describes how to recover and restore data from a replication destination directory If a situation arises that causes the source repository to be unavailable replicated data can be recovered from the replication destination directory While replication des...

Page 140: ...agement view select an existing file system under the File System category in the navigation pane 2 Select Replication Replication Directory Take ownership of a replication directory The Take ownership of a replication directory window is displayed 3 In the Replication directory name field enter the replication directory on which to take ownership or click Browse to navigate to the replication des...

Page 141: ...at it may take time for all of the directory contents to be copied 7 Click yes to confirm and begin the operation The Cloning progress window displays the source and destination paths the total number of files to be cloned the start time of the operation and the number of files cloned per second 8 Click to hide the Cloning progress window What to do next From the navigation pane click on Activitie...

Page 142: ...ic The Control Replication Traffic window displays the remote repositories 2 Select an option from the Incoming dropdown list to configure the status of incoming replication activities from a remote system v Active v Blocked 3 Select a System in the navigation pane to display the System view If the incoming replication activities are blocked the preview of the replication group in the Replication ...

Page 143: ...the activity you want to stop and choose Stop activity The running activities are cancelled without affecting any pending activities and without causing any backlog issues What to do next To restart the stopped activities go to Running a replication policy in FSI on page 111 or Running a replication policy on a directory on page 112 Chapter 13 Native replication management for FSI 123 ...

Page 144: ...124 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 145: ...ystems by clicking on the hyperlink of the System Name When you click on the hyperlink the system s login window displays Type in your username and password as you do when selecting a specific system from the Select a system dropdown list If the system is offline ProtecTIER Manager refreshes the system view and you can try to log in again If the system still remains offline a message displays that...

Page 146: ...n ratio The storage savings is equal to 1 1 deduplication ratio x 100 Replication Throughput Displays the physical and nominal throughput of incoming and outgoing replication activity Backup Throughput Displays the read and write throughput during backup activity From the All systems view select the Upgrading systems tab to monitor the progress of the ProtecTIER systems undergoing a code upgrade F...

Page 147: ...ned data refers to the amount of nominal data containing cloned data v Replication refers to the amount of nominal data used for replication v Pending refers to the amount of nominal data pending deletion and defragmentation activities v Allocable refers to the amount of free disk space available to hold nominal data v Estimated space refers to the overall estimated nominal space supported by the ...

Page 148: ...f 1024 Total utilization The Total utilization pane displays the following information in both graphical and numeric format Table 36 Total utilization information Column name Definition Used space The amount of disk space currently containing physical data Nominal data size The amount of nominal data used for backup and replication Deduplication ratio The ratio of the nominal data size used space ...

Page 149: ...m from the dropdown list in the navigation pane and click Statistics The Statistics monitoring window displays performance graphs of the repository throughput for both backup and replication The Statistics monitoring window consists of the following tabs v Repository statistics v Backup statistics on page 130 v Replication statistics on page 132 Repository statistics This topic describes the utili...

Page 150: ...ghput statistics The Backup tab of the Statistics monitoring window displays the following graphs v Backup read graph v Backup Marginal HyperFactor ratio graph on page 131 v Backup write graph on page 131 Backup read graph The Backup read graph displays the throughput in MB Sec and streams of data read from the repository over time ts760386 Figure 25 HyperFactor ratio over time graph ts760413 Figu...

Page 151: ... occupies at each point in time Comparing these two values enables you to evaluate the effect of HyperFactor on the data written Backup write graph The Backup write graph displays the throughput in MB Sec and streams of data written to the repository over time ts761473 Figure 27 Backup read graph ts760388 Figure 28 Marginal HyperFactor ratio graph ts761474 Figure 29 Backup write graph Chapter 14 M...

Page 152: ...ng replication graph The Incoming replication graph displays the throughput in MB Sec and streams of data replicated to the local repository from the remote repository or repositories over time The view displays the data over a 24 hour period in 1 minute intervals Outgoing replication graph The Outgoing replication graph displays the throughput in MB Sec and streams of data replicated to the desti...

Page 153: ...Management view select a system from the dropdown list Click Activities in the navigation pane During replication the list of objects undergoing replication activity is displayed During backup the drivers will be displayed Here you will see the Object ID the associated policy the nominal throughput rate the deduplication factoring ratio a progress bar and the estimated time left for the replicatio...

Page 154: ...Columns that appear with an asterisk next to the column name display data that is only relevant to outgoing replication activities Type the type of replication activity Object ID the file or directory name Policy the name of the policy that contains the respective file or directory in its definition Throughput the nominal throughput of replicating or backup data in MiB sec or KiB sec Dedup display...

Page 155: ... the backup Host IP the IP address of the host that sent the files to be backed up Monitoring the file system This section describes how to use ProtecTIER Manager to monitor the overall file system in ProtecTIER for FSI From the Systems Management view select File System in the navigation pane The File System window displays the hierarchy of file systems configured on the system The File Systems p...

Page 156: ... is displayed 3 Assign the drive letter and path of the share you want to map 4 Click Finish The mapped share is displayed under Network Location in My Computer 5 The free space of the file system to which the share belongs is displayed under the mapped share Alternatively you can right click on the mapped share and select Properties The Used space Free space and Capacity of the file system is dis...

Page 157: ... properties Table 38 File system properties Properties Description Configured max size The maximum file system size defined during file system creation Hyperfactor The data factoring mode status Compression Data compression is either enabled on or disabled off Current max size The current maximum file system size Usage The actual amount of space in MiB GiB or TiB used from the file system percenta...

Page 158: ...ead only Write only or Read Write Monitoring an NFS export configuration This section describes how to use ProtecTIER Manager to monitor an NFS export configuration Click on the NFS tab to display the NFS export details Table 41 NFS Export configuration Column Description Enabled Displays if NFS export is either activated or deactivated Name Displays the NFS export name Path Displays the directory...

Page 159: ... can navigate between the directories view the file sizes the last modified date and how much data was backlogged replicated or synchronized and the last point where the data was synchronized Filter the directory contents view by selecting one of the options from the dropdown list v Backup properties displays the general properties of the directory and its contents v Origin properties displays the...

Page 160: ...140 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 161: ...timization reporting and troubleshooting This part contains information about performance optimization creating and generating reports and troubleshooting procedures using ProtecTIER Manager Copyright IBM Corp 2012 2016 141 ...

Page 162: ...142 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 163: ...support the fast 32 bit CRC calculation replication will fail Typically changing the CRC calculation is a onetime event Once the calculation is changed from the default value you are not expected to change the calculation back to the default setting When new data is written to the repository the latest CRC algorithm selected is used Old data remains with the CRC calculation that was selected at th...

Page 164: ...144 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 165: ...he ProtecTIER server the file name is IBM TS7600 SNMP MIBV2 mib located in usr share snmp mibs The full path is usr share snmp mibs IBM TS7600 SNMP MIBV2 mib v The IBM TS7600 SNMP MIBV2 mib file needs to be copied onto the SNMP trap receiver and the trap receiver software must point to the directory location of the MIB file for translation of the trap messaging v SNMP trapping enabled on one or mo...

Page 166: ...in ProtecTIER version 3 1 or later supports threshold monitoring and allows the user to specify thresholds for the following system runtime behavior Repository space issues Nominal capacity Physical capacity There are two threshold levels a user can set Information level a trap is sent when the repository regains free space and rises about the information level Warning level a trap is sent when th...

Page 167: ... ProtecTIER Manager Configuration menu On systems configured to use SNMP traps an agent monitors the ProtecTIER server and reports fault information to a network management application Periodically the data is sent to the designated SNMP server in the form of an SNMP trap report a portion of which is shown in Figure 35 on page 148 SNMP trap reports allow you to receive hardware or software fault n...

Page 168: ...aults are reported in ProtecTIER Manager However certain conditions will prevent the GUI from communicating with the server and prevent the reporting of fault information for the failed component By enabling SNMP reporting you will have greater assurance that hardware faults do not go undetected ts760649 Figure 35 SNMP trap report 148 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide f...

Page 169: ...tion of all functions it is recommended that you start by configuring SNMP traps in Configure SNMP Traps on page 150 and then complete the remaining tasks in the order in which they are documented 4 Go on to Configure SNMP Traps on page 150 Entering registration details Procedure 1 In the Registration window shown in Figure 36 enter the requested Company and System Administration information i Unt...

Page 170: ...public and private communities and any custom communities that were manually added to the communities list in the trap receiver program Traps from unrecognized community names are ignored 5 If the default Port value does not match the port value used by the SNMP trap receiver for the corresponding community enter the correct value 6 Click Add You are returned to the SNMP Trap window The new SNMP t...

Page 171: ...sabled 13 Read the information provided in the Physical Space Threshold Alerts pane to determine whether you want to set physical space threshold limits v If you do not want to set physical threshold limits leave the checkbox clear and go on to step 15 v If you do want to set physical threshold limits in the Physical space threshold alerts configuration pane select the checkbox as shown in Figure ...

Page 172: ...es not appear in the navigation pane go on to 30 on page 154 19 From the navigation pane select the Backlog Threshold SNMP Alerts option The Backlog Threshold SNMP Alerts window opens and displays the replication backlog threshold settings status of the remote repositories if any exist 20 Read the information provided in the Backlog Threshold SNMP Alerts pane to determine whether you want to set t...

Page 173: ... FSI file systems have been created on the server If the F S Usage Threshold SNMP Alerts does not appear in the navigation pane go on to 30 on page 154 25 Read the information provided in the F S Usage Threshold SNMP Alerts pane to determine whether you want to set the file system usage threshold limits v If you do not want to set the file system usage threshold limits go on to 30 on page 154 v If...

Page 174: ...ect the E mail Alerts option The E mail Alerts window opens displaying the e mail to which the alerts will be sent Note The e mail displayed is the e mail address that was configured during RAS configuration 31 The system configuration to enable and define the parameters for SNMP reporting is now complete Generating a ProtecTIER service report Complete this task to generate a service report on you...

Page 175: ...ment view choose Reports Create service report The Create service report window is displayed 2 From the Selected node dropdown list select a node for which to generate a service report 3 Complete each of the input fields in the Backup application pane v Host operating system v Backup application name v Backup application version 4 In the Problem description pane type a brief description describing...

Page 176: ...se specified by IBM Support the end date is the day the report is collected 7 Click Ok The Service Report file is created on the ProtecTIER server and a standard save dialog box is displayed 8 Click Save The report file is saved to the selected location Generating a service report using the ProtecTIER Service menu Complete this task to generate a service report on your ProtecTIER system using the ...

Page 177: ...tion reports and all log files in their entirety 7 Systemview Collect system information required to generate the system view html output 8 Coredump Collects the vmcore dumps from the system q Quit Choose 5 Choose a profile from the options displayed Type the corresponding number and press enter The following output is displayed Choose 1 Please choose from what date to collect log files q to quit ...

Page 178: ...e report 7 Generate a system view 8 Update ProtecTIER code E Exit Your choice The service report is now complete You can repeat this procedure for additional nodes or type e to exit the menu The service report is now complete Type e to exit the menu What to do next When you have finished contact a trained ProtecTIER specialist Creating a long term statistics report This task describes how to gener...

Page 179: ...a from the timestamp of the previous record to the timestamp of the current record Contents of the ProtecTIER FSI Statistics Report Column Description processId The ID number of the process pollId The ID number of the poll sample Timestamp The date and time of the sampling SamplingTimeSeconds The duration in seconds between samples nSamplesPerPoll The number of samples used for each poll Physical ...

Page 180: ...raggers Defragmented Size Bytes cluster wide The amount of space freed up after defragmentation operations Nominal Incoming Throughput Average KB sec The average amount of incoming nominal throughput from the different sources replicating to this node Physical Incoming Throughput Average KB sec The average amount of incoming physical throughput from the different sources replicating to this node N...

Page 181: ...and press enter The ProtecTIER System Menu displays ProtecTIER Service Menu running on rassmx 1 ProtecTIER Configuration 2 Manage ProtecTIER services 3 Health Monitoring 4 Problem Alerting 5 Version Information 6 Generate a service report 7 Generate a system view 8 Update ProtecTIER code 9 ProtecTIER Analysis E Exit Your choice 5 Select ProtecTIER Analysis Type the corresponding number and press e...

Page 182: ...root Ronaldo Charts ll h total 64K rw r r 1 root root 16K Jan 29 22 41 clusterwide htm drwxr xr x 7 root root 4 0K Jan 26 09 26 HTML rw r r 1 root root 6 8K Jan 29 22 41 index html rw r r 1 root root 15K Jan 29 22 41 node1 htm rw r r 1 root root 15K Jan 29 22 41 node2 htm drwxr xr x 5 root root 4 0K Jan 29 22 28 Results Open the index html file in a browser to view the report Understanding the Pro...

Page 183: ...ities Each activity on the chart gets a specific color and an axis For example the following chart shows how the allocated space is affected by the delete operation Each time a delete operation is executed the allocated space increases Creating a system activities statistics report This task describes how to generate a statistics report of the system activities in frequent and short term intervals...

Page 184: ...ed throughput bytes sec The rate at which data is defragmented write throughput bytes sec The average throughput of nominal data that is written to the repository in bytes Writing tapes The average number of writing tapes on the system read throughput bytes sec The average throughput of nominal data that is read from the repository in bytes Reading tapes The average number of reading tapes on the ...

Page 185: ...iew choose Reports View product data MRPD The View product data MRPD window is displayed 2 Analyze the data to determine the required action When you are finished click Ok to close the window Monitoring backup and deduplication activities This topics in this section describe how to use collect and analyze ProtecTIER backup and deduplication data Analyze Sessions is a utility used to monitor the da...

Page 186: ...ormat is YYYY MM DD HH MM e g 2006 09 30 05 23 The processed times are startTime time endTime e End date Date format is YYYY MM DD HH MM e g 2006 09 30 05 23 The processed times are startTime time endTime o output file name The output data is dumped into this file instead of output on the screen min Minimal output displays all with the grand totals and headers The daily and hourly flags are overri...

Page 187: ...y 03 01 2013 16 27 This output was generated by analyze_sessions and contains proprietary information of International Business Machines Corporation c Copyright International Business Machines Corporation 2013 All rights reserved Name Total data TB Total data GB System change rate Factoring ratio compressed Bytes Count GB start time end time Grand totals all 0 146472 149 988 35 13 2 84659 31 2975 ...

Page 188: ...ion statistics Statistic Description Total data TB Total amount of data backed up during the session in terabytes Total data KB Total amount of data backed up during the session in kilobytes System change rate Percentage of nominal data in the backup session that was factored and recognized as changed relative to the previous backup session Factoring ratio The factoring ratio is the deduplication ...

Page 189: ...port v Disabling defragmentation Enables you to stop the defragmentation process For more information see Disabling defragmentation v Disabling compression Enables you to stop the data compression process For more information see Disabling data compression on page 170 v Changing the HyperFactor mode Enables you to stop the HyperFactoring process For more information see Changing the HyperFactor mo...

Page 190: ...system stores runtime information in a cyclic memory buffer A trained ProtecTIER specialist might direct you to dump the trace buffer for analysis set the trace recording levels or reset the trace buffer Note You can manage the trace buffer for only one node at a time Dumping the trace buffer Complete this task to create a file of the trace buffer contents for a specified node and save it to the P...

Page 191: ...oblematic Perform the following steps to set the trace levels for a specified node Procedure 1 From the Systems Management view select a node in the navigation pane 2 Choose Node Trace Set trace levels The Set trace levels window is displayed 3 Change the trace level settings as directed by IBM Support 4 Click Ok The Set trace levels window closes and the new trace levels are set Resetting the tra...

Page 192: ... Log and Events Log dialogs only display information for one node at a time In addition the Alerts Log and Events Log dialogs only display up to 200 alert events at one time Navigate to a previous set of 200 alert events by clicking Previous lines Navigate to a later set of 200 alert events by clicking Next lines Note View the error log directly on a ProtecTIER server by opening the pt_work log vt...

Page 193: ...d free of errors that require fsck Running the ProtecTIER Manager check and recovery wizard on inconsistent file systems can impair the consistency of the repository Checking for errors requiring fsck Complete this task to check for file system consistency About this task The purpose of this task is to discover all error messages that indicate the need to run fsck Perform the following steps to ch...

Page 194: ...ropriate file system names and determine their mount points The following output file is an example of the system output when you run gfs_tool df The file system name is in bold and the mount point name is italicized mnt vgfs0113 lvfs0113 SB lock proto lock_dlm SB lock table lurebimepegoco gfs_0113 SB ondisk format 1309 SB multihost format 1401 Block size 4096 Journals 3 Resource Groups 16384 Moun...

Page 195: ...procedure that is described in Running fsck on page 176 Procedure 1 Select one of the ProtecTIER nodes 2 At the login prompt log in with the ID root and the password admin 3 Shut down the vtfd and ptcluster services in the following order service vtfd shutdown service ptcluster shutdown Attention Make sure to use the shutdown option and not the stop option If you use stop the services restart auto...

Page 196: ... the password admin 3 Type menu on the command line and press Enter The ProtecTIER Service main menu appears ProtecTIER Service Menu running on rasddx 1 ProtecTIER Configuration 2 Manage ProtecTIER services 3 Health Monitoring 4 Problem Alerting 5 Version Information 6 Generate a service report 7 Generate a system view 8 Update ProtecTIER code 9 ProtecTIER analysis E Exit Your choice 4 Select Mana...

Page 197: ...d etc pt dont_start_ptcluster so that these services begin again when you restart the node rm f etc pt dont_start_vtfd rm f etc pt dont_start_ptcluster 11 Restart the node reboot nf 12 Restart the inactive node ProtecTIER is now up and running 13 Send the fsck output to trained ProtecTIER specialist to determine the next step Checking and repairing with ProtecTIER Manager After any problematic fil...

Page 198: ...isplayed with the results of the scan Results The Diagnostic results pane displays each element of the ProtecTIER system in one of the following lists v Positive checks no errors v ProtecTIER recoverable errors has errors that the ProtecTIER system might be able to repair v Support required errors has errors that cannot be repaired by the ProtecTIER system without the assistance of a trained Prote...

Page 199: ...n your system for errors and repair them Once the process completes you will be able to generate a file to help locate the cartridges that might contain corrupted data Near online check and recovery process Near online check and recovery consists of three stages Stage 1 Pre Recover This stage is performed offline All ProtecTIER structures are scanned and checked for inconsistency and data integrit...

Page 200: ... Category subpane filter the list contents by selecting individual categories Categories that contain errors of the type ProtecTIER recoverable errors feature an empty check box What to do next If you receive a message about missing blocks when running the near online check and recover process you can run the opt dtc app sbin scan_for_suspected_carts script to locate potentially harmed cartridges ...

Page 201: ...Part 4 System recovery procedures This section of the guide describes the system recovery procedures Copyright IBM Corp 2012 2016 181 ...

Page 202: ...182 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 203: ...pieceAbstracts sg248025 html Open The recovery process described in these topics define the customer responsibilities and includes the following procedures 1 Preparing to reload a node 2 Installing the Red Hat Enterprise Linux Advanced Platform operating system v5 11 3 Installing the ProtecTIER code v3 4 4 Recovering a server for use with the TS7650G 5 Activating ProtecTIER Replication Manager if ...

Page 204: ...e reloading Procedure 1 Power on the server if it is not already powered on 2 Insert the IBM ProtecTIER Maintenance and Recovery Disk into the DVD CD ROM drive on the server ts761289 IBM System Storage ProtecTIER Maintenance Recovery Disk for 3958 AP1 DDx 3959 SM1 SM2 TS7610 TS7620 TS7650 TS7650G Engineering RHEL5 6 NoQlgLpfc SMB PT 7 05 x86_64 DTC iso 3 Reboot the server by entering in the follow...

Page 205: ...Media 0C588DB8 6AF4 1 1DD A992 00197D890238 OC Move Highlight Enter Select Entry Esc Exit 4 After a few minutes the Red Hat Linux version 5 11 splash screen opens At the text prompt at the bottom of the screen there are options for install or upgrade 5 Type 1 to select the Install option 6 Type yes to confirm the installation and press Enter to view the license agreement Chapter 18 ProtecTIER syst...

Page 206: ...te If you do not remove the disk during the reboot cycle it will attempt to boot to the Recovery DVD again and as long as no option 1 install or 2 upgrade is selected it will time out and boot to the hard drives in the server that were just reloaded 11 At the login prompt log in with the ID ptconfig and the password ptconfig 12 The slim version of the ProtecTIER Service menu is displayed ts760996 ...

Page 207: ...llation is complete the process will restart the cluster services It may take several minutes or longer You are prompted to restart the server Press Enter to restart 20 When the reboot completes the login prompt is shown Verify the Microcode version on the server by using the ProtecTIER Service menu a At the login prompt log in with the ID ptconfig and the password ptconfig b The ProtecTIER Servic...

Page 208: ...plete this task to recover the configuration of a replaced server as part of the recovery process Procedure 1 After the system boots up from installing the ProtecTIER package type ptconfig at the login as prompt and ptconfig at the password prompt The ProtecTIER Service Menu is displayed 2 From the ProtecTIER Service Menu select ProtecTIER Configuration Type the corresponding number and press Ente...

Page 209: ...splayed Meaning the system will identify the components installed and make a determination of the model you are trying to recover The following sample output is displayed ProtecTIER Service Menu running on rasddx ProtecTIER Configuration 1 Configure ProtecTIER node 2 Recover Configuration for a replaced server 3 Configure machine serial number for a replaced server 4 Configure RAS 5 Update Time Da...

Page 210: ...vices please wait Stopping Cluster Services Done Services stopped Checking BOM Done Checking for existing nodes Done Comparing mapped devices Done Checking Application Interfaces Done NOTICE In order to continue the ProtecTIER Services must be stopped on the other node Would you like To Stop the ProtecTIER services on the other node Checking repository Done Checking installed applications Done Che...

Page 211: ...igurationBackup zip v Using an accessible repository that was once a member of a grid Model TS7650_DS4700_128_450 Option 1 node id 2 hostname pinsk ip 9 148 220 155 Select option 1 Recoverable static routes configuration found would you like to restore it yes no yes Recovering Static Routes Done Configuring network Done Configuring Replication Network Done Restarting Network Service Done Stopping ...

Page 212: ...e deleted To manually back up the configuration files Procedure 1 From the Grids Management view select Replication Manager Backup configuration files The Backup configuration files dialog is displayed 2 Enter the customer name in the Customer name field for which to provide backup information and click Ok A message is displayed that the backup zip file was saved on the ProtecTIER Replication Mana...

Page 213: ...ion for a replaced server 3 Configure machine serial number for a replaced server 4 Configure RAS 5 Update Time Date Timezone Timeserver s 6 Scan storage interconnections 7 File Systems Management 8 Configure replication 9 IP Network configuration 10 Update Firmware 11 Update the system s name 12 Validate configuration 13 Single Node code upgrade 14 OS images Management 15 Replace SAS drive B Back...

Page 214: ...utomatically handles grid analysis Grid analysis validates and checks the integrity of the grid in relation to its grid members To begin restoring a grid import a grid for analysis by selecting one of the tabs appearing on the Restore grid window v File see The File tab v IP Address see The IP Address tab on page 195 The File tab The following task describes how to restore the Replication Manager ...

Page 215: ...t the IP Address tab 3 Enter the Replication IP address of the accessible repository that was previously a member of the grid 4 Click Analyze grid The grid analysis is displayed 5 Click Restore The current grid is restored What to do next If there are inconsistencies and ProtecTIER Replication Manager does not recognize the repository as part of the grid proceed with Forcing a repository to leave ...

Page 216: ...ht not recognize the repository as part of the grid The repository will therefore be marked as inconsistent and must be forcibly removed from the replication grid via the Grids Management view Procedure From the Grids Management view select Repository Uncoordinated repository removal to forcibly remove a repository from a grid Note If this procedure is being performed in a Disaster Recovery DR mod...

Page 217: ...Part 5 Appendixes Copyright IBM Corp 2012 2016 197 ...

Page 218: ...198 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 219: ...ative can then prepare an action plan to handle the problem before traveling to your site The TS7650G provides four Call Home capabilities Problem Call Home Heartbeat Call Home Test Call Home and User Initiated Call Home descriptions follow RAS sends data files that may be helpful to IBM Support Center personnel for all four types of Call Home These data files include error logs and configuration ...

Page 220: ...v Call Home through the TSSC 200 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 221: ... Palmer Station Anvers Island AQ Antarctica Mawson Mawson Station Holme Bay AQ Antarctica Davis Davis Station Vestfold Hills AQ Antarctica Casey Casey Station Bailey Peninsula AQ Antarctica Vostok Vostok Station S Magnetic Pole AQ Antarctica DumontDUrville Dumont d Urville Station Terre Adelie AQ Antarctica Syowa Syowa Station E Ongul I AR America Argentina Buenos_Aires Buenos Aires BA CF AR Ameri...

Page 222: ...a AX Europe Mariehamn AZ Asia Baku BA Europe Sarajevo BB America Barbados BD Asia Dhaka BE Europe Brussels BF Africa Ouagadougou BG Europe Sofia BH Asia Bahrain BI Africa Bujumbura BJ Africa Porto Novo BL America St_Barthelemy BM Atlantic Bermuda BN Asia Brunei BO America La_Paz BR America Noronha Atlantic islands BR America Belem Amapa E Para BR America Fortaleza NE Brazil MA PI CE RN PB BR Ameri...

Page 223: ...unavut most locations CA America Pangnirtung Eastern Time Pangnirtung Nunavut CA America Resolute Eastern Time Resolute Nunavut CA America Atikokan Eastern Standard Time Atikokan Ontario and Southampton I Nunavut CA America Rankin_Inlet Central Time central Nunavut CA America Winnipeg Central Time Manitoba west Ontario CA America Rainy_River Central Time Rainy River Fort Frances Ontario CA America...

Page 224: ... Urumqi most of Tibet Xinjiang CN Asia Kashgar west Tibet Xinjiang CO America Bogota CR America Costa_Rica CU America Havana CV Atlantic Cape_Verde CX Indian Christmas CY Asia Nicosia CZ Europe Prague DE Europe Berlin DJ Africa Djibouti DK Europe Copenhagen DM America Dominica DO America Santo_Domingo DZ Africa Algiers EC America Guayaquil mainland EC Pacific Galapagos Galapagos Islands EE Europe ...

Page 225: ... Scoresbysund Ittoqqortoormiit GL America Thule Thule Pituffik GM Africa Banjul GN Africa Conakry GP America Guadeloupe GQ Africa Malabo GR Europe Athens GS Atlantic South_Georgia GT America Guatemala GU Pacific Guam GW Africa Bissau GY America Guyana HK Asia Hong_Kong HN America Tegucigalpa HR Europe Zagreb HT America Port au Prince HU Europe Budapest ID Asia Jakarta Java Sumatra ID Asia Pontiana...

Page 226: ...P Asia Pyongyang KR Asia Seoul KW Asia Kuwait KY America Cayman KZ Asia Almaty most locations KZ Asia Qyzylorda Qyzylorda Kyzylorda Kzyl Orda KZ Asia Aqtobe Aqtobe Aktobe KZ Asia Aqtau Atyrau Atirau Gur yev Mangghystau Mankistau KZ Asia Oral West Kazakhstan LA Asia Vientiane LB Asia Beirut LC America St_Lucia LI Europe Vaduz LK Asia Colombo LR Africa Monrovia LS Africa Maseru LT Europe Vilnius LU ...

Page 227: ...yre MX America Mexico_City Central Time most locations MX America Cancun Central Time Quintana Roo MX America Merida Central Time Campeche Yucatan MX America Monterrey Central Time Coahuila Durango Nuevo Leon Tamaulipas MX America Mazatlan Mountain Time S Baja Nayarit Sinaloa MX America Chihuahua Mountain Time Chihuahua MX America Hermosillo Mountain Standard Time Sonora MX America Tijuana Pacific...

Page 228: ...lau PY America Asuncion QA Asia Qatar RE Indian Reunion RO Europe Bucharest RS Europe Belgrade RU Europe Kaliningrad Moscow 01 Kaliningrad RU Europe Moscow Moscow 00 west Russia RU Europe Volgograd Moscow 00 Caspian Sea RU Europe Samara Moscow 01 Samara Udmurtia RU Asia Yekaterinburg Moscow 02 Urals RU Asia Omsk Moscow 03 west Siberia RU Asia Novosibirsk Moscow 03 Novosibirsk RU Asia Krasnoyarsk M...

Page 229: ...ST Africa Sao_Tome SV America El_Salvador SY Asia Damascus SZ Africa Mbabane TC America Grand_Turk TD Africa Ndjamena TF Indian Kerguelen TG Africa Lome TH Asia Bangkok TJ Asia Dushanbe TK Pacific Fakaofo TL Asia Dili TM Asia Ashgabat TN Africa Tunis TO Pacific Tongatapu TR Europe Istanbul TT America Port_of_Spain TV Pacific Funafuti TW Asia Taipei TZ Africa Dar_es_Salaam UA Europe Kiev most locat...

Page 230: ...iana Perry County US America Indiana Petersburg Central Time Indiana Pike County US America Menominee Central Time Michigan Dickinson Gogebic Iron Menominee Counties US America North_Dakota Center Central Time North Dakota Oliver County US America North_Dakota New_Salem Central Time North Dakota Morton County except Mandan area US America Denver Mountain Time US America Boise Mountain Time south I...

Page 231: ...e zone Comments VN Asia Saigon VU Pacific Efate WF Pacific Wallis WS Pacific Apia YE Asia Aden YT Indian Mayotte ZA Africa Johannesburg ZM Africa Lusaka ZW Africa Harare Appendix B Worldwide time zone codes 211 ...

Page 232: ...212 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 233: ... send your request to the following address International Business Machines Corporation Information Development Department GZW 9000 South Rita Road Tucson Arizona 85744 001 U S A In the request be sure to include the publication number and title When you send information to IBM you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurr...

Page 234: ...214 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 235: ...THER EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF NON INFRINGEMENT MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE Some states do not allow disclaimer of express or implied warranties in certain transactions therefore this statement may not apply to you This information could include technical inaccuracies or typographical errors Changes are periodically made to th...

Page 236: ...strate them as completely as possible the examples include the names of individuals companies brands and products All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental Trademarks The following terms are trademarks of the International Business Machines Corporation in the United States other countries or both v...

Page 237: ...ks of others Electronic emission notices This section contains the electronic emission notices or statements for the United States and other regions Federal Communications Commission statement This explains the Federal Communications Commission s FCC statement This equipment has been tested and found to comply with the limits for a Class A digital device pursuant to Part 15 of the FCC Rules These ...

Page 238: ...o interference in which case the user might be required to take adequate measures Responsible Manufacturer International Business Machines Corp New Orchard Road Armonk New York 10504 914 499 1900 European community contact IBM Deutschland GmbH Technical Regulations Department M372 IBM Allee 1 71139 Ehningen Germany Tele 49 7032 15 2941 e mail lugi de ibm com Australia and New Zealand Class A State...

Page 239: ...e elektromagnetische Verträglichkeit von Geräten EMVG Dies ist die Umsetzung der EU Richtlinie 2004 108 EG in der Bundesrepublik Deutschland Zulassungsbescheinigung laut dem Deutschen Gesetz über die elektromagnetische Verträglichkeit von Geräten EMVG bzw der EMC EG Richtlinie 2004 108 EG für Geräte der Klasse A Dieses Gerät ist berechtigt in übereinstimmung mit dem Deutschen EMVG das EG Konformit...

Page 240: ...ontains the product service contact information for Taiwan IBM Taiwan Product Service Contact Information IBM Taiwan Corporation 3F No 7 Song Ren Rd Taipei Taiwan Tel 0800 016 888 Japan Voluntary Control Council for Interference VCCI Class A Statement f2c00790 220 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 241: ...tion Technology Industries Association JEITA Statement less than or equal to 20 A per phase Korean Communications Commission KCC Class A Statement Russia Electromagnetic Interference EMI Class A Statement jjieta1 rusemi Notices 221 ...

Page 242: ...222 IBM TS7650G Deduplication Gateway for ProtecTIER User s Guide for FSI Systems ...

Page 243: ...ics 56 ServerVersion 56 completing ProtecTIER system setup 9 compression disabling 170 configuration cluster setup 4 one node system 4 two node system 4 Configuration file backups 192 configuring ProtecTIER server 10 Configuring IP interfaces 11 configuring replication using the ProtecTIER Service Menu 21 configuring static routes 14 Configuring the ProtecTIER server 10 connecting to 86 CRC changi...

Page 244: ...ies 41 user accounts 33 Managing replication grid 100 marginal HyperFactor ratio graph 131 message area 172 model numbers xiii modifying trace buffer 170 modifying FSI replication policies 108 monitor default password 40 monitoring backup operations 166 file system 135 file system configuration 137 138 HyperFactor 132 logical storage units 126 NFS export configuration 138 ProtecTIER FSI performanc...

Page 245: ...eplication group adding a single node repository 104 adding a single node repository to existing replication group 104 adding a single node repository to new replication group 104 adding removing repositories 105 creating a group 103 modifying 105 Replication group creating 103 creating replication groups 103 working with replication groups in FSI 103 replication IP address Updating the Replicatio...

Page 246: ...grading ProtecTIER Manager 25 user account adding 34 deleting 34 overview 33 user password changing 35 User s management for workgroups 80 username default 40 utilization graph 130 V View pane refreshing 35 Virtual Tape service see VT service 3 volume name of file systems 174 VT service 3 W Wizard error messages 172 Wizard message area 172 Workgroup authentication migrating to Active Directory 86 ...

Page 247: ......

Page 248: ...IBM Printed in USA GA32 2235 08 ...

Reviews: