Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
98 views27 pages

Spectrum - Protect - PoC - Virtual - Appliance - V8.1.4 - Users Guide

Uploaded by

sp163
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views27 pages

Spectrum - Protect - PoC - Virtual - Appliance - V8.1.4 - Users Guide

Uploaded by

sp163
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

IBM Spectrum Protect

Downloading, installing and using the


IBM Spectrum Protect Trial Virtual Appliance

Jan 2018

1
Note: Before using this information or the products that it supports, read the information in the Notices section.

Revision 2.1.1.17 – June 24, 2015.


Revision 8.1.4 – Jan 02, 2018.

© Copyright International Business Machines Corporation 2015-2018.


US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.

2
Introduction
The IBM Spectrum Protect Trial Virtual Appliance v8.1.4 is a virtual machine that
contains the Spectrum Protect Server and Operations Center v8.1.4.

All four components are pre-configured and pre-installed. The virtual machine is
provided as an OVF (Open Virtualization Format) file, which allows importing into
any hypervisor that is compliant to the open industry standard described here:
http://en.wikipedia.org/wiki/Open_Virtualization_Format.

This distribution has only been thoroughly tested on VMware vSphere, but minor
testing has been done on VMware Workstation and Oracle VirtualBox.

Running these software components within a virtual machine allows the functionality of Spectrum Protect to be proven and
tested without having to dedicate a physical machine to this task.

Minimum Requirements
• An existing virtualization environment, referred to as a hypervisor. Only VMware vSphere has been thoroughly tested.
• 20 GB temporary disk space
• 10 GB free disk space available to the hypervisor for importing the virtual machine
• 200 GB disk space for using the Spectrum Protect software packages that are installed within the virtual machine (default
configuration). Additional space is required for backups. The default setting is for backups to be both deduplicated and
compressed, so the total amount of storage space will be lower than the total amount of data protected. For planning pur-
poses, you can assume a 4 to 1 deduplication/compression efficiency. You will need to monitor the environment to see
what your actual rates will be.
• 24 GB memory allocated to the VM
• 8 CPU cores allocated to the VM

Note: The small Spectrum Protect Blueprint specifies 64GB of memory for the physical machine it describes. If you want to
approximate the capabilities described in the Spectrum Protect Blueprint document, you must match the system resources of the
VM as closely as possible to those described in that document. Details on the Spectrum Protect Blueprint specifications can be
found on DeveloperWorks at
https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/Tivoli%20Storage%20Manager/
page/IBM%20Spectrum%20Protect%20Blueprints

Specifications
The operating system is SUSE Enterprise Server 11 for VMWare (64 bit), and the size of the virtual machine is approximately
11 GB (when imported as thin disk). After importing into the hypervisor, the virtual machine will expand to 12 virtual disks,
consume 64 GB of memory, and allocate 12 CPUs. The Trial Virtual Appliance is designed to match the specifications of the
small Spectrum Protect server Blueprint. If your environment has fewer resources, you can reduce them. It is not recommended
to reduce lower than 24 GB of memory and 8 CPUs, which is the total of minimum resources needed to run all the included
software together. The FAQ portion of this document includes details on the resources for individual components within the
appliance.

Obtaining and Deploying the Trial Virtual Appliance


Download and extract the files
The Spectrum Protect Trial Virtual Appliance is compressed into multiple files of equal size to allow for easier multi-stream
download. The sum of the compressed files is approximately 4 GB.
1. The following link is the Developworks community on the Spectrum Protect Trial Virtual Appliance. You can always find
this page by searching for “Spectrum Protect Trial Virtual Appliance” on Developerworks.
https://www.ibm.com/developerworks/community/groups/community/TSMVirtualAppliance
2. Extract the first file using a compression tool, such as 7-Zip, WinRAR or ExtractNow. After the extraction, you will find a
directory with approximately 18 unzipped files.

3
Import the virtual machine
Import the virtual machine using the OVF-Import function of your hypervisor. Point the import function to the OVF file in the
directory where you extracted the files. Note that the OVF file specifies a network interface card of type VMXNET3, which is
a proprietary VMware high-performance paravirtualized device available on ESX-based environments. If you are importing
into a non-ESX environment, such as another hypervisor platform or VMware workstation, you can use a more universal E1000
virtual adapter in place of the faster VMXNET3 adapter. An OVF/MF pair with more generic settings are included (named
*E1000.OVF/*E1000.MF).

When importing the virtual appliance into vSphere, you will be presented a set of pages by the import wizard, some of which
are standard to importing any VM and some of which are specific to the appliance.

When you select the task to Deploy an OVF Template, you will first be asked to provide the URL or file system location for the
template. Use the Browse button to navigate to the location you have stored and unzipped the downloaded appliance and select
the OVF file.

The next page will present details about the appliance for you to review.

The following page requires that you accept the IBM, SUSE license and any other embedded software agreements before you
can proceed. You will need to click the Accept button once for each EULA and then Next.

The subsequent page allows you to specify the name the VM will be given and the location in your infrastructure it will be im-
ported into.

The next page allows you to import the virtual disks and specify the datastore. When importing the virtual machine, you may
be presented options on whether to import Thin disk, Thick disks with Lazy Zero-ing or Thick disks with Eager Zero-ing. Thin
disks and Lazy Thick disks deploy very quickly, and the only real difference is that the Lazy Thick disks will reserve their space
when the disk is created. Eager Thick disks, however, will initialize all their blocks during deployment. This can take several
hours per disk, so unless you have an important reason for doing so, do not select Eager Thick disks when importing this virtual
machine. A section discussing achieving higher performance by relocating disks to different datastores can be found later in
this document.

The following page allows you to specify which network the pre-defined NIC can be found upon. This appliance has a single
NIC and all the included automation will configure the first NIC as needed. If you wish to have multiple NICs, there is no rea-
son you cannot, but the integral automation will not be aware of them or manage them.

The next page, named Customize Template is very important as it is where you will specify how this appliance will function and
what its network identity will be. The following checkboxes and text fields are on this page:
• Enable Spectrum Protect Server? Check this box if you wish the Spectrum Protect server to be enabled to run within
this appliance.
• Enable Local Spectrum Protect Operations Center? Check this box if you wish the Spectrum Protect Operations to
be enabled to run within this appliance.
• Spectrum Protect Instance Name: The Spectrum Protect Server Name, by default, will be set to the same as the host-
name (shortname). If you wish, you can type any text to set the ServerName to that value. You can also uses the fol-
lowing keywords that refer to part of the network identify of the appliance:
▪ ^shortname – hostname or first qualifier of Fully Qualified Domain Name (fqdn).
▪ ^fqdn_full – full Fully Qualified Domain Name
▪ ^fqdn[#] – Qualifier of FQDN specified by # (starting at zero). For example, fqdn[0] is the first qual-
ifier in fqdn, fqdn[1] is the second, etc.
▪ ^search_domain_full – Full search domain qualifier either specified or provided by DHCP.
▪ ^search_domain[#] – Qualifier in search domain specified by # (starting at 0).
▪ ^dns_server_full – Full network name of first DNS server.
▪ ^dns_server[#] – Qualifier of first DNS server, specified by # (starting at 0).
▪ ^dns_server_ip – IP address of first DNS server.
▪ ^default_gateway_full – Full Default Gateway network name (note when using DHCP, the default
gateway is most likely not available to this utility).
▪ ^default_gateway[#] – Qualifier of default gateway network name, specified by # (starting at 0).
Note: when using DHCP, the default gateway is most likely not available to this utility.
▪ ^default_gateway_ip – IP address of default gateway. Note: when using DHCP, the default gateway
is most likely not available to this utility.
An example of using this feature would be to set the value to “Spectrum Protectserver.fqdn[1].fqdn[2]”. If the
FQDN of the appliance is Spectrum Protect1.company.com, then the Spectrum Protect servername would be
Spectrum Protectserver.company.com. Note that there is a 64-character limit to the Spectrum Protect server

4
instance name and if the length is greater, it will be truncated to 64 characters. The first 21 characters of the
Spectrum Protect server instance name will be used in the Spectrum Protect Policy Domain names.
The following are in the Networking Properties section, accessed by clicking on the twisty:
• Hostname – The hostname of the machine. If you do not specify and dynamic DNS does not set it, the default is
tapsrv05.
• Domain Name – The network domain name of the machine. If you do not specify and dynamic DNS does not set it,
the default is ibmlab.ibm.com.
• Network 1 IP Address – IP Address of the single NIC defined to the machine. Leave blank to use DHCP.
• Network 1 Netmask – Network Netmask of the single NIC defined to the machine. Leave blank to use DHCP.
• Default Gateway – Default Gateway of the single NIC defined to the machine. Leave blank to use DHCP.
• DNS1 – First DNS server. Leave blank to use DHCP.
• DNS2 – Second DNS server. Leave blank to use DHCP (or only have one static DNS server).

The final page allows you to review your settings and, if they are correct, click Finish to start importing the VM. It will likely
take between 5 and 20 minutes, depending upon the speed of your environment to import the machine.

After you import the machine, you may wish to edit its settings to review the memory and CPU requirements that are default for
this machine. In many test environments, these have to be reduced.

First power-up of the virtual machine


When you are ready, start the virtual machine. When you first power up the machine, go to its console and wait until it displays
an IP address for the machine (see Figure 1 - Spectrum Protect Appliance Console). When you receive that, point a web
browser to https://ip_address and log in with appliance_user/passw0rd.

Figure 1 - Spectrum Protect Appliance Console

This will take you to the appliance management web application. For approximately 10 to 20 minutes, this console will simply
tell you to stand by while the appliance configures itself (see Figure 2).

5
Figure 2 - Web Application Showing VM is Configuring Itself.

After the appliance has completed its initial configuration, the Start page of the web appliance will then display the status of
the Spectrum Protect server and Spectrum Protect for Virtual Environments control service (note VE will not be embedded
starting at v8.1.4). There will be 2 sections, each with a large blue button to launch the appropriate management interface as
well as give a summary of the status of those software components (see Figure 3).

Figure 3 - Appliance Management Application Start Page

The overall status of the Spectrum Protect server will show as healthy,
warning or error. If you hover over the status indicator, a pop-up will show
what tests were performed to quantify the health of the Spectrum Protect
server and the results of those tests.

Now you have completed the importing, configuration and initial power-up
of the virtual appliance. Using the Start page, you can also launch the Spec-
trum Protect Operations Center.

6
You are probably done, now…
In almost all cases, the virtual appliance is now deployed and operational, and you can now proceed to the next phase of your
testing and evaluation. The remainder of this document discusses various topics that may be of interest to someone exploring
the use of the appliance, but don’t expend any additional time here, unless one of those topics is of interest to you.
Thank you for using this Virtual Appliance and please let us know on the DeveloperWorks forum how it met your needs.

7
Spectrum Protect Virtual Appliance Miscellaneous Topics

Managing the Appliance and General Problem Determination


Starting in version 2.1, the Spectrum Protect Virtual Appliance included an internal web management application. This is a
very basic web application intended to surface some key configuration options, basic appliance operations as well reflect the
general health of the key software running on the appliance. The web application has 5 pages accessible from the navigation
bar at the top. They are:
• Start – initial page that shows the overall status of the Spectrum Protect server and Spectrum Protect for VE control
service, as well as 2 large blue buttons to launch into the interfaces for those products. We have already discussed
the Start page so no additional information is in this section.
• Service Dashboard – shows the basic statistics and status of the different components installed within the appliance
and allows you to configure and control each of them.
• Spectrum Protect Admin CLI – a Spectrum Protect administrative command line interface wrapper.
• Support Assistant – this page is not yet enabled, but will provide an interface to allow downloading logs, running trac-
es, etc.
• System Settings – basic network settings for the appliance as well as buttons to restart or stop the appliance.

Service Dashboard
The services dashboard page allows you to see basic information about the services defined to run on the appliance as well as
buttons to link that allow you to control and configure each of them. Not all parameters for all of the software is surfaced in
these pages. All told, there is the one page and 6 sub-pages (one each for control and configure for the Spectrum Protect
Server/OC, the VE Control Service and the VE DataMover Services. Below is the main page, but we will not detail each of
the 6 sub-pages, except for the Spectrum Protect server configuration page since their operation is largely self-explanatory.

Figure 4 - Appliance Services Dashboard Page

The Spectrum Protect server configuration page allows you to enable Spectrum Protect Node Replication between more than
one instance of the appliance. On either the primary or secondary instance, navigate to the Spectrum Protect configuration

8
panel and enable Node Replication, identify the role of the local Spectrum Protect server and enter information about the other
Spectrum Protect server (see Figure 5).

Figure 5 - Spectrum Protect Server and OC Configuration Panel

Spectrum Protect Admin CLI


The web-based administration console has a Spectrum Protect Administrative CLI. This is a simple and not particularly ro-
bust interface. You can submit Spectrum Protect commands using either a built-in analyst or system-level account and get the
output in a variety of formats. This is a simple web-based interface which has not undergone significant development effort.
If a command seems to not have been sent correctly, you may need to right-click on the black area of the screen and refresh
the frame. When a command is issued and generates output, the hyperlink “Output” will allow you to download a zip file
containing that output. In general, it is recommended to use the production-quality CLI that is part of the OC, not this utility.

Support Assistant
This page is not functional in the current version of the appliance.

System Settings
This page allows you to change the network parameters of the appliance, as well as shut it down or reboot it (see Figure 6).

9
Figure 6 - Appliance System Settings Page

Problem Determination
The important thing to remember when diagnosing problems with the virtual appliance is that it is simply a SUSE Enterprise
Linux Machine running Spectrum Protect server, Operations Center and Spectrum Protect for VE/FCM for VMware. In other
words, the standard problem determination for any other Linux machine running that software are valid for the appliance as
well. All software is installed in its default location.
Appendix B: Troubleshooting and FAQ contains more information about log locations, user accounts, setting up a more ad-
vanced network, etc.

Place the disk files for optimal performance


A disk-based Spectrum Protect server contains multiple types of disk files that serve different purposes, all of which are im-
portant to a healthy Spectrum Protect environment. The Spectrum Protect server includes an IBM DB2 database that has data-
base files, active transaction log files and archive transaction log files. The disk-based storage pools, and device classes are
used as a target for both Spectrum Protect client backup operations and as a target for the Spectrum Protect database backup.

Optimally, every environment would have large amounts of fast disk available so that each Spectrum Protect disk workload
could be isolated from one another and easily deployed to the ideal disk storage. However, in shared disk environments, it can
be very difficult to find the necessary free disk. Also, vSphere and vCloud Director environments only allow the initial import
of VMs into a single datastore target.

It is easiest to leave the VM deployed into a single datastore (see Figure 7). Performance tests have confirmed that a reasona-
ble level of performance can be achieved in this configuration, assuming the disk can support that performance. Initial tests
with a datastore placed over 45 10K SAS drives proved that the Spectrum Protect server was able to ingest data at over 700
GB per hour (128K objects). So, a Spectrum Protect server deployed in this manner will be able to provide reasonable per-
formance. Keep in mind that the data profile of the data being protected and any other workloads that are sharing the datastore
will impact performance. For testing purposes, we configured the VM on a slower disk configuration (4 x 7200K SATA disks
configured as a RAID 10 stripe/mirror set). This configuration was not fast enough to really simulate a production environ-
ment, but it did allow all functions to be evaluated, without an unbearable lag.

10
Virtual Machine Disks vSphere DataStores

OS and App. Disk (1)

Swap Disk (1)

/tmp directory disk


(1)

Database and Active


Log Disk (1)

Database Archive Log


Disk (1)

DB Backup Target
Disks (2)

Backup Target Storage


Pool Disk (5)

Figure 7 - Placing all virtual disks into a single datastore is the easiest deployment option, but not the fastest.

For optimal performance, the disks that contain these files will be isolated from one another by having each of the virtual
disks defined to the virtual machine and stored in their own vSphere datastore (see Figure 8). If the disk containing those
datastores is configured as outlined in the Spectrum Protect Blueprint documentation, the virtual machine will approximate the
performance described in the small Spectrum Protect Blueprint specification. After initial deployment, the disks can be mi-
grated while the VM is stopped or VMware Storage vMotion can be used while the machine is up and running.

11
Virtual Machine Disks vSphere DataStores

OS and App. Disk (1)

Swap Disk (1)

/tmp directory disk


(1)

Database and Active


Log Disk (1)

Database Archive Log


Disk (1)

DB Backup Target
Disks (2)

Backup Target Storage


Pool Disk (5)

Figure 8 - A one-to-one relationship between virtual disks and datastores yields an optimal configuration, but
can be difficult to achieve in most environments.

Mapping each virtual disk to its own datastore which is configured like the small Spectrum Protect Blueprint is optimal, but
most target environments will not support that level of isolation. In those cases, it is possible to separate the virtual disks by
their function within Spectrum Protect by deploying disks with different I/O profiles into different datastores.

For example, those disks that support the database, the active logs, the archive logs and the two storage pools should be isolat-
ed from one another and placed in their own datastore (see Figure 9). Because the archive logs and storage pools have similar
I/O profiles, they can be placed in the same datastore as one or both storage pools, if necessary.

12
Virtual Machine Disks vSphere DataStores

OS and App. Disk (1)

Swap Disk (1)

/tmp directory disk


(1)

Database and Active


Log Disk (1)

Database Archive Log


Disk (1)

DB Backup Target
Disks (2)

Backup Target Storage


Pool Disk (5)

Figure 9 - Consolidating virtual disks into virtual datastores, by I/O Profile

Deploying the Appliance with another hypervisor platform


In the section that discussed importing the appliance to a hypervisor other than vSphere, we discussed using the OVF/MF with
E1000 in order to use a more generic hypervisor (like VMware Workstation). If you wish to test a more advanced automated
deployment method, you can use your cloud deployment engine to pass OVF properties to the virtual appliance. By default, it
will check on the machines virtual CD drive for a file named ovf-env.xml and parse that file looking the required parameters.
In the directory structure /opt/tivoli/Spectrum Protect/appliance/firstboot_scripts you will find a subdirectory named
02_gather_data. Any subdirectory located in 02_gather_data that includes a file named gatherdata.pl or gatherdata.sh will have
that script automatically run at first boot to gather the OVF properties. This allows you to test deployment of this appliance
with any cloud deployment solution that allows an appliance to query for OVF properties. You will probably need to modify
the default .ovf file (or use the E1000 version) to work for any given platform. The properties the appliance will look for are:
OVF Property Name: dynamic-vcenter-ip.
OVF Property Name: LocalSpectrum ProtectServerEnabled. Default Value:true
OVF Property Name: LocalOCEnabled. Default Value:true
OVF Property Name: LocalVEGuiEnabled. Default Value:true
OVF Property Name: LocalFCMEnabled. Default Value:false
OVF Property Name: Spectrum ProtectServerName. Default Value:^shortname
OVF Property Name: vCenterAccount.
OVF Property Name: vCenterDomain.
OVF Property Name: vCenterPassword.
OVF Property Name: Hostname.
OVF Property Name: DomainName.
OVF Property Name: gateway. Leave blank to use DHCP
OVF Property Name: DNS. Leave blank to use DHCP

13
OVF Property Name: ip0. Leave blank to use DHCP
OVF Property Name: netmask0. Leave blank to use DHCP
OVF Property Name: vmname. Default Value:Spectrum Protect_Virtual_Appliance

Experimenting with REST and CIM interfaces


This appliance has the Small Footprint CIM Broker (SFCB) installed and active on https port 5989. The http port can be ena-
bled by editing /etc/sfcb. Many standard CIM providers are also installed, allowing a CIM-based management infrastructure to
control the appliance and query its statistics.
A prototype REST interface is also included (qet/query only). It can be enabled and tested using the following instructions:
- Change directory to /opt/tivoli/Spectrum Protect/cms
- Run the command: ./CmsConfig.sh setscriptdir rest /opt/tivoli/Spectrum Pro-
tect/appliance/rest_scripts

- Direct a web browser to the address (with ip_address being the appliances IP address):
https://ip_address:9028/Spectrum Protectcms/backupSystems/rest/extensions/

If you are queried for an account and password, enter a valid Spectrum Protect account such as admin/passw0rd.

You should receive a JSON response from this GET command identifying the extensions defined to this CMS node:
{"extensions":["Spectrum Protectquery.pl"]}

- Issue the GET command to the web browser:


https://ip_address:9028/Spectrum Protectcms/backupSystems/rest/extensions/Spectrum Pro-
tectquery.pl?Spectrum Protectobject=nodes

You should get a JSON response that includes information about all Spectrum Protect Nodes.

- Issue the GET command to the web browser:


https://ip_address:9028/Spectrum Protectcms/backupSystems/rest/extensions/Spectrum Pro-
tectquery.pl?Spectrum Protectobject=nodes?node_name=datamover1

You should get a JSON response that includes information about only a single node, Datamover1.

- Issue the GET command to the web browser:


https://ip_address:9028/Spectrum Protectcms/backupSystems/rest/extensions/Spectrum Pro-
tectquery.pl?Spectrum Protectobject=nodes?node_name=datamover*

You should get a JSON response that includes information about all nodes that start with datamover.

Using this standard html command format, you should be able to query any Spectrum Protect table or object and limit
the output by specifying the values for specific fields. It is important to remember that this is a prototype REST inter-
face only. Any production REST interface in future versions of Spectrum Protect will likely use different field names
and operate in a manner more consistent with web-management standards.

14
Appendix A: Installation Worksheet
Table 1 – The following values will need to be specified when you import the VM.
Variable Default Value Your Value (if not default)
Enable Spectrum Protect Server? Yes (checked)
Enable Local Spectrum Protect Operations Yes (checked)
Center?
Enable Local Spectrum Protect for VE Ser- Yes (checked)
vice?
Enable Local FCM for VMware Service? No (unchecked)
Spectrum Protect Instance Name ^shortname (see page 4 for a list of
possible variable values).
vCenter Login Account None (leave blank if not needed)
vCenter Account Domain None (leave blank if not needed)
vCenter Password None (leave blank if not needed)
Hostname Tapsrv05
Domain Ibmlab.ibm.com
IP Address None (leave blank if DHCP)
Netmask None (leave blank if DHCP)
Default Gateway None (leave blank if DHCP)
DNS Server 1 None (leave blank if DHCP)
DNS Server 2 None (leave blank if DHCP)

15
Appendix B: Troubleshooting and FAQ

Known Issues
None

Frequently Asked Questions


1. How do I manage the appliance?
After the initial configuration, you should not need to access the appliance directly to perform day-to-day tasks. The
Spectrum Protect Operations Center and Spectrum Protect for VE Web GUI are accessible using a web browser. Should
you need to manage the appliance, you can access its web interface at http://ip_address, where ip_address is the address of
the appliance. If you do not know the IP address, you can go to the appliance console and that will be displayed on its
pre-login screen (see Figure 1).

2. Why doesn't the appliance include VMware Tools?


There is nothing inherent in the functionality of the appliance that requires VMware Tools, so this software is not pre-
installed. The required kernel header files and make program are included, so VMware Tools can be installed if desired.
If you install VMware Tools, be sure to reboot the VM and then check the Spectrum Protect server. If the time synchro-
nization feature of VMware Tools has changed the VM's system clock sufficiently, the Spectrum Protect server will disa-
ble its backup and data expiration functions to prevent protected data from being expired or overwritten. You will need to
issue the Spectrum Protect commands accept date and enable sessions all to resolve that problem.

3. How do I get to the system console?


You can access the system console (Linux OS console) in one of two ways:
a) Launch the console from vCenter.
b) SSH into the host.
Either way, you should be able to login as root with a password of passw0rd.

4. The Spectrum Protect server is indicating that it is disabled. What do I do?


There are two main reasons why the Spectrum Protect server contained in the appliance might be disabled.
◦ The Trial period might have expired. If this is the case, you should cease use of the appliance as described in the
IBM software evaluation license. If you must have the use of the appliance for an additional 30 days, contact the
IBM or IBM Business Partner representative that provided you with the appliance for a one-time Trial license exten-
sion.
o The system clock of the VM has been changed. This normally occurs after changing time zones or installing
VMware Tools, which includes time synchronization features. If the system clock changes sufficiently, the Spec-
trum Protect server will disable its backup and data expiration functions to prevent protected data from being expired
or overwritten. To re-enable the Spectrum Protect server, you will need to issue the Spectrum Protect commands
accept date and enable sessions all.

5. The network configuration of the appliance is very basic. How can I reconfigure it?
Open a system console and issue yast2 as root to get the system configuration utility included in SLES. You can invoke
the Network Devices->Network Settings. The topic of configuring a machine's network is beyond the scope of this docu-
ment. If you change the networking, the appliance should operate normally if the machine can perform the following:
◦ If the Spectrum Protect server role is enabled, the appliance must be able to contact itself by IP and hostname.
◦ If the Spectrum Protect for VE DataMover role is enabled, the appliance must be able to contact the vCenter server
by using the network address provided during configuration and contact the protected hypervisors, by using the

16
FQDN.

6. How do I start, stop, or check the services that are running on the appliance?
The Appliance Console has an Appliance Status monitor in the lower-right quadrant. This displays which roles are ena-
bled, if the daemons are active, and if their IP port is opened.
◦ To control the Spectrum Protect server, use the following commands:
service Spectrum Protectinst1 stop
service Spectrum Protectinst1 start
◦ To control the Spectrum Protect Operations Center, use the following commands:
service opscenter.rc stop
service opscenter.rc start
◦ To control the Spectrum Protect for VE GUI, use the following commands (2 components):
service webserver stop
service vmcli stop
service webserver start
service vmcli start
◦ To control the Spectrum Protect client services, use the following commands. The base client is dsmcad and the
datamover services are datamover1 through datamover4, depending upon how many you configured to run.
service dsmcad stop
service dsmcad start
service datamoverX stop (where X is the datamover #)
service datamoverX start (where X is the datamover #)

7. What are the default passwords that are used by the appliance components?
Linux User accounts:
root/passw0rd
Spectrum Protectinst1/passw0rd
Spectrum Protect accounts:
admin/passw0rd
Spectrum Protectconsole/passw0rd
all nodes/passw0rd

8. Can I change the user accounts and passwords?


You cannot change the user accounts at this time. Because the appliance is only currently approved for non-production
workloads, you should not change the passwords. If you must change the passwords, you also have to change any place
where these passwords are stored.
◦ Spectrum Protect Administrative accounts:
The admin administrative account can be changed with the dsmadmc command UPDATE ADMIN. You must also
rerun the configuration wizard within the Spectrum Protect for VE GUI to re-encrypt and save the password that the
interface uses to communicate with Spectrum Protect.
◦ Spectrum Protect node accounts:
The base node and datamoverX nodes can be changed with the dsmc set password command. You must invoke dsmc
with the correct -optfile parameter for a given node.
The VMCLI node can be changed with the dsmadmc UPDATE NODE command, but you must also use the vmcli to
re-encrypt and save the new password.
◦ VMware accounts:
vCenter account password. The vcenter account password is saved for each datamover, so you must update it with the
dsmc set password -type=vmhost command for each.

9. Where are the log files stored for each component?


The log files are located in the following directories:

17
Spectrum Protect Server: The Activity log can be viewed using the dsmadmc QUERY ACTLOG command. Other logs
are located in /home/Spectrum Protectinst1/Spectrum Protectinst1

Spectrum Protect Clients: /opt/tivoli/Spectrum Protect/client/ba/logfiles/subdir where subdir is one of the following;
basenode for system node or datamoverX for each of the datamover nodes/services.

Spectrum Protect Operations Center: /opt/tivoli/Spectrum Protect/ui/Liberty/usr/servers/guiServer/logs

Spectrum Protect for VE GUI: /opt/tivoli/Spectrum Protect/tdpvmware/common/webserver/usr/servers/veProfile/logs

Spectrum Protect for VE VMCLI: /opt/tivoli/Spectrum Protect/tdpvmware/common/logs

10. What are the system requirements for each individual role?

Note: These estimates are based upon a reasonable amount of testing in the lab. We did not attempt to simulate a pro-
duction-scale workload nor were these environments left running for more than a few days at a time.

Spectrum Protect Server: Ideally, the Spectrum Protect server will have 64GB of RAM and 12 CPU cores to be compa-
rable to the small Spectrum Protect Server Blueprint document. If you are only running the Spectrum Protect server and
do not care about performance, 8GB of RAM and 4 CPU cores will allow the Spectrum Protect server to start and operate.
Note that in the disk requirements described earlier in the documentation, the virtual disks expanded to approximately
200GB when running all roles, but that does not include the disk storage necessary to contain backups. The default setting
is for backups to be both deduplicated and compressed, so the total amount of storage space will be lower than the total
amount of data protected. For planning purposes, you can assume a 4 to 1 deduplication to compression efficiency. You
will need to monitor the environment to see what your actual rates will be.

Spectrum Protect Operations Center: The documented minimum requirements are 4GB of RAM and 1 processor core.
Keep in mind that the OC will work with a Spectrum Protect server acting as a monitoring hub. Please review the Spec-
trum Protect Server Installation Guide for a complete description of how resources will vary depending upon the envi-
ronment that is being managed. The disk utilization should not exceed 85GB.

Spectrum Protect for Virtual Environments Datamover: There are no minimum documented requirements for this
role. The rule of thumb is approximately 300-500MB and 1 core per backup session. The default configuration limits the
number of parallel backup threads for VMware backups to 8, which would mean 4GB of RAM and 8 CPU cores. This
rule of thumb aims high, so you can run with fewer resources as long as you don’t reduce it by more than half. The disk
utilization should not exceed 85GB.

18
Appendix C: License Terms
International License Agreement for Evaluation of Programs

Part 1 - General Terms


BY DOWNLOADING, INSTALLING, COPYING, ACCESSING, OR USING THE PROGRAM YOU AGREE TO THE TERMS OF THIS
AGREEMENT. IF YOU ARE ACCEPTING THESE TERMS ON BEHALF OF ANOTHER PERSON OR A COMPANY OR OTHER LEGAL EN-
TITY, YOU REPRESENT AND WARRANT THAT YOU HAVE FULL AUTHORITY TO BIND THAT PERSON, COMPANY, OR LEGAL ENTI-
TY TO THESE TERMS. IF YOU DO NOT AGREE TO THESE TERMS,
- DO NOT DOWNLOAD, INSTALL, COPY, ACCESS, OR USE THE PROGRAM; AND
- PROMPTLY RETURN THE PROGRAM TO THE PARTY FROM WHOM YOU ACQUIRED IT. IF YOU DOWNLOADED THE PROGRAM,
CONTACT THE PARTY FROM WHOM YOU ACQUIRED IT.
"IBM" is International Business Machines Corporation or one of its subsidiaries.
"License Information" ("LI") is a document that provides information specific to a Program. The Program's LI is available in a file in the Pro-
gram's directory, by the use of a system command, or as a booklet which accompanies the Program. The LI may also be found at
http://www.ibm.com/software/sla/ .
"Program" is the following, including the original and all whole or partial copies: 1) machine-readable instructions and data, 2) components, 3)
audio-visual content (such as images, text, recordings, or pictures), 4) related licensed materials, and 5) license use documents or keys, and
documentation.
"You" and "Your" refer either to an individual person or to a single legal entity.
This Agreement includes Part 1 - General Terms, Part 2 - Country-unique Terms (if any), and License Information and is the complete agree-
ment between You and IBM regarding the use of the Program. It replaces any prior oral or written communications between You and IBM
concerning Your use of the Program. The terms of Part 2 and License Information may replace or modify those of Part 1.

1. Entitlement
License
The Program is owned by IBM or an IBM supplier, and is copyrighted and licensed, not sold.
IBM grants You a nonexclusive license to use the Program when You lawfully acquire it.
You may 1) use the Program only for internal evaluation, testing, or demonstration purposes, on a Trial or "try-and-buy" basis; and 2) make
and install a reasonable number of copies, including a backup copy, of the Program to support such use. The terms of this license apply to
each copy You make. You will reproduce all copyright notices and all other legends of ownership on each copy, or partial copy, of the Pro-
gram.
THE PROGRAM MAY CONTAIN A DISABLING DEVICE THAT WILL PREVENT IT FROM BEING USED AFTER THE EVALUATION PERI-
OD ENDS. YOU WILL NOT TAMPER WITH THIS DISABLING DEVICE OR THE PROGRAM. YOU SHOULD TAKE PRECAUTIONS TO
AVOID ANY LOSS OF DATA THAT MIGHT RESULT WHEN THE PROGRAM CAN NO LONGER BE USED.
You will 1) maintain a record of all copies of the Program and 2) ensure that anyone who uses the Program (accessed either locally or re-
motely) does so only for Your authorized use and complies with the terms of this Agreement.
You may not 1) use, copy, modify or distribute the Program except as provided in this Agreement; 2) reverse assemble, reverse compile, or
otherwise translate the Program except as specifically permitted by law without the possibility of contractual waiver; or 3) sublicense, rent, or
lease the Program.
The evaluation period begins when You agree to the terms of this Agreement and ends 1) as of the duration or date specified in the License
Information, or 2) when the Program automatically disables itself. There is no charge for the use of the Program for the duration of the evalua-
tion period. Unless IBM specifies in the License Information that You may retain the Program, You will destroy the Program and all copies
made of it within ten days of the end of the evaluation period. If IBM specifies that You may retain the Program, and You elect to do so, the
Program will be then subject to a different license agreement, that will be provided to You at that time. In addition, a charge may apply.
IBM may terminate Your license if You fail to comply with the terms of this Agreement. If IBM does so, You must destroy all copies of the Pro-
gram.

2. No Warranty
SUBJECT TO ANY STATUTORY WARRANTIES WHICH CANNOT BE EXCLUDED, IBM MAKES NO WARRANTIES OR CONDITIONS EI-
THER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABIL-
ITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT, REGARDING THE PROGRAM OR TECHNICAL SUPPORT,
IF ANY.
The exclusion also applies to any of IBM's Program developers and suppliers.
Manufacturers, suppliers, or publishers of non-IBM Programs may provide their own warranties.
IBM does not provide technical support, unless IBM specifies otherwise.

3. Limitation of Liability
Circumstances may arise where, because of a default on IBM's part or other liability, You are entitled to recover damages from IBM. In each
such instance, regardless of the basis on which You may be entitled to claim damages from IBM, (including fundamental breach, negligence,
misrepresentation, or other contract or tort claim), IBM is liable for no more than 1) damages for bodily injury (including death) and damage to
real property and tangible personal property and 2) the amount of any other actual direct damages up to the charges for the Program that is
the subject of the claim.
This limitation of liability also applies to IBM's Program developers and suppliers. It is the maximum for which they and IBM are collectively re-
sponsible.
UNDER NO CIRCUMSTANCES IS IBM, ITS PROGRAM DEVELOPERS OR SUPPLIERS LIABLE FOR ANY OF THE FOLLOWING, EVEN
IF INFORMED OF THEIR POSSIBILITY:
1. LOSS OF, OR DAMAGE TO, DATA;
2. SPECIAL, INCIDENTAL, OR INDIRECT DAMAGES, OR FOR ANY ECONOMIC CONSEQUENTIAL DAMAGES; OR
3. LOST PROFITS, BUSINESS, REVENUE, GOODWILL, OR ANTICIPATED SAVINGS.
SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO
THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.

19
4. General
1. Nothing in this Agreement affects any statutory rights of consumers that cannot be waived or limited by contract.
2. In the event that any provision of this Agreement is held to be invalid or unenforceable, the remaining provisions of this Agreement remain
in full force and effect.
3. You may not export the Program.
4. You agree to allow IBM to store and use Your contact information, including names, phone numbers, and e-mail addresses, anywhere they
do business. Such information will be processed and used in connection with our business relationship, and may be provided to contractors,
Business Partners, and assignees of IBM for uses consistent with their collective business activities, including communicating with You (for
example, for processing orders, for promotions, and for market research).
5. Neither You nor IBM will bring a legal action under this Agreement more than two years after the cause of action arose unless otherwise
provided by local law without the possibility of contractual waiver or limitation.
6. Neither You nor IBM is responsible for failure to fulfill any obligations due to causes beyond its control.
7. This Agreement will not create any right or cause of action for any third party, nor will IBM be responsible for any third party claims against
You except, as permitted by the Limitation of Liability section above, for bodily injury (including death) or damage to real or tangible personal
property for which IBM is legally liable.

5. Governing Law, Jurisdiction, and Arbitration


Governing Law
Both You and IBM consent to the application of the laws of the country in which You acquired the Program license to govern, interpret, and
enforce all of Your and IBM's rights, duties, and obligations arising from, or relating in any manner to, the subject matter of this Agreement,
without regard to conflict of law principles.
The United Nations Convention on Contracts for the International Sale of Goods does not apply.
Jurisdiction
All of our rights, duties, and obligations are subject to the courts of the country in which You acquired the Program license.
Part 2 - Country-unique Terms
AMERICAS
ARGENTINA: Governing Law, Jurisdiction, and Arbitration (Section 5): The following exception is added to this section:
Any litigation arising from this Agreement will be settled exclusively by the Ordinary Commercial Court of the city of Buenos Aires.
BRAZIL: Governing Law, Jurisdiction, and Arbitration (Section 5): The following exception is added to this section:
Any litigation arising from this Agreement will be settled exclusively by the court of Rio de Janeiro, RJ.
CANADA: Limitation of Liability (Section 3): The following replaces item 1 in the first paragraph of this section:
1) damages for bodily injury (including death) and physical harm to real property and tangible personal property caused by IBM's negligence;
and
General (Section 4): The following replaces the terms in item 7:
7. This Agreement will not create any right or cause of action for any third party, nor will IBM be responsible for any third party claims against
You except as permitted by the Limitation of Liability section above for bodily injury (including death) or physical harm to real or tangible per-
sonal property caused by IBM's negligence for which IBM is legally liable.
Governing Law, Jurisdiction, and Arbitration (Section 5): The phrase "the laws of the country in which You acquired the Program license" in
the Governing Law subsection is replaced by the following:
the laws in the Province of Ontario
PERU: Limitation of Liability (Section 3): The following is added at the end of this section:
In accordance with Article 1328 of the Peruvian Civil Code, the limitations and exclusions specified in this section will not apply to damages
caused by IBM's willful misconduct ("dolo") or gross negligence ("culpa inexcusable").
UNITED STATES OF AMERICA: General (Section 4): The following is added to this section:
U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by the GSA ADP Schedule Contract with the IBM Corpo-
ration.
Governing Law, Jurisdiction, and Arbitration (Section 5): The phrase "the laws of the country in which You acquired the Program license" in
the Governing Law subsection is replaced by the following:
the laws of the State of New York, United States of America
ASIA PACIFIC
AUSTRALIA: No Warranty (Section 2): The following is added:
Although IBM specifies that there are no warranties, You may have certain rights under the Trade Practices Act 1974 or other legislation and
are only limited to the extent permitted by the applicable legislation.
Limitation of Liability (Section 3): The following is added:
Where IBM is in breach of a condition or warranty implied by the Trade Practices Act 1974, IBM's liability is limited to the repair or replace-
ment of the goods, or the supply of equivalent goods. Where that condition or warranty relates to right to sell, quiet possession or clear title, or
the goods are of a kind ordinarily acquired for personal, domestic or household use or consumption, then none of the limitations in this para-
graph apply.
Governing Law, Jurisdiction, and Arbitration (Section 5): The phrase "the laws of the country in which You acquired the Program license" in
the Governing Law subsection is replaced by the following:
the laws of the State or Territory in which You acquired the Program license
CAMBODIA, LAOS, and VIETNAM: Governing Law, Jurisdiction, and Arbitration (Section 5): The phrase "the laws of the country in which You
acquired the Program license" in the Governing Law subsection is replaced by the following:
the laws of the State of New York, United States of America
The following is added to this section:
Arbitration
Disputes arising out of or in connection with this Agreement shall be finally settled by arbitration which shall be held in Singapore in accord-
ance with the Arbitration Rules of Singapore International Arbitration Center ("SIAC Rules") then in effect. The arbitration award shall be final
and binding for the parties without appeal and shall be in writing and set forth the findings of fact and the conclusions of law.
The number of arbitrators shall be three, with each side to the dispute being entitled to appoint one arbitrator. The two arbitrators appointed by
the parties shall appoint a third arbitrator who shall act as chairman of the proceedings. Vacancies in the post of chairman shall be filled by
the president of the SIAC. Other vacancies shall be filled by the respective nominating party. Proceedings shall continue from the stage they
were at when the vacancy occurred.

20
If one of the parties refuses or otherwise fails to appoint an arbitrator within 30 days of the date the other party appoints its, the first appointed
arbitrator shall be the sole arbitrator, provided that the arbitrator was validly and properly appointed.
All proceedings shall be conducted, including all documents presented in such proceedings, in the English language. The English language
version of this Agreement prevails over any other language version.
HONG KONG S.A.R. and MACAU S.A.R. of China: Governing Law, Jurisdiction, and Arbitration (Section 5): The phrase "the laws of the
country in which You acquired the Program license" in the Governing Law subsection is replaced by the following:
the laws of Hong Kong Special Administrative Region of China
INDIA: Limitation of Liability (Section 3): The following replaces the terms of items 1 and 2 of the first paragraph:
1) liability for bodily injury (including death) or damage to real property and tangible personal property will be limited to that caused by IBM's
negligence; and 2) as to any other actual damage arising in any situation involving nonperformance by IBM pursuant to, or in any way related
to the subject of this Agreement, IBM's liability will be limited to the charge paid by You for the individual Program that is the subject of the
claim.
General (Section 4): The following replaces the terms of item 5:
If no suit or other legal action is brought, within three years after the cause of action arose, in respect of any claim that either party may have
against the other, the rights of the concerned party in respect of such claim will be forfeited and the other party will stand released from its ob-
ligations in respect of such claim.
Governing Law, Jurisdiction, and Arbitration (Section 5): The following is added to this section:
Arbitration
Disputes arising out of or in connection with this Agreement shall be finally settled by arbitration which shall be held in Bangalore, India in ac-
cordance with the laws of India then in effect. The arbitration award shall be final and binding for the parties without appeal and shall be in
writing and set forth the findings of fact and the conclusions of law.
The number of arbitrators shall be three, with each side to the dispute being entitled to appoint one arbitrator. The two arbitrators appointed by
the parties shall appoint a third arbitrator who shall act as chairman of the proceedings. Vacancies in the post of chairman shall be filled by
the president of the Bar Council of India. Other vacancies shall be filled by the respective nominating party. Proceedings shall continue from
the stage they were at when the vacancy occurred.
If one of the parties refuses or otherwise fails to appoint an arbitrator within 30 days of the date the other party appoints its, the first appointed
arbitrator shall be the sole arbitrator, provided that the arbitrator was validly and properly appointed.
All proceedings shall be conducted, including all documents presented in such proceedings, in the English language. The English language
version of this Agreement prevails over any other language version.
JAPAN: General (Section 4): The following is inserted after item 5:
Any doubts concerning this Agreement will be initially resolved between us in good faith and in accordance with the principle of mutual trust.
MALAYSIA: Limitation of Liability (Section 3): The word "SPECIAL" in item 2 of the third paragraph is deleted:
NEW ZEALAND: No Warranty (Section 2): The following is added:
Although IBM specifies that there are no warranties, You may have certain rights under the Consumer Guarantees Act 1993 or other legisla-
tion which cannot be excluded or limited. The Consumer Guarantees Act 1993 will not apply in respect of any goods which IBM provides, if
You require the goods for the purposes of a business as defined in that Act.
Limitation of Liability (Section 3): The following is added:
Where Programs are not acquired for the purposes of a business as defined in the Consumer Guarantees Act 1993, the limitations in this
Section are subject to the limitations in that Act.
PEOPLE'S REPUBLIC OF CHINA: Governing Law, Jurisdiction, and Arbitration (Section 5): The phrase "the laws of the country in which You
acquired the Program license" in the Governing Law subsection is replaced by the following:
the laws of the State of New York, United States of America (except when local law requires otherwise)
PHILIPPINES: Limitation of Liability (Section 3): The following replaces the terms of item 2 of the third paragraph:
2. special (including nominal and exemplary damages), moral, incidental, or indirect damages or for any economic consequential damages; or
Governing Law, Jurisdiction, and Arbitration (Section 5): The following is added to this section:
Arbitration
Disputes arising out of or in connection with this Agreement shall be finally settled by arbitration which shall be held in Metro Manila, Philip-
pines in accordance with the laws of the Philippines then in effect. The arbitration award shall be final and binding for the parties without ap-
peal and shall be in writing and set forth the findings of fact and the conclusions of law.
The number of arbitrators shall be three, with each side to the dispute being entitled to appoint one arbitrator. The two arbitrators appointed by
the parties shall appoint a third arbitrator who shall act as chairman of the proceedings. Vacancies in the post of chairman shall be filled by
the president of the Philippine Dispute Resolution Center, Inc. Other vacancies shall be filled by the respective nominating party. Proceedings
shall continue from the stage they were at when the vacancy occurred.
If one of the parties refuses or otherwise fails to appoint an arbitrator within 30 days of the date the other party appoints its, the first appointed
arbitrator shall be the sole arbitrator, provided that the arbitrator was validly and properly appointed.
All proceedings shall be conducted, including all documents presented in such proceedings, in the English language. The English language
version of this Agreement prevails over any other language version.
SINGAPORE: Limitation of Liability (Section 3): The words "SPECIAL" and "ECONOMIC" are deleted from item 2 of the third paragraph.
General (Section 4): The following replaces the terms of item 7:
Subject to the rights provided to IBM's suppliers and Program developers as provided in Section 4 above (Limitation of Liability), a person
who is not a party to this Agreement shall have no right under the Contracts (Right of Third Parties) Act to enforce any of its terms.
EUROPE, MIDDLE EAST, AFRICA (EMEA)
No Warranty (Section 2): In the European Union, the following is added at the beginning of this section:
In the European Union, consumers have legal rights under applicable national legislation governing the sale of consumer goods. Such rights
are not affected by the provisions of this Section 3.
Limitation of Liability (Section 3): In Austria, Denmark, Finland, Greece, Italy, Netherlands, Norway, Portugal, Spain, Sweden and Switzerland,
the following replaces the terms of this section in its entirety:
Except as otherwise provided by mandatory law:
1. IBM's liability for any damages and losses that may arise as a consequence of the fulfillment of its obligations under or in connection with
this agreement or due to any other cause related to this agreement is limited to the compensation of only those damages and losses proved
and actually arising as an immediate and direct consequence of the non-fulfillment of such obligations (if IBM is at fault) or of such cause, for
a maximum amount equal to the charges You paid for the Program.
The above limitation shall not apply to damages for bodily injuries (including death) and damages to real property and tangible personal prop-
erty for which IBM is legally liable.

21
2. UNDER NO CIRCUMSTANCES IS IBM, OR ANY OF ITS PROGRAM DEVELOPERS, LIABLE FOR ANY OF THE FOLLOWING, EVEN IF
INFORMED OF THEIR POSSIBILITY: 1) LOSS OF, OR DAMAGE TO, DATA; 2) INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY
ECONOMIC CONSEQUENTIAL DAMAGES; 3) LOST PROFITS, EVEN IF THEY ARISE AS AN IMMEDIATE CONSEQUENCE OF THE
EVENT THAT GENERATED THE DAMAGES; OR 4) LOSS OF BUSINESS, REVENUE, GOODWILL, OR ANTICIPATED SAVINGS.
3. The limitation and exclusion of liability herein agreed applies not only to the activities performed by IBM but also to the activities performed
by its suppliers and Program developers, and represents the maximum amount for which IBM as well as its suppliers and Program develop-
ers, are collectively responsible.
Limitation of Liability (Section 3): In France and Belgium, the following replaces the terms of this section in its entirety:
Except as otherwise provided by mandatory law:
1. IBM's liability for any damages and losses that may arise as a consequence of the fulfillment of its obligations under or in connection with
this agreement is limited to the compensation of only those damages and losses proved and actually arising as an immediate and direct con-
sequence of the non-fulfillment of such obligations (if IBM is at fault), for a maximum amount equal to the charges You paid for the Program
that has caused the damages.
The above limitation shall not apply to damages for bodily injuries (including death) and damages to real property and tangible personal prop-
erty for which IBM is legally liable.
2. UNDER NO CIRCUMSTANCES IS IBM, OR ANY OF ITS PROGRAM DEVELOPERS, LIABLE FOR ANY OF THE FOLLOWING, EVEN IF
INFORMED OF THEIR POSSIBILITY: 1) LOSS OF, OR DAMAGE TO, DATA; 2) INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY
ECONOMIC CONSEQUENTIAL DAMAGES; 3) LOST PROFITS, EVEN IF THEY ARISE AS AN IMMEDIATE CONSEQUENCE OF THE
EVENT THAT GENERATED THE DAMAGES; OR 4) LOSS OF BUSINESS, REVENUE, GOODWILL, OR ANTICIPATED SAVINGS.
3. The limitation and exclusion of liability herein agreed applies not only to the activities performed by IBM but also to the activities performed
by its suppliers and Program developers, and represents the maximum amount for which IBM as well as its suppliers and Program develop-
ers, are collectively responsible.
Governing Law, Jurisdiction, and Arbitration (Section 5)
Governing Law
The phrase "the laws of the country in which You acquired the Program license" is replaced by:
1) "the laws of Austria" in Albania, Armenia, Azerbaijan, Belarus, Bosnia-Herzegovina, Bulgaria, Croatia, Georgia, Hungary, Kazakhstan, Kyr-
gyzstan, FYR Macedonia, Moldavia, Poland, Romania, Russia, Slovakia, Slovenia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, and FR
Yugoslavia;
2) "the laws of France" in Algeria, Benin, Burkina Faso, Cameroon, Cape Verde, Central African Republic, Chad, Comoros, Congo Republic,
Djibouti, Democratic Republic of Congo, Equatorial Guinea, French Guiana, French Polynesia, Gabon, Gambia, Guinea, Guinea-Bissau, Ivory
Coast, Lebanon, Madagascar, Mali, Mauritania, Mauritius, Mayotte, Morocco, New Caledonia, Niger, Reunion, Senegal, Seychelles, Togo,
Tunisia, Vanuatu, and Wallis & Futuna;
3) "the laws of Finland" in Estonia, Latvia, and Lithuania;
4) "the laws of England" in Angola, Bahrain, Botswana, Burundi, Egypt, Eritrea, Ethiopia, Ghana, Jordan, Kenya, Kuwait, Liberia, Malawi, Mal-
ta, Mozambique, Nigeria, Oman, Pakistan, Qatar, Rwanda, Sao Tome, Saudi Arabia, Sierra Leone, Somalia, Tanzania, Uganda, United Arab
Emirates, the United Kingdom, West Bank/Gaza, Yemen, Zambia, and Zimbabwe; and
5) "the laws of South Africa" in South Africa, Namibia, Lesotho and Swaziland.
Jurisdiction
The following exceptions are added to this section:
1) In Austria the choice of jurisdiction for all disputes arising out of this Agreement and relating thereto, including its existence, will be the
competent court of law in Vienna, Austria (Inner-City);
2) in Angola, Bahrain, Botswana, Burundi, Egypt, Eritrea, Ethiopia, Ghana, Jordan, Kenya, Kuwait, Liberia, Malawi, Malta, Mozambique, Nige-
ria, Oman, Pakistan, Qatar, Rwanda, Sao Tome, Saudi Arabia, Sierra Leone, Somalia, Tanzania, Uganda, United Arab Emirates, West
Bank/Gaza, Yemen, Zambia, and Zimbabwe all disputes arising out of this Agreement or related to its execution, including summary proceed-
ings, will be submitted to the exclusive jurisdiction of the English courts;
3) in Belgium and Luxembourg, for all disputes arising out of this Agreement or related to its interpretation or its execution, only the law and
the courts of the capital of the country in which Your registered office and/or commercial office is located are competent;
4) in France, Algeria, Benin, Burkina Faso, Cameroon, Cape Verde, Central African Republic, Chad, Comoros, Congo Republic, Djibouti,
Democratic Republic of Congo, Equatorial Guinea, French Guiana, French Polynesia, Gabon, Gambia, Guinea, Guinea-Bissau, Ivory Coast,
Lebanon, Madagascar, Mali, Mauritania, Mauritius, Mayotte, Morocco, New Caledonia, Niger, Reunion, Senegal, Seychelles, Togo, Tunisia,
Vanuatu, and Wallis & Futuna all disputes arising out of this Agreement or related to its violation or execution, including summary proceed-
ings, will be settled exclusively by the Commercial Court of Paris;
5) in Russia all disputes arising out of or in relation to the interpretation, the violation, the termination, the nullity of the execution of this
Agreement shall be settled by Arbitration Court of Moscow;
6) in South Africa, Namibia, Lesotho and Swaziland both of us agree to submit all disputes relating to this Agreement to the jurisdiction of the
High Court in Johannesburg;
7) in Turkey all disputes arising out of or in connection with this Agreement shall be resolved by the Istanbul Central (Sultanahmet) Courts and
Execution Directorates of Istanbul, the Republic of Turkey;
8) in each of the following specified countries, any legal claim arising out of this Agreement will be brought before, and settled exclusively by,
the competent court of a) Athens for Greece, b) Tel Aviv-Jaffa for Israel, c) Milan for Italy, d) Lisbon for Portugal, and e) Madrid for Spain; and
9) in the United Kingdom both of us agree to submit all disputes relating to this Agreement to the jurisdiction of the English courts.
Arbitration
In Albania, Armenia, Azerbaijan, Belarus, Bosnia-Herzegovina, Bulgaria, Croatia, Georgia, Hungary, Kazakhstan, Kyrgyzstan, FYR Macedo-
nia, Moldavia, Poland, Romania, Russia, Slovakia, Slovenia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, and FR Yugoslavia all disputes
arising out of this Agreement or related to its violation, termination or nullity will be finally settled under the Rules of Arbitration and Concilia-
tion of the International Arbitral Center of the Federal Economic Chamber in Vienna (Vienna Rules) by three arbitrators appointed in accord-
ance with these rules.
The arbitration will be held in Vienna, Austria, and the official language of the proceedings will be English. The decision of the arbitrators will
be final and binding upon both parties. Therefore, pursuant to paragraph 598 (2) of the Austrian Code of Civil Procedure, the parties expressly
waive the application of paragraph 595 (1) figure 7 of the Code. IBM may, however, institute proceedings in a competent court in the country
of installation.
In Estonia, Latvia and Lithuania all disputes arising in connection with this Agreement will be finally settled in arbitration that will be held in
Helsinki, Finland in accordance with the arbitration laws of Finland then in effect. Each party will appoint one arbitrator. The arbitrators will
then jointly appoint the chairman. If arbitrators cannot agree on the chairman, then the Central Chamber of Commerce in Helsinki will appoint
the chairman.

22
AUSTRIA: General (Section 4): The following is added to item 4:
For purposes of this clause, contact information will also include information about You as a legal entity, for example revenue data and other
transactional information.
GERMANY: Limitation of Liability (Section 3): The following paragraph is added to this Section:
The limitations and exclusions specified in this Section will not apply to damages caused by IBM intentionally or by gross negligence.
General (Section 4): The following replaces the terms of item 5:
Any claims resulting from this Agreement are subject to a statute of limitation of three years.
HUNGARY: Limitation of Liability (Section 3): The following is added at the end of this section:
The limitation and exclusion specified herein shall not apply to liability for a breach of contract damaging life, physical well-being, or health
that has been caused intentionally, by gross negligence, or by a criminal act.
The parties accept the limitations of liability as valid provisions and state that the Section 314.(2) of the Hungarian Civil Code applies as the
acquisition price as well as other advantages arising out of the present Agreement balance this limitation of liability.
IRELAND: No Warranty (Section 2): The following is added to this section:
Except as expressly provided in these terms and conditions, or section 12 of the Sale of Goods Act 1893 (as amended by the Sale of Goods
and Supply of Services Act 1980 ("the 1980 Act")), all conditions and warranties (express or implied, statutory or otherwise) are hereby ex-
cluded including, without limitation, any warranties implied by the Sale of Goods Act 1893 as amended by the 1980 Act (including, for the
avoidance of doubt, section 39 of the 1980 Act).
Limitation of Liability (Section 3): The following replaces the terms of this section in its entirety:
For the purposes of this section, a "Default" means any act, statement, omission, or negligence on the part of IBM in connection with, or in re-
lation to, the subject matter of an Agreement in respect of which IBM is legally liable to You whether in contract or tort. A number of Defaults
which together result in, or contribute to, substantially the same loss or damage will be treated as one Default occurring on the date of occur-
rence of the last such Default.
Circumstances may arise where, because of a Default, You are entitled to recover damages from IBM. This section sets out the extent of
IBM's liability and Your sole remedy.
1. IBM will accept unlimited liability for (a) death or personal injury caused by the negligence of IBM, and (b) subject always to the Items for
Which IBM is Not Liable below, for physical damage to Your tangible property resulting from the negligence of IBM.
2. Except as provided in item 1 above, IBM's entire liability for actual damages for any one Default will not in any event exceed the greater of
1) EUR 125,000, or 2) 125 percent of the amount You paid for the Program directly relating to the Default. These limits also apply to any of
IBM's suppliers and Program developers. They state the maximum for which IBM and such suppliers and Program developers are collectively
responsible.
Items for Which IBM is Not Liable
Save with respect to any liability referred to in item 1 above, under no circumstances is IBM or any of its suppliers or Program developers lia-
ble for any of the following, even if IBM or they were informed of the possibility of such losses:
1. loss of, or damage to, data;
2. special, indirect, or consequential loss; or
3. loss of profits, business, revenue, goodwill, or anticipated savings.
ITALY: General (Section 4): The following is added to this section:
IBM and Customer (hereinafter, individually, "Party") shall comply with all the obligations of the applicable provisions of law and/or regulation
on personal data protection. Each of the Parties will indemnify and keep the other Party harmless from any damage, claim, cost or expense
incurred by the latter, directly and or indirectly, as a consequence of an infringement of the other Party of the mentioned provisions of law
and/or regulations.
SLOVAKIA: Limitation of Liability (Section 3): The following is added to the end of the last paragraph:
The limitations apply to the extent they are not prohibited under Sections 373-386 of the Slovak Commercial Code.
General (Section 4): The terms of item 5 are replaced with the following:
THE PARTIES AGREE THAT, AS DEFINED BY APPLICABLE LOCAL LAW, ANY LEGAL OR OTHER ACTION RELATED TO A BREACH
OF THIS AGREEMENT MUST BE COMMENCED NO LATER THAN FOUR YEARS FROM THE DATE ON WHICH THE CAUSE OF AC-
TION AROSE.
SWITZERLAND: General (Section 4): The following is added to item 4:
For purposes of this clause, contact information will also include information about You as a legal entity, for example revenue data and other
transactional information.
UNITED KINGDOM: No Warranty (Section 2): The following replaces the first sentence in the first paragraph of this section:
SUBJECT TO ANY STATUTORY WARRANTIES WHICH CANNOT BE EXCLUDED, IBM MAKES NO WARRANTY OR CONDITION EI-
THER EXPRESS OR IMPLIED, INCLUDING (WITHOUT LIMITATION) THE IMPLIED WARRANTIES OF SATISFACTORY QUALITY, FIT-
NESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT, REGARDING THE PROGRAM.
Limitation of Liability (Section 3): The following replaces the terms of this section in its entirety:
For the purposes of this section, a "Default" means any act, statement, omission, or negligence on the part of IBM in connection with, or in re-
lation to, the subject matter of an Agreement in respect of which IBM is legally liable to You, whether in contract or tort. A number of Defaults
which together result in, or contribute to, substantially the same loss or damage will be treated as one Default.
Circumstances may arise where, because of a Default, You are entitled to recover damages from IBM. This section sets out the extent of
IBM's liability and Your sole remedy.
1. IBM will accept unlimited liability for:
a. death or personal injury caused by the negligence of IBM;
b. any breach of its obligations implied by Section 12 of the Sale of Goods Act 1979 or Section 2 of the Supply of Goods and Services Act
1982, or any statutory modification or re-enactment of either such Section; and
c. subject always to the Items for Which IBM is Not Liable below, for physical damage to Your tangible property resulting from the negligence
of IBM.
2. IBM's entire liability for actual damages for any one Default will not in any event, except as provided in item 1 above, exceed the greater of
1) Pounds Sterling 75,000, or 2) 125 percent of the amount You paid for the Program directly relating to the Default. These limits also apply to
IBM's suppliers and Program developers. They state the maximum for which IBM and such suppliers and Program developers are collectively
responsible.
Items for Which IBM is Not Liable
Save with respect to any liability referred to in item 1 above, under no circumstances is IBM or any of its suppliers or Program developers lia-
ble for any of the following, even if IBM or they were informed of the possibility of such losses:
1. loss of, or damage to, data;
2. special, indirect, or consequential loss; or

23
3. loss of profits, business, revenue, goodwill, or anticipated savings.
Z125-5543-03 (07/2008)

LICENSE INFORMATION
The Programs listed below are licensed under the following terms and conditions in addition to those of the International License Agreement
for Evaluation of Programs.
Program Name: IBM Tivoli Storage Manager V7.1, IBM Tivoli Storage Manager for Virtual Environments V7.1

Evaluation Period
The evaluation period begins on the date that You agree to the terms of this Agreement and ends after 60 days.
Limited Use Rights for Other IBM Programs
If You acquired this Program as part of another IBM Program ("Principal Program") that lists this Program under "Other IBM Programs", You
received this Program only in support of the Principal Program and Your rights to use this Program will be limited by the license of the Princi-
pal Program. Please contact Your IBM Sales Representative if You wish to acquire a separate license to this Program not limited by the Prin-
cipal Program's license terms.
Other IBM Programs
The Program is licensed as a multi-product package and includes other products distributed with the Program ("Other IBM Programs"). You
are authorized to install and use such Other IBM Programs only in association with Your licensed use of the Program under this Agreement.
The Other IBM Programs may not be used for any other purpose. You are not authorized to transfer or remarket the Other IBM Programs.
The terms of the Program's Agreement may replace or modify the license terms for the Other IBM Programs. In the event of conflict, the Pro-
gram's terms supersede the terms of the license agreement which accompanies the Other IBM Programs. When Your right to use the Pro-
gram expires or terminates, You must discontinue use, destroy or promptly return all copies of the Other IBM Programs to the party from
whom You acquired it; if You downloaded the Other IBM Programs contact the party from whom You acquired it. If You wish to license the
Other IBM Programs for any use beyond the limits set forth above, please contact an IBM Sales Representative or the party from whom You
acquired it to obtain the appropriate licenses.
The following are Other IBM Programs licensed with the Programs:
IBM Tivoli Storage Manager for Virtual Environments V7.1
Excluded Components
-SUSE Linux
- SUSE Enterprise Linux for VMware
- TMUX – Terminal Multiplexing package for Linux
- SYSSTAT – System performance utilities for Linux
- HTOP – System performance monitor package for Linux
- Any VMware component

The provisions of this paragraph do not apply to the extent they are held to be invalid or unenforceable under the law that governs this li-
cense. The components listed below are "Excluded Components." Notwithstanding any of the terms in the Agreement or any other agreement
You may have with IBM:
(a) the third party suppliers of such Excluded Components ("Suppliers") provide the components WITHOUT WARRANTIES OF ANY KIND
and, such Suppliers DISCLAIM ANY AND ALL EXPRESS AND IMPLIED WARRANTIES AND CONDITIONS INCLUDING, BUT NOT LIM-
ITED TO, THE WARRANTY OF TITLE, NON-INFRINGEMENT OR INTERFERENCE AND THE IMPLIED WARRANTIES AND CONDITIONS
OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE EXCLUDED COMPONENTS;
(b) in no event are the Suppliers liable for any direct, indirect, incidental, special, exemplary, punitive or consequential damages, including but
not limited to lost data, lost savings, and lost profits, with respect to the Excluded Components; and,
(c) IBM and the Suppliers are not liable to You, and will not defend, indemnify, or hold You harmless for any claims arising from or related to
the Excluded Components.
Notwithstanding these exclusions, in Germany and Austria, IBM's warranty and liability for the Excluded Components is governed only by the
respective terms applicable for Germany and Austria in the IBM license agreements.
Notices and important information that IBM is required to provide to You with respect to the Excluded Components, including instructions for
obtaining source code for certain Excluded Components, may be found in the NOTICES file(s) that accompanies the Program.
Your use of the Excluded Components is governed by the terms of the Agreement and not by any terms that may be contained in the NO-
TICES file(s). The terms contained in the Agreement are offered by IBM and not by any other party. Future Program updates or fixpacks may
contain additional Excluded Components. Such additional Excluded Components, and related notices and information, if any, will be listed in
another NOTICES file that accompanies the Program update or fixpack.
The following are Excluded Components:
SysInternals /FilterKernel/Windows/FXBRFile2k/Ioctlcmd.h /agentbr/Communication/Instdrv.c /FilterKernel/Windows/FXBRFile2k/Filemon.c
1996
RSA MD5 (April 1992 Version - original IETF RFC 1321 sample implementation)
Specified Operating Environment
The Program's specifications and specified operating environment information may be found in documentation accompanying the Program, if
available, such as a read-me file, or other information published by IBM, such as an announcement letter. You agree that such documentation
and other Program content may be supplied only in the English language.
Program-unique Terms
1. Tivoli Enhanced Value-Based Pricing
The Tivoli Enhanced Value-Based Pricing model is described in the Licensing definitions file located at
URL:http://www.ibm.com/software/tivoli/products/licensing.html and describes IBM's charges for your use of Programs eligible under the Tivoli
Enhanced Value-Based Pricing model, including any Program use restrictions based on pricing.
2. Order of Precedence
This License Information Document supersedes and replaces in its entirety any prior License Information Document governing any previously
acquired Tivoli Programs that have migrated to the Tivoli Value-Based Pricing Programs.
3. Use of the Program
Programs acquired under this Agreement are for use within Your enterprise only and may not be resold, rented, leased, or transferred to third
parties. In addition, such programs may not be used to provide commercial hosting or other commercial information technology services to
third parties. You may not assign, transfer or otherwise remarket Programs acquired at a discount or allowance.

24
Modules created from Tivoli Toolkits are licensed solely for use internally within Your enterprise. External distribution of modules created with
Tivoli programs is prohibited.
4. Source Code
Some of the components of the Program may be provided in source code form. Notwithstanding anything to the contrary in this Agreement,
only unmodified, binary code versions of these components included in the Program packaging will be subject to the warranties of this agree-
ment, and not the source code for these components or for any modifications of such components you may create.
5. License Compliance
During the period that your license agreement with respect to the Program remains in effect, and for two years thereafter, IBM has the right to
verify your compliance with the terms of your license agreement on your premises during your normal business hours and in a manner that
minimizes disruption to your business. IBM may use an independent auditor for this with your prior approval, which you will not unreasonably
withhold.
6. Based on the Program license obtained, and as described in Your Proof of Entitlement (PoE), Your use of the Program may be licensed
on a per server basis. A server is a computer system that executes requested procedures, commands, or applications to one or more user or
client devices over a network. A PoE must be obtained for each server on which the program or a component of the program is run or for
each server managed by the program. Where blade technology is employed, each blade is considered a separate server.

25
Appendix D: Notices
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed
in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your
area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may
be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead.
However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does
not grant you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785
U.S.A.

For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual Property Department in your country
or send inquiries, in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
19-21, Nihonbashi-Hakozakicho, Chuo-ku
Tokyo 103-8510, Japan

The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND,
EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MER-
CHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain
transactions, therefore, this statement may not apply to you.

This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these
changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the pro-
gram(s) described in this publication at any time without notice.

Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an endorsement of
those websites. The materials at those websites are not part of the materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Licensees
of this program who want to have information about it for the purpose of enabling: (I) the exchange of information between independently creat-
ed programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758
U.S.A.

Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.

The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Custom-
er Agreement, IBM International Program License Agreement, or any equivalent agreement between us.

Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environ-
ments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these
measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapo-
lation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly
available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related
to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

This information is for planning purposes only. The information herein is subject to change before the products described become available.

This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the ex-
amples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and
addresses used by an actual business enterprise is entirely coincidental.

COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming techniques on various operating plat-
forms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using,
marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sam-
ple programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply relia-
bility, serviceability, or function of these programs. The sample liable for any damages arising out of your use of the sample programs. Each
copy or any portion of these sample programs or any derivative work, must include a copyright notice as follows: © (your company name) (year).
Portions of this code are derived from IBM Corp. Sample Programs. © Copyright IBM Corp
._enter the year or years_.

If you are viewing this information in softcopy, the photographs and color illustrations may not appear.

26
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business Machines Corp., registered in many juris-
dictions worldwide.

Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
“Copyright and trademark information” at http://www.ibm.com/legal/copytrade.shtml.

Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.

Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

27

You might also like