B SRV Install Guide Windows
B SRV Install Guide Windows
for Windows
8.1.21
Installation Guide
IBM
Note:
Before you use this information and the product it supports, read the information in “Notices” on page
191.
Edition Notice
This edition applies to version 8, release 1, modification 21 of IBM® Storage Protect (product numbers 5725-W98,
5725-W99, 5725-X15), and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright International Business Machines Corporation 1993, 2023.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
What's new.......................................................................................................... ix
Chapter 3. Taking the first steps after you install IBM Storage Protect................................................... 71
Creating the user ID and directories for the server instance.............................................................. 71
Configuring the IBM Storage Protect server........................................................................................73
Using the configuration wizard....................................................................................................... 73
Using the manual configuration steps............................................................................................75
Configuring server options for server database maintenance............................................................ 79
iii
Starting the server instance on Windows systems..............................................................................80
Configuring the server to start as a Windows service....................................................................81
Starting the server as a Windows service...................................................................................... 82
Manually creating and configuring a Windows service.................................................................. 82
Starting the server in the foreground............................................................................................. 83
Starting the server in maintenance mode......................................................................................83
Stopping the server.............................................................................................................................. 84
Registering licenses............................................................................................................................. 84
Preparing the server for database backup operations ....................................................................... 85
Running multiple server instances on a single system....................................................................... 85
Monitoring the server........................................................................................................................... 86
iv
Chapter 11. Upgrading the Operations Center....................................................................................... 133
Chapter 14. Rolling back to a previous version of the Operations Center............................................. 185
Appendix B. Accessibility...................................................................................189
Notices..............................................................................................................191
Glossary............................................................................................................ 195
Index................................................................................................................ 197
v
vi
About this publication
This publication contains installation and configuration instructions for the IBM Storage Protect server,
server languages, license, and device driver.
Instructions for installing the Operations Center are also included in this publication.
Installable components
The IBM Storage Protect server and licenses are required components.
These components are in several different installation packages.
Operations Center Installs the Operations See Part 2, “Installing and upgrading the Operations
(optional) Center, which is a Center,” on page 117.
web-based interface for
managing your storage
environment.
Publications
The IBM Storage Protect product family includes IBM Storage Protect Plus, IBM Storage Protect for
Virtual Environments, IBM Storage Protect for Databases, and several other storage management
products from IBM.
To view IBM product documentation, see IBM Documentation.
Restriction: You cannot install and run the server on a system that already has Db2® installed on
it, whether Db2 was installed by itself or as part of some other application. The server requires the
installation and use of the Db2 version that is packaged with the server. No other version of Db2 can exist
on the system.
You can install the IBM Storage Protect server on a domain controller. The server can have heavy
processor usage, however, and that might affect and stall other applications.
Experienced Db2 administrators can choose to perform advanced SQL queries and use Db2 tools to
monitor the database. Do not, however, use Db2 tools to change Db2 configuration settings from those
that are preset by IBM Storage Protect, or alter the Db2 environment for IBM Storage Protect in other
ways, such as with other products. The server has been built and tested extensively using the data
definition language (DDL) and database configuration that the server deploys.
Attention: Do not alter the Db2 software that is installed with IBM Storage Protect installation
packages and fix packs. Do not install or upgrade to a different version, release, or fix pack of Db2
software because doing so can damage the database.
What you should know about security before you install or upgrade
the server
Review information about the enhanced security features in the IBM Storage Protect server and the
requirements for updating your environment.
Security enhancements
The following security enhancements were added beginning in V8.1.2:
Security protocol that uses Transport Layer Security (TLS)
IBM Storage Protect V8.1.2 and later software has an improved security protocol that uses TLS
Version 1.2 or later for authentication between the server, storage agent, and backup-archive clients.
Beginning with IBM Storage Protect V8.1.11, you can enable the TLS 1.3 protocol to secure
communications between servers, clients, and storage agents. To use TLS 1.3, both parties in the
communication session must use TLS 1.3. If either party uses TLS 1.2, then both parties use TLS 1.2
by default.
Automatic Secure Sockets Layer (SSL) configuration and distribution of certificates
Servers, storage agents, and clients using V8.1.2 or later software are automatically configured to
authenticate with each other by using TLS.
Using the new protocol, each server, storage agent, and client has a unique self-signed certificate
that is used to authenticate and allow TLS connections. IBM Storage Protect self-signed certificates
enable secure authentication between entities, enable strong encryption for data transmission, and
automatically distribute public keys to client nodes. Certificates are automatically exchanged between
all clients, storage agents, and servers that use V8.1.2 or later software. You do not have to manually
configure TLS or manually install the certificates for every client. The new TLS enhancements do not
require options changes, and certificates are transferred to clients automatically upon first connection
unless you are using a single administrator ID to access multiple systems.
By default, self-signed certificates are distributed, but you can optionally use other configurations
such as certificates that are signed by a certificate authority. For more information about using
certificates, see SSL and TLS communication in IBM Documentation.
Combination of TCP/IP and TLS protocols for secure communication and minimal impact to
performance
In previous versions of IBM Storage Protect software, you had to choose either TLS or TCP/IP to
encrypt all communication. The new security protocol uses a combination of TCP/IP and TLS to secure
communication between servers, clients, and storage agents. By default, TLS is used only to encrypt
authentication and metadata, while TCP/IP is used for data transmission. Since TLS encryption is
primarily used for authentication only, performance for backup and restore operations is not affected.
Optionally, you can use TLS to encrypt data transmission by using the SSL client option for client-to-
server communication, and the SSL parameter in the UPDATE SERVER command for server-to-server
communication.
Backward compatibility makes it easier to plan upgrades in batches
Upgraded versions of IBM Storage Protect servers and clients can continue to connect to older
versions when the SESSIONSECURITY parameter is set to TRANSITIONAL.
You are not required to update backup-archive clients to V8.1.2 or later before you upgrade servers.
After you upgrade a server to V8.1.2 or later, nodes and administrators that are using earlier versions
of the software will continue to communicate with the server by using the TRANSITIONAL value until
the entity meets the requirements for the STRICT value. Similarly, you can upgrade backup-archive
clients to V8.1.2 or later before you upgrade your IBM Storage Protect servers, but you are not
required to upgrade servers first. Communication between servers and clients that are using different
versions is not interrupted. However, you will not have the benefits of the security enhancements until
both clients and servers are upgraded.
Enforce strict security with the SESSIONSECURITY parameter
To use the new security protocol, the server, client node, or administrator entities must be using
IBM Storage Protect software that supports the SESSIONSECURITY parameter. Session security
is the level of security that is used for communication among IBM Storage Protect client nodes,
administrative clients, and servers. You can specify the following values for this parameter:
STRICT
Enforces the highest level of security for communication between IBM Storage Protect servers,
nodes, and administrators, which is currently TLS 1.2.
TRANSITIONAL
Specifies that the existing communication protocol (for example, TCP/IP) is used until you
update your IBM Storage Protect software to V8.1.2 or later. This is the default. When
SESSIONSECURITY=TRANSITIONAL, stricter security settings are automatically enforced as
higher versions of the TLS protocol are used and as the software is updated to V8.1.2 or later.
After a node, administrator, or server meets the requirements for the STRICT value, session
security is automatically updated to the STRICT value, and the entity can no longer authenticate
by using a previous version of the client or earlier TLS protocols.
If SESSIONSECURITY=TRANSITIONAL and the server, node, or administrator has never met the
requirements for the STRICT value, the server, node, or administrator will continue to authenticate
by using the TRANSITIONAL value. However, after the server, node, or administrator meets the
requirements for the STRICT value, the SESSIONSECURITY parameter value automatically updates
from TRANSITIONAL to STRICT. Then, the server, node, or administrator can no longer authenticate
by using a version of the client or an SSL/TLS protocol that does not meet the requirements for
STRICT.
Restriction: After an administrator successfully authenticates with a server by using IBM Storage
Protect V8.1.2 or later software or Tivoli® Storage Manager V7.1.8 or later software, the administrator
can no longer authenticate with the same server by using client or server versions earlier than
V8.1.2 or V7.1.8. This restriction also applies to the destination server when you use functions
such as command routing, server-to-server export that authenticates with the destination IBM
Storage Protect server as an administrator from another server, administrator connections using the
Operations Center, and connections from the administrative command-line client.
For client and administrative sessions, administrative command routing sessions might fail unless the
administrator ID has already acquired certificates for all servers to which the administrator ID will
connect. Administrators that authenticate by using the dsmadmc command, dsmc command, or dsm
program cannot authenticate by using an earlier version after authenticating by using V8.1.2 or later.
To resolve authentication issues for administrators, see the following tips:
• Ensure that all IBM Storage Protect software that the administrator account uses to log on is
upgraded to V8.1.2 or later. If an administrator account logs on from multiple systems, ensure that
the server's certificate is installed on each system.
• If necessary, create a separate administrator account to use only with clients and servers that are
using V8.1.1 or earlier software.
Carefully plan upgrades for administrator IDs Identify all systems that administrator accounts
use to log in for administration purposes.
After a successful authentication to V8.1.2 or later
software, administrators cannot authenticate to
earlier versions of IBM Storage Protect software
on the same server. If a single administrator ID is
used to log in to multiple systems, plan to upgrade
all of those systems with V8.1.2 or later software
to ensure that the certificate is installed on all
systems that the administrator logs in to.
Tip: You will not get locked out of a server
if the SESSIONSECURITY parameter for all of
your administrator IDs is updated to the STRICT
value. You can manually import the server’s public
certificate to a client from which you issue the
dsmadmc command.
What to do next
• Follow the procedure in “Applying security updates” on page 7 to install or upgrade an IBM Storage
Protect server.
• For information about troubleshooting communication issues related to security updates, see
“Troubleshooting security updates” on page 12.
• For FAQ information, see FAQ - Security updates in IBM Storage Protect.
• For information about using the IBM Storage Protect backup-archive web client in the new security
environment, see technote 728037.
What is the role of the server in the configuration? In general, you can upgrade the IBM Storage
Protect servers in your environment first and
then upgrade backup-archive clients. However,
in certain circumstances, for example, if you
use command routing functions, the server can
act as the client in your configuration. In that
instance, to prevent communication issues, the
suggested approach is to upgrade clients first.
For information about different scenarios, see
Upgrade scenarios.
What systems are used for administrator For administrator accounts, the sequence in
authentication? which you upgrade is important to prevent
authentication issues.
– Clients on multiple systems that log on by using
the same ID (either node or administrative
ID) must be upgraded at the same time.
Server certificates are transferred to clients
automatically upon first connection.
– Before you upgrade your server, consider
all endpoints that the administrator uses to
connect to for administration purposes. If a
single administrative ID is used to access
multiple systems, ensure that the server's
certificate is installed on each system.
– After an administrator ID authenticates
successfully with the server by using IBM
Storage Protect V8.1.2 or later software or
Tivoli Storage Manager V7.1.8 or later software,
the administrator can no longer authenticate
with that server by using client or server
versions earlier than V8.1.2 or V7.1.8. This is
also true for a destination server when you
authenticate with that destination IBM Storage
Protect server as an administrator from another
server. For example, this is true when you use
the following functions:
- Command routing
- Server-to-server export
- Connecting from an administrative client in
the Operations Center
Procedure
1. Install or upgrade IBM Storage Protect servers in your environment. For more information, see the
Installing and upgrading the server topic in IBM Documentation.
a) Upgrade the Operations Center and the hub server. For more information, see Part 2, “Installing
and upgrading the Operations Center,” on page 117.
b) Upgrade spoke servers.
c) Configure or verify server-to-server communications. For more information, see the following
topics:
• The UPDATE SERVER command in IBM Documentation.
• The Configuring SSL communications between the hub server and a spoke server topic in IBM
Documentation.
• The Configuring the server to connect to another server by using SSL topic in IBM Documentation.
Tip:
• Beginning in IBM Storage Protect V8.1.2 and Tivoli Storage Manager V7.1.8, the SSL parameter
uses SSL to encrypt communication with the specified server even if the SSL parameter is set to
NO.
• Beginning with V8.1.4, certificates are automatically configured between storage agents, library
clients, and library manager servers. Certificates are exchanged the first time a server-to-server
connection is established to a server with enhanced security.
2. Install or upgrade administrative clients. For more information, see the Installing and configuring
clients topic in IBM Documentation.
3. Enable secure communications between all systems that administrators use to log in for
administration purposes.
• Ensure that the IBM Storage Protect software that the administrator account uses to log on is
upgraded to V8.1.2 or later.
• If an administrative ID logs on from multiple systems, ensure that the server's certificate is installed
on each system.
4. Install or upgrade non-administrative clients. For more information, see the Installing and configuring
clients topic in IBM Documentation.
Remember: You can upgrade your non-administrative clients in phases. You can continue to connect
to servers at later release levels from clients at earlier release levels by issuing the UPDATE NODE
command and setting the SESSIONSECURITY parameter to TRANSITIONAL for each node.
What to do next
Other upgrade scenarios might apply to your environment. Review example upgrade scenarios in the
following table.
My administrative client is at the • After an administrator • Ensure that all IBM Storage
latest release version, and I use authenticates to an IBM Storage Protect software that the
the same administrator ID to Protect server V8.1.2 or later by administrators use to log on is
authenticate to different systems using a version of the client at upgraded to V8.1.2 or later. The
by using the dsmadmc command. I V8.1.2 or later, the administrative preferred action is to upgrade all
have authenticated successfully to ID can only authenticate with that the servers in your environment
an IBM Storage Protect server in server on clients or servers that to the latest version.
my environment that is running at are using V8.1.2 or later. • If necessary, create a separate
the latest version. I now want to
• If you use a single administrative administrator account to use only
authenticate to a server at a version
ID to access multiple systems, with clients and servers that are
earlier than V8.1.2.
plan to upgrade all of those using V8.1.1 or earlier software.
systems with V8.1.2 or later
software to ensure that the
server's certificate is installed
on all systems to which the
administrator logs on.
The IBM Storage Protect server • If you upgrade any one of the • On each server, verify that the
is already upgraded to the administrative clients in your following information is set up:
latest release level. I have an environment, all other clients that
administrative client at release – The same administrator ID and
use the same ID as the upgraded
level V8.1.0 and I want to connect password
client must be upgraded at the
to the server from the Operations same time. – The required administrative
Center. authority on each server
• To use an administrator ID in a
multiple-server configuration, the – The required certificates
ID must be registered on the • Upgrade non-administrative
hub and spoke servers with the clients in a phased manner.
same password, authority level,
and required certificates.
I want to upgrade my backup- • After you upgrade a server • If you upgrade your clients
archive clients before I upgrade my to V8.1.2 or later, nodes and before you upgrade your servers,
servers. administrators that are using upgrade administrative clients
earlier versions of the software first, and then upgrade non-
will continue to communicate administrative clients. Clients at
with the server by using the later release levels continue to
TRANSITIONAL value until the communicate with servers at
entity meets the requirements for earlier levels.
the STRICT value.
• Communication between servers
and clients will not be
interrupted.
Symptom Resolution
An administrator After an administrator successfully authenticates with the server by using
account cannot log in to IBM Storage Protect V8.1.2 or later software, the administrator can no
a system that is using longer authenticate with that server that uses client or server versions
software earlier than earlier than V8.1.2. This restriction also applies to the destination server
V8.1.2. when you use functions such as command routing, server-to-server export
that authenticates with the destination IBM Storage Protect server as an
administrator from another server, administrator connections that use the
Operations Center, and connections from the administrative command-line
client.
To resolve authentication issues for administrators, complete the following
steps:
1. Identify all systems from which administrators log in and which use the
administrative ID to log in. Upgrade the system software to IBM Storage
Protect V8.1.2 or later, and ensure that the server's certificate is installed
on each system.
2. Set the administrator’s SESSIONSECURITY parameter value to
TRANSITIONAL by issuing the command update admin admin_name
sessionsecurity=transitional
3. Retry the administrator connection.
Tip: If necessary, create a separate administrator account to use only with
clients and servers that are using V8.1.1 or earlier software.
Certificate distribution A node, administrator, or server that is using V8.1.2 or later software has
failed for a node, a SESSIONSECURITY value of STRICT, but you has to reset the value to
administrator, or server. TRANSITIONAL to retry certificate distribution.
Symptom Resolution
When using the new protocol, the automatic transfer of a server’s public
certificate is performed only on the first connection to a server with enhanced
security. After the first connection, the SESSIONSECURITY parameter value
of a node changes from TRANSITIONAL to STRICT. You can temporarily
update a node, administrator, or server to TRANSITIONAL to allow another
automatic transfer of the certificate. While in TRANSITIONAL, the next
connection automatically transfers the certificate if needed and resets the
SESSIONSECURITY parameter to STRICT.
Update the value of the SESSIONSECURITY parameter to TRANSITIONAL by
issuing one of the following commands:
• For client nodes, issue:
update node node_name sessionsecurity=transitional
• For administrators, issue:
update admin admin_name sessionsecurity=transitional
• For servers, issue:
update server server_name sessionsecurity=transitional
Alternatively, you can manually transfer and import the public certificate by
using the dsmcert utility to issue the following commands:
If you are using CA-signed certificates, you must install the CA-root and any
CA-intermediate certificates on each key database for the client, server, and
storage agent that initiates SSL communication.
Certificate exchange When using the new protocol, the automatic transfer of a server’s public
between IBM Storage certificate is performed only on the first connection to a server with enhanced
Protect servers was not security. After the first connection, the SESSIONSECURITY parameter value of
successful. a server changes from TRANSITIONAL to STRICT. Retry certificate exchange
between two IBM Storage Protect servers. For information, see Retrying
certificate exchange between servers.
Certificate exchange When using the new protocol, the automatic transfer of a server’s public
between an IBM certificate is performed only on the first connection to a server with enhanced
Storage Protect server security. After the first connection, the SESSIONSECURITY parameter value of
and a client node was a node changes from TRANSITIONAL to STRICT. To retry certificate exchange
not successful. between clients and servers at versions earlier than V8.1.2, complete these
steps:
1. For existing clients that are configured to use SSL with the cert.arm
certificate, reconfigure them to use the cert256.arm certificate. For
instructions, see Configuring storage agents, servers, clients, and the
Operations Center to connect to the server by using SSL in IBM
Documentation.
2. Update the default certificate by issuing the following command from the
server instance directory:
gsk8capicmd_64 -cert -setdefault -db cert.kdb -stashed
-label "TSM Server SelfSigned SHA Key"
3. Restart the server.
Symptom Resolution
For clients and servers at V8.1.2 and later, the certificates are automatically
distributed. If communication between clients or servers fails, complete these
steps to retry certificate acquisition:
1. For nodes and administrators, set the SESSIONSECURITY parameter to
TRANSITIONAL by issuing the following commands for each node or
administrator that you want to retry:
update node nodename sessionsecurity=transitional
update admin adminname sessionsecurity=transitional
You want to manually The IBM Storage Protect server administrator can automatically deploy a
distribute certificates backup-archive client to update workstations where the backup-archive client
to client systems. is already installed. For information, see Automatic backup-archive client
deployment in IBM Documentation.
To manually add certificates to clients, see Configuring IBM Storage Protect
client/server communication with Secure Sockets Layer in IBM Documentation.
You want to reset The dsmcert utility that is installed with the IBM Storage Protect backup-
certificates for client- archive client is used to create a certificate store for server certificates. Use
to-client sessions. the dsmcert utility to delete the files and re-import the certificates.
As a root user, you want The trusted communications agent (TCA), previously used by non-root users
to allow non-root users in V8.1.0 and V7.1.6 and earlier IBM Storage Protect clients, is no longer
to manage your files. available. Root users can use the following methods to allow non-root users to
manage their files:
Symptom Resolution
You want to resolve When multiple applications that use GSKit are installed on the same system,
GSKit compatibility incompatibility issues might occur. To resolve these issues, see the following
issues. information:
• For IBM Storage Protect clients, see Technote 2011742.
• For Db2, see Technote 7050721.
• For IBM Storage Protect server, see Technote 2007298.
• For IBM Storage Protect server and client on the same Windows system, see
Technote 7050721.
For more information about troubleshooting security updates, see technote 2004844.
Procedure
1. Remove the certificate from the partner server's database by issuing the following command on both
servers:
Tip: The server might be using the wrong certificate if you are still getting error messages for each
server-to-server session after you have completed the steps in this task and restarted the servers. If
you determine that the server is attempting to use the wrong certificate, delete the certificate from the
key database by issuing the following command:
2. Delete the server definition by issuing the DELETE SERVER command for both the server and
the partner server. If you cannot delete the server definition, you must configure the certificates
manually. For instructions about manually configuring certificates, see Configuring storage agents,
servers, clients, and the Operations Center to connect to the server by using SSL in IBM Documentation.
3. To reacquire the certificate, cross-define the servers to each other and allow them to exchange
certificates by issuing the following commands on both servers:
set crossdefine on
set serverhladdress hladdress
4. Issue the following command on one of the servers that you are cross defining:
5. Repeat step 3 for all other Version 8.1.2 or later server pairs.
6. Restart the servers.
7. To verify that certificates were exchanged, issue the following command from the server instance
directory of each server that you want to verify:
Example output:
example.website.com:1542:0
Tip: If you use replication, the replication heartbeat runs approximately every 5 minutes and initiates
a certificate exchange during the first connection after you upgrade the server. This connection causes
messages ANR8583E and ANR8599W to appear in the log once, before a certificate exchange takes
place. If you do not use replication, certificates are exchanged the first time a server-to-server session
is initiated, except for server configurations without a server defined on both computers.
8. For servers that are defined as a virtual volume, complete the following steps:
a) Remove the partner certificate from the server's database by issuing the following command on
both servers:
b) Ensure that the same password is used for the server password value on the DEFINE SERVER
command on the source server, the password value on the REGISTER NODE command on
the virtual volume server, and the SET SERVERPASSWORD value on the virtual volume server.
If necessary, update a password by using the UPDATE SERVER, UPDATE NODE, or SET
SERVERPASSWORD commands, respectively. Certificates are exchanged after the first client backup
operation from the virtual volume server to the source server.
9. If you are still unable to exchange certificates between servers, complete the following steps:
a) In the server definition for each of the communicating servers, verify that you specified a server
name that matches the name that was set by issuing the SET SERVERNAME command on the
partner server.
b) Verify that server definitions have passwords that are specified with the SET SERVERPASSWORD
command. The passwords must match the value that is specified with the SET SERVERNAME
command for the partner server.
c) After completing steps a and b, reissue the following command:
Procedure
1. Review “What you should know first” on page 3.
2. Review each of the following subsections.
Tasks, characteristics,
Question options, or settings More information
Does the operating If you are using Review operating system requirements at technote 84861.
system and the minimum required
hardware meet amount of memory, you Additionally, review the guidance in Tuning tasks for operating
or exceed can support a minimal systems and other applications.
requirements? workload. For more information about requirements when these features
• Number and You can experiment are in use, see the following topics:
speed of by adding more • Checklist for data deduplication
processors system memory to
• Checklist for node replication
• System memory determine whether
the performance is For more information about sizing requirements for the server
• Supported improved. Then, decide and storage, see the IBM Storage Protect Blueprint.
operating whether you want
system level to keep the system
memory dedicated to
the server. Test the
memory variations by
using the entire daily
cycle of the server
workload.
If you run multiple
servers on the system,
add the requirements
for each server to get
the requirements for the
system.
Are disks The amount of tuning For more information, see the following topics:
configured that can be done for
for optimal different disk systems • "Planning for server database disks"
performance? varies. Ensure that • "Planning for server recovery log disks"
the appropriate queue • "Planning for storage pools in DISK or FILE device classes"
depths and other disk
system options are set.
Tasks, characteristics,
Question options, or settings More information
Does the server Heavier workloads and For more information about requirements when these features
have enough advanced features such are in use, see the following topics:
memory? as data deduplication
and data replication • Checklist for data deduplication
require more than • Checklist for node replication
the minimum system • Memory requirements
memory that is
specified in the
system requirements
document.
For databases that
are not enabled for
data deduplication, use
the following guidelines
to specify memory
requirements:
• For daily ingest of data
of less than 1 TB,
you need 24 GB of
memory.
• For daily ingest of data
of 1 TB - 10 TB,
you need 64 GB of
memory.
• For daily ingest of data
of 10 TB - 30 TB,
you need 192 GB of
memory.
• For daily ingest of
data up to 100 TB,
you need 384 GB of
memory.
Ensure that you
allocate extra space
for the active log and
the archive log for
replication processing.
Tasks, characteristics,
Question options, or settings More information
Does the system Understand what See Tuning HBA capacity.
have enough host operations require use
bus adapters of HBAs at the same
(HBAs) to time.
handle the
For example, a server
data operations
must store 1 GB/sec
that the IBM
of backup data while
Storage Protect
also doing storage pool
server must run
migration that requires
simultaneously?
0.5 GB/sec capacity to
complete. The HBAs
must be able to handle
all of the data at the
speed required.
Is network Network bandwidth For more information, see the following topics:
bandwidth greater must allow the system
• Tuning network performance
than the to complete operations
planned maximum such as backups in the • Checklist for node replication
throughput for time that is allowed or
backups? that meets service level
commitments.
For data replication,
network bandwidth
must be greater than
the planned maximum
throughput.
Are you using Use a file system For more information, see Configuring the operating system for
a preferred file that ensures optimal disk performance.
system for IBM performance and data
Storage Protect availability. The server
server files? uses direct I/O with file
systems that support
the feature. Using
direct I/O can improve
throughput and reduce
processor use. For more
information about the
preferred file system for
your operating system,
see IBM Storage Protect
server-supported file
systems.
Tasks, characteristics,
Question options, or settings More information
Are you planning Paging space, or swap
to configure space, extends the
enough paging memory that is available
space? for processing. When
the amount of free
RAM in the system is
low, programs or data
that is not in use are
moved from memory
to paging space. This
action releases memory
for other activities, such
as database operations.
Restriction: Do not
use paging space to
add memory to your
system. Paging space is
intended to provide only
a limited and temporary
extension of space. If
your system uses paging
space, system memory
is full and must be
extended.
Paging space
is automatically
configured.
Are you planning to create at least Heavier workloads and use of some For more information, see the
features require more database
four directories, also called storage following topics:
paths, on four separate LUNs for storage paths than the minimum
For help with forecasting growth
the database? requirements.
when the server deduplicates data,
Create one directory per distinct Server operations such as data see technote 1596944.
array on the subsystem. If you have deduplication drive a high number For the most recent information
fewer than three arrays, create a of input/output operations per
about database size, database
separate LUN volume within the second (IOPS) for the database.
reorganization, and performance
array. Such operations perform better
considerations for IBM Storage
when the database has more
Protect servers, see technote
directories.
1683633.
Use the following guidelines to
For information about setting the
create directories in the server
DB2_PARALLEL_IO variable, see
database:
Recommended settings for IBM
• For server databases less than 2 Db2 registry variables.
TB, you need 4 directories.
• For server databases with a
size of 2 - 4 TB, you need 8
directories.
• For server databases greater than
4 TB, you need 12 directories.
Consider planned growth of the
system when you determine how
many storage paths to create. The
server uses the higher number of
storage paths more effectively if the
storage paths are present when the
server is first created.
Use the DB2_PARALLEL_IO variable
to force parallel I/O to occur
on table spaces that have one
container, or on table spaces that
have containers on more than one
physical disk. If you do not set
the DB2_PARALLEL_IO variable, I/O
parallelism is equal to the number
of containers that are used by the
table space. For example, if a table
space spans four containers, the
level of I/O parallelism that is used
is 4.
Are the logs on disks that have Nonvolatile write cache allows data
nonvolatile write cache? to be written to the logs as fast as
possible. Faster write operations for
the logs can improve performance
for server operations.
Are you defining an archive failover The archive failover log is for Use the
log? Are you placing this log on emergency use by the server ARCHFAILOVERLOGDIRECTORY
a disk that is separate from the when the archive log becomes full. server option to specify the location
archive log? Slower disks can be used for the of the archive failover log.
archive failover log.
Monitor the usage of the directory
for the archive failover log. If the
archive failover log must be used by
the server, the space for the archive
log might not be large enough.
If you are mirroring the active log, You can mirror the log by using one If you mirror the active log, ensure
are you using only one type of of the following methods. Use only that the disks for both the active
mirroring? one type of mirroring for the log. log and the mirror copy have equal
speed and reliability.
• Use the MIRRORLOGDIRECTORY
option that is available for the For more information, see
IBM Storage Protect server to Configuring and tuning the recovery
specify a mirror location. log.
• Use mirroring in the disk system
hardware.
Have you properly sized the storage Configure the server to have a For more information about sizing
capacity for the database active log minimum active log size of 128 for your system, see the IBM
and archive log? GB by setting the ACTIVELOGSIZE Storage Protect Blueprints and
server option to a value of 131072. locate the Blueprint for your
operating system.
The suggested starting size for the
archive log is 1 TB. The size of the
archive log is limited by the size
of the file system on which it is
located, and not by a server option.
Ensure that there is at least 10%
extra disk space for the file system
than the size of the archive log.
Use a directory for the database
archive logs with an initial free
capacity of at least 1 TB.
Specify the directory by using the
ARCHLOGDIRECTORY server option.
Define space for the archive
failover log by using the
ARCHFAILOVERLOGDIRECTORY
server option.
Are the IBM Storage Protect The database must not share disk For more information about
database and logs on separate disk volumes with IBM Storage Protect server database and recovery log
volumes (LUNs)? database logs or storage pools, or configuration, see Server database
with any other application or file and recovery log configuration and
Is the disk that is used for the
system. tuning.
database configured according to
best practices for a transactional
database?
Are you using a minimum of eight If you are planning to use client- • Data Deduplication FAQ
(2.2 GHz or equivalent) processor side data deduplication, verify
cores for each IBM Storage Protect that client systems have adequate • IBM Storage Protect Blueprints
server that you plan to use with resources available during a
data deduplication? backup operation to complete data
deduplication processing. Use a
processor that is at least the
minimum equivalent of one 2.2 GHz
processor core per backup process
with client-side data deduplication.
Did you allocate enough storage For a rough estimate, plan for The optimal IBM Storage Protect
space for the database? 100 GB of database storage for environment is set up by using the
every 25 TB of data that is to be IBM Storage Protect Blueprints.
protected in deduplicated storage
pools. Protected data is the amount
of data before data deduplication,
including all versions of objects
stored.
For database backup operations
with a large number of small files,
where the average size of the file is
less than 512 KB, you need more
database space. For smaller object
sizes, plan on 100 GB of database
space for every 10 TB stored.
As a best practice, define
a new container storage pool
exclusively for data deduplication.
Data deduplication occurs at the
storage-pool level, and all data
within a storage pool, except
encrypted data, is deduplicated.
Have you scheduled daily The best practice sequence of • Scheduling data deduplication
operations based on your backup operations is in the following order: and node replication processes
strategy?
1. Client backup • Daily operations for directory-
container storage pools
2. Storage pool protection
3. Data replication
4. Database backup
5. Expire inventory
Is sufficient bandwidth available to To transfer data to an IBM Storage For more information, see the
transfer data to an IBM Storage Protect server, use client-side enablededup client option.
Protect server? or server-side data deduplication
and compression to reduce the
bandwidth that is required.
Have you determined how many Assign directories to a storage
storage pool directories to assign to pool by using the DEFINE
each storage pool? STGPOOLDIRECTORY command.
Create multiple storage pool
directories and ensure that each
directory is backed up to a separate
disk volume (LUN).
Did you allocate enough disk space To prevent backup failures, ensure
in the cloud-container storage that the local directory has enough
pool? space. Use the following list as a
guide for optimal disk space:
• For serial-attached SCSI (SAS)
and spinning disk, calculate
the amount of new data that
is expected after daily data
reduction (compression and data
deduplication). Allocate up to
100 percent of that amount, in
terabytes, for disk space.
• For Flash or SSD based systems
with fast network connections to
high-performance cloud systems
refer to the IBM Storage Protect
Blueprints for the latest guidance
on disk recommendations.
Did you select the appropriate type Ensure that data transfers from
of local storage? local storage to cloud finish before
the next backup cycle starts.
Tip: Data is removed from local
storage soon after it moves to the
cloud.
Use the following guidelines:
• Use flash or SSD for large systems
that have high-performing cloud
systems. Ensure that you have
a dedicated 10 GB wide area
network (WAN) link with a high-
speed connection to the object
storage. For example, use flash or
SSD if you have a dedicated 10
GB WAN link plus a high-speed
connection to either an IBM
Cloud Object Storage location or
to an Amazon Simple Storage
Service (Amazon S3) data center.
• Use larger capacity 15000 rpm
SAS disks for these scenarios:
– Medium-sized systems
– Slower cloud connections, for
example, 1 GB
– When you use IBM Cloud
Object Storage as your service
provider across several regions
• For SAS or spinning disk,
calculate the amount of new data
that is expected after daily data
reduction (compression and data
deduplication). Allocate up to 100
percent of that amount for disk
space, in terabytes.
For cloud-container storage pools, To optimize performance, define For more information, see the IBM
have you defined multiple access for the following number Storage Protect Cloud Blueprints.
Accesser® endpoints if you are of Accessers for small, medium,
using an on-premises IBM Cloud and large blueprint systems,
Object Storage system with IBM depending on your data ingestion
Storage Protect? requirements:
• Small system: 1 Accesser
• Medium system: 2 Accessers
• Large system: 3-4 Accessers
You can schedule daily activities for IBM Storage Protect by using the Operations Center. The Operations
Center creates the storage pool protection schedules when you use the wizards to configure replication
or add a directory-container storage pool. You can also use the Operations Center to schedule client
backups.
To manually create a schedule for daily operations, use the DEFINE SCHEDULE command. To plan the
daily schedules for server maintenance tasks, refer to "Tuning the schedule for daily operations" in IBM
Documentation.
Procedure
1. Perform an incremental backup of all clients on the network by using the incremental client
command or use another supported method for client backup operations.
2. Create a DR copy of the IBM Storage Protect database by using the BACKUP DB command.
3. Protect data in directory-container storage pools to reduce node replication time by using the
PROTECT STGPOOL command. Protect storage pools at regular intervals during the daily schedule.
4. Perform node replication to create a secondary copy of the client data on another IBM Storage Protect
server by using the REPLICATE NODE command.
5. Remove objects that exceed their allowed retention period by using the EXPIRE INVENTORY
command.
Is the disk configured to use read Use more cache for better
and write cache? performance.
Do you need to backup the IBM You can back up a database to, Tuning database backups to cloud
Storage Protect database to cloud and restore a database from, cloud object storage.
object storage? object storage for disaster recovery
purposes.
You can tune object storage
endpoints, IBM Cloud Object
Storage Accessers, network
bandwidth, and data streams
to ensure that database backup
operations run efficiently.
For storage pools that use FILE Always maintain enough usable For storage pools that use FILE
device classes, have you compared volumes in the storage pools device classes, only one session or
the maximum number of client to allow for the expected peak process can write to a volume at
sessions to the number of volumes number of client sessions that run the same time.
that are defined? at one time. The volumes might be
scratch volumes, empty volumes,
or partly filled volumes.
For storage pools that use FILE For storage pools that use data Use the REGISTER NODE or
device classes, have you set the deduplication, the MOUNTLIMIT UPDATE NODE server command to
MOUNTLIMIT parameter of the parameter is typically in the range set the MAXNUMMP parameter for
device class to a value that is high of 500 - 1000. client nodes.
enough to account for the number
Set the value for MOUNTLIMIT to
of volumes that might be mounted
the maximum number of mount
in parallel?
points that are needed for all active
sessions. Consider parameters that
affect the maximum number of
mount points that are needed:
• The MAXSESSIONS server option,
which is the maximum number of
IBM Storage Protect sessions that
can run concurrently.
• The MAXNUMMP parameter, which
sets the maximum number of
mount points that each client
node can use.
For example, if the maximum
number of client node backup
sessions is typically 100 and each
of the nodes has MAXNUMMP=2,
multiply 100 nodes by the 2 mount
points for each node to get the
value of 200 for the MOUNTLIMIT
parameter.
Did you create your storage pools Ensure that each file system is on a For details, see the following topics:
to distribute I/O across multiple file different LUN on the disk system.
• Tuning disk storage for the server
systems?
Typically, having 10 - 30 file • Tuning and configuring storage
systems is a good goal, but ensure pools and volumes
that the file systems are no smaller
than approximately 250 GB.
Procedure
• Review the following table to help you to choose the correct type of storage technology for the storage
resources that the server requires.
Table 5. Storage technology types for IBM Storage Protect storage requirements
Storage
technology Archive log and
type Database Active log archive failover log Storage pools
Solid-state Place the database on If you place the Save SSDs for use Save SSDs for use
disk (SSD) SSD in the following IBM Storage Protect with the database and with the database and
circumstances: database on an SSD, active log. The archive active log. Storage
as a best practice, log and archive pools can be placed
– You are using IBM
place the active log failover logs can be on slower storage
Storage Protect
on an SSD. If space placed on slower technology types.
data deduplication.
is not available, use storage technology
– You are backing up high-performance disk types.
more than 8 TB of instead.
new data daily.
High- Use high-performance Use high-performance You can use high- Use high-performance
performance disks in the following disks in the following performance disks for disks for storage
disk with the circumstances: circumstances: the archive log and pools in the following
following archive failover logs. circumstances:
– The server does – The server does
characteristi For availability, isolate
not do data not do data – Data is frequently
cs: these logs from the
deduplication. deduplication. read.
database and active
– 15k rpm – The server does not – The server does not log. – Data is frequently
disk do data replication. do data replication. written.
– Fibre
Isolate the server For performance and For performance and
Channel
database from its logs availability, isolate availability, isolate
or serial-
and storage pools, and the active log from storage pool data
attached
from data for other the server database, from the server
SCSI
applications. archive logs, and database and logs,
(SAS)
storage pools. and from data for
interface
other applications.
Medium- If the disk system If the disk system You can use medium- Use medium-
performance has a mix of disk has a mix of disk performance or high- performance or high-
or high- technologies, use the technologies, use the performance disk for performance disk
performance faster disks for the faster disks for the the archive log and for storage pools
disk with the database and active database and active archive failover logs. in the following
following log. Isolate the server log. For performance For availability, isolate circumstances:
characteristi database from its logs and availability, isolate these logs from the
– Data is frequently
cs: and storage pools, and the active log from database and active
read.
from data for other the server database, log.
– 10k rpm – Data is frequently
applications. archive logs, and
disk written.
storage pools.
– Fibre
For performance and
Channel
availability, isolate
or SAS
storage pool data
interface
from the server
database and logs,
and from data for
other applications.
Table 5. Storage technology types for IBM Storage Protect storage requirements (continued)
Storage
technology Archive log and
type Database Active log archive failover log Storage pools
SATA, Do not use this Do not use this Use of this slower Use this slower
network- storage for the storage for the active storage technology is storage technology
attached database. Do not log. acceptable because in the following
storage place the database on these logs are written circumstances:
XIV® storage systems. once and infrequently
– Data is infrequently
read.
written, for example
written once.
– Data is infrequently
read.
.
Tape and Use for long-term
virtual tape retention or if data is
infrequently used.
Procedure
• The following best practices are the most important for optimal performance and problem prevention.
• Review the table to determine the best practices that apply to your environment.
Ensure that the server system has enough Review operating system requirements in technote 84861.
memory. Heavier workloads require more than the minimum
requirements. Advanced features such as data deduplication and
data replication can require more than the minimum memory
that is specified in the system requirements document.
If you plan to run multiple instances, each instance requires the
memory that is listed for one server. Multiply the memory for
one server by the number of instances that are planned for the
system.
Use at least four directories for the server Place each directory on a LUN that is isolated from other LUNs
database. For larger servers or servers and from other applications.
that use advanced features, use eight
A server is considered to be large if its database is larger than 2
directories.
TB or is expected to grow to that size. Use eight directories for
such servers.
See "Planning for server database disks."
If you are using data deduplication, data Configure the server database according to the guidelines,
replication, or both, follow the guidelines for because the database is extremely important to how well the
database configuration and other items. server runs when these features are being used. For details and
more tips, see the following topics:
– Checklist for data deduplication
– Checklist for node replication
For storage pools that use FILE type device Review the information in Optimal number and size of volumes
classes, follow the guidelines for the size for storage pools that use disk to help you to determine volume
of storage pool volumes. Typically, 50 GB size.
volumes are best.
Configure storage pool devices and file systems based on
throughput requirements, not only on capacity requirements.
Isolate the storage devices that are used by IBM Storage Protect
from other applications that have high I/O, and ensure that there
is enough throughput to that storage.
For more details, see Checklist for storage pools on DISK or FILE.
Schedule IBM Storage Protect client For more details, see the following topics:
operations and server maintenance
– Tuning the schedule for daily operations
activities to avoid or minimize overlap of
operations. – Checklist for server configuration
Monitor operations constantly. By monitoring, you can find problems early and more easily
identify causes. Keep records of monitoring reports for up to
a year to help you identify trends and plan for growth. See
Monitoring and maintaining the environment for performance.
Hardware and software requirements for the IBM Storage Protect server installation
The optimal IBM Storage Protect environment is set up with data deduplication by using the IBM Storage
Protect Blueprints.
For the most current information about IBM Storage Protect system requirements, see technote
1243309.
Active log
Archive log
Optional: Secondary
archive log (failover
location for archive log)
Capacity planning
Capacity planning for IBM Storage Protect includes managing resources such as the database, the
recovery log and the shared resource area.
Procedure
1. Calculate the number of file versions. Add each of the following values to obtain the number of file
versions:
a) Calculate the number of backed-up files.
For example, as many as 500,000 client files might be backed up at a time. In this example, storage
policies are set to keep up to three copies of backed up files:
2. Calculate the number of cached files, copy storage-pool files, active-data pool files, and deduplicated
files:
a) Calculate the number of cached copies.
For example, caching is enabled in a 5 GB disk storage pool. The high migration threshold of the
pool is 90% and the low migration threshold of the pool is 70%. Thus, 20% of the disk pool, or 1
GB, is occupied by cached files.
If the average file size is about 10 KB, approximately 100,000 files are in cache at any one time:
Based on the preceding calculations, about 0.5 GB of extra database space is required for the client’s
cached files, copy storage-pool files, active-data pool files, and deduplicated files.
3. Calculate the amount of extra space that is required for database optimization.
To provide optimal data access and management by the server, extra database space is required. The
amount of extra database space is equal to 50% of the total space requirements for file objects.
4. Calculate the total amount of database space that is required for the client. The total is approximately
3.5 GB:
5. Calculate the total amount of database space that is required for all clients.
If the client that was used in the preceding calculations is typical and you have 500 clients, for
example, you can use the following calculation to estimate the total amount of database space that is
required for all clients:
Results
Tip: In the preceding examples, the results are estimates. The actual size of the database might differ
from the estimate because of factors such as the number of directories and the length of the path and file
names. Periodically monitor your database and adjust its size as necessary.
What to do next
During normal operations, the IBM Storage Protect server might require temporary database space. This
space is needed for the following reasons:
• To hold the results of sorting or ordering that are not already being kept and optimized in the database
directly. The results are temporarily held in the database for processing.
• To give administrative access to the database through one of the following methods:
Important: Do not change the Db2 software that is installed with the IBM Storage Protect installation
packages and fix packs. Do not install or upgrade to a different version, release, or fix pack, of Db2
software to avoid damage to the database.
Example: Estimating active and archive log sizes for basic client-store operations
Basic client-store operations include backup, archive, and space management. Log space must be
sufficient to handle all store transactions that are in progress at one time.
To determine the sizes of the active and archive logs for basic client-store operations, use the following
calculation:
Active log: Suggested size 19.5 GB 1 Use the following calculation to determine the size of the
active log. One GB equals 1,073,741,824 bytes.
(300 clients x 4096 files stored during
each transaction x 3053 bytes for each
file) ÷ 1,073,741,824 bytes = 3.5 GB
Increase that amount by the suggested starting size of 16
GB:
3.5 + 16 = 19.5 GB
Archive log: Suggested size 58.5 GB 1 Because of the requirement to be able to store archive
logs across three server database-backup cycles, multiply
the estimate for the active log by 3 to estimate the total
archive log requirement.
3.5 x 3 = 10.5 GB
Increase that amount by the suggested starting size of 48
GB:
10.5 + 48 = 58.5 GB
1 The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that does not use deduplication, 16 GB is the suggested minimum size
for an active log. The suggested minimum size for an archive log in a production environment that does not use
deduplication is 48 GB. If you substitute values from your environment and the results are larger than 16 GB
and 48 GB, use your results to size the active log and archive log.
Monitor your logs and adjust their size if necessary.
Example: Estimating active and archive log sizes for clients that use multiple sessions
If the client option RESOURCEUTILIZATION is set to a value that is greater than the default, the
concurrent workload for the server increases.
To determine the sizes of the active and archive logs when clients use multiple sessions, use the following
calculation:
Archive log: Suggested size 79.5 GB 1 153 GB 1 Because of the requirement to be able to store archive
logs across three server-database backup cycles, the
estimate for the active log is multiplied by 3:
10.5 x 3 = 31.5 GB
35 x 3 = 105 GB
Increase those amounts by the suggested starting size of
48 GB:
31.5 + 48 = 79.5 GB
105 + 48 = 153 GB
1 The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that does not use deduplication, 16 GB is the suggested minimum size
for an active log. The suggested minimum size for an archive log in a production environment that does not use
deduplication is 48 GB. If you substitute values from your environment and the results are larger than 16 GB
and 48 GB, use your results to size the active log and archive log.
Monitor your active log and adjust its size if necessary.
Example: Estimating active and archive log sizes for simultaneous write operations
If client backup operations use storage pools that are configured for simultaneous write, the amount of
log space that is required for each file increases.
The log space that is required for each file increases by about 200 bytes for each copy storage pool that
is used for a simultaneous write operation. In the example in the following table, data is stored to two
copy storage pools in addition to a primary storage pool. The estimated log size increases by 400 bytes
for each file. If you use the suggested value of 3053 bytes of log space for each file, the total number of
required bytes is 3453.
This calculation is used in the example in the following table.
Active log: Suggested size 20 GB 1 Use the following calculation to determine the size of the
active log. One GB equals 1,073,741,824 bytes.
(300 clients x 4096 files stored during each
transaction x 3453 bytes for each file) ÷
1,073,741,824 bytes = 4.0 GB
Increase that amount by the suggested starting size of 16
GB:
4 + 16 = 20 GB
Archive log: Suggested size 60 GB 1 Because of the requirement to be able to store archive logs
across three server database-backup cycles, multiply the
estimate for the active log by 3 to estimate the archive log
requirement:
4 GB x 3 = 12 GB
Increase that amount by the suggested starting size of 48
GB:
12 + 48 = 60 GB
1 The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that does not use deduplication, 16 GB is the suggested minimum size
for an active log. The suggested minimum size for an archive log in a production environment that does not use
deduplication is 48 GB. If you substitute values from your environment and the results are larger than 16 GB
and 48 GB, use your results to size the active log and archive log.
Monitor your logs and adjust their size if necessary.
Example: Estimating active and archive log sizes for basic client store operations and
server operations
Migration of data in server storage, identification processes for data deduplication, reclamation, and
expiration might run concurrently with client store operations. Administrative tasks such as administrative
commands or SQL queries from administrative clients can also run concurrently with client store
operations. Server operations and administrative tasks that run concurrently can increase the active log
space that is required.
For example, migration of files from the random-access (DISK) storage pool to a sequential-access disk
(FILE) storage pool uses approximately 110 bytes of log space for each file that is migrated. For example,
suppose that you have 300 backup-archive clients and each one of them backs up 100,000 files every
night. The files are initially stored on DISK and then migrated to a FILE storage pool. To estimate the
amount of active log space that is required for the data migration, use the following calculation. The
number of clients in the calculation represents the maximum number of client nodes that back up,
archive, or migrate files concurrently at any time.
300 clients x 100,000 files for each client x 110 bytes = 3.1 GB
Add this value to the estimate for the size of the active log that calculated for basic client store
operations.
Example: Estimating active and archive log sizes under conditions of extreme variation
Problems with running out of active log space can occur if you have many transactions that complete
quickly and some transactions that take much longer to complete. A typical case occurs when many
workstation or file-server backup sessions are active and a few very large database server-backup
sessions are active. If this situation applies to your environment, you might need to increase the size
of the active log so that the work completes successfully.
Archive log: Suggested size with a 60 GB 1 Because of the requirement to be able to store archive
full database backup every day logs across three backup cycles, multiply the estimate
for the active log by 3 to estimate the total archive log
requirement:
4 GB x 3 = 12 GB
Increase that amount by the suggested starting size of 48
GB:
12 + 48 = 60 GB
Archive log: Suggested size with a 132 GB 1 Because of the requirement to be able to store archive
full database every week logs across three server database-backup cycles, multiply
the estimate for the active log by 3 to estimate the total
archive log requirement. Multiply the result by the number
of days between full database backups:
(4 GB x 3 ) x 7 = 84 GB
Increase that amount by the suggested starting size of 48
GB:
84 + 48 = 132 GB
1 The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that does not use deduplication, 16 GB is the suggested minimum size
for an active log. The suggested starting size for an archive log in a production environment that does not use
deduplication is 48 GB. If you substitute values from your environment and the results are larger than 16 GB
and 48 GB, use your results to size the active log and archive log.
Monitor your logs and adjust their size if necessary.
Example: Estimating active and archive log sizes for data deduplication operations
If you deduplicate data, you must consider its effects on space requirements for active and archive logs.
The following factors affect requirements for active and archive log space:
The amount of deduplicated data
The effect of data deduplication on the active log and archive log space depends on the percentage of
data that is eligible for deduplication. If the percentage of data that can be deduplicated is relatively
high, more log space is required.
The size and number of extents
Approximately 1,500 bytes of active log space are required for each extent that is identified by
a duplicate-identification process. For example, if 250,000 extents are identified by a duplicate-
identification process, the estimated size of the active log is 358 MB:
Consider the following scenario. Three hundred backup-archive clients back up 100,000 files each
night. This activity creates a workload of 30,000,000 files. The average number of extents for each
file is two. Therefore, the total number of extents is 60,000,000, and the space requirement for the
archive log is 84 GB:
File size
Large files that are processed for duplicate identification can also affect the size of the active log.
For example, suppose that a backup-archive client backs up an 80 GB, file-system image. This
object can have a high number of duplicate extents if, for example, the files included in the file
system image were backed up incrementally. For example, assume that a file system image has 1.2
million duplicate extents. The 1.2 million extents in this large file represent a single transaction for a
duplicate-identification process. The total space in the active log that is required for this single object
is 1.7 GB:
If other, smaller duplicate-identification processes occur at the same time as the duplicate-
identification process for a single large object, the active log might not have enough space. For
example, suppose that a storage pool is enabled for deduplication. The storage pool has a mixture of
data, including many relatively small files that range from 10 KB to several hundred KB. The storage
pool also has few large objects that have a high percentage of duplicate extents.
To take into account not only space requirements but also the timing and duration of concurrent
transactions, increase the estimated size of the active log by a factor of two. For example, suppose
that your calculations for space requirements are 25 GB (23.3 GB + 1.7 GB for deduplication of a large
object). If deduplication processes are running concurrently, the suggested size of the active log is 50
GB. The suggested size of the archive log is 150 GB.
The examples in the following tables show calculations for active and archive logs. The example in
the first table uses an average size of 700 KB for extents. The example in the second table uses
an average size of 256 KB. As the examples show, the average deduplicate-extent size of 256 KB
indicates a larger estimated size for the active log. To minimize or prevent operational problems for
the server, use 256 KB to estimate the size of the active log in your production environment.
Active log: 1.7 GB 8.6 GB The estimated active log space that are needed for this
Suggested size that transaction.
is required for
the deduplication
of a single
large object during
a single duplicate-
identification
process
Active log: 66 GB 1 79.8 GB 1 After considering other aspects of the workload on the
Suggested total size server in addition to deduplication, multiply the existing
estimate by a factor of two. In these examples, the active
log space required to deduplicate a single large object is
considered along with previous estimates for the required
active log size.
The following calculation was used for multiple transactions
and an 800 GB object:
(23.3 GB + 1.7 GB) x 2 = 50 GB
Increase that amount by the suggested starting size of 16
GB:
50 + 16 = 66 GB
The following calculation was used for multiple transactions
and a 4 TB object:
(23.3 GB + 8.6 GB) x 2 = 63.8 GB
Increase that amount by the suggested starting size of 16
GB:
63.8 + 16 = 79.8 GB
Archive log: 214.8 GB 1 328.2 GB 1 The estimated size of the active log multiplied by a factor of
Suggested size 3.
The following calculation was used for an 800 GB object:
55.6 GB x 3 = 166.8 GB
Increase that amount by the suggested starting size of 48
GB:
166.8 + 48 = 214.8 GB
The following calculation was used for a 4 TB object:
93.4 GB x 3 = 280.2 GB
Active log
If the amount of available active log space is too low, the following messages are displayed in the activity
log:
ANR4531I: IC_AUTOBACKUP_LOG_USED_SINCE_LAST_BACKUP_TRIGGER
This message is displayed when the active log space exceeds the maximum specified size. The IBM
Storage Protect server starts a full database backup.
To change the maximum log size, halt the server. Open the dsmserv.opt file, and specify a new value
for the ACTIVELOGSIZE option. When you are finished, restart the server.
ANR0297I: IC_BACKUP_NEEDED_LOG_USED_SINCE_LAST_BACKUP
This message is displayed when the active log space exceeds the maximum specified size. You must
back up the database manually.
To change the maximum log size, halt the server. Open the dsmserv.opt file, and specify a new value
for the ACTIVELOGSIZE option. When you are finished, restart the server.
ANR4529I: IC_AUTOBACKUP_LOG_UTILIZATION_TRIGGER
The ratio of used active-log space to available active-log space exceeds the log utilization threshold. If
at least one full database backup has occurred, the IBM Storage Protect server starts an incremental
database backup. Otherwise, the server starts a full database backup.
ANR0295I: IC_BACKUP_NEEDED_LOG_UTILIZATION
The ratio of used active-log space to available active-log space exceeds the log utilization threshold.
You must back up the database manually.
Archive log
If the amount of available archive log space is too low, the following message is displayed in the activity
log:
ANR0299I: IC_BACKUP_NEEDED_ARCHLOG_USED
The ratio of used archive-log space to available archive-log space exceeds the log utilization
threshold. The IBM Storage Protect server starts a full automatic database backup.
Database
If the amount of space available for database activities is too low, the following messages are displayed in
the activity log:
ANR2992W: IC_LOG_FILE_SYSTEM_UTILIZATION_WARNING_2
The used database space exceeds the threshold for database space utilization. To increase the space
for the database, use the EXTEND DBSPACE command, the EXTEND DBSPACE command, or the
DSMSERV FORMAT utility with the DBDIR parameter.
ANR1546W: FILESYSTEM_DBPATH_LESS_1GB
The available space in the directory where the server database files are located is less than 1 GB.
When an IBM Storage Protect server is created with the DSMSERV FORMAT utility or with the
configuration wizard, a server database and recovery log are also created. In addition, files are
created to hold database information used by the database manager. The path specified in this
message indicates the location of the database information used by the database manager. If space is
unavailable in the path, the server can no longer function.
You must add space to the file system or make space available on the file system or disk.
Procedure
1. Open IBM Installation Manager.
2. Click File > Preferences.
3. Select Files for Rollback.
4. Click Delete Saved Files and click OK.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command to start an IBM Installation Manager
command line:
imcl.exe -c
3. Enter P to select Preferences.
4. Enter 3 to select Files for Rollback.
5. Enter D to Delete the Files for Rollback.
6. Enter A to Apply Changes and Return to Preferences Menu.
7. Enter C to leave the Preference Menu.
8. Enter X to Exit Installation Manager.
Instance user ID
The instance user ID is used as the basis for other names related to the server instance. The instance user
ID is also called the instance owner.
For example: tsminst1
The instance user ID is the user ID that must have ownership or read/write access authority to all
directories that you create for the database and the recovery log. The standard way to run the server is
under the instance user ID. That user ID must also have read/write access to the directories that are used
for any FILE device classes.
• The server key database file, cert.kdb, and the .arm files (used by clients and other servers to
import the Secure Sockets Layer certificates of the server)
• Device configuration file, if the DEVCONFIG server option does not specify a fully qualified name
• Volume history file, if the VOLUMEHISTORY server option does not specify a fully qualified name
• Volumes for DEVTYPE=FILE storage pools, if the directory for the device class is not fully specified,
or not fully qualified
• User exits
• Trace output (if not fully qualified)
Database name
The database name is always TSMDB1, for every server instance. This name cannot be changed.
Server name
The server name is an internal name for IBM Storage Protect, and is used for operations that
involve communication among multiple IBM Storage Protect servers. Examples include server-to-server
communication and library sharing.
The server name is also used when you add the server to the Operations Center so that it can be managed
using that interface. Use a unique name for each server. For easy identification in the Operations Center
(or from a QUERY SERVER command), use a name that reflects the location or purpose of the server. Do
not change the name of an IBM Storage Protect server after it is configured as a hub or spoke server.
If you use the wizard, the default name that is suggested is the host name of the system that you are
using. You can use a different name that is meaningful in your environment. If you have more than one
server on the system and you use the wizard, you can use the default name for only one of the servers.
You must enter a unique name for each server.
For example,
TUCSON_SERVER1
TUCSON_SERVER2
Procedure
1. Download the appropriate package file from one of the following websites.
• Download the server package from Passport Advantage or Fix Central.
• For the latest information, updates, and maintenance fixes, go to the IBM Support Portal.
2. If you downloaded the package from an IBM download site, complete the following steps:
a. Verify that you have enough space to store the installation files when they are extracted from the
product package. See the download document for the space requirements:
• IBM Storage Protect technote 588021
• IBM Storage Protect Extended Edition technote 588023
• IBM Storage Protect for Data Retention technote 588025
b. Change to the directory where you placed the executable file.
Important: In the next step, the files are extracted to the current directory. The path must contain
no more than 128 characters. Be sure to extract the installation files to an empty directory. Do not
extract to a directory that contains previously extracted files, or any other files.
c. Either double-click the executable file, or enter the following command on the command line to
extract the installation files. The files are extracted to the current directory.
package_name.exe
Procedure
Install IBM Storage Protect by using this method:
Option Description
Installing the a. Change to the directory where you downloaded the package.
software from
b. Start the installation wizard by issuing the following command:
a downloaded
package: install.bat
Or, in the directory where the installation files were extracted, double-click the
install.bat file.
Tip: To upgrade the instance, you must select Y to Do you update the instance?
question. If you select No, the instance is ignored and deleted. You must then
recreate and upgrade the instance manually after the upgrade is completed.
What to do next
• If errors occur during the installation process, the errors are recorded in log files that are stored in the
IBM Installation Manager logs directory.
You can view installation log files by clicking File > View Log from the Installation Manager tool. To
collect these log files, click Help > Export Data for Problem Analysis from the Installation Manager
tool.
• After you install the server and components, and before you customize it for your use, go to the IBM
Support Portal. Click Downloads (fixes and PTFs) and apply any applicable fixes.
• After you install a new server, review Chapter 3, “Taking the first steps after you install IBM Storage
Protect,” on page 71 to learn about configuring your server.
• If a native device driver is available on Windows for the tape drives or medium changers that you plan to
use, use the native device driver. If a native device driver is not available on Windows for the tape drives
or medium changers that you plan to use, install the IBM Storage Protect device driver by issuing the
dpinst.exe /a command. The dpinst.exe file is in the device driver directory. The default directory
is C:\Program Files\Tivoli\TSM\device\drivers.
Procedure
Install IBM Storage Protect by using this method:
Option Description
Installing the a. Change to the directory where you downloaded the package.
software from
b. Start the installation wizard in console mode by issuing the following command:
a downloaded
package: install.bat -c
Upgrading the a. Use cd command to change the current directory to the directory where you
software by extracted the software package. For example:
using the
console mode cd /code/software/server
b. Start the installation wizard in console mode by issuing the following command:
./install.sh -c
Output:
c. Select 2. Update - Find and install updates and fixes to installed software
packages
Option Description
Output:
e. Ensure that you select all the products that require to be upgraded. Select U to
start the upgrade.
Tip: To upgrade the instance, you must select Y to Do you update the instance?
question. If you select No, the instance is ignored and deleted. You must then
recreate and upgrade the instance manually after the upgrade is completed.
What to do next
• If errors occur during the installation process, the errors are recorded in log files that are stored in the
IBM Installation Manager logs directory, for example:
C:\ProgramData\IBM\Installation Manager\logs
• After you install the server and components, and before you customize it for your use, go to the IBM
Support Portal. Click Downloads (fixes and PTFs) and apply any applicable fixes.
• After you install a new server, review Chapter 3, “Taking the first steps after you install IBM Storage
Protect,” on page 71 to learn about configuring your server.
• If a native device driver is available on Windows for the tape drives or medium changers that you plan to
use, use the native device driver. If a native device driver is not available on Windows for the tape drives
or medium changers that you plan to use, install the IBM Storage Protect device driver by issuing the
dpinst.exe /a command. The dpinst.exe file is in the device driver directory. The default directory
is C:\Program Files\Tivoli\TSM\device\drivers.
Procedure
1. Create a response file.
You can modify the sample response file or create your own file.
2. If you install the server and Operations Center in silent mode, create a password for the Operations
Center truststore in the response file.
If you are using the install_response_sample.xml file, add the password in the following line of
the file, where mypassword represents the password:
What to do next
• If errors occur during the installation process, the errors are recorded in log files that are stored in the
IBM Installation Manager logs directory, for example:
C:\ProgramData\IBM\Installation Manager\logs
• After you install the server and components, and before you customize it for your use, go to the IBM
Support Portal. Click Downloads (fixes and PTFs) and apply any applicable fixes.
• After you install a new server, review Chapter 3, “Taking the first steps after you install IBM Storage
Protect,” on page 71 to learn about configuring your server.
• If a native device driver is available on Windows for the tape drives or medium changers that you plan to
use, use the native device driver. If a native device driver is not available on Windows for the tape drives
or medium changers that you plan to use, install the IBM Storage Protect device driver by issuing the
dpinst.exe /a command. The dpinst.exe file is in the device driver directory. The default directory
is C:\Program Files\Tivoli\TSM\device\drivers.
Restriction: For Operations Center users, some characters might not be displayed properly if the web
browser does not use the same language as the server. If this problem occurs, set the browser to use the
same language as the server.
If the locale is successfully initialized, it formats the date, time, and number for the server. If the locale is
not successfully initialized, the server uses the US English message files and the date, time, and number
format.
Procedure
To install the OSSM component, complete the following steps:
1. Change to the directory where you downloaded the installation package.
2. Start the installation wizard by issuing the following command:
./install.sh
What to do next
For more information on configuring the OSSM instance and backing up VMware data to the OSSM server,
refer to Backing up VMware data to the Open Snap Store Manager.
Procedure
1. Create the user ID that will own the server instance.
You use this user ID when you create the server instance in a later step.
Create a user ID that will be the owner of the IBM Storage Protect server instance. A user ID can
own more than one IBM Storage Protect server instance. Identify the user account that will own
the server instance.
When the server is started as a Windows service, this account is the one that the service will log on
to. The user account must have administrative authority on the system. One user account can own
more than one server instance.
If you have multiple servers on one system and want to run each server with a different user
account, create a new user account in this step.
Create the user ID.
Restriction: The user ID must comply with the following rule:
In the user ID, only lowercase letters (a-z), numerals (0-9), and the underscore character ( _ )
can be used. The user ID must be 30 characters or less, and cannot start with ibm, sql, sys, or
a numeral. The user ID and group name cannot be user, admin, guest, public, local, or any SQL
reserved word.
a. Use the following operating system command to create the user ID:
You are prompted to create and verify a password for the new user ID.
b. Issue the following operating system commands to add the new user ID to the Administrators
groups:
Create empty directories for each item in the table and ensure that the new user ID you just created
has read/write permission to the directories. The database, archive log, and active log must reside on
different physical volumes.
Example commands for creating
Item the directories Your directories
The instance directory for mkdir d:\tsm\server1
the server, which is a
directory that will contain
files specifically for this
server instance (the server
options file and other
server-specific files)
Create empty directories for each item in the table and ensure that the new user ID you just created
has read/write permission to the directories. The database, archive log, and active log must reside on
different physical volumes. (continued)
Example commands for creating
Item the directories Your directories
Optional: Secondary mkdir
archive log directory k:\tsm\archlogfailover
(failover location for archive
log)
When a server is initially created by using the DSMSERV FORMAT utility or the configuration wizard,
a server database and recovery log are created. In addition, files are created to hold database
information that is used by the database manager.
3. Log off the new user ID.
Procedure
1. Ensure that the following requirements are met:
Chapter 3. Taking the first steps after you install IBM Storage Protect 73
Installing the IBM Storage Protect server
• Ensure that the following ports are not blocked by a firewall: 137, 139 and 445. Complete the
following steps:
a. Click Start > Control Panel > Windows Firewall.
b. Select Advanced Settings.
c. Select Inbound Rules in the navigation pane.
d. Select New Rule.
e. Create a port rule for TCP ports 137, 139 and 445 to allow connections for domain and private
networks.
• Configure User Account Control:
Access all three of the user account control configuration settings by first accessing Local Security
Policy Security options. For more information, see “Configuring Remote Execution Protocol on
Windows” on page 74.
2. Start the local version of the wizard:
Either click Start > All Programs > IBM Storage Protect > Configuration Wizard. Or, double-click
the dsmicfgx.exe program in installation_directory\server. The default directory is
C:\Program Files\Tivoli\TSM.
Follow the instructions to complete the configuration. The wizard can be stopped and restarted, but
the server is not operational until the entire configuration process is complete.
Procedure
If the system is running on Windows, complete the following steps to disable User Account Control:
a) Enable the built-in Administrator account. Complete the following steps:
i) Click Control Panel > Administrative Tools > Local Security Policy.
ii) Under Security Settings, double-click Local Policies.
iii) Double-click Security Options.
iv) Double-click the Accounts: Administrator account status section.
v) Select Enable and click OK.
b) Disable User Account Control for all Windows administrators. Complete the following steps:
i) Click Control Panel > Administrative Tools > Local Security Policy.
ii) Under Security Settings, double-click Local Policies.
iii) Double-click Security Options.
iv) Double-click the User Account Control: Run all administrators in Admin Approval Mode section.
v) Select Disable and click OK.
c) Disable User Account Control for the built-in Administrator account. Complete the following steps:
i) Click Control Panel > Administrative Tools > Local Security Policy.
ii) Under Security Settings, double-click Local Policies.
iii) Double-click Security Options.
iv) Double-click the User Account Control: Admin Approval Mode for the Built-in Administrator
Account section.
For example, if the user account is tsminst1 and the server instance is Server1, enter the following
command:
You are prompted for the password for user ID tsminst1. Later, when you create and format the
database, you use the instance name that you specified with this command, with the -k option.
2. Change the default path for the database to be the drive where the instance directory for the server is
located. Complete the following steps:
a. Click Start > Programs > IBM DB2 > DB2TSM1 > Command Line Tools > Command Line
Processor.
b. Enter quit to exit the command line processor.
A window with a command prompt should now be open, with the environment properly set up to
successfully issue the commands in the next steps.
c. From the command prompt in that window, issue the following command to set the environment
variable for the server instance that you are working with:
Chapter 3. Taking the first steps after you install IBM Storage Protect 75
Installing the IBM Storage Protect server
set db2instance=instance_name
The instance_name is the same as the instance name that you specified when you issued the
db2icrt command. For example, to set the environment variable for the Server1 server instance,
issue the following command:
set db2instance=server1
For example, the instance directory is d:\tsm\server1 and the instance location is drive d:.
Enter the command:
commmethod tcpip
tcpport 1500
tcpwindowsize 0
tcpnodelay yes
commmethod namedpipe
namedpipename \\.\pipe\adsmpipe
COMMMETHOD can be used multiple times in the IBM Storage Protect server options file, with a different
value each time. For example, the following example is possible:
commmethod tcpip
commmethod namedpipe
Chapter 3. Taking the first steps after you install IBM Storage Protect 77
Installing the IBM Storage Protect server
For example:
cd \tsminst1
dsmserv -k server2 format dbdir=d:\tsm\db001 activelogsize=32768
activelogdirectory=e:\tsm\activelog archlogdirectory=f:\tsm\archlog
archfailoverlogdirectory=g:\tsm\archfaillog mirrorlogdirectory=h:\tsm\mirrorlog
Tip: If you specify multiple directories, ensure that the underlying file systems are of equal size to ensure
a consistent degree of parallelism for database operations. If one or more directories for the database are
smaller than the others, they reduce the potential for optimized parallel prefetching and distribution of
the database.
The password must meet specific length rules. For more information, see REGISTER ADMIN (Register
an administrator ID)
GRANT AUTH
The GRANT AUTH command takes the following parameters:
You must create the administrative user with the classes=system option so that the administrative
user can create other potential administrative users, for example, with limited privileges. Any of these
administrative users can then connect to the IBM Storage Protect Operations Center.
3. To create the administrative user and grant system authority to this user, run the DSMSERV command
with the runfile option and the macro file, for example:
The administrative user can then start the server instance and connect to the server to complete other
required steps, such as setting up the database backup.
Procedure
1. Modify the server options.
Edit the server options file, dsmserv.opt, in the server instance directory by using a text editor.
Follow these guidelines when you edit the server options file:
• To enable an option, remove the asterisk at the beginning of the line.
• Enter an option on any line.
• Enter only one option per line. The entire option with its value must be on one line.
• If you have multiple entries for an option in the file, the server uses the last entry.
To view available server options, see the sample file, dsmserv.opt.smp, in the c:\Program
Files\Tivoli\TSM directory.
2. If you plan to use data deduplication, enable the ALLOWREORGINDEX server option.
Add the following option and value to the server options file:
Chapter 3. Taking the first steps after you install IBM Storage Protect 79
Installing the IBM Storage Protect server
allowreorgindex yes
3. Set the REORGBEGINTIME and REORGDURATION server options to control when reorganization starts
and how long it runs. Select a time and duration so that reorganization runs when you expect that the
server is least busy.
These server options control both table and index reorganization processes.
a) Set the time for reorganization to start by using the REORGBEGINTIME server option. Specify the
time by using the 24-hour system.
For example, to set the start time for reorganization as 8:30 p.m., specify the following option and
value in the server options file:
reorgbegintime 20:30
b) Set the interval during which the server can start reorganization.
For example, to specify that the server can start reorganization for four hours after the time set by
the REORGBEGINTIME server option, specify the following option and value in the server options
file:
reorgduration 4
4. If the server was running while you updated the server options file, stop and restart the server.
Procedure
Follow the instructions for your selected option:
Option Description
Starting the server as To start the server as a Windows service, take one of the following actions:
a Windows service
• If you configured the server by using the configuration wizard, complete the
following steps:
a. Configure the server to start as a Windows service by following the
instructions in “Configuring the server to start as a Windows service” on
page 81.
Option Description
Starting the server in To start the server in the foreground, follow the instructions in “Starting the
the foreground server in the foreground” on page 83.
Starting the server in To start the server in maintenance mode, follow the instructions in “Starting the
maintenance mode server in maintenance mode” on page 83.
Procedure
1. From the Windows Start menu, click Run, type services.msc, and click OK.
2. In the Services window, select the server instance that you want to start as a service, and click
Properties.
For example, select TSM INST1, and click Properties.
3. To ensure that the server service starts automatically, click the General tab. From the Startup type
list, select Automatic.
4. To set the user for starting the server service, click the Log On tab, and take one of the following
actions:
• If you plan to run the server service under the Local System account, select Local System account
and click OK.
• If you plan to run the server service under the instance user ID, take the following actions:
a. Select This account, and browse for the user ID that owns the server Db2 instance and has
permissions for starting the server.
b. In the Select User window, in the Enter the object name to select field, enter the user ID.
c. Click Check Names.
d. Click OK twice.
5. If you configured the server service to run under the Local System account, grant database access to
the Local System account:
a) Log on with the user ID that was used to create the server database. This user ID is the user ID that
was used to run the DSMSERV FORMAT utility to initialize the server database. Alternatively, if you
configured the server with the dsmicfgx configuration wizard, this user ID is the user ID that was
used to create the instance.
b) Open a Db2 command window. If the server is installed on Windows Server 2012, open the Start
window, and click DB2 Command Window - Administrator.
Chapter 3. Taking the first steps after you install IBM Storage Protect 81
Installing the IBM Storage Protect server
set DB2INSTANCE=server1
db2 connect to TSMDB1
db2 grant dbadm with dataaccess with accessctrl on database to user system
db2 grant secadm on database to user system
Tip: When the server service is configured to run under the Local System account, the database can
be accessed by any administrator on the system. In addition, any administrator who can log on to
the system can run the server.
What to do next
To start the service, follow the instructions in “Starting the server as a Windows service” on page 82.
Procedure
To start the server as a Windows service, complete the following steps:
1. Log on to the server with a user ID that is in the Administrators group.
2. From the Windows Start menu, click Run, type services.msc, and click OK.
3. In the Services window, select the server instance that you want to start, and click Start.
What to do next
Because the server service can issue requests that require action, it is important to monitor server activity
with the Operations Center or the administrative client.
To view start and stop completion messages that are logged in the Windows application log, use the Event
Viewer tool in the Administrative Tools folder.
Procedure
Open a command window and enter the sc.exe create command:
where:
server_name
Specifies the name of the server service.
path_to_server
Specifies the path to the dsmsvc.exe executable file, including the file name. This path is the default
path:
C:\Program Files\Tivoli\TSM\server
instance_name
Specifies the name of the Db2 instance, which is also the name of the server instance, for example,
Server1.
start_type
Specifies the method for starting the service. To automatically start the service, enter auto. If you
specify the auto option, the service starts automatically at system startup and restarts automatically
whenever the system is restarted. To manually start the service, enter demand.
account_name
Specifies the user ID for the account under which the service runs. For example, the account name
might be Administrator. This parameter is optional. If it is not specified, the Local System account is
used.
password
Specifies the password for the account_name user account.
Tip: When you enter the command, ensure that you enter a space after each equal sign (=).
Results
The server starts as a Windows service.
Procedure
1. Change to the directory where the server is installed.
For example, change to the c:\program files\tivoli\tsm\server directory.
2. Enter the following command:
dsmserv -k instance_name
Chapter 3. Taking the first steps after you install IBM Storage Protect 83
Installing the IBM Storage Protect server
In addition, clients are prevented from starting sessions with the server.
Tips:
• You do not have to edit the server options file, dsmserv.opt, to start the server in maintenance mode.
• While the server is running in maintenance mode, you can manually start the storage-space
reclamation, inventory expiration, and storage-pool migration processes.
Procedure
• To start the server in maintenance mode, issue the following command:
dsmserv maintenance
Tip: To view a video about starting the server in maintenance mode, see Starting a server in
maintenance mode.
What to do next
To resume server operations in production mode, complete the following steps:
1. Shut down the server by issuing the HALT command:
halt
2. Start the server by using the method that you use in production mode.
Operations that were disabled during maintenance mode are reenabled.
halt
Registering licenses
Immediately register any IBM Storage Protect licensed functions that you purchase so you do not lose any
data after you start server operations, such as backing up your data.
Procedure
1. Ensure that the IBM Storage Protect server configuration is complete.
Tip: You can configure the server for database backups by using the configuration wizard (dsmicfgx)
or you can complete the steps manually. For more information about configuration, see the Configuring
servers section in IBM Documentation.
2. Select the device class to be used for database backups, protect the master encryption key, and set a
password.
Ensure that the following key files are protected:
• Master encryption key files (dsmkeydb.*)
• Server certificate and private key files (cert.*)
To complete these actions, issue the SET DBRECOVERY command from the administrative command
line:
where device_class_name specifies the device class to be used for database backup operations, and
password_name specifies the password.
You must specify a device class name or the backup fails. By specifying PROTECTKEYS=YES, you
ensure that the master encryption key is backed up during database backup operations. Cloud device
classes require the PROTECTKEYS=YES parameter.
Create a strong password that is at least 8 characters long. If you specify a password for database
backup, you must specify the same password on the RESTORE DB command to restore the database.
Attention: Ensure that you remember the password and keep a copy stored in a secure
location. Without the password, data cannot be recovered.
Example
To specify that database backups include a copy of the master encryption key for the server, run the
following command:
Chapter 3. Taking the first steps after you install IBM Storage Protect 85
Installing the IBM Storage Protect server
You can upgrade directly from V7.1 to V8.1. See the upgrade section for more details. When you upgrade
and have multiple servers on your system, you must run the installation wizard only once. The installation
wizard collects the database and variables information for all of your original server instances.
A typical IBM Storage Protect installation involves one server instance on the IBM Storage Protect server
computer. You might want to install a second instance if you are configuring in a clustered environment.
You might also want to run more than one server on a large computer if you have multiple tape libraries
or a disk-only configuration. After you install and configure the first IBM Storage Protect server, use
the Server Initialization wizard to create additional IBM Storage Protect server instances on the same
computer.
By using the Server Initialization wizard, you can install up to four IBM Storage Protect server instances on
a single system or cluster.
Procedure
1. Monitor the active log to ensure that the size is correct for the workload that is handled by the server
instance.
When the server workload reaches its typical expected level, the space that is used by the active
log is 80% - 90% of the space that is available to the active log directory. At that point, you might
need to increase the amount of space. Whether you must increase the space depends on the types
of transactions in the server workload. Transaction characteristics affect how the active log space is
used.
The following transaction characteristics can affect the space usage in the active log:
• The number and size of files in backup operations
– Clients such as file servers that back up large numbers of small files can cause large numbers of
transactions that are completed quickly. The transactions might use a large amount of space in the
active log, but for a short time.
– Clients such as a mail server or a database server that back up large amounts of data in few
transactions can cause small numbers of transactions that take a long time to complete. The
transactions might use a small amount of space in the active log, but for a long time.
• Network connection types
– Backup operations that occur over fast network connections cause transactions that complete
more quickly. The transactions use space in the active log for a shorter time.
– Backup operations that occur over relatively slower connections cause transactions that take a
longer time to complete. The transactions use space in the active log for a longer time.
If the server is handling transactions with a wide variety of characteristics, the space that is used for
the active log might increase and decrease significantly over time. For such a server, you might need to
ensure that the active log typically has a smaller percentage of its space used. The extra space allows
the active log to grow for transactions that take a long time to complete.
2. Monitor the archive log to ensure that space is always available.
Remember: If the archive log becomes full, and the failover archive log becomes full, the active log
can become full, and the server stops. The goal is to make enough space available to the archive log so
that it never uses all its available space.
You are likely to notice the following pattern:
a. Initially, the archive log grows rapidly as typical client-backup operations occur.
b. Database backups occur regularly, either as scheduled or done manually.
c. After at least two full database backups occur, log pruning occurs automatically. The space that is
used by the archive log decreases when the pruning occurs.
d. Normal client operations continue, and the archive log grows again.
e. Database backups occur regularly, and log pruning occurs as often as full database backups occur.
With this pattern, the archive log grows initially, decreases, and then might grow again. Over time,
as normal operations continue, the amount of space that is used by the archive log should reach a
relatively constant level.
If the archive log continues to grow, consider taking one or both of these actions:
• Add space to the archive log. You might need to move the archive log to a different file system.
• Increase the frequency of full database backups, so that log pruning occurs more frequently.
3. If you defined a directory for the failover archive log, determine whether any logs get stored in that
directory during normal operations. If the failover log space is being used, consider increasing the size
of the archive log.
The goal is that the failover archive log is used only under unusual conditions, not in normal operation.
Chapter 3. Taking the first steps after you install IBM Storage Protect 87
Installing the IBM Storage Protect server
Procedure
To install a fix pack or interim fix, complete the following steps:
1. Back up the database. The preferred method is to use a snapshot backup. A snapshot backup is a
full database backup that does not interrupt any scheduled database backups. For example, issue the
following IBM Storage Protect administrative command:
2. Back up the device configuration information. Issue the following IBM Storage Protect administrative
command:
where file_name specifies the name of the file in which to store device configuration information.
3. Save the volume history file to another directory or rename the file. Issue the following IBM Storage
Protect administrative command:
where file_name specifies the name of the file in which to store the volume history information.
4. Save a copy of the server options file, typically named dsmserv.opt. The file is in the server instance
directory.
5. Halt the server before installing a fix pack or interim fix.
Use the HALT command.
6. Ensure that extra space is available in the installation directory.
The installation of this fix pack might require additional temporary disk space in the installation
directory of the server. The amount of additional disk space can be as much as that required for
installing a new database as part of an IBM Storage Protect installation. The IBM Storage Protect
installation wizard displays the amount of space that is required for installing the fix pack and
the available amount. If the required amount of space is greater than the available amount, the
installation stops. If the installation stops, add the required disk space to the file system and restart
the installation.
7. Obtain the package file for the fix pack or interim fix that you want to install from the IBM Support
Portal, Passport Advantage, or Fix Central.
8. Change to the directory where you placed the executable file.
Then, either double-click the following executable file or enter the following command on the
command line to extract the installation files.
Tip: The files are extracted to the current directory. Ensure that the executable file is in the directory
where you want the extracted files to be located.
8.x.x.x-IBM-SPSRV-platform.exe
where: platform denotes the operating system that IBM Storage Protect is to be installed on.
9. Select one of the following ways of installing IBM Storage Protect.
Important: After a fix pack is installed, it is not necessary to go through the configuration again. You
can stop after completing the installation, fix any errors, then restart your servers.
Install the IBM Storage Protect software by using one of the following methods:
Installation wizard
Follow the instructions for your operating system:
“Installing IBM Storage Protect by using the installation wizard” on page 64
Tip: After you start the wizard, in the IBM Installation Manager window, click the Update icon; do not
click the Install or Modify icon.
Command line in console mode
Follow the instructions for your operating system:
“Installing IBM Storage Protect by using console mode” on page 65
Tip: If you have multiple server instances on your system, run the installation wizard only once. The
installation wizard upgrades all server instances.
Results
Correct any errors that are detected during the installation process.
If you installed the server by using the installation wizard, you can view installation logs by using the IBM
Installation Manager tool. Click File > View Log. To collect log files, from the IBM Installation Manager
tool, click Help > Export Data for Problem Analysis.
If you installed the server by using console mode or silent mode, you can view error logs in the IBM
Installation Manager log directory, for example:
C:\ProgramData\IBM\Installation Manager\logs
Procedure
1. Complete steps 2 - 6 for each server instance.
2. Back up the database by using the BACKUP DB command.
The preferred method is to use a snapshot backup, which provides a full database backup without
interrupting scheduled backups.
For example, you can run the following command to create a snapshot backup:
3. Back up the device configuration information to another directory by issuing the following command:
Where file_name specifies the name of the file in which to store device configuration information.
4. Back up the volume history file to another directory by issuing the following command:
Where file_name specifies the name of the file in which to store the volume history information.
5. Save a copy of the server options file, typically named dsmserv.opt, which is in the server instance
directory.
6. Ensure that the resource group is on the primary node, and that all nodes in the cluster are running.
Take the following actions on the primary node:
a) Take the server resource offline and remove it by completing the following steps:
i) In the Failover Cluster Manager window, select the cluster. Click Roles and select the cluster
role from the Name column. At the end of the Roles window, click the Resources tab. The
server resource is displayed in the Other Resources section.
ii) In the Other Resources section, right-click on each entry and view the properties. Review the
Name and Type properties to determine which resource is the IBM Storage Protect server
resource and which resource is the Db2 resource.
For example, the IBM Storage Protect server resource might have the following properties:
Name: Server1
Type: DB2 Server
Warning: Do not remove the Db2 resource. If you unintentionally remove the Db2
resource during this step, you will be unable to recluster after you upgrade the server.
iii) Select the IBM Storage Protect server resource, and right-click Take Offline.
iv) To remove the IBM Storage Protect server resource, select it, and right-click Remove.
b) In the Failover Cluster Manager window, remove the network name and IP address by
completing the following steps:
i) In the Server Name section, expand the network name to view the IP address. Note the
network name and IP address. Right-click Take Offline.
Note: This action also takes the Db2 server resource offline.
ii) Select the network name and the IP address, and right-click Remove. In the confirmation
message, confirm that you want to remove the client access point.
c) Using the command-line, remove Db2 clustering for each IBM Storage Protect instance in the
cluster by issuing the following command for each instance:
db2mscs -u:instancename
For example, to remove Db2 clustering from the SERVER1 instance, issue the following command:
db2mscs -u:server1
Tip: You might see an error message about a missing cluster resource. Ignore this message.
Note: This action will remove the Db2 resource from the cluster and will delete the DB2
-DB2TSM1 – SERVERX service from the secondary node.
d) On the primary node, in the Failover Cluster Manager window, review the resource group
Summary section. Verify that only the shared disks and any tape resources remain in the resource
group.
7. Stop the cluster service on all nodes in the cluster. One way to stop it is by using the Services
Application. Right-click Cluster Service and select Stop.
8. Beginning with the primary node, install the IBM Storage Protect V8.1 server on all nodes in the
cluster. For instructions, see Chapter 2, “Installing the server components,” on page 63. To install
the server by using the installation wizard, click the Update icon on the IBM Installation Manager
window. Do not click the Install or Modify icons.
9. Restart the cluster service on all nodes in the cluster. One way to start it is by using the Services
Application. Right-click Cluster Service and select Start. Verify that all cluster resources are on the
primary node.
10. With cluster resources on the primary node, start the configuration wizard by clicking Start > Apps
> IBM Storage Protect > Configuration Wizard. Complete the following steps in the configuration
wizard:
a) In the Instance User ID panel, enter the following:
• The Instance name that you want to cluster.
• The User ID that is associated with the cluster. Domain accounts use the following format:
domain\account_name
• The account password.
b) When prompted, click Yes to confirm that you want to recluster.
c) Continue all steps in the wizard until you see a message confirming that the configuration was
successful.
Note: In the Cluster Manager, the status for the Db2 and IBM Storage Protect Group Server
resources might be in a failed state until the server finishes retrying startup.
d) If your environment has multiple server instances, complete step 9 for each server instance.
11. Optional: If necessary, register licenses for the IBM Storage Protect server components that are
installed on your system by issuing the REGISTER LICENSE command:
An upgrade takes approximately 20 - 50 minutes. Your environment might produce different results from
the results that were obtained in the labs.
For information about upgrades in a clustered environment, see “Upgrading the server in a clustered
environment” on page 102.
To revert to an earlier version of the server after an upgrade or migration, you must have a full database
backup and the installation software for the original server. You must also have the following key
configuration files:
• Volume history file
• Device configuration file
• Server options file
Related information
IBM Storage Protect Upgrade and Migration Process - Frequently Asked Questions
Upgrading to V8.1
You can upgrade the server directly from V7.1 to V8.1. You do not have to uninstall V7.1.
Procedure
To upgrade the server to V8.1, complete the following tasks:
1. “Planning the upgrade” on page 96
2. “Preparing the system” on page 96
3. “Installing the server and verifying the upgrade” on page 99
Procedure
1. Review the hardware and software requirements:
Procedure
1. Log on to the computer where the server is installed.
Ensure that you are logged on with the administrative user ID that was used to install the V7.1 server.
2. Obtain a list of Db2 instances. Issue the following system command:
db2ilist
SERVER1
Ensure that each instance corresponds to a server that is running on the system.
3. Gather information about each Db2 instance. Note the default database path, actual database path,
database name, database alias, and any Db2 variables that are configured for the instance. Keep the
record for future reference. This information is required to restore the V7.1 database.
a) Open the Db2 command window by issuing the following system command:
db2cmd
set DB2INSTANCE=instance
d) Obtain information about the Db2 instance databases by issuing the following system command:
Database 1 entry:
Database 2 entry:
e) Obtain the Db2 instance variables by issuing the following system command:
db2set -all
[e] DB2CODEPAGE=1208
[e] DB2PATH=D:\TSM\db2
[i] DB2_PMODEL_SETTINGS=MAX_BACKGROUND_SYSAPPS:500
[i] DB2_SKIPINSERTED=ON
[i] DB2_KEEPTABLELOCK=OFF
[i] DB2_EVALUNCOMMITTED=ON
[i] DB2_VENDOR_INI=D:\Server1\tsmdbmgr.env
[i] DB2_SKIPDELETED=ON
[i] DB2INSTPROF=C:\ProgramData\IBM\DB2\DB2TSM1
[i] DB2COMM=TCPIP
[i] DB2CODEPAGE=819
[i] DB2_PARALLEL_IO=*
[g] DB2_EXTSECURITY=YES
[g] DB2_COMMON_APP_DATA_PATH=C:\ProgramData
[g] DB2PATH=D:\TSM\db2
[g] DB2INSTDEF=SERVER1
6. Back up the device configuration information to another directory by issuing the following
administrative command:
where file_name specifies the name of the file in which to store device configuration information.
Tip: If you decide to restore the V7.1 database, this file is required.
7. Back up the volume history file to another directory. Issue the following administrative command:
where file_name specifies the name of the file in which to store the volume history information.
Tip: If you decide to restore the V7.1 database, this file is required.
8. Save a copy of the server options file, which is typically named dsmserv.opt. The file is in the server
instance directory.
9. Prevent activity on the server by disabling new sessions. Issue the following administrative
commands:
10. Verify whether any sessions exist, and notify the users that the server will be stopped. To check for
existing sessions, issue the following administrative command:
query session
This command cancels all sessions except for your current session.
12. Stop the server by issuing the following administrative command:
halt
13. Verify that the server is shut down and no processes are running.
Open the Windows Task Manager application and review the list of active processes.
14. In the server instance directory of your installation, locate the NODELOCK file and move it to another
directory, where you are saving configuration files.
The NODELOCK file contains the previous licensing information for your installation. This licensing
information is replaced when the upgrade is complete.
Procedure
1. Download the appropriate package file from one of the following websites:
• Download the server package from Passport Advantage or Fix Central.
• For the most recent information, updates, and maintenance fixes, go to the IBM Support Portal.
2. Complete the following steps:
a. Verify that you have enough space to store the installation files when they are extracted from
the product package. For space requirements, see the download document for your product.
• IBM Storage Protect technote 588021
• IBM Storage Protect Extended Edition technote 588023
• IBM Storage Protect for Data Retention technote 588025
b. Change to the directory where you placed the executable file.
Tip: In the next step, the files are extracted to the current directory. The path must contain no
more than 128 characters. Be sure to extract the installation files to an empty directory. Do
not extract to a directory that contains previously extracted files, or any other files.
c. To extract the installation files, double-click the executable file:
package_name.exe
8.1.x.000-SPSRV-WindowsX64.exe
3. Install the IBM Storage Protect software by using one of the following methods. Install the IBM
Storage Protect license during the installation process.
Tip: If you have multiple server instances on your system, install the IBM Storage Protect software
only one time to upgrade all server instances.
Installation wizard
To install the server by using the graphical wizard of IBM Installation Manager, follow the
instructions in “Installing IBM Storage Protect by using the installation wizard” on page 64.
Ensure that your system meets the prerequisites for using the installation wizard. Then, complete
the installation procedure. In the IBM Installation Manager window, click the Update or Modify
icon.
Installing the server by using the console mode
To install the server by using the console mode, follow the instructions in “Installing IBM Storage
Protect by using console mode” on page 65.
Review the information about installing the server in console mode and then complete the
installation procedure.
Silent mode
To install the server by using silent mode, follow the instructions in “Installing IBM Storage
Protect in silent mode” on page 67.
Review the information about installing the server in silent mode and then complete the
installation procedure.
After you install the software, you do not have to reconfigure the system.
4. Correct any errors that are detected during the installation process.
If you installed the server by using the installation wizard, you can view installation logs by using the
IBM Installation Manager tool. Click File > View Log. To collect log files, from the IBM Installation
Manager tool, click Help > Export Data for Problem Analysis.
If you installed the server by using console mode or silent mode, you can view error logs in the IBM
Installation Manager log directory, for example:
C:\ProgramData\IBM\Installation Manager\logs
5. Go to the IBM Support Portal to obtain fixes. Click Fixes, updates, and drivers and apply any
applicable fixes.
6. Verify that the upgrade was successful:
a) Start the server instance.
b) Monitor the messages that the server issues as it starts. Watch for error and warning messages,
and resolve any issues.
c) Verify that you can connect to the server by using the administrative client. To start an
administrative client session, run the following IBM Storage Protect administrative command:
dsmadmc
query system
To obtain information about the database, run the following IBM Storage Protect administrative
command:
query db format=detailed
dsmserv -k server_instance
server_instance is the name of your server instance. Server1 is the default name for the first
instance of the IBM Storage Protect server.
If you plan to run the server as a service under the Local System account, the Local System
account must be explicitly granted access to the server database. For instructions, see “Starting
the server as a Windows service” on page 82.
b) Monitor the messages that the server issues as it starts. Watch for error and warning messages,
and resolve any issues.
c) Verify that you can connect to the server by using the administrative client. To start an
administrative client session, run the following IBM Storage Protect administrative command:
dsmadmc
query system
To obtain information about the database, run the following IBM Storage Protect administrative
command:
query db format=detailed
8. Register the licenses for the server components that are installed on your system by running the
REGISTER LICENSE command:
Where installation_directory specifies the directory in which you installed the component, and
component_name specifies the abbreviation for the component.
For example, if you installed the server in the default directory, c:\Program Files\Tivoli\TSM,
run the following command to register the license:
For example, if you installed IBM Storage Protect Extended Edition in the c:\Program
Files\Tivoli\TSM directory, run the following command:
For example, if you installed IBM Storage Protect for Data Retention in the c:\Program
Files\Tivoli\TSM directory, run the following command:
Restriction:
You cannot use the IBM Storage Protect server to register licenses for the following products:
• IBM Storage Protect for Mail
• IBM Storage Protect for Databases
• IBM Storage Protect for ERP
• IBM Storage Protect for Space Management
The REGISTER LICENSE command does not apply to these licenses. The licensing for these
products is done by IBM Storage Protect clients.
9. Prepare the server for automatic and manual database backup operations.
For instructions, see “Preparing the server for database backup operations ” on page 85.
10. Verify that the PASSWORDACCESS GENERATE application programming interface (API) client option
is not in the client options file. The default name for the client options file is dsm.opt and it is
typically located in the c:\programdata\ibm\db2\db2tsm1\tsminst1 directory. Remove the
PASSWORDACCESS GENERATE option if it is present.
11. Optional: To install an extra language package, use the modify function of the IBM Installation
Manager.
12. Optional: To upgrade to a newer version of a language package, use the update function of the IBM
Installation Manager.
13. To facilitate troubleshooting in case of any future issues, ensure that sufficient space is allocated for a
core dump. For more information, see technote 6357399.
What to do next
You can authenticate passwords with the LDAP directory server, or authenticate passwords with the IBM
Storage Protect server. Passwords that are authenticated with the LDAP directory server can provide
enhanced system security.
If a device driver is available on Windows for the tape drives or medium changers that you plan to use, use
the device driver. If a device driver is not available on Windows for the tape drives or medium changers
that you plan to use, install the IBM Storage Protect device driver by running the dpinst.exe /a
command. The dpinst.exe file is in the device driver directory. The default directory is C:\Program
Files\Tivoli\TSM\device\drivers.
Procedure
Follow the procedure for your operating system, source release, and target release:
Table 14. Procedures for upgrading the server in a clustered environment on a Windows operating system
Source release Target release Procedure
V8.1 V8.1 fix pack “Applying a fix pack to IBM Storage Protect V8.1 in a clustered
environment ” on page 91
V6.3 or V7.1 V8.1 Upgrading V6.3 or V7.1 to V8.1 in a clustered environment on
Windows
V5.5, V6.1, V6.2 V7.1 or later IBM Storage Protect Upgrade and Migration Process -
Frequently Asked Questions
If the upgrade fails, and the server license module is uninstalled, you must reinstall the license from the
installation media of the server base release.
Procedure
1. Complete steps 2 - 6 for each server instance.
2. Back up the database by using the BACKUP DB command.
The preferred method is to use a snapshot backup, which provides a full database backup without
interrupting scheduled backups.
For example, you can run the following command to create a snapshot backup:
3. Back up the device configuration information to another directory by issuing the following command:
Where file_name specifies the name of the file in which to store device configuration information.
4. Back up the volume history file to another directory by issuing the following command:
Where file_name specifies the name of the file in which to store the volume history information.
5. Save a copy of the server options file, typically named dsmserv.opt, which is in the server instance
directory.
6. Ensure that the resource group is on the primary node, and that all nodes in the cluster are running.
Take the following actions on the primary node:
a) Take the server resource offline and remove it by completing the following steps:
i) In the Failover Cluster Manager window, select the cluster. Click Roles and select the cluster
role from the Name column. At the end of the Roles window, click the Resources tab. The
server resource is displayed in the Other Resources section.
ii) In the Other Resources section, right-click on each entry and view the properties. Review the
Name and Type properties to determine which resource is the IBM Storage Protect server
resource and which resource is the Db2 resource.
For example, the IBM Storage Protect server resource might have the following properties:
Name: Server1
Type: DB2 Server
Warning: Do not remove the Db2 resource. If you unintentionally remove the Db2
resource during this step, you will be unable to recluster after you upgrade the server.
iii) Select the IBM Storage Protect server resource, and right-click Take Offline.
iv) To remove the IBM Storage Protect server resource, select it, and right-click Remove.
b) In the Failover Cluster Manager window, remove the network name and IP address by
completing the following steps:
i) In the Server Name section, expand the network name to view the IP address. Note the
network name and IP address. Right-click Take Offline.
Note: This action also takes the Db2 server resource offline.
ii) Select the network name and the IP address, and right-click Remove. In the confirmation
message, confirm that you want to remove the client access point.
c) Using the command line, remove Db2 clustering for each IBM Storage Protect instance in the
cluster by issuing the following command for each instance:
db2mscs -u:instancename
For example, to remove Db2 clustering from the SERVER1 instance, issue the following command:
db2mscs -u:server1
Tip: You might see an error message about a missing cluster resource. Ignore this message.
Note: This action removes the Db2 resource from the cluster and deletes the DB2 -DB2TSM1 –
SERVERX service from the secondary node.
d) On the primary node, in the Failover Cluster Manager window, review the resource group
Summary section. Verify that only the shared disks and any tape resources remain in the resource
group.
7. Stop the cluster service on all nodes in the cluster. One way to stop it is by using the Services
Application. Right-click Cluster Service and select Stop.
8. Beginning with the primary node, install the IBM Storage Protect V8.1 server on all nodes in the
cluster. For instructions, see Chapter 2, “Installing the server components,” on page 63. To install
the server by using the installation wizard, click the Update icon on the IBM Installation Manager
window. Do not click the Install or Modify icons.
9. With cluster resources on the primary node, start the configuration wizard by clicking Start > Apps
> IBM Storage Protect > Configuration Wizard. Complete the following steps in the configuration
wizard:
a) In the Instance User ID window, enter the following information:
• The Instance name that you want to cluster.
• The User ID that is associated with the cluster. Domain accounts use the following format:
domain\account_name
• The account password.
b) When prompted, click Yes to confirm that you want to recluster.
c) Continue all steps in the wizard until you see a message that confirms that the configuration was
successful.
Note: In the Cluster Manager, the status for the Db2 and IBM Storage Protect Group Server
resources might be in a failed state until the server finishes retrying startup.
d) Set up services on all secondary nodes by issuing the following command for each secondary
node:
e) If your environment has multiple server instances, complete step 9 for each server instance.
10. Optional: If necessary, register licenses for the IBM Storage Protect server components that are
installed on your system by issuing the REGISTER LICENSE command:
Procedure
1. On the primary server, stop the IBM Storage Protect server instance.
2. On the standby server, stop the IBM Storage Protect server instance and the HADR IBM Db2 instance.
3. On the primary server, issue the following commands:
db2start
db2ckupgrade tsmdb1 -l /tmp/upgrade.out
db2stop
4. Upgrade the primary IBM Storage Protect server. For instructions, see “Upgrading the server in a
clustered environment” on page 102.
5. On the standby server, issue the following commands:
db2start
db2ckupgrade tsmdb1 -l /tmp/upgrade.out
db2stop
6. Upgrade the standby IBM Storage Protect server. For instructions, see “Upgrading the server in a
clustered environment” on page 102.
7. On the standby server, start HADR Db2.
8. On the primary server, start Db2 and the IBM Storage Protect server instance.
Procedure
1. Delete the IBM Storage Protect server resource and the network resource in Microsoft Failover
Cluster Manager.
a. Open Failover Cluster Manager. Under Other Resources, right-click the IBM Storage Protect
instance resource. Select Take this resource offline.
b. Delete the IBM Storage Protect instance.
c. Under Server Name, expand the network name and record the cluster TCP/IP address.
d. Delete the network name.
2. Remove the IBM Db2 cluster from the instance by issuing the following command:
DB2mscs -u:instance_name
db2mscs -u:Server1
Tip: You might see an error message about a missing cluster resource. Disregard this message.
3. Remove the database.
One way to remove it is by issuing this command:
4. On each system in the cluster, delete the V 8.1.7 tsmsvrrsc DLL files by completing the following
steps:
a. Stop the cluster service. One way to stop it is by using the Services Application. Right-click Cluster
Service and select Stop.
Purpose
After using the wizards to install and configure IBM Storage Protect, you seldom need to issue Db2
commands. A limited set of Db2 commands that you might use or be asked to issue are listed in the table.
This list is supplemental material only and is not a comprehensive list. There is no implication that an
IBM Storage Protect administrator will use it on a daily or ongoing basis. Samples of some commands are
provided. Details of output are not listed.
For a full explanation of the commands described here and of their syntax, see the Db2 product
documentation.
Table 15. Db2 commands
db2cmd Opens the Db2 command line processor Open the Db2 command window:
window and initializes the command-line
environment. db2cmd
db2icrt Creates Db2 instances in the home directory Manually create an IBM Storage Protect
of the instance owner. instance. Enter the command on one line:
db2set
CATALOG DATABASE Stores database location information in the Catalog the database:
system database directory. The database
can be located either on the local db2 catalog database tsmdb1
workstation or on a remote database
partition server. The server configuration
wizard takes care of any catalog needed
for using the server database. Run this
command manually, after a server is
configured and running, only if something in
the environment changes or is damaged.
CONNECT TO DATABASE Connects to a specified database for Connect to the IBM Storage Protect
command-line interface (CLI) use. database from a Db2 CLI:
GET DATABASE CONFIGURATION Returns the values of individual entries in a Show the configuration information for a
specific database configuration file. database alias:
Important: This command and parameters db2 get db cfg for tsmdb1
are set and managed directly by Db2. They
are listed here for informational purposes
Retrieve information in order to verify
and a means to view the existing settings.
settings such as database configuration, log
Changing these settings might be advised
mode, and maintenance.
by IBM support or through service bulletins
such as APARs or Technical Guidance
db2 get db config for tsmdb1
documents (technotes). Do not change these show detail
settings manually. Change them only at the
direction of IBM and only through the use
of IBM Storage Protect server commands or
procedures.
GET DATABASE MANAGER Returns the values of individual entries in a Retrieve configuration information for the
CONFIGURATION specific database configuration file. database manager:
GET HEALTH SNAPSHOT Retrieves the health status information for Receive a report on Db2 health monitor
the database manager and its databases. indicators:
The information returned represents a
snapshot of the health state at the time the db2 get health snapshot for
command was issued. database on tsmdb1
IBM Storage Protect monitors the state of
the database using the health snapshot and
other mechanisms that are provided by Db2.
There might be cases where the health
snapshot or other documentation indicates
that an item or database resource might be
in an alert state. Such a case indicates that
action must be considered to remedy the
situation.
IBM Storage Protect monitors the condition
and responds appropriately. Not all declared
alerts by the Db2 database are acted on.
GRANT (Database Authorities) Grants authorities that apply to the entire Grant access to the user ID itmuser:
database rather than privileges that apply to
specific objects within the database. db2 GRANT CONNECT ON DATABASE
TO USER itmuser
db2 GRANT CREATETAB ON
DATABASE
TO USER itmuser
RUNSTATS Updates statistics about the characteristics Update statistics on a single table.
of a table and associated indexes or
statistical views. These characteristics db2 runstats on table
include number of records, number of pages, SCHEMA_NAME.TABLE_NAME
and average record length. with distribution and sampled
detailed indexes all
To see a table, issue this utility after
updating or reorganizing the table.
A view must be enabled for optimization
before its statistics can be used to optimize
a query. A view that is enabled for
optimization is known as a statistical view.
Use the Db2 ALTER VIEW statement
to enable a view for optimization. Issue
the RUNSTATS utility when changes to
underlying tables substantially affect the
rows returned by the view.
Tip: The server configures Db2 to run the
RUNSTATS command as needed.
set db2instance Determines which instance applies to the Determine which instance is applicable:
current session.
set db2instance=tsminst1
SET SCHEMA Changes the value of the CURRENT SCHEMA Set the schema for IBM Storage Protect:
special register, in preparation for issuing
SQL commands directly through the Db2 db2 set schema tsmdb1
CLI.
Tip: A special register is a storage area
that is defined for an application process by
the database manager. It is used to store
information that can be referenced in SQL
statements.
START DATABASE MANAGER Starts the current database manager Start the database manager:
instance background processes. The server
starts and stops the instance and database db2start
whenever the server starts and halts.
Important: Allow the server to manage the
starting and stopping of the instance and
database unless otherwise directed by IBM
support.
STOP DATABASE MANAGER Stops the current database manager Stop the database manager:
instance. Unless explicitly stopped, the
database manager continues to be active. db2 stop dbm
This command does not stop the database
manager instance if any applications are
connected to databases. If there are
no database connections, but there are
instance attachments, the command forces
the instance attachments to stop first.
Then, it stops the database manager. This
command also deactivates any outstanding
database activations before stopping the
database manager.
This command is not valid on a client.
The server starts and stops the instance and
database whenever the server starts and
halts.
Important: Allow the server to manage the
starting and stopping of the instance and
database unless otherwise directed by IBM
support.
Chapter 7. Reference: IBM Db2 commands for IBM Storage Protect server databases 111
Reference: Db2 commands for IBM Storage Protect server databases
What to do next
Reinstall the IBM Storage Protect components.
Procedure
1. Start the Installation Manager.
Open the Installation Manager from the Start menu.
2. Click Uninstall.
3. Select IBM Storage Protect server, and click Next.
4. Click Uninstall.
5. Click Finish.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command:
imcl.exe -c
3. To uninstall, enter 5.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command, where response_file represents the response
file path, including the file name:
db2ilist
set db2instance=server1
db2 catalog database tsmdb1
db2 attach to server1
db2 update dbm cfg using dftdbpath instance_drive
db2 detach
c. Verify that IBM Storage Protect recognizes the server instance by listing your directories. Your
home directory appears if you did not change it. Your instance directory does appear if you used the
configuration wizard. Issue this command:
Procedure
To uninstall IBM Installation Manager, complete the following steps:
•
1. From the Start menu, click Control Panel > Programs and Features.
2. Select IBM Installation Manager and click Uninstall.
Resource requirements
For the most up-to-date requirements information, see Software and Hardware Requirements.
The hub and spoke servers that are monitored by the Operations Center require additional resources, as
described in “Hub and spoke server requirements” on page 120.
Table 18. IBM Storage Protect server version requirements for hub and spoke servers
Operations Center Version on the hub server Version on each spoke server
8.1.14 8.1.14 8.1.12 or later
Restrictions:
• Some Operations Center functions
are not available for servers that
use a version earlier than 8.1.14.
• A spoke server cannot use a
version that is later than the
version on the hub server.
For information about hub and spoke server compatibility requirements for other versions of the
Operations Center, see technote 496593.
• Each hub server requires a separate instance of the Operations Center, each of which has a separate
web address.
Use the following guidelines in deciding which server to designate as the hub server:
Choose a lightly loaded server
Consider a server that has a light load for operations such as client backup and archive. A lightly
loaded server is also a good choice as the host system for the Operations Center.
Ensure that the server has the resources to handle both its typical server workload and the estimated
workload for acting as the hub server.
Locate the server for minimal roundtrip network latency
Locate the hub server so that the network connection between the hub server and the spoke servers
has a roundtrip latency that is no greater than 5 ms. This latency can typically be achieved when the
servers are on the same local area network (LAN).
Networks that are poorly tuned, are heavily used by other applications, or have roundtrip latency
much higher than 5 ms can degrade communications between the hub and spoke servers. For
example, roundtrip latencies of 50 ms or higher can result in communication timeouts that cause
spoke servers to disconnect or reconnect to the Operations Center. Such high latencies might be
experienced in long-distance, wide area network (WAN) communications.
If spoke servers are a long distance from the hub server and experience frequent disconnects in the
Operations Center, you can increase the value of the ADMINCOMMTIMEOUT option on each server to
reduce the problem.
Verify that the hub server meets the resource requirements for status monitoring
Status monitoring requires extra resources on each server on which it is enabled. The resources that
are required depend primarily on the number of clients that are managed by the hub and spoke
servers.
Verify that the hub server meets the resource requirements for processor usage, database space,
archive log space, and I/O operations per second (IOPS) capacity.
A hub server with high IOPS capacity can handle a larger amount of incoming status data from spoke
servers. Use of the following storage devices for the hub server database can help meet this capacity:
• An enterprise-level solid-state drive (SSD)
• An external SAN disk storage device with multiple volumes or multiple spindles under each volume
In an environment with fewer than 1000 clients, consider establishing a baseline capacity of 1000
IOPS for the hub server database if the hub server manages any spoke servers.
Determine whether your environment requires multiple hub servers
If more than 10,000 - 20,000 client nodes and virtual machine file spaces are managed by one
set of hub and spoke servers, the resource requirements might exceed what the hub server has
available.Consider designating a second server as a hub server and moving spoke servers to the new
hub server to balance the load.
Language requirements
By default, the Operations Center uses the language that the web browser uses. However, the installation
process uses the language that the operating system uses. Verify that the web browser and the operating
system are set to the language that you require.
Table 19. Operations Center language values that you can use on Windows systems
Language Language option value
Chinese, Simplified chs
Chinese, Traditional cht
English ameng
French fra
German deu
Italian ita
Japanese (Shift-JIS) jpn
Korean kor
Portuguese, Brazilian ptb
Russian rus
Spanish esp
Tip: Before you install the client management service, ensure that a successful connection was
established between the backup-archive client and the server. The server truststore file that the client
uses does not have the server Secure Sockets Layer (SSL) certificate until the client system has connected
to the server.
• If the combined size of the client error log files and schedule log files on a client system is more than
500 MB, delays can occur in sending log records to the Operations Center. You can control the size
of the log files by enabling log file pruning or wrapping by specifying the errorlogretention or
errorlogmax client option.
• If you use the same client node name to connect to multiple IBM Storage Protect servers that are
installed on the same server, you can view log files for only one of the client nodes.
To learn about possible updates related to the client management service, see technote 534165.
Related tasks
“Collecting diagnostic information with IBM Storage Protect client management services” on page 161
The client management service collects diagnostic information about backup-archive clients and makes
the information available to the Operations Center for basic monitoring capability.
Offering
An installable unit of a software product.
The Operations Center offering contains all of the media that IBM Installation Manager requires to
install the Operations Center.
Package
The group of software components that are required to install an offering.
The Operations Center package contains the following components:
• IBM Installation Manager installation program
• Operations Center offering
Package group
A set of packages that share a common parent directory.
Repository
A remote or local storage area for data and other application resources.
The Operations Center package is stored in a repository on IBM Fix Central.
Shared resources directory
A directory that contains software files or plug-ins that are shared by packages.
IBM Installation Manager stores installation-related files in the shared resources directory, including
files that are used for rolling back to a previous version of the Operations Center.
Installation checklist
Before you install the Operations Center, you must verify certain information, such as the installation
credentials, and you must determine the input to provide to IBM Installation Manager for the installation.
The following checklist highlights the information that you must verify or determine before you install the
Operations Center, and Table 20 on page 126 describes the details of this information:
__ Verify the host name for the computer where the Operations Center is to be installed.
__ Verify the installation credentials.
__ Determine the Operations Center installation directory, if you do not want to accept the default path.
__ Determine the IBM Installation Manager installation directory, if you do not want to accept the default
path.
__ Determine the port number to be used by the Operations Center web server, if you do not want to
accept the default port number.
__ Determine the password for secure communications.
Table 20. Information to verify or determine before you install the Operations Center
Information Details
Host name for the The host name must meet the following criteria:
computer where the
Operations Center is to be • It must not contain double-byte character set (DBCS) characters or the
installed. underscore character (_).
• Although the host name can contain the hyphen character (-), it cannot have a
hyphen as the last character in the name.
Installation credentials To install the Operations Center, you must use the following user account:
• Administrator
Table 20. Information to verify or determine before you install the Operations Center (continued)
Information Details
Operations Center The Operations Center is installed in the ui subdirectory of the installation
installation directory directory.
The following path is the default path for the Operations Center installation
directory:
• c:\Program Files\Tivoli\TSM
For example, if you use this default path, the Operations Center is installed in
the following directory:
c:\Program Files\Tivoli\TSM\ui
IBM Installation Manager The following path is the default path for the IBM Installation Manager
installation directory installation directory:
• C:\Program Files\IBM\Installation Manager
Port number that is used by The value for the secure (https) port number must meet the following criteria:
the Operations Center web
server. • The number must be an integer in the range 1024 - 65535.
• The number cannot be in use or allocated to other programs.
If you do not specify a port number, the default value is 11090.
Tips:
• Although you must specify an integer in the range 1024 - 65535, you can later
configure the Operations Center to use the standard TCP/IP secure port (port
443). For more information, see “Configuring the Operations Center web server
to use the standard TCP/IP secure port” on page 140.
• If you later do not remember the port number that you specified, refer to the
following file, where installation_dir represents the directory where the
Operations Center is installed:
– installation_dir\ui\Liberty\usr\servers\guiServer\bootstr
ap.properties
The bootstrap.properties file contains the IBM Storage Protect server
connection information.
Table 20. Information to verify or determine before you install the Operations Center (continued)
Information Details
Password for secure The Operations Center uses Hypertext Transfer Protocol Secure (HTTPS) to
communications communicate with web browsers.
The Operations Center requires secure communication between the server and
the Operations Center. To secure communication, you must add the Transport
Layer Security (TLS) certificate of the hub server to the truststore file of the
Operations Center.
The truststore file of the Operations Center contains the certificate that the
Operations Center uses for HTTPS communication with web browsers. During
installation of the Operations Center, you create a password for the truststore file.
When you set up secure communication between the Operations Center and the
hub server, you must use the same password to add the certificate of the hub
server to the truststore file.
The password for the truststore file must meet the following criteria:
• The password must contain a minimum of 6 characters and a maximum of 64
characters.
• The password must contain at least the following characters:
– One uppercase letter (A – Z)
– One lowercase letter (a – z)
– One digit (0 – 9)
– Two of the non-alphanumeric characters that are listed in the following
series:
~ @ # $ % ^ & * _ - + = ` |
( ) { } [ ] : ; < > , . ? /
Procedure
Complete the following steps to extract the Operations Center installation files. In the following steps,
replace version_number with the version of Operations Center that you are installing.
a. Download the following package file to the directory of your choice:
version_number.000-IBM-SPOC-WindowsX64.exe
b. In Windows Explorer, double-click the file name to extract the installation files.
The self-extracting package file is extracted to the directory.
Procedure
1. From the directory where the Operations Center installation package file is extracted, issue the
following command:
install.bat
2. Follow the wizard instructions to install the IBM Installation Manager and Operations Center packages.
What to do next
See “Configuring the Operations Center” on page 135.
Procedure
1. From the directory where the installation package file is extracted, run the following program:
install.bat -c
2. Follow the console instructions to install the Installation Manager and Operations Center packages.
What to do next
See “Configuring the Operations Center” on page 135.
Procedure
1. Create a response file.
You can modify the sample response file or create your own file.
Tip: To generate a response file as part of a console-mode installation, complete the selection of the
console-mode installation options. Then, in the Summary panel, enter G to generate the response file
according to the previously selected options.
2. Create a password for the Operations Center truststore in the response file.
If you are using the install_response_sample.xml file, add the password in the following line of
the file, where mypassword represents the password:
For more information about this password, see “Installation checklist” on page 126.
To encrypt the password, follow the instructions in “Encrypting passwords in silent installation
response files” on page 131.
Tip: To upgrade the Operations Center, the truststore password is not required if you are using the
update_response_sample.xml file.
3. Start the silent installation by issuing the following command from the directory where the installation
package is extracted. The value response_file represents the response file path and file name:
What to do next
See “Configuring the Operations Center” on page 135.
Procedure
To encrypt the password in the response file that is used to silently install the Operations Center and
ensure that only one password is used in the data key field, complete the following steps:
1. Issue the following command on one line:
where string_to_encrypt is the value that is encrypted and encrypted_pwd is the file that contains the
encrypted value.
2. Open the encrypted password file and copy the value into the data key field of the response file. Then,
remove the encrypted password file by commenting it out.
3. To remove the non-encrypted password from the data key field, complete the following steps:
a. Comment out the non-encrypted password (user.SSL_PASSWORD) so that the password row is
similar to the following example:
Restriction: Use only one value in the data key field in the response file, either the
user.SSL_PASSWORD or the user.SSL_PASSWORD_ENCRYPTED password. You must comment out
the one that you are not using or you will receive an error message and the installation will fail.
Example
Using the Installation Manager command line tool, encrypt the password passw0rd. Save the encrypted
value to the my_pwd.txt file. Issue the following command:
Figure 2. Example of an Operations Center configuration with the hub and spoke servers
designated as the hub server. You can then connect additional IBM Storage Protect servers as spoke
servers.
Procedure
In a web browser, enter the following address, where hostname represents the name of the computer
where the Operations Center is installed, and secure_port represents the port number that the Operations
Center uses for HTTPS communication on that computer:
https://hostname:secure_port/oc
Tips:
• The URL is case-sensitive. For example, ensure that you type "oc" in lowercase as indicated.
• For more information about the port number, see the Installation checklist.
• If you are connecting to the Operations Center for the first time, you must provide the following
information:
– Connection information for the server that you want to designate as a hub server
– Login credentials for an administrator ID that is defined for that server
• If the event-record retention period of the server is less than 14 days, the period is automatically reset
to 14 days if you configure the server as a hub server.
What to do next
If you have multiple IBM Storage Protect servers in your environment, add the other servers as spoke
servers to the hub server.
Attention: Do not change the name of a server after it is configured as a hub or spoke server.
Procedure
1. In the Operations Center menu bar, click Servers.
The Servers page opens.
In the table on the Servers page, a server might have a status of "Unmonitored." This status means
that although an administrator defined this server to the hub server by using the DEFINE SERVER
command, the server is not yet configured as a spoke server.
2. Complete one of the following steps:
• Click the server to highlight it, and in the table menu bar, click Monitor Spoke.
• If the server that you want to add is not shown in the table, and secure SSL/TLS communication is
not required, click + Spoke in the table menu bar.
3. Provide the necessary information, and complete the steps in the spoke configuration wizard.
Tip: If the event-record retention period of the server is less than 14 days, the period is automatically
reset to 14 days if you configure the server as a spoke server.
Procedure
To configure email notification for administrators about alerts, complete the following steps on each hub
and spoke server from which you want to receive email alerts:
1. To verify that alert monitoring is turned on, issue the following command:
QUERY MONITORSETTINGS
2. If the command output indicates that alert monitoring is turned off, issue the following command.
Otherwise, proceed to the next step.
SET ALERTMONITOR ON
SET ALERTEMAIL ON
4. To define the SMTP server that is used to send email notification, issue the following command:
5. To specify the port number for the SMTP server, issue the following command:
7. For each administrator ID that must receive email notification, issue one of the following commands to
activate email notification and to specify the email address:
8. Choose either, or both, of the following options, and specify the administrator IDs to receive email
notification:
• Send notification for individual alerts
To specify or update the administrator IDs to receive email notification for an individual alert, issue
one of the following commands:
Tip: From the Configure Alerts page of the Operations Center, you can select the administrators
who will receive email notification.
• Send alert summaries
To specify or update the administrator IDs to receive alert summaries by email, issue the following
command:
If you want to receive alert summaries but do not want to receive notification about individual alerts,
complete the following steps:
a. Suspend notification about individual alerts, as described in “Suspending email alerts temporarily”
on page 139.
b. Ensure that the respective administrator ID is listed in the following command:
SET ALERTMONITOR ON
SET ALERTEMAIL ON
SET ALERTEMAILSMTPHOST mymailserver.domain.com
SET ALERTEMAILSMTPPORT 450
SET ALERTEMAILFROMADDR [email protected]
UPDATE ADMIN myadmin ALERT=YES [email protected]
UPDATE ADMIN djadmin ALERT=YES [email protected]
UPDATE ADMIN csadmin ALERT=YES [email protected]
DEFINE ALERTTRIGGER anr0175e ADMIN=myadmin,djadmin,csadmin
Procedure
Suspend email notification for individual alerts or for alert summaries.
• Suspend notification about individual alerts
Use either of the following methods:
UPDATE ADMIN command
To turn off email notification for the administrator, issue the following command:
To start sending that alert to the administrator again, issue the following command:
If an administrator ID is listed in the preceding command, the administrator receives alert summaries
by email, even if notification about individual alerts is suspended for the respective administrator ID.
Procedure
To add customized text to the login screen, complete the following steps:
1. On the computer where the Operations Center is installed, go to the following directory, where
installation_dir represents the directory in which the Operations Center is installed:
installation_dir\ui\Liberty\usr\servers\guiServer
2. In the directory, create a file that is named loginText.html that contains the text that you want to
add to the login screen.
Any special, non-ASCII text must be UTF-8 encoded.
3. Review the added text on the login screen of the Operations Center.
To open the Operations Center, enter the following address in a web browser, where hostname
represents the name of the computer where the Operations Center is installed, and secure_port
represents the port number that the Operations Center uses for HTTPS communication on that
computer:
https://hostname:secure_port/oc
Configuring the Operations Center web server to use the standard TCP/IP
secure port
Port 443 is the standard port for secure web browser communication. If users must access the
Operations Center through a firewall, you can configure the Operations Center to communicate through
this standard port. In this way, you can avoid opening another port in the firewall.
Procedure
To configure the Operations Center web server to use port 443, complete the following steps after you
install the Operations Center:
1. Stop the Operations Center web server.
For instructions about stopping the web server, see “Starting and stopping the web server” on page
160.
2. Go to the following directory, where installation_dir represents the directory in which the
Operations Center is installed:
installation_dir\ui\Liberty\usr\servers\guiServer
3. Open the bootstrap.properties file, which contains a property that specifies the port that the
Operations Center web server uses for secure communication.
4. Update the tsm.https.port property to specify port 443:
tsm.https.port=443
What to do next
Notify users that the Operations Center is using the standard TCP/IP secure port. Typically, a user opens
the Operations Center in their browser by including the port number in the URL. Because port 443 is the
default for secure web browser communication, users do not have to specify the port number in the URL.
Instead, the following URL can be used, where hostname specifies the name of the computer where the
Operations Center is installed:
https:hostname/oc/
For instructions about opening the Operations Center, see “Opening the Operations Center” on page 160.
https://oc_host_name:port/oc/api
where oc_host_name is the network name or IP address of the Operations Center host system and port is
the Operations Center port number. The default port number is 11090.
For information about the REST services that are available for the Operations Center, see Technote http://
www-01.ibm.com/support/docview.wss?uid=swg21997347, or issue the following REST call:
https://oc_host_name:port/oc/api/help
Procedure
1. On the Operations Center menu bar, hover over the settings icon and click Settings.
2. On the General page, select the Enable administrative REST API check box.
3. Click Save.
Procedure
1. Stop the Operations Center web server.
2. Go to the command line of the operating system on which the Operations Center is installed.
3. Add the certificate to the truststore file of the Operations Center by using the iKeycmd utility or the
iKeyman utility.
The iKeycmd utility is a command-line interface, and the iKeyman utility is the IBM Key Management
graphical user interface.
The iKeycmd and the iKeyman utilities must be run by an administrator account.
To add the TLS certificate by using the command-line interface, complete the following steps:
a) Go to the following directory, where installation_dir represents the directory in which the
Operations Center is installed:
• installation_dir\ui\jre\bin
b) Issue the iKeycmd command to add the server's cert256.arm certificate to the Operations
Center truststore.
where:
installation_dir
The directory in which the Operations Center is installed.
server_instance_dir
The IBM Storage Protect server instance directory.
label description
The description that you assign to the label.
password
The password that you created when you installed the Operations Center. To reset the
password, uninstall the Operations Center, delete the .jks file, and reinstall the Operations
Center.
To add the certificate by using the IBM Key Management window, complete the following steps:
a) Go to the following directory, where installation_dir represents the directory in which the
Operations Center is installed:
• installation_dir\ui\jre\bin
b) Open the IBM Key Management window by issuing the following command:
ikeyman
5. When you connect to the Operations Center for the first time, you are prompted to identify the IP
address or network name of the hub server, and the port number for communicating with the hub
server. Enter the port number that is specified by either the TCPADMINPORT or SSLTCPADMINPORT
server option.
If the Operations Center was previously configured, you can review the contents
of the serverConnection.properties file to verify the connection information. The
serverConnection.properties file is in the following directory on the computer where the
Operations Center is installed:
• installation_dir\ui\Liberty\usr\servers\guiServer
What to do next
To set up TLS communications between the hub server and a spoke server, see “Securing communication
between the hub server and a spoke server” on page 145.
Related tasks
“Deleting and reassigning the password for the Operations Center truststore file” on page 158
To set up secure communication between the Operations Center and the hub server, you must know the
password for the truststore file of the Operations Center. You create this password during the installation
of the Operations Center. If you do not know the password, you can delete the password and assign a new
password.
Procedure
1. Navigate to the command line of the operating system on which the Operations Center is installed.
2. From the command line, change the directory to the keystore location:
installation_dir\ui\Liberty\usr\servers\guiServer
where installation_dir represents the directory in which the Operations Center is installed.
3. Copy the root CA certificate and intermediate CA certificate files to this location.
Tip: The certificate files were previously copied to the hub server location.
4. Stop the Operations Center web server as described in “Starting and stopping the web server” on page
160.
5. Make a backup copy of the Operations Center truststore file in case you must revert to the original
version. The Operations Center truststore file is named gui-truststore.jks.
6. To complete the steps to receive the CA-signed certificate, use one of the following commands:
• ikeyman command: See “Receiving the signed certificate by using IBM Key Management” on page
151 and go to the steps for receiving the signed certificate.
• ikeycmd command: See “Receiving the signed certificate by using ikeycmd” on page 157 and go to
the steps for receiving the signed certificate.
7. Start the Operations Center web server.
What to do next
To set up TLS communications between the hub server and a spoke server, follow the instructions in
“Securing communication between the hub server and a spoke server” on page 145.
Related tasks
“Receiving the signed certificate” on page 151
The CA must send you the certificate file to add to the truststore file.
Procedure
1. Complete the following steps to define the certificate of the spoke server to the hub server:
a) On the spoke server, change to the directory of the spoke server instance.
b) Verify the certificates in the key database file of the spoke server. Issue the following command:
c) Securely transfer the cert256.arm file of the spoke server to the hub server.
d) On the hub server, change to the directory of the hub server instance.
e) Define the spoke server certificate to the hub server. Issue the following command from the
hub server instance directory, where spoke_servername is the name of the spoke server, and
spoke_cert256.arm is the file name of the spoke server certificate:
gsk8capicmd_64 -cert -add -db cert.kdb -stashed -format ascii -trust enable
-label spoke_servername -file spoke_cert256.arm
2. Complete the following steps to define the certificate of the hub server to the spoke server:
a) On the hub server, change to the directory of the hub server instance.
b) Verify the certificates in the key database file of the spoke server. Issue the following command:
c) Securely transfer the cert256.arm file of the hub server to the spoke server.
d) On the spoke server, change to the directory of the spoke server instance.
e) Define the hub server certificate to the spoke server. Issue the following command from the
spoke server instance directory, where hub_servername is the name of the hub server, and
hub_cert256.arm is the file name of the hub server certificate:
gsk8capicmd_64 -cert -add -db cert.kdb -stashed -format ascii -trust enable
-label hub_servername -file hub_cert256.arm
b) On the hub server, issue the DEFINE SERVER command, according to the following example:
c) On the spoke server, issue the DEFINE SERVER command, according to the following example:
Tip: By default, server communication is encrypted except when the server is sending or receiving
object data. Object data is sent and received by using TCP/IP. By choosing not to encrypt the object
data, server performance is similar to communication over a TCP/IP session and the session is
secure. To encrypt all communication with the specified server, even when the server is sending
and receiving object data, specify the SSL=YES parameter on the DEFINE SERVER command.
5. Complete the following steps to configure the Operations Center to monitor the spoke server:
a) On the Operations Center menu bar, click Servers.
The spoke server has a status of "Unmonitored." This status means that, although this server was
defined to the hub server by using the DEFINE SERVER command, the server is not yet configured
as a spoke.
b) Click the spoke server to highlight the item, and click Monitor Spoke.
Procedure
1. Create a certificate signing request.
2. Send the certificate signing request to the certificate authority for signing.
3. Add the certificate to the truststore file of the Operations Center.
Procedure
To create a CSR, complete the following steps:
1. From the command line, change the directory to the keystore location:
installation_dir\ui\Liberty\usr\servers\guiServer
2. Create a certificate request by using the ikeyman command or the ikeycmd command. The ikeyman
command opens the IBM Key Management graphical user interface, and ikeycmd is a command-line
interface.
Tip: You might have to specify the full path to the ikeyman or ikeycmd command. The commands
are located in the following directory, where installation_dir represents the directory in which the
Operations Center is installed:
installation_dir\ui\jre\bin
• To create a certificate request by using the ikeyman graphical user interface, complete the
following steps:
a. Open the IBM Key Management tool by issuing the following command:
ikeyman
In the Open window, click Browse to open the directory and select the gui-truststore.jks
file. Click OK.
c. Create a certificate request. In the Key database content area, click New.
d. In the Create New Key and Certificate Request dialog box, complete the fields as required by the
CA and your organization. Specify the following information:
Key Label
Specify a unique label for the certificate in the truststore file. The label name, for example,
usr-cert-name, identifies the certificate in the truststore.
Key Size
Select a key size of at least 2048 bits.
Signature Algorithm
Select SHA256WithRSA.
Common Name
Specify the fully qualified domain name (FQDN) of the system on the network where the
Operations Center is installed.
Remember: The FQDN for the system on your network is used in the URL for the Operations
Center on your system. The URL is used by a web browser to access the Operations Center.
Enter the name of a file in which to store the certificate request
Specify a file that is named certreq.csr in the guiServer directory.
where:
-dn "CN=myhost.example.com"
Specifies the distinguished name. Input as a quoted string that contains the specification
CN=myhost.example.com, where myhost.example.com specifies the FQDN of the system on the
network where the Operations Center is installed.
Remember: The FQDN for the system on your network is used in the URL for the Operations
Center on your system. The URL is used by a web browser to access the Operations Center.
-label usr-cert-name
Specifies a unique label, usr-cert-name, for the certificate in the truststore file.
-san_dnsname myhost.example.com,myhost (Optional)
Specifies the domain name server (DNS) names of the system where the Operations Center is
installed. The CN and dnsname are typically the same value.
-san_ipaddr 192.0.2.1,192.0.2.2 (Optional)
Specifies the IP address of the system where the Operations Center is installed.
Procedure
To receive the signed certificate, complete the following steps:
1. From the command line, change the directory to the keystore location:
installation_dir\ui\Liberty\usr\servers\guiServer
2. Copy the files that you received from the CA to this location. These files include the CA root certificate,
intermediate CA certificates (if any), and the signed certificate for the Operations Center.
3. Stop the Operations Center web server as described in “Starting and stopping the web server” on page
160.
4. Make a backup copy of the Operations Center truststore in case you must revert to the original
truststore. The Operations Center truststore is named gui-truststore.jks.
5. To complete the steps to receive the signed certificate, use one of the following commands:
• ikeyman command: Complete the steps in “Receiving the signed certificate by using IBM Key
Management” on page 151.
• ikeycmd command: Complete the steps in “Receiving the signed certificate by using ikeycmd” on
page 157.
Procedure
1. Verify that the Personal Signed Certificate is in the appropriate directory by using the ikeyman
command. Complete the following steps:
a) Open the IBM Key Management tool by issuing the following command:
ikeyman
Tip: You might have to specify the full path to the ikeyman command. The commands are located
in the following directory, where installation_dir represents the directory in which the Operations
Center is installed:
installation_dir\ui\jre\bin
b) Click Key Database File > Open.
In the Open dialog box, click Browse to open the directory and select the gui-truststore.jks
file. Click OK.
c) In the Key database content area, select Personal Certificate Requests, and confirm that the
usr-cert-name label is displayed.
2. Add the CA root certificate and any intermediate certificates to the truststore file. If you received
intermediate certificates from the CA, you must add each one to the truststore file before you add
the CA root certificate. Complete the following steps for each intermediate certificate and the CA root
certificate.
Important: The CA sends one root certificate, the signed certificate, and possibly one or more
intermediate certificates. Depending on the CA, the certificate file might be one file or multiple files. If
you receive the certificate file as one file, you must extract the certificates as separate files. Contact
your CA if you are unsure how to extract the certificates.
a) In the Key database content area, select Signer Certificates, and click Add.
b) In the Open dialog box, specify the CA root certificate or the intermediate certificate and click OK.
b) In the Open dialog box, specify the signed certificate and click OK.
4. Delete the self-signed certificate that is currently used by the Operations Center, and replace it with
the CA-signed certificate, by completing the following steps:
a) In the Key database content area, select Personal Certificates.
b) Select the certificate that is labeled default, and click Delete. Click Yes in the confirmation dialog
box.
d) In the Rename dialog box, rename the signed certificate (usr-cert-name) to default, and click
OK.
Procedure
1. Verify that the Personal Signed Certificate is in the appropriate directory by using the ikeycmd
command. Complete the following steps:
a) Issue the following command:
Tip: You might have to specify the full path to the ikeycmd command. The commands are located
in the following directory, where installation_dir represents the directory in which the Operations
Center is installed:
installation_dir\ui\jre\bin
b) A message displays the name of the Personal Signed Certificate, usr-cert-name, that is in the
truststore file.
2. Add the CA root certificate and any intermediate certificates to the truststore file by issuing the
following commands. If you received intermediate certificates from the CA, you must add them to the
truststore file before you add the CA root certificate.
where:
-file certificate_file
Specifies the name of the file that contains the certificate.
3. Receive the signed certificate by issuing the following command:
where:
-file signer_certificate_file
Specifies the name of the file that contains the signed certificate.
4. Delete the self-signed certificate that is currently used by the Operations Center, and replace it with
the CA-signed certificate, by completing the following steps:
a) To delete the existing self-signed certificate, issue the following command:
b) To rename the CA-signed certificate, usr-cert-name, to default, issue the following command:
where:
-label usr-cert-name
Identifies the CA-signed certificate by its label.
5. Validate the default certificate by issuing the following command:
6. Start the Operations Center web server by following the instructions in “Starting and stopping the web
server” on page 160.
Deleting and reassigning the password for the Operations Center truststore
file
To set up secure communication between the Operations Center and the hub server, you must know the
password for the truststore file of the Operations Center. You create this password during the installation
of the Operations Center. If you do not know the password, you can delete the password and assign a new
password.
Complete these steps only if you do not know the truststore password. Do not complete these
steps if you know the truststore password and want to change it. To delete and reassign password,
you must delete the truststore file, which deletes all certificates that are stored in the truststore
file. If you know the truststore password, you can change it by using the ikeycmd or the ikeyman
utility.
Procedure
1. Stop the Operations Center web server.
2. Go to the following directory, where installation_dir represents the directory in which the
Operations Center is installed:
installation_dir\ui\Liberty\usr\servers\guiServer
3. Open the bootstrap.properties file, which contains the password for the truststore file.
If the password is unencrypted, you can use it to open the truststore file without having to reassign the
password.
The following examples indicate the difference between an encrypted and an unencrypted password:
Encrypted password example
Encrypted passwords begin with the text string {xor}.
The following example shows an encrypted password as the value of the tsm.truststore.pswd
parameter:
tsm.truststore.pswd={xor}MiYPPiwsKDAtOw==
tsm.truststore.pswd=J8b%^B
~ @ # $ % ^ & * _ - + = ` |
( ) { } [ ] : ; < > , . ? /
b. From the command line of the operating system, go to the following directory:
installation_dir\ui\Liberty\bin
c. To encrypt the password, issue the following command, where myPassword represents the
unencrypted password:
securityUtility.bat encode myPassword --encoding=aes
set JAVA_HOME="installation_dir\ui\jre"
Results
A new truststore file is automatically created for the Operations Center, and the TLS certificate of the
Operations Center is automatically included in the truststore file.
Procedure
Stop and start the web server.
• From the Services window, stop or start the Operations Center service.
Procedure
1. In a web browser, enter the following address, where hostname represents the name of the computer
where the Operations Center is installed, and secure_port represents the port number that the
Operations Center uses for HTTPS communication on that computer:
https://hostname:secure_port/oc
Tips:
• The URL is case-sensitive. For example, ensure that you type "oc" in lowercase as indicated.
• The default port number for HTTPS communication is 11090, but a different port number in the
range 1024 - 65535 can be specified during Operations Center installation. After installation, an
administrator can configure the Operations Center to use the standard TCP/IP secure port (port
443) for HTTPS communication. If the Operations Center is configured to use port 443, then you
do not need to include the secure port number when you open the Operations Center. Instead, you
can enter the following address, where hostname represents the name of the computer where the
Operations Center is installed:
https:hostname/oc/
For more information about configuring the Operations Center to use port 443, see “Configuring the
Operations Center web server to use the standard TCP/IP secure port” on page 140.
2. Log in, using an administrator ID that is registered on the hub server.
In the Overview page, you can view summary information for clients, services, servers, storage pools,
and storage devices. You can view more details by clicking items or by using the Operations Center
menu bar.
Monitoring from a mobile device: To remotely monitor the storage environment, you can view the
Overview page of the Operations Center in the web browser of a mobile device. The Operations Center
supports the Apple Safari web browser on the iPad. Other mobile devices can also be used.
The REST API endpoints in the following table can be used if both the backup-archive client and the
Operations Center are at 8.1.13 or later.
Procedure
1. Download the installation package for the client management service from an IBM download site such
as IBM Passport Advantage or IBM Fix Central. Look for a file name that is similar to version-IBM-
SPCMS-operating system.bin.
The following table shows the names of the installation packages.
chmod +x 8.1.x.000-IBM-SPCMS-Linuxx64.bin
./8.1.x.000-IBM-SPCMS-Linuxx64.bin
• On Windows client systems, double-click the installation package name in Windows Explorer.
Tip: If you previously installed and uninstalled the package, select All when prompted to replace the
existing installation files.
4. Run the installation batch file from the directory where you extracted the installation files and
associated files. This is the directory that you created in step “2” on page 163.
• On Linux client systems, issue the following command:
./install.sh
What to do next
Verify the installation.
Procedure
1. Create a response file based on the sample file, or use the sample file,
install_response_sample.xml.
In either case, ensure that the response file specifies the port number for the client management
service. The default port is 9028. For example:
2. Run the command to install the client management service and accept the license. From the directory
where the installation package file is extracted, issue the following command, where response_file
represents the response file path, including the file name:
On a Linux client system:
For example:
For example:
What to do next
Verify the installation.
Procedure
On the client system, at the command line, run the following commands to view the configuration of the
client management service:
• On Linux client systems, issue the following command:
client_install_dir/cms/bin/CmsConfig.sh list
where client_install_dir is the directory where the backup-archive client is installed. For example, with
the default client installation, issue the following command:
/opt/tivoli/tsm/cms/bin/CmsConfig.sh list
client_install_dir\cms\bin\CmsConfig.bat list
where client_install_dir is the directory where the backup-archive client is installed. For example, with
the default client installation, issue the following command:
If the client management service is correctly installed and configured, the output displays the location of
the error log file.
The output text is extracted from the following configuration file:
• On Linux client systems:
client_install_dir/cms/Liberty/usr/servers/cmsServer/client-configuration.xml
client_install_dir\cms\Liberty\usr\servers\cmsServer\client-configuration.xml
If the output does not contain any entries, you must configure the client-configuration.xml file.
For instructions about how to configure this file, see Configure the client management service for custom
configurations. You can use the CmsConfig verify command to verify that a node definition is correctly
created in the client-configuration.xml file.
Procedure
To configure the Operations Center to use the client management service, complete the following steps:
1. On the Clients page of the Operations Center, select the client.
2. Click Details.
3. Click the Properties tab.
4. In the Remote diagnostics URL field in the General section, specify the URL for the client
management service on the client system.
The address must start with https. The following table shows examples of the remote diagnostics
URL.
What to do next
You can access client diagnostic information such as client log files from the Diagnosis tab in the
Operations Center.
Procedure
• To stop, start, or restart the client management service on Linux client systems, issue the following
commands:
• If the system has systemctl installed, issue the following commands:
- To stop the server:
• If the system does not have systemctl installed, issue the following commands:
- To stop the server:
• On Windows client systems, open the Services window, and stop, start, or restart the IBM Storage
Protect Client Management Services service.
Procedure
1. Uninstall the client management service from the client system:
a) Open IBM Installation Manager:
• On the Linux client system, in the directory where IBM Installation Manager is installed, go to the
eclipse subdirectory (for example, /opt/IBM/InstallationManager/eclipse), and issue
the following command:
./IBMIM
• On the Windows client system, open IBM Installation Manager from the Start menu.
b) Click Uninstall.
c) Select IBM Storage Protect Client Management Services, and click Next.
d) Click Uninstall, and then click Finish.
e) Close the IBM Installation Manager window.
2. If you no longer require IBM Installation Manager, uninstall it from the client system:
a) Open the IBM Installation Manager uninstall wizard:
• On the Linux client system, change to the IBM Installation Manager uninstallation directory (for
example, /var/ibm/InstallationManager/uninstall), and issue the following command:
./uninstall
• On the Windows client system, click Start > Control Panel. Then, click Uninstall a program >
IBM Installation Manager > Uninstall.
b) In the IBM Installation Manager window, select IBM Installation Manager if it is not already
selected, and click Next.
c) Click Uninstall, and click Finish.
Center and backup-archive client at version 8.1.13 or later, the client management service is integrated
into the backup-archive client. In this case, it is not necessary to configure the client management service
for custom installations.
CmsConfig utility
If you are not using the default client configuration, you can run the CmsConfig utility on the client
system to discover and add the location of the client log files to the client-configuration.xml file.
After you complete the configuration, the client management service can access the client log files and
make them available for basic diagnostic functions in the Operations Center.
You can also use the CmsConfig utility to show the configuration of the client management service and to
remove a node name from the client-configuration.xml file.
The client-configuration.xml file is in the following directory:
• On Linux client systems:
client_install_dir/cms/Liberty/usr/servers/cmsServer
client_install_dir\cms\Liberty\usr\servers\cmsServer
To use the CmsConfig utility, issue any command that is included in the utility. Ensure that you enter
each command on a single line.
If the client options file is in a custom location or it does not have a typical options file name, you can also
specify the path for the client options file to narrow the scope of the discovery.
Syntax
CmsConfig discover
configPath
Parameters
configPath
The path of the client options file (typically dsm.opt). Specify the configuration path when the client
options file is not in a default location or it does not have the default name. The client management
service loads the client options file and discovers the client nodes and logs from there. This parameter
is optional.
On a Linux client system, the client management service always loads the client user-options file
(dsm.opt) first, and then looks for the client system-options file (typically dsm.sys). The value of the
configPath parameter, however, is always the client user-options file.
server.example.com:1500 SUSAN
/opt/tivoli/tsm/client/ba/bin/dsmerror.log
• Discover the configuration files and log files that are specified in the /opt/tivoli/tsm/
client/ba/bin/daily.opt file and automatically add the log definitions to the client-
configuration.xml file.
Issue the following command from the /opt/tivoli/tsm/cms/bin directory.
Command:
./CmsConfig.sh discover /opt/tivoli/tsm/client/ba/bin/daily.opt
Output:
server.example.com:1500 SUSAN
C:\Program Files\Tivoli\TSM\baclient\dsmerror.log
• Discover the configuration files and log files that are specified in the c:\program
files\tivoli\tsm\baclient\daily.opt file and automatically add the log definitions to the
client-configuration.xml file.
Issue the following command from the C:\Program Files\Tivoli\TSM\cms\bin directory.
Command:
cmsconfig discover "c:\program files\tivoli\tsm\baclient\daily.opt"
Output:
Syntax
CmsConfig addnode nodeName serverIP serverPort serverProtocol optPath
Parameters
nodeName
The client node name that is associated with the log files. For most client systems, only one node
name is registered to the IBM Storage Protect server. However, on systems with multiple users, such
as Linux client systems, there can be more than one client node name. This parameter is required.
serverIP
The TCP/IP address of the IBM Storage Protect server that the client management service
authenticates to. This parameter is required.
You can specify a 1 - 64 character TCP/IP address for the server. The server address can be a TCP/IP
domain name or a numeric IP address. The numeric IP address can be either a TCP/IP v4 or TCP/IP
v6 address. You can use IPv6 addresses only if the commmethod V6Tcpip option is specified for the
client system.
Examples:
• server.example.com
• 192.0.2.0
• 2001:0DB8:0:0:0:0:0:0
serverPort
The TCP/IP port number that is used to communicate with the IBM Storage Protect server. You can
specify a value in the range 1 - 32767. This parameter is required.
Example: 1500
serverProtocol
The protocol that is used for communication between the client management service and the IBM
Storage Protect server. This parameter is required.
You can specify one of the following values.
Value Meaning
NO_SSL The SSL security protocol is not used.
SSL The SSL security protocol is used.
FIPS The TLS 1.2 protocol is used in Federal Information Processing Standard (FIPS) mode.
Tip: Alternatively, you can enter TLS_1.2 to specify that the TLS 1.2 protocol is used in
FIPS mode.
optPath
The fully qualified path of the client options file. This parameter is required.
Example (Linux client): /opt/backup_tools/tivoli/tsm/baclient/dsm.sys
Example (Windows client): C:\backup tools\Tivoli\TSM\baclient\dsm.opt
Adding node.
1500. The SSL security protocol is not used. The path for the client options file is c:\program
files\tivoli\tsm\baclient\custom.opt.
Issue the following command. from the C:\Program Files\Tivoli\TSM\cms\bin directory.
Command:
cmsconfig addnode SUSAN server.example.com 1500 NO_SSL "c:\program
files\tivoli\tsm\baclient\custom.opt"
Output:
Adding node.
Syntax
CmsConfig setopt nodeName optPath
Parameters
nodeName
The client node name that is associated with the log files. For most client systems, only one node
name is registered to the IBM Storage Protect server. However, on systems with multiple users, such
as Linux client systems, there can be more than one client node name. This parameter is required.
optPath
The fully qualified path of the client options file. This parameter is required.
Example (Linux client): /opt/backup_tools/tivoli/tsm/baclient/dsm.opt
Example (Windows client): C:\backup tools\Tivoli\TSM\baclient\dsm.opt
Syntax
CmsConfig setsys nodeName sysPath
Parameters
nodeName
The client node name that is associated with the log files. For most client systems, only one node
name is registered to the IBM Storage Protect server. However, on systems with multiple users, such
as Linux client systems, there can be more than one client node name. This parameter is required.
sysPath
The fully qualified path of the client system-options file. This parameter is required.
Example: /opt/backup_tools/tivoli/tsm/baclient/dsm.sys
Example
Set the client system-options file path for the node SUSAN. The path for the client system-options file
is /opt/tivoli/tsm/client/ba/bin/dsm.sys.
Issue the following command, from the /opt/tivoli/tsm/cms/bin directory.
Command:
./CmsConfig.sh setopt SUSAN /opt/tivoli/tsm/client/ba/bin/dsm.sys
Output:
Syntax
CmsConfig addlog nodeName logPath
Parameters
nodeName
The client node name that is associated with the log files. For most client systems, only one node
name is registered to the IBM Storage Protect server. However, on systems with multiple users, such
as Linux client systems, there can be more than one client node name. This parameter is required.
logPath
The fully qualified path of the log files. This parameter is required.
Example (Linux client): /opt/backup_tools/tivoli/tsm/baclient/dsmerror.log
Example (Windows client): C:\backup tools\Tivoli\TSM\baclient\dsmerror.log
language
The language locale of the log file. This parameter is optional. However, if you specify this parameter,
you must also specify the dateFormat, timeFormat, and encoding parameters. You must specify
the locale for the following languages.
Language Locale
Brazilian Portuguese pt_BR
Chinese, Simplified zh_CN
Chinese, Traditional zh_TW
Czech cs_CZ
English en_US
French fr_FR
German de_DE
Hungarian hu_HU
Italian it_IT
Japanese ja_JP
Korean ko_KR
Polish pl_PL
Russian ru_RU
Spanish es_ES
dateFormat
The date format of the time stamp entries in the client log file. This parameter is optional. However,
if you specify this parameter, you must also specify the language, timeFormat, and encoding
parameters.
The following table shows the date formats for the languages.
Tip: Instead of using one of the date formats that are listed in the table, you can specify a date format
by using the backup-archive client dateformat option.
timeFormat
The time format of the time stamp entries in the client log file. This parameter is optional. However,
if you specify this parameter, you must also specify the language, dateFormat, and encoding
parameters.
The following table shows examples of default time formats that you can specify and client operating
systems.
Tip: Instead of using one of the time formats that are listed in the table, you can specify a time format
by using the backup-archive client timeformat option.
Language Time format for Linux client Time format for Windows client
systems systems
Chinese, Simplified HH:mm:ss HH:mm:ss
Chinese, Traditional HH:mm:ss ahh:mm:ss
Czech HH:mm:ss HH:mm:ss
English HH:mm:ss HH:mm:ss
French HH:mm:ss HH:mm:ss
German HH:mm:ss HH:mm:ss
Hungarian HH.mm.ss HH:mm:ss
Language Time format for Linux client Time format for Windows client
systems systems
Italian HH:mm:ss HH:mm:ss
Japanese HH:mm:ss HH:mm:ss
Korean HH:mm:ss HH:mm:ss
Polish HH:mm:ss HH:mm:ss
Portuguese, Brazilian HH:mm:ss HH:mm:ss
Russian HH:mm:ss HH:mm:ss
Spanish HH:mm:ss HH:mm:ss
encoding
The character encoding of the entries in the client log files. This parameter is optional. However, if
you specify this parameter, you must also specify the language, dateFormat, and timeFormat
parameters.
For Linux client systems, the typical character encoding is UTF-8. For Windows client systems,
the default encoding values are shown in the following table. If your client system is customized
differently, use the encoding parameter to specify a value other than the default.
Language Encoding
Chinese, Simplified CP936
Chinese, Traditional CP950
Czech Windows-1250
English Windows-1252
French Windows-1252
German Windows-1252
Hungarian Windows-1250
Italian Windows-1252
Japanese CP932
Korean CP949
Polish Windows-1250
Portuguese, Brazilian Windows-1252
Russian Windows-1251
Spanish Windows-1252
Output:
Adding log.
Adding log.
Syntax
CmsConfig remove nodeName
Parameters
nodeName
The client node name that is associated with the log files. For most client systems, only one node
name is registered to the IBM Storage Protect server. However, on systems with multiple users, such
as Linux client systems, there can be more than one client node name. This parameter is required.
Removing node.
Output:
Removing node.
Syntax
CmsConfig verify nodeName
cmsPort
Parameters
nodeName
The client node name that is associated with the log files. For most client systems, only one node
name is registered to the IBM Storage Protect server. However, on systems with multiple users, such
as Linux client systems, there can be more than one client node name. This parameter is required.
cmsPort
The TCP/IP port number that is used to communicate with the client management service. Specify the
port number if you did not use the default port number when you installed the client management
service. The default port number is 9028. This parameter is optional.
Verifying node.
Commands:
cmsconfig verify SUSAN
During the verification process, you are prompted to enter the client node name or administrative user ID
and password.
Output:
Verifying node.
Syntax
CmsConfig list
Capabilities: [LOG_QUERY]
Opt Path: C:\Program Files\Tivoli\TSM\baclient\dsm.opt
Syntax
CmsConfig help
./CmsConfig help
CmsConfig help
Procedure
To update the parameter configuration in the log file of CMS, complete the following actions:
1. Change to the following directory where the CMS is installed: /opt/tivoli/tsm/cms/
Liberty/usr/servers/cmsServer.
2. Open the client-configuration.xml file in a text editor.
3. Edit the parameters such as datetime Format, encoding, and language Tag to your preferred values.
For more information about available options, see “CmsConfig addlog command” on page 175.
4. Save the file. After updating the parameters, run the service cms.rc restart command in the
console to restart the CMS service.
5. Restart the client management service by issuing the following command: service cms.rc
restart. For more information about starting and stopping the service, see Starting and stopping
the client management service.
Example
Following is an example of the client-configuration.xml with all the parameters.
<logFile>
<logPath>/opt/tivoli/tsm/client/ba/bin/dsmerror.log</logPath>
<dateTimeFormat>MM/dd/yyyy HH:mm:ss</dateTimeFormat>
<encoding>ISO-8859-1</encoding>
<languageTag>en_US</languageTag>
</logFile>
<logFile>
<logPath>/opt/tivoli/tsm/client/ba/bin/dsmsched.log</logPath>
<dateTimeFormat>MM/dd/yyyy HH:mm:ss</dateTimeFormat>
<encoding>ISO-8859-1</encoding>
<languageTag>en_US</languageTag>
</logFile>
Procedure
1. Open IBM Installation Manager.
You can open IBM Installation Manager from the Start menu.
2. Click Uninstall.
3. Select the option for the Operations Center, and click Next.
4. Click Uninstall.
5. Click Finish.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command:
imcl.exe -c
3. To uninstall, enter 5.
4. Choose to uninstall from the IBM Storage Protect package group.
5. Enter N for Next.
6. Choose to uninstall the Operations Center package.
7. Enter N for Next.
8. Enter U for Uninstall.
9. Enter F for Finish.
To uninstall the Operations Center, leave modify="false" set for the Operations Center entry in the
response file.
If you want to customize the response file, you can modify the options that are in the file. For information
about response files, see Response files.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command, where response_file represents the response
file path, including the file name:
imcl.exe -input response_file -silent
The following command is an example:
imcl.exe -input C:\tmp\input\uninstall_response.xml -silent
Procedure
• To roll back to a previous version of the Operations Center, use the Roll Back function of IBM
Installation Manager.
Overview
The IBM Storage Protect family of products includes the following major accessibility features:
• Keyboard-only operation
• Operations that use a screen reader
The IBM Storage Protect family of products uses the latest W3C Standard, WAI-ARIA 1.0
(www.w3.org/TR/wai-aria/), to ensure compliance with US Section 508 and Web Content Accessibility
Guidelines (WCAG) 2.0 (www.w3.org/TR/WCAG20/). To take advantage of accessibility features, use the
latest release of your screen reader and the latest web browser that is supported by the product.
The product documentation in IBM Documentation is enabled for accessibility.
Keyboard navigation
This product uses standard navigation keys.
Interface information
User interfaces do not have content that flashes 2 - 55 times per second.
Web user interfaces rely on cascading style sheets to render content properly and to provide a usable
experience. The application provides an equivalent way for low-vision users to use system display
settings, including high-contrast mode. You can control font size by using the device or web browser
settings.
Web user interfaces include WAI-ARIA navigational landmarks that you can use to quickly navigate to
functional areas in the application.
Vendor software
The IBM Storage Protect product family includes certain vendor software that is not covered under the
IBM license agreement. IBM makes no representation about the accessibility features of these products.
Contact the vendor for accessibility information about its products.
TTY service
800-IBM-3383 (800-426-3383)
(within North America)
For more information about the commitment that IBM has to accessibility, see IBM Accessibility
(www.ibm.com/able).
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs
in any form without payment to IBM, for the purposes of developing, using, marketing or distributing
application programs conforming to the application programming interface for the operating platform
for which the sample programs are written. These examples have not been thoroughly tested under
all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these
programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be
liable for any damages arising out of your use of the sample programs.
Each copy or any portion of these sample programs or any derivative work must include a copyright
notice as follows: © (your company name) (year). Portions of this code are derived from IBM Corp. Sample
Programs. © Copyright IBM Corp. _enter the year or years_.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe is a registered trademark of Adobe Systems Incorporated in the United States, and/or other
countries.
Linear Tape-Open, LTO, and Ultrium are trademarks of HP, IBM Corp. and Quantum in the U.S. and other
countries.
Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the
United States and other countries.
The registered trademark Linux is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
Red Hat®, OpenShift®, Ansible®, and Ceph® are trademarks or registered trademarks of Red Hat, Inc. or its
subsidiaries in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
192 Notices
VMware, VMware vCenter Server, and VMware vSphere are registered trademarks or trademarks of
VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.
Notices 193
194 IBM Storage Protect for Windows: Installation Guide
Glossary
A glossary is available with terms and definitions for the IBM Storage Protect family of products.
See the IBM Storage Protect glossary.
Index 197
configuring, manually 73, 75 G
configuring, server instance 73
configuring, wizard 73 group 71
Console language support 68
console mode 65
create a certificate signing request
H
third-party certificate 147 HALT command 84
create server instance 71, 73 halting the server 84
custom configuration hardware requirements
client management service 168 IBM Storage Protect 42
home directory 75
D HTTPS
password for truststore file 126, 158
database hub server
backups 85 configuring 136
installing 78
name 60
storage technology selection 38
I
database directories 71 IBM Documentation viii
database manager 46 IBM Installation Manager
Db2 commands 109 uninstalling 115
db2icrt command 75 IBM Storage Protect
DEFINE DEVCLASS 85 installation 64, 65
device driver, IBM Storage Protect vii, viii installation packages 63
directories server changes
naming for server 60 Version 8.1 ix
directories, instance 71 uninstalling
disability 189 in silent mode 114
DISK device class using a graphical installation wizard 113
checklist for disk systems 35 using command line in console mode 113
storage technology selection 38 upgrading
disk performance 8.1 95
checklist for active log 23 V7.1 to V8.1 95
checklist for server database 21 IBM Storage Protect device driver, installable package vii, viii
checklist for server recovery log 23 IBM Storage Protect fix packs 89
checklist for storage pools on disk 35 IBM Storage Protect on AIX
disk space 42 upgrading
disk systems V8.1 95
checklist for active log 23 IBM Storage Protect support site 63
checklist for server database 21 IBM Storage Protect, setting up 80
checklist for server recovery log 23 installable components vii, viii
classification 38 installation directories
selecting 38 Operations Center
storage pools on disk 35 Installation Manager 126
DSMSERV FORMAT command 78 installation log 64, 65
dsmserv.v6lock 84 Installation Manager
logs directory 187
E installation packages
Operations Center 129
email alerts installation wizard 64
suspending temporarily 139 installing
enabling client/server communications 76 client management service 162
expiration database 78
scheduling 33 device support 63
fix packs 89
graphical user interface
F using 64
FILE device class minimum requirements for 42
checklist for disk systems 35 Operations Center 129
storage technology selection 38 recovery log 78
first steps 71 server 3, 63
fix packs 89 using command line in console mode
fixes 63 using 65
Index 199
password for secure communications 126 server (continued)
performance starting (continued)
configuration best practices 40 maintenance mode 83
Operations Center 120 stand-alone mode 83
planning, capacity starting as a service
database space requirements configuration 81
estimates based on number of files 44 procedure 82
estimates based storage pool capacity 46 stopping 84
starting size 44 upgrading
recovery log space requirements to 8.1 95
active log mirror 58 V7.1 to V8.1 95
recovery log space requirementsv 47 server active log
port number checklist for disks 23
Operations Center 126, 160 server AIX
prerequisite checks upgrading
Operations Center 119 V8.1 95
publications viii server archive log
checklist for disks 23
server database
R checklist for disks 21
receive the signed certificate directories 21
IBM Key Management 151 reorganization options 79
ikeycmd 157 storage paths 21
ikeyman 151 server hardware
third-party certificate 151, 157 checklist for server system 17
recovery log checklist for storage pools on disk 35
archive failover log space 58 storage technology choices 38
installing 78 server instance 73, 75
reference, Db2 commands 109 server instance, creating 75
REGISTER LICENSE command 84 server instances
Remote Execution Protocol 74 naming 60
repository 42, 125 naming best practices 60
requirements server license 84
client management service 123 server recovery log
requirements for installation 42 checklist for disks 23
resource requirements server,
Operations Center 120 activating 80
reverting setting up 80
Windows cluster 107 starting 80
REXEC 74 server, IBM Storage Protect
rollback halting 84
Operations Center 185 options 76
services
starting the server as a Windows service
S configuration 81
procedure 82
schedule
SET DBRECOVERY 85
daily processes 33
shared resources directory 42, 125
server processes 33
silent installation
tuning 33
IBM Storage Protect 67
secure communications 141, 142, 144, 145
software requirements
Secure Sockets Layer 141, 142, 144, 145
IBM Storage Protect 42
Secure Sockets Layer (SSL)
spoke server
communication using 77
adding 136
retry certificate exchange 15
SSL
Transport Layer Security (TLS) 77
configuring 147
troubleshooting security updates 12
password for truststore file 126, 158
what to know about security before you upgrade 3
SSL (Secure Sockets Layer)
send the certificate signing request
communication using 77
third-party certificate 151
Transport Layer Security 77
server
SSLTCPADMINPORT option 77
naming best practices 60
SSLTCPPORT option 77
performance optimization 16
stand-alone mode 83
starting
starting
W
T
web server
TCP/IP starting 160
setting options 76 stopping 160
Version 4 76 Windows
Version 6 76 cluster reverting 107
TCPNODELAY option 77 system requirements 42
TCPPORT option 77 Windows clustered environment
TCPWINDOWSIZE option 77 applying a fix pack to a V8 server 91
technical changes ix Windows Server 74
temporary disk space 46 Windows services
temporary space 46 creating
third-party certificate manually 82
create a certificate signing request 147 starting the server
receive the signed certificate 151, 157 configuration 81
send the certificate signing request 151 procedure 82
time wizard 71
server upgrade 96 worksheet
TLS 142, 144, 145 server space planning 42
TLS communication
configuring 147
translation features 68
translations 68
Transport Layer Security (TLS) 77
Transport Layer Security protocol 142, 144, 145
truststore file
deleting password 158
Operations Center 126
reassigning password 158
tuning
Operations Center 120
U
Uninstall
IBM Installation Manager 115
uninstalling
client management service 168
uninstalling and reinstalling 114
updating 69, 133
upgrade
server
Index 201
202 IBM Storage Protect for Windows: Installation Guide
IBM®