IBM Spectrum Protect For Windows Installation Guide
IBM Spectrum Protect For Windows Installation Guide
for Windows
Version 8.1.2
Installation Guide
IBM
IBM Spectrum Protect
for Windows
Version 8.1.2
Installation Guide
IBM
Note:
Before you use this information and the product it supports, read the information in “Notices” on page 171.
This edition applies to version 8, release 1, modification 2 of IBM Spectrum Protect (product numbers 5725-W98,
5725-W99, 5725-X15), and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright IBM Corporation 1993, 2017.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
About this publication . . . . . . . . v Chapter 3. Taking the first steps after
Who should read this guide . . . . . . . . . v you install IBM Spectrum Protect . . . 51
Installable components . . . . . . . . . . . v Creating the user ID and directories for the server
Publications . . . . . . . . . . . . . . vi instance . . . . . . . . . . . . . . . 51
Configuring the IBM Spectrum Protect server . . . 53
What's new in this release . . . . . . vii Configuring IBM Spectrum Protect by using the
configuration wizard . . . . . . . . . . 54
Configuring the server instance manually . . . 55
Part 1. Installing and upgrading the Configuring server options for server database
server . . . . . . . . . . . . . . . 1 maintenance . . . . . . . . . . . . . . 62
Starting the server instance on Windows systems . . 63
Chapter 1. Planning to install the server 3 Configuring the server to start as a Windows
What you should know first . . . . . . . . . 3 service . . . . . . . . . . . . . . . 64
| What you should know about security before you Starting the server as a Windows service . . . 65
| install or upgrade the server . . . . . . . . . 3 Manually creating and configuring a Windows
Planning for optimal performance . . . . . . . 4 service . . . . . . . . . . . . . . . 66
Planning for the server hardware and the Starting the server in the foreground . . . . . 67
operating system . . . . . . . . . . . . 4 Starting the server in maintenance mode . . . 67
Planning for the server database disks . . . . . 7 Stopping the server . . . . . . . . . . . . 68
Planning for the server recovery log disks . . . 9 Registering licenses . . . . . . . . . . . . 68
Planning for directory-container and Specifying a device class in preparation for database
cloud-container storage pools . . . . . . . 10 backups . . . . . . . . . . . . . . . 68
Planning for storage pools in DISK or FILE Running multiple server instances on a single
device classes. . . . . . . . . . . . . 15 system . . . . . . . . . . . . . . . . 69
Planning for the correct type of storage Monitoring the server . . . . . . . . . . . 70
technology. . . . . . . . . . . . . . 18
Applying best practices to the server installation 19 Chapter 4. Installing an IBM Spectrum
Minimum system requirements for the IBM Protect server fix pack . . . . . . . . 73
Spectrum Protect server . . . . . . . . . . 20 Applying a fix pack to IBM Spectrum Protect 8.1.2
IBM Installation Manager. . . . . . . . . . 23 in a clustered environment . . . . . . . . . 75
Worksheets for planning details for the server . . . 23
Capacity planning . . . . . . . . . . . . 24
Chapter 5. Upgrading to V8.1 . . . . . 79
Estimating space requirements for the database 24
Upgrading to V8.1 . . . . . . . . . . . . 80
Recovery log space requirements . . . . . . 28
Planning the upgrade . . . . . . . . . . 80
Monitoring space utilization for the database and
Preparing the system . . . . . . . . . . 81
recovery logs . . . . . . . . . . . . . 40
Installing the server and verifying the upgrade 83
Deleting installation rollback files . . . . . . 41
Upgrading the server in a clustered environment . . 86
Server naming best practices. . . . . . . . . 42
Upgrading a V6.3 or V7.1 server to V8.1.2 in a
Installation directories . . . . . . . . . . . 44
clustered environment . . . . . . . . . . 87
Upgrading IBM Tivoli Storage Manager V6.1 to
Chapter 2. Installing the server IBM Spectrum Protect V8.1.2 in a clustered
components . . . . . . . . . . . . 45 environment . . . . . . . . . . . . . 89
Obtaining the installation package . . . . . . . 45 Removing GSKit Version 7 after upgrading to IBM
Installing IBM Spectrum Protect by using the Spectrum Protect Version 8.1.2 . . . . . . . . 92
installation wizard . . . . . . . . . . . . 46
Installing IBM Spectrum Protect by using console Chapter 6. Reverting from Version 8.1.2
mode . . . . . . . . . . . . . . . . 47
to a previous server . . . . . . . . . 95
Installing IBM Spectrum Protect in silent mode . . 48
Steps for reverting to the previous server version. . 95
Installing server language packages . . . . . . 49
Additional recovery steps if you created new
Server language locales . . . . . . . . . 49
storage pools or enabled data deduplication . . . 96
Configuring a language package . . . . . . 50
Reverting to the previous server version in a cluster
Updating a language package . . . . . . . 50
configuration . . . . . . . . . . . . . . 97
Steps for reverting to the previous server version 97
Instructions for installing the Operations Center are also included in this
publication.
Installable components
The IBM Spectrum Protect server and licenses are required components.
Table 1 describes all the installable components. These components are in several
different installation packages.
Table 1. IBM Spectrum Protect installable components
IBM Spectrum Protect Description Additional information
component
Server (required) Includes the database, the See Chapter 2, “Installing the server components,” on page 45.
Global Security Kit
(GSKit), IBM® Java™
Runtime Environment
(JRE), and tools to help
you configure and manage
the server.
Language package Each language package See “Installing server language packages” on page 49.
(optional) (one for each language)
contains language-specific
information for the server.
Licenses (required) Includes support for all Use the REGISTER LICENSE command.
licensed features. After you
install this package, you
must register the licenses
you purchased.
Devices (optional) Extends media A list of devices that are supported by this driver is available
management capability. from the IBM Support Portal.
Storage agent Installs the component that For more information about storage agents, see Tivoli Storage
(optional) allows client systems to Manager for Storage Area Networks (V7.1.1).
write data directly to, or
read data directly from,
storage devices that are
attached to a storage area
network (SAN).
Remember: IBM Spectrum
Protect for Storage Area
Networks is a separately
licensed product.
Publications
The IBM Spectrum Protect product family includes IBM Spectrum Protect
Snapshot, IBM Spectrum Protect for Space Management, IBM Spectrum Protect for
Databases, and several other storage management products from IBM.
Server maintenance releases, client software, and publications are available from
the IBM Support Portal.
Restriction: You cannot install and run the Version 8.1.2 server on a system that
already has DB2® installed on it, whether DB2 was installed by itself or as part of
some other application. The V8.1.2 server requires the installation and use of the
DB2 version that is packaged with the V8.1.2 server. No other version of DB2 can
exist on the system.
You can install the IBM Spectrum Protect server on a domain controller. The server
can have heavy processor usage, however, and that might affect and stall other
applications.
Experienced DB2 administrators can choose to perform advanced SQL queries and
use DB2 tools to monitor the database. Do not, however, use DB2 tools to change
DB2 configuration settings from those that are preset by IBM Spectrum Protect, or
alter the DB2 environment for IBM Spectrum Protect in other ways, such as with
other products. The V8.1.2 server has been built and tested extensively using the
data definition language (DDL) and database configuration that the server deploys.
Attention: Do not alter the DB2 software that is installed with IBM Spectrum
Protect installation packages and fix packs. Do not install or upgrade to a different
version, release, or fix pack of DB2 software because doing so can damage the
database.
| What you should know about security before you install or upgrade
| the server
| Before you install IBM Spectrum Protect V8.1.2 or later, review information about
| the enhanced security features and the requirements for updating your
| environment.
| Security enhancements that were introduced in V8.12 and later enforce stricter
| security settings. To ensure that communication between servers and clients is not
| interrupted when you install or upgrade IBM Spectrum Protect software to V8.1.2,
| follow the procedure.
| Procedure
| 1. Install or upgrade the IBM Spectrum Protect servers to 8.1.2 or later.
Procedure
1. Review “What you should know first” on page 3.
2. Review each of the following sub-sections.
Tasks, characteristics,
Question options, or settings More information
Does the operating If you are using the Review operating system requirements at technote 1243309.
system and minimum required
hardware meet or amount of memory, you Additionally, review the guidance in Tuning tasks for operating
exceed can support a minimal systems and other applications.
requirements? workload.
For more information about requirements when these features are
v Number and in use, see the following topics:
You can experiment by
speed of
adding more system v Checklist for data deduplication
processors
memory to determine v Checklist for node replication
v System memory whether the performance
v Supported is improved. Then, decide For more information about sizing requirements for the server
operating system whether you want to keep and storage, see the IBM Spectrum Protect Blueprint.
level the system memory
dedicated to the server.
Test the memory
variations by using the
entire daily cycle of the
server workload.
Tasks, characteristics,
Question options, or settings More information
Are disks configured The amount of tuning For more information, see the following topics:
for optimal that can be done for v "Planning for server database disks"
performance? different disk systems
v "Planning for server recovery log disks"
varies. Ensure that the
appropriate queue depths v "Planning for storage pools in DISK or FILE device classes"
and other disk system
options are set.
Does the server Heavier workloads and For more information about requirements when these features are
have enough advanced features such as in use, see the following topics:
memory? data deduplication and v Checklist for data deduplication
node replication require
v Checklist for node replication
more than the minimum
system memory that is v Memory requirements
specified in the system
requirements document.
Tasks, characteristics,
Question options, or settings More information
Is network Network bandwidth must For more information, see the following topics:
bandwidth greater allow the system to v Tuning network performance
than the planned complete operations such
v Checklist for node replication
maximum as backups in the time
throughput for that is allowed or that
backups? meets service level
commitments.
Paging space is
automatically configured.
Procedure
Review the following table to help you to choose the correct type of storage
technology for the storage resources that the server requires.
Table 2. Storage technology types for IBM Spectrum Protect storage requirements
Storage
technology Archive log and
type Database Active log archive failover log Storage pools
Solid-state Place the database on If you place the IBM Save SSDs for use with Save SSDs for use with
disk (SSD) SSD in the following Spectrum Protect the database and active the database and active
circumstances: database on an SSD, as log. The archive log log. Storage pools can
v You are using IBM a best practice, place and archive failover be placed on slower
Spectrum Protect the active log on an logs can be placed on storage technology
data deduplication. SSD. If space is not slower storage types.
available, use technology types.
v You are backing up
high-performance disk
more than 8 TB of
instead.
new data daily.
High- Use high-performance Use high-performance You can use Use high-performance
performance disks in the following disks in the following high-performance disks disks for storage pools
disk with the circumstances: circumstances: for the archive log and in the following
following v The server does not v The server does not archive failover logs. circumstances:
characteristics: do data do data For availability, isolate v Data is frequently
v 15k rpm deduplication. deduplication. these logs from the read.
disk database and active
v The server does not v The server does not v Data is frequently
log.
v Fibre do node replication. do node replication. written.
Channel or
serial- Isolate the server For performance and For performance and
attached database from its logs availability, isolate the availability, isolate
SCSI (SAS) and storage pools, and active log from the storage pool data from
interface from data for other server database, archive the server database and
applications. logs, and storage pools. logs, and from data for
other applications.
Medium- If the disk system has a If the disk system has a You can use Use
performance mix of disk mix of disk medium-performance medium-performance
or technologies, use the technologies, use the or high-performance or high-performance
high- faster disks for the faster disks for the disk for the archive log disk for storage pools
performance database and active database and active and archive failover in the following
disk with the log. Isolate the server log. For performance logs. For availability, circumstances:
following database from its logs and availability, isolate isolate these logs from v Data is frequently
characteristics: and storage pools, and the active log from the the database and active read.
v 10k rpm from data for other server database, archive log.
v Data is frequently
disk applications. logs, and storage pools.
written.
v Fibre
Channel or For performance and
SAS availability, isolate
interface storage pool data from
the server database and
logs, and from data for
other applications.
Table 2. Storage technology types for IBM Spectrum Protect storage requirements (continued)
Storage
technology Archive log and
type Database Active log archive failover log Storage pools
SATA, Do not use this storage Do not use this storage Use of this slower Use this slower storage
network- for the database. Do for the active log. storage technology is technology in the
attached not place the database acceptable because following
storage on XIV storage these logs are written circumstances:
systems. once and infrequently v Data is infrequently
read. written, for example
written once.
v Data is infrequently
read.
.
Tape and Use for long-term
virtual tape retention or if data is
infrequently used.
Procedure
v The following best practices are the most important for optimal performance and
problem prevention.
v Review the table to determine the best practices that apply to your environment.
Isolate the storage devices that are used by IBM Spectrum Protect
from other applications that have high I/O, and ensure that there is
enough throughput to that storage.
For more details, see Checklist for storage pools on DISK or FILE.
Schedule IBM Spectrum Protect client For more details, see the following topics:
operations and server maintenance activities to v Tuning the schedule for daily operations
avoid or minimize overlap of operations.
v Checklist for server configuration
Monitor operations constantly. By monitoring, you can find problems early and more easily
identify causes. Keep records of monitoring reports for up to a year
to help you identify trends and plan for growth. See Monitoring
and maintaining the environment for performance.
These tables list the minimum hardware and software requirements for the
installation of an IBM Spectrum Protect server. Use these requirements as a starting
point for systems without data deduplication. The optimal IBM Spectrum Protect
environment is set up with data deduplication by using the IBM Spectrum Protect
Blueprints. For the most current information about system requirements, see
technote 1243309.
Hardware requirements
Table 3 describes the minimum hardware requirements for the server. If the server
does not meet the minimum requirements, the installation fails. For more details
about planning disk space, see “Capacity planning” on page 24.
Table 3. Hardware requirements
Type of
hardware Hardware requirements
Hardware An AMD64 or Intel EMT-64 processor
Disk Space The following minimum values for disk space:
v At least 7.5 GB of free disk storage for a typical installation
v 60 MB in the temporary directory space
v 2 GB partition size in the C:\ drive
v 300 MB in the instance directory
v 2 GB for the shared resources area
Significant additional disk space is required for database and log files. The
size of the database depends on the number of client files to be stored and
the method by which the server manages them. The default active log
space is 16 GB, the minimum that is needed for most workloads and
configurations. When you create the active log, you need at least 64 GB to
run replication. If replication and data deduplication are both being used,
create an active log of 128 GB. Allocate at least three times the default
active log space for the archive log (48 GB). Ensure that you have sufficient
resources if you are using data deduplication or expect a heavy client
workload.
For optimal performance and to facilitate I/O, specify at least two equally
sized containers or Logical Unit Numbers (LUNs) for the database. In
addition, each active log and archive log needs its own container or LUN.
Ensure that you see “Capacity planning” on page 24 for more details about
disk space.
Memory The following minimum values for memory:
v 16 GB for standard server operations without data deduplication and
node replication
v 24 GB for data deduplication or node replication
v 32 GB for node replication with data deduplication
For more specific memory requirements for larger databases and higher
ingestion capability, see the IBM Spectrum Protect server memory tuning
table.
For more specific memory requirements when you are using data
deduplication, see the IBM Spectrum Protect Blueprint for your operating
system.
Software requirements
Table 4 describes the minimum software requirements that are needed for a server
on a Windows system.
Table 4. Software requirements
Type of
software Minimum software requirements
Operating One of the following operating systems:
system v Microsoft Windows Server 2012: Standard, Enterprise, or Datacenter
Edition (64-bit)
v Microsoft Windows Server 2012 R2 (64-bit)
| v Microsoft Windows Server 2016
Communication At least one of the following communication protocols (installed by
protocol default with the current Windows operating systems):
v Named Pipes
v TCP/IP Version 4 or Version 6
Device drivers The IBM Spectrum Protect passthru device driver that is required for
non-IBM drives and tape libraries. The Windows native device driver is
recommended for tape drives and tape libraries. Otherwise, the IBM
Spectrum Protect kernel device driver can be used.
For the IBM 3590, 3592, or the Ultrium tape library or drives, the IBM
device drivers are required. Install the most current device drivers. You
can locate IBM driver packages at Fix Central.
Configure the device drivers before you use the server with tape devices.
| Other software Windows 2012, Windows 2012 R2, and Windows 2016 require that .NET
| Framework 3.5 is installed and enabled.
The following list contains explanations of some terms that are used in IBM
Installation Manager:
Offering
An installable unit of a software product.
The IBM Spectrum Protect offering contains all of the media that IBM
Installation Manager requires to install IBM Spectrum Protect.
Package
The group of software components that are required to install an offering.
The IBM Spectrum Protect package contains the following components:
v IBM Installation Manager installation program
v IBM Spectrum Protect offering
Package group
A set of packages that share a common parent directory.
The default package group for the IBM Spectrum Protect package is IBM
Installation Manager.
Repository
A remote or local storage area for data and other application resources.
The IBM Spectrum Protect package is stored in a repository on IBM Fix
Central.
Shared resources directory
A directory that contains software files or plug-ins that are shared by
packages.
IBM Installation Manager stores installation-related files in the shared
resources directory, including files that are used for rolling back to a
previous version of IBM Spectrum Protect.
Restriction: If you are using a File Allocation Table (FAT or FAT32) or a New
Technology File System (NTFS) format, you cannot specify the root directory of
that system as the location of a database directory or log directory. Instead, you
must create one or more subdirectories within the root directory. Then, create the
database directories and log directories within the subdirectories.
Capacity planning
Capacity planning for IBM Spectrum Protect includes managing resources such as
the database, the recovery log and the shared resource area. To maximize resources
as part of capacity planning, you must estimate space requirements for the
database and the recovery log. The shared resource area must have enough space
available for each installation or upgrade.
Consider using at least 25 GB for the initial database space. Provision file system
space appropriately. A database size of 25 GB is adequate for a test environment or
a library-manager-only environment. For a production server supporting client
workloads, the database size is expected to be larger. If you use random-access
disk (DISK) storage pools, more database and log storage space is needed than for
sequential-access storage pools.
Restriction: The guideline does not include space that is used during data
deduplication.
v 100 - 200 bytes for each cached file, copy storage pool file, active-data pool file,
and deduplicated file.
v Additional space is required for database optimization to support varying
data-access patterns and to support server back-end processing of the data. The
amount of extra space is equal to 50% of the estimate for the total number of
bytes for file objects.
In the following example for a single client, the calculations are based on the
maximum values in the preceding guidelines. The examples do not take into
account that you might use file aggregation. In general, when you aggregate small
files, it reduces the amount of required database space. File aggregation does not
affect space-managed files.
Procedure
1. Calculate the number of file versions. Add each of the following values to
obtain the number of file versions:
a. Calculate the number of backed-up files. For example, as many as 500,000
client files might be backed up at a time. In this example, storage policies
are set to keep up to three copies of backed up files:
500,000 files * 3 copies = 1,500,000 files
b. Calculate the number of archive files. For example, as many as 100,000
client files might be archived copies.
c. Calculate the number of space-managed files. For example, as many as
200,000 client files might be migrated from client workstations.
Using 1000 bytes per file, the total amount of database space that is required
for the files that belong to the client is 1.8 GB:
(1,500,000 + 100,000 + 200,000) * 1000 = 1.8 GB
2. Calculate the number of cached files, copy storage-pool files, active-data pool
files, and deduplicated files:
a. Calculate the number of cached copies. For example, caching is enabled in a
5 GB disk storage pool. The high migration threshold of the pool is 90%
and the low migration threshold of the pool is 70%. Thus, 20% of the disk
pool, or 1 GB, is occupied by cached files.
If the average file size is about 10 KB, approximately 100,000 files are in
cache at any one time:
100,000 files * 200 bytes = 19 MB
b. Calculate the number of copy storage-pool files. All primary storage pools
are backed up to the copy storage pool:
(1,500,000 + 100,000 + 200,000) * 200 bytes = 343 MB
c. Calculate the number of active storage-pool files. All the active
client-backup data in primary storage pools is copied to the active-data
storage pool. Assume that 500,000 versions of the 1,500,000 backup files in
the primary storage pool are active:
500,000 * 200 bytes = 95 MB
d. Calculate the number of deduplicated files. Assume that a deduplicated
storage pool contains 50,000 files:
50,000 * 200 bytes = 10 MB
Based on the preceding calculations, about 0.5 GB of extra database space is
required for the client’s cached files, copy storage-pool files, active-data pool
files, and deduplicated files.
3. Calculate the amount of extra space that is required for database optimization.
To provide optimal data access and management by the server, extra database
space is required. The amount of extra database space is equal to 50% of the
total space requirements for file objects.
(1.8 + 0.5) * 50% = 1.2 GB
4. Calculate the total amount of database space that is required for the client. The
total is approximately 3.5 GB:
1.8 + 0.5 + 1.2 = 3.5 GB
5. Calculate the total amount of database space that is required for all clients. If
the client that was used in the preceding calculations is typical and you have
500 clients, for example, you can use the following calculation to estimate the
total amount of database space that is required for all clients:
500 * 3.5 = 1.7 TB
Results
Tip: In the preceding examples, the results are estimates. The actual size of the
database might differ from the estimate because of factors such as the number of
directories and the length of the path and file names. Periodically monitor your
database and adjust its size as necessary.
What to do next
During normal operations, the IBM Spectrum Protect server might require
temporary database space. This space is needed for the following reasons:
v To hold the results of sorting or ordering that are not already being kept and
optimized in the database directly. The results are temporarily held in the
database for processing.
v To give administrative access to the database through one of the following
methods:
– A DB2 open database connectivity (ODBC) client
– An Oracle Java database connectivity (JDBC) client
– Structured Query Language (SQL) to the server from an administrative-client
command line
Consider using an extra 50 GB of temporary space for every 500 GB of space for
file objects and optimization. See the guidelines in the following table. In the
example that is used in the preceding step, a total of 1.7 TB of database space is
required for file objects and optimization for 500 clients. Based on that calculation,
200 GB is required for temporary space. The total amount of required database
space is 1.9 TB.
The database manager sorts data in a specific sequence, according to the SQL
statement that you issue to request the data. Depending on the workload on the
server, and if there is more data than the database manager can manage, the data
(that is ordered in sequence) is allocated to temporary disk space. Data is allocated
to temporary disk space when there is a large result set. The database manager
dynamically manages the memory that is used when data is allocated to temporary
disk space.
For example, expiration processing can produce a large result set. If there is not
enough system memory on the database to store the result set, some of the data is
allocated to temporary disk space. During expiration processing, if a node or file
space are selected that are too large to process, the database manager cannot sort
the data in memory. The database manager must use temporary space to sort data.
To run database operations, consider adding more database space for the following
scenarios:
v The database has a small amount of space and the server operation that requires
temporary space uses the remaining free space.
v The file spaces are large, or the file spaces have an assigned policy that creates
many file versions.
v The IBM Spectrum Protect server must run with limited memory. The database
uses the IBM Spectrum Protect server main memory to run database operations.
However, if there is insufficient memory available, the IBM Spectrum Protect
server allocates temporary space on disk to the database. For example, if 10G of
memory is available and database operations require 12G of memory, the
database uses temporary space.
Important: Do not change the DB2 software that is installed with the IBM
Spectrum Protect installation packages and fix packs. Do not install or upgrade to
a different version, release, or fix pack, of DB2 software to avoid damage to the
database.
In IBM Spectrum Protect servers V7.1 and later, the active log can be a maximum
size of 512 GB. The archive log size is limited to the size of the file system that it is
installed on.
Use the following general guidelines when you estimate the size of the active log:
v The suggested starting size for the active log is 16 GB.
v Ensure that the active log is at least large enough for the amount of concurrent
activity that the server typically handles. As a precaution, try to anticipate the
largest amount of work that the server manages at one time. Provision the active
log with extra space that can be used if needed. Consider using 20% of extra
space.
v Monitor used and available active log space. Adjust the size of the active log as
needed, depending upon factors such as client activity and the level of server
operations.
v Ensure that the directory that holds the active log is as large as, or larger than,
the size of the active log. A directory that is larger than the active log can
accommodate failovers, if they occur.
v Ensure that the file system that contains the active log directory has at least 8
GB of free space for temporary log movement requirements.
The archive log directory must be large enough to contain the log files that are
generated since the previous full backup. For example, if you perform a full
backup of the database every day, the archive log directory must be large enough
to hold the log files for all the client activity that occurs during 24 hours. To
recover space, the server deletes obsolete archive log files after a full backup of the
database. If the archive log directory becomes full and a directory for archive
failover logs does not exist, log files remain in the active log directory. This
condition can cause the active log directory to fill up and stop the server. When the
server restarts, some of the existing active-log space is released.
After the server is installed, you can monitor archive log utilization and the space
in the archive log directory. If the space in the archive log directory fills up, it can
cause the following problems:
v The server is unable to perform full database backups. Investigate and resolve
this problem.
v Other applications write to the archive log directory, exhausting the space that is
required by the archive log. Do not share archive log space with other
applications including other IBM Spectrum Protect servers. Ensure that each
server has a separate storage location that is owned and managed by that
specific server.
Example: Estimating active and archive log sizes for basic client-store
operations:
Basic client-store operations include backup, archive, and space management. Log
space must be sufficient to handle all store transactions that are in progress at one
time.
To determine the sizes of the active and archive logs for basic client-store
operations, use the following calculation:
number of clients x files stored during each transaction
x log space needed for each file
3.5 + 16 = 19.5 GB
3.5 x 3 = 10.5 GB
10.5 + 48 = 58.5 GB
1
The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that does not use deduplication, 16 GB is the suggested minimum size for
an active log. The suggested minimum size for an archive log in a production environment that does not use
deduplication is 48 GB. If you substitute values from your environment and the results are larger than 16 GB and 48
GB, use your results to size the active log and archive log.
Example: Estimating active and archive log sizes for clients that use multiple
sessions:
If the client option RESOURCEUTILIZATION is set to a value that is greater than the
default, the concurrent workload for the server increases.
To determine the sizes of the active and archive logs when clients use multiple
sessions, use the following calculation:
number of clients x sessions for each client x files stored
during each transaction x log space needed for each file
10.5 + 16 = 26.5 GB
35 + 16 = 51 GB
1 1
Archive log: Suggested size 79.5 GB 153 GB Because of the requirement to be able to store archive logs
across three server-database backup cycles, the estimate for
the active log is multiplied by 3:
10.5 x 3 = 31.5 GB
35 x 3 = 105 GB
31.5 + 48 = 79.5 GB
105 + 48 = 153 GB
1
The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that does not use deduplication, 16 GB is the suggested minimum size for
an active log. The suggested minimum size for an archive log in a production environment that does not use
deduplication is 48 GB. If you substitute values from your environment and the results are larger than 16 GB and 48
GB, use your results to size the active log and archive log.
Example: Estimating active and archive log sizes for simultaneous write
operations:
If client backup operations use storage pools that are configured for simultaneous
write, the amount of log space that is required for each file increases.
The log space that is required for each file increases by about 200 bytes for each
copy storage pool that is used for a simultaneous write operation. In the example
in the following table, data is stored to two copy storage pools in addition to a
primary storage pool. The estimated log size increases by 400 bytes for each file. If
you use the suggested value of 3053 bytes of log space for each file, the total
number of required bytes is 3453.
4 + 16 = 20 GB
1
Archive log: Suggested size 60 GB Because of the requirement to be able to store archive logs
across three server database-backup cycles, multiply the
estimate for the active log by 3 to estimate the archive log
requirement:
4 GB x 3 = 12 GB
12 + 48 = 60 GB
Example: Estimating active and archive log sizes for basic client store operations
and server operations:
For example, migration of files from the random-access (DISK) storage pool to a
sequential-access disk (FILE) storage pool uses approximately 110 bytes of log
space for each file that is migrated. For example, suppose that you have 300
backup-archive clients and each one of them backs up 100,000 files every night.
The files are initially stored on DISK and then migrated to a FILE storage pool. To
estimate the amount of active log space that is required for the data migration, use
the following calculation. The number of clients in the calculation represents the
maximum number of client nodes that back up, archive, or migrate files
concurrently at any time.
300 clients x 100,000 files for each client x 110 bytes = 3.1 GB
Add this value to the estimate for the size of the active log that calculated for basic
client store operations.
Example: Estimating active and archive log sizes under conditions of extreme
variation:
Problems with running out of active log space can occur if you have many
transactions that complete quickly and some transactions that take much longer to
complete. A typical case occurs when many workstation or file-server backup
sessions are active and a few very large database server-backup sessions are active.
If this situation applies to your environment, you might need to increase the size
of the active log so that the work completes successfully.
The IBM Spectrum Protect server deletes unnecessary files from the archive log
only when a full database backup occurs. Consequently, when you estimate the
space that is required for the archive log, you must also consider the frequency of
full database backups.
For example, if a full database backup occurs once a week, the archive log space
must be able to contain the information in the archive log for a full week.
The difference in archive log size for daily and full database backups is shown in
the example in the following table.
Table 8. Full database backups
Example
Item values Description
Maximum number of client nodes 300 The number of client nodes that back up, archive, or migrate
that back up, archive, or migrate files files every night.
concurrently at any time
Files stored during each transaction 4096 The default value of the server option TXNGROUPMAX is 4096.
Log space that is required for each 3453 bytes 3053 bytes for each file plus 200 bytes for each copy storage
file pool.
4 + 16 = 20 GB
1
Archive log: Suggested size with a 60 GB Because of the requirement to be able to store archive logs
full database backup every day across three backup cycles, multiply the estimate for the
active log by 3 to estimate the total archive log requirement:
4 GB x 3 = 12 GB
12 + 48 = 60 GB
(4 GB x 3 ) x 7 = 84 GB
84 + 48 = 132 GB
1
The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that does not use deduplication, 16 GB is the suggested minimum size for
an active log. The suggested starting size for an archive log in a production environment that does not use
deduplication is 48 GB. If you substitute values from your environment and the results are larger than 16 GB and 48
GB, use your results to size the active log and archive log.
Example: Estimating active and archive log sizes for data deduplication
operations:
If you deduplicate data, you must consider its effects on space requirements for
active and archive logs.
The following factors affect requirements for active and archive log space:
The amount of deduplicated data
The effect of data deduplication on the active log and archive log space
depends on the percentage of data that is eligible for deduplication. If the
percentage of data that can be deduplicated is relatively high, more log
space is required.
The size and number of extents
Approximately 1,500 bytes of active log space are required for each extent
that is identified by a duplicate-identification process. For example, if
250,000 extents are identified by a duplicate-identification process, the
estimated size of the active log is 358 MB:
250,000 extents identified during each process x 1,500 bytes
for each extent = 358 MB
50 + 16 = 66 GB
63.8 + 16 = 79.8 GB
1 1
Archive log: 198 GB 239.4 GB Multiply the estimated size of the active log by a factor of 3.
Suggested size
The following calculation was used for multiple transactions
and an 800 GB object:
50 GB x 3 = 150 GB
150 + 48 = 198 GB
63.8 GB x 3 = 191.4 GB
191.4 + 48 = 239.4 GB
55.6 + 16 = 71.6 GB
93.4 + 16 = 109.4 GB
1 1
Archive log: 214.8 GB 328.2 GB The estimated size of the active log multiplied by a factor of
Suggested size 3.
55.6 GB x 3 = 166.8 GB
166.8 + 48 = 214.8 GB
280.2 + 48 = 328.2 GB
1
The example values in this table are used only to illustrate how the sizes for active logs and archive logs are
calculated. In a production environment that uses deduplication, 32 GB is the suggested minimum size for an active
log. The suggested minimum size for an archive log in a production environment that uses deduplication is 96 GB.
If you substitute values from your environment and the results are larger than 32 GB and 96 GB, use your results to
size the active log and archive log.
Creating a log mirror is a suggested option. If you increase the size of the active
log, the log mirror size is increased automatically. Mirroring the log can affect
performance because of the doubled I/O activity that is required to maintain the
mirror. The additional space that the log mirror requires is another factor to
consider when deciding whether to create a log mirror.
If the mirror log directory becomes full, the server issues error messages to the
activity log and to the db2diag.log. Server activity continues.
Specifying an archive failover log directory can prevent problems that occur if the
archive log runs out of space. If both the archive log directory and the drive or file
system where the archive failover log directory is located become full, the data
remains in the active log directory. This condition can cause the active log to fill
up, which causes the server to halt.
Active log
If the amount of available active log space is too low, the following messages are
displayed in the activity log:
ANR4531I: IC_AUTOBACKUP_LOG_USED_SINCE_LAST_BACKUP_TRIGGER
This message is displayed when the active log space exceeds the maximum
specified size. The IBM Spectrum Protect server starts a full database
backup.
To change the maximum log size, halt the server. Open the dsmserv.opt
file, and specify a new value for the ACTIVELOGSIZE option. When you are
finished, restart the server.
ANR0297I: IC_BACKUP_NEEDED_LOG_USED_SINCE_LAST_BACKUP
This message is displayed when the active log space exceeds the maximum
specified size. You must back up the database manually.
To change the maximum log size, halt the server. Open the dsmserv.opt
file, and specify a new value for the ACTIVELOGSIZE option. When you are
finished, restart the server.
ANR4529I: IC_AUTOBACKUP_LOG_UTILIZATION_TRIGGER
The ratio of used active-log space to available active-log space exceeds the
log utilization threshold. If at least one full database backup has occurred,
the IBM Spectrum Protect server starts an incremental database backup.
Otherwise, the server starts a full database backup.
ANR0295I: IC_BACKUP_NEEDED_LOG_UTILIZATION
The ratio of used active-log space to available active-log space exceeds the
log utilization threshold. You must back up the database manually.
Archive log
If the amount of available archive log space is too low, the following message is
displayed in the activity log:
ANR0299I: IC_BACKUP_NEEDED_ARCHLOG_USED
The ratio of used archive-log space to available archive-log space exceeds
the log utilization threshold. The IBM Spectrum Protect server starts a full
automatic database backup.
Database
If the amount of space available for database activities is too low, the following
messages are displayed in the activity log:
ANR2992W: IC_LOG_FILE_SYSTEM_UTILIZATION_WARNING_2
The used database space exceeds the threshold for database space
utilization. To increase the space for the database, use the EXTEND DBSPACE
command, the EXTEND DBSPACE command, or the DSMSERV FORMAT
utility with the DBDIR parameter.
ANR1546W: FILESYSTEM_DBPATH_LESS_1GB
The available space in the directory where the server database files are
located is less than 1 GB.
When an IBM Spectrum Protect server is created with the DSMSERV
FORMAT utility or with the configuration wizard, a server database and
recovery log are also created. In addition, files are created to hold database
information used by the database manager. The path specified in this
message indicates the location of the database information used by the
database manager. If space is unavailable in the path, the server can no
longer function.
You must add space to the file system or make space available on the file
system or disk.
To delete the files that are no longer needed, use either the installation graphical
wizard or the command line in console mode.
Procedure
1. Open IBM Installation Manager.
2. Click File > Preferences.
3. Select Files for Rollback.
4. Click Delete Saved Files and click OK.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the
following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command to start an IBM
Installation Manager command line:
imcl.exe -c
3. Enter P to select Preferences.
4. Enter 3 to select Files for Rollback.
5. Enter D to Delete the Files for Rollback.
6. Enter A to Apply Changes and Return to Preferences Menu.
7. Enter C to leave the Preference Menu.
8. Enter X to Exit Installation Manager.
Instance user ID
The instance user ID is used as the basis for other names related to the server
instance. The instance user ID is also called the instance owner.
The instance user ID is the user ID that must have ownership or read/write access
authority to all directories that you create for the database and the recovery log.
The standard way to run the server is under the instance user ID. That user ID
must also have read/write access to the directories that are used for any FILE
device classes.
Instance directory
The instance directory is a directory that contains files specifically for a server
instance (the server options file and other server-specific files). It can have any
name that you want. For easier identification, use a name that ties the directory to
the instance name.
You can use a name that includes the name of the server instance as it
appears (or will appear) in the registry. Default server instance names have
the form Serverx.
For example: C:\tsm\server1
The instance directory stores the following files for the server instance:
v The server options file, dsmserv.opt
v The server key database file, cert.kdb, and the .arm files (used by clients
and other servers to import the Secure Sockets Layer certificates of the
server)
v Device configuration file, if the DEVCONFIG server option does not specify
a fully qualified name
v Volume history file, if the VOLUMEHISTORY server option does not specify a
fully qualified name
v Volumes for DEVTYPE=FILE storage pools, if the directory for the
device class is not fully specified, or not fully qualified
v User exits
v Trace output (if not fully qualified)
Database name
The database name is always TSMDB1, for every server instance. This name cannot
be changed.
Server name
The server name is an internal name for IBM Spectrum Protect, and is used for
operations that involve communication among multiple IBM Spectrum Protect
servers. Examples include server-to-server communication and library sharing.
The server name is also used when you add the server to the Operations Center so
that it can be managed using that interface. Use a unique name for each server. For
easy identification in the Operations Center (or from a QUERY SERVER command),
use a name that reflects the location or purpose of the server. Do not change the
name of an IBM Spectrum Protect server after it is configured as a hub or spoke
server.
If you use the wizard, the default name that is suggested is the host name of the
system that you are using. You can use a different name that is meaningful in your
environment. If you have more than one server on the system and you use the
wizard, you can use the default name for only one of the servers. You must enter a
unique name for each server.
For example,
TUCSON_SERVER1
TUCSON_SERVER2
The directories can be named according to local practices. For easier identification,
consider using names that tie the directories to the server instance.
Installation directories
Installation directories for the IBM Spectrum Protect server include the server, DB2,
device, language, and other directories. Each one contains several additional
directories.
The DB2 product that is installed as part of the installation of the IBM Spectrum
Protect server has the directory structure as documented in DB2 information
sources. Protect these directories and files as you do the server directories. The
default directory is /opt/tivoli/tsm/db2.
You can use US English, German, French, Italian, Spanish, Brazilian Portuguese,
Korean, Japanese, traditional Chinese, simplified Chinese, Chinese GBK, Chinese
Big5, and Russian.
Tip: The database (DB2), the Global Security Kit (GSKit) and IBM Java Runtime
Environment (JRE) are automatically installed when you select the server
component.
v server languages
v license
v devices
v IBM Spectrum Protect for SAN
v Operations Center
Procedure
1. Download the appropriate package file from one of the following websites.
v Download the server package from Passport Advantage or Fix Central.
v For the latest information, updates, and maintenance fixes, go to the IBM
Support Portal.
2. If you downloaded the package from an IBM download site, complete the
following steps:
a. Verify that you have enough space to store the installation files when they
are extracted from the product package. See the download document for the
space requirements:
v IBM Spectrum Protect technote 4042944
v IBM Spectrum Protect Extended Edition technote 4042945
v IBM Spectrum Protect for Data Retention technote 4042946
b. Change to the directory where you placed the executable file.
Important: In the next step, the files are extracted to the current directory.
The path must contain no more than 128 characters. Be sure to extract the
installation files to an empty directory. Do not extract to a directory that
contains previously extracted files, or any other files.
c. Either double-click the executable file, or enter the following command on
the command line to extract the installation files. The files are extracted to
the current directory.
package_name.exe
| where package_name is like this example: 8.1.x.000-IBM-SPSRV-
| WindowsX64.exe
3. Select one of the following methods of installing IBM Spectrum Protect:
v “Installing IBM Spectrum Protect by using the installation wizard”
v “Installing IBM Spectrum Protect by using console mode” on page 47
v “Installing IBM Spectrum Protect in silent mode” on page 48
4. After you install IBM Spectrum Protect, and before you customize it for your
use, go to the IBM Support Portal. Click Support and downloads and apply
any applicable fixes.
Procedure
Option Description
Installing the software from a downloaded 1. Change to the directory where you
package: downloaded the package.
2. Start the installation wizard by issuing
the following command:
install.bat
Or, in the directory where the installation
files were extracted, double-click the
install.bat file.
What to do next
v If errors occur during the installation process, the errors are recorded in log files
that are stored in the IBM Installation Manager logs directory.
You can view installation log files by clicking File > View Log from the
Installation Manager tool. To collect these log files, click Help > Export Data for
Problem Analysis from the Installation Manager tool.
v After you install the server and components, and before you customize it for
your use, go to the IBM Support Portal. Click Downloads (fixes and PTFs) and
apply any applicable fixes.
v After you install a new server, review Taking the first steps after you install IBM
Spectrum Protect to learn about configuring your server.
v If a native device driver is available on Windows for the tape drives or medium
changers that you plan to use, use the native device driver. If a native device
driver is not available on Windows for the tape drives or medium changers that
you plan to use, install the IBM Spectrum Protect device driver by issuing the
dpinst.exe /a command. The dpinst.exe file is in the device driver directory.
The default directory is C:\Program Files\Tivoli\TSM\device\drivers.
Procedure
Option Description
Installing the software from a downloaded 1. Change to the directory where you
package: downloaded the package.
2. Start the installation wizard in console
mode by issuing the following
command:
install.bat -c
What to do next
v If errors occur during the installation process, the errors are recorded in log files
that are stored in the IBM Installation Manager logs directory, for example:
C:\ProgramData\IBM\Installation Manager\logs
v After you install the server and components, and before you customize it for
your use, go to the IBM Support Portal. Click Downloads (fixes and PTFs) and
apply any applicable fixes.
v After you install a new server, review Taking the first steps after you install IBM
Spectrum Protect to learn about configuring your server.
v If a native device driver is available on Windows for the tape drives or medium
changers that you plan to use, use the native device driver. If a native device
driver is not available on Windows for the tape drives or medium changers that
you plan to use, install the IBM Spectrum Protect device driver by issuing the
dpinst.exe /a command. The dpinst.exe file is in the device driver directory.
The default directory is C:\Program Files\Tivoli\TSM\device\drivers.
These files contain default values that can help you avoid any unnecessary
warnings. To use these files, follow the instructions that are provided in the files.
If you want to customize a response file, you can modify the options that are in
the file. For information about response files, see Response files.
Procedure
1. Create a response file. You can modify the sample response file or create your
own file.
2. If you install the server and Operations Center in silent mode, create a
password for the Operations Center truststore in the response file.
If you are using the install_response_sample.xml file, add the password in the
following line of the file, where mypassword represents the password:
<variable name=’ssl.password’ value=’mypassword’ />
Tip: To upgrade the Operations Center, the truststore password is not required
if you are using the update_response_sample.xml file.
3. Start the silent installation by issuing the following command from the
directory where the installation package is extracted. The value response_file
represents the response file path and file name:
v install.bat -s -input response_file -acceptLicense
What to do next
v If errors occur during the installation process, the errors are recorded in log files
that are stored in the IBM Installation Manager logs directory, for example:
C:\ProgramData\IBM\Installation Manager\logs
v After you install the server and components, and before you customize it for
your use, go to the IBM Support Portal. Click Downloads (fixes and PTFs) and
apply any applicable fixes.
v After you install a new server, review Taking the first steps after you install IBM
Spectrum Protect to learn about configuring your server.
v If a native device driver is available on Windows for the tape drives or medium
changers that you plan to use, use the native device driver. If a native device
driver is not available on Windows for the tape drives or medium changers that
you plan to use, install the IBM Spectrum Protect device driver by issuing the
dpinst.exe /a command. The dpinst.exe file is in the device driver directory.
The default directory is C:\Program Files\Tivoli\TSM\device\drivers.
For instructions on installing storage agent language packages, see Language pack
configuration for storage agents.
This language package is automatically installed for the following default language
option for server messages and help: LANGUAGE AMENG.
For languages or locales other than the default, install the language package that
your installation requires.
Restriction: For Operations Center users, some characters might not be displayed
properly if the web browser does not use the same language as the server. If this
problem occurs, set the browser to use the same language as the server.
Set the LANGUAGE option in the server options file to the name of the locale that you
want to use. For example: to use the ita locale, set the LANGUAGE option to ita. See
“Server language locales” on page 49.
If the locale is successfully initialized, it formats the date, time, and number for the
server. If the locale is not successfully initialized, the server uses the US English
message files and the date, time, and number format.
You can install another language package within the same IBM Spectrum Protect
instance.
v Use the Modify function of IBM Installation Manager to install another language
package.
v Use the Update function of IBM Installation Manager to update to newer
versions of the language packages.
Tip: In IBM Installation Manager, the term update means to discover and install
updates and fixes to installed software packages. In this context, update and upgrade
are synonymous.
Review the information about planning space for the server before you complete
this task. See “Worksheets for planning details for the server” on page 23.
Procedure
1. Create the user ID that will own the server instance. You use this user ID when
you create the server instance in a later step.
Create a user ID that will be the owner of the IBM Spectrum Protect
server instance. A user ID can own more than one IBM Spectrum
Protect server instance. Identify the user account that will own the
server instance.
When the server is started as a Windows service, this account is the
one that the service will log on to. The user account must have
administrative authority on the system. One user account can own
more than one server instance.
If you have multiple servers on one system and want to run each
server with a different user account, create a new user account in this
step.
Create the user ID.
In the user ID, only lowercase letters (a-z), numerals (0-9), and the
underscore character ( _ ) can be used. The user ID must be 30
characters or less, and cannot start with ibm, sql, sys, or a numeral. The
user ID and group name cannot be user, admin, guest, public, local, or
any SQL reserved word.
a. Use the following operating system command to create the user ID:
net user user_ID * /add
You are prompted to create and verify a password for the new user
ID.
b. Issue the following operating system commands to add the new
user ID to the Administrators groups:
net localgroup Administrators user_ID /add
net localgroup DB2ADMNS user_ID /add
2. Create directories that the server requires.
Create empty directories for each item in the table and ensure that the new user ID you just
created has read/write permission to the directories. The database, archive log, and active
log must reside on different physical volumes.
Example commands for
Item creating the directories Your directories
The instance directory for mkdir d:\tsm\server1
the server, which is a
directory that will
contain files specifically
for this server instance
(the server options file
and other server-specific
files)
The database directories mkdir d:\tsm\db001
mkdir e:\tsm\db002
mkdir f:\tsm\db003
mkdir g:\tsm\db004
Active log directory mkdir h:\tsm\log
Archive log directory mkdir i:\tsm\archlog
Optional: Directory for mkdir j:\tsm\logmirror
the log mirror for the
active log
Create empty directories for each item in the table and ensure that the new user ID you just
created has read/write permission to the directories. The database, archive log, and active
log must reside on different physical volumes.
Example commands for
Item creating the directories Your directories
Optional: Secondary mkdir k:\tsm\archlogfailover
archive log directory
(failover location for
archive log)
When a server is initially created by using the DSMSERV FORMAT utility or the
configuration wizard, a server database and recovery log are created. In
addition, files are created to hold database information that is used by the
database manager.
3. Log off the new user ID.
Chapter 3. Taking the first steps after you install Version 8.1.2 53
Installing the IBM Spectrum Protect server
Procedure
1. Ensure that the following requirements are met:
v Ensure that the following requirements are met:
a. Click Start > Administrative Tools > Services.
b. In the Services window, select the Remote Registry service if it is not
started, and click Start.
v Ensure ports 137, 139 and 445 are not blocked by a firewall:
a. Click Start > Control Panel > Windows Firewall.
b. Select Advanced Settings.
c. Select Inbound Rules in the left pane.
d. Select New Rule in the right pane.
e. Create a port rule for TCP ports 137, 139 and 445 to allow connections for
domain and private networks.
v Configure User Account Control:
Access all three of the user account control configuration settings by first
accessing Local Security Policy Security options, by using the following
steps:
a. Enable the built-in Administrator account:
– Select the Accounts: Administrator account status.
– Select Enable and click OK.
b. Disable User Account Control for all Windows administrators:
– Select the User Account Control: Run all administrators in Admin
Approval Mode.
– Select Disable and click OK.
c. Disable User Account Controll for the built-in Administrator account:
– Select the User Account Control: Admin Approval Mode for the
Built-in Administrator Account.
– Select Disable and click OK.
v Restart the server before you proceed with the Configuration wizard.
You must configure the User Account Control feature before you run the wizard.
Tip: Ensure that the Remote Registry in Windows Services is started, and ports
445, 137, and 139 are unblocked in the firewall.
Procedure
If the system is running on Windows, complete the following steps to disable User
Account Control:
1. The built-in Administrator account must be enabled. To enable the built-in
administrator account, click Control Panel > Administrative Tools > Local
Security Policy. Then, under Security Settings, double-click Local Policies.
Double-click Security Options. Double-click the Accounts: Administrator
account status section. Select Enable and click OK.
2. User Account Control must be disabled for all windows administrators. To
disable User Account Control for administrators, click Control Panel >
Administrative Tools > Local Security Policy. Then, under Security Settings,
double-click Local Policies. Double-click Security Options. Double-click the
User Account Control: Run all administrators in Admin Approval Mode
section. Select Disable and click OK.
3. User Account Control must be disabled for the built-in Administrator account.
To disable User Account Control for administrators, click Control Panel >
Administrative Tools > Local Security Policy. Then, under Security Settings,
double-click Local Policies. Double-click Security Options. Double-click the
User Account Control: Admin Appoval Mode for the Built-in Administrator
Account section. Select Disable and click OK.
Chapter 3. Taking the first steps after you install Version 8.1.2 55
Installing the IBM Spectrum Protect server
Important: Before you run the db2icrt command, ensure that the user and the
instance directory of the user exists. If there is no instance directory, you must
create it.
The instance directory stores the following files for the server instance:
v The server options file, dsmserv.opt
v The server key database file, cert.kdb, and the .arm files (used by clients and
other servers to import the Secure Sockets Layer certificates of the server)
v Device configuration file, if the DEVCONFIG server option does not specify a fully
qualified name
v Volume history file, if the VOLUMEHISTORY server option does not specify a fully
qualified name
v Volumes for DEVTYPE=FILE storage pools, if the directory for the device class
is not fully specified, or not fully qualified
v User exits
v Trace output (if not fully qualified)
1. Log in as an administrator and create an IBM Spectrum Protect instance, by
using the db2icrt command. Enter the following command on one line. The
user account that you specify becomes the user ID that owns the Version 8.1.2
server (the instance user ID).
db2icrt -u user_account instance_name
For example, if the user account is tsminst1 and the server instance is Server1,
enter the following command:
db2icrt -u tsminst1 server1
You are prompted for the password for user ID tsminst1. Later, when you create
and format the database, you use the instance name that you specified with
this command, with the -k option.
2. Change the default path for the database to be the drive where the instance
directory for the server is located. Complete the following steps:
a. Click Start > Programs > IBM DB2 > DB2TSM1 > Command Line Tools >
Command Line Processor.
b. Enter quit to exit the command line processor.
A window with a command prompt should now be open, with the
environment properly set up to successfully issue the commands in the next
steps.
c. From the command prompt in that window, issue the following command
to set the environment variable for the server instance that you are working
with:
set db2instance=instance_name
The instance_name is the same as the instance name that you specified when
you issued the db2icrt command. For example, to set the environment
variable for the Server1 server instance, issue the following command:
set db2instance=server1
d. Issue the command to set the default drive:
db2 update dbm cfg using dftdbpath instance_location
Set these server options before you start the server. When you start the server, the
new options go into effect. If you modify any server options after starting the
server, you must stop and restart the server to activate the updated options.
Review the server options file (dsmserv.opt.smp) that is located in the server
instance directory to view and specify server communications options. By default,
the server uses the TCP/IP and Named Pipes communication methods.
Tip: If you start the server console and see warning messages that a protocol could
not be used by the server, either the protocol is not installed or the settings do not
match the Windows protocol settings.
For a client to use a protocol that is enabled on the server, the client options file
must contain corresponding values for communication options. In the server
options file, you can view the values for each protocol.
Tip: You can authenticate passwords with the LDAP directory server, or
authenticate passwords with the server. Passwords that are authenticated with
the LDAP directory server can provide enhanced system security.
Select from a range of TCP/IP options for the IBM Spectrum Protect server or
retain the default.
The following is an example of a list of TCP/IP options that you can use to set up
your system.
Chapter 3. Taking the first steps after you install Version 8.1.2 57
Installing the IBM Spectrum Protect server
commmethod tcpip
tcpport 1500
tcpwindowsize 0
tcpnodelay yes
The Named Pipes communication method is ideal when running the server and
client on the same Windows machine. Named Pipes require no special
configuration.
COMMMETHOD can be used multiple times in the IBM Spectrum Protect server options
file, with a different value each time. For example, the following example is
possible:
commmethod tcpip
commmethod namedpipe
You can add more protection for your data and passwords by using Secure Sockets
Layer (SSL).
SSL is the standard technology for creating encrypted sessions between servers and
clients. SSL provides a secure channel for servers and clients to communicate over
open communication paths. With SSL, the identity of the server is verified through
the use of digital certificates.
To ensure better system performance, use SSL only for sessions when it is needed.
Consider adding additional processor resources on the IBM Spectrum Protect
server to manage the increased requirements.
Chapter 3. Taking the first steps after you install Version 8.1.2 59
Installing the IBM Spectrum Protect server
After you set up server communications, you are ready to initialize the database.
Ensure that you log in by using the instance user ID. Do not place the directories
on file systems that might run out of space. If certain directories (for example, the
archive log) become unavailable or full, the server stops. See Capacity planning for
more details.
For optimal performance and to facilitate I/O, specify at least two equally sized
containers or Logical Unit Numbers (LUNs) for the database. In addition, each
active log and archive log needs its own container or LUN.
Important: The installation program creates a set of registry keys. One of these
keys points to the directory where a default server, named SERVER1, is created. To
install an additional server, create a directory and use the DSMSERV FORMAT utility,
with the -k parameter, from that directory. That directory becomes the location of
the server. The registry tracks the installed servers.
Set the DB2NOEXITLIST registry variable to ON for each server instance. Log on to the
system as the server instance owner and issue this command:
db2set -i server_instance_name DB2NOEXITLIST=ON
For example:
db2set -i server1 DB2NOEXITLIST=ON
Use the DSMSERV FORMAT utility to initialize a server instance. For example, if the
server instance directory is /tsminst1, issue the following commands:
cd \tsminst1
dsmserv -k server2 format dbdir=d:\tsm\db001 activelogsize=32768
activelogdirectory=e:\tsm\activelog archlogdirectory=f:\tsm\archlog
archfailoverlogdirectory=g:\tsm\archfaillog mirrorlogdirectory=h:\tsm\mirrorlog
Tip: If you specify multiple directories, ensure that the underlying file systems are
of equal size to ensure a consistent degree of parallelism for database operations. If
one or more directories for the database are smaller than the others, they reduce
the potential for optimized parallel prefetching and distribution of the database.
Related information:
DSMSERV FORMAT (Format the database and log)
If you use the configuration wizard to create an IBM Spectrum Protect server
instance, you do not have to complete these steps. If you are configuring an
instance manually, complete the following steps before you issue either the BACKUP
DB or the RESTORE DB commands.
Attention: If the database is unusable, the entire IBM Spectrum Protect server is
unavailable. If a database is lost and cannot be recovered, it might be difficult or
impossible to recover data that is managed by that server. Therefore, it is critically
important to back up the database.
Restriction: Database backup and restore over shared memory are not available on
Windows systems.
In the following commands, the examples use server1 for the database instance
and d:\tsmserver1 for the IBM Spectrum Protect server directory. Replace these
values with your actual values in the commands.
1. Create a file that is called tsmdbmgr.env in the d:\tsmserver1 directory with the
following contents:
DSMI_CONFIG=server_instance_directory\tsmdbmgr.opt
DSMI_LOG=server_instance_directory
2. Set the DSMI_ api environment-variable configuration for the database instance:
a. Open a DB2 command window. One method is to go to the C:\Program
Files\Tivoli\TSM\db2\bin directory, or if you installed IBM Spectrum
Protect in a different location, go to the db2\bin subdirectory in your main
installation directory. Then, issue this command:
db2cmd
b. Issue this command:
db2set -i server1 DB2_VENDOR_INI=d:\tsmserver1\tsmdbmgr.env
3. Create a file that is called tsmdbmgr.opt in the d:\tsmserver1 directory with the
following contents:
*************************************************
nodename $$_TSMDBMGR_$$
commmethod tcpip
tcpserveraddr localhost
tcpport 1500
passwordaccess generate
errorlogname d:\tsmserver1\tsmdbmgr.log
where
v nodename specifies the node name the client API uses to connect to the server
during a database backup. This value must be $$_TSMDBMGR_$$ for database
backup to work.
v commethod specifies the client API used to contact the server for database
backup.
v tcpserveraddr specifies the server address that the client API uses to contact
the server for database backup. To ensure that the database can be backed
up, this value must be localhost.
Chapter 3. Taking the first steps after you install Version 8.1.2 61
Installing the IBM Spectrum Protect server
v tcpport specifies the port number that the client API uses to contact the server
for database backup. Ensure that you enter the same tcpport value that is
specified in the dsmserv.opt server options file.
v passwordaccess is required for the backup node to connect to the server on
windows systems.
v errorlogname specifies the error log where the client API logs errors that are
encountered during a database backup. This log is typically in the server
instance directory. However, this log can be placed in any location where the
instance user ID has write-permission.
Table and index reorganization requires significant processor resources, active log
space, and archive log space. Because database backup takes precedence over
reorganization, select the time and duration for reorganization to ensure that the
processes do not overlap and reorganization can complete.
You can optimize index and table reorganization for the server database. In this
way, you can help to avoid unexpected database growth and performance issues.
For instructions, see technote 1683633.
If you update these server options while the server is running, you must stop and
restart the server before the updated values take effect.
Procedure
1. Modify the server options.
Edit the server options file, dsmserv.opt, in the server instance directory by
using a text editor. Follow these guidelines when you edit the server options
file:
v To enable an option, remove the asterisk at the beginning of the line.
v Enter an option on any line.
v Enter only one option per line. The entire option with its value must be on
one line.
v If you have multiple entries for an option in the file, the server uses the last
entry.
To view available server options, see the sample file, dsmserv.opt.smp, in the
c:\Program Files\Tivoli\TSM directory.
2. If you plan to use data deduplication, enable the ALLOWREORGINDEX server
option. Add the following option and value to the server options file:
allowreorgindex yes
3. Set the REORGBEGINTIME and REORGDURATION server options to control when
reorganization starts and how long it runs. Select a time and duration so that
reorganization runs when you expect that the server is least busy. These server
options control both table and index reorganization processes.
a. Set the time for reorganization to start by using the REORGBEGINTIME server
option. Specify the time by using the 24-hour system. For example, to set
the start time for reorganization as 8:30 p.m., specify the following option
and value in the server options file:
reorgbegintime 20:30
b. Set the interval during which the server can start reorganization. For
example, to specify that the server can start reorganization for four hours
after the time set by the REORGBEGINTIME server option, specify the following
option and value in the server options file:
reorgduration 4
4. If the server was running while you updated the server options file, stop and
restart the server.
Related information:
ALLOWREORGINDEX
ALLOWREORGTABLE
REORGBEGINTIME
REORGDURATION
Chapter 3. Taking the first steps after you install Version 8.1.2 63
Installing the IBM Spectrum Protect server
Procedure
Option Description
Starting the server as a Windows service
To start the server as a Windows service,
take one of the following actions:
v If you configured the server by using the
configuration wizard, complete the
following steps:
1. Configure the server to start as a
Windows service by following the
instructions in “Configuring the server
to start as a Windows service.”
2. Start the server by following the
instructions in “Starting the server as a
Windows service” on page 65.
v If you did not use the configuration
wizard, create and configure the Windows
service by following the instructions in
“Manually creating and configuring a
Windows service” on page 66.
Starting the server in the foreground To start the server in the foreground, follow
the instructions in “Starting the server in the
foreground” on page 67.
Starting the server in maintenance mode To start the server in maintenance mode,
follow the instructions in “Starting the
server in maintenance mode” on page 67.
A Windows service must be created. If you configured the server by using the
configuration wizard, a Windows service was created automatically. In that case,
use this procedure to configure the server to start as a Windows service.
If you did not use a wizard, you must create and configure the Windows service
manually by following the steps in “Manually creating and configuring a Windows
service” on page 66.
Procedure
1. From the Windows Start menu, click Run, type services.msc, and click OK.
2. In the Services window, select the server instance that you want to start as a
service, and click Properties. For example, select TSM INST1, and click
Properties.
3. To ensure that the server service starts automatically, click the General tab.
From the Startup type list, select Automatic.
4. To set the user for starting the server service, click the Log On tab, and take
one of the following actions:
v If you plan to run the server service under the Local System account, select
Local System account and click OK.
v If you plan to run the server service under the instance user ID, take the
following actions:
a. Select This account, and browse for the user ID that owns the server DB2
instance and has permissions for starting the server.
b. In the Select User window, in the Enter the object name to select field,
enter the user ID.
c. Click Check Names.
d. Click OK twice.
5. If you configured the server service to run under the Local System account,
grant database access to the Local System account:
a. Log on with the user ID that was used to create the server database. This
user ID is the user ID that was used to run the DSMSERV FORMAT utility to
initialize the server database. Alternatively, if you configured the server
with the dsmicfgx configuration wizard, this user ID is the user ID that was
used to create the instance.
| b. Open a DB2 command window. If the server is installed on Windows Server
| 2012, open the Start window, and click DB2 Command Window -
| Administrator.
c. In the DB2 command window, enter the following commands:
set DB2INSTANCE=server1
db2 connect to TSMDB1
db2 grant dbadm with dataaccess with accessctrl on database to user system
db2 grant secadm on database to user system
Tip: When the server service is configured to run under the Local System
account, the database can be accessed by any administrator on the system.
In addition, any administrator who can log on to the system can run the
server.
What to do next
To start the service, follow the instructions in “Starting the server as a Windows
service.”
A Windows service must be created. The service was created automatically if you
configured the server by using the configuration wizard. If the service was created
automatically, you must configure the server to start as a service by following the
steps in “Configuring the server to start as a Windows service” on page 64. Then,
use this procedure to start the server as a service.
If you did not use the configuration wizard to create the service, you must create
and configure the service manually. Follow the steps in “Manually creating and
configuring a Windows service” on page 66.
Chapter 3. Taking the first steps after you install Version 8.1.2 65
Installing the IBM Spectrum Protect server
Procedure
What to do next
Because the server service can issue requests that require action, it is important to
monitor server activity with the Operations Center or the administrative client.
To view start and stop completion messages that are logged in the Windows
application log, use the Event Viewer tool in the Administrative Tools folder.
To complete this procedure, you must log on with a user ID that is in the
Administrators group.
Procedure
To create a Windows service and configure the startup options for the service,
complete the following step:
where:
server_name
Specifies the name of the server service.
path_to_server
Specifies the path to the dsmsvc.exe executable file, including the file
name. This path is the default path:
C:\Program Files\Tivoli\TSM\server
instance_name
Specifies the name of the DB2 instance, which is also the name of the
server instance, for example, Server1.
start_type
Specifies the method for starting the service. To automatically start the
service, enter auto. If you specify the auto option, the service starts
automatically at system startup and restarts automatically whenever the
system is restarted. To manually start the service, enter demand.
account_name
Specifies the user ID for the account under which the service runs. For
Tip: When you enter the command, ensure that you enter a space after each equal
sign (=).
Results
Procedure
1. Change to the directory where the server is installed. For example, change to
the c:\program files\tivoli\tsm\server directory.
2. Enter the following command:
dsmserv -k instance_name
Tips:
v You do not have to edit the server options file, dsmserv.opt, to start the server in
maintenance mode.
v While the server is running in maintenance mode, you can manually start the
storage-space reclamation, inventory expiration, and storage-pool migration
processes.
Chapter 3. Taking the first steps after you install Version 8.1.2 67
Installing the IBM Spectrum Protect server
Procedure
Tip: To view a video about starting the server in maintenance mode, see Starting a
server in maintenance mode.
What to do next
To stop the server, issue the following command from the IBM Spectrum Protect
command line:
halt
Registering licenses
Immediately register any IBM Spectrum Protect licensed functions that you
purchase so you do not lose any data after you start server operations, such as
backing up your data.
Complete the following steps to set up your system for database backups.
Procedure
1. If you did not use the configuration wizard (dsmicfgx) to configure the server,
ensure that you have completed the steps to manually configure the system for
database backups.
2. Select the device class to be used for backups of the database. Issue the
following command from an IBM Spectrum Protect administrative command
line.
set dbrecovery device_class_name
The device class that you specify is used by the database manager for database
backups. If you do not specify a device class with the SET DBRECOVERY
command, the backup fails.
Example
For example, to specify that the DBBACK device class is to be used, issue this
command:
set dbrecovery dbback
Multiply the memory and other system requirements for one server by the number
of instances planned for the system.
The set of files for one instance of the server is stored separately from the files
used by another server instance on the same system. Use the steps in “Creating the
server instance” on page 56 for each new instance, optionally creating the new
instance user.
To manage the system memory that is used by each server, use the DBMEMPERCENT
server option to limit the percentage of system memory. If all servers are equally
important, use the same value for each server. If one server is a production server
and other servers are test servers, set the value for the production server to a
higher value than the test servers.
You can upgrade directly from either V6.3 to V7.1. See the upgrade section
(Chapter 5, “Upgrading to V8.1,” on page 79) for more details. When you upgrade
and have multiple servers on your system, you must run the installation wizard
only once. The installation wizard collects the database and variables information
for all of your original server instances.
If you upgrade from IBM Spectrum Protect V6.3 to V8.1.2 and have multiple
servers on your system, all instances that exist in DB2 V9.7 are dropped and
recreated in DB2 V11.1. The wizard issues the db2 upgrade db dbname command
for each database. The database environment variables for each instance on your
system are also reconfigured during the upgrade process.
Chapter 3. Taking the first steps after you install Version 8.1.2 69
Installing the IBM Spectrum Protect server
A typical IBM Spectrum Protect installation involves one server instance on the
IBM Spectrum Protect server computer. You might want to install a second instance
if you are configuring in a clustered environment. You might also want to run
more than one server on a large computer if you have multiple tape libraries or a
disk-only configuration. After you install and configure the first IBM Spectrum
Protect server, use the Server Initialization wizard to create additional IBM
Spectrum Protect server instances on the same computer.
By using the Server Initialization wizard, you can install up to four IBM Spectrum
Protect server instances on a single system or cluster.
Related tasks:
Running multiple server instances on a single system (V7.1.1)
Procedure
1. Monitor the active log to ensure that the size is correct for the workload that is
handled by the server instance.
When the server workload reaches its typical expected level, the space that is
used by the active log is 80% - 90% of the space that is available to the active
log directory. At that point, you might need to increase the amount of space.
Whether you must increase the space depends on the types of transactions in
the server workload. Transaction characteristics affect how the active log space
is used.
The following transaction characteristics can affect the space usage in the active
log:
v The number and size of files in backup operations
– Clients such as file servers that back up large numbers of small files can
cause large numbers of transactions that are completed quickly. The
transactions might use a large amount of space in the active log, but for a
short time.
– Clients such as a mail server or a database server that back up large
amounts of data in few transactions can cause small numbers of
transactions that take a long time to complete. The transactions might use
a small amount of space in the active log, but for a long time.
v Network connection types
– Backup operations that occur over fast network connections cause
transactions that complete more quickly. The transactions use space in the
active log for a shorter time.
– Backup operations that occur over relatively slower connections cause
transactions that take a longer time to complete. The transactions use
space in the active log for a longer time.
If the server is handling transactions with a wide variety of characteristics, the
space that is used for the active log might increase and decrease significantly
over time. For such a server, you might need to ensure that the active log
typically has a smaller percentage of its space used. The extra space allows the
active log to grow for transactions that take a long time to complete.
2. Monitor the archive log to ensure that space is always available.
Remember: If the archive log becomes full, and the failover archive log
becomes full, the active log can become full, and the server stops. The goal is to
make enough space available to the archive log so that it never uses all its
available space.
You are likely to notice the following pattern:
a. Initially, the archive log grows rapidly as typical client-backup operations
occur.
b. Database backups occur regularly, either as scheduled or done manually.
c. After at least two full database backups occur, log pruning occurs
automatically. The space that is used by the archive log decreases when the
pruning occurs.
d. Normal client operations continue, and the archive log grows again.
e. Database backups occur regularly, and log pruning occurs as often as full
database backups occur.
With this pattern, the archive log grows initially, decreases, and then might
grow again. Over time, as normal operations continue, the amount of space
that is used by the archive log should reach a relatively constant level.
If the archive log continues to grow, consider taking one or both of these
actions:
v Add space to the archive log. You might need to move the archive log to a
different file system.
v Increase the frequency of full database backups, so that log pruning occurs
more frequently.
3. If you defined a directory for the failover archive log, determine whether any
logs get stored in that directory during normal operations. If the failover log
space is being used, consider increasing the size of the archive log. The goal is
that the failover archive log is used only under unusual conditions, not in
normal operation.
Chapter 3. Taking the first steps after you install Version 8.1.2 71
Installing the IBM Spectrum Protect server
You must have the IBM Spectrum Protect license package installed. The license
package is provided with the purchase of a base release. When you download a fix
pack or interim fix from Fix Central, install the server license that is available on
the Passport Advantage website. To display messages and help in a language other
than US English, install the language package of your choice.
If you upgrade the server to V8.1.2 or later, and then revert the server to a level
that is earlier than V8.1.2, you must restore the database to a point in time before
the upgrade. During the upgrade process, complete the required steps to ensure
that the database can be restored: back up the database, the volume history file, the
device configuration file, and the server options file. For more information, see
Chapter 6, “Reverting from Version 8.1.2 to a previous server,” on page 95.
If you are using the client management service, ensure that you upgrade it to the
same version as the IBM Spectrum Protect server.
Ensure that you retain the installation media from the base release of the installed
server. If you installed IBM Spectrum Protect from a downloaded package, ensure
that the downloaded files are available. If the upgrade fails, and the server license
module is uninstalled, the installation media from the server base release are
required to reinstall the license.
Ensure that you upgrade the server before you upgrade backup-archive clients. If
you do not upgrade the server first, communication between the server and clients
might be interrupted.
Attention: Do not alter the DB2 software that is installed with IBM Spectrum
Protect installation packages and fix packs. Do not install or upgrade to a different
version, release, or fix pack of DB2 software because doing so can damage the
database.
Procedure
where file_name specifies the name of the file in which to store device
configuration information.
3. Save the volume history file to another directory or rename the file. Issue the
following IBM Spectrum Protect administrative command:
backup volhistory filenames=file_name
where file_name specifies the name of the file in which to store the volume
history information.
4. Save a copy of the server options file, typically named dsmserv.opt. The file is
in the server instance directory.
5. Halt the server before installing a fix pack or interim fix. Use the HALT
command.
6. Ensure that extra space is available in the installation directory. The installation
of this fix pack might require additional temporary disk space in the
installation directory of the server. The amount of additional disk space can be
as much as that required for installing a new database as part of an IBM
Spectrum Protect installation. The IBM Spectrum Protect installation wizard
displays the amount of space that is required for installing the fix pack and the
available amount. If the required amount of space is greater than the available
amount, the installation stops. If the installation stops, add the required disk
space to the file system and restart the installation.
7. Obtain the package file for the fix pack or interim fix that you want to install
from the IBM Support Portal, Passport Advantage, or Fix Central.
8. Change to the directory where you placed the executable file. Then, either
double-click the following executable file or enter the following command on
the command line to extract the installation files.
Tip: The files are extracted to the current directory. Ensure that the executable
file is in the directory where you want the extracted files to be located.
8.x.x.x-IBM-SPSRV-platform.exe
where: platform denotes the operating system that IBM Spectrum Protect is to
be installed on.
9. Select one of the following ways of installing IBM Spectrum Protect.
Installation wizard
Follow the instructions for your operating system:
“Installing IBM Spectrum Protect by using the installation wizard” on
page 46
Tip: After you start the wizard, in the IBM Installation Manager window, click
the Update icon; do not click the Install or Modify icon.
Command line in console mode
Follow the instructions for your operating system:
“Installing IBM Spectrum Protect by using console mode” on page 47
Silent mode
Follow the instructions for your operating system:
“Installing IBM Spectrum Protect in silent mode” on page 48
Tip: If you have multiple server instances on your system, run the installation
wizard only once. The installation wizard upgrades all server instances.
Results
Correct any errors that are detected during the installation process.
If you installed the server by using the installation wizard, you can view
installation logs by using the IBM Installation Manager tool. Click File > View
Log. To collect log files, from the IBM Installation Manager tool, click Help >
Export Data for Problem Analysis.
If you installed the server by using console mode or silent mode, you can view
error logs in the IBM Installation Manager log directory, for example:
C:\ProgramData\IBM\Installation Manager\logs
Ensure that you retain the installation media from the V6.3 or V7.1 server base
release that you are upgrading. If you installed the server from a downloaded
package, ensure that the downloaded files are available. If the upgrade fails, and
the server license module is uninstalled, you must reinstall the license from the
installation media of the server base release.
Procedure
1. If you plan to install the IBM Spectrum Protect V8.1.2 server on the Windows
Server 2012 operating system, install the failover cluster automation server
and the failover cluster command interface first. To install these components,
issue the following commands from Windows 2.0 PowerShell:
Install-WindowsFeature -Name RSAT-Clustering-AutomationServer
Install-WindowsFeature -Name RSAT-Clustering-CmdInterface
2. Back up the database by using the BACKUP DB command. The preferred method
is to use a snapshot backup, which provides a full database backup without
interrupting scheduled backups. For example, you can run the following
command to create a snapshot backup:
backup db type=dbsnapshot devclass=tapeclass
3. Back up the device configuration information to another directory. Run the
following command:
backup devconfig filenames=file_name
Where file_name specifies the name of the file in which to store device
configuration information.
4. Back up the volume history file to another directory. Run the following
command:
backup volhistory filenames=file_name
Where file_name specifies the name of the file in which to store the volume
history information.
5. Save a copy of the server options file, typically named dsmserv.opt, which is
in the server instance directory.
6. Ensure that the resource group is on the primary node, and that all nodes in
the cluster are running. Take the following actions on the primary node:
a. In the Failover Cluster Manager window, take the server resource offline
and delete it:
1) Select Services and applications, and then select the cluster group. The
server resource is displayed in the Other Resources section.
2) Select the server resource, and click Take this resource offline.
3) To delete the server resource, select it, and click Delete.
b. In the Failover Cluster Manager window, delete the network name and IP
address:
1) In the Server name section, expand the network name to view the IP
address. Note the network name and IP address.
2) Select the network name and the IP address, and click Remove.
c. In the Failover Cluster Manager window, take the DB2 server resource
offline:
1) Select Services and applications, and then select the cluster group. The
IBM Spectrum Protect server resource is displayed in the Other
Resources section.
2) Select a DB2 server resource, for example, SERVER1, and click Take
this resource offline.
7. On the primary node, run the following command to remove DB2 clustering
from each IBM Spectrum Protect instance in the cluster:
db2mscs -u:instancename
For example, run the following command to remove DB2 clustering from the
SERVER1 instance:
db2mscs -u:server1
Tip: You might see an error message about a missing cluster resource. Ignore
this message.
8. On the primary node, in the Failover Cluster Manager window, review the
resource group Summary section. Verify that only the shared disks and any
tape resources remain in the resource group.
9. Stop the cluster service on each node in the cluster and delete the server
cluster DLL files. Then, restart the cluster service.
10. Install the IBM Spectrum Protect V8.1.2 server on each node in the cluster. For
instructions, see Chapter 2, “Installing the server components,” on page 45. If
you use the installation wizard to install the server, in the IBM Installation
Manager window, click the Update icon. Do not click the Install or Modify
icon.
11. On the primary node, start the server in the foreground to allow the database
schema reconciliation and configuration to be completed. When the server
starts, halt it by running the HALT command. If your environment has multiple
server instances, complete this step for each instance.
12. On the primary node, start the configuration wizard by clicking Start > All
Programs > IBM Spectrum Protect server > Configuration Wizard. Complete
the following steps in the configuration wizard:
a. When you are prompted to enter the user ID, enter the name of the
domain account that is associated with the cluster.
b. When you are prompted to enter the instance name, enter the name of the
instance that you are reclustering.
c. Click Yes when you are prompted to indicate whether you want to
recluster.
d. Continue stepping through the wizard until you see a message that the
configuration was successful.
13. Register the licenses for the IBM Spectrum Protect server components that are
installed on your system by running the REGISTER LICENSE command:
register license file=installation_directory\server\component_name.lic
For example, if you installed the server in the default directory, c:\Program
Files\Tivoli\TSM, run the following command to register the license:
register license file=c:\Program Files\Tivoli\TSM\server\tsmbasic.lic
For example, if you installed IBM Spectrum Protect Extended Edition in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\tsmee.lic
For example, if you installed IBM Spectrum Protect for Data Retention in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\dataret.lic
Restriction:
You cannot use the IBM Spectrum Protect server to register licenses for the
following products:
v IBM Spectrum Protect for Mail
v IBM Spectrum Protect for Databases
v IBM Spectrum Protect for ERP
v IBM Spectrum Protect for Space Management
The REGISTER LICENSE command does not apply to these licenses. The
licensing for these products is done by IBM Spectrum Protect clients.
What to do next
If a device driver is available on Windows for the tape drives or medium changers
that you plan to use, use the device driver. If a device driver is not available,
install the IBM Spectrum Protect device driver by running the dpinst.exe /a
command. The dpinst.exe file is in the device driver directory, and the default
location is C:\Program Files\Tivoli\TSM\device\drivers.
| What you should know about security before you install or upgrade the server
Related information:
IBM Spectrum Protect Upgrade and Migration Process - Frequently Asked
Questions
Upgrading to V8.1
You can upgrade the server directly from V7.1 to V8.1. You do not have to
uninstall V7.1.
Ensure that you retain the installation media from the server base release that you
are upgrading. If you installed the server components from a DVD, ensure that the
DVD is available. If you installed the server components from a downloaded
package, ensure that the downloaded files are available. If the upgrade fails, and
the server license module is uninstalled, the installation media from the server base
release are required to reinstall the license.
Procedure
In lab tests, the process of upgrading the server from V7.1 to V8.1 took 14 - 45
minutes. The results that you achieve might differ, depending on your hardware
and software environment, and the size of the server database.
Procedure
1. Review the hardware and software requirements:
“Minimum system requirements for the IBM Spectrum Protect server” on page
20
For the latest updates related to system requirements, see the IBM Spectrum
Protect support website at technote 1243309.
2. For special instructions or specific information for your operating system,
review the release notes (http://www.ibm.com/support/knowledgecenter/
SSEQVQ_8.1.2/srv.common/r_relnotes_srv.html) and readme files for server
components.
3. Select an appropriate day and time to upgrade your system to minimize the
impact on production operations. The amount of time that is required to
update the system depends on the database size and many other factors. When
you start the upgrade process, clients cannot connect to the server until the
new software is installed and any required licenses are registered again.
| 4. If you are upgrading the server from V6 or V7 to V8.1, verify that you have the
| system ID and password for the DB2 instance of the IBM Spectrum Protect
| server. These credentials are required to upgrade the system.
Procedure
1. Log on to the computer where the server is installed.
Ensure that you are logged on with the administrative user ID that was used
to install the V7.1 server.
2. Obtain a list of DB2 instances. Issue the following system command:
db2ilist
Database 1 entry:
Database 2 entry:
[g] DB2PATH=D:\TSM\db2
[g] DB2INSTDEF=SERVER1
4. Connect to the server by using an administrative user ID.
5. Back up the database by using the BACKUP DB command. The preferred method
is to create a snapshot backup, which is a full database backup that does not
interrupt scheduled database backups. For example, you can create a snapshot
backup by issuing the following command:
backup db type=dbsnapshot devclass=tapeclass
6. Back up the device configuration information to another directory by issuing
the following administrative command:
backup devconfig filenames=file_name
where file_name specifies the name of the file in which to store device
configuration information.
Tip: If you decide to restore the V7.1 database, this file is required.
7. Back up the volume history file to another directory. Issue the following
administrative command:
backup volhistory filenames=file_name
where file_name specifies the name of the file in which to store the volume
history information.
Tip: If you decide to restore the V7.1 database, this file is required.
8. Save a copy of the server options file, which is typically named dsmserv.opt.
The file is in the server instance directory.
9. Prevent activity on the server by disabling new sessions. Issue the following
administrative commands:
disable sessions client
disable sessions server
10. Verify whether any sessions exist, and notify the users that the server will be
stopped. To check for existing sessions, issue the following administrative
command:
query session
11. Cancel sessions by issuing the following administrative command:
cancel session all
This command cancels all sessions except for your current session.
12. Stop the server by issuing the following administrative command:
halt
13. Verify that the server is shut down and no processes are running.
Open the Windows Task Manager application and review the list of active
processes.
14. In the server instance directory of your installation, locate the NODELOCK file
and move it to another directory, where you are saving configuration files.
The NODELOCK file contains the previous licensing information for your
installation. This licensing information is replaced when the upgrade is
complete.
You must be logged on to the system with the administrative user ID that was
used to install the previous server.
You can obtain the installation package from an IBM download site.
By using the IBM Spectrum Protect installation software, you can install the
following components:
v Server
Tip: The database (DB2), the Global Security Kit (GSKit), and IBM Java Runtime
Environment (JRE) are automatically installed when you select the server
component.
v Server languages
v License
v Devices
Procedure
1. Download the appropriate package file from one of the following websites:
v Download the server package from Passport Advantage or Fix Central.
v For the most recent information, updates, and maintenance fixes, go to the
IBM Support Portal.
2. Complete the following steps:
a. Verify that you have enough space to store the installation files
when they are extracted from the product package. For space
requirements, see the download document for your product.
v IBM Spectrum Protect technote 4042944
v IBM Spectrum Protect Extended Edition technote 4042945
v IBM Spectrum Protect for Data Retention technote 4042946
b. Change to the directory where you placed the executable file.
Tip: In the next step, the files are extracted to the current directory.
The path must contain no more than 128 characters. Be sure to
extract the installation files to an empty directory. Do not extract to
a directory that contains previously extracted files, or any other
files.
c. To extract the installation files, double-click the executable file:
package_name.exe
Where package_name is similar to the following example:
8.1.x.000-SPSRV-WindowsX64.exe
The package is large. Therefore, the extraction takes some time.
3. Install the IBM Spectrum Protect software by using one of the following
methods. Install the IBM Spectrum Protect license during the installation
process.
Tip: If you have multiple server instances on your system, install the IBM
Spectrum Protect software only one time to upgrade all server instances.
Installation wizard
To install the server by using the graphical wizard of IBM Installation
Manager, follow the instructions in “Installing IBM Spectrum Protect by
using the installation wizard” on page 46.
Ensure that your system meets the prerequisites for using the
installation wizard. Then, complete the installation procedure. In the
IBM Installation Manager window, click the Update or Modify icon.
Installing the server by using the console mode
To install the server by using the console mode, follow the instructions
in “Installing IBM Spectrum Protect by using console mode” on page
47.
Review the information about installing the server in console mode and
then complete the installation procedure.
Silent mode
To obtain information about the database, run the following IBM Spectrum
Protect administrative command:
query db format=detailed
7. Register the licenses for the server components that are installed on your
system by running the REGISTER LICENSE command:
register license file=installation_directory\server\component_name.lic
For example, if you installed the server in the default directory, c:\Program
Files\Tivoli\TSM, run the following command to register the license:
register license file=c:\Program Files\Tivoli\TSM\server\tsmbasic.lic
For example, if you installed IBM Spectrum Protect Extended Edition in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\tsmee.lic
For example, if you installed IBM Spectrum Protect for Data Retention in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\dataret.lic
Restriction:
You cannot use the IBM Spectrum Protect server to register licenses for the
following products:
v IBM Spectrum Protect for Mail
v IBM Spectrum Protect for Databases
v IBM Spectrum Protect for ERP
v IBM Spectrum Protect for Space Management
The REGISTER LICENSE command does not apply to these licenses. The licensing
for these products is done by IBM Spectrum Protect clients.
8. Optional: To install an extra language package, use the modify function of the
IBM Installation Manager.
9. Optional: To upgrade to a newer version of a language package, use the update
function of the IBM Installation Manager.
What to do next
You can authenticate passwords with the LDAP directory server, or authenticate
passwords with the IBM Spectrum Protect server. Passwords that are authenticated
with the LDAP directory server can provide enhanced system security.
If a device driver is available on Windows for the tape drives or medium changers
that you plan to use, use the device driver. If a device driver is not available on
Windows for the tape drives or medium changers that you plan to use, install the
IBM Spectrum Protect device driver by running the dpinst.exe /a command. The
dpinst.exe file is in the device driver directory. The default directory is C:\Program
Files\Tivoli\TSM\device\drivers.
Procedure
Follow the procedure for your operating system, source release, and target release:
Table 13. Procedures for upgrading the server in a clustered environment on a Windows
operating system
Source release Target release Procedure
V8.1.2 V8.1.2 fix pack “Applying a fix pack to IBM Spectrum Protect 8.1.2 in
a clustered environment” on page 75
V6.3 or V7.1 V8.1.2 Upgrading V6.3 or V7.1 to V8.1 in a clustered
environment on Windows
Table 13. Procedures for upgrading the server in a clustered environment on a Windows
operating system (continued)
Source release Target release Procedure
V6.1 V8.1.2 Upgrading V6.1 to V8.1 in a clustered environment on
Windows
V5 V7.1 or later Upgrading the server to V7.1 or later in a Windows
clustered environment
Ensure that you retain the installation media from the V6.3 or V7.1 server base
release that you are upgrading. If you installed the server from a downloaded
package, ensure that the downloaded files are available. If the upgrade fails, and
the server license module is uninstalled, you must reinstall the license from the
installation media of the server base release.
Procedure
1. If you plan to install the IBM Spectrum Protect V8.1.2 server on the Windows
Server 2012 operating system, install the failover cluster automation server
and the failover cluster command interface first. To install these components,
issue the following commands from Windows 2.0 PowerShell:
Install-WindowsFeature -Name RSAT-Clustering-AutomationServer
Install-WindowsFeature -Name RSAT-Clustering-CmdInterface
2. Back up the database by using the BACKUP DB command. The preferred method
is to use a snapshot backup, which provides a full database backup without
interrupting scheduled backups. For example, you can run the following
command to create a snapshot backup:
backup db type=dbsnapshot devclass=tapeclass
3. Back up the device configuration information to another directory. Run the
following command:
backup devconfig filenames=file_name
Where file_name specifies the name of the file in which to store device
configuration information.
4. Back up the volume history file to another directory. Run the following
command:
backup volhistory filenames=file_name
Where file_name specifies the name of the file in which to store the volume
history information.
5. Save a copy of the server options file, typically named dsmserv.opt, which is
in the server instance directory.
6. Ensure that the resource group is on the primary node, and that all nodes in
the cluster are running. Take the following actions on the primary node:
a. In the Failover Cluster Manager window, take the server resource offline
and delete it:
1) Select Services and applications, and then select the cluster group. The
server resource is displayed in the Other Resources section.
2) Select the server resource, and click Take this resource offline.
3) To delete the server resource, select it, and click Delete.
b. In the Failover Cluster Manager window, delete the network name and IP
address:
1) In the Server name section, expand the network name to view the IP
address. Note the network name and IP address.
2) Select the network name and the IP address, and click Remove.
c. In the Failover Cluster Manager window, take the DB2 server resource
offline:
1) Select Services and applications, and then select the cluster group. The
IBM Spectrum Protect server resource is displayed in the Other
Resources section.
2) Select a DB2 server resource, for example, SERVER1, and click Take
this resource offline.
7. On the primary node, run the following command to remove DB2 clustering
from each IBM Spectrum Protect instance in the cluster:
db2mscs -u:instancename
For example, run the following command to remove DB2 clustering from the
SERVER1 instance:
db2mscs -u:server1
Tip: You might see an error message about a missing cluster resource. Ignore
this message.
8. On the primary node, in the Failover Cluster Manager window, review the
resource group Summary section. Verify that only the shared disks and any
tape resources remain in the resource group.
9. Stop the cluster service on each node in the cluster and delete the server
cluster DLL files. Then, restart the cluster service.
10. Install the IBM Spectrum Protect V8.1.2 server on each node in the cluster. For
instructions, see Chapter 2, “Installing the server components,” on page 45. If
you use the installation wizard to install the server, in the IBM Installation
Manager window, click the Update icon. Do not click the Install or Modify
icon.
11. On the primary node, start the server in the foreground to allow the database
schema reconciliation and configuration to be completed. When the server
starts, halt it by running the HALT command. If your environment has multiple
server instances, complete this step for each instance.
12. On the primary node, start the configuration wizard by clicking Start > All
Programs > IBM Spectrum Protect server > Configuration Wizard. Complete
the following steps in the configuration wizard:
a. When you are prompted to enter the user ID, enter the name of the
domain account that is associated with the cluster.
b. When you are prompted to enter the instance name, enter the name of the
instance that you are reclustering.
c. Click Yes when you are prompted to indicate whether you want to
recluster.
d. Continue stepping through the wizard until you see a message that the
configuration was successful.
13. Register the licenses for the IBM Spectrum Protect server components that are
installed on your system by running the REGISTER LICENSE command:
register license file=installation_directory\server\component_name.lic
For example, if you installed the server in the default directory, c:\Program
Files\Tivoli\TSM, run the following command to register the license:
register license file=c:\Program Files\Tivoli\TSM\server\tsmbasic.lic
For example, if you installed IBM Spectrum Protect Extended Edition in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\tsmee.lic
For example, if you installed IBM Spectrum Protect for Data Retention in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\dataret.lic
Restriction:
You cannot use the IBM Spectrum Protect server to register licenses for the
following products:
v IBM Spectrum Protect for Mail
v IBM Spectrum Protect for Databases
v IBM Spectrum Protect for ERP
v IBM Spectrum Protect for Space Management
The REGISTER LICENSE command does not apply to these licenses. The
licensing for these products is done by IBM Spectrum Protect clients.
What to do next
If a device driver is available on Windows for the tape drives or medium changers
that you plan to use, use the device driver. If a device driver is not available,
install the IBM Spectrum Protect device driver by running the dpinst.exe /a
command. The dpinst.exe file is in the device driver directory, and the default
location is C:\Program Files\Tivoli\TSM\device\drivers.
Ensure that you retain the installation media from the V6.1 and V6.3 server base
releases. If you obtained the server software from a downloaded package, ensure
that the downloaded files are available. If the upgrade fails, and the server license
module is uninstalled, the installation media from the server base release are
required to reinstall the license.
Procedure
1. If you plan to install the IBM Spectrum Protect V8.1.2 server on the Windows
Server 2012 operating system, install the failover cluster automation server
and the failover cluster command interface first. To install these components,
issue the following commands from Windows 2.0 PowerShell:
Install-WindowsFeature -Name RSAT-Clustering-AutomationServer
Install-WindowsFeature -Name RSAT-Clustering-CmdInterface
2. Back up the database by using the BACKUP DB command. The preferred method
is to use a snapshot backup, which provides a full database backup without
interrupting scheduled backups. For example, you can run the following
command to create a snapshot backup:
backup db type=dbsnapshot devclass=tapeclass
3. Back up the device configuration information to another directory. Run the
following command:
backup devconfig filenames=file_name
Where file_name specifies the name of the file in which to store device
configuration information.
4. Back up the volume history file to another directory. Run the following
command:
backup volhistory filenames=file_name
Where file_name specifies the name of the file in which to store the volume
history information.
5. Save a copy of the server options file, typically named dsmserv.opt, which is
in the server instance directory.
6. Ensure that the resource group is on the primary node, and that all nodes in
the cluster are running. Take the following actions on the primary node:
a. In the Failover Cluster Manager window, take the server resource offline
and delete it:
1) Select Services and applications, and then select the cluster group. The
server resource is displayed in the Other Resources section.
2) Select the server resource, and click Take this resource offline.
3) To delete the server resource, select it, and click Delete.
b. In the Failover Cluster Manager window, delete the network name and IP
address:
1) In the Server name section, expand the network name to view the IP
address. Note the network name and IP address.
2) Select the network name and the IP address, and click Remove.
c. In the Failover Cluster Manager window, take the DB2 server resource
offline:
1) Select Services and applications, and then select the cluster group. The
IBM Spectrum Protect server resource is displayed in the Other
Resources section.
2) Select a DB2 server resource, for example, SERVER1, and click Take
this resource offline.
7. On the primary node, to remove DB2 clustering from the instance, for each
IBM Spectrum Protect instance in the cluster, issue the following command:
db2mscs -u:instancename
For example:
db2mscs -u:server1
Tip: You might see an error message about a missing cluster resource. Ignore
this message.
8. On the primary node, in the Failover Cluster Manager window, in the
resource group Summary section, verify that only the shared disks and any
tape resources remain in the resource group.
9. On the primary node, install the V6.3 server by using the install.exe
command. For detailed instructions about installing the V6.3 server, see
Installing the server components.
10. On the primary node, install the IBM Spectrum Protect V8.1.2 server. For
instructions, see Chapter 2, “Installing the server components,” on page 45. If
you use the installation wizard to install the server, in the IBM Installation
Manager window, click the Install icon. Do not click the Update or Modify
icon.
11. On each secondary node, uninstall V6.1:
a. Change to the following directory:
C:\Program Files\Tivoli\TSM\_uninst
b. Issue the following command:
Uninstall Tivoli Storage Manager.exe
12. On the primary node, start the configuration wizard by clicking Start > All
Programs > IBM Spectrum Protect server > Configuration Wizard. Step
through the configuration wizard:
a. When you are prompted to enter the instance name, enter the name of the
instance that you are reclustering.
b. When you are prompted to enter the user ID, enter the name of the
domain account that is associated with the cluster.
c. When you are prompted to indicate whether you want to recluster, click
Yes.
d. Continue stepping through the wizard until you see a message that the
configuration was successful.
13. Register the licenses for the IBM Spectrum Protect server components that are
installed on your system by running the REGISTER LICENSE command:
register license file=installation_directory\server\component_name.lic
For example, if you installed the server in the default directory, c:\Program
Files\Tivoli\TSM, run the following command to register the license:
register license file=c:\Program Files\Tivoli\TSM\server\tsmbasic.lic
For example, if you installed IBM Spectrum Protect Extended Edition in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\tsmee.lic
For example, if you installed IBM Spectrum Protect for Data Retention in the
c:\Program Files\Tivoli\TSM directory, run the following command:
register license file=c:\Program Files\Tivoli\TSM\server\dataret.lic
Restriction:
You cannot use the IBM Spectrum Protect server to register licenses for the
following products:
v IBM Spectrum Protect for Mail
v IBM Spectrum Protect for Databases
v IBM Spectrum Protect for ERP
v IBM Spectrum Protect for Space Management
The REGISTER LICENSE command does not apply to these licenses. The
licensing for these products is done by IBM Spectrum Protect clients.
What to do next
If a device driver is available on Windows for the tape drives or medium changers
that you plan to use, use the device driver. If a device driver is not available,
install the IBM Spectrum Protect device driver by running the dpinst.exe /a
command. The dpinst.exe file is in the device driver directory, and the default
location is C:\Program Files\Tivoli\TSM\device\drivers.
If you no longer need GSKit V7 and want to free up space on your system, you
can remove it after the upgrade to IBM Spectrum Protect V8.1.2.
Important: Removing GSKit V7 might affect other programs on your system that
rely on it.
Procedure
Important: Removing the wrong key can cause system problems such as not
being able to restart the workstation.
a. Click Start, and then click Run.
You must have the following items from the earlier version of the server:
v Server database backup
v Volume history file
v Device configuration file
v Server options file
Use the same instructions whether you are reverting within releases or to an earlier
release, for example, from 8.1.2 to 8.1.1 or from 8.1.2 to 7.1.2. The older version
must match the version that you used before the upgrade to V8.1.
Procedure
1. Halt the server to shut down all server operations by using the HALT
command.
2. Remove the database from the database manager, then delete the database and
recovery log directories.
a. Manually remove the database. One way to remove it is by issuing this
command:
dsmserv -k instance_name removedb tsmdb1
b. If you must reuse the space that is occupied by the database and recovery
log directories, you can now delete these directories.
3. Use the uninstallation program to uninstall the V8.1 server. Uninstallation
removes the server and the database manager, with their directories. For
details, see Chapter 8, “Uninstalling IBM Spectrum Protect,” on page 103.
4. Stop the cluster service. Reinstall the version of the server program that you
were using before the upgrade to V8.1.2. This version must match the version
that your server was running when you created the database backup that you
restore in a later step. For example, the server was at V7.1.7 before the
upgrade, and you intend to use the database backup that was in use on this
server. You must install the V7.1.7 fix pack to be able to restore the database
backup.
5. Configure the new server database by using the configuration wizard. To start
the wizard, issue the following command:
/dsmicfgx
6. Ensure that no servers are running in the background.
7. Restore the database to a point in time before the upgrade.
8. Copy the following files to the instance directory.
v Device configuration file
v Volume history file
v The server options file (typically dsmserv.opt)
9. If you enabled data deduplication for any FILE-type storage pools that existed
before the upgrade, or if you moved data that existed before the upgrade into
new storage pools while using the V8.1.2 server, you must complete
additional recovery steps. For more details, see “Additional recovery steps if
you created new storage pools or enabled data deduplication.”
10. If the REUSEDELAY parameter setting on storage pools is less than the age of the
database that you restored, restore volumes on any sequential-access storage
pools that were reclaimed after that database backup. Use the RESTORE VOLUME
command.
If you do not have a backup of a storage pool, audit the reclaimed volumes
by using the AUDIT VOLUME command, with the FIX=YES parameter to resolve
inconsistencies. For example:
audit volume volume_name fix=yes
11. If client backup or archive operations were completed using the V8.1 server,
audit the storage pool volumes on which the data was stored.
To complete this task, you must have a complete backup of the storage pool that
was created before the upgrade to V8.1.2.
Procedure
v For each storage pool for which you enabled the data deduplication function,
restore the entire storage pool by using the RESTORE STGPOOL command.
v For storage pools that you created after the upgrade, determine what action to
take. Data that was moved from existing V8 storage pools into the new storage
pools might be lost because the new storage pools no longer exist in your
restored V8 server. Possible recovery depends on the type of storage pool:
– If data was moved from V8 DISK-type storage pools into a new storage pool,
space that was occupied by the data that was moved was probably reused.
Therefore, you must restore the original V8 storage pools by using the storage
pool backups that were created before the upgrade to V8.1.2.
If no data was moved from V8 DISK-type storage pools into a new storage
pool, then audit the storage pool volumes in these DISK-type storage pools.
– If data was moved from V8 sequential-access storage pools into a new storage
pool, that data might still exist and be usable in storage pool volumes on the
restored V8 server. The data might be usable if the REUSEDELAY parameter for
the storage pool was set to a value that prevented reclamation while the
server was running as a V8.1.2 server. If any volumes were reclaimed while
the server was running as a V8.1.2 server, restore those volumes from storage
pool backups that were created before the upgrade to V8.1.2.
You must have the following items from the earlier version of the server:
v Server database backup
v Volume history file
v Device configuration file
v Server options file
Complete the following steps on the system that has the Version 8.1.2 server.
Procedure
1. Delete the IBM Spectrum Protect server resource and the network resource in
Microsoft Failover Cluster Manager.
a. Open Failover Cluster Manager. Under Other Resources, right-click the
IBM Spectrum Protect instance resource. Select Take this resource offline.
Tip: You might see an error message about a missing cluster resource.
Disregard this message.
3. Remove the database. One way to remove it is by issuing this command:
dsmserv -k instance_name removedb tsmdb1
4. On each system in the cluster, delete the V 8.1.2 tsmsvrrsc DLL files by
completing the following steps:
a. Stop the cluster service. One way to stop it is by using the Services
Application. Right-click Cluster Service and select Stop.
b. Delete the tsmsvrrscexX64.dll and tsmsvrrscx64.dll files from the
C:\Windows\Cluster directory.
c. Start the cluster service. One way to start it is by using the Services
Application. Right-click Cluster Service and select Start.
5. Use the uninstallation program to uninstall the V8.1 server. Uninstallation
removes the server and the database manager, with their directories. For
details, see Chapter 8, “Uninstalling IBM Spectrum Protect,” on page 103.
6. Clean up the database and recovery log directories if you are reusing them.
7. Stop the cluster service. Reinstall the version of the server program that you
were using before the upgrade to V8.1.2. This version must match the version
that your server was running when you created the database backup that you
restore in a later step. For example, the server was at V7.1.7 before the
upgrade, and you intend to use the database backup that was in use on this
server. You must install the V7.1.7 fix pack to be able to restore the database
backup.
8. Copy the following files to the instance directory.
v Device configuration file
v Volume history file
v The server options file (typically dsmserv.opt)
9. Use the configuration wizard (dsmicfgx) to recreate the server instance.
10. Restore the database to a point in time before the upgrade.
Purpose
After using the wizards to install and configure IBM Spectrum Protect, you seldom
need to issue DB2 commands. A limited set of DB2 commands that you might use
or be asked to issue are listed in Table 14. This list is supplemental material only
and is not a comprehensive list. There is no implication that an IBM Spectrum
Protect administrator will use it on a daily or ongoing basis. Samples of some
commands are provided. Details of output are not listed.
For a full explanation of the commands described here and of their syntax, see the
DB2 product information.
Table 14. DB2 commands
Command Description Example
db2cmd Opens the command line processor DB2 Open the DB2 command window:
window, and initializes the DB2 db2cmd
command-line environment.
db2icrt Creates DB2 instances in the home Manually create an IBM Spectrum Protect
directory of the instance owner. instance. Enter the command on one line:
Tip: The IBM Spectrum Protect /opt/tivoli/tsm/db2/instance/
configuration wizard creates the instance db2icrt -a server -u
used by the server and database. After a instance_name instance_name
server is installed and configured through
the configuration wizard, the db2icrt
command is generally not used.
Complete the following steps before you uninstall IBM Spectrum Protect:
v Complete a full database backup.
v Save a copy of the volume history and device configuration files.
v Store the output volumes in a safe location.
Attention: Do not use the Add/Remove Programs tool in the Windows Control
Panel to uninstall IBM Spectrum Protect. Use only the uninstallation procedure
that is described in this section.
You can uninstall IBM Spectrum Protect by using any of the following methods: a
graphical wizard, the command line in console mode, or silent mode.
What to do next
See Chapter 2, “Installing the server components,” on page 45 for installation steps
to reinstall the IBM Spectrum Protect components.
Procedure
1. Start the Installation Manager.
Open the Installation Manager from the Start menu.
2. Click Uninstall.
3. Select IBM Spectrum Protect server, and click Next.
4. Click Uninstall.
5. Click Finish.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the
following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command:
imcl.exe -c
3. To uninstall, enter 5.
4. Choose to uninstall from the IBM Spectrum Protect package group.
5. Enter N for Next.
6. Choose to uninstall the IBM Spectrum Protect server package.
7. Enter N for Next.
8. Enter U for Uninstall.
9. Enter F for Finish.
You can use a response file to provide data input to silently uninstall the IBM
Spectrum Protect server components. IBM Spectrum Protect includes a sample
response file, uninstall_response_sample.xml, in the input directory where the
installation package is extracted. This file contains default values to help you avoid
any unnecessary warnings.
If you want to customize the response file, you can modify the options that are in
the file. For information about response files, see Response files.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the
following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command, where response_file
represents the response file path, including the file name:
To manually uninstall and reinstall IBM Spectrum Protect, complete the following
steps:
1. Make a list of your current server instances before proceeding to the
uninstallation. Run the following command:
db2ilist
2. Run the following commands for every server instance:
db2 attach to server1
db2 get dbm cfg show detail
db2 detach
Tip: The installation wizard configures the server instances but you must
verify that they exist. If they do not exist, you must manually configure
them.
b. Catalog the database. Log in to each server instance as the instance user,
one at a time, and issue the following commands:
set db2instance=server1
db2 catalog database tsmdb1
db2 attach to server1
db2 update dbm cfg using dftdbpath instance_drive
db2 detach
c. Verify that IBM Spectrum Protect recognizes the server instance by listing
your directories. Your home directory appears if you did not change it. Your
instance directory does appear if you used the configuration wizard. Issue
this command:
db2 list database directory
Before you uninstall IBM Installation Manager, you must ensure that all packages
that were installed by IBM Installation Manager are uninstalled. Close IBM
Installation Manager before you start the uninstall process.
To view installed packages, click Start > All Programs > IBM Installation
Manager > View Installed Packages.
Procedure
To uninstall IBM Installation Manager, complete the following steps:
1. From the Start menu, click Control Panel > Programs and Features.
2. Select IBM Installation Manager and click Uninstall.
Before you install and configure the Operations Center, review the following
information:
v “System requirements for the Operations Center” on page 109
– “Operations Center computer requirements” on page 110
– “Hub and spoke server requirements” on page 110
– “Operating system requirements” on page 113
– “Web browser requirements” on page 114
– “Language requirements” on page 114
– “Requirements and limitations for IBM Spectrum Protect client management
services” on page 115
v “Administrator IDs that the Operations Center requires” on page 116
v “IBM Installation Manager” on page 117
v “Installation checklist” on page 118
v “Obtaining the Operations Center installation package” on page 121
For information about upgrading the Operations Center, see Chapter 11,
“Upgrading the Operations Center,” on page 125.
Table 15. Methods for installing or uninstalling the Operations Center
Method Instructions
Graphical wizard v “Installing the Operations Center by using a graphical
wizard” on page 121
v “Uninstalling the Operations Center by using a graphical
wizard” on page 159
Console mode v “Installing the Operations Center in console mode” on page
122
v “Uninstalling the Operations Center in console mode” on
page 159
Silent mode v “Installing the Operations Center in silent mode” on page 122
v “Uninstalling the Operations Center in silent mode” on page
160
From the Operations Center, you can manage the following primary aspects of the
storage environment:
v IBM Spectrum Protect servers and clients
v Services such as backup and restore, archive and retrieve, and migrate and recall
v Storage pools and storage devices
Use the Operations Center System Requirements Calculator to estimate the system
requirements for running the Operations Center and the hub and spoke servers
that are monitored by the Operations Center.
Table 16 on page 110 lists the prerequisite requirements that are verified during the
installation and indicates where to find more information about these
requirements.
Resource requirements
The hub and spoke servers that are monitored by the Operations Center require
additional resources, as described in “Hub and spoke server requirements.”
The spoke servers send alerts and status information to the hub server. The
Operations Center shows you a consolidated view of alerts and status information
for the hub server and any spoke servers.
If only one server is monitored by the Operations Center, that server is still called
a hub server, even though no spoke servers are connected to it.
Table 17 indicates the version of IBM Spectrum Protect server that must be
installed on the hub server and on each spoke server that is managed by the
Operations Center.
| Table 17. IBM Spectrum Protect server version requirements for hub and spoke servers
| Operations Center Version on the hub server Version on each spoke server
| V8.1.2 V8.1.2 V6.3.4 or later
The number of spoke servers that a hub server can support depends on the
configuration and on the version of IBM Spectrum Protect on each spoke server.
However, a general guideline is that a hub server can support 10 - 20 V6.3.4 spoke
servers but can support more V7.1 or later spoke servers.
Use the Operations Center System Requirements Calculator to estimate the system
requirements for running the Operations Center and the hub and spoke servers
that are monitored by the Operations Center.
The following factors have the most significant impact on the performance of the
Operations Center:
v The processor and memory on the computer where the Operations Center is
installed
v The system resources of the hub and spoke servers, including the disk system
that is in use for the hub server database
v The number of client nodes and virtual machine file spaces that are managed by
the hub and spoke servers
v The frequency at which data is refreshed in the Operations Center
Consider grouping hub and spoke servers by geographic location. For example,
managing the servers within the same data center can help prevent issues that are
caused by firewalls or by inadequate network bandwidth between different
locations. If necessary, you can further divide servers according to one or more of
the following characteristics:
v The administrator who manages the servers
v The organizational entity that funds the servers
v Server operating system
v The language in which the servers run
Tip: If the hub and spoke servers are not running in the same language, you
might see corrupted text in the Operations Center.
If you use an enterprise configuration, you can improve the process by which the
administrator credentials are synchronized on spoke servers. To improve the
performance and efficiency of maintaining the monitoring administrator ID,
complete the following steps:
1. Designate the configuration manager server as the Operations Center hub
server. During the hub server configuration, a monitoring administrator ID
named IBM-OC-hub_server_name is registered.
2. On the hub server, add the monitoring administrator ID to a new or existing
enterprise configuration profile. Issue the NOTIFY SUBSCRIBERS command to
distribute the profile to the managed servers.
3. Add one or more of the managed servers as Operations Center spoke servers.
The Operations Center detects this configuration and allows the configuration
manager to distribute and update the monitoring administrator ID on the spoke
servers.
Restrictions:
v A single server cannot be both a hub server and a spoke server.
v Each spoke server can be assigned to only one hub server.
v Each hub server requires a separate instance of the Operations Center, each of
which has a separate web address.
Attention: Do not use the same server as the hub server for multiple Operations
Centers.
Use the following guidelines in deciding which server to designate as the hub
server:
Choose a lightly loaded server
Consider a server that has a light load for operations such as client backup
and archive. A lightly loaded server is also a good choice as the host
system for the Operations Center.
Ensure that the server has the resources to handle both its typical server
workload and the estimated workload for acting as the hub server.
Locate the server for minimal roundtrip network latency
Locate the hub server so that the network connection between the hub
server and the spoke servers has a roundtrip latency that is no greater than
5 ms. This latency can typically be achieved when the servers are on the
same local area network (LAN).
Networks that are poorly tuned, are heavily used by other applications, or
have roundtrip latency much higher than 5 ms can degrade
communications between the hub and spoke servers. For example,
roundtrip latencies of 50 ms or higher can result in communication
timeouts that cause spoke servers to disconnect or reconnect to the
112 IBM Spectrum Protect for Windows: Installation Guide
Planning to install the Operations Center
For the most up-to-date requirements information, see Software and Hardware
Requirements.
For optimal viewing of the Operations Center in the web browser, ensure that the
screen resolution for the system is set to a minimum of 1024 X 768 pixels.
For optimal performance, use a web browser that has good JavaScript
performance, and enable browser caching.
Restriction: If Apple Safari is running on iOS 8.x or iOS 9.x, you cannot use a
self-signed certificate for secure communication with the Operations Center
without extra configuration of the certificate. Use a certificate authority (CA)
certificate, or configure the self-signed certificate as needed. For instructions, see
Technote http://www.ibm.com/support/docview.wss?uid=swg21963153.
v Google Chrome 40 or later
v Microsoft Internet Explorer 11 or later
v Mozilla Firefox ESR 31 or later
The web browser displays an SSL error if strict SP 800-131A compliance is specified
during installation, and the web browser does not meet the preceding
requirements.
Language requirements
By default, the Operations Center uses the language that the web browser uses.
However, the installation process uses the language that the operating system uses.
Verify that the web browser and the operating system are set to the language that
you require.
Table 18. Operations Center language values that you can use on Windows systems
Language Language option value
Chinese, Simplified chs
Chinese, Traditional cht
English ameng
French fra
German deu
Italian ita
Japanese (Shift-JIS) jpn
Korean kor
Portuguese, Brazilian ptb
Table 18. Operations Center language values that you can use on Windows
systems (continued)
Language Language option value
Russian rus
Spanish esp
In the documentation for the client management service, client system is the system
where the backup-archive client is installed.
Diagnostic information can be collected only from Linux and Windows clients, but
administrators can view the diagnostic information in the Operations Center on
AIX, Linux, or Windows operating systems.
Tip: After you install the client management service, you do not have to install
it again because the service can discover multiple client options files.
The client management service provides basic services for collecting diagnostic
information from backup-archive clients. The following limitations exist for the
client management service:
v You can install the client management service only on systems with
backup-archive clients, including backup-archive clients that are installed on
data mover nodes for IBM Spectrum Protect for Virtual Environments: Data
Protection for VMware.
v You cannot install the client management service on other IBM Spectrum Protect
client components or products that do not have backup-archive clients.
v If the backup-archive clients are protected by a firewall, ensure that the
Operations Center can connect to the backup-archive clients through the firewall
by using the configured port for the client management service. The default port
is 9028, but it can be changed.
v The client management service scans all client log files to locate entries for the
previous 72-hour period.
v The Diagnosis page in the Operations Center provides basic troubleshooting
information for backup-archive clients. However, for some backup issues, you
might have to access the client system and obtain further diagnostic information.
v If the combined size of the client error log files and schedule log files on a client
system is more than 500 MB, delays can occur in sending log records to the
Operations Center. You can control the size of the log files by enabling log file
pruning or wrapping by specifying the errorlogretention or errorlogmax client
option.
v If you use the same client node name to connect to multiple IBM Spectrum
Protect servers that are installed on the same server, you can view log files for
only one of the client nodes.
The Operations Center requires the following IBM Spectrum Protect administrator
IDs:
Administrator IDs that are registered on the hub server
Any administrator ID that is registered on the hub server can be used to
log in to the Operations Center. The authority level of the ID determines
which tasks can be completed. You can create new administrator IDs by
using the REGISTER ADMIN command.
The following list contains explanations of some terms that are used in IBM
Installation Manager:
Offering
An installable unit of a software product.
The Operations Center offering contains all of the media that IBM
Installation Manager requires to install the Operations Center.
Package
The group of software components that are required to install an offering.
The Operations Center package contains the following components:
v IBM Installation Manager installation program
v Operations Center offering
Package group
A set of packages that share a common parent directory.
Repository
A remote or local storage area for data and other application resources.
The Operations Center package is stored in a repository on IBM Fix
Central.
Installation checklist
Before you install the Operations Center, you must verify certain information, such
as the installation credentials, and you must determine the input to provide to IBM
Installation Manager for the installation.
The following checklist highlights the information that you must verify or
determine before you install the Operations Center, and Table 19 describes the
details of this information:
__ Verify the host name for the computer where the Operations Center is to be
installed.
__ Verify the installation credentials.
__ Determine the Operations Center installation directory, if you do not want to
accept the default path.
__ Determine the IBM Installation Manager installation directory, if you do not
want to accept the default path.
__ Determine the port number to be used by the Operations Center web server,
if you do not want to accept the default port number.
__ Determine the password for secure communications.
__ Determine whether secure communications must comply with the National
Institute of Standards and Technology (NIST) Special Publications (SP)
800-131A recommendation.
Table 19. Information to verify or determine before you install the Operations Center
Information Details
Host name for the computer The host name must meet the following criteria:
where the Operations Center v It must not contain double-byte character set (DBCS) characters or the underscore
is to be installed. character (_).
v Although the host name can contain the hyphen character (-), it cannot have a
hyphen as the last character in the name.
Installation credentials To install the Operations Center, you must use the following user account:
v Administrator
Table 19. Information to verify or determine before you install the Operations Center (continued)
Information Details
Operations Center installation The Operations Center is installed in the ui subdirectory of the installation directory.
directory
The following path is the default path for the Operations Center installation
directory:
v c:\Program Files\Tivoli\TSM
For example, if you use this default path, the Operations Center is installed in the
following directory:
c:\Program Files\Tivoli\TSM\ui
IBM Installation Manager The following path is the default path for the IBM Installation Manager installation
installation directory directory:
v C:\Program Files\IBM\Installation Manager
Port number that is used by The value for the secure (https) port number must meet the following criteria:
the Operations Center web v The number must be an integer in the range 1024 - 65535.
server.
v The number cannot be in use or allocated to other programs.
Tip: If you later do not remember the port number that you specified, refer to the
following file, where installation_dir represents the directory where the
Operations Center is installed:
v installation_dir\ui\Liberty\usr\servers\guiServer\bootstrap.properties
The bootstrap.properties file contains the IBM Spectrum Protect server connection
information.
Table 19. Information to verify or determine before you install the Operations Center (continued)
Information Details
Password for secure The Operations Center uses Hypertext Transfer Protocol Secure (HTTPS) to
communications communicate with web browsers.
| The Operations Center requires secure communication between the server and the
| Operations Center. To secure communication, you must add the Transport Layer
| Security (TLS) certificate of the hub server to the truststore file of the Operations
| Center.
| The truststore file of the Operations Center contains the certificate that the
| Operations Center uses for HTTPS communication with web browsers. During
| installation of the Operations Center, you create a password for the truststore file.
| When you set up secure communication between the Operations Center and the hub
| server, you must use the same password to add the certificate of the hub server to
| the truststore file.
The password for the truststore file must meet the following criteria:
v The password must contain a minimum of 6 characters and a maximum of 64
characters.
v The password must contain at least the following characters:
– One uppercase letter (A – Z)
– One lowercase letter (a – z)
– One digit (0 – 9)
– Two of the non-alphanumeric characters that are listed in the following series:
~ ! @ # $ % ^ & * _ - + = ` |
( ) { } [ ] : ; < > , . ? /
Related tasks:
“Configuring for secure communication” on page 133
“Resetting the password for the Operations Center truststore file” on page 136
You can install the Operations Center on a computer with the IBM Spectrum
Protect server or on a separate computer.
Procedure
Complete the following steps to extract the Operations Center installation files. In
the following steps, replace version_number with the version of Operations Center
that you are installing.
On Windows systems:
1. Download the following package file to the directory of your choice:
version_number.000-IBM-SPOC-WindowsX64.exe
2. In Windows Explorer, double-click the file name to extract the installation files.
The self-extracting package file is extracted to the directory.
Procedure
1. From the directory where the Operations Center installation package file is
extracted, issue the following command:
install.bat
2. Follow the wizard instructions to install the IBM Installation Manager and
Operations Center packages.
What to do next
Procedure
1. From the directory where the installation package file is extracted, run the
following program:
install.bat -c
2. Follow the console instructions to install the Installation Manager and
Operations Center packages.
What to do next
To provide data input when you use the silent installation method, you can use a
response file. The following sample response files are provided in the input
directory where the installation package is extracted:
install_response_sample.xml
Use this file to install the Operations Center.
update_response_sample.xml
Use this file to upgrade the Operations Center.
These files contain default values that can help you avoid any unnecessary
warnings. To use these files, follow the instructions that are provided in the files.
If you want to customize a response file, you can modify the options that are in
the file. For information about response files, see Response files.
Procedure
1. Create a response file. You can modify the sample response file or create your
own file.
For more information about this password, see “Installation checklist” on page
118.
Tip: To upgrade the Operations Center, the truststore password is not required
if you are using the update_response_sample.xml file.
3. Start the silent installation by issuing the following command from the
directory where the installation package is extracted. The value response_file
represents the response file path and file name:
v
install.bat -s -input response_file -acceptLicense
What to do next
Tip: In IBM Installation Manager, the term update means to discover and install
updates and fixes to installed software packages. In this context, update and
upgrade are synonymous.
v If you are upgrading the Operations Center in silent mode, you can skip the
step of creating a password for the truststore file.
Spoke server
Hub server
Spoke server
Operations Center
(on hub server computer
or separate computer)
Spoke server
Spoke server
Figure 1. Example of an Operations Center configuration with the hub and spoke servers
| The Operations Center requires secure communication between the hub server and
| the Operations Center. To secure communication, you must add the Transport
| Layer Security (TLS) certificate of the hub server to the truststore file of the
| Operations Center. For more information, see “Securing communication between
| the Operations Center and the hub server” on page 133.
Procedure
In a web browser, enter the following address, where hostname represents the name
of the computer where the Operations Center is installed, and secure_port
represents the port number that the Operations Center uses for HTTPS
communication on that computer:
https://hostname:secure_port/oc
Tips:
v The URL is case-sensitive. For example, ensure that you type “oc” in lowercase
as indicated.
v For more information about the port number, see the Installation checklist.
v If you are connecting to the Operations Center for the first time, you must
provide the following information:
– Connection information for the server that you want to designate as a hub
server
– Login credentials for an administrator ID that is defined for that server
v If the event-record retention period of the server is less than 14 days, the period
is automatically reset to 14 days if you configure the server as a hub server.
What to do next
If you have multiple IBM Spectrum Protect servers in your environment, add the
other servers as spoke servers to the hub server.
| Communication between the spoke server and the hub server must be secured by
| using the Transport Layer Security (TLS) protocol. To secure communication, add
| the certificate of the spoke server to the truststore file of the hub server.
Procedure
1. In the Operations Center menu bar, click Servers. The Servers page opens.
In the table on the Servers page, a server might have a status of
“Unmonitored.” This status means that although an administrator defined this
server to the hub server by using the DEFINE SERVER command, the server is
not yet configured as a spoke server.
2. Complete one of the following steps:
v Click the server to highlight it, and in the table menu bar, click Monitor
Spoke.
v If the server that you want to add is not shown in the table, and secure
SSL/TLS communication is not required, click + Spoke in the table menu
bar.
3. Provide the necessary information, and complete the steps in the spoke
configuration wizard.
Tip: If the event-record retention period of the server is less than 14 days, the
period is automatically reset to 14 days if you configure the server as a spoke
server.
Before you configure email notification for administrators about alerts, ensure that
the following requirements are met:
v An SMTP server is required to send and receive alerts by email, and the server
that sends the alerts by email must have access to the SMTP server.
An email notification is sent only for the first occurrence of an alert. Also, if an
alert is generated before you configure email notification, no email notification is
sent for that alert.
Procedure
Tip: From the Configure Alerts page of the Operations Center, you can select
the administrators who will receive email notification.
v Send alert summaries
To specify or update the administrator IDs to receive alert summaries by
email, issue the following command:
SET ALERTSUMMARYTOADMINS admin_name1,admin_name2,admin_name3
If you want to receive alert summaries but do not want to receive notification
about individual alerts, complete the following steps:
Procedure
To start sending that alert to the administrator again, issue the following
command:
UPDATE ALERTTRIGGER message_number ADDADMIN=admin_name
v Suspend notification about alert summaries
Procedure
To add customized text to the login screen, complete the following steps:
1. On the computer where the Operations Center is installed, go to the following
directory, where installation_dir represents the directory in which the
Operations Center is installed:
installation_dir\ui\Liberty\usr\servers\guiServer
2. In the directory, create a file that is named loginText.html that contains the
text that you want to add to the login screen. Any special, non-ASCII text must
be UTF-8 encoded.
Enable this feature to allow REST services to interact with hub and spoke servers
by sending calls to the following address:
https://oc_host_name:port/oc/api
For information about the REST services that are available for the Operations
Center, see Technote http://www.ibm.com/support/
docview.wss?uid=swg21973011, or issue the following REST call:
https://oc_host_name:port/oc/api/help
Procedure
1. On the Operations Center menu bar, hover over the settings icon and click
Settings.
2. On the General page, select the Enable administrative REST API check box.
3. Click Save.
| TLS 1.2 is required for secure communication between the IBM Spectrum Protect
| server and the Operations Center, and between the hub server and spoke servers.
The truststore file of the Operations Center is a container for certificates that the
Operations Center can access. The truststore file contains the certificate that the
Operations Center uses for HTTPS communication with web browsers.
During the installation of the Operations Center, you create a password for the
truststore file. To secure communication between the Operations Center and the
hub server, you must use the same password to add the certificate of the hub
server to the truststore file. If you do not remember this password, you can reset it.
See “Resetting the password for the Operations Center truststore file” on page 136.
Procedure
1. Specify the cert256.arm certificate as the default certificate in the key database
file of the hub server.
To specify cert256.arm as the default certificate, complete the following steps:
a. Issue the following command from the hub server instance directory:
gsk8capicmd_64 -cert -setdefault -db cert.kdb -stashed
-label "TSM Server SelfSigned SHA Key"
b. Restart the hub server so that it can receive the changes to the key database
file.
2. To verify that the cert256.arm certificate is set as the default certificate in the
key database file of the hub server, issue the following command:
gsk8capicmd_64 -cert -list -db cert.kdb -stashed
3. Stop the Operations Center web server.
4. Go to the command line of the operating system on which the Operations
Center is installed.
5. Add the certificate to the truststore file of the Operations Center by using the
iKeycmd command or the iKeyman command. The iKeyman command opens the
IBM Key Management graphical user interface, and iKeycmd is a command line
interface.
To add the SSL certificate by using the command line interface, issue the
iKeycmd command to add the cert256.arm certificate as the default certificate in
the key database file of the hub server:
ikeycmd -cert -add
-db /installation_dir/Liberty/usr/servers/guiServer/gui-truststore.jks
-file /fvt/comfrey/srv/cert256.arm
-label ’label description’
-pw ’password’ -type jks -format ascii -trust enable
where:
installation_dir
The directory in which the Operations Center is installed.
label description
The description that you assign to the label.
password
The password that you created when you installed the Operations Center.
To reset the password, uninstall the Operations Center, delete the .jks file,
and reinstall the Operations Center.
To add the certificate by using the IBM Key Management window, complete the
following steps:
a. Go to the following directory, where installation_dir represents the
directory in which the Operations Center is installed:
v installation_dir\ui\jre\bin
b. Open the IBM Key Management window by issuing the following
command:
ikeyman
c. Click Key Database File > Open.
d. In the Open window, click Browse, and go to the following directory, where
installation_dir represents the directory in which the Operations Center is
installed:
v installation_dir\ui\Liberty\usr\servers\guiServer
e. In the guiServer directory, select the gui-truststore.jks file.
f. Click Open, and click OK.
g. Enter the password for the truststore file, and click OK.
h. In the Key database content area of the IBM Key Management window,
click the arrow, and select Signer Certificates from the list.
i. Click Add.
j. In the Open window, click Browse, and go to the hub server instance
directory, as shown in the following example:
v c:\Program Files\Tivoli\TSM\server1
The directory contains the cert256.arm certificate.
If you cannot access the hub server instance directory from the Open
window, complete the following steps:
1) Use FTP or another file-transfer method to copy the cert256.arm files
from the hub server to the following directory on the computer where
the Operations Center is installed:
v installation_dir\ui\Liberty\usr\servers\guiServer
2) In the Open window, go to the guiServer directory.
k. Select the cert256.arm certificate as the certificate.
Tip: The certificate that you choose must be set as the default certificate in
the key database file of the hub server. For more information, see step 1 on
page 133 and 2 on page 133.
l. Click Open, and click OK.
m. Enter a label for the certificate. For example, enter the name of the hub
server.
n. Click OK. The SSL certificate of the hub server is added to the truststore
file, and the label is displayed in the Key database content area of the IBM
Key Management window.
o. Close the IBM Key Management window.
6. Start the Operations Center web server.
7. When you connect to the Operations Center for the first time, you are
prompted to identify the IP address or network name of the hub server, and
the port number for communicating with the hub server. If the
ADMINONCLIENTPORT server option is enabled for the IBM Spectrum
Protect server, enter the port number that is specified by the TCPADMINPORT
server option. If the ADMINONCLIENTPORT server option is not enabled,
enter the port number that is specified by the TCPPORT server option.
If the Operations Center was previously configured, you can review the
contents of the serverConnection.properties file to verify the connection
information. The serverConnection.properties file is in the following directory
on the computer where the Operations Center is installed:
v installation_dir\ui\Liberty\usr\servers\guiServer
What to do next
To set up SSL communication between the hub server and a spoke server, see
“Securing communication between the hub server and a spoke server.”
Procedure
1. On the spoke server, change to the directory of the spoke server instance.
2. Specify the required cert256.arm certificate as the default certificate in the key
database file of the spoke server. Issue the following command:
gsk8capicmd_64 -cert -setdefault -db cert.kdb -stashed
-label "TSM Server SelfSigned SHA Key"
3. Verify the certificates in the key database file of the spoke server. Issue the
following command:
gsk8capicmd_64 -cert -list -db cert.kdb -stashed
4. Securely transfer the cert256.arm file of the spoke server to the hub server.
5. On the hub server, change to the directory of the hub server instance.
6. Define the spoke server certificate to the hub server. Issue the following
command from the hub server instance directory, where spoke_servername is
the name of the spoke server, and spoke_cert256.arm is the file name of the
spoke server certificate:
gsk8capicmd_64 -cert -add -db cert.kdb -stashed -format ascii
-label spoke_servername -file spoke_cert256.arm
The spoke server does not require the hub server certificate for hub-to-spoke
communication. However, other server configurations that require
cross-defined servers do require the spoke server to have the hub server
certificate.
7. Restart the hub server and the spoke server.
8. For the hub server, issue the DEFINE SERVER command, according to the
following example:
DEFINE SERVER spoke_servername HLA=spoke_address
LLA=spoke_SSLTCPADMINPort SERVERPA=spoke_serverpassword
To reset the password, you must create a new password, delete the truststore file
of the Operations Center, and restart the Operations Center web server.
Procedure
1. Stop the Operations Center web server.
2. Go to the following directory, where installation_dir represents the directory
in which the Operations Center is installed:
installation_dir\ui\Liberty\usr\servers\guiServer
3. Open the bootstrap.properties file, which contains the password for the
truststore file. If the password is unencrypted, you can use it to open the
truststore file without having to reset it.
The following examples indicate the difference between an encrypted and an
unencrypted password:
Results
A new truststore file is automatically created for the Operations Center, and the
TLS certificate of the Operations Center is automatically included in the truststore
file.
Procedure
Procedure
1. In a web browser, enter the following address, where hostname represents the
name of the computer where the Operations Center is installed, and secure_port
represents the port number that the Operations Center uses for HTTPS
communication on that computer:
https://hostname:secure_port/oc
Tips:
v The URL is case-sensitive. For example, ensure that you type “oc” in
lowercase as indicated.
v The default port number for HTTPS communication is 11090, but a different
port number can be specified during Operations Center installation.
2. Log in, using an administrator ID that is registered on the hub server.
In the Overview page, you can view summary information for clients, services,
servers, storage pools, and storage devices. You can view more details by
clicking items or by using the Operations Center menu bar.
After you install the client management service, you can view the Diagnosis page
in the Operations Center to obtain troubleshooting information for backup-archive
clients.
Diagnostic information can be collected only from Linux and Windows clients, but
administrators can view the diagnostic information in the Operations Center on
AIX, Linux, or Windows operating systems.
You can also install the client management service on data mover nodes for IBM
Spectrum Protect for Virtual Environments: Data Protection for VMware to collect
diagnostic information about the data movers.
Tip: In the documentation for the client management service, client system is the
system where the backup-archive client is installed.
You must install the client management service on the same computer as the
backup-archive client.
Procedure
1. Download the installation package for the client management service from an
IBM download site such as IBM Passport Advantage or IBM Fix Central. Look
for a file name that is similar to <version>-IBM-SPCMS-<operating system>.bin.
The following table shows the names of the installation packages.
|| Client operating system Installation package name
| Linux x86 64-bit 8.1.x.000-IBM-SPCMS-Linuxx64.bin
| Windows 32-bit 8.1.x.000-IBM-SPCMS-Windows32.exe
| Windows 64-bit 8.1.x.000-IBM-SPCMS-Windows64.exe
|
2. Create a directory on the client system that you want to manage, and copy the
installation package there.
Tip: If you previously installed and uninstalled the package, select All when
prompted to replace the existing installation files.
4. Run the installation batch file from the directory where you extracted the
installation files and associated files. This is the directory that you created in
step 2 on page 139.
v On Linux client systems, issue the following command:
./install.sh
v On Windows client systems, double-click install.bat.
5. To install the client management service, follow the instructions in the IBM
Installation Manager wizard.
If IBM Installation Manager is not already installed on the client system, you
must select both IBM Installation Manager and IBM Spectrum Protect Client
Management Services.
Tip: You can accept the default locations for the shared resources directory and
the installation directory for IBM Installation Manager.
What to do next
Follow the instructions in “Verifying that the client management service is installed
correctly” on page 141.
You must install the client management service on the same computer as the
backup-archive client.
The input directory, which is in the directory where the installation package is
extracted, contains the following sample response file:
install_response_sample.xml
You can use the sample file with the default values, or you can customize it.
Tip: If you want to customize the sample file, create a copy of the sample file,
rename it, and edit the copy.
Procedure
1. Create a response file based on the sample file, or use the sample file,
install_response_sample.xml.
In either case, ensure that the response file specifies the port number for the
client management service. The default port is 9028. For example:
<variable name='port' value='9028'/>
2. Run the command to install the client management service and accept the
license. From the directory where the installation package file is extracted, issue
the following command, where response_file represents the response file path,
including the file name:
On a Linux client system:
./install.sh -s -input response_file -acceptLicense
For example:
./install.sh -s -input /cms_install/input/install_response.xml -acceptLicense
On a Windows client system:
install.bat -s -input response_file -acceptLicense
For example:
install.bat -s -input c:\cms_install\input\install_response.xml -acceptLicense
What to do next
Follow the instructions in “Verifying that the client management service is installed
correctly.”
Procedure
On the client system, at the command line, run the following commands to view
the configuration of the client management service:
v On Linux client systems, issue the following command:
client_install_dir/cms/bin/CmsConfig.sh list
Ensure that the client management service is installed and started on the client
system.
Verify whether the default configuration is used. The default configuration is not
used if either of the following conditions is met:
v The client management service does not use the default port number, 9028.
v The backup-archive client is not accessed by the same IP address as the client
system where the backup-archive client is installed. For example, a different IP
address might be used in the following situations:
– The computer system has two network cards. The backup-archive client is
configured to communicate on one network, while the client management
service communicates on the other network.
– The client system is configured with the Dynamic Host Configuration
Protocol (DHCP). As a result, the client system is dynamically assigned an IP
address, which is saved on the IBM Spectrum Protect server during the
previous backup-archive client operation. When the client system is restarted,
the client system might be assigned a different IP address. To ensure that the
Operations Center can always find the client system, you specify a fully
qualified domain name.
Procedure
To configure the Operations Center to use the client management service, complete
the following steps:
1. On the Clients page of the Operations Center, select the client.
2. Click Details.
3. Click the Properties tab.
4. In the Remote diagnostics URL field in the General section, specify the URL
for the client management service on the client system.
The address must start with https. The following table shows examples of the
remote diagnostics URL.
5. Click Save.
What to do next
You can access client diagnostic information such as client log files from the
Diagnosis tab in the Operations Center.
Procedure
v To stop, start, or restart the client management service on Linux client systems,
issue the following commands:
– To stop the service:
service cms.rc stop
– To start the service:
service cms.rc start
– To restart the service:
service cms.rc restart
v On Windows client systems, open the Services window, and stop, start, or restart
the IBM Spectrum Protect Client Management Services service.
You must use IBM Installation Manager to uninstall the client management service.
If you no longer plan to use IBM Installation Manager, you can also uninstall it.
Procedure
1. Uninstall the client management service from the client system:
a. Open IBM Installation Manager:
v On the Linux client system, in the directory where IBM Installation
Manager is installed, go to the eclipse subdirectory (for example,
/opt/IBM/InstallationManager/eclipse), and issue the following
command:
./IBMIM
v On the Windows client system, open IBM Installation Manager from the
Start menu.
b. Click Uninstall.
c. Select IBM Spectrum Protect Client Management Services, and click Next.
d. Click Uninstall, and then click Finish.
e. Close the IBM Installation Manager window.
2. If you no longer require IBM Installation Manager, uninstall it from the client
system:
a. Open the IBM Installation Manager uninstall wizard:
v On the Linux client system, change to the IBM Installation Manager
uninstallation directory (for example, /var/ibm/InstallationManager/
uninstall), and issue the following command:
./uninstall
v On the Windows client system, click Start > Control Panel. Then, click
Uninstall a program > IBM Installation Manager > Uninstall.
b. In the IBM Installation Manager window, select IBM Installation Manager
if it is not already selected, and click Next.
c. Click Uninstall, and click Finish.
CmsConfig utility
If you are not using the default client configuration, you can run the CmsConfig
utility on the client system to discover and add the location of the client log files to
the client-configuration.xml file. After you complete the configuration, the client
management service can access the client log files and make them available for
basic diagnostic functions in the Operations Center.
You can also use the CmsConfig utility to show the configuration of the client
management service and to remove a node name from the client-
configuration.xml file.
To use the CmsConfig utility, issue any command that is included in the utility.
Ensure that you enter each command on a single line.
You can use the CmsConfig discover command to automatically discover options
files and log files, and add them to the client configuration file,
client-configuration.xml. In this way, you can help to ensure that the client
management service can access the client log files and make them available for
diagnosis in the Operations Center.
Typically, the client management service installer runs the CmsConfig discover
command automatically. However, you must run this command manually if you
changed the backup-archive client, such as added a client, or changed the server
configuration or location of log files.
To update the client configuration file, the client management service must access
one or more log files, such as dsmerror.log and dsmsched.log. For best results, run
the CmsConfig discover command in the same directory and by using the same
environment variables as you would for the backup-archive client command, dsmc.
In this way, you can improve the chances of finding the correct log files.
If the client options file is in a custom location or it does not have a typical options
file name, you can also specify the path for the client options file to narrow the
scope of the discovery.
Syntax
►► CmsConfig discover ►◄
configPath
Parameters
configPath
The path of the client options file (typically dsm.opt). Specify the configuration
path when the client options file is not in a default location or it does not have
the default name. The client management service loads the client options file
and discovers the client nodes and logs from there. This parameter is optional.
On a Linux client system, the client management service always loads the
client user-options file (dsm.opt) first, and then looks for the client
system-options file (typically dsm.sys). The value of the configPath parameter,
however, is always the client user-options file.
server.example.com:1500 SUSAN
/opt/tivoli/tsm/client/ba/bin/dsmerror.log
server.example.com:1500 SUSAN
C:\Program Files\Tivoli\TSM\baclient\dsmerror.log
Use the CmsConfig addnode command to manually add a client node definition to
the client-configuration.xml configuration file. The node definition contains
information that is required by the client management service to communicate with
the IBM Spectrum Protect server.
Use this command only if the client options file or client log files are stored in a
non-default location on the client system.
Syntax
Parameters
nodeName
The client node name that is associated with the log files. For most client
systems, only one node name is registered to the IBM Spectrum Protect server.
However, on systems with multiple users, such as Linux client systems, there
can be more than one client node name. This parameter is required.
serverIP
The TCP/IP address of the IBM Spectrum Protect server that the client
management service authenticates to. This parameter is required.
You can specify a 1 - 64 character TCP/IP address for the server. The server
address can be a TCP/IP domain name or a numeric IP address. The numeric
IP address can be either a TCP/IP v4 or TCP/IP v6 address. You can use IPv6
addresses only if the commmethod V6Tcpip option is specified for the client
system.
Examples:
v server.example.com
v 192.0.2.0
v 2001:0DB8:0:0:0:0:0:0
serverPort
The TCP/IP port number that is used to communicate with the IBM Spectrum
Protect server. You can specify a value in the range 1 - 32767. This parameter is
required.
Example: 1500
serverProtocol
The protocol that is used for communication between the client management
service and the IBM Spectrum Protect server. This parameter is required.
You can specify one of the following values.
Value Meaning
NO_SSL The SSL security protocol is not used.
SSL The SSL security protocol is used.
FIPS The TLS 1.2 protocol is used in Federal
Information Processing Standard (FIPS)
mode.
Tip: Alternatively, you can enter TLS_1.2 to
specify that the TLS 1.2 protocol is used in
FIPS mode.
optPath
The fully qualified path of the client options file. This parameter is required.
Example (Linux client): /opt/backup_tools/tivoli/tsm/baclient/dsm.sys
Example (Windows client): C:\backup tools\Tivoli\TSM\baclient\dsm.opt
Add the node definition for client node SUSAN to the client-configuration.xml
file. The IBM Spectrum Protect server that the node communicates with is
server.example.com on server port 1500. The SSL security protocol is not used. The
path for the client system options file is /opt/tivoli/tsm/client/ba/bin/
custom_opt.sys.
Command:
./CmsConfig.sh addnode SUSAN server.example.com 1500 NO_SSL
/opt/tivoli/tsm/client/ba/bin/custom_opt.sys
Output:
Adding node.
Add the node definition for client node SUSAN to the client-configuration.xml
file. The IBM Spectrum Protect server that the node communicates with is
server.example.com on server port 1500. The SSL security protocol is not used. The
path for the client options file is c:\program files\tivoli\tsm\baclient\
custom.opt.
Use the CmsConfig setopt command to set the path of the client options file
(typically dsm.opt) to an existing node definition without first reading the contents
of the client options file.
This command can be helpful if the client options file does not have a typical
name or is in a non-default location.
Requirement: If the node definition does not exist, you must first issue the
CmsConfig addnode command to create the node definition.
Unlike the CmsConfig discover command, the CmsConfig setopt command does
not create associated log definitions in the client-configuration.xml file. You
must use the CmsComfog addlog command to create the log definitions.
Syntax
Parameters
nodeName
The client node name that is associated with the log files. For most client
systems, only one node name is registered to the IBM Spectrum Protect server.
However, on systems with multiple users, such as Linux client systems, there
can be more than one client node name. This parameter is required.
optPath
The fully qualified path of the client options file. This parameter is required.
Example (Linux client): /opt/backup_tools/tivoli/tsm/baclient/dsm.opt
Example (Windows client): C:\backup tools\Tivoli\TSM\baclient\dsm.opt
Set the client options file path for the node SUSAN. The path for the client options
file is /opt/tivoli/tsm/client/ba/bin/dsm.opt.
Set the client options file path for the node SUSAN. The path for the client options
file is c:\program files\tivoli\tsm\baclient\dsm.opt.
On a Linux client system, use the CmsConfig setsys command to set the path of
the client system-options file (typically dsm.sys) to an existing node definition
without first reading the contents of the client system-options file.
This command can be helpful if the client system-options file does not have a
typical name or is in a non-default location.
Requirement: If the node definition does not exist, you must first issue the
CmsConfig addnode command to create the node definition.
Unlike the CmsConfig discover command, the CmsConfig setsys command does
not create associated log definitions in the client-configuration.xml file. You
must use the CmsComfog addlog command to create the log definitions.
Syntax
Parameters
nodeName
The client node name that is associated with the log files. For most client
systems, only one node name is registered to the IBM Spectrum Protect server.
However, on systems with multiple users, such as Linux client systems, there
can be more than one client node name. This parameter is required.
sysPath
The fully qualified path of the client system-options file. This parameter is
required.
Example: /opt/backup_tools/tivoli/tsm/baclient/dsm.sys
Example
Set the client system-options file path for the node SUSAN. The path for the client
system-options file is /opt/tivoli/tsm/client/ba/bin/dsm.sys.
Use the CmsConfig addlog command to manually add the location of client log files
to an existing node definition in the client-configuration.xml configuration file.
Use this command only if the client log files are stored in a non-default location on
the client system.
Requirement: If the node definition does not exist, you must first issue the
CmsConfig addnode command to create the node definition.
Syntax
► ►◄
language dateFormat timeFormat encoding
Parameters
nodeName
The client node name that is associated with the log files. For most client
systems, only one node name is registered to the IBM Spectrum Protect server.
However, on systems with multiple users, such as Linux client systems, there
can be more than one client node name. This parameter is required.
logPath
The fully qualified path of the log files. This parameter is required.
Example (Linux client): /opt/backup_tools/tivoli/tsm/baclient/dsmerror.log
Language Locale
Brazilian Portuguese pt_BR
Chinese, Simplified zh_CN
Chinese, Traditional zh_TW
Czech cs_CZ
English en_US
French fr_FR
German de_DE
Hungarian hu_HU
Italian it_IT
Japanese ja_JP
Korean ko_KR
Polish pl_PL
Russian ru_RU
Spanish es_ES
dateFormat
The date format of the time stamp entries in the client log file. This parameter
is optional. However, if you specify this parameter, you must also specify the
language, timeFormat, and encoding parameters.
The following table shows the date formats for the languages.
Tip: Instead of using one of the date formats that are listed in the table, you
can specify a date format by using the backup-archive client dateformat
option.
timeFormat
The time format of the time stamp entries in the client log file. This parameter
is optional. However, if you specify this parameter, you must also specify the
language, dateFormat, and encoding parameters.
The following table shows examples of default time formats that you can
specify and client operating systems.
Tip: Instead of using one of the time formats that are listed in the table, you
can specify a time format by using the backup-archive client timeformat
option.
encoding
The character encoding of the entries in the client log files. This parameter is
optional. However, if you specify this parameter, you must also specify the
language, dateFormat, and timeFormat parameters.
For Linux client systems, the typical character encoding is UTF-8. For Windows
client systems, the default encoding values are shown in the following table. If
your client system is customized differently, use the encoding parameter to
specify a value other than the default.
Language Encoding
Chinese, Simplified CP936
Chinese, Traditional CP950
Czech Windows-1250
English Windows-1252
French Windows-1252
Language Encoding
German Windows-1252
Hungarian Windows-1250
Italian Windows-1252
Japanese CP932
Korean CP949
Polish Windows-1250
Portuguese, Brazilian Windows-1252
Russian Windows-1251
Spanish Windows-1252
Add the client log file location to the existing definition for client node SUSAN in
the client-configuration.xml file. The path for the client log file is
/usr/work/logs/dsmerror.log. Add the language specification, time format, and
date format for the French locale.
Add the client log file location to the existing definition for client node SUSAN in
the client-configuration.xml. The path for the client log file is
c:\work\logs\dsmerror.log. Add the language specification, time format, and date
format for the French locale.
Use the CmsConfig remove command to remove a client node definition from the
client configuration file, client-configuration.xml. All log file entries that are
associated with the client node name are also removed.
Syntax
Parameters
nodeName
The client node name that is associated with the log files. For most client
systems, only one node name is registered to the IBM Spectrum Protect server.
However, on systems with multiple users, such as Linux client systems, there
can be more than one client node name. This parameter is required.
Remove the node definition for SUSAN from the client-configuration.xml file.
Remove the node definition for SUSAN from the client-configuration.xml file.
Use the CmsConfig verify command to verify that a node definition is correctly
created in the client-configuration.xml file. If there are errors with the node
definition or the node is not correctly defined, you must correct the node definition
by using the appropriate CmsConfig commands.
Syntax
Parameters
nodeName
The client node name that is associated with the log files. For most client
systems, only one node name is registered to the IBM Spectrum Protect server.
However, on systems with multiple users, such as Linux client systems, there
can be more than one client node name. This parameter is required.
cmsPort
The TCP/IP port number that is used to communicate with the client
management service. Specify the port number if you did not use the default
port number when you installed the client management service. The default
port number is 9028. This parameter is optional.
Verify that the node definition for the node SUSAN is created correctly in the
client-configuration.xml file.
During the verification process, you are prompted to enter the client node name or
administrative user ID and password.
Output:
Verifying node.
Verify that the node definition for the node SUSAN is created correctly in the
client-configuration.xml file.
During the verification process, you are prompted to enter the client node name or
administrative user ID and password.
Output:
Verifying node.
Use the CmsConfig list command to show the client management service
configuration.
Syntax
►► CmsConfig list ►◄
Show the configuration of the client management service. Then, view the output to
ensure that you entered the command correctly.
Show the configuration of the client management service. Then, view the output to
ensure that you entered the command correctly.
Output:
Listing CMS configuration
Use the CmsConfig help command to show the syntax of CmsConfig utility
commands.
Syntax
►► CmsConfig help ►◄
API developers can create REST applications to initiate the following client actions:
v Query and update client options files (for example, the dsm.sys file on Linux
clients and the dsm.opt file on Linux and Windows clients).
v Query the status of the IBM Spectrum Protect client acceptor and the scheduler.
v Back up and restore files for a client node.
v Extend the capabilities of the client management service with scripts.
For detailed information about the client management service REST API, see the
Client Management Services REST API Guide.
Procedure
1. Open IBM Installation Manager.
You can open IBM Installation Manager from the Start menu.
2. Click Uninstall.
3. Select the option for the Operations Center, and click Next.
4. Click Uninstall.
5. Click Finish.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the
following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command:
imcl.exe -c
3. To uninstall, enter 5.
4. Choose to uninstall from the IBM Spectrum Protect package group.
5. Enter N for Next.
6. Choose to uninstall the Operations Center package.
7. Enter N for Next.
8. Enter U for Uninstall.
9. Enter F for Finish.
To uninstall the Operations Center, leave modify="false" set for the Operations
Center entry in the response file.
If you want to customize the response file, you can modify the options that are in
the file. For information about response files, see Response files.
Procedure
1. In the directory where IBM Installation Manager is installed, go to the
following subdirectory:
eclipse\tools
For example:
C:\Program Files\IBM\Installation Manager\eclipse\tools
2. From the tools directory, issue the following command, where response_file
represents the response file path, including the file name:
imcl.exe -input response_file -silent
The following command is an example:
imcl.exe -input C:\tmp\input\uninstall_response.xml -silent
The rollback function is available only after the Operations Center is updated.
When IBM Installation Manager rolls back a package to a previous version, the
current version of the package files is uninstalled, and an earlier version is
reinstalled.
To roll back to a previous version, IBM Installation Manager must access files for
that version. By default, these files are saved during each successive installation.
Because the number of saved files increases with each installed version, you might
want to delete these files from your system on a regular schedule. However, if you
delete the files, you cannot roll back to a previous version.
To delete saved files or to update your preference for saving these files in future
installations, complete the following steps:
1. In IBM Installation Manager, click File > Preferences.
2. On the Preferences page, click Files for Rollback, and specify your preference.
Procedure
To roll back to a previous version of the Operations Center, use the Roll Back
function of IBM Installation Manager.
You can view installation log files by clicking File > View Log from the Installation
Manager tool. To collect these log files, click Help > Export Data for Problem
Analysis from the Installation Manager tool.
Overview
The IBM Spectrum Protect family of products includes the following major
accessibility features:
v Keyboard-only operation
v Operations that use a screen reader
The IBM Spectrum Protect family of products uses the latest W3C Standard,
WAI-ARIA 1.0 (www.w3.org/TR/wai-aria/), to ensure compliance with US Section
508 (www.access-board.gov/guidelines-and-standards/communications-and-it/
about-the-section-508-standards/section-508-standards) and Web Content
Accessibility Guidelines (WCAG) 2.0 (www.w3.org/TR/WCAG20/). To take
advantage of accessibility features, use the latest release of your screen reader and
the latest web browser that is supported by the product.
Keyboard navigation
Interface information
User interfaces do not have content that flashes 2 - 55 times per second.
Web user interfaces rely on cascading style sheets to render content properly and
to provide a usable experience. The application provides an equivalent way for
low-vision users to use system display settings, including high-contrast mode. You
can control font size by using the device or web browser settings.
Web user interfaces include WAI-ARIA navigational landmarks that you can use to
quickly navigate to functional areas in the application.
Vendor software
The IBM Spectrum Protect product family includes certain vendor software that is
not covered under the IBM license agreement. IBM makes no representation about
the accessibility features of these products. Contact the vendor for accessibility
information about its products.
In addition to standard IBM help desk and support websites, IBM has a TTY
telephone service for use by deaf or hard of hearing customers to access sales and
support services:
TTY service
800-IBM-3383 (800-426-3383)
(within North America)
For more information about the commitment that IBM has to accessibility, see IBM
Accessibility (www.ibm.com/able).
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at www.ibm.com/legal/copytrade.shtml.
Linear Tape-Open, LTO, and Ultrium are trademarks of HP, IBM Corp. and
Quantum in the U.S. and other countries.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Permissions for the use of these publications are granted subject to the following
terms and conditions.
Applicability
These terms and conditions are in addition to any terms of use for the IBM
website.
Personal use
You may reproduce these publications for your personal, noncommercial
use provided that all proprietary notices are preserved. You may not
distribute, display or make derivative work of these publications, or any
portion thereof, without the express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within
your enterprise provided that all proprietary notices are preserved. You
may not make derivative works of these publications, or reproduce,
distribute or display these publications or any portion thereof outside your
enterprise, without the express consent of IBM.
Notices 173
Rights Except as expressly granted in this permission, no other permissions,
licenses or rights are granted, either express or implied, to the publications
or any information, data, software or other intellectual property contained
therein.
IBM reserves the right to withdraw the permissions granted herein
whenever, in its discretion, the use of the publications is detrimental to its
interest or, as determined by IBM, the above instructions are not being
properly followed.
You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United
States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE
PUBLICATIONS. THE PUBLICATIONS ARE PROVIDED "AS-IS" AND
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES
OF MERCHANTABILITY, NON-INFRINGEMENT, AND FITNESS FOR A
PARTICULAR PURPOSE.
This Software Offering does not use cookies or other technologies to collect
personally identifiable information.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, see IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details in the
section entitled “Cookies, Web Beacons and Other Technologies,” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
N P
Named Pipes 58 package 23, 117
names, best practices package group 23, 117
database name 42 Passport Advantage 45
directories for server 42 password
instance user ID 42 Operations Center truststore file 118, 136
server instance 42 password for secure communications 118
server name 42 performance
new features vii configuration best practices 19
Operations Center 110
Index 179
planning, capacity server database
database space requirements checklist for disks 7
estimates based on number of files 25 directories 7
estimates based storage pool capacity 27 reorganization options 62
starting size 24 storage paths 7
recovery log space requirements server hardware
active log mirror 40 checklist for server system 4
recovery log space requirementsv 28 checklist for storage pools on disk 16
port number storage technology choices 18
Operations Center 118, 138 server instance 53, 56
prerequisite checks server instance, creating 56
Operations Center 109 server instances
publications vi naming 42
naming best practices 42
server license 68
R server recovery log
checklist for disks 9
recovery log
server,
archive failover log space 40
activating 63
installing 60
setting up 63
reference, DB2 commands 99
starting 63
REGISTER LICENSE command 68
server, IBM Spectrum Protect
Remote Execution Protocol 55
halting 68
repository 23, 117
options 57
requirements
services
client management service 115
starting the server as a Windows service
requirements for installation 20
configuration 64
resource requirements
procedure 65
Operations Center 110
services on Windows systems
reverting
database manager (DB2TSM1) 167
Windows cluster 97
DB2 167
reverting to previous server version 95
server 167
REXEC 55
SET DBRECOVERY 68
rollback 41, 42
shared resources directory 23, 117
Operations Center 161
silent installation
IBM Spectrum Protect 48
software requirements
S IBM Spectrum Protect 20
secure communications 133, 135 spoke server 110
Secure Sockets Layer 133, 135 adding 129
Secure Sockets Layer (SSL) SSL 133, 135
communication using 59 password for truststore file 118, 136
Transport Layer Security (TLS) 59 SSL (Secure Sockets Layer)
server communication using 59
after upgrade Transport Layer Security 59
reverting to previous server version 95 SSLTCPADMINPORT option 58
before upgrade SSLTCPPORT option 58
importance of preparation steps 95 stand-alone mode 67
naming best practices 42 starting
performance optimization 4 client management service 143
starting server 63
maintenance mode 67 startup
stand-alone mode 67 server
starting as a service maintenance mode 67
configuration 64 stand-alone mode 67
procedure 65 status monitoring 110
stopping 68 stopping
upgrading client management service 143
to 8.1 79 server 68
V7.1 to V8.1 80 storage pools 16
server active log reverting to previous server version 95
checklist for disks 9 storage technology selection 18
server AIX storage technology selection 18
upgrading summary of amendments
V8.1 80 Version 8.1 vii
server archive log system requirements
checklist for disks 9 Operations Center 109, 110, 113, 114
U
Uninstall
IBM Installation Manager 106
uninstalling 105
client management service 144
uninstalling and reinstalling 105
updating 50, 125
upgrade
server
estimated time 80
to 8.1 79
V7.1 to V8.1 80
upgrade AIX
server
V8.1 80
upgrading Operations Center 107
URL
Operations Center 138
US English 50
User Account Control 55
user ID 51
V
verifying installation
client management service 141
W
web server
starting 138
stopping 138
Windows
cluster reverting 97
system requirements 20
Windows clustered environment
applying a fix pack to a V8 server 75
Windows Server 55
Index 181
182 IBM Spectrum Protect for Windows: Installation Guide
IBM®
Printed in USA