Data Protection for Vmware Installation Guide

Total Page:16

File Type:pdf, Size:1020Kb

Data Protection for Vmware Installation Guide IBM Spectrum Protect for Virtual Environments Version 8.1.0 Data Protection for VMware Installation Guide IBM IBM Spectrum Protect for Virtual Environments Version 8.1.0 Data Protection for VMware Installation Guide IBM Note: Before you use this information and the product it supports, read the information in “Notices” on page 113. Second edition (February 2017) This edition applies to version 8, release 1, modification 0 of IBM Spectrum Protect for Virtual Environments (product number 5725-X00) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2011, 2017. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this publication ........ v Configuring a data mover node for tagging support 46 Who should read this publication ....... v Configuring your environment for full virtual Publications .............. v machine instant restore operations....... 48 1. Configuring the iSCSI software on the ESXi What's new in Version 8.1 ...... vii host ................ 49 2. Installing and configuring applications on the data mover ............. 49 Chapter 1. Installing and upgrading Data 3. Setting the Recovery Agent connection ... 50 Protection for VMware ........ 1 4. Configuring a dedicated iSCSI network for the Installable components ........... 1 ESXi host and data mover ........ 50 Data Protection for VMware vSphere GUI ... 3 Setting up communication with Transport Layer IBM Spectrum Protect recovery agent ..... 5 Security ............... 52 IBM Spectrum Protect extension ....... 6 Using a third-party certificate ....... 52 Data Protection for VMware command-line Enabling secure communication with the IBM interface ............... 7 Spectrum Protect server ......... 56 IBM Spectrum Protect file restore interface ... 7 VMware vCenter Server user privilege requirements 58 Data mover feature ........... 8 Data Protection for VMware vSphere GUI user roles 61 Planning to install Data Protection for VMware... 8 Data Protection for VMware GUI registration keys 64 Installation roadmap........... 9 Configuring the recovery agent GUI ...... 64 Installation scenarios .......... 10 Enabling secure communication from the System requirements .......... 10 recovery agent to the IBM Spectrum Protect Installing the Data Protection for VMware server ............... 69 components .............. 19 Locale settings ............. 72 Obtaining the Data Protection for VMware Log file activity ............. 73 installation package........... 20 Starting and running services for Data Protection for Installing the Data Protection for VMware VMware ............... 75 components by using the installation wizard .. 21 Installing the Data Protection for VMware Appendix A. Advanced configuration components in silent mode ........ 24 tasks ............... 77 Taking the first steps after you install Data Setting up the IBM Spectrum Protect nodes in a Protection for VMware ......... 29 vSphere environment ........... 78 Upgrading Data Protection for VMware ..... 31 Setting up the data mover nodes in a vSphere Upgrading Data Protection for VMware .... 31 environment .............. 79 Upgrading Data Protection for VMware on a Configuring the Data Protection for VMware Windows 64-bit system in silent mode .... 32 command-line interface in a vSphere environment . 84 Upgrading Data Protection for VMware on a vSphere environment command-line interface Linux system in silent mode........ 33 configuration checklist........... 86 Uninstalling Data Protection for VMware .... 34 Tape configuration guidelines ........ 89 Uninstalling Data Protection for VMware on Manually configuring an iSCSI device on a Linux Windows .............. 34 system ................ 91 Uninstalling Data Protection for VMware for Manually configuring an iSCSI device on a Windows in silent mode ......... 36 Windows system ............ 93 Uninstalling Data Protection for VMware a Linux Manually configuring the mount proxy nodes on a system ............... 36 Linux system .............. 95 Manually configuring the mount proxy nodes on a Chapter 2. Configuring Data Protection remote Windows system .......... 98 for VMware ............. 39 Manually configuring multiple client acceptor Configuring a new installation with the wizard .. 39 services on a Linux system ......... 100 Using the notebook to edit an existing installation 40 Modifying the VMCLI configuration file .... 102 Enabling the environment for file restore operations 40 Setting up file restore operations on Linux ... 42 Modifying options for file restore operations ... 43 File restore options ........... 44 Configuring log activity for file restore operations 45 File restore log activity options ....... 45 © Copyright IBM Corp. 2011, 2017 iii Appendix B. Migrating to an incremental-forever incremental backup strategy .......... 105 Appendix C. Accessibility features for the IBM Spectrum Protect product family ............... 111 Notices .............. 113 Glossary ............. 117 Index ............... 119 iv IBM Spectrum Protect for Virtual Environments: Data Protection for VMware Installation Guide About this publication IBM Spectrum Protect™ for Virtual Environments provides off-host block-level incremental backup and file recovery and instant restore from a full-VM backup for Windows and Linux guest machines. Block level incremental backups are available when you use IBM Spectrum Protect for Virtual Environments with the IBM Spectrum Protect data mover. Who should read this publication This publication is intended for users and administrators who want to install and configure IBM Spectrum Protect for Virtual Environments. Overview information, user tasks, backup and restore scenarios, command reference, and error messages are documented in the IBM Spectrum Protect for Virtual Environments: Data Protection for VMware User's Guide. Publications The IBM Spectrum Protect product family includes IBM Spectrum Protect Snapshot, IBM Spectrum Protect for Space Management, IBM Spectrum Protect for Databases, and several other storage management products from IBM®. To view IBM product documentation, see IBM Knowledge Center. © Copyright IBM Corp. 2011, 2017 v vi IBM Spectrum Protect for Virtual Environments: Data Protection for VMware Installation Guide What's new in Version 8.1 Data Protection for VMware Version 8.1 introduces new features and updates. For a list of new features and updates in this release, see Data Protection for VMware updates. © Copyright IBM Corp. 2011, 2017 vii viii IBM Spectrum Protect for Virtual Environments: Data Protection for VMware Installation Guide Chapter 1. Installing and upgrading Data Protection for VMware Installation of Data Protection for VMware includes planning, installation, and initial configuration. Installable components Data Protection for VMware includes several components that you can install to protect your virtual environment. Depending on the operating system environment, the following Data Protection for VMware features are available for installation: Restriction: Each installation package presents you with a user licensing file (EULA). If you do not accept the file, the installation process stops. Table 1. Available Data Protection for VMware features by operating system Component Linux Windows IBM Spectrum Protect recovery agent ' This component provides virtual mount and instant restore capabilities. Recovery agent command-line interface ' The command-line interface used for mount operations. Documents ' ' Documents include the readme and notices files. Data Protection for VMware enablement file ' ' This component enables IBM Spectrum Protect to run the following backup types: v Incremental-forever incremental backup v Incremental-forever full backup This component is required for application protection. If you offload backup workloads, this file must be installed on the vStorage Backup Server. © Copyright IBM Corp. 2011, 2017 1 Table 1. Available Data Protection for VMware features by operating system (continued) Component Linux Windows Data Protection for VMware vSphere GUI ' ' This component is a graphical user interface (GUI) that accesses VM data on the VMware vCenter Server. The content of the GUI is available in these views: v A web browser view. This view is accessed in a supported web browser by using the URL for the GUI web server host. For example: https://guihost.mycompany.com:9081/TsmVMwareUI/ v The IBM Spectrum Protect extension view in the VMware vSphere Web Client. This panels in this view are uniquely designed to integrate within the web client, but data and commands for this view are obtained from the same GUI web server as the other views. The IBM Spectrum Protect extension provides a subset of the functions that are available in the web browser view and some additional functions. Configuration and advanced reporting functions are not offered in this view. You can specify one or more views during installation. File restore GUI 1 ' This component is a web-based GUI that enables you to restore files from a VMware virtual machine backup without administrator assistance. The GUI is installed automatically when the Data Protection for VMware GUI is installed. It is enabled through the configuration wizard. Data mover ' ' The IBM Spectrum Protect data mover moves data for Data Protection for VMware. This functionality is referred to as the data mover. The data mover moves data from the virtual environment to the IBM Spectrum
Recommended publications
  • Visi on Calc Working in Windows.Pdf
    VISI ON CALC WORKING IN WINDOWS The Spreadsheet Revisited Since the VisiCalc® program was introduced five years ago, the spreadsheet has become a common productivity tool in business, education, and the home . In the United States alone, there are literally millions of spreadsheet users . Spreadsheet products have continued to evolve during this period-both in their capabilities and functions and in the uses to which they've been put . Today, spreadsheet programs like the VisiCalc program are used in applications as diverse as farm management, estate planning, and inventory balancing . Visi On CalcTM By giving you access to several different spreadsheets at the same time, each displayed in its own window, the Visi On Calc program gives you back the flexibility you had when you could move paper worksheets around on your desk . Gone are the limitations of working with one huge electronic spreadsheet containing many different kinds o f data. The new Visi On Calc program is a significant step in the evolution of spreadsheet products . It's a result of many years of study and development that gives today's user perhaps the broadest set of modeling capabilities to be found in any existing spreadsheet product . Among these capabilities, the Visi On Calc spreadsheet program has these unique characteristics : Windows The Visi On windowing environment lets you use and display several spreadsheets at the same time . Because of this, you can use them more naturally-more like you would do if you were constructing them on paper . No longer do you have to fit profit and loss, cash budget, and balance sheets into one unwieldy spreadsheet, as with conventional spreadsheet programs .
    [Show full text]
  • Using EMC VNX Storage with Vmware Vsphere Techbook CONTENTS
    Using EMC® VNX® Storage with VMware vSphere Version 4.0 TechBook P/N H8229 REV 05 Copyright © 2015 EMC Corporation. All rights reserved. Published in the USA. Published January 2015 EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. All other trademarks used herein are the property of their respective owners. For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com). 2 Using EMC VNX Storage with VMware vSphere TechBook CONTENTS Preface Chapter 1 Configuring VMware vSphere on VNX Storage Technology overview................................................................................... 18 EMC VNX family..................................................................................... 18 FLASH 1st.............................................................................................. 18 MCx multicore optimization..................................................................
    [Show full text]
  • DMFS - a Data Migration File System for Netbsd
    DMFS - A Data Migration File System for NetBSD William Studenmund Veridian MRJ Technology Solutions NASAAmes Research Center" Abstract It was designed to support the mass storage systems de- ployed here at NAS under the NAStore 2 system. That system supported a total of twenty StorageTek NearLine ! have recently developed DMFS, a Data Migration File tape silos at two locations, each with up to four tape System, for NetBSD[I]. This file system provides ker- drives each. Each silo contained upwards of 5000 tapes, nel support for the data migration system being devel- and had robotic pass-throughs to adjoining silos. oped by my research group at NASA/Ames. The file system utilizes an underlying file store to provide the file The volman system is designed using a client-server backing, and coordinates user and system access to the model, and consists of three main components: the vol- files. It stores its internal metadata in a flat file, which man master, possibly multiple volman servers, and vol- resides on a separate file system. This paper will first man clients. The volman servers connect to each tape describe our data migration system to provide a context silo, mount and unmount tapes at the direction of the for DMFS, then it will describe DMFS. It also will de- volman master, and provide tape services to clients. The scribe the changes to NetBSD needed to make DMFS volman master maintains a database of known tapes and work. Then it will give an overview of the file archival locations, and directs the tape servers to move and mount and restoration procedures, and describe how some typi- tapes to service client requests.
    [Show full text]
  • Data Protection and Recovery in the Small and Mid-Sized Business (SMB)
    Data Protection and Recovery in the Small and Mid-sized Business (SMB) An Outlook Report from Storage Strategies NOW By Deni Connor, Patrick H. Corrigan and James E. Bagley Intern: Emily Hernandez October 11, 2010 Storage Strategies NOW 8815 Mountain Path Circle Austin, Texas 78759 Note: The information and recommendations made by Storage Strategies NOW, Inc. are based upon public information and sources and may also include personal opinions both of Storage Strategies NOW and others, all of which we believe are accurate and reliable. As market conditions change however and not within our control, the information and recommendations are made without warranty of any kind. All product names used and mentioned herein are the trademarks of their respective owners. Storage Strategies NOW, Inc. assumes no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or reliance upon, the information and recommendations presented herein, nor for any inadvertent errors which may appear in this document. This report is purchased by Geminare, who understands and agrees that the report is furnished solely for its internal use only and may not be furnished in whole or in part to any other person other than its directors, officers and employees, without the prior written consent of Storage Strategies NOW. Copyright 2010. All rights reserved. Storage Strategies NOW, Inc. 1 Sponsor 2 Table of Contents Sponsor ..................................................................................................................................................................
    [Show full text]
  • [1 ] Storagetek Automated Cartridge System
    StorageTek[1] Automated Cartridge System Library Software Product Information Release 8.4 E62371-05 March 2018 StorageTek Automated Cartridge System Library Software Product Information, Release 8.4 E62371-05 Copyright © 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Compass™ Virtual Tape Library a High-Performance, Software-Defined Backup Solution to Manage Your Existing Infrastructure’S Tape Libraries
    COBALT IRON DATASHEET Compass™ Virtual Tape Library A high-performance, software-defined backup solution to manage your existing infrastructure’s tape libraries FEATURES What is Compass VTL Fully integrated VTL functionality within The VTL market is at the precipice of disruption where organizations are now directed to Compass data protection modernize and unify the enterprise data protection environment. Customers still have platform requirements for tape operations but they require operational simplicity and cost Eliminate physical tape effectiveness. Cobalt Iron introduces a software-defined VTL that is fully integrated media, transport, and into its Compass SaaS platform. Unlike any other VTL solution, Compass VTL is a storage costs software-enabled feature that is directly integrated within an end-to-end data protection Fully automated backup, restore, and disaster solution. With Compass VTL, organizations can deploy a single, unified solution that recovery of virtual tape unleashes data from traditional physical and virtual tape data silos all while modernizing libraries, drives, and tape environments which require tape resources for backup and recovery. Emulates multi-platform, heterogeneous tape environments Compass VTL Benefits Leverage multi-tier storage both on-premises and in the cloud Intelligently scales locally SIMPLICITY FEATURES SAVINGS and in the cloud Direct VTL integration Enterprise data protection With Compass VTL, organizations Incorporates AES 256 bit encryption and with industry-leading solution delivered in
    [Show full text]
  • The Future of Virtualization Technology
    The Future of Virtualization Technology Stephen Alan Herrod VP of Technology VMware Agenda •Virtualization Today •Technology Trends and the Future Datacenter •Future directions • CPU Virtualization • I/O Virtualization • Virtual appliances •Conclusions 2 X86 Server Virtualization Basics Application Operating System Before Server Virtualization: Single OS image per machine Software and hardware tightly coupled Running multiple applications on same machine often creates conflict Underutilized resources 3 X86 Server Virtualization Basics VM1 VM2 App App Application Operating System Operating System Virtualization Layer Operating System Before Server Virtualization: After Server Virtualization: Single OS image per machine Virtual machines (VMs) break 1-to-1 dependency between OS and HW Software and hardware tightly coupled Manage OS and application as single Running multiple applications on unit by encapsulating them into VMs same machine often creates conflict Strong isolation between VMs Underutilized resources Hardware-independent: they can be provisioned anywhere 4 X86 Server Virtualization Architectures •Hosted Architectures • Install as applications on Windows/Linux with small context switching driver • Leverage host IO stack and resource management • Examples include VMware Workstation, VMware Server, Microsoft Virtual PC, Microsoft Virtual Server, … •Bare-metal Architectures • “Hypervisor” installs directly on hardware • Approach acknowledged as direction for datacenter • VMware ESX Server, Xen, Microsoft Viridian 5 Bare-metal
    [Show full text]
  • IBM Storage: Product Guide
    IBM Storage Product guide Contents 3 Introduction 5 Portfolio 7 Storage for Data and AI 11 Storage for hybrid multicloud 71 Modern data protection 12 Storage for IBM Z 52 Storage for SAP HANA 92 Storage for containers 33 Storage networking 73 Converged infrastructure 40 IBM Services for storage 41 Conclusion Storage made simple Helping is the right foundation for your data-driven make hybrid multicloud. storage simple. Introduction Throughout the world, IBM Storage has the broadest portfolio in What’s possible Hybrid multicloud the industry that can enable organizations to Reduce complexity with container-enabled organizations in different effectively deliver data-driven IT services across with IBM Storage enterprise storage, deployed seamlessly their hybrid multicloud environments. Using across on-premises and hybrid cloud industries are using IBM® IBM solutions, enterprises can more efficiently storage environments. Storage and software-defined use their compute and storage resources to help achieve their goals. Whether it’s human storage (SDS) solutions for big genome research for cancer treatments and AI and data personalized medicine, aerodynamics testing Simplify your infrastructure with optimized data, analytics, AI and deep for race cars, or stock portfolio analysis for risk efficiency to drive faster results that are learning, high-performance assessment, IBM Storage can help enterprises massively scalable and globally available become more agile, modern and security-rich. from edge to inference. computing and the cloud to improve business results in Data protection and cyber resiliency their digital transformation. Maximize backup storage efficiency, data security and performance with maximum uptime and resiliency while lowering costs. Cloud paks and containers Surpass your business goals with speed, productivity and agility, all enabled by a security-rich, persistent storage infrastructure with enterprise-class services for private cloud and Red Hat® OpenShift® container storage.
    [Show full text]
  • Visi on AM Setup Guide.Pdf
    VisiCorp gratefully acknowledges the substantial contributions of Rosetta, Incorporated, for their prominent role in the development of the Visi On concept and family of products . VisiCorp also recognizes Graphic Software Systems, Incorporated, for their participation in the implementation of Visi On peripheral support . Copyright © 1983 VisiCorp All Rights Reserved. Printed in U .S .A . Visi On Applications Manager Program Copyright © 1983 VisiCorp All Rights Reserved. Bausch and Lomb Houston Instruments® is a registered trademark of Bausch and Lomb Houston Instruments Graftrax® is a registered trademark of Epson America, Inc . Hewlett-Packard® is a registered trademark of Hewlett-Parkard Company IBM® is a registered trademark of International Business Machines Corporation MSTM is a trademark of Microsoft Corporation NEC® is a registered trademark of Intek Manufacturing Company Qume® is a registered trademark of Qume Corporation Visi OnTM, Visi On CalcTM, Visi On Word TM, Visi On GraphTM, Visi On QueryTM, Visi On Convert to CalcTM, Visi On Convert to Word TM, Visi On Convert to Graph TM , VisiWord TM, VisiFileTM, and QuickStart TM are trademarks of VisiCorp TM VisiCalc®, VisiCalc® Advanced Version, and VisiTrend/Plot® are registered trademarks of VisiCorp Table of Contents III Table of Contents Before You Begin 1 Setting Up Your Computer Equipment 4 Getting Acquainted with the Keyboard 6 Preparing Your Hard Disk 8 Preparing Your Floppy Disks 9 Care of Your Floppy Disks 10 Inserting and Removing Floppy Disks 11 Installing the Visi OnTM
    [Show full text]
  • Optimizing Vmware Protection with HP and Veeam
    Optimizing VMware protection with HP and Veeam Technical white paper Table of contents Executive summary ............................................................................................................................... 2 Key points ....................................................................................................................................... 2 Introduction ......................................................................................................................................... 2 Technology overview ........................................................................................................................... 2 VMware vStorage APIs and Change Block Tracking ............................................................................. 3 Veeam Backup source-side deduplication ............................................................................................ 3 HP StoreOnce D2D appliance target-side deduplication ....................................................................... 3 Combining Veeam Backup inline and HP D2D target-based deduplication ................................................ 3 HP StoreOnce D2D appliances and Veeam Backup ................................................................................. 4 An appliance vs. general purpose disk for data protection .................................................................... 4 Important considerations when sizing your HP StoreOnce D2D appliance .................................................
    [Show full text]
  • An Interview with DAN BRICKLIN and BOB FRANKSTON OH 402
    An Interview with DAN BRICKLIN AND BOB FRANKSTON OH 402 Conducted by Martin Campbell-Kelly and Paul Ceruzzi on 7 May 2004 Needham, Massachusetts Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Dan Bricklin and Bob Frankston Interview 7 May 2004 Oral History 402 Abstract ABSTRACT: Dan Bricklin and Bob Frankston discuss the creation of VisiCalc, the pioneering spreadsheet application. Bricklin and Frankston begin by discussing their educational backgrounds and experiences in computing, especially with MIT’s Multics system. Bricklin then worked for DEC on typesetting and word-processing computers and, after a short time with a small start-up company, went to Harvard Business School. After MIT Frankston worked for White Weld and Interactive Data. The interview examines many of the technical, design, and programming choices in creating VisiCalc as well as interactions with Dan Fylstra and several business advisors. Bricklin comments on entries from his dated notebooks about these interactions. The interview reviews the incorporation of Software Arts in 1979, then describes early marketing of VisiCalc and the value of product evangelizing. There is discussion of rising competition from Mitch Kapor’s 1-2-3 and the steps taken by Fylstra’s software publishing company Personal Software (later VisiCorp). Part II of the interview begins with Bricklin and Frankston’s use of a Prime minicomputer to compile VisiCalc’s code for the Apple II computer. There is discussion of connections to Apple Computer and DEC, as well as publicity at the West Coast Computer Faire. The two evaluate the Fylstra essay, reviewing the naming of VisiCalc and discussing the division of labor between software developers and Fylstra as a software publisher.
    [Show full text]
  • Downloaded for Free From
    The Design of the NetBSD I/O Subsystems SungWon Chung Pusan National University 2 This book is dedicated to the open-source code developers in the NetBSD community. The original copy of this publication is available in an electronic form and it can be downloaded for free from http://arXiv.org. Copyright (c) 2002 by SungWon Chung. For non-commercial and personal use, this publication may be reproduced, stored in a retrieval system, or transmitted in any form by any means, electronic, mechanical, photocopying, recording or otherwise. For commercial use, no part of this publication can be reproduced by any means without the prior written permission of the author. NetBSD is the registered trademark of The NetBSD Foundation, Inc. Contents Preface 14 I Basics to Learn Filesystem 15 1 Welcome to the World of Kernel ! 17 1.1 How Does a System Call Dive into Kernel from User Program ? . 17 1.1.1 Example: write system call . 17 1.1.2 Ultra SPARC 0x7c CPU Trap . 18 1.1.3 Jump to the File Descriptor Layer . 24 1.1.4 Arriving at Virtual Filesystem Operations . 28 1.2 General Data Structures in Kernel such as List, Hash, Queue, ... 30 1.2.1 Linked-Lists . 30 1.2.2 Tail Queues . 34 1.2.3 Hash . 38 1.3 Waiting and Sleeping in Kernel . 39 1.4 Kernel Lock Manager . 39 1.4.1 simplelock and lock . 39 1.4.2 Simplelock Interfaces . 40 1.4.3 Lock Interfaces . 40 1.5 Kernel Memory Allocation . 43 1.6 Resource Pool Manager .
    [Show full text]