You are previewing IBM ProtecTIER Implementation and Best Practices Guide.
O'Reilly logo
IBM ProtecTIER Implementation and Best Practices Guide

Book Description

This IBM® Redbooks® publication provides best practice guidance for planning, installing, configuring, and employing the IBM TS7600 ProtecTIER® family of products. It provides the latest best practices for the practical application of ProtecTIER Software Version 3.4. This latest release introduces the new ProtecTIER Enterprise Edition TS7650G DD6 model high performance server. This book also includes information about the revolutionary and patented IBM HyperFactor® deduplication engine, along with other data storage efficiency techniques, such as compression and defragmentation.

The IBM System Storage® TS7650G ProtecTIER Deduplication Gateway and the IBM System Storage TS7620 ProtecTIER Deduplication Appliance Express are disk-based data storage systems: The Virtual Tape Library (VTL) interface is the foundation of ProtecTIER and emulates traditional automated tape libraries.


For your existing ProtecTIER solution, this guide provides best practices and suggestions to boost the performance and the effectiveness of data deduplication with regards to your application platforms for your VTL and FSI (systems prior to version 3.4).

When you build a ProtecTIER data deduplication environment, this guide can help IT architects and solution designers plan for the best option and scenario for data deduplication for their environments. This book can help you optimize your deduplication ratio, while reducing the hardware, power and cooling, and management costs.

This Redbooks publication provides expertise that was gained from an IBM ProtecTIER System Client Technical Specialist (CTS), Development, and Quality Assurance teams.

This planning should be done by the Sales Representative or IBM Business Partner, with the help of an IBM System CTS or IBM Solution Architect.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. IBM Redbooks promotions
  4. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  5. Summary of changes
    1. June 2016, Fourth Edition
  6. Part 1 General best practices
  7. Chapter 1. IBM ProtecTIER basics
    1. 1.1 Terminology
      1. 1.1.1 ProtecTIER Appliance terminology
      2. 1.1.2 ProtecTIER Gateway terminology
      3. 1.1.3 ProtecTIER replication terminology
    2. 1.2 ProtecTIER fundamental concepts
      1. 1.2.1 ProtecTIER with deduplication disabled
    3. 1.3 ProtecTIER models
      1. 1.3.1 ProtecTIER appliance
    4. 1.4 Remote support and call home
    5. 1.5 Simple Network Management Protocol (SNMP)
      1. 1.5.1 Alert filtering
      2. 1.5.2 Space thresholds
      3. 1.5.3 Email alerts
    6. 1.6 ProtecTIER command-line interface
    7. 1.7 Performance considerations for repository creation
      1. 1.7.1 Example 1: Calculate performance throughput
      2. 1.7.2 Example 2: Calculate performance throughput
  8. Chapter 2. Deduplication considerations
    1. 2.1 HyperFactor data deduplication
      1. 2.1.1 HyperFactor, deduplication, and bandwidth savings
    2. 2.2 ProtecTIER HyperFactor deduplication processing
    3. 2.3 Components of a ProtecTIER system
      1. 2.3.1 ProtecTIER server
      2. 2.3.2 HyperFactor deduplication algorithm
      3. 2.3.3 Disk storage subsystem
    4. 2.4 Benefits of ProtecTIER HyperFactor
      1. 2.4.1 Flexibility
      2. 2.4.2 High availability
      3. 2.4.3 High performance, low storage requirements, and lower environmental costs
    5. 2.5 General ProtecTIER deduplication considerations
      1. 2.5.1 Rethinking your overall backup strategy
      2. 2.5.2 Data reduction technologies should not be combined
      3. 2.5.3 Data streams must be in order
      4. 2.5.4 Data organization in your ProtecTIER repository
      5. 2.5.5 The dynamics of the ProtecTIER repository
      6. 2.5.6 ProtecTIER repository usage
      7. 2.5.7 Compression
      8. 2.5.8 Encryption
      9. 2.5.9 Database logs and other data types with high data change rates
      10. 2.5.10 Multiplexing
      11. 2.5.11 Tape block size
      12. 2.5.12 File size
    6. 2.6 Data types
      1. 2.6.1 Candidates for a high factoring ratio
      2. 2.6.2 Candidates for a low factoring ratio
  9. Chapter 3. Networking essentials
    1. 3.1 Network terminology
    2. 3.2 General configuration considerations
    3. 3.3 Bonding and teaming
      1. 3.3.1 The three bonding modes of ProtecTIER
    4. 3.4 Preferred ProtecTIER bonding configuration
      1. 3.4.1 VLANs
      2. 3.4.2 IP addresses
      3. 3.4.3 Routing the IP traffic
  10. Chapter 4. Virtual Tape Library guidelines
    1. 4.1 ProtecTIER Virtual Tape Library introduction
    2. 4.2 General preferred practices for the virtual tape library
    3. 4.3 Setting up the virtual library and cartridges
      1. 4.3.1 Creating libraries
  11. Chapter 5. ProtecTIER File System Interface: General introduction
    1. 5.1 ProtecTIER FSI network overview
      1. 5.1.1 ProtecTIER network
      2. 5.1.2 Network configuration considerations
      3. 5.1.3 Connecting a ProtecTIER server to the network
      4. 5.1.4 Replication
      5. 5.1.5 Disaster recovery: Test
      6. 5.1.6 Disaster recovery: Event
      7. 5.1.7 General FSI suggestions
    2. 5.2 File System Interface guidelines for NFS
      1. 5.2.1 ProtecTIER NFS authentication and security management
      2. 5.2.2 Understanding root squash
    3. 5.3 File System Interface guidelines for CIFS
      1. 5.3.1 Mounting the NFS export in a UNIX system
      2. 5.3.2 ProtecTIER authentication and user management
    4. 5.4 FSI file system scalability
  12. Chapter 6. Host attachment considerations for Virtual Tape Library
    1. 6.1 General suggestions
    2. 6.2 Device driver specifications
      1. 6.2.1 AIX specifications to work with VTL
      2. 6.2.2 Solaris specifications to work with VTL
      3. 6.2.3 Linux specifications to work with VTL
      4. 6.2.4 Windows specifications to work with VTL
      5. 6.2.5 IBM Tape Device Driver
      6. 6.2.6 Control path failover and data path failover
      7. 6.2.7 Persistent device naming
    3. 6.3 LUN masking for VTL systems
      1. 6.3.1 LUN masking methods and preferred practices
      2. 6.3.2 LUN masking configuration steps
  13. Part 2 Back-end storage subsystems
  14. Chapter 7. Back-end storage overview
    1. 7.1 Overview
      1. 7.1.1 ProtecTIER Planner tool
    2. 7.2 Dependencies from a back-end storage subsystem view
    3. 7.3 Dependencies from a ProtecTIER view
    4. 7.4 Smart storage subsystems
    5. 7.5 Key rules for a ProtecTIER server
    6. 7.6 Storage arrays configuration
      1. 7.6.1 General requirements
      2. 7.6.2 RAID considerations
      3. 7.6.3 LUNs
      4. 7.6.4 Expanding the repository
    7. 7.7 Storage area network fabric
      1. 7.7.1 Two Fibre Channel paths to each storage controller
      2. 7.7.2 Dedicated zones
      3. 7.7.3 Front-end zones
      4. 7.7.4 Back-end zones
      5. 7.7.5 SAN paths
  15. Chapter 8. IBM FlashSystem 900 with System Storage TS7650G ProtecTIER Deduplication Gateway
    1. 8.1 Introduction to flash technology
    2. 8.2 IBM FlashSystem overview
    3. 8.3 General FlashSystem considerations
    4. 8.4 Deploying the IBM FlashSystem 900 with IBM ProtecTIER
      1. 8.4.1 Creating user data and metadata volumes
      2. 8.4.2 Mapping the FlashSystem Volumes to the ProtecTIER System
      3. 8.4.3 Creating file systems and building the ProtecTIER repository
    5. 8.5 General preferred practices integrating FlashSystem 900 with ProtecTIER
      1. 8.5.1 ProtecTIER Metadata Planner preferred practices for FlashSystem 900
  16. Chapter 9. IBM Storwize Family and SAN Volume Controller
    1. 9.1 IBM Storwize V3700 and V5000 overview
    2. 9.2 General considerations: V3700, V5000, and V7000
      1. 9.2.1 Configuration steps: ProtecTIER repository
      2. 9.2.2 Creating empty user data and metadata storage pools
      3. 9.2.3 Creating the MDisk arrays or discovering unmanaged MDisks
      4. 9.2.4 Creating volumes with a sequential virtualization type
      5. 9.2.5 Creating a host connection for the ProtecTIER nodes by using the GUI
      6. 9.2.6 Mapping volumes to a host
      7. 9.2.7 Creating file systems and building the ProtecTIER repository
      8. 9.2.8 Expanding the repository
    3. 9.3 IBM System Storage SAN Volume Controller, IBM Storwize V7000, and V7000 Unified Storage
      1. 9.3.1 Storage virtualization introduction
      2. 9.3.2 Terminology
    4. 9.4 General notes
    5. 9.5 Firmware level
    6. 9.6 Fibre Channel connection topology
    7. 9.7 User data and metadata pool: General suggestions
      1. 9.7.1 Metadata pool
      2. 9.7.2 User data pool
    8. 9.8 Configuration steps
  17. Chapter 10. IBM XIV Storage System
    1. 10.1 XIV Storage System hardware
    2. 10.2 Fibre Channel switch cabling and zoning
      1. 10.2.1 Zoning configuration
    3. 10.3 Configuring XIV Storage System for ProtecTIER server
  18. Chapter 11. IBM System Storage DS8000
    1. 11.1 DS8000 series overview
      1. 11.1.1 Disk drives
      2. 11.1.2 RAID levels
    2. 11.2 General considerations
      1. 11.2.1 Planning tools
      2. 11.2.2 Metadata
      3. 11.2.3 User data
      4. 11.2.4 Firmware levels
      5. 11.2.5 Replication
    3. 11.3 Rotate extents: Striping and when to use it
      1. 11.3.1 When not to use rotate extents
  19. Chapter 12. Backup management introduction
    1. 12.1 Introduction
    2. 12.2 General suggestions
      1. 12.2.1 Interoperability
      2. 12.2.2 Software compatibility
      3. 12.2.3 Software, backup application, and operating system
      4. 12.2.4 Tape library zoning
      5. 12.2.5 Compression
      6. 12.2.6 Encryption
      7. 12.2.7 Multiplexing
      8. 12.2.8 Tape block sizes
      9. 12.2.9 Type of data that is backed up
    3. 12.3 General advice for backups
    4. 12.4 ProtecTIER integration with backup applications
    5. 12.5 Backup application terminology cross-reference
    6. 12.6 Backup application catalog
    7. 12.7 Remote cloning of virtual tapes
  20. Chapter 13. IBM Spectrum Protect
    1. 13.1 IBM Spectrum Protect VTL
    2. 13.2 IBM Spectrum Protect: Preferred options
      1. 13.2.1 LAN-free backups with the ProtecTIER product
      2. 13.2.2 Data streams
      3. 13.2.3 Reclamation
      4. 13.2.4 Collocation
      5. 13.2.5 Migration
      6. 13.2.6 Backing up your IBM Spectrum Protect database
      7. 13.2.7 Physical tape
      8. 13.2.8 Avoiding mount conflicts
      9. 13.2.9 Multiple streams from the client with the resourceutilization parameter
      10. 13.2.10 Accommodating increased sessions
      11. 13.2.11 IBM Spectrum Protect storage pool selection
      12. 13.2.12 Technical overview
      13. 13.2.13 Advantages of an IBM Spectrum Protect environment with ProtecTIER
      14. 13.2.14 IBM Spectrum Protect configuration with VTL
      15. 13.2.15 Updating to a VTL library type
      16. 13.2.16 Defining and deleting IBM Spectrum Protect libraries with many drives
    3. 13.3 IBM Spectrum Protect: FSI
      1. 13.3.1 Setting up backup and restore on IBM Spectrum Protect
      2. 13.3.2 Parameters for best performance with ProtecTIER FSI
  21. Chapter 14. Symantec NetBackup and BackupExec
    1. 14.1 NetBackup overview
    2. 14.2 General suggestions for NetBackup
    3. 14.3 NetBackup in a VTL environment
    4. 14.4 NetBackup in an FSI environment
      1. 14.4.1 NetBackup in an FSI-CIFS environment
      2. 14.4.2 NetBackup in an FSI-NFS environment
    5. 14.5 Symantec BackupExec in an FSI environment
  22. Chapter 15. EMC NetWorker
    1. 15.1 Overview
    2. 15.2 EMC NetWorker in a VTL environment
      1. 15.2.1 General suggestions
      2. 15.2.2 Suggestion if a ProtecTIER server is used as a VTL
    3. 15.3 EMC NetWorker in an FSI environment
      1. 15.3.1 Creating a Windows user for EMC NetWorker
      2. 15.3.2 Setting up for backup and restore
      3. 15.3.3 General configuration suggestions
      4. 15.3.4 Setting the information to be backed up
      5. 15.3.5 Setting the time for the backup
      6. 15.3.6 Performing a restore
      7. 15.3.7 Parameters for best performance with ProtecTIER FSI
  23. Chapter 16. HP Data Protector
    1. 16.1 HP Data Protector with ProtecTIER
      1. 16.1.1 HP Data Protector architecture with ProtecTIER
    2. 16.2 HP Data Protector in a VTL environment
      1. 16.2.1 Enabling the robotic bar code reader
      2. 16.2.2 Increasing the tape block size
      3. 16.2.3 Enabling the lock name
      4. 16.2.4 Disabling compression, encryption, and CRC chksum
      5. 16.2.5 Hosts multipath support
      6. 16.2.6 Load balancing
      7. 16.2.7 Using a mirroring functionality
      8. 16.2.8 Troubleshooting logs
  24. Chapter 17. IBM i and Backup, Recovery, and Media Services
    1. 17.1 IBM i overview
      1. 17.1.1 Integrated file system
      2. 17.1.2 Integrated database
      3. 17.1.3 Object-based architecture
      4. 17.1.4 Libraries
      5. 17.1.5 Backup considerations in IBM i
    2. 17.2 Integration of IBM i and ProtecTIER in a VTL environment
      1. 17.2.1 Backup considerations with ProtecTIER
      2. 17.2.2 Suggested ProtecTIER and IBM i configuration
    3. 17.3 Configuration of BRMS for ProtecTIER
      1. 17.3.1 BRMS overview
      2. 17.3.2 Suggested configurations of BRMS
    4. 17.4 Deploying ProtecTIER with BRMS for disaster recovery
      1. 17.4.1 BRMS available at the production site and DR site
      2. 17.4.2 No BRMS at the DR site
    5. 17.5 Use DUPMEDBRM to duplicate media from ProtecTIER to physical media
      1. 17.5.1 Enable append to multiple parallel volumes during DUPMEDBRM
      2. 17.5.2 Support multiple batch jobs for the DUPMEDBRM command
    6. 17.6 Device configuration
    7. 17.7 BRMS movement of replicated volumes: considerations
  25. Chapter 18. Commvault
    1. 18.1 Commvault introduction
      1. 18.1.1 Commvault components
    2. 18.2 Commvault with ProtecTIER VTL
      1. 18.2.1 Commvault configuration
      2. 18.2.2 Data multiplexing
      3. 18.2.3 Hardware compression
      4. 18.2.4 Data encryption
      5. 18.2.5 Alternative data paths
    3. 18.3 Commvault FSI
      1. 18.3.1 Setting up backup and restore in a CIFS environment
      2. 18.3.2 Parameters for best performance with ProtecTIER FSI-CIFS
      3. 18.3.3 Setting up backup and restore in an NFS environment
      4. 18.3.4 Parameters for best performance with ProtecTIER FSI-NFS
  26. Chapter 19. Veeam FSI-CIFS
    1. 19.1 Setting up backup infrastructure
      1. 19.1.1 Creating backup repository
      2. 19.1.2 Adding VMware backup proxy
      3. 19.1.3 Adding a VMware Server
    2. 19.2 Setting up backup and restore
      1. 19.2.1 Creating a new backup job for backup
      2. 19.2.2 Performing backup
      3. 19.2.3 Performing restore
    3. 19.3 Parameters for best performance with ProtecTIER-CIFS
      1. 19.3.1 Disabling data de-duplication and compression
      2. 19.3.2 Setting data block size for backup to SAN or local storage
      3. 19.3.3 Setting Incremental backup mode
    4. 19.4 Advanced backup repository settings
      1. 19.4.1 Setting data blocks alignment
      2. 19.4.2 Setting data blocks decompression
    5. 19.5 Summary of parameters for best performance
  27. Part 3 Application considerations
  28. Chapter 20. Application considerations and data types
    1. 20.1 IBM Domino
      1. 20.1.1 Common server
      2. 20.1.2 Existing backup and disk space usage
      3. 20.1.3 Domino attachments and object service
      4. 20.1.4 Applying the DAOS solution
      5. 20.1.5 ProtecTIER considerations
    2. 20.2 Microsoft Exchange
      1. 20.2.1 Defragmentation
      2. 20.2.2 Suggestions for Microsoft Exchange
      3. 20.2.3 Microsoft Exchange 2010
    3. 20.3 Microsoft SQL Server
      1. 20.3.1 Integrating the ProtecTIER server with Microsoft SQL Server backup
      2. 20.3.2 Index defragmentation
      3. 20.3.3 Suggestions for Microsoft SQL Server
      4. 20.3.4 LiteSpeed for SQL Server
    4. 20.4 DB2
      1. 20.4.1 Combining DB2 compression and ProtecTIER deduplication
      2. 20.4.2 Upgrading the DB2 database to improve deduplication
      3. 20.4.3 DB2 DEDUP_DEVICE setting
      4. 20.4.4 Example of DEDUP_DEVICE setting
      5. 20.4.5 Excluding logs from the DB2 database backup
      6. 20.4.6 DB2 suggested settings without DEDUP_DEVICE
      7. 20.4.7 Example of DB2 command using sessions, buffers, and parallelism
    5. 20.5 Oracle
      1. 20.5.1 Suggested RMAN settings
      2. 20.5.2 Mounting NFS Oracle Server to ProtecTIER NAS
      3. 20.5.3 Using ProtecTIER NAS to run RMAN incremental merge backups
      4. 20.5.4 Using ProtecTIER NAS to store Oracle Data Pump exports
      5. 20.5.5 Using ProtecTIER NAS to store Oracle database files and offline redo logs
      6. 20.5.6 Other suggestions for RMAN
    6. 20.6 SAP
      1. 20.6.1 SAP introduction
      2. 20.6.2 Data protection for SAP
      3. 20.6.3 Integration of Tivoli Storage Manager for ERP with SAP
      4. 20.6.4 Tivoli Storage Manager for ERP for Oracle database
      5. 20.6.5 Tivoli Storage Manager for ERP for DB2
      6. 20.6.6 SAP BR*Tools for Oracle using BACKINT
      7. 20.6.7 SAP BR*Tools for Oracle using RMAN with Tivoli Storage Manager
      8. 20.6.8 SAP BR*Tools for Oracle: Using RMAN to configure DB2 to use Tivoli Storage Manager
      9. 20.6.9 Preferred practices for Tivoli Storage Manager for ERP with ProtecTIER
    7. 20.7 VMware
      1. 20.7.1 Technical overview
      2. 20.7.2 Settings and tuning for VMware and Tivoli Storage Manager
      3. 20.7.3 Backup solutions
      4. 20.7.5 Configuring the ProtecTIER server
      5. 20.7.6 Installing the tape driver on the Tivoli Storage Manager server and the Tivoli Storage Manager storage agent
      6. 20.7.8 Tivoli Storage Manager server configuration
      7. 20.7.9 Tivoli Storage Manager client installation
      8. 20.7.10 Disabling compression and deduplication on Tivoli Storage Manager
      9. 20.7.11 Configuring a full VM backup through the vStorage API
      10. 20.7.12 VMware Guest OS backup to ProtecTIER
  29. Part 4 Replication and disaster recovery
  30. Chapter 21. ProtecTIER replication
    1. 21.1 ProtecTIER IP replication
    2. 21.2 Native replication
      1. 21.2.1 One-to-one replication
      2. 21.2.2 Many-to-one replication
      3. 21.2.3 Many-to-many replication
      4. 21.2.4 VTL replication
      5. 21.2.5 FSI replication
      6. 21.2.6 Replication grid
      7. 21.2.7 Replication topology group
    3. 21.3 Replication policies
    4. 21.4 Visibility switching
    5. 21.5 Principality
    6. 21.6 Replication Manager
    7. 21.7 Initial synchronization
    8. 21.8 Replication schedules
      1. 21.8.1 Continuous replication
      2. 21.8.2 Scheduled replication
      3. 21.8.3 Centralized Replication Schedule Management
      4. 21.8.4 Replication rate control
      5. 21.8.5 Setting replication rate limits
      6. 21.8.6 Limiting port bandwidth consumption
    9. 21.9 Replication backlog
      1. 21.9.1 SNMP alerts for replication backlog
    10. 21.10 Replication planning
      1. 21.10.1 Replication throughput barriers
      2. 21.10.2 Calculating the replication data transfer
      3. 21.10.3 Calculating replication bandwidth
      4. 21.10.4 Ports for replication in firewalled environments
    11. 21.11 Bandwidth validation utility
      1. 21.11.1 Using the bandwidth validation utility to test the data flow
      2. 21.11.2 Interpreting the results
      3. 21.11.3 Repository replacement
    12. 21.12 Planning ProtecTIER replication
      1. 21.12.1 Deployment planning scenario: many-to-many
      2. 21.12.2 Many-to-one replication
    13. 21.13 The backup application database backup
  31. Chapter 22. Disaster recovery deployment with backup applications
    1. 22.1 Disaster recovery operations
    2. 22.2 ProtecTIER replication overview
    3. 22.3 Disaster recovery operations with VTL
      1. 22.3.1 Replication data transfer
      2. 22.3.2 Managing cartridges after replication
      3. 22.3.3 Cartridge replication requirements
      4. 22.3.4 Importing/exporting slots allocation in VTL
      5. 22.3.5 Import/export slots searching
      6. 22.3.6 Automation of daily operation
      7. 22.3.7 Gauging the replication completion status
    4. 22.4 Disaster recovery operations with FSI
      1. 22.4.1 Replication destination directory (RDD)
      2. 22.4.2 ProtecTIER FSI cloning
      3. 22.4.3 Preferred replication practices for FSI
    5. 22.5 Entering ProtecTIER DR mode
      1. 22.5.1 Working at the disaster recovery site
      2. 22.5.2 Inventory command options for a VTL disaster recovery scenario
      3. 22.5.3 Commonly used disaster recovery queries
      4. 22.5.4 Returning to normal operations
    6. 22.6 The backup application catalog
      1. 22.6.1 ProtecTIER replication with IBM Spectrum Protect
      2. 22.6.2 Recovering the backup application catalog
      3. 22.6.3 IBM Spectrum Protect reclamation and housekeeping
    7. 22.7 Single domain and multiple domains
      1. 22.7.1 Single domain environment
      2. 22.7.2 Multiple domain environment
    8. 22.8 Deploying replication with specific backup applications
      1. 22.8.1 Recovery point objective (RPO)
    9. 22.9 IBM Spectrum Protect
      1. 22.9.1 Scenario 1: Replication complete
      2. 22.9.2 Scenario 2: Replication incomplete
      3. 22.9.3 Scenario 3: Auditing tapes and fixing the IBM Protect database
      4. 22.9.4 Reclamation considerations
      5. 22.9.5 Determining what is available for restoration at the DR site
    10. 22.10 Symantec NetBackup deployment with ProtecTIER replication
      1. 22.10.1 Scripting the inject/eject commands
      2. 22.10.2 Scripting the inventory commands
      3. 22.10.3 Setting up NetBackup for backup and restore
      4. 22.10.4 Setting up NetBackup for disaster recovery
      5. 22.10.5 Cross-site backups
      6. 22.10.6 ProtecTIER disaster recovery with Symantec NetBackup
      7. 22.10.7 Single domain versus two separate domains
      8. 22.10.8 Disaster recovery scenarios
      9. 22.10.9 Determining what is available for restore at the disaster recovery site
      10. 22.10.10 Eject and inject commands from NetBackup software
    11. 22.11 EMC NetWorker deployment with ProtecTIER replication
      1. 22.11.1 Cloning physical tapes with ProtecTIER replication
      2. 22.11.2 Disaster recovery with ProtecTIER replication
    12. 22.12 Commvault
      1. 22.12.1 Prerequisites
      2. 22.12.2 Running the Commvault backup operation
      3. 22.12.3 Commvault resources
  32. Part 5 Appendixes
  33. Appendix A. Hints and tips
    1. Remote access with IBM Endpoint Manager for Remote Control (Assist On-site)
    2. Operating system recovery functionality
    3. Online fsck command
    4. Dedup estimator tool
    5. Local directory cloning for FSI
    6. Commands to send files to and receive files from IBM Support
    7. Graphical performance tool
    8. ProtecTIER licensing tips
    9. Reconfigure an IBM Spectrum Protect instance attached to ProtecTIER after a reboot
  34. Appendix B. ProtecTIER compatibility
    1. IBM System Storage Interoperation Center (SSIC)
    2. Independent Software Vendor Support Matrix
  35. Appendix C. ProtecTIER parsers
    1. The ProtecTIER parsers
  36. Appendix D. Managing cartridge sizes with ProtecTIER
    1. Effects of dynamic cartridge sizes
    2. The mechanism behind fluctuating cartridge sizes
  37. Glossary
  38. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  39. Back cover