You are previewing IBM Tivoli Storage Manager as a Data Protection Solution.
O'Reilly logo
IBM Tivoli Storage Manager as a Data Protection Solution

Book Description

When you hear IBM® Tivoli® Storage Manager, the first thing that you typically think of is data backup. Tivoli Storage Manager is the premier storage management solution for mixed platform environments.

Businesses face a tidal wave of information and data that seems to increase daily. The ability to successfully and efficiently manage information and data has become imperative. The Tivoli Storage Manager family of products helps businesses successfully gain better control and efficiently manage the information tidal wave through significant enhancements in multiple facets of data protection.

Tivoli Storage Manager is a highly scalable and available data protection solution. It takes data protection scalability to the next level with a relational database, which is based on IBM DB2® technology. Greater availability is delivered through enhancements such as online, automated database reorganization.

This IBM Redbooks® publication describes the evolving set of data-protection challenges and how capabilities in Tivoli Storage Manager can best be used to address those challenges. This book is more than merely a description of new and changed functions in Tivoli Storage Manager; it is a guide to use for your overall data protection solution.

Table of Contents

  1. Front cover
  2. Notices
    1. Trademarks
  3. Preface
    1. Authors
    2. Now you can become a published author, too!
    3. Comments welcome
    4. Stay connected to IBM Redbooks
  4. Part 1 Today’s environment and challenges
  5. Chapter 1. Tivoli Storage Manager as a data protection solution
    1. 1.1 The changing world
      1. 1.1.1 The world of data protection has changed
      2. 1.1.2 Big data
      3. 1.1.3 Virtualization
    2. 1.2 Tivoli Storage Manager can help you in this new world
      1. 1.2.1 Product positioning
      2. 1.2.2 Tivoli Storage Manager is not a “tape only solution”
      3. 1.2.3 Tivoli Storage Manager is more than backup software
      4. 1.2.4 Tivoli Storage Manager is easy to administer
    3. 1.3 How this book can help you
      1. 1.3.1 Book structure
      2. 1.3.2 Summary
  6. Part 2 Overview of Tivoli Storage Manager family of products
  7. Chapter 2. Tivoli Storage Manager and the family of products
    1. 2.1 Tivoli Storage Manager evolution
      1. 2.1.1 Tivoli Storage Manager as a data protection solution
      2. 2.1.2 Tivoli Storage Manager Basic Edition
      3. 2.1.3 Tivoli Storage Manager Extended Edition
      4. 2.1.4 Tivoli Storage Manager Operations Center
    2. 2.2 Data protection family of products and components
      1. 2.2.1 Tivoli Storage Manager for Mail
      2. 2.2.2 Tivoli Storage Manager for Databases
      3. 2.2.3 Tivoli Storage Manager for Virtual Environments: Data Protection for VMware
      4. 2.2.4 AvePoint DocAve Backup and Restore
      5. 2.2.5 Tivoli Storage FlashCopy Manager
      6. 2.2.6 Tivoli Storage Manager for Enterprise Resource Planning
      7. 2.2.7 Tivoli Storage Manager for Space Management
      8. 2.2.8 Tivoli Storage Manager Hierarchical Storage Management for Windows
      9. 2.2.9 Tivoli Storage Manager for Storage Area Networks
      10. 2.2.10 Tivoli Storage Manager for System Backup and Recovery
      11. 2.2.11 Tivoli Storage Manager for z/OS Media
      12. 2.2.12 Tivoli Storage Manager FastBack
      13. 2.2.13 Tivoli Storage Manager FastBack for Microsoft Exchange
      14. 2.2.14 Tivoli Storage Manager FastBack for Bare Machine Recovery
      15. 2.2.15 Tivoli Storage Manager FastBack for Workstations
      16. 2.2.16 Tivoli Storage Manager FastBack Center
      17. 2.2.17 Tivoli Storage Manager Suite for Unified Recovery
    3. 2.3 Tivoli Storage Manager recent enhancements
      1. 2.3.1 Tivoli Storage Manager V6.4 enhancements
      2. 2.3.2 Tivoli Storage Manager V7.1 enhancements
    4. 2.4 Conclusion
  8. Chapter 3. Data protection with Tivoli Storage Manager
    1. 3.1 Protect the data at the client side
      1. 3.1.1 Operating system protection
      2. 3.1.2 Flat file backup
      3. 3.1.3 Backup considerations
      4. 3.1.4 Microsoft Volume Shadow Copy Service
      5. 3.1.5 Microsoft cluster support wizard
      6. 3.1.6 Virtual environment specifics
      7. 3.1.7 Archive data
      8. 3.1.8 Application or database backup
      9. 3.1.9 Hierarchical storage management
      10. 3.1.10 Protect data storage devices owning data
    2. 3.2 Recover data from the client
      1. 3.2.1 Restore data
      2. 3.2.2 Retrieve
      3. 3.2.3 Recall
    3. 3.3 Data protection at server side
      1. 3.3.1 Disaster recovery with traditional methods
      2. 3.3.2 Disaster recovery with node replication
      3. 3.3.3 Server-side data deduplication
      4. 3.3.4 Storage hierarchy, storage pool features
      5. 3.3.5 Tiered storage
      6. 3.3.6 Advanced Tiered storage concept with virtual tape libraries
      7. 3.3.7 Policy management
      8. 3.3.8 Protecting data with Tivoli Storage Manager security
      9. 3.3.9 Scripting for administration task automation
      10. 3.3.10 Automatic client deployment
      11. 3.3.11 Reporting analytics
      12. 3.3.12 Storage area network (SAN) environments
    4. 3.4 Tivoli Storage Manager server database management
      1. 3.4.1 Data Protection with Tivoli Storage Manager server database
      2. 3.4.2 Tivoli Storage Manager daily operation
  9. Part 3 Solution to challenges using Tivoli Storage Manager
  10. Chapter 4. Tivoli Storage Manager challenge matrix
    1. 4.1 Solution matrix
      1. 4.1.1 Setting up the matrix
    2. 4.2 Reading the matrix
      1. 4.2.1 Challenge: Data reduction
      2. 4.2.2 Challenge: Data availability
      3. 4.2.3 Challenge: Security
      4. 4.2.4 Challenge: Disaster recovery
      5. 4.2.5 Challenge: Virtualization
    3. 4.3 Summary
  11. Chapter 5. Tivoli Storage Manager server protection
    1. 5.1 Protecting the Tivoli Storage Manager server infrastructure
    2. 5.2 Protecting the Tivoli Storage Manager server database
      1. 5.2.1 Database mirroring
      2. 5.2.2 Database backup and restore
    3. 5.3 Additional server infrastructure protection
      1. 5.3.1 Protecting the Tivoli Storage Manager database log files
      2. 5.3.2 Protecting the volume history file
      3. 5.3.3 Protecting the device configuration file
      4. 5.3.4 Protecting the server options file
      5. 5.3.5 Protecting information about the database and recovery logs
      6. 5.3.6 Protecting the Secure Sockets Layer digital certificate file
      7. 5.3.7 Disaster Recovery Manager: Protecting the disaster recovery plan
    4. 5.4 Summary
  12. Chapter 6. Tivoli Storage Manager Technologies and Solutions
    1. 6.1 Providing a set of data protection and restore tools
    2. 6.2 Disk-to-disk data protection solution using deduplication
      1. 6.2.1 Benefits deduplication provides
      2. 6.2.2 Solution architecture
      3. 6.2.3 Disk-to-disk data protection
      4. 6.2.4 Solution description
      5. 6.2.5 How Tivoli Storage Manager performs deduplication
      6. 6.2.6 Data reduction and data deduplication
      7. 6.2.7 Server-side and client-side deduplication
      8. 6.2.8 Prerequisites for configuring Tivoli Storage Manager deduplication
      9. 6.2.9 Exceptions to using Tivoli Storage Manager deduplication
      10. 6.2.10 Compare Tivoli Storage Manager deduplication and appliance deduplication
      11. 6.2.11 Factors when deciding between Tivoli Storage Manager and appliance deduplication
      12. 6.2.12 Conditions for effective use of Tivoli Storage Manager deduplication
      13. 6.2.13 Traditional Tivoli Storage Manager architectures compared with deduplication architectures
      14. 6.2.14 Resource requirements for Tivoli Storage Manager deduplication
      15. 6.2.15 Database and log size requirements
      16. 6.2.16 Tivoli Storage Manager database log size estimation
      17. 6.2.17 Estimating capacity for deduplicated storage pools
      18. 6.2.18 Estimating storage pool capacity requirements
      19. 6.2.19 Database I/O requirements
      20. 6.2.20 Hardware requirements for Tivoli Storage Manager client deduplication
      21. 6.2.21 Processor
      22. 6.2.22 Memory
      23. 6.2.23 Solution guidelines
      24. 6.2.24 Deciding between client and server deduplication
    3. 6.3 Data protection solution using node replication feature
      1. 6.3.1 Node replication configuration considerations
      2. 6.3.2 Planning for incremental replication
      3. 6.3.3 Challenges and benefits the solution addresses
      4. 6.3.4 Solution architecture
      5. 6.3.5 Use scenarios
      6. 6.3.6 Hardware and software requirements
      7. 6.3.7 Database requirements for node replication
    4. 6.4 Tivoli Storage Manager together with ProtecTIER
    5. 6.5 Tivoli Storage Manager as a virtual appliance
      1. 6.5.1 Challenges the solution addresses
      2. 6.5.2 Solution architecture
      3. 6.5.3 Solution description
      4. 6.5.4 Use scenarios
      5. 6.5.5 Hardware and software requirements
  13. Chapter 7. Protecting your data with Tivoli Storage Manager
    1. 7.1 Common virtualization challenges
    2. 7.2 Virtualization: VMware Data Protection solution
      1. 7.2.1 Sample solution and benefits
      2. 7.2.2 Solution architecture
      3. 7.2.3 Solution description
      4. 7.2.4 Use scenarios
      5. 7.2.5 Hardware and software requirements
      6. 7.2.6 Additional information
    3. 7.3 Virtualization: Hyper-V host-based backup
      1. 7.3.1 Summary of the client benefits
      2. 7.3.2 Solution architecture
      3. 7.3.3 Solution description
      4. 7.3.4 Use scenarios
      5. 7.3.5 Hardware and software requirements
      6. 7.3.6 References
    4. 7.4 Virtualization: In-guest backup
      1. 7.4.1 Summary of the client benefits
      2. 7.4.2 Solution architecture
      3. 7.4.3 Use scenarios
      4. 7.4.4 Software requirements
      5. 7.4.5 Tivoli Storage Manager as a comprehensive solution for a virtualized system
    5. 7.5 Application and email servers
      1. 7.5.1 Tivoli Storage Manager for Databases: Data Protection for Oracle
      2. 7.5.2 Tivoli Storage Manager for Databases: Data Protection for Microsoft SQL
      3. 7.5.3 Tivoli Storage Manager for Mail: Data Protection for Domino
      4. 7.5.4 Tivoli Storage Manager for Mail: Data Protection for MicrosoftExchange Server
      5. 7.5.5 Tivoli Storage Manager for Enterprise Resource Planning
      6. 7.5.6 Tivoli Storage FlashCopy Manager
    6. 7.6 Big data: Structured, very large databases
      1. 7.6.1 LAN-free backups to tape
      2. 7.6.2 LAN-free backups to VTL
      3. 7.6.3 Protect very large databases with Tivoli Storage FlashCopy Manager
    7. 7.7 Big data: Unstructured
      1. 7.7.1 Progressive incremental backups
      2. 7.7.2 Journal-based backups
      3. 7.7.3 Image backups
      4. 7.7.4 Traditional file system backups and RTO
      5. 7.7.5 NDMP backups
      6. 7.7.6 Off-host backup using snapshot differencing
      7. 7.7.7 GPFS, SONAS and V7000 Unified
      8. 7.7.8 SnapMirror to Tape
    8. 7.8 Remote office backup
      1. 7.8.1 Remote office client attached to data center server
      2. 7.8.2 Remote office server connected to data center server
      3. 7.8.3 Remote office server connected to data center server with 3-site copy
    9. 7.9 Employee workstation backup
      1. 7.9.1 Tivoli Storage Manager Backup-Archive Client
      2. 7.9.2 Fastback for Workstations
  14. Appendix A. Practical approach to creating a Tivoli Storage Manager solution
    1. How to put solutions together
    2. Tivoli Storage Manager policy-based dynamic tiering
  15. Appendix B. Hierarchical storage management (HSM)
  16. Appendix C. VSS and Tivoli Storage Manager related product concepts
  17. Appendix D. Additional material
    1. Locating the Web material
    2. Using the Web material
  18. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources
    4. Help from IBM
  19. Back cover
  20. IBM System x Reference Architecture for Hadoop: IBM InfoSphere BigInsights Reference Architecture
    1. Introduction
    2. Business problem and business value
    3. Reference architecture use
    4. Requirements
    5. InfoSphere BigInsights predefined configuration
    6. InfoSphere BigInsights HBase predefined configuration
    7. Deployment considerations
    8. Customizing the predefined configurations
    9. Predefined configuration bill of materials
    10. References
    11. The team who wrote this paper
    12. Now you can become a published author, too!
    13. Stay connected to IBM Redbooks
  21. Notices
    1. Trademarks