IBM Spectrum Protect Plus: Practical Guidance For Deployment, Configuration, and Usage
IBM Spectrum Protect Plus: Practical Guidance For Deployment, Configuration, and Usage
IBM Spectrum Protect Plus: Practical Guidance For Deployment, Configuration, and Usage
Redpaper
IBM Redbooks
December 2020
REDP-5532-01
Note: Before using this information and the product it supports, read the information in “Notices” on
page ix.
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .x
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Now you can become a published author, too! . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
Stay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Chapter 4. Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.1 IBM Spectrum Protect Plus networking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
4.2 Understanding network data flows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
4.2.1 VADP backend data flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.2.2 VADP front end data flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
4.3 Establishing connections through firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
4.3.1 Communication between IBM Spectrum Protect Plus components . . . . . . . . . . . 87
4.3.2 Communication to VMs, applications, and file systems . . . . . . . . . . . . . . . . . . . . 87
4.4 Configuring IBM Spectrum Protect Plus to use a dedicated backup network . . . . . . . . 89
4.4.1 Preparing the VMware ESXi or Microsoft Hyper-V Hypervisors . . . . . . . . . . . . . . 90
4.4.2 Preparing the IBM Spectrum Protect Plus virtual appliance . . . . . . . . . . . . . . . . . 93
4.4.3 Preparing the IBM Spectrum Protect Plus vSnap server . . . . . . . . . . . . . . . . . . . 96
4.4.4 Preparing the IBM Spectrum Protect Plus VADP proxy (VMware only) . . . . . . . 100
4.4.5 Enabling or disabling specific protocols on a network interface . . . . . . . . . . . . . 100
4.4.6 Special Configuration: Forcing VADP front end traffic to use a dedicated interface .
103
4.4.7 Editing firewall ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
4.4.8 Testing network connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Contents v
8.2.3 Production restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
8.3 Database protection and vSnap server operations . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
8.3.1 Backup operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
8.3.2 Restore operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
8.4 Oracle overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
8.4.1 Server registration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
8.4.2 Oracle multi-threading. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
8.4.3 Oracle backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
8.4.4 Oracle Block Change Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
8.4.5 Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
8.4.6 Troubleshooting hint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
8.4.7 Oracle commands used by IBM Spectrum Protect Plus . . . . . . . . . . . . . . . . . . . 271
8.5 Database backup with pre-script and post-script . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
Contents vii
15.4.2 Preparing Object Storage providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
15.4.3 Preparing repository server storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
15.4.4 Configuring an Object Storage provider in IBM Spectrum Protect Plus . . . . . . 437
15.4.5 Configuring additional copies to Object storage in the SLA . . . . . . . . . . . . . . . 441
15.4.6 vSnap commands for Object Storage data . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443
15.5 Configuring a multi-site backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
15.6 Creating incremental and full copies of backup data to an IBM Spectrum Protect server
448
15.6.1 Preparing the IBM Spectrum Protect server . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
15.6.2 Registering an IBM Spectrum Protect server as Repository server in IBM Spectrum
Protect Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455
15.6.3 Creating an SLA that creates regular additional copies to IBM Spectrum Protect .
456
15.6.4 Running the SLA and observe the job results. . . . . . . . . . . . . . . . . . . . . . . . . . 458
This information was developed for products and services offered in the US. This material might be available
from IBM in other languages. However, you may be required to own a copy of the product or product version in
that language in order to access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area. Any
reference to an IBM product, program, or service is not intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program, or service that does not
infringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility to
evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The
furnishing of this document does not grant you any license to these patents. You can send license inquiries, in
writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, US
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may make
improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time
without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any
manner serve as an endorsement of those websites. The materials at those websites are not part of the
materials for this IBM product and use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without
incurring any obligation to you.
The performance data and client examples cited are presented for illustrative purposes only. Actual
performance results may vary depending on specific configurations and operating conditions.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the
accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the
capabilities of non-IBM products should be addressed to the suppliers of those products.
Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, and
represent goals and objectives only.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to actual people or business enterprises is entirely
coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the sample
programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore,
cannot guarantee or imply reliability, serviceability, or function of these programs. The sample programs are
provided “AS IS”, without warranty of any kind. IBM shall not be liable for any damages arising out of your use
of the sample programs.
The following terms are trademarks or registered trademarks of International Business Machines Corporation,
and might also be trademarks or registered trademarks in other countries.
AIX® IBM Cloud® Redbooks®
Db2® IBM Resiliency Services® Redbooks (logo) ®
DB2® IBM Security™ Resilient®
Global Technology Services® IBM Spectrum® Storwize®
IBM® Passport Advantage® Tivoli®
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive
licensee of Linus Torvalds, owner of the mark on a worldwide basis.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States,
other countries, or both.
Java, and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its
affiliates.
Ansible, Ceph, OpenShift, Red Hat, are trademarks or registered trademarks of Red Hat, Inc. or its
subsidiaries in the United States and other countries.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, VMware vSphere, and the VMware logo are registered trademarks or trademarks of VMware, Inc. or
its subsidiaries in the United States and/or other jurisdictions.
Other company, product, or service names may be trademarks or service marks of others.
IBM® Spectrum Protect Plus is a data protection solution that provides near-instant recovery,
replication, retention management, and reuse for virtual machines, databases, and
applications backups in hybrid multicloud environments.
IBM Knowledge Center for IBM Spectrum® Protect Plus provides extensive documentation
for installation, deployment, and usage. In addition, IBM Spectrum Protect Plus Blueprints
provide guidance about how to build and size an IBM Spectrum Protect Plus solution.
The goal of this IBM Redpaper® publication is to summarize and complement the available
information by providing useful hints and tips that are based on the authors’ practical
experience in installing and supporting IBM Spectrum Protect Plus in customer environments.
Over time, our aim is to compile a set of best practices that cover all aspects of the product,
from planning and installation to tuning, maintenance, and troubleshooting.
Authors
This paper was produced by a team of specialists from around the world.
xii IBM Spectrum Protect Plus Practical Guidance for Deployment, Configuration, and Usage
Andre Gaschler is an IBM Certified IT Specialist at the IBM
EMEA Storage Competence Center (ESCC) in Kelsterbach,
Germany. He has been working at IBM for 25 years with more
than 15 years of experience with IBM Spectrum Protect. He is
a member of IBM’s Systems Storage Lab Services team,
supporting customers with designing, planning, and
implementation solutions that are based on IBM Spectrum
Protect and IBM Spectrum Protect Plus. He contributed to the
backup chapter of the book Speichernetze, and is an author
several IBM Redbooks publications.
Preface xiii
Markus Stumpf is Head of Services and Operations at
Empalis Consulting GmbH, an IBM Business Partner in
Germany. He handles petabytes of customer data in the
service division and manages hundreds of IBM Spectrum
Protect Servers. Markus also contributed to several certification
tests for IBM Spectrum Protect and IBM Spectrum Protect
Plus. He has worked with Tivoli Storage Manager, IBM
Spectrum Protect, and IBM Spectrum Protect Plus for more
than 16 years and is especially engaged in backing up large
database and mail environments.
xiv IBM Spectrum Protect Plus Practical Guidance for Deployment, Configuration, and Usage
Thanks to the following people for their contributions to this project:
Jason Basler
Stefan Bender
Andy Cheong
Jason Cooley
Michael Kulessa
Dominic Mueller-Wicke
Gerd Munz
Linda Sandmann
Jim Smith
Tuan Vu
Adam Young
IBM
Find out more about the residency program, browse the residency index, and apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our papers to be as helpful as possible. Send us your comments about this paper or
other IBM Redbooks publications in one of the following ways:
Use the online Contact us review Redbooks form found at:
ibm.com/redbooks
Send your comments in an email to:
[email protected]
Mail your comments to:
IBM Corporation, IBM Redbooks
Dept. HYTD Mail Station P099
2455 South Road
Poughkeepsie, NY 12601-5400
Preface xv
Stay connected to IBM Redbooks
Find us on Facebook:
http://www.facebook.com/IBMRedbooks
Follow us on Twitter:
http://twitter.com/ibmredbooks
Look for us on LinkedIn:
http://www.linkedin.com/groups?home=&gid=2130806
Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks
weekly newsletter:
https://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm
Stay current on recent Redbooks publications with RSS Feeds:
http://www.redbooks.ibm.com/rss.html
xvi IBM Spectrum Protect Plus Practical Guidance for Deployment, Configuration, and Usage
1
The chapter continues with more details about the product architecture and its main
components, including the IBM Spectrum Protect Plus server, the vSnap Backup Storage
server, and the VMware vSphere Storage APIs for Data Protection (VADP) proxy server. It
briefly explains how service level agreement (SLA) policies and sites are used to manage
backup data.
Figure 1-1 shows an overview of the IBM Spectrum Protect Plus architecture.
The IBM Spectrum Protect Plus server is the component that manages and orchestrates the
entire system. It also is the “brain” that also provides the web interface portal that is used for
configuring and operating the solution, and performing centralized scheduling of activities.
The vSnap Backup Storage server is the component that is responsible for storing and
processing the backup data that is received from production systems.
A typical deployment includes a single backup server (IBM Spectrum Protect Plus server)
with multiple backup storage servers (vSnap servers), depending on customer requirements
and needs. Because IBM Spectrum Protect Plus is a zero touch data protection solution, a
traditional backup client software component is not required.
Figure 1-1 also shows the key component in the middle of Figure 1-1, where the IBM
Spectrum Protect Plus server is deployed as a virtual machine. The IBM Spectrum Protect
Plus server communicates by way of standardized API calls with the backup clients, which
can run on virtual machines, physical servers, or cloud instances. This communication is
used in the inventory processes, and the backup processing during the backup period. The
IBM Spectrum Protect Plus server is responsible for scheduling, starting, and cataloging the
backups.
If required, data also can be tiered to IBM Spectrum Protect, onto multiple different storage
options, such as tape copy or Object Storage, or onto a dedicated Object Storage such as
IBM Cloud® Object Storage, for more protection.
The vSnap server manages the backup traffic and workload. The backup metadata is sent to
the IBM Spectrum Protect Plus server. To achieve local backup data placement by using SAN
or LAN networks and to scale out, multiple vSnap servers are typically used within an IBM
Spectrum Protect Plus solution. For efficient performance, proper sizing of the vSnap server
is crucial. For more information, see the IBM Spectrum Protect Plus Blueprints that are
available at this web page.
Finally, you can then use any backup image to restore back to the virtual environment for
recovery, or for any of the multi-purpose use cases, such as instant data recovery boot by way
of vSnap repository or data reuse of existing data copies for tests and DevOps. Instant
access and restore capabilities are provided by the different backup storage pools, including
vSnap pool, IBM Spectrum Protect disk container, and tape and Object Storage, such as IBM
Cloud Object Storage.
The built-in role-based access control (RBAC) model enables you to allocate and control
access to specific areas and resources within an IBM Spectrum Protect Plus data protection
solution, and to dedicated teams. You can use the RBAC role model to assign different roles
for VM administrators or database administrators. After these roles are allocated, these users
can create backup jobs, restore data, or apply any of the multiple data reuse cases.
The primary users for the IBM Spectrum Protect Plus solution are customers running
virtualized workloads in a traditional data center, cloud data center, and remote branch
offices. IBM Spectrum Protect Plus is also capable of providing multitenancy for service
providers. See also Chapter 2, “Solution architecture, planning, and design” on page 25.
Native data format. Traditional backup products take the data that they obtain from client
systems and package it in proprietary formats on disk or tape. Before the data is usable,
the backup application must first extract it from the packaged format. IBM Spectrum
Protect Plus, by contrast, stores data in the format that is created by the application it is
protecting, such as .vmdk files for VMware or Hyper-V .vhdx files.
Instant data recovery boot by way of vSnap repository is at the core of the IBM Spectrum
Protect Plus solution. It allows for rapid recovery or access to data, without having to wait
for traditional data restore operations to move data.
Zero touch backup and recovery of virtualized systems, databases, file systems,
cloud-managed applications, and containers. Traditional backup approaches require the
installation of a heavyweight application on each protected machine, which can be
time-consuming and intrusive.
IBM Spectrum Protect Plus uses a modern zero touch approach with remote code
injection/execution to avoid the need to manually roll out and configure application code
across the environment. These benefits also extend beyond implementation because
upgrades are no longer required for every client in the environment.
Figure 1-2 IBM Spectrum Protect Plus deployed in two active locations
In the following sections, we explain the roles and features of these key components and how
they interact with each other and further elaborate on key concepts Sites and SLA policies.
Figure 1-3 IBM Spectrum Protect Plus server: initial storage layout overview
The IBM Spectrum Protect Plus Blueprints provide a basic recommendation to host the
vSnap server (including Cloud Cache) and the VADP proxy on dedicated hosts and remove
the disks for the vSnap server and Cloud Cache from the IBM Spectrum Protect Plus server.
The integrated vSnap server and Cloud Cache are used for demonstration purposes only, but
not for production.
A sample configuration of this recommended setup is shown in Figure 1-2 on page 5 where
vSnap server and VADP proxy are separated from the IBM Spectrum Protect Plus server. For
more information about the required installation and configuration steps for a IBM Spectrum
Protect Plus server, vSnap server, and VADP proxy, see Chapter 3, “Installation and
deployment” on page 47.
Next, we describe the user interface, catalogs, and job scheduler of the IBM Spectrum Protect
Plus server.
User interfaces
The server provides two web-based graphical user interfaces (GUIs):
The Day-to-day GUI with access to the Dashboard, Backup Configuration, and so on
The Administrative Console GUI with access to license and certificates management,
Network and System Settings, and to apply software updates.
After logging in to the regular web-based GUI by using https (for example,
https://spp-server/) the Dashboard view is loaded, as shown in Figure 1-4 on page 7. The
Dashboard view provides a direct overview and links to the following information:
Jobs and Operations: Currently running jobs, and a history of jobs in the categories of
Failed, Warning, and Success, are displayed together with a job success rate for a specific
time frame.
Destinations: Backup capacity overview is provided, together with a device status (inactive
and full) and overall Data Reduction statistics.
Coverage: Providing an overview of how many discovered resources are protected using
different policies.
Since version 10.1.6, the IBM Spectrum Protect Plus Dashboard can be integrated into the
IBM Spectrum Protect Operations Center to provide single pane for the status of an
enterprise backup environment. Further on, a link to the IBM Spectrum Protect Operations
Center can be integrated into the IBM Spectrum Protect Plus interface in the upper right
corner. For more information about the configuration of both integrations, see 5.2.1, “IBM
Spectrum Protect Plus in Spectrum Protect Operations Center” on page 117.
The left menu bar provides one-click access to the following areas:
Jobs and Operations with details about running and previous jobs, and their
corresponding logs. On the Schedule tab, an overview of all scheduled jobs is provided,
and the schedule of system jobs can be changed. Furthermore, on the Active Resources
tab, the Instant Access Restore and options for applications, hypervisor, and file systems
are listed. Find more information, see Chapter 5, “Daily operations and maintenance” on
page 107 and IBM Knowledge Center.
Manage Protection provides access to the Backup Policy configuration, Single File
Restore, and backup configuration for virtualized systems, file systems, containers,
cloud-managed applications, and databases. In addition, the catalog backup and the
protection of IBM Spectrum Protect Plus are configured here.
For more information about protecting virtualized systems, see Chapter 6, “Backing up
and restoring virtualized systems” on page 171 and in IBM Knowledge Center.
For more information about protecting Windows file systems, see Chapter 7, “Backing up
and restoring Windows file system data” on page 227 and in IBM Knowledge Center.
Note: For more information about system configuration, reports and logs, and accounts,
see Chapter 5, “Daily operations and maintenance” on page 107.
The web-based Administrative Console GUI can be entered by using a web browser on port
8090 (for example, https://spp-server:8090) that uses an IBM Spectrum Protect Plus user
account or the System ID serveradmin. In the console, you can perform the following actions:
Get more information about the installed product versions
Manage and install the licenses
Manage and install certificates; for example, Active Directory LDAP certificates
Apply and install IBM Spectrum Protect Plus software updates
Perform System Actions, such as Start/Stop the server, restart the virtual machine, and
configure the time zone
Adjust the network configuration
Data catalogs
The IBM Spectrum Protect Plus server maintains several data catalogs, all running on the
server appliance. Recovery points of the backed-up entities (for example, virtualized systems,
and databases) are tracked in addition to the information for file-level recovery. System
configuration is also tracked in these catalogs.
The default sizes provisioned for the catalogs should be sufficient for most workloads, but can
be expanded, if necessary. It is recommended by the IBM Spectrum Protect Plus Blueprints
to use the default catalog sizes. In general, place the IBM Spectrum Protect Plus appliance
on high-performing, flash storage to optimize catalog performance.
catalog backup
Figure 1-5 The catalogs maintained by the IBM Spectrum Protect Plus server
To protect your IBM Spectrum Protect Plus installation, the catalogs and all required
information must be backed up daily. This backup is configured under Manage Protection →
IBM Spectrum Protect Plus → Backup.
Backup Schedule and Retention are managed through an SLA and backups are stored on a
vSnap Backup Storage server from where it can also be restored. Ensure that at least one
copy of the catalog backup is targeted outside of your fault domain by backing up directly to
another site, replicating to another site, or creating a copy to an IBM Spectrum Protect server
or Cloud Storage.
Find more information about the configuration, see 3.4.5, “Adding an SLA for IBM Spectrum
Protect Plus catalog backup” on page 76, and IBM Knowledge Center.
By using the Line Item Action at the end of a row, a job can be started, paused
(deactivated), or canceled when it is running. The same functions for the job can be chosen
above the header row for a selected job, as shown in Figure 1-7.
Close to the search bar, all schedules can be paused or released, which is helpful when
maintenance activities are performed.
An adjustment of the scheduled start time for system-defined and recurring restore jobs can
be performed by clicking the calendar icon in front of the job name. The schedule time for
backup jobs can be adjusted by selecting Manage Protection → Policy Overview and
modifying the associated SLA Policy.
An on-demand or recurring restore job can be modified by clicking the pencil icon. This
allows (for example) to adjust and correct a failed on-demand restore job and start it again
without redefining all settings of the restore job.
Finally, by using the icon, on-demand or recurring restore jobs can be deleted.
In addition to the backup and restore jobs, one maintenance and several inventory jobs are
predefined in IBM Spectrum Protect Plus (system-defined jobs).
The maintenance job is predefined with system installation, and runs typically once a day to
remove expired and deleted entries from the catalog and the system configuration. This
cleanup procedure reclaims space on backup storage devices, cleans up the IBM Spectrum
Protect Plus catalog, and removes related snapshots. The maintenance job also removes
cataloged data that is associated with deleted jobs.
An inventory job is automatically created when you add a resource to IBM Spectrum Protect
Plus. The following inventory jobs are available:
Hypervisor Inventory is created when the first Virtualized System (VMware, Hyper-V, or
Amazon EC2) is added to IBM Spectrum Protect Plus. It scans daily the associated
resources on the Hypervisors, such as VMs, storage, and network configuration.
Application Server Inventory is created when the first database, application, or file system
is added to IBM Spectrum Protect Plus. It scans daily the available databases and
application instances on the added systems.
Storage Server Inventory is predefined with the system installation, and scans the
configured vSnap Backup Storage server resources daily.
It is a best practice to add user names and passwords for your resources through the
Accounts → Identity pane. Then, when a feature is used in IBM Spectrum Protect Plus that
requires credentials to access a resource, select Use existing user, and then, select an
identity from the drop-down menu. A single identity can be reused for accessing multiple
resources. For example, a single configured identity can be used to connect multiple Oracle
instances.
Figure 1-8 on page 11 shows the Identity window that appears when you click (in the right
corner) Accounts → Identity → Add Identity. You can enter a common name that best
describes your entry in the Name field, and add the Username and Password in the
respective fields.
Cloud resources require Access Keys and Certificates to be connected with IBM Spectrum
Protect Plus. In addition to an identity, a Linux instance can also use an SSH key. Access
keys, certificates, and SSH keys can be added and managed by selecting System
Configuration → Keys and Certificates.
1.2.2 Site
A site is an IBM Spectrum Protect policy construct that is used to manage data placement in
the environment. It can be physical, such as a data center, or logical, such as a department
or organization. IBM Spectrum Protect Plus components are assigned to sites to localize and
optimize data paths. A deployment always has at least one site per physical location.
By default, the IBM Spectrum Protect Plus environment has a primary site, a secondary site,
and a demo site. You can change the site name and other options for the default Primary and
Secondary site, and a demo site. The demo site is available only for the on-board vSnap
server. You cannot use this site with any other vSnap server.
Note: The demo site is predefined with the deployment of IBM Spectrum Protect Plus, and
is intended to be used for product demonstration purposes only. It should not be used for a
production backup and can therefore be deleted in such installations.
Sites in IBM Spectrum Protect Plus are configured and maintained by selecting System
Configuration → Site as shown in Figure 1-10 on page 13. Here, you can adjust the names
or add sites. A Throttle Rate can be configured to change and limit the throughput for site
replication and copy operations so that you can manage your network activity on a defined
schedule.
The general philosophy is to localize data movement to the sites by placing vSnap Backup
Storage servers and VADP proxies (VMware only) together in the sites. It is advised to always
have at least one site per physical location, and at least one vSnap server per site, including
at least one VADP proxy per site if you are protecting VMware vSphere in this site.
The placement of backup data to a site is governed by the SLA policies. Therefore, you
specify in which site your backup data is stored or replicated to, instead of specifying a
dedicated vSnap Backup Storage server.
Cases where you want to define multiple sites in a physical location and further
considerations together with replication are discussed in the IBM Spectrum Protect Plus
Blueprints in Sites and vSnap server distribution and Replication considerations, which are
available at this web page.
Note: A built-in vSnap Backup Storage server is predefined with the deployment of IBM
Spectrum Protect Plus, and is intended to be used only for product demonstration
purposes. It should not be used for a productive backup, and can therefore be deleted in
such installations, as shown in Figure 1-3 on page 6.
The backup data that is stored by a vSnap server can be replicated to a second vSnap server
as an operational protection. For more protection, backup data can be copied to an IBM
Spectrum Protect server or to Cloud Storage. For all data copy operations to cloud Object
Storage or IBM Spectrum Protect (backup, recovery, and data reuse), each vSnap server
requires a disk cache area (referred to as the cloud cache, as shown in see Figure 1-11 on
page 14) to perform the following functions:
As a temporary staging area for objects that are pending upload to the cloud Object
Storage endpoint during data copy operations.
To cache downloaded objects and store any temporary data that might be written into the
restore volume during restore operations.
Instant access, restore, and data reuse capabilities are provided by these different backup
storage providers. For more information, see Chapter 15, “Replication and additional copies”
on page 405.
Note: A vSnap Backup Storage server is similar to an IBM Spectrum Protect storage pool
in terms of data placement and handling.
Figure 1-11 shows the storage layout of a virtual or physical vSnap Backup Storage server.
The vSnap metadata is on the operating system disk (/etc/vsnap) and used to track
information about the system, replication, and copy configuration, including the encryption
key. If the VADP proxy is installed, it is also placed on these disks.
Figure 1-11 Storage layout overview of IBM Spectrum Protect Plus vSnap server
The sizing of the vSnap Backup Storage servers is crucial. The IBM Spectrum Protect Plus
Blueprints that provide the required guidance are available at this web page.
The vSnap server log is used to optimize write performance for application log backups and
for data reuse operations. The vSnap server cache is used with a memory cache to optimize
backups when deduplication and performance is used for data reuse scenarios.
Redundant Array of Independent Disks (RAID) technology can be used to protect vSnap pool
against data loss that is caused by a hardware failure of a disk. This protection is by using
software RAID inside the vSnap server or by using hardware or software features of the
underlying storage system that provides the capacity to the vSnap pool.
At a minimum, a backup should be created once a day after all replication and copy tasks are
completed. The backup file is created locally and should be securely copied to a central
location, such as the IBM Spectrum Protect Plus server.
For more information about a configuration example, see 3.4.6, “Backing up the vSnap server
system configuration” on page 77, and Appendix D: Protecting vSnap System Configuration
chapter of the IBM Spectrum Protect Plus Blueprints, which are available at this web page.
User interfaces
Two user interfaces for the vSnap Backup Storage servers are provided. Graphical access to
the vSnap server configuration is provided as part of the web-based IBM Spectrum Protect
Plus standard GUI. Under System Configuration → Backup Storage → Disk, all available
vSnap Backup Storage servers with their status and capacity are listed, as shown in
Figure 1-12.
Figure 1-12 vSnap Backup Storage Overview in the IBM Spectrum Plus GUI
The second user interface is a command-line-interface (CLI), which can be reached through
SSH, by using the default serveradmin UserID, as shown in Example 1-1.
----------------------------------------------------------------
[serveradmin@spp-vsnap-x5-02 ~]$ vsnap
Usage: vsnap [OPTIONS] COMMAND [ARGS]...
Options:
--json Show output in JSON format.
--summary Show output in summary (tabular) format.
--detail Show output in detail (multiline) format.
--help Show this message and exit.
Commands:
archive Manage archive resources.
cloud Manage cloud resources.
disk Manage disks.
host Manage volume host mappings.
maint Manage maintenance sessions.
network Manage network interfaces.
partner Manage partner servers.
pool Manage storage pools.
relationship Manage replication relationships.
repair Manage vSnap repairs.
session Manage replication sessions.
share Manage volume shares.
snapshot Manage volume snapshots.
system Manage vSnap system.
target Manage storage targets.
task Functions to create and monitor tasks.
throttle Manage throttling events.
user Manage vSnap users.
volume Manage storage volumes.
[serveradmin@spp-vsnap-x5-02 ~]$
You can install the vSnap server (backup storage provider) and VADP proxy on the same
physical or virtual system. If so, IBM Spectrum Protect Plus optimizes data movement by
eliminating an NFS mount over LAN when these two systems are colocated. The vSnap
Backup Storage overview that is shown in Figure 1-12 on page 15 shows if a VADP proxy is
enabled on a vSnap server.
At least one VADP proxy component is always required for each site, in case VMware virtual
machines need to be backed up in this site. Based on sizing needs, more proxies can be
required. VADP proxies support the following VMware transport modes: File, SAN, HotAdd,
NBDSSL, and NBD. For more information about VMware transport modes, see the vSphere
Documentation Center at this web page.
The overview and configuration of the VADP proxies can be accessed by selecting System
Configuration → VADP Proxy, as shown in Figure 1-14.
Note: A built-in VADP proxy is predefined with the deployment of IBM Spectrum Protect
Plus, and is intended to be used only for product demonstration purposes. It is advised to
suspend the localhost VADP proxy, and not use it for production backups.
For more information about installing and deploying a VADP proxy, see Chapter 3,
“Installation and deployment” on page 47.
Figure 1-15 Data flows between the IBM Spectrum Protect Plus components
Note: At the bottom of Figure 1-16, information is displayed about missing catalog
protection of IBM Spectrum Protect Plus. For more information about the IBM Spectrum
Protect Plus catalog, see “Data catalogs” on page 8.
For more information about the configuration of the catalog backup, see 3.4.5, “Adding an
SLA for IBM Spectrum Protect Plus catalog backup” on page 76.
In the bottom half of the window, the configured and available SLA policies are listed, as
shown in Figure 1-17. The following pre-configured SLA policies are available:
Gold, Silver, and Bronze policies can be used for VMware, Hyper-V, Exchange, Microsoft
365, SQL, Oracle, IBM DB2®, MongoDB, and Windows file systems.
EC2 policy can be used for Amazon EC2 backups.
Container policy is used for Kubernetes Container support.
You can use these policies as they are, modify the policies, or create custom SLA policies by
using the Add SLA Policy option in the bottom in the right corner of the GUI.
Important: An SLA cannot be renamed. Consideration this issue when you are specifying
the name for an SLA.
For more information about creating and configuring an SLA, see IBM Knowledge Center.
Note: Consider that backup retention changes in an SLA take effect for future and existing
backups that are associated with that SLA.
1. Backup policies define the main backup schedule and retention for the incremental
backups that are taken with this SLA. For example, you can configure that a backup is
taken once a day at PM and retained for one week (7 days). LAter, it is configured in which
Site these backups are stored and if an encrypted vSnap Backup Storage must be used.
Figure 1-19 shows these configuration details for the backup policy part.
Note: The Frequency and Retention for the archive Object Storage can be set to
Weeks, Months, and Years only. Minutes and Hours is not available for this part.
In Figure 1-21 on page 23, you can see the configuration details for the Additional Copies
section. Both options, the Standard and the Archive Object Storage, allow to select if data
is copied from the primary backup target or from the Replication site.
Note: For more information about replicating backup data to another vSnap Backup
Storage server and copying data to a Cloud Storage Provider or to IBM Spectrum
Protect, see Chapter 15, “Replication and additional copies” on page 405.
This association creates a corresponding backup job. For example, if a VMware virtual
machine is associated with the Bronze SLA, the vmware_Bronze backup job is created. If a
Hyper-V virtual machine is associated with the Bronze SLA, the hyperv_Bronze backup job is
created. Both backup jobs for VMware and Hyper-V run at the same time and use the same
configured backup parameters.
If a virtual machine is associated with multiple SLA policies, ensure that the policies are not
scheduled to run concurrently. Schedule the SLA policies to run with a significant amount of
time between them, or combine them into a single SLA policy.
To delete an SLA policy, ensure that no Backup Clients are associated with it. The associated
backup instances remain available for recovery until their expiration, as defined previously by
the SLA policy.
For example, assume that we have a configuration as shown in Figure 1-12 on page 15, in
which three vSnap Backup Storage servers are used, each associated to a different site. The
build relationship is simple because only one vSnap server per site is available and therefore
selected if the SLA points to this site. Usually in larger installations, multiple vSnap servers
are available per site.
For more information about spreading backup data over multiple sites, see 15.2.4, “Dual-site
backup using multiple SLAs” on page 408.
Deployment Deployment
Deployment
Deployment IBM Spectrum Protect
vSnap server VADP proxy server
Plus server
The following phases are described Chapter 3, “Installation and deployment” on page 47 and
cover:
Deployment
Configuration
Backup clients
The systems that must be protected are typically called backup clients. Because we need to
know the details of these clients for the solution design, we must ask the following questions:
Are they running on physical servers?
Are they running as virtualized systems and which Hypervisor are they using?
Which operating system are they using?
Which applications or databases are installed on these systems?
Are they running on a public cloud and which cloud provider are they using?
Are they running on a container, which container platform are they using, and what type of
storage is being used to persist data?
Which front-end capacity are these clients using? Front-end capacity is the size of the
primary data that is being protected for client applications, virtual machines, and systems.
Front-end capacity details are required by Backup Client category. For example:
– How much front-end capacity for VMware?
– How much front-end capacity for Microsoft SQL?
The information about the front-end capacity is needed for sizing of an IBM Spectrum
Protect Plus solution, as discussed in 2.4, “Sizing” on page 45.
For more information about whether all gather backup clients are supported by IBM Spectrum
Protect Plus, see IBM Support’s IBM Spectrum Protect Plus - All Requirements Doc.
The functional requirements describe what the system must do; that is, which functions the
solution must provide relative to the business needs.
The non-functional requirements for a data protection system often are the capacity,
performance, and service levels that must be achieved.
The non-functional requirements address those aspects of the system that, although not
directly affecting the functionality of the system as seen by the users, can have a profound
effect on cost. They also affect how the data protection system is accepted by the users and
the system administrators, while not directly impacting the functionality of the system as seen
by the users.
The following non-functional requirements in a data protection solution are most important:
Recovery Time Objectives (RTO)
Defines how long it might take until a system is restored and operational.
These most important requirements define the backup data parameters, such as backup
frequency, backup retention, and the recovery constraints that lead to a consistent
implementation of a data protection solution. These parameters are key inputs for sizing an
IBM Spectrum Protect Plus solution, as described in 2.4, “Sizing” on page 45.
The diagram that is shown in Figure 2-2 on page 31 shows the system context of a typical
IBM Spectrum Protect Plus solution. The diagram records the interactions with the external
systems in the IT infrastructure, and with users that might be distributed among several
teams.
Table 2-1 lists how each user interacts with the IBM Spectrum Protect Plus solution in
performing their different tasks.
Table 2-1 Users that are involved in an IBM Spectrum Protect Plus solution deployment
Type ID User/System Description
ACT01 IBM Spectrum Protect The IBM Spectrum Protect Plus administrator manages the
Plus administrator IBM Spectrum Protect Plus infrastructure (ES01). ACT01
provides essential services in managing, operating, and
configuring infrastructure; scheduling backups, and defining
data retention policies. Depending on the IT team in an
organization, guest access to protect, restore, or reuse data
can also be delegated to users (for example, ACT02, ACT03,
and ACT05) by using IBM Spectrum Protect Plus role-based
access control (RBAC).
ACT02 Virtual Infrastructure ACT02 is the main actor of IBM Spectrum Protect Plus to use
administrator it as the backup and restore solution for all of the guests that
are hosted in a virtual infrastructure (ES04).
ACT02 also provides access to the IBM Spectrum Protect Plus
solution for vCenter and the underlying virtual infrastructure
components.
ACT03 Virtual machine ACT03 is an IBM Spectrum Protect Plus solution stakeholder
administrator whose role is to protect and restore the guests for whom they
are responsible.
ACT04 Network administrator The network administrator is responsible for the network
infrastructure element (ES05), and must provide adequate
infrastructure support for the backup and restore requirements.
ACT06 Storage administrator ACT06 is responsible to ensure that the IBM Spectrum Protect
Plus components have appropriate access to storage
components where snapshot copies are retrieved and stored.
In Figure 2-3, bubble intersections represent an operation that can be done by IBM Spectrum
Protect administrators, virtual machine administrators, or application administrators,
depending on your IT organization. Therefore, a bubble intersection indicates that there
should be team communication. Each person who is responsible for a task can inform, or
request assistance from, other peer users.
Table 2-2 External systems involved in the IBM Spectrum Protect Plus solution deployment
ID Name Description
ES01 IBM Spectrum Protect The IBM Spectrum Protect Plus infrastructure external service
Plus Infrastructure is a requirement for the solution to function. It contains several
components, such as the IBM Spectrum Protect Plus server,
VADP proxy, vSnap server, and data retention policy. Without
ES01, an IBM Spectrum Protect Plus solution cannot exist.
ES02 Disk SAN/Object This external service is where snapshot copies are stored. In
Storage/iSCSI Fabric some cases, it can also include storage where backups are
stored before it is migrated to ES03.
ES03 Tape SAN Fabric The tape SAN external service is where snapshot copies can
be stored to provide a physical air gap. It can be accessed
indirectly through the IBM Spectrum Protect server when a
second backup copy to physical tape occurs or is accessed.
ES04 Virtual Infrastructure This external service is the main interface for the IBM Spectrum
Protect Plus solution that enables data to be retrieved.
It includes components, such as the hypervisors, guests, and
logical data stores where guest data is hosted.
ES05 Local area network LAN is the main transport for data being backed up and
restored by the IBM Spectrum Protect Plus solution. This
service most likely determines the overall performance of the
solution.
ES06 Applications, Database Applications and database constitute the part of the data that is
protected by the IBM Spectrum Protect Plus solution.
ES07 Operating Systems Operating Systems are the part of the data that is protected by
the IBM Spectrum Protect Plus solution. One of the main
benefits of the solution is the ability to start from a backup,
which provides quick and efficient recovery when operating
system failures occur.
ES08 Core Delivery Platform This external service is to provide centralized management,
monitoring, alerting reporting, billing, security, compliance, and
other IT services with which the IBM Spectrum Protect Plus
solution must directly or indirectly interface.
Note: The users that are listed in Table 2-1 on page 31 must be aware of and involved in
the data protection product implementation.
One of the most important steps in designing a data protection solution is to validate that the
architectural decisions meet requirements, including networking, security, and various
technology considerations. In the first part of this section, we explain different technical
options for a deployment of IBM Spectrum Protect Plus. Then, we provide templates to
document architectural decisions for a solution design.
The IBM Spectrum Protect Plus Blueprints discuss the planning and sizing of an IBM
Spectrum Protect Plus data protection environment. In Chapter 2, “Choosing the Appropriate
Technologies” of IBM Spectrum Protect Plus Blueprints, topics are described, such as
physical or virtual vSnap server deployment, disk technology, compression, and deduplication
with their different options. Therefore, the Blueprints are a must read when planning an IBM
Spectrum Protect Plus installation. The latest versions are available at this IBM Support web
page.
In this chapter, we discuss more aspects of an IBM Spectrum Protect Plus deployment that
are outside the information that is included in the Blueprints.
Hybrid environment
In this configuration, the IBM Spectrum Protect Plus server and a vSnap server are installed
and maintained on-premises, while another Snap server is deployed on IBM Cloud or on
AWS on an existing or new VPC. For more information about the cloud solutions, see the
following web pages:
IBM Spectrum Protect Plus on IBM Cloud
IBM Spectrum Protect Plus on AWS Marketplace
A hybrid environment might benefit IBM Spectrum Protect Plus users who want to continue
protecting workloads that are running on-premises and cloud. In addition to backup and
recovery operations, you can use a hybrid environment to replicate and reuse data between
your on-premises location and the cloud for more data protection. For example, you might
want to use on-premises data that is replicated on the cloud for DevOps, quality assurance,
and testing purposes.
This option might be interesting for new IBM Spectrum Protect users who want to protect
workloads on the cloud and do not currently have IBM Spectrum Protect Plus running in an
on-premises environment.
Figure 2-6 Example of an all on cloud IBM Spectrum Protect Plus environment
In an installation that is spread over multiple physical locations, the communication between
the different components must still work correctly. Therefore, the network round-trip time must
be at a level that allows the IBM Spectrum Protect Plus server to communicate with the
vSnap servers and the other components, such as the VMware vCenter servers.
Also, the IBM Spectrum Protect Plus GUI must be still accessible for all required users. For
example, if an installation exceeds continental boundaries, the use of multiple IBM Spectrum
Protect Plus servers is preferred. However, if the network connection between an IBM
Spectrum Protect Plus server in Germany and a vSnap server in Italy is not sufficient, a
separate IBM Spectrum Protect Plus server can be required.
Because a key design aspect of an IBM Spectrum Protect Plus environment is to localize data
movement, you often must have at a minimum as many vSnap servers as sites exist in your
environment. Required logical separation of backup data can lead to installing even more
vSnap servers.
The initial size of 100 TB per vSnap server provides the ability to scale-up this vSnap server
to cope with natural data growth. In principle, it is better to start initially with more, smaller
vSnap server instead of using less, but larger systems. The use of multiple vSnap servers
(within a Site) for a single SLA allows for an initial distribution of the backup workload
throughout the available vSnap servers.
2.3.3 Disaster Recovery and high availability with IBM Spectrum Protect Plus
The protection of the IBM Spectrum Protect Plus environment consist of the following types of
protection:
Backup data: Protection is achieved by using RAID protected storage for the vSnap pool
and replicating backup data to another vSnap server. For more information about
replication, see Chapter 15, “Replication and additional copies” on page 405. For more
information about recovering from a vSnap server failure, see this IBM Support web page.
vSnap server metadata: Protection is achieved by creating regular backups of the
metadata information. For more information about metadata and protection, see “Protect
vSnap server configuration (metadata)” on page 15.
IBM Spectrum Protect Plus catalog: Protection is achieved by regular backups of the
catalog. For more information about catalog backup, see “Data catalogs” on page 8.
Another option to protect the IBM Spectrum Protect Plus server is to run it in a high availability
or vSphere Fault Tolerance configuration:
High Availability enables the IBM Spectrum Protect Plus server to be available with a
minimum amount of downtime if a VM host failure occurs. This high availability can be
achieved through VMware vSphere High Availability or Microsoft failover clustering.
Fault Tolerance enables the IBM Spectrum Protect Plus server to be continuously
available if a VM host fails. This fault tolerance can be achieved through VMware vSphere
Fault Tolerance (FT).
For more information about these other configuration options, see this IBM Support web
page.
2.3.4 Network
The network is a crucial component for an IBM Spectrum Protect Plus implementation
because the different components need to interact with each other. In one case, dedicated
ports for the communication are required. Alternatively, separate networks should be used to
cope with the backup and restore workload or to isolate backup traffic from application and
user networks. We describe information about network configuration in Chapter 4,
“Networking” on page 83.
Data at rest: Encryption of data at rest can be accomplished by using encryption capable
storage devices, such as the IBM disk or tape storage subsystems, file systems, or
applications that support encryption. Encryption capable devices implement inline
transparent encryption of data as it flows onto and off the associated media. Encryption of
data ensures that, if a physical loss of media (through theft or replacement) occurs, the data
is unreadable and its confidentiality is maintained.
Data In transit: Data that is being transferred between applications or components is in transit.
Data in transit is also referred as data in flight or data in motion. Throughout this
publication, the term data in flight is used. With IBM Spectrum Protect Plus, SSL is the
industry standard used for inter-component communication and data transfer. SSL is a set of
rules governing authentication and encrypted communication between clients and servers.
SSL is widely used on the internet by an increasing number of applications. SSL is positioned
as a protocol layer between the Transmission Control Protocol (TCP) layer and the application
to form a secure connection between clients and servers so that they can communicate in a
secure manner over a network.
The schema that is shown in Figure 2-7 on page 40 shows the various hardware and software
components within an IBM Spectrum Protect Plus environment. The orange-colored network
paths indicate that the network traffic is encrypted when data is in flight by using the SSL
protocol. Components that are displayed in green support optional encryption of data at rest.
Hypervisor
Spectrum Protect
6
Plus Server 5
vCenter vCenter
3 IBM Spectrum 1
Protect Plus server
Figure 2-7 Encryption at rest and in flight in an IBM Spectrum Protect Plus environment
Note: Encryption can be enabled only when the pool is created and is not revertible.
However, compression and deduplication can be changed on a vSnap pool at any time.
3. VADP proxy to VMware hypervisors: VADP proxies in IBM Spectrum Protect Plus support
the following VMware transport modes: SAN, HotAdd, NBDSSL, and NBD. Although every
enterprise is unique and has different priorities in terms of size, speed, reliability, and
complexity, the following general guidelines apply to the Transport Mode selection:
– SAN transport mode should be used in a direct storage environment because this
mode is fast and reliable.
Remember: The examples are for illustration only. The decisions can be dependent of
your environment. You must evaluate how different options apply to your business
requirements and base your own decisions on what fits best in your environment.
Issue or problem What is the technology to use for reducing the data capacity for storing backups copies.
Decision
Justification
Implications
Derived
requirements
Related decisions
Issue or problem How do we protect the vSnap server from disk failures; for example, RAID protection?
Assumptions There is a pre-existing investment in storage that provides storage hardware RAID such as the
IBM Storwize v5000
Justification
Implications
Derived
requirements
Related decisions
Issue or problem How do you provide an encryption at rest and in flight solution for data stored on IBM Spectrum
Protect Plus vSnap servers that aligns with technical best practices?
Assumptions All customers are subject to GDPR unless there is a formal letter saying that they are not.
Motivation The solution must ensure both the security of the data from physical device theft and minimize the
risk of data loss through key loss.
Decision
Justification
Implications N/A
Derived N/A
requirements
Issue or problem What authentication method to use for the administrator that manages the IBM Spectrum Protect
Plus infrastructure.
Decision
Justification
Implications
Derived
requirements
Related decisions
Assumptions Most deployments require both separate vSnap servers and single-server deployments of IBM
Spectrum Protect Plus.
Decision
Justification
Implications
Derived
requirements
Related decisions
Motivation
Alternatives API
Email
Syslog
Decision
Justification
Implications
Derived
requirements
Related decisions
2.4 Sizing
The information about the different backup workloads as described in 2.2, “Design” on
page 27 are now required to perform the sizing of the solution. The IBM Spectrum Protect
Plus Blueprints include a sizing tool that is based on Microsoft Excel to help you plan the
following aspects of the solution:
Quantity and capacity of vSnap servers
Quantity of VADP proxies
Replication requirements
In Chapter 3, “How to Use the Sizing Tool” of IBM Spectrum Protect Plus BluePrint the tool is
explained followed by a sizing example. The Blueprints and the sizing tool are available at this
IBM Support web page.
For more information, see the IBM Spectrum Protect and IBM Spectrum Protect Plus
YouTube channel.
A playlist on YouTube with multiple videos about sizing an IBM Spectrum Protect Plus solution
is provided at this web page.
This chapter is not meant to duplicate the installation procedure that is available in IBM
Knowledge Center, but rather provides guidance for the initial configuration and other
essential settings following the installation and deployment.
Deployment Deployment
Deployment
Deployment IBM Spectrum Protect
vSnap server VADP proxy server
Plus server
One objective of the planning phase is to know the amount and size of vSnap Backup Storage
servers and the number of VADP proxies that are required for an adequate backup
infrastructure.
For a complete list of requirements, see see IBM Support’s IBM Spectrum Protect Plus - All
Requirements Doc.
The document lists all requirements for the IBM Spectrum Protect Plus components and the
requirements for the hypervisors, operating system platforms, Kubernetes, databases, and
applications. The requirements for the IBM Spectrum Protect Plus server, vSnap server, and
VADP proxy is listed under the “System requirements” section.
It is essential to also prepare and check your DNS infrastructure to include entries for your
IBM Spectrum Protect Plus environment before starting the deployment. All IBM Spectrum
Protect Plus system components can use DHCP, but the usage of static IP address
assignments, including properly configured DNS names, is desirable for a productive IBM
Spectrum Plus environment.
A common time zone and network time protocol server (NTP server) setting is recommended
to be used for the IBM Spectrum Plus server, vSnap server, and VADP proxy server. For more
information about configuring the time zone and NTP server, see 3.4.7, “Changing and
verifying the schedules of the predefined jobs” on page 81.
The download size of the installation image (.ova for VMware, and .exe for Hyper-V) is
approximately 4.8 GB. The thick provisioned size of an installed IBM Spectrum Protect Plus
server virtual machine (VM) is 548.0 GB. The provisioned size of the server VM is
preconfigured and also suitable for large IBM Spectrum Protect Plus deployments.
Always use thick provisioned disks for the IBM Spectrum Protect Plus server VM in a
production environment, and consider a deployment on SSD or Flash drives data stores to
get a better VM performance. The IBM Spectrum Protect Plus server uses several internal
catalogs, which benefit from a faster VM data store, especially in larger installations.
For more information about supported Hypervisor versions, CPU, and memory requirements,
see IBM Support’s IBM Spectrum Protect Plus - All Requirements Doc.
For more information about component requirements, see IBM Knowledge Center.
Note: The OVF package for VMware contains advanced configuration options, which might
pose a security risk. Review the following advanced configuration options:
spp.vm.mode = appliance
disk.enableUUID = true
Users can use a sizing tool, which is part of the IBM Spectrum Plus Blueprints. The chapter
“Physical or virtual vSnap server deployment” in IBM Spectrum Protect Plus Blueprints should
help you decide, based on your requirements, whether to use a physical or virtual vSnap
server deployment. The most crucial factor is that the required sizing of the resources
(memory, CPU, and so on) for the vSnap server is done correctly.
Along with the decision about a physical and virtual deployment is to decide what storage
system technology to use. It can be storage out of an existing RAID-protected data store (for
example in VMware) or are a simple disk storage for which you must use the software RAID
features that are provided by the vSnap server to protect your backup storage against disk
failures.
For vSnap server deployment on a physical server and dedicated storage system, it is
preferable to use the hardware RAID feature of the storage system. If supported, use RAID 6,
as recommended in IBM Spectrum Protect Plus Blueprints.
Also, in IBM Spectrum Protect Plus Blueprints, the chapter “Server and Storage
Configuration” describes requirements and recommendations to build a vSnap Backup
Storage server. It also includes more information about the required CPU and memory for the
system.
For more information about the requirements, see vSnap Server Installation and User’s
Guide, which is available at IBM Knowledge Center.
You can install the vSnap server (backup storage provider) and VADP proxy on the same
physical or virtual system. IBM Spectrum Protect Plus optimizes data movement by
eliminating an NFS mount when these two systems are colocated.
If you choose to colocate these two components, ensure that the system is sized correctly for
both workloads, taking the sum of the CPU, memory, and storage requirements of the two
components. The IBM Spectrum Protect Sizing Spreadsheet helps to estimate the required
CPU, memory, and storage.
For more information about supported operating system versions and the CPU and memory
requirements (especially when running a combination of vSnap and VADP proxy servers),
see IBM Support’s IBM Spectrum Protect Plus - All Requirements Doc.
The planning that is described in Chapter 2, “Solution architecture, planning, and design” on
page 25 and the suitable chapters of the IBM Spectrum Protect Plus Blueprints provide the
required information for installing the IBM Spectrum Protect Plus solution:
How many sites must be configured?
How many vSnap servers must be deployed? Virtual or physical installation?
How many VADP proxy servers must be installed?
– Virtual or Physical installation?
– Will the VADP proxies run with vSnap server in the same VM or server?
The result of the planning and sizing phase in our example is that we install an IBM Spectrum
Protect Plus server and three virtual vSnap Backup Storage servers with an integrated VADP
proxy server in a VMware environment in three locations, as shown in Figure 3-2.
Figure 3-2 IBM Spectrum Protect Plus solution with three sites
For more information about the steps for implementing the solution that is shown in
Figure 3-2, see 3.3.1, “Deploying the IBM Spectrum Protect Plus server”, and 3.3.2,
“Deploying the vSnap Backup Storage server”.
For more information about the installation process, see these resources:
IBM Knowledge Center
IBM Spectrum Protect Plus Blueprints
After all components are deployed, see 3.4, “Configuring IBM Spectrum Protect Plus
environment”.
Create a worksheet or a list to gather the necessary details, as shown in Table 3-1.
Storage(Datastore)
Network IP address
Default Gateway
DNS
Domain
Note: For more information about how to log in to the vCenter Server by using the vSphere
Client, see this web page.
Figure 3-3 Deploy an OVF or OVA Template in the VMware vSphere Client
Note: For more information about deploying OVA templates, see this web page.
In step 6 of the deployment OVF Template configuration wizard (see Figure 3-4), select your
storage configuration.
The following options are available for the virtual disk format:
Thick Provision Eager Zero
Thick Provision Lazy Zeroed (Default configuration)
Thin Provision
Tip: The preferred choice is Thick Provision Lazy Zeroed because it is faster.
The deployment wizard guides you through the required settings. Most settings must be
entered in the Customize template section, as shown in Figure 3-5. The template details
about disk requirement sizing are shown during the OVA deployment.
Finally, a summary page is displayed in which you can review all your settings before
deploying the VM.
The vSphere Client shows a progress bar during the deployment, as shown in Figure 3-6.
Figure 3-6 vSphere Client progress bar for the deployment of the OVF or OVA Template
Wait until the deployment completes and then, start the VM.
Important: Give the VM several minutes after starting to initialize completely, especially for
the first start after the deployment.
Before the vSnap server is deployed as a virtual appliance in an VMware environment, you
must have the following information available:
VM name for the vSnap server
Which data center, ESX host, and data store are to be used for the VM
Virtual disk format: Thick Provision Lazy Zero
VM Network interface to be used from the VMware infrastructure
IP address of the IBM Spectrum Protect Plus server
Host name (most likely the VM name) of the vSnap server
Network IP address for the vSnap server
Netmask (Network Prefix) for the IP subnet; for example: 24 for a 255.255.255.0 subnet
mask
Default Gateway
DNS server names
DNS domain name that is used with the hostname as Full Qualified Domain Name
(FQDN)
Use a worksheet (see as shown in Table 3-2) or create a list to gather the required
configuration details for Deployment virtual vSnap server.
Storage(Datastore)
Network IP address
Network Prefix(Netmask)
Default Gateway
DNS
Domain
After all information is available, deploy the vSnap server by using the VMware vSphere
Client, as shown in “Using the VMware vSphere client to deploy an OVA template” on
page 52.
This step is repeated to deploy all three vSnap servers, as shown in Figure 3-2 on page 51.
Important: Give the VM several minutes after starting to initialize completely, especially for
the first start after the deployment.
Completing the configuration steps results in creating an IBM Spectrum Protect Plus
environment in accordance with best practices that is ready to perform backups of VMs, file
systems, and databases, as described in Chapter 6, “Backing up and restoring virtualized
systems” on page 171, Chapter 8, “Backing up and restoring databases” on page 255, and
Chapter 7, “Backing up and restoring Windows file system data” on page 227.
Important: Give the VM several minutes after starting to initialize completely, especially for
the first start after the deployment.
The IBM Spectrum Protect Plus graphical user interface (GUI) can be accessed from a
supported web browser by using https (for example, https://spp-server/). For more
information about the GUI and its function, see “User interfaces” on page 6.
Note: If this is your first time logging in, the default user name is admin and the default
password is password.
Tip: If the log in dialogue is not displayed, it can mean that the I P address you specified
during installation was invalid. Instead of repeating the installation, run the nmtui command
to set a valid IP address. For more information about the nmtui command, see
Example 4-3 on page 94.
The first time that you access IBM Spectrum Protect Plus, the following tasks must be
completed before entering the Dashboard view:
Change the user name and password of the administrative ID admin.
Change the password for the local system user ID serveradmin.
Initialize the built-in vSnap server.
Note: It is not possible to rename as admin, root, or test. Also, the minimum password
length must be at least eight characters.
Note: In IBM Spectrum Protect Plus version 10.1.6, the initial password for the user ID
serveradmin is sppDP758-SysXyz. During password change process, ensure that you follow
the minimum password requirements.
Figure 3-9 on page 59 shows the change password dialogue for serveradmin. The new
password for the serveradmin user ID must adhere to the following rules:
Minimum acceptable password length is 15 characters
Minimum of:
– 8 characters in the new password must not be present in the old password
– 1 numerical digit in the new password
– 1 uppercase character in the new password
– 1 lowercase character in the new password
– 1 other character in the new password
Maximum of:
– 3 identical consecutive characters are allowed in the new password
– 4 identical consecutive class of character are allowed in the password
After completing these three initial login steps, you enter the IBM Spectrum Protect Plus
Dashboard view, as shown and explained in “User interfaces” on page 6.
To rename a site, click the edit icon in front of the site name. After the first two sites are
renamed, the third site is added by clicking Add Site, as shown in Figure 3-11.
Figure 3-11 Defining the required sites in IBM Spectrum Protect Plus
The intention of this Demo configuration is for product demonstration purposes only. It should
not be used for a productive backup; therefore, it can be deleted in real installations.
In the IBM Spectrum Protect Plus GUI, select System Configuration → Backup Storage →
Disk and delete the vSnap server on the localhost in the Demo site by clicking the delete
icon sign on the left side, as shown in Figure 3-12.
Figure 3-12 Local vSnap server disk storage for Demo site
In the IBM Spectrum Protect Plus GUI, select System Configuration → VADP Proxy. Then,
select localhost, click the three dots, and then, select Suspend, as shown in Figure 3-14.
The initial configuration of the IBM Spectrum Protect Plus server is now complete.
Important: Give the VM several minutes after starting to initialize completely, especially for
the first start after the deployment.
After the vSnap Backup Storage server is deployed, you must change the password for the
local system user ID serveradmin before the VM for the vSnap server before can be used.
Log in to the vSnap server with the SSH protocol by using a terminal or PuTTY client. Use the
serveradmin user ID and change the password. It is possible to use the same password that
was used for the serveradmin user at the IBM Spectrum Protect Plus server.
Note: In IBM Spectrum Protect Plus vSnap server version 10.1.6, the initial password of
the user ID serveradmin is sppDP758-SysXyz.
Example 3-1 shows the change password dialogue. The new password for the serveradmin
user ID must follow the following password rules:
Minimum acceptable password length is 15 characters
Minimum of:
– 8 characters in the new password must not be present in the old password
– 1 numerical digit in the new password
– 1 uppercase character in the new password
– 1 lowercase character in the new password
– 1 other character in the new password
Maximum of:
– 3 identical consecutive characters are allowed in the new password
– 4 identical consecutive class of character are allowed in the password
----------------------------------------------------------------
WARNING: Your password has expired.
You must change your password now and login again!
Changing password for user serveradmin.
Changing password for serveradmin.
(current) UNIX password:
New password:
Retype new password:
UID: 1002
GID: 1002
NAME: vsnapadmin
ROLE: vsnap_admin
[serveradmin@t3-spp-vsnap ~]
Important: If a physical vSnap server is used for the role of VADP proxy, you must grant
sudo privileges to the user that is created in Example 3-2. In this case, run the following
commands:
cd /etc/sudoers.d
echo "vsnapadmin ALL=(ALL) NOPASSWD: ALL" > vsnapadmin
chmod 440 vsnapadmin
In our example, we initialize the vSnap servers by using the IBM Spectrum Protect Plus GUI,
as described in 3.4.4, “Connect vSnap and VADP servers with IBM Spectrum Protect Plus
server” on page 67. We also use the GUI to add virtual disks to the vSnap server.
An alternative is to initialize the vSnap server by using the CLI and create the vSnap pool by
using the CLI. For large installations this approach is preferred.
The required CLI commands to create the vSnap server users are described in 5.4, “vSnap
server CLI” on page 156. For more information, see the following resources:
The “vSnap Server Installation and Setup” chapter of IBM Spectrum Protect Plus
Blueprints
IBM Knowledge Center
If the time zones are out of sync, you might experience errors during application registration,
metadata cataloging, inventory, backup or restore, or file restore jobs.
To synchronize time zones for IBM Spectrum Protect Plus server and the vSnap Backup
Storage server, use the CLI on each of the servers. After the initial deployment, the time zone
is set to Coordinated Universal Time.
Warning: The system is configured to read the RTC time in the local time zone.
This mode cannot be fully supported. It will create various problems
with time zone changes and Daylight Saving Time adjustments. The RTC
time is never updated; it relies on external facilities to maintain it.
If possible, use RTC in UTC by calling
'timedatectl set-local-rtc 0'.
[serveradmin@t3-spp-server ~]$ sudo timedatectl set-local-rtc 0
Use the command sudo timedatectl set-local-rtc 0 to disable using the RTC time.
Use the sudo timedatectl set-timezone Europe/Berlin command to set the time zone in
our example to Europe/Berlin.
As shown in Example 3-4, we use the vi editor to show the activation of the time server
ntp.escc.workshop and the deactivation of the default time servers by remarking them in the
configuration file. (Example 3-4 shows the last lines of the configuration file.)
Use the command sudo systemctl restart chronyd to restart the chrony daemon and check
the chronyd status with the command sudo systemctl status chronyd as shown in
Example 3-5.
3.4.4 Connect vSnap and VADP servers with IBM Spectrum Protect Plus
server
After the deployment of the IBM Spectrum Protect Plus server, the required vSnap Backup
Storage servers and the VADP proxies needs to be connected and enabled in IBM Spectrum
Protect Plus.
For the vSnap server, we use (optionally) the created vsnapadmin account (see “Creating
vSnap server users (optional)” on page 64); for the registration VADP proxy, we use the local
system account serveradmin (see “Changing serveradmin password” on page 63). Both
credentials are added as identities, as described in “Identities, keys, and certificates” on
page 11.
The credentials are added to IBM Spectrum Protect Plus and then are referred to as “Use
existing user” when the resource is added. The Identity view under Accounts → Identity lists
both identities after they are added, as shown in Figure 3-17 on page 68.
Register the VADP proxy by clicking Register Proxy (see Figure 3-18).
Complete the following steps to install and add the VADP proxy to the suitable site:
1. Enter the host name or the IP address of the vSnap server where the VADP proxy is
installed.
2. Select a site from the list for the installation of the VADP proxy.
3. Use the serveradmin admin credentials from predefined identities, as shown in
Figure 3-19 on page 69.
The second option is to enter the serveradmin credentials with the password.
4. Click Install (see Figure 3-19 on page 69).
After the installation process is complete, an installed VADP proxy is enabled automatically,
as shown in Figure 3-20.
The configuration menu of the VADP proxy (see Figure 3-21) is entered by clicking the three
dots in the right corner of the VADP Proxy view (see Figure 3-20 on page 69) and selecting
Proxy Options.
In our example that is shown in Figure 3-21, we adjusted the following options:
Site: DC1 (the site for this VADP proxy)
User: serveradmin
Transport Modes: We disabled SAN transport because it is a mode that cannot be used on
a virtual VADP proxy. After all initial full backups are complete, we consider disabling
HotAdd as well.
Softcap task limit: We set it to 4 as recommended in the Blueprints for a smaller virtual
VADP proxy.
We kept NBDSSL Compression as disabled because we use a 10 Gb network and the other
settings remain unchanged.
In the IBM Spectrum Protect Plus GUI, select System configuration → Backup Storage →
Disk and then, click Add Disk Storage, as shown in Figure 3-22.
Enter the hostname of the vSnap Backup Storage server, select the site, and choose the user
ID vsnapadmin to add the disk storage. Click Save, as shown in Figure 3-23.
Important: To Initialize pool is a one-time decision. The decision if encryption is used must
be made before you start the initializing pool. This choice cannot be reversed.
To use the simple initialization that is available in the IBM Spectrum Protect Plus GUI, select
System Configuration → Backup Storage → Disk in the GUI and click the three dots for
your vSnap server. Select Initialize or Initialize With Encryption from the pull-down menu,
as shown in Figure 3-24.
For more information about encryption, see 2.3.5, “Encryption” on page 39.
After the simple initialization process is completed, the Status/Capacity column shows a
utilization bar for the vSnap server, as shown in Figure 3-25.
Figure 3-26 Manage Backup Storage - Configure the vSnap Backup Storage server
In the Manage Backup Storage window, the following tabs are available for configuring the
details of the vSnap server:
Set Storage Options
By default, compression is enabled and deduplication is disabled. Enable deduplication if
you planned for the deduplication from a CPU and memory perspective. Both options can
be turned on and off later as well.
If encryption was enabled during initialization, it is shown here. It is a one-time decision
and cannot be turned on or off later.
Disk Storage Options
New disks can be added to back up storage here. For more information about how to add
virtual disk (vDisks) to the vSnap servers, see IBM Knowledge Center.
Newly attached disks to the vSnap server are available for use. Select the disk and click
Save, as shown on Figure 3-27 on page 74.
In the right upper corner, click Download Logs to start downloading a vSnap server log file.
In the IBM Spectrum Protect Plus GUI, select Manage Protection → Policy Overview and
then, click Add SLA Policy. Name the new SLA policy SPP-DB-Backup.
Figure 3-31 New SLA Policy for IBM Spectrum Protect Plus Catalog Backup
Note: Replication between two vSnap servers requires a two-step configuration: one step
is the SLA configuration, which was just done, and a second step is to set the relationship
between both vSnap servers. For more information about setting up replication, see 15.3,
“Replicating backup data” on page 409.
The section Additional Protection is kept cleared. Click Save to create the SLA policy.
Figure 3-32 Select SLA Policy for IBM Spectrum Protect Plus Catalog Backup
You can back up the configuration and metadata information for use cases where the vSnap
pool data is intact and valid but the configuration or metadata information is lost or not
available. This issue can occur in the following situations:
The vSnap server compute environment is lost, but the storage is not. An example is a
vSnap server that is running as a VM and the storage that is backing the vSnap pool is on
a physical RDM (pRDM) disk. In this case, the vSnap server VM is lost, but the data on the
pRDM disk is still valid.
The backup procedure is based on the vsnap system config backup command, which
creates a compressed TAR file. The resulting file can then be securely copied to a central
location, such as the IBM Spectrum Protect Plus server. To back up the vSnap server
configuration, run the command that is shown in Example 3-7.
For reliability and convenience, it is suggested to automate the backup of each vSnap
server’s config files and keep a set of historical backups on a centralized location, such as the
IBM Spectrum Protect Plus server itself. Therefore, we demonstrate how to achieve this with
some simple steps and a script that is creating backups and offloading the backup file to the
SPP server.
Complete the following steps on the IBM Spectrum Protect Plus server (see Example 3-8):
1. At the Linux command line, create a user vsnapadmin if it does not exist.
2. Create a directory structure that stores the backup files of all vSnap servers.
3. Change permission of the new directory structure, and set the group and ownership to the
vsnapadmin user.
Complete the following steps on each vSnap Server, as shown in Example 3-9 on page 79:
1. At the Linux command line, create a user vsnapadmin if it does not exist.
2. Create a directory structure that stores the backup files of the local vSnap server.
3. Change permission of the new directory structure and set the group and ownership to the
vsnapadmin user.
4. Create an SSH key pair to enable password-less authentication and communication
between the vSnap server and the IBM Spectrum Protect Plus server.
5. Transfer the keys to the IBM Spectrum Protect Plus server.
6. Create a shell script that generates the backups and transfers the files from the vSnap
server to the IBM Spectrum Protect Plus server.
7. Create a crontab entry to schedule a repeating backup job.
sudo su
vsnap user create --username vsnapadmin --password pass4VsnapAdmin
mkdir /var/opt/spp/
mkdir /var/opt/spp/backup
chown vsnapadmin:vsnapadmin /var/opt/spp -R
exit
8. Log in to the vSnap server as the vsnapadmin user and create the SSH keys, as shown in
Example 3-10. The key pair is stored under the user’s home directory.
9. Transfer the public key of the vsnapadmin user to the SPP server and test the connectivity
by querying the server’s hostname (see Example 3-11, Example 3-12 on page 80, and
Example 3-13 on page 80).
Now try logging into the machine, with: "ssh 'vsnapadmin@t4-spp-server'" and check to make sure that only the
key(s) you wanted were added.
keepFilesCnt=5
bakFileName="/var/opt/spp/backup/${HOSTNAME}_backup.$(date +%Y%m%d-%H%M%S).tgz"
echo
echo "creating new vsnap: $bakFileName"
vsnap system config backup --outfile $bakFileName
bakDirSrc="/var/opt/spp/backup"
bakDirTgt="/var/opt/spp/backup"
username="vsnapadmin"
sppServerName="t4-spp-server"
echo
echo "up to $keepFilesCnt newest files on server: <<< $sppServerName >>> for vsnap: <<< $HOSTNAME >>> "
echo
ssh $username@$sppServerName "ls -t ${bakDirTgt}/${HOSTNAME}* | awk 'NR<=cnt' cnt=$keepFilesCnt"
echo
spaceUsed=`ssh $username@$sppServerName "du -h -s $bakDirTgt"`
echo "space occupied / available on server's ($sppServerName) backup directory: $spaceUsed"
echo
ssh $username@$sppServerName "df -h -P $bakDirTgt"
The script can be run manually by user vsnapadmin to create backups and to test the
functions. Example 3-14 and Example 3-15 show the output of a manual script run.
up to 5 newest files on server: <<< t4-spp-server >>> for vsnap: <<< t4-spp-vsnap >>>
/var/opt/spp/backup/t4-spp-vsnap_backup.20190820-093827.tgz
/var/opt/spp/backup/t4-spp-vsnap_backup.20190820-093429.tgz
/var/opt/spp/backup/t4-spp-vsnap_backup.20190820-093104.tgz
/var/opt/spp/backup/t4-spp-vsnap_backup.20190820-093041.tgz
/var/opt/spp/backup/t4-spp-vsnap_backup.20190820-093020.tgz
Example 3-15 Crontab entry on vSnap server to create a backup every night at 23:30 / 11:30 pm
crontab -e
30 23 * * * /home/vsnapadmin/vsnap_backup.sh
The script can be easily modified by adding or uncommenting the single line in Example 3-16
to remove all files but the last X files for a specific vSnap server, where X is specified with the
variable keepFilesCnt.
Example 3-16 Remove older backup files from SPP server (optional)
ssh $username@$sppServerName "ls -t ${bakDirTgt}/${HOSTNAME}* | awk 'NR>cnt' cnt=$keepFilesCnt | xargs rm"
Chapter 4. Networking
The network is a crucial component of an IBM Spectrum Protect Plus implementation
because it establishes communication paths between the different components of IBM
Spectrum Protect Plus, the backup clients, and users.
This chapter gives an introduction to Networking with IBM Spectrum Protect Plus, discusses
the aspects that need to be considered in the planning phase, and shows the configuration
steps based on an example.
Figure 4-1 shows a logical network diagram for a two-site environment, which uses a
dedicated backup network in the main location to isolate backup and restore workloads from
application, user, admin, and replication traffic.
When planning the network for an IBM Spectrum Protect Plus environment, consider the
following points:
Which protocols should be separated from each other? IBM Spectrum Protect Plus
differentiates between management, backup/restore, and replication workloads.
Although vSnap servers and VADP proxies are located close to the backup clients,
admins, replication partners, and targets for extra copies (IBM Spectrum Protect or a
Cloud storage provider) can be remote.
Back up and restore operations usually require direct data flows between a backup client
or hypervisor and the IBM Spectrum Protect vSnap server. If backup traffic is confined to a
dedicated network, the backup client or hypervisor must be attached to this network by
using a separate adapter with an assigned IP address.
Are all components connected to a “flat” layer-2 network, or are there any routed
connections in between? If components are communicating over routed connections,
static routes might need to be maintained.
In VMware environments, another component, the VADP proxy, is used to move virtual
machine (VM) backup data between the hypervisor (ESXi host) and the vSnap server
storage.
The vSnap server controls which interface is used for backup traffic that flows between the
VADP proxy and the vSnap server (VADP backend). However, the vSnap server cannot
control which interface or VLAN is used for backup data that flows between the VADP proxy
and the hypervisor (VADP front end). The path that backup data uses between the ESXi
hypervisor and VADP proxy depends on various characteristics of the network, such as the
Virtual Disk Transport method that is used, or the DNS name resolution.
Figure 4-2 shows the possible data flows between a VMware hypervisor, a VADP proxy, and a
vSnap server in an environment with a dedicated network for backup data.
Figure 4-2 Backup data flows in a VMware environment with separate backup network
Chapter 4. Networking 85
The data flows can be divided into two areas:
Between VADP proxy and vSnap server (VADP backend)
Between hypervisor and VADP proxy server (VADP front end)
Important: To support direct communication between the vSnap server and the ESXi
hypervisor by way of the backup LAN, the hypervisor must have a VMkernel port with an IP
address that is configured in that network segment.
Note: The following Virtual Disk Transport methods are supported when the VADP proxy is
a VM:
NBD
NBDSSL
HotAdd
The following Virtual Disk Transport methods are supported when the VADP proxy is a
physical server:
NBD
NBDSSL
SAN
Note: In Microsoft Hyper-V environments, the backup data flows directly between the
hypervisor and the vSnap server, without a datamover (VADP proxy) in between.
Therefore, the vSnap server has end-to-end control of which path is used for backup data.
Note: Firewalls might exist at different locations in the communication path; for example,
hardware firewalls in the network and software firewalls that are part of the backup clients
operating system. Accordingly, all firewalls must be configured.
From there, select the correct version number and browse to the System Requirements
document. Here, you can review the requirements for each IBM Spectrum Protect Plus
component, including a description of incoming and outgoing TCP ports. In addition, you can
review a brief description of the services that are associated with these ports.
Table 4-1 lists the TCP ports that must be opened between IBM Spectrum Protect Plus
components and VMs or physical servers when in-guest backups must be performed.
Chapter 4. Networking 87
Purpose TCP Ports Source Target
Windows file system 5985, 5986 IBM Spectrum Protect Windows file system
backup (for VMs and Plus server
physical servers)
9085 File Level Restore Windows file system
Browser
For a general introduction to networking with IBM Spectrum Protect Plus, for information
about data flows in different networks and for prerequisites, see 4.1, “IBM Spectrum Protect
Plus networking” on page 84.
The network topology in our example consists of a main data center with a Production LAN
and a backup LAN, which contains the IBM Spectrum Protect Plus virtual appliance, a vSnap
server, a VADP proxy, and an ESXi hypervisor, which is managed by a vCenter.
The Production LAN contains two network routers: one router acts as the default gateway and
connects all systems to the companies intranet; the second router establishes a VPN
connection to a remote data center where another vSnap server with integrated VADP proxy
is implemented to back up the remote VMware datacenter. In the remote data center, no
dedicated backup LAN exists; therefore, the vSnap server and VADP proxy are connected to
the Production LAN only.
Chapter 4. Networking 89
Figure 4-4 shows the IP networks, network routers, and IP addresses that are used in the
example environment.
In the following sections, our assumption is that the IBM Spectrum Protect Plus server, vSnap
servers, and VADP proxies are deployed and configured and that they are connected to the
Production LAN. To connect all components to the backup LAN, complete the following steps:
1. Physically attach the VMware ESXi or Microsoft Hyper-V Hypervisors to the backup
network and specify an IP address in the corresponding IP address range.
2. Connect the IBM Spectrum Protect Plus virtual appliance to the backup network and
specify an IP address in the corresponding IP address range.
3. Attach the IBM Spectrum Protect Plus vSnap servers to the backup network and configure
them to use the new connection for all protocols that are related to back up workloads.
4. Connect the IBM Spectrum Protect Plus VADP proxies to the backup network (VMware
only).
Important: For more information about how to correctly connect the hypervisors to the
backup network, contact your network architect or administrator.
Figure 4-5 shows a basic set-up for VMware that uses two virtual switches (vSwitch0 and
vSwitch1) and two networks: the Production LAN (“VM Network”) and the backup LAN.
Figure 4-5 ESXi virtual switches for Production LAN and backup LAN
VMkernel adapters
In the case of VMware, a VMkernel port is required to allow the assignment of an IP address
to the hypervisor inside a network segment. An example configuration is shown in Figure 4-6.
Chapter 4. Networking 91
Note: Each hypervisor must have its own IP address in the backup network to enable
VADP, NFS, SMB, or iSCSI connections between the host and the vSnap server.
A VMware ESXi host can perform backups and streaming restores because these services
use the VADP proxy to mount resources from the vSnap server. However, InstantAccess or
Test restores mount the vSnap server directly to the hypervisor by way of iSCSI or NFS
and fail if the host has no IP address assigned in the backup LAN.
In our example, we edit the ESXi host security profile to allow the NFSClient service to accept
outgoing connections to the backup LAN IP address range. In the vSphere GUI (vCenter
server web interface), for each host that shall use the dedicated backup LAN, select ESXi
Host → System → Firewall → NFS Client and add the allowed IP ranges. Figure 4-7 shows
how to enable outgoing NFS connections to back up LAN IP range 172.0.0.0/24.
Figure 4-8 shows the addition of a second network adapter to the IBM Spectrum Protect Plus
server VM.
Figure 4-8 Adding a backup network adapter to the IBM Spectrum Protect Plus server
Note: The configuration of static routes is required only if multiple gateways are used to
reach different network segments that contain IBM Spectrum Protect Plus components or
backup clients, such as hypervisors, VMs, or physical servers with applications. Depending
on the network and router design, static routes might not be required. Discuss this issue
with your network administrator.
Chapter 4. Networking 93
Complete the following steps:
1. Log in to the IBM Spectrum Protect Plus server by using the command line that uses the
SSH protocol to configure the new network adapter by using the NetworkManager Text
User Interface (nmtui) tool to assign an IP address that belongs to the backup network IP
address range.
2. Use the serveradmin user ID to connect to the SPP server command line, as shown in
Example 4-1.
Example 4-1 Log in to the IBM Spectrum Protect Plus server by using the ssh protocol
login as: serveradmin
Restricted access
[email protected]'s password:
Last login: Mon Jun 15 14:53:37 2020 from 10.0.250.10
----------------------------------------------------------------
IBM Spectrum Protect Plus 10.1.6 build [ 1972 ]
----------------------------------------------------------------
3. Validate that the new network adapter is visible in the operating system and note the
adapter name, by running the ip a command, as shown in Example 4-2. In this case, the
new backup LAN adapter is using device ens192.
Example 4-2 Check the SPP operating system for the new network adapter
[serveradmin@t1-spp-server ~]$ ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default
qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: ens160: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group
default qlen 1000
link/ether 00:50:56:98:14:15 brd ff:ff:ff:ff:ff:ff
inet 10.0.250.11/24 brd 10.0.250.255 scope global noprefixroute ens160
valid_lft forever preferred_lft forever
inet6 fe80::58b7:c15b:2943:bdf1/64 scope link noprefixroute
valid_lft forever preferred_lft forever
3: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group
default qlen 1000
link/ether 00:50:56:98:77:0e brd ff:ff:ff:ff:ff:ff
valid_lft forever preferred_lft forever
inet6 fe80::250:56ff:fe98:770e/64 scope link
valid_lft forever preferred_lft forever
...
4. Start the nmtui tool to configure the backup LAN adapter with an IP address, as shown in
Example 4-3.
In our example environment, no gateway is in the backup LAN; therefore, the fields for
Gateway, DNS, and Search domains are empty. However, we must modify the network
interface that is connected to the Production LAN (ens160) and specify a static route to the
special VPN gateway that connects to the remote side. The addition of a static route is
shown in Figure 4-10. It adds a route to remote network 10.135.40.192/26 by way of
gateway 10.0.250.9.
Figure 4-10 Adding a static route to the remote data center on the production network interface
Chapter 4. Networking 95
6. When the configuration is complete, validate that the IP and static route configuration is
correct, that the local hypervisors can be pinged by using their backup network IP
address, and that the remote site is reachable as well (see Example 4-4).
When the IBM Spectrum Protect Plus server is correctly attached to the backup network, the
same configuration must be done on the VADP proxies and the vSnap servers.
The following figures show how to attach a virtual vSnap server to the backup network, and to
configure it so that the backup related protocols (replication, NFS, SMC, and iSCSI) are
bound to the backup network adapter.
Because the vSnap server is a VM in this scenario, the adapter is added by editing the VM
settings, as shown in Figure 4-11.
Chapter 4. Networking 97
After the adapter is added to the vSnap server VM, log in to the command line interface by
using the SSH protocol and use nmtui to specify the proper IP settings, as shown in
Figure 4-12.
Figure 4-12 Configuring the IP address for a vSnap server backup network adapter
In the same way as it was done for the IBM Spectrum Protect Plus virtual appliance, a static
route must be established for the vSnap server to enable communication to the secondary
vSnap server in the remote data center (see Figure 4-13).
Figure 4-13 Adding a static route to the remote data center on the production network interface
Chapter 4. Networking 99
4.4.4 Preparing the IBM Spectrum Protect Plus VADP proxy (VMware only)
It is a common practice to have the VADP proxy component installed on the vSnap server. If
the VADP proxy is installed on a separate machine, it also must have access to both networks
(management and backup).
If the VADP proxy is a VM, use the hypervisor tools to edit the VM config to add a second
network adapter and connect it to the new backup network. If the VADP proxy is a physical
machine, you must add a second physical network adapter and attach it to the backup VLAN.
After this process is done, you must set an IP address and static route to remote vSnap
servers by using the nmtui tool. (Because this procedure is the same as for the IBM Spectrum
Protect Plus virtual appliance or the vSnap server, we do not show this process in more detail
here.)
In our example, we use two vSnap servers, one in the main location (site “Primary”) and one
in the remote data center (site “IBM-Cloud”), as shown in Figure 4-14 on page 101.
Figure 4-15 shows the configuration in the main location where we have two NICs: one for
backup and one for replication traffic.
Figure 4-16 shows the configuration in the remote data center where we have a vSnap server
that is connected to the production LAN only.
Note: The icon that is next to the interface name (“i” sign) shows which NIC is being used
for management traffic. Usually, this interface is used to register the vSnap server to the
IBM Spectrum Protect Plus server.
Run the vsnap network show command to identify which protocols are enabled on the
available network adapters, as shown in Example 4-6.
[serveradmin@t1-spp-vsnap ~]$
By default, all protocols are enabled on an adapter. In our example, we want to limit backup
workloads to the backup adapter in IP network 172.0.0.0/24 and replication traffic to the
production LAN interface in IP network 10.0.250.0/24.
ID: 00505698cb12
NAME: ens192
MAC ADDRESS: 00:50:56:98:cb:12
IPV4 ADDRESSES:
10.0.250.12
IPV6 ADDRESSES:
fe80::19f2:a215:68c8:8498
SERVICES:
mgmt
repl
SERVICE TYPES:
repl
ID: 0050569849aa
NAME: ens224
MAC ADDRESS: 00:50:56:98:49:aa
IPV4 ADDRESSES:
172.0.0.12
IPV6 ADDRESSES:
fe80::250:56ff:fe98:49aa
SERVICES:
mgmt
nfs
smb
iscsi
[serveradmin@t1-spp-vsnap ~]$
This set up ensures that replication workloads are routed through NIC ens192 and backup
data is routed to the vSnap server through NIC ens224.
Important: Ensure that the mgmt service remains enabled on the interface that was used to
register the vSnap server in IBM Spectrum Protect Plus. To prevent issues in the device
management, enable the mgmt service on all available adapters.
4.4.6 Special Configuration: Forcing VADP front end traffic to use a dedicated
interface
As described in Chapter 4.2, “Understanding network data flows” on page 85, IBM Spectrum
Protect Plus cannot control which interface is being used for data that flows between the
VADP proxy and the hypervisor (VADP front end). The selection of the interface is determined
most often by DNS name resolution.
Important: During a backup or streaming restore operation, the VADP proxy uses the IP
addresses that resolve to the hypervisor DNS names. If these IP addresses belong to the
production LAN, VADP front end traffic traverses through this network, independent of the
fact which network is being used between VADP proxy and vSnap server.
Figure 4-17 SPP job log with DNS name of the ESXi hypervisor
In our example, the host name x3650-m4-21.escc.workshop resolves to the IP address in the
Production LAN (10.0.250.221), which causes all VADP front end traffic to flow through this
network. The intention was to use a dedicated backup network for all backup and restore
workloads; therefore, we must change the name resolution.
To force the VADP proxy to use the backup LAN for front end traffic, we must override the
name resolution on that server by specifying a corresponding entry in the /etc/hosts file (see
Example 4-8).
Example 4-8 DNS override on the VADP proxy to force front end traffic to backup LAN
[serveradmin@t1-spp-vadp ~]$ cat /etc/hosts
127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4
...
172.0.0.221 x3650-m4-21 x3650-m4-21.escc.workshop
...
[serveradmin@t1-spp-vadp ~]$
As a result, the VADP proxy communicates with the ESXi hypervisor through the backup LAN.
For more information about how to edit firewall rules in various Linux operating systems, see
IBM Knowledge Center.
For more information about the TCP ports that must be opened in network firewalls to allow
communication between the different IBM Spectrum Protect Plus components, the
hypervisors, VMs, and the protected applications, see Chapter 4.3, “Establishing connections
through firewalls” on page 87.
For more information about how to use this tool, see 5.3.9, “Testing network connectivity” on
page 152.
For example, a database administrator can start an environment with consistent copies of the
database without knowing server login credentials or storage credentials. This approach
saves time for the server and storage team.
Figure 5-1 shows the relationship between users, roles, and resources and their purpose.
For more information about role-based access control (RBAC), see IBM Knowledge Center.
To illustrate RBAC, how it works, and how to use it, we use a practical use case in this
chapter.
Assume that we are running IBM Spectrum Protect Plus in a context where the following
requirements must be met:
The IBM Spectrum Protect Plus environment is configured for two different environments
that are isolated from each other in terms of management.
BackupOnly and RestoreOnly profiles are created to satisfy some sort of separation of
duties.
Separate teams are managing VMware, Oracle, and SQL resources, and each team sees
only what is under their responsibility.
Two Oracle databases cannot be restored by the same team. One team cannot restore a
database that is not under its responsibility.
Figure 5-2 shows our example the scenario. Next, we see how to meet our requirements by
using IBM Spectrum Protect Plus RBAC.
To meet our requirements, we create specific resource groups for administering virtual
machines (VMs), Oracle DBA, and SQL DBA. We also create dedicated roles for these
administrators with the BackupOnly or the RestoreOnly permissions and only resources they
are allowed to access.
For example, a resource group can include a VMware hypervisor, with access to only backup
and reporting functionality. When the resource group is associated with a role and a user, the
user sees only the screens that are associated with backup and reporting for the assigned
hypervisor.
In our example, we create four resource groups: one for VMware, two for Oracle (instance
segregation) and one for SQL:
resourceORA_t2:
– Resource: Application → Oracle → IBM Spectrum Protect Plus on t2-vm-lx machine
– Resource: Application Server → Oracle → t2-vm-lx
– Resource: Screen → All
– Resource: SLA Policy → All
– Resource: Job → All
– Resource: Accounts → Identity → All
To create a resource group, click Accounts → Resource group → Create Resource
Group in the IBM Spectrum Protect Plus web interface.
Figure 5-3 on page 111 shows the resource group resourceORA_t2 that was created for
the purpose of our example. When selecting a resource, always click the lower-left blue
Add Resources button. Otherwise, the resource is not added to the resource group.
resourceVMW:
– Resource: Hypervisor → VMware → vCenters → All VMware
– Resource: Screen → All
– Resource: SLA Policy → All
– Resource: Job → All
– Resource: Report → VM Environment → All
– Resource: System Configuration → Site → Primary → System Configuration → Site →
Secondary
resourceORA_t3:
– Resource: Application → Oracle → IBM Spectrum Protect Plus on t3-vm-lx machine
– Resource: Application Server → Oracle → t2-vm-lx
– Resource: Screen → All
– Resource: SLA Policy → All
– Resource: Job → All*
– Resource: Accounts → Identity → All
resourceSQL:
– Resource: Application → SQL → All SQL
– Resource: Screen → All
– Resource: SLA Policy → All
– Resource: Job → All
– Resource: Accounts → Identity → All
The Job resource is important because by using it, the user can see the jobs log from the IBM
Spectrum Protect Plus interface, and submit new jobs from its own operation.
Figure 5-4 Resource group detailed view when clicking the resource group name
In our example, we assigned SLA Policy Resource to All, but you can restrict it to a specific
SLA policy if you have a dedicated SLA Policy per workload type. Likewise, we assigned
Accounts resources to All, but you can restrict it to specific accounts that are required for the
profile you are creating.
Note: The resource Screen allows assigned users to open the IBM Spectrum Protect Plus
web interface. Always assign the user to the relevant screens; otherwise, the user cannot
use the assigned resources in IBM Spectrum Protect Plus.
Note: The SUPERUSER role cannot be assigned to any individual user account; it is
dedicated to the sppadmin user.
To meet the requirements listed in 5.1, “Role-based access control overview” on page 108,
we use predefined roles and create specific roles when we want more restriction:
RestoreOnly_DBA: A role that we created that is be used by the DBA in charge of
recoveries:
– Built upon the predefined model Restore Only
– We removed the permission on Hypervisor
Application Admin: Pre-defined role in IBM Spectrum Protect Plus. We use it for the DBA
in charge of configuring and performing backup.
RestoreOnly_VM: A role that we created that is to be used by VM administrator who is in
charge of VM restore:
– Built upon the predefined model Restore Only
– We removed the permission on Applications
BackupOnly_VM: A role that we created that is to be used by VM administrator that is in
charge of VM backup:
– Built upon the predefined model Backup Only
– Be removed the permission on Applications
Figure 5-5 on page 114 shows the creation of the Role RestoreOnly_VM that is based on the
Restore Only template.
By selecting the role, the assigned permissions are displayed (as shown on the right side of
Figure 5-5 on page 114).
To modify or delete a role, click the three dots (...), as shown in Figure 5-6.
Figure 5-6 Edit Role by selecting the three dots and selecting the Modify Role option
These users are defined as local IBM Spectrum Protect Plus users, except for SQLBA and
SQLRECO, which are defined as LDAP groups to show the integration of IBM Spectrum
Protect Plus with LDAP. Before creating a user that is based on an LDAP groups, see how to
configure the connectivity between LDAP and IBM Spectrum Protect Plus as described in
5.3.4, “Configuring LDAP and SMTP” on page 137
Figure 5-7 shows the example of ORABA User creation, as a local user.
Figure 5-9 shows the same step of user creation, but uses the LDAP Group instead of a
specific user.
Figure 5-10 ClientGroupDBA which is an LDAP group being defined as Spectrum Protect User
Figure 5-11 Operations Center end of IBM Spectrum Protect Plus server registration
This operation creates a user and role dedicated to operation center (for information
exchange) in the IBM Spectrum Protect Plus environment, as shown in Figure 5-12
Figure 5-12 Operations Center user in IBM Spectrum Protect Plus with its created role
Also, by setting the IBM Spectrum Protect Operations Center URL in System
Configuration → Global Preferences, a new icon (see Figure 5-14) appears in the top right
corner of the IBM Spectrum Protect Plus interface. This icon is a link to the Operations
Center.
Figure 5-14 Operations Center link from IBM Spectrum Protect Plus interface
By clicking this icon, a pop-up window appears that includes the Operations Center log in
window. You then must log in by using the Operations Center credentials to browse through
the IBM Spectrum Protect Plus dashboard.
A set of predefined reports are available to run immediately, or you can define a schedule that
automatically generates the report and sends results by email to any specified address (for
more information about how to configure SMTP, see 5.3.4, “Configuring LDAP and SMTP” on
page 137).
Any custom report that you created can be found in Reports and Logs → Reports →
Custom Reports tab.
Figure 5-17 IBM Spectrum Protect Plus Housekeeping custom report creation
Figure 5-18 IBM Spectrum Protect Plus Backup and REcovery operation report creation
By using the Protection report category, you can create three custom reports to view the
SLA Policy RPO compliance for Database, File System, and VM. Figure 5-19 on page 123
shows an example of SLA Policy RPO compliance report for Applications.
Note: The SLA Policy RPO compliance report can be used to review the vSnap server
replication status. As shown in Figure 5-19, whenever the SLA Policy is configured to
replicate the vSnap server and the replication did not occur or is not up to date, the SLA
Policy RPO report flags the specific resource (here, the VM) as non-compliant. Whenever
the compliance is not met, more information is provided in the report, as shown in
Figure 5-20 on page 124.
Note: The content of the report is limited to what the Resource Group is allowing for the
user who is defining or running that report.
5.3 Maintenance
This section provides guidance about how IBM Spectrum Protect Plus users can maintain the
product. We discuss different approaches to handle daily operations by using the Graphical
User Interface (GUI) and the Command Line Interface (CLI).
You can update the IBM Spectrum Protect Plus virtual appliance, vSnap servers, and the
VADP proxy servers to get the latest features and enhancements. Software patches and
updates are installed by using the IBM Spectrum Protect Plus administrative console or CLI
for these components.
You must update the IBM Spectrum Protect Plus server first. After the IBM Spectrum Protect
Plus update completes, you must update any external vSnap and VADP proxy servers in your
environment.
For offline updates, download the prerequisite IBM Spectrum Protect Plus update file from
the IBM Fix Central website to a directory on the computer that is running the browser for
the Administrative Console. For more information about files for IBM Spectrum Protect
version 10.1.6.x and how to obtain it from Fix Central, see this web page.
Ensure that your IBM Spectrum Protect Plus environment is backed up before you run
updates. For more information about backing up your environment, see IBM Knowledge
Center.
Ensure that no jobs are running during the update procedure. Pause the schedule for any
jobs that have a status of IDLE or COMPLETED. You can perform this task from IBM
Spectrum Protect Plus GUI by selecting Jobs and Operations → Schedule and then,
click Pause Schedule for each of the jobs.
Complete the following steps to update the IBM Spectrum Protect Plus server:
1. From a supported web browser, access the Administrative Console at
https://hostname:8090/, where hostname is the IP address of the VM where the
application is deployed.
2. In the log-in window, select Authentication Type → System.
3. Enter the password for the userID serveradmin.
Note. Starting with version 10.1.5, the initial password of the user ID serveradmin is
sppDP758-SysXyz.
Note: The update process begins after the update image is uploaded to the appliance.
7. When the update is complete, the VM where the application is deployed automatically
restarts.
8. Do not forget to release the paused jobs, if any such jobs exist. Log in to IBM Spectrum
Protect Plus GUI and select Jobs and Operations → Schedule and find the jobs that you
paused. Click Actions → Release Schedule.
Test restore jobs must complete before an update to vSnap server is started. Jobs that are
not completed or canceled when an upgrade is started are not visible when the update
completes. If jobs are not visible when the update completes, rerun the test restore jobs.
You also might be required to update the operating system for the vSnap servers before
updating the servers. For more information about operating system requirements, see
Component requirements at IBM Knowledge Center.
If a VADP proxy update is available for external proxies during a restart of the IBM Spectrum
Protect Plus virtual appliance, the update will be automatically applied to any VADP proxy
associated with an identity. To associate a VADP proxy with an identity, navigate to System
Configuration → VADP Proxy. Click the options icon and select Set Options. Through the
User setting, select a previously entered username and password for the VADP proxy server.
Early availability updates might not contain fixes for all IBM Spectrum Protect Plus
components. For more information about how to obtain and install interim fixes, see the
download information that is published when the fixes are available.
Log location
The log location IBM Spectrum Protect Plus is available at this IBM Support web page.
To view the real-time log files for the different components in IBM Spectrum Protect Plus, SSH
to the IBM Spectrum Protect Plus server. The log files can be found in the locations that are
listed in Table 5-2 on page 130.
VMDKbackupproxy /data/log/vmdkbackupproxy
RabbitMQ /data/log/rabbitmq
nodejscdmservice /data/log/node-cdm-service/
Mongo /data/log/mongo
Guestdeployer /data/log/guestdeployer
adminconsole /data/log/adminconsole/
For more information about vSnap server management, see the documentation that is
available at this IBM Support web page.
Managing disks
A vSnap server creates a storage pool by using disks that are provisioned to the vSnap
server. In the case of virtual deployments, the disks can be RDM or virtual disks provisioned
from data stores on any backing storage. In the case of physical deployments, the disks can
be local or SAN storage attached to the physical server. The local disks might have external
redundancy enabled by way of a hardware RAID controller, but if not, a vSnap server can also
create RAID-based storage pools for internal redundancy.
Disks that are attached to vSnap servers must be thick provisioned. If disks are thin
provisioned, the vSnap server will not have an accurate view of free space in the storage
pool, which might lead to data corruption if the underlying data store runs out of space.
If a vSnap server was deployed as part of a virtual appliance, it includes a 100 GB starter
virtual disk that can be used to create a pool. You can add disks before or after creating a pool
and use them to create a larger pool or expand an existing pool. I
If job logs report that a vSnap server is reaching its storage capacity, more disks can be
added to the vSnap pool. Alternatively, creating SLA policies force backups to use an
alternative vSnap server.
It is essential to protect against vSnap server file system corruption, which might be caused
by a VMware data store on a vSnap server reaching its capacity. Create a stable environment
for virtual vSnap servers that do not use RAID configurations by using thick provisioned
VMDKs. Replicating to external vSnap servers provides more protection.
A vSnap server becomes invalidated if the vSnap pool is deleted or if a vSnap server disk is
deleted in a non-redundant RAID configuration. All data on the vSnap server is lost. If your
vSnap server becomes invalidated, you must unregister the vSnap server by using the IBM
Spectrum Protect Plus interface and then, run the maintenance job. When complete, the
vSnap server can be registered again.
User interface: Click System Configuration → Backup Storage → Disk in the navigation
pane, and then click the Actions menu next to the relevant vSnap server and select Rescan.
To complete an advanced initialization, use the vsnap pool create command to create a
storage pool manually. Before you run the command, ensure that one or more unused disks
are available as described in Showing disks. For information about available options, pass the
--help flag for any command or subcommand.
Specify a user-friendly display name for the pool and a list of one or more disks. If no disks
are specified, all available unused disks are used. You can choose to enable compression
and deduplication for the pool during creation. You can also update the compression or
deduplication settings at a later time by using the vsnap pool update command.
The pool type that you specify during the creation of the storage pool dictates the redundancy
of the pool:
raid0
This is the default option when no pool type is specified. In this case vSnap assumes your
disks have external redundancy, for example, if you use virtual disks on a data store
backed by redundant storage. In this case, the storage pool will have no internal
redundancy.
After a disk is added to a raid0 pool, it cannot be removed. Disconnecting the disk results
in the pool becoming unavailable, which can be resolved only by destroying and recreating
the pool.
raid5
When you select this option, the pool is composed of one or more RAID5 groups each
consisting of three or more disks. The number of RAID5 groups and the number of disks in
each group depends on the total number of disks you specify during pool creation. Based
on the number of available disks, vSnap chooses values that maximize total capacity while
also ensuring optimal redundancy of vital metadata.
raid6
When you select this option, the pool is composed of one or more RAID6 groups each
consisting of four or more disks. The number of RAID6 groups and the number of disks in
each group depends on the total number of disks that you specify during pool creation.
Based on the number of available disks, vSnap chooses values that maximize total
capacity while also ensuring optimal redundancy of vital metadata.
Before the vSnap pool can be used, it must be initialized. The simple initialization method that
is available within the IBM Spectrum Protect Plus GUI was described in “Initializing vSnap
pool” on page 72.
For servers that are deployed in a physical environment, the vSnap server console offers
more options for initializing the server, including the ability to create a storage pool by using
advanced redundancy options and a specific list of disks.
To initialize a vSnap server by using the vSnap server console, complete the following steps:
1. Log in to the vSnap server console with the user ID serveradmin. You can also use a user
ID that has vSnap admin privileges that you create by using the vsnap user create
command.
Note: In Spectrum Protect Plus version 10.1.4, the initial password of the user ID
serveradmin is sppDP758. Starting with version 10.1.5, the password was changed to
sppDP758-SysXyz.
2. Run the vsnap system init --skip_pool command. The command requires no further
interaction and completes all initialization tasks except for the creation of a storage pool.
The process might take 5 - 10 minutes to complete.
After the initialization process is completed, the Status/Capacity column shows a utilization
bar for your vSnap server. Let’s check now what we see on the vSnap CLI when we enter the
show command for the vSnap pool again, as shown in Example 5-3.
Example 5-3 The vsnap pool show command list details of a vSnap pool
[serveradmin@t3-spp-vsnap ~]$ vsnap pool show
TOTAL: 1
ID: 1
NAME: primary
POOL TYPE: raid0
STATUS: ONLINE
HEALTH: 100
COMPRESSION: Yes
COMPRESSION RATIO: 1.01
DEDUPLICATION: No
DEDUPLICATION RATIO: 1.00
ENCRYPTION:
ENABLED: Yes
TYPE: disk
The command vsnap pool show in Example 5-3 on page 132 lists the details of our vSnap
pool. We can see a pool of 100 GB capacity with one disk where compression and encryption
is enabled and deduplication is disabled.
In Example 5-4, the vsnap volume show command lists one volume in the pool (ID 1). This
volume with the ID 1 refers to a cloud cache area that is created with initialization of the
vSnap pool. It is not used for backup data. For more information, see “Preparing the disk
cache area” on page 420.
Example 5-4 The vsnap pool show command list the cloud cache volume after initialization
[serveradmin@t3-spp-vsnap ~]$ vsnap volume show
ID | TYPE | POOL | IS CLONE | TOTAL | FREE | USED | NAME | TAGS
----------------------------------------------------------------------------------------------
1 | filesystem | 1 | No | 100.00GB | 96.39GB | 24.00KB | vsnap_metadata_cloud | N/A
If we now use the vsnap snapshot show command, it does not list any snapshot, which is at
this time expected, because no backup was done so far.
Command line: Run the vsnap pool expand command, as shown in Example 5-5. For
information about available options, pass the --help flag for any command or subcommand.
Options:
The following example shows an expansion of the vsnap_pool with another disk
(100.00 GB).
1. List the current pool by running the vsnap pool show command. It shows only one disk is
assigned to this pool (see last line DISKS IN POOL:). Note that the pool ID is 1 and the
TOTAL SPACE is 100.00 GB, as shown in Example 5-6.
Example 5-6 The vsnap pool show command before adding a disk
[serveradmin@t3-spp-vsnap ~]$ vsnap pool show
TOTAL: 1
ID: 1
NAME: primary
POOL TYPE: raid0
STATUS: ONLINE
HEALTH: 100
COMPRESSION: Yes
COMPRESSION RATIO: 1.36
DEDUPLICATION: Yes
DEDUPLICATION RATIO: 1.01
ENCRYPTION:
ENABLED: No
[serveradmin@t3-spp-vsnap ~]$
2. To list all the available disks, run the vsnap pool show command, as shown in
Example 5-7.
Example 5-8 The vSnap disk show command after adding a new disk
[serveradmin@t3-spp-vsnap ~]$ vsnap disk show
UUID | TYPE | VENDOR | MODEL | SIZE | USED AS | NAME
----------------------------------------------------------------------------------------------------
36000c294686b281a370e7612e55e153b | SCSI | VMware | Virtual disk | 50.00GB | xfs | /dev/sda
36000c29ac6130630aec2f02c2aa865a8 | SCSI | VMware | Virtual disk | 100.00GB | vsnap_pool | /dev/sdb
36000c2960aa178c16a010c527c249df4 | SCSI | VMware | Virtual disk | 128.00GB | LVM2_member | /dev/sdc
36000c291396b40e6b66f62265ac7cf04 | SCSI | VMware | Virtual disk | 100.00GB | unused | /dev/sdd
[serveradmin@t3-spp-vsnap ~]$
5. To add the new disk to the vsnap_pool run the vsnap pool expand --id TEXT
--disk_list TEXT command, as shown in Example 5-9. After completion of the command,
it shows two disks are assigned to this pool (see the last line DISKS IN POOL:), and the
TOTAL SPACE expanded to 200.00 GB.
ID: 1
NAME: primary
POOL TYPE: raid0
STATUS: ONLINE
HEALTH: 100
COMPRESSION: Yes
COMPRESSION RATIO: 1.36
DEDUPLICATION: Yes
DEDUPLICATION RATIO: 1.01
ENCRYPTION:
ENABLED: No
[serveradmin@t3-spp-vsnap ~]$
[serveradmin@t3-spp-vsnap ~]$
Ensure that no jobs use SLA policies that define the vSnap server as a backup target. To view
the SLA policies that are associated with jobs, see the Backup page for the hypervisor or
application that is scheduled for backup. For example, for VMware backup jobs, click Manage
Protection → Hypervisors → VMware.
Note: Starting with version 10.1.5, the password of the serveradmin user ID is
sppDP758-SysXyz.
You can also use a user ID that has vSnap server administrator privileges that you create
by running the vsnap user create command.
2. Run the following commands:
systemctl stop vsnap
yum remove vsnap
After a vSnap server is uninstalled, the configuration is retained in the /etc/vsnap directory.
The configuration is reused if the vSnap server is reinstalled. The configuration is removed if
you ran the optional commands to remove the configuration data.
Note: Only one LDAP server can be associated with an instance of Spectrum Protect Plus.
You can add a Microsoft Active Directory or OpenLDAP server. OpenLDAP does not support
the sAMAaccountName user filter that is commonly used with Active Directory. Also, the
memberOf option must be enabled on the OpenLDAP server.
Host Address
The IP address of the host or logical name of the LDAP server.
Port
The port on which the LDAP server is listening. The typical default port is 389 for non-SSL
connections or 636 for SSL connections.
SSL
Enable the SSL option to establish a secure connection to the LDAP server.
Bind Name
The bind distinguished name that is used for authenticating the connection to the LDAP
server. IBM Spectrum Protect Plus supports simple bind.
Password
The password that is associated with the Bind Distinguished Name.
Base DN
The location where users and groups can be found.
The User Filter setting also controls the type of user name that appears in the IBM
Spectrum Protect Plus display of users.
User RDN
The relative distinguished path for the user. Specify the path where user records can be
found. An example of a valid default RDN is cn=Users.
Group RDN
The relative distinguished path for the group. If the group is at a different level than the user
path, specify the path where group records can be found.
4. Click Save.
After the SMTP server is added, the Add LDAP Server button is no longer available.
If your IBM Spectrum Protect Plus server communicates by using Secure Sockets Layer
(SSL) to the LDAP environment, register LDAP with SSL authentication at this web page.
Note: Only one SMTP server can be associated with IBM Spectrum Protect Plus.
Host Address
The IP address of the host, or the path and host name of the SMTP server.
Port
The communications port of the server that you are adding. The typical default port is 25 for
non-SSL connections or 443 for SSL connections.
Username
The name that is used to access the SMTP server.
Timeout
The email timeout value in milliseconds.
From Address
The address that is associated with email communications from IBM Spectrum Protect Plus.
Subject Prefix
The prefix to add to the email subject lines sent from IBM Spectrum Protect Plus.
4. Click Save.
To test the SMTP connection, click the Test SMTP Server button, then enter an email
address. Click Send. A test email message is sent to the email address to verify the
connection. After the SMTP server is added, the Add SMTP Server button is no longer
available.
To edit the settings for an LDAP or SMTP server, complete the following steps:
1. From the navigation menu, click System Configuration → LDAP/SMTP.
1. Click the edit icon that is associated with the server. The edit pane is displayed.
1. Revise the settings for the server, and then, click Save.
Using the administrative console, you can complete the following tasks:
Get details about the installed product versions.
Manage and install the licenses.
Manage and install certificates, e.g. Active Directory LDAP certificates.
Apply and install Spectrum Protect Plus Software Updates.
Perform System Actions, such as Start/Stop the server, restart the VM, and configure the
time zone.
In the login window shown in Figure 5-23, select one of the following authentication types
shown in the Table 5-3 Authentication Type list.
IBM Spectrum Protect Plus To log in as an IBM Spectrum Protect Plus user with SYSADMIN
privileges, enter your administrator user name and password. If you
log in by using the admin user account, you are prompted to reset
the user name and password. You cannot reset the user name to
admin, root, or test.
System (recommended) To log in as a system user, enter the server admin password. In
Spectrum Protect Plus version 10.1.4, the initial password of the
user ID serveradmin is sppDP758. Starting with version 10.1.5, the
password was changed to sppDP758-SysXyz.
You are prompted to change this password during the first login.
System Management
Select the System Management option to manage your instance of the IBM Spectrum
Protect Plus server, as shown in Figure 5-25 on page 142.
By using this panel, you can either and start Spectrum Protect Plus applications and
components, or restart the Spectrum Protect Plus appliance. This second action is stopping
and starting the VM along with all Spectrum Protect Plus services.
Technote 739663 provides information about the use of an HTTPS certificate that is issued by
Microsoft Certificate Authority.
This section provides more information about how to create certificate signing requests that
include so-called Subject Alternative Name (SAN):
A SAN or subject alternative name is a structured way to indicate all of the domain names
and IP addresses that are secured by the certificate1.
If the SAN are not defined, the following browsers report warnings, even if the certificate is
correctly signed:
Mozilla Firefox posts a warning: “Potential security Alert” if the user is accessing the server
by way of the IP address instead of host name
Google Chrome reports an error NET::ERR_CERT_COMMON_NAME_INVALID when
accessing the GUIs by host name
Google Chrome posts an alert NET::ERR_CERT_COMMON_NAME_INVALID when
accessing the GUI by IP
1
Source Entrrust DataCard, see:
https://www.entrustdatacard.com/blog/2019/march/what-is-a-san-and-how-is-it-used
Note: The instructions that we provide next do not include more information about SSL and
signed certificates or the principles of trusted certificate chains. For more information about
these topics, see this web page.
[req_distinguished_name]
C = DE
ST = HE
L = Kelsterbach
O = IBM
OU = ESCC
CN = spp-server-itso.sle.kelsterbach.de.ibm.com
[v3_req]
keyUsage = keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth
subjectAltName = @alt_names
[alt_names]
DNS.1 = spp-server-itso.sle.kelsterbach.de.ibm.com
DNS.2 = spp-server-itso
IP.1 = 9.1yy.122.2xx
Some CAs might remove the SAN parameters or set their own values. Also, ensure that the
management station from which you start the SPP server GUI holds your company’s CA
signer certificates in the workstation’s keystore. The Firefox browser might need a
configuration adjustment to use the workstation’s default trust store instead of the predefine
trusted CAs in Firefox.
Note: Only users with administrator credentials can manage global preferences.
The Global Preferences page contains default values for parameters that apply to all IBM
Spectrum Protect Plus operations. The preferences are organized into the following
categories:
Application
General
Job
Logging
Protection
Security
Note: On the Global Preferences page, the Integration with other storage products
section is where you can specify the URL of your Spectrum Protect Operation Center.
The default values for the Application global preferences are listed in Table 5-4.
The default values for the General global preferences are listed in Table 5-5.
The default values for the Job global preferences are listed in Table 5-6.
The default value for the Logging global preference is shown in Table 5-7.
Note: Consider the general format of the alerts that are logged by IBM Spectrum Protect
Plus:
<Type of Message>: Can be ERROR, WARNING, and so on.
<Source of Message>: Indicates the source of the message. SPPAlert indicates IBM
Spectrum Protect Plus messages.
<Message>: This contains the IBM Spectrum Protect Plus alert details.
The default values for the Protection global preferences are listed in Table 5-8.
The default value for the Stitchery global preferences is listed in Table 5-8.
For more information about these preferences and their purpose, see IBM Knowledge Center.
Attention: An IBM Spectrum Protect Plus restore operation overwrites all data that is in
the IBM Spectrum Protect Plus virtual appliance or alternative virtual appliance location.
All IBM Spectrum Protect Plus operations stop while the data is being restored. The user
interface is not accessible, and all jobs that are running are canceled. Any snapshots that
are created between the backup and restore operations are not saved.
If restoring from another copy, the cloud resource or repository server must be registered on
the alternative IBM Spectrum Protect Plus location.
To restore IBM Spectrum Protect Plus data, complete the following steps:
1. In the navigation pane, click Manage Protection → IBM Spectrum Protect Plus →
Restore.
2. Select a vSnap server, cloud resource, or repository server.
Expiring a resource from the catalog does not remove associated snapshots from a vSnap
server or secondary backup storage.
As the result, the catalog metadata associated with the resource is removed from the catalog.
Expiring a job session does not remove a snapshot and related recovery point if the snapshot
is locked by a replication or copy/archive relationship. Run the replication or copy/archive
enabled job to set the lock to a later snapshot. The snapshot and recovery point are removed
during the next run of the maintenance job.
As a result, the job session is removed during the next run of the maintenance job.
Regular expression search entries are also supported. For more information, see Search Text
with Regular Expressions on the Microsoft SQL Docs web page.
You can also include special characters (+, -, &, |, !, (, ), {, }, [, ], ^, ", ~, *, ?, :, and \) in the
search. You must use a backslash (\) escape character before any of the special characters.
You can use multiple asterisk wildcard in a single text string, but multiple wildcards might
considerably slow down a large search.
You can run the Service Tool from the IBM Spectrum Protect Plus command line or remotely
by using a .jar file. If a connection can be established, the tool returns a green check mark. If
a connection cannot be established, the error condition is displayed, along with possible
causes and actions.
Figure 5-28 and Figure 5-29 on page 153 show the look of the tool.
Note: If the firewall-cmd command is not available on your system, edit the firewall
manually to add necessary ports and restart the firewall by using iptables. For more
information about editing firewall rules, see Firewall configuration using iptables of IBM
Knowledge Center.
Tip: Use your browser’s search capability by using Ctrl+F to find the message code you
are looking for.
The following example contains the Db2 agent prefix. When you click More, more information
that explains the reason for the message are shown (see Example 5-15).
Table 5-10 lists the prefix that is associated with each component.
For more information about these messages, see IBM Knowledge Center.
The second user interface is a command-line interface (CLI), which can be entered by way of
SSH by using the default serveradmin user ID. The sections “User interfaces” on page 15 and
3.4.2, “Configuring the vSnap Backup Storage server” on page 63 provide details about how
to use and configure the access to these user interfaces.
In Example 5-16 we show how to log in to the CLI user interface using the serveradmin user
ID and by running the command vsnap to list all options for the vSnap CLI.
----------------------------------------------------------------
[serveradmin@spp-vsnap-demo ~]$ vsnap
Usage: vsnap [OPTIONS] COMMAND [ARGS]...
Options:
--json Show output in JSON format.
--summary Show output in summary (tabular) format.
--detail Show output in detail (multiline) format.
--help Show this message and exit.
Commands:
archive Manage archive resources.
cloud Manage cloud resources.
disk Manage disks.
host Manage volume host mappings.
maint Manage maintenance sessions.
network Manage network interfaces.
partner Manage partner servers.
pool Manage storage pools.
relationship Manage replication relationships.
session Manage replication sessions.
share Manage volume shares.
snapshot Manage volume snapshots.
system Manage vSnap system.
target Manage storage targets.
throttle Manage throttling events.
user Manage vSnap users.
volume Manage storage volumes.
[serveradmin@spp-vsnap-demo ~]$
When all of the services that are checked by the vsnap_status command are in active state,
the vSnap server is considered healthy.
If a VADP proxy is configured on the vSnap server, run the service remote-vadp.service
status command to check the status of that VADP proxy service, as shown in Example 5-18.
Specific values can be filtered by using the grep option (as shown in Example 5-20) where we
list the maximum number of streams for archive, cloud, and replication operations.
Example 5-20 Filter the preference list for specific values using grep
[serveradmin@t3-spp-vsnap ~]$ vsnap system pref get | grep -i MaxStreams
archiveMaxStreams | 5 | N/A | integer
cloudMaxStreams | 5 | N/A | integer
replMaxStreams | 5 | N/A | integer
NAME: replMaxStreams
DEFAULT VALUE: 5
USER VALUE: 10
TYPE: integer
Another option is the timeout setting of a replication task. By default the timeout its set to
608400 seconds, which translate to 7 days. A large timeout can be required especially for
initial replication tasks. To change this value to a timeout of 24 hours you can set it to 86400
seconds, as shown in Example 5-22.
NAME: replTransferTimeout
DEFAULT VALUE: 604800
USER VALUE: 86400
TYPE: integer
Before a backup could be taken, a resource need to assigned to an SLA. Chapter 6.1.3,
“Assigning an SLA policy” on page 174 explains this as example for VMs and chapter 1.3,
“SLA backup policies” on page 19 speaks about SLA policies in general.
Example 5-23 Execution of a SLA to create a new volume in the vSnap server
[serveradmin@t2-spp-vsnap ~]$ vsnap volume show
ID | TYPE | POOL | IS CLONE | TOTAL | FREE | USED | NAME | TAGS
---------------------------------------------------------------------------------------------------------------
1 | filesystem | 1 | No | 100.00GB | 93.62GB | 24.00KB | vsnap_metadata_cloud | N/A
2 | filesystem | 1 | No | 100.00GB | 93.62GB | 2.77GB | spp_1004_2002_16b6aeb7936__group0_12_ | N/A
The first number referenced in the volume name (in our example 1004) is the Job ID of the
job using this volume. In our example we have associated a VMware backup with the Bronze
SLA, which created the job vmware_Bronze that is listed under the Jobs and Operations in
the IBM Spectrum Protect Plus GUI. The Job ID:1004 of vmware_Bronze could be figured out
when looking into the first line of the job log, as shown in Figure 5-30.
When running operating system commands, such as du or find as shown in Example 5-25,
you can also explore the content of the file system to determine which VM is backed up in
which file system.
As long as the backup job is running we could see a share on the file system which is
associated with the SLA. The vSnap CLI command vsnap share show as shown in
Example 5-26 is listing the active share, where the Volume ID 2 and the file system name
/vsnap/vpool1/fs2 could be identified.
The share is used to transfer the backup data from the hypervisor, application or database to
the vSnap server.
Note: For the backup of VMware VMs a VADP proxy is required, therefore the backup data
is transferred from the hypervisor through the VADP proxy to the vSnap server. For more
information about the VADP proxy, see 1.2.4, “VADP proxy server” on page 16.
After the backup is completed, a Snapshot on the file system is created, which is the backup
entity or the backup version. In Example 5-27 we use the command vsnap snapshot show list
all snapshots.
ID: 1
NAME: spp_1004_2002_2_16b6aee0745
PARENT ID: 2
PARENT NAME: spp_1004_2002_16b6aeb7936__group0_12_
POOL ID: 1
POOL NAME: primary
HAS CLONES: No
USED SPACE: 0.00KB
VERSION ID: 12686594730219022292
CREATED: 2019-06-18 14:11:53 UTC
UPDATED: 2019-06-18 14:11:53 UTC
The volume where the snapshot is taken from could be identified by the Parent ID and the
Parent Name.
As shown in Example 5-28 the replication job creates a target volume (ID 2) on the target
vSnap server t2-spp-vsnap-dr.
Example 5-28 Replication target volume is created on the target vSnap server
[serveradmin@t2-spp-vsnap-dr ~]$ vsnap volume show
ID | TYPE | POOL | IS CLONE | TOTAL | FREE | USED | NAME | TAGS
-------------------------------------------------------------------------------------------------------------------------------
1 | filesystem | 1 | No | 100.00GB | 84.21GB | 24.00KB | vsnap_metadata_cloud | N/A
2 | filesystem | 1 | No | 100.00GB | 84.21GB | 12.18GB | spp_16b6b15c8d1_spp_1004_2002_16b6aeb7936__group0_12_ | N/A
Next the replication relationship between both volumes is configure on both vSnap servers.
The vSnap CLI command vsnap relationship show is listing these relationships as shown in
Example 5-29 for the source vSnap server t2-spp-vsnap and in Example 5-30 on page 167
for the target vSnap server t2-spp-vsnap-dr.
ID: 7ce7be815c5f4fc9147c52a55bd6530d
PARTNER ID: 5345ec9e347b40d5ae63b2397f64c8da
PARTNER TYPE: vsnap
PARTNER ADDR: t2-spp-vsnap-dr
LOCAL ROLE: primary
LOCAL POOL ID: 1
LOCAL VOL ID: 2
LOCAL VOL NAME: spp_1004_2002_16b6aeb7936__group0_12_
REMOTE POOL ID: 1
REMOTE VOL ID: 2
REMOTE VOL NAME: spp_16b6b15c8d1_spp_1004_2002_16b6aeb7936__group0_12_
LAST SYNC STATUS: N/A
LAST SYCNED SNAP ID: N/A
LAST ATTEMPT SNAP ID: 1
CREATED: 2019-06-18 14:55:19 UTC
UPDATED: 2019-06-18 14:55:19 UTC
ID: 7ce7be815c5f4fc9147c52a55bd6530d
PARTNER ID: bc1c6c4052a744ad86bdc25625e2c516
PARTNER TYPE: vsnap
PARTNER ADDR: t2-spp-vsnap
LOCAL ROLE: replica
LOCAL POOL ID: 1
LOCAL VOL ID: 2
LOCAL VOL NAME: spp_16b6b15c8d1_spp_1004_2002_16b6aeb7936__group0_12_
REMOTE POOL ID: 1
REMOTE VOL ID: 2
REMOTE VOL NAME: spp_1004_2002_16b6aeb7936__group0_12_
LAST SYNC STATUS: N/A
LAST SYCNED SNAP ID: N/A
LAST ATTEMPT SNAP ID: N/A
CREATED: 2019-06-18 14:55:19 UTC
UPDATED: 2019-06-18 14:55:19 UTC
The fields Partner Address, Local Volume ID, Local Volume Name, Remote Volume ID
and Remote Volume Name are used to identify which vSnap servers and volumes are used
for this relationship.
A empty Snapshot is created as shown by running the vsnap snapshot show command, as
shown in Example 5-31. The details of the snapshot are not yet available by running vsnap
snapshot show --id 1 the command.
When the replication is running a session is created for the replication on the source vSnap
server. In Example 5-32 the command vsnap session show is used to list the replication
session on the source server t2-spp-vsnap. The status field indicates if it is an Active session
or a Completed session.
ID: 1
ID: 1
RELATIONSHIP ID: 7ce7be815c5f4fc9147c52a55bd6530d
PARTNER TYPE: vsnap
REPL ADDRESS: 10.0.250.23
LOCAL SNAP ID: 1
LOCAL SNAP NAME: spp_1004_2002_2_16b6aee0745
REMOTE SNAP ID: 1
REMOTE SNAP NAME: spp_1004_2101_16b6b15c808
PRIORITY: 50
STATUS: COMPLETED
SENT: 12.22GB
QUEUED: 2019-06-18 14:55:20 UTC
STARTED: 2019-06-18 14:55:26 UTC
ENDED: 2019-06-18 14:57:37 UTC
MESSAGE: Completed
After the replication session is completed the snapshot on the target volume is updated and
details of the snapshot are available which is listed in Example 5-33 by running the vSnap CLI
vsnap snapshot show command.
ID: 1
NAME: spp_1004_2101_16b6b15c808
PARENT ID: 2
PARENT NAME: spp_16b6b15c8d1_spp_1004_2002_16b6aeb7936__group0_12_
POOL ID: 1
POOL NAME: primary
HAS CLONES: No
USED SPACE: 0.00KB
VERSION ID: 12686594730219022292
CREATED: 2019-06-18 14:57:37 UTC
The relationship of the volumes on the source and the target server is updated as shown in
Example 5-34 for the source vSnap server and in Example 5-35 for the target vSnap server.
ID: 7ce7be815c5f4fc9147c52a55bd6530d
PARTNER ID: 5345ec9e347b40d5ae63b2397f64c8da
PARTNER TYPE: vsnap
PARTNER ADDR: t2-spp-vsnap-dr
LOCAL ROLE: primary
LOCAL POOL ID: 1
LOCAL VOL ID: 2
LOCAL VOL NAME: spp_1004_2002_16b6aeb7936__group0_12_
REMOTE POOL ID: 1
REMOTE VOL ID: 2
REMOTE VOL NAME: spp_16b6b15c8d1_spp_1004_2002_16b6aeb7936__group0_12_
LAST SYNC STATUS: COMPLETED
LAST SYCNED SNAP ID: 1
LAST ATTEMPT SNAP ID: 1
CREATED: 2019-06-18 14:55:19 UTC
UPDATED: 2019-06-18 14:55:19 UTC
ID: 7ce7be815c5f4fc9147c52a55bd6530d
PARTNER ID: bc1c6c4052a744ad86bdc25625e2c516
PARTNER TYPE: vsnap
PARTNER ADDR: t2-spp-vsnap
LOCAL ROLE: replica
LOCAL POOL ID: 1
LOCAL VOL ID: 2
LOCAL VOL NAME: spp_16b6b15c8d1_spp_1004_2002_16b6aeb7936__group0_12_
REMOTE POOL ID: 1
REMOTE VOL ID: 2
REMOTE VOL NAME: spp_1004_2002_16b6aeb7936__group0_12_
LAST SYNC STATUS: COMPLETED
LAST SYCNED SNAP ID: 1
LAST ATTEMPT SNAP ID: 1
CREATED: 2019-06-18 14:55:19 UTC
UPDATED: 2019-06-18 14:55:19 UTC
The fields LAST SYNC STATUS, LAST SYNCED SNAP ID, LAST ATTEMPT SNAP ID in
both detailed outputs provide details about the completion status and the snapshots used for
this relationship. The timestamps in the CREATED and UPDATED field are not adjusted;
instead, they remain on the values when the relationship was initially created.
For VMware and Microsoft Hyper-V hypervisors, backups are snapshots that are based in a
block-level incremental forever model: one base full backup is followed by many always
incremental backups. Each backup is a Synthetic Full backup, which means that only one
restore activity must be started whether it refers base or incremental data backups.
In addition to the virtual machine (VM) backup, the files on the VM can be indexed for single
file restore out of a VM backup without requiring you to restore the full VM or dedicated virtual
disks (VDisks) first. The VM Restore Options Test Mode (Instant Access), Clone Mode
(Instant Recover), and Production Mode (Instant Recover) support different VM restore
scenarios along with data reuse options.
EC2 data is stored in Amazon Web Services (AWS) Elastic Block Store (EBS) snapshots
rather than in the vSnap server. IBM Spectrum Protect Plus manages these snapshots for
backup and restore operations.
Note: For more information about the latest Hypervisor (Microsoft Hyper-V and VMware)
and cloud instance (Amazon EC2) backup and restore requirements, see IBM Spectrum
Protect Plus - All Requirements Doc.
We explain how to add Virtualized Systems and assign a VM to an SLA (backup schedules).
We also show how to run backup jobs based on schedules or manual and how ad hoc
backups of single or multiple VMs can be performed. Finally, we show how backups can be
distributed on different vSnap servers and explain the backup options that can be configured
for VMs.
For more information about adding a virtualized system resources and the required privileges
of the user, see IBM Knowledge Center.
After a Hypervisor is added, a system-defined Hypervisor Inventory job is created and run to
collect all configured VMs and settings of the Hypervisor. The job runs by default once a day,
and the schedule and job log can be adjusted or viewed under Jobs and Operations in the
IBM Spectrum Protect Plus GUI.
Figure 6-2 VMware Backup menu with information about the inventory job
An SLA must be defined before it can be assigned to a VM. For more information about how
to create and configure an SLA, see 1.3, “SLA backup policies” on page 19.
Use the search function (and filter) to search for available resources, or click through the
provided Virtualized Systems tree to select your VMs. Filtering options can be set for VMs
and Templates, VMs, Datastore, Tags and Categories, or Hosts and Clusters. Single VMs,
Folders, Tags, Datastores, Hosts and Clusters, Data centers, and vCenters can be assigned
to an SLA.
After the Save button is clicked, a new backup job Bronze is created. Scroll down to the SLA
Policy Status section to review the job schedules and check the backup job log output, as
shown in Figure 6-4.
Figure 6-4 SLA Backup Job listed SLA Policy Status at the VMware Backup page
Alternatively, switch to the Jobs and Operations menu to check the schedule and job log
output. In the Jobs and Operations → Schedule view, the backup job Bronze is listed with
the prefix vmware (vmware_Bronze) to indicate that it is a VMware backup job that is associated
with the Bronze SLA.
Excluding single VDisks from the SLA policy for a VMware job
After you save a backup job definition, you can exclude individual VDisks (VMDK) of a
VMware VM from the assigned SLA policy.
After you select the disk (in our example: Hard disk 2) click Select SLA Policy, clear (in our
example) the Bronze SLA option for the disk, and click the Save button. The next backup for
the VM will now run without backing up the Hard Disk 2 of the VM t2-vm-win2.
Note: Excluding a single VDisks from an SLA policy is available only for VMs in a VMware
environment.
Figure 6-6 SLA Backup Job Log listed directly in the SLA Policy Status at the VMware Backup page
Note: For more information about VMware snapshot behavior, see IBM Knowledge Center.
As shown in Figure 6-7 in the Job History tab under the Jobs and Operations view, the
vmware_Bronze job log is selected. To start a backup of the failed VMs, can click Actions →
Rerun failed.
Figure 6-7 Job History with job details and the rerun failed button
Note: The job log is used to capture activities of the rerun. New status messages are
added that include timestamps at the end of the job log.
In our VMware example, we want to start an ad-hoc backup for t3-vm-win VM, which we
added to the Bronze SLA. Select Manage Protection → Virtualized Systems → VMware to
view all of the VMs that are backed up with the Bronze SLA, as shown in Figure 6-8 on
page 179.
Now, select the t3-vm-win and click Run to start an ad-hoc backup for this VM. The backup
process can be followed by scrolling to the SLA Policy Status and expanding the log view for
the Bronze SLA.
Alternatively, you can select Create Job (see Figure 6-8), which starts the Job Wizard in
which you can select Ad hoc backup, as shown in Figure 6-9.
The wizard guides you through the process of selecting the VM you want to back up and
starting a backup job for those VMs. The wizard is also used to create restore jobs (for more
information, see 6.3, “VM restore and data reuse” on page 189).
In Example 6-1, we changed the Global Preferences setting to a VM count of two. The backup
job log of the vmware_Bronze SLA policy includes the Example 6-1 lines, which indicate that
the four VMs that are backed up are distributed over the two available vSnap servers.
Example 6-1 The vmware_Bronze backup log showing VM distribution over the available vSnap servers
Selected vm(s) count: 4
Using storage volume spp_1004_2002_16cbd7eb496__group1_53_ on controller t2-spp-vsnap2 for backup
Using storage volume spp_1004_2002_16c86921d3a__group0_70_ on controller t2-spp-vsnap for backup
Backing up VM (t2-vm-lx) from remote proxy (IP: 10.0.250.28, Host name: t2-spp-vsnap2)
Backing up VM (t2-vm-win2) from remote proxy (IP: 10.0.250.27, Host name: t2-spp-vsnap)
Backing up VM (t2-vm-win) from remote proxy (IP: 10.0.250.27, Host name: t2-spp-vsnap)
Backing up VM (t1-vm-lx) from remote proxy (IP: 10.0.250.28, Host name: t2-spp-vsnap2)
Note: If you want to specify VMs to use specific proxies, use the VM option and specify By
Proxy. It is best to let Spectrum Protect Plus decide rather than manually controlling the
load balancing.
The file metadata is discovered when configured as part of the VM backup job locally on the
VM, transferred to the IBM Spectrum Protect Plus, and stored there in a global catalog. This
enables you to search for files and directories globally from the central IBM Spectrum Protect
Plus GUI.
Note: For more information about requirements, see this web page.
In addition to the supported operating systems, file systems, software, and connectivity
requirements to access a VM, a key requirement is the Authentication and Privilege
Requirements.
For Windows, the credentials that are specified for the VM must include a user with the
following privileges:
The user must have “Log on as a service” rights. For more information about setting up
these rights, see this web page.
The user must have the permissions of the local administrator.
For Linux, the credentials that are specified for the VM must specify a user that has the
following sudo privileges:
The sudoers configuration must allow the user to run commands without a password.
The !requiretty setting must be set.
The suggested approach is to create a dedicated IBM Spectrum Protect Plus agent user,
which is used for the file metadata discovery. This user is centrally managed and configured
in IBM Spectrum Protect Plus by creating an Identity, as described in “Identities, keys, and
certificates” on page 11.
In a Windows environment, this agent user can be configured as a standard Domain User
within Microsoft Active Directory and added by way of a Group Policy to the local
administrator group, as shown in Figure 6-10 on page 183.
By adding the agent user to the local administrator group, the user automatically has the “Log
on as a service” right assigned.
Note: For information about the Windows agent user, see IBM Knowledge Center.
If Linux VMs are configured with Microsoft Active Directory authentication, the same agent
user account also can be used in Linux. Otherwise, a local agent user account with the
privileges that are shown in Example 6-2, must be created.
Example 6-2 sudoers configuration for IBM Spectrum Protect Plus agent user
t2-vm-lx:~ # useradd -m sppagent
t2-vm-lx:~ # passwd sppagent
New password:
Retype new password:
passwd: password updated successfully
t2-vm-lx:~ # vi /etc/sudoers
Defaults: sppagent !requiretty
sppagent ALL=(root) NOPASSWD:ALL
Place the lines that are shown in Example 6-2 at the end of your sudoers configuration file
(typically, /etc/sudoers). If your sudoers file is configured to import configurations from
another directory (for example, /etc/sudoers.d), you can also place the lines in a new file in
that directory.
The following example shows the configuration for the two Windows VMs that are added as
shown in Figure 6-3 on page 175 to the Bronze Backup Policy.
Figure 6-11 Add SPP agent User as Identity to IBM Spectrum Protect Plus
The backup options at the VM level can be accessed in the same window as where a VM is
added to an SLA, as shown in the Figure 6-3 on page 175. Search for the two Windows VMs
or select the Bronze SLA by using the search filter drop-down menu. Then, select the two
VMs and click Select Options.
The window is expanded to configure the file metadata cataloging option (file discovery), as
shown Figure 6-12.
You must select Catalog file metadata to enable file metadata cataloging. In the Exclude
Files section, you specify directories that can excluded from the catalog process. Select Use
existing user to select the previously configured IBM Spectrum Protect Plus agent user as a
cataloging user.
When the Bronze SLA backup vmware_Bronze is run again, the log file under Jobs and
Operations in the tab Job History includes entries about performing file discovery, as shown in
Figure 6-13.
Figure 6-13 File Discovery log entries in the vmware_Bronze job log
The discovered file metadata information is stored temporarily on the client and permanently
on the IBM Spectrum Protect Plus server. Metadata collection starts on the client after a
successful snapshot and a *.txt file is created for each drive or volume. All the *.txt files
are compressed and sent to the server. In Windows, the data is stored temporarily in the
c:\ProgramData\SPP\temp\output\ directory and in Linux in the /tmp directory.
The metadata is deleted from the client after it is sent to the IBM Spectrum Protect Plus
server. When the .zip files reach the server repository on /data2/filecatalog/ (the default
location that is configured under System Configuration → Global Preferences →
Protection), the Lucene indexing starts and runs in the background, and the file metadata is
stored as an index process in /data3/lucene. After a backup image expires, the file index that
is associated with that image also is deleted.
If you click Test, IBM Spectrum Protect Plus checks if all requirements are fulfilled. You can
follow this checking process in the status window that opens automatically. The tests are
divided into the following steps:
1. Virtual: Basic Hypervisor test for Hypervisor Tools and DNS configuration
2. Remote: Remote executor test for session creation and remote agent deployment
3. Operating System pre-requisites:
– Basic Windows prerequisites for file and volume operations
– Basic Linux prerequisites for file and volume operations
If one or more of the tests are unsuccessful, these errors must be resolved first before the file
metadata cataloging can occur. The test can be repeated as often as required to verify that all
requirements are fulfilled.
To search for files and directories, select Manage Protection → File Restore. A new view
opens. A search form is displayed in the first part of the File Restore window. From here, you
can complete the following actions:
1. Search for files.
2. Select files for restore.
3. Start the restore process.
4. Monitor the restore process.
In addition to the search pattern for file, folder names, and specific VMs, a date range and
operating system type can be specified for a more granular search.
After the wanted file for the restore is selected, scroll down to specify the restore options. In
our example (see Figure 6-17), we restore the file to another VM called t2-vm-win into the
folder c:\restore.
In addition to the settings we use in our example, the file can be restored to the original
location with the option to overwrite an existing version.
IBM Spectrum Protect Plus includes a restore wizard that simplifies restoring virtualized
systems, databases, file systems, cloud-managed applications, and containers. The wizard
guides you through the configuration of restore types and parameters, and optionally
schedules a job that performs the restore.
During a restore, you can change the following parameters of a VM by using the wizard:
Storage location where the VM is located (for example, use a different datastore)
Compute resource where the VM is running on (for example, use a different ESX server)
Display name of the VM
VM network that the VM use (for example, restore the VM into an isolated VM network to
not interfere with a still running source version of the VM)
MAC address of a network adapter when a Test- or Clone-Mode Restore is used
IP configuration (for example, set a different static IP or change from a static IP to DHCP)
Changing the IP configuration for VM requires a IBM Spectrum Protect Plus agent user for
logging in to the VM and performing the change. For more information about setting up an
IBM Spectrum Protect Plus agent user, see “Backup options at VM level” on page 181, and
6.2, “Catalog file metadata for single file restore” on page 182.
To change the IP configuration of a Windows guest operating system, ensure that the
Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package MFC Security Update is
installed before backing up the VMs. This update is necessary because it ensures that the
packages are available if a restore with a required IP reconfiguration is needed. You can
download VC 2008 SP1 Redistributable (9.0.30729.6161) at this web page.
Next, we described the restore wizard and the options that are available during a restore.
Beginning with 6.3.7, “Restoring a VDisk” on page 196) we describe different restore
examples to demonstrate the restore capabilities.
Figure 6-19 Create job button in the Jobs and Operations view
When the job wizard is started, you must decide if you want to perform an Ad hoc backup or a
Restore, as shown in Figure 6-20 on page 191. For more information about ad hoc backups,
see 6.1.5, “Running a backup for a single VM” on page 178.
After you select Restore, select the Source type a restore that is to be performed, as shown
in Figure 6-21.
Figure 6-21 Select the source type for a restore in the Restore Wizard
In our example, we show a restore for VMware. After the VMware is selected, the VMs that we
want to restore also must be selected, as shown in Figure 6-22.
Complete the following steps (the number in Figure 6-22 correspond to the steps):
1. Use the Search and View Filter to find the VM that must be restored.
2. Select the VM by clicking the + sign that is next to the VM name.
3. The VM appears in the selected item view.
If you select VMDK (VMware) or VHDX (Hyper-V) VDisks, the process flow is similar as
shown in Figure 6-23. Complete the following steps (the number in Figure 6-23 correspond to
the steps):
1. Search for the VM and then click the VM name.
2. Select the disk to be restored by clicking the + sign.
3. The VDisk appears in the selected item view.
Figure 6-24 shows as an example of the step in the wizard in which you decide if you want to
perform an On-Demand (as selected in the example) or a Recurring restore job by using the
pull-down menu.
Figure 6-24 Restore wizard for VMware - select the Source Snapshot
Note: Only the schedule of the recurring restore job can be changed later on, as explained
in “Scheduler (Jobs and Operations)” on page 9. The content of the job is fixed. If the
content must be changed, a restore job must be created.
Whatever other destination is chosen to protect the backup data, this destination also is
known to IBM Spectrum Protect Plus and can be used as a restore source. The different
restore sources can be chosen within the restore wizard, as shown in Figure 6-24 where for
example, the Restore Location type Site and the Location Primary are selected by using the
suitable pull-down menu.
If you are restoring data from a cloud resource or repository server, select Use alternate
vSnap server for the restore job to specify an alternative vSnap server. Then, select a
server from the Select alternate vSnap server menu. When you restore data from a restore
point that was off-loaded or archived to a cloud resource or repository server, a vSnap server
is used as a gateway to complete the operation.
By default, the vSnap server that is used to complete the restore operation is the same vSnap
server that is used to complete the copy to the cloud resource operations. To reduce the load
on the vSnap server, you can select an alternative vSnap server to serve as the gateway.
Because each backup destination can have its own retention settings (dissimilar backup
policies between primary backup target and other copies), different restore scenarios are
supported. For example, recovery of the latest version from a VM is taken from the primary
vSnap server, whereas the restore of a VM from a version before the previous operating
system patch rollout is taken from the Cloud Offload.
If you define a Recurring restore job, as explained in 6.3.2, “Restore schedule”, IBM
Spectrum Protect always uses the latest backup version from the source location that you
configured for this job.
Note: With the Alternate Host or Cluster option, you can change the ESX server,
datastore, and network that is used by the VM.
For VMware, a third option called ESX host if vCenter is available. In other restore scenarios,
actions are completed through the VMware vCenter. If vCenter is unavailable,
this option restores the vCenter VMs that the vCenter is dependent upon.
For more information about backing up of a VMware vCenter VM, see IBM Knowledge
Center.
Test mode
Test mode creates temporary VMs for development or testing, snapshot verification, and
Disaster Recovery (DR) verification on a scheduled, repeatable basis without affecting
production environments. The temporary VMs accesses storage from a vSnap server, which
is mounted as temporary datastore by way of NFS to the Hypervisor.
Test machines are kept running as long as needed to complete testing and verification and
are then cleaned up, moved to production, or cloned. VMs that are created in test mode are
also given unique names and identifiers (UUIDs) and MAC addresses to avoid conflicts within
your production environment. A test mode restore is also called Instant Access Restore.
VMs created in clone mode are also given UUIDs and MAC address to avoid conflicts within
your production environment. With clone mode, you must be sensitive to resource
consumption because clone mode creates permanent or long-term VMs. A clone mode
restore is also called an Instant Recover.
Production mode
Production mode enables DR of VMs at the local site from primary storage or a remote DR
site, replacing original machine images with recovery images. They access storage from the
vSnap server and start copying data to the datastore. All configurations are carried over as
part of the recovery, including names and UUIDs, and all copy data jobs that are associated
with the VM continue to run. A production mode restore is also called Instant Recover.
During the restore job creation process, you can move the VDisk to permanent storage and
clean up temporary resources from the vSnap server. This process can be done by selecting
the Make IA clone resource permanent restore option in the restore wizard. Alternatively,
you can choose later on from the Jobs and Operations view in the Active Resources tab to
make the disk permanent or to End Instant Disk Restore (Cleanup). For more information
about restoring a VDisk, see 6.3.7, “Restoring a VDisk” on page 196.
If you decide to rename the VM, it must be done for each VM that is part of the restore job.
However, appending a suffix to the name is done automatically for each VM in the job.
Note: With the rename option, you can change the display name of the VM, but not the
host name. If you must change the host name, you can use the Test Mode Restore (for
example); then, adjust the host name and decide if the VM should be cloned or moved to
production.
In addition, the following options are available that can be selected in the restore wizard:
Power on after recovery
Overwrite VM
Continue with restore even if it fails (default)
Allow to overwrite and force clean up of pending old session (default)
Figure 6-25 Select VDisks for a restore within the restore wizard
We select an On-Demand restore from the Primary Site (vSnap server) by using different
Restore Points, as shown in Figure 6-26.
Figure 6-26 Select restore source snapshot for the VDisk restore
The restore should be mapped to the original VMs; therefore, we select Original Host or
Cluster. We do not make the Instant Access (IA) clone resource permanent yet, so we use
temporary resources from the vSnap server.
If you must restore vDisks to an alternative VM, select Alternate Host or Cluster, which after
the host selection gives you the Destination Virtual Disk option to specify the VM to be used
and other disk options, as shown in Figure 6-27.
Figure 6-27 Choose an alternate VM for the VDisk restore in the Destination VDisk section
Figure 6-28 Review the restore settings for the VDisk restore
After the restore job is submitted, you can follow the progress in the Jobs and Operations
view in the Running Jobs tab. If mounting the vDisks to the VMs was successful, both disks
are listed in the Active Resources tab under Hypervisor in the Jobs and Operations view, as
shown in Figure 6-29 on page 198.
To use the vDisk in Windows, it must be set to Online, as shown in Figure 6-30, by using the
Computer Management interface in Windows. This interface is accessible by right-clicking the
Windows Start button and choosing Computer Management. After setting the disk to online,
the disk is assigned a drive letter and can be accessed by using Windows Explorer.
Figure 6-30 Set VDisk Online in the Windows Computer Management interface
In our example, we restore the VM t2-vm-win to the restore point that was created on 17th of
August, as shown in Figure 6-32.
We use the Alternate Host or Cluster selection to select the same host as in our example
that was described in 6.3.7, “Restoring a VDisk”. However, we use a different datastore as the
restore destination, as shown in Figure 6-33.
Tip: You must use the alternative host or cluster, even if you intend to restore to the same
host or cluster because this option is the only option to get the advanced network settings,
as shown in Figure 6-34 on page 200.
Our restore plan is to check the VM after the test restore and, if everything worked well,
create a clone of the VM. In the review pane that is shown in Figure 6-35, you can verify all
settings again before submitting the restore job.
Figure 6-35 Review pane to verify the settings for the restore job
After the restore job is submitted, you can follow the progress in the Jobs and Operations
view in the Running Jobs tab. When the test restore completes mounting the restore point
from the vSnap server and creating the VM, the VM is listed in the Active Resources tab
under Hypervisor in the Jobs and Operations view.
Figure 6-36 Restored VM is created using the fenced network and storage from the vSnap server
The VM can now be started. After starting the Windows operating system, we log in and verify
whether the VM was configured as expected. If everything is OK, we go to the Active
Resources tab in the Jobs and Operations view and start the Clone operation for this VM, as
shown in Figure 6-37. The clone operation starts a VMware vMotion process, which moves
the data from the temporary storage of the vSnap server to the final datastore specified in the
restore job. While the clone operation is running, you can continue to work with the VM.
If the restored VM is not the correct version or configuration, we can choose the Cleanup
option for the VM. This action removes all configurations from the VMware vCenter, and we
can restore another version of the VM, if required. The advantage of the Test Mode restore is
that data is not copied to access the VM. Therefore, you can easily check first if the restored
VM is configured as expected before deciding to move it to production, or to clone it.
Note: For more information about restoring data when vCenter Server or other
management VMs are not accessible, see IBM Knowledge Center.
In our example, we restore the t5-vm-lx (Linux VM) to the restore point that was created on
June 30, as shown in Figure 6-38.
Figure 6-38 Select the source snapshot to restore the VM from replication side
Figure 6-39 Select the Alternative Host or Cluster to restore the VM from replication side
In Restore method window, we select Test and select the Rename VM option to rename the
restored VM with the name t5-vm-lx-repl (see Figure 6-42).
You can verify all of settings again before submitting the restore job in the review pane that is
shown in Figure 6-43. After the restore job is submitted, you can follow the progress in the
Jobs and Operations view by selecting the Running Jobs tab. When the test restore
completes mounting the restore point from the vSnap server and creating the VM, the VM is
listed in the Active Resources tab under Hypervisor in the Jobs and Operations view.
Figure 6-43 Review pane to verify the settings for the restore job
First, the root user must be configured. Select Manage Protection → Virtualized
Systems → VMware to see a list of VMs. Select a VM and then, click Select Options, as
shown in Figure 6-44.
Note: The IP configuration for a Linux VM is changed during a restore. The user account
root must be used as IBM Spectrum Protect Plus agent user (Guest OS Username).
In our example, restore the t5-vm-lx (Linux VM) restore point that was created on June 30,
as shown in Figure 6-47.
In the Network section, set the network setting as the current IP address (for VM t5-vm-lx)
and new IP address (for VM t5-vm-lx_newIP), as shown in Figure 6-49. The following settings
were used in our example:
Current IP address: 10.0.250.55
New IP address: 10.0.250.59
Subnet mask: 255.255.255.0
Gateway: 10.0.250.9
DNS: 10.0.250.210
Note: The current IP address must be specified to identify the network interface that is
changed. In addition, the new IP address, Subnet mask, and Gateway are mandatory
fields that must be completed (the DNS field is optional). Instead of specifying a new IP
address configuration, you also can select DHCP for the interface.
After the network settings are completed, click the plus (+) symbol.
Note: During restore, the VM must be started to configure these network settings.
Verify all settings and submit the restore job (see Figure 6-51).
Figure 6-51 Review pane to verify the settings for the restore job
You can follow the progress of the restore in the Jobs and Operations view under the Running
Jobs tab, as shown in Figure 6-52.
Figure 6-53 Original VM t5-vm-lx and Restored VM t5-vm-lx_newIP with changed IP address
After the restore operation completes, the restored VM can now be started. We can see in
Figure 6-53 that the restored VM uses the new IP address. You can decide what you will do
with the VM; for example, you can select the Move to Production option if the restored VM is
configured as expected.
Note: To change the IP configuration of a Windows Guest Operating System, you must
ensure that you installed Microsoft Visual C++ 2008 Service Pack 1 Redistributable
Package MFC Security Update before backing up the VMs so that the package is available
in case of a restore with a required IP re-configuration. You can download VC 2008 SP1
Redistributable (9.0.30729.6161) at this web page.
After network settings are complete, click the plus (+) symbol. You can then review the
Network parameters, as shown in Figure 6-55.
In the Restore method panel, choose Test and name t5-vm-win_newIP. In the review pane
that is shown in Figure 6-56 on page 210, verify all the settings before submitting the restore
job.
Follow the progress in the Jobs and Operations view in the Running Jobs tab.
In the vCenter User Interface (UI), we see the VM that was created by using the temporary
storage resources from the vSnap server. After the restored VM is started, we can see that it
uses the changed IP addresses on both NICs, as shown in Figure 6-57.
Figure 6-57 Original VM t5-vm-win and Restored VM t5-vm-win_newIP with changed IP addresses
By using IBM Spectrum Protect Plus, you can create a backup by creating a snapshot of the
EC2 instances by protecting VDisk data on the EBS. This new feature was introduced with
version 10.1.6. Figure 6-58 shows an example of the hybrid environment implementation of
the IBM Spectrum Protect Plus and Amazon EC2.
The new Hypervisor provider type Amazon EC2 was designed and integrated the same way
as the other providers (Vmware and Hyper-V). In IBM Spectrum protect Plus version 10.1.6,
this new function can be found in the Manage Protection Panel. Select Virtualized
Systems → Amazon EC2.
For more information about this process, see IBM Knowledge Center.
During the initial setup in the AWS console, you must set up users with an Access key.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "VisualEditor0",
"Effect": "Allow",
"Action": [
"ec2:DetachVolume",
"ec2:AttachVolume",
"ec2:DeregisterImage",
"ec2:DeleteSnapshot",
"ec2:DescribeInstances",
"ec2:CreateVolume",
"ec2:DescribeTags",
"ec2:CreateTags",
"ec2:RegisterImage",
"ec2:DescribeRegions",
"ec2:RunInstances",
"ec2:DescribeSnapshots",
"ec2:DescribeAvailabilityZones",
"ec2:CreateSnapshots",
"ec2:DescribeVolumes",
"ec2:CreateSnapshot",
"ec2:DescribeSubnets",
"iam:PassRole"
],
"Resource": "*"
}
]
}
Figure 6-59 Defining specific policy and permissions for EC2 users
To register the EC2 account in IBM Spectrum Protect Plus, select Manage Protection →
Virtualized Systems → Amazon EC2 → Manage Accounts and click Add Account. You
are prompted to name the account and provide the Access and Secret Key.
If the user is in Spectrum Protect Plus, it can be selected from the drop-down menu by
selecting the Use existing access key option, as shown in Figure 6-60 on page 213. For the
new registration process, you must complete the mandatory fields. The registration process
completes when you click Save.
You can register multiple accounts for different users and manage them separately. The
registration process is finished by clicking Save.
The Inventory process starts against AWS that discovers regions and instances. This process
is used to update the inventory for AWS EC2.
Discovered regions in AWS are treated as hypervisors. During the inventory process, the
information that is related to the detected EBS volumes and EC2 instances on AWS is saved
in the IBM Spectrum protect Plus catalog.
Select the policy type Amazon EC2, as shown in Figure 6-62, and enter the policy name,
retention, and the frequency settings. You can also specify the start time and a Snapshot
Prefix that is added to the beginning of EBS snapshots names.
For more information about how to back up Amazon EC2 data, see IBM Knowledge Center.
IBM Spectrum Protect Plus interacts directly with Amazon services without a proxy or extra
agent. EC2 instances snapshot data is copied incrementally to Amazon S3 object storage
from the Amazon Elastic Block Store (EBS) volume. The copies of the EBS snapshots are
always stored in the user’s Amazon S3 object storage.
For EC2 instances that are assigned to an SLA policy, an ad-hoc snapshot is also available. It
can be started by selecting the EC2 instance and clicking Run, as shown in Figure 6-64.
Another way to start the ad-Hoc backup is by selecting Manage Protection → Virtualized
Systems → Amazon EC2. Click Create Job, as shown in Figure 6-65.
The next step is to select an SLA Policy from the navigation panel, as shown in Figure 6-67.
By clicking the “+” button, select the Amazon EC2 instance that you want to add to the Ad hoc
backup, as shown in Figure 6-68 on page 218. Continue by clicking Next. In the next window,
review your choice and then, click Submit.
The EC2 instance restore operation follows steps similar to the operation for restoring a VM in
VMware or Hyper-V hypervisors. How to Restore Amazon EC2 data is also found in IBM
Knowledge Center for IBM Spectrum protect Plus under the Restoring Amazon EC2 data
option.
Select Manage Protection → Virtualized Systems → Amazon EC2. In the top right corner,
click Create Job, as shown in Figure 6-65 on page 216. Then, choose to Restore to restore
data from specific instance. Then, click Select, as shown in Figure 6-69.
Figure 6-70 Amazon EC2 Restore window opened from Jobs and Operation Navigation Panel
The source Amazon EC2 is among the available resources that are on the panel. To select
the instance to recover, click the plus “+” symbol, as shown in Figure 6-71. Continue by
clicking Next. You can select one or multiple Instances from the same region only. If you want
to remove Instances or volumes from the list, click the minus “-” symbol.
Note: During the restore operation, any volumes that are attached to the instance must be
selected separately. It is not possible to select instances and their attached volumes for the
same restore.
By default, the restore wizard is opened in Default Setup mode. To continue the restore
operation, run the wizard in Advanced Setup mode by clicking the icon for Advanced Setup
mode, as shown on Figure 6-71.
Figure 6-71 Amazon EC2 Restore Wizard opened in Advanced Setup Mode
All EC2 restores run in “clone” mode, which creates a copy of the instance from the EBS
snapshots.
In the Restore method window, you can rename the restored Amazon EC2 Instance, as
shown in Figure 6-74. Selecting Rename Instance is optional.
By choosing Default Setup mode, as shown in Figure 6-75, you can restore the selections by
clicking Submit to run the restore job.
Figure 6-75 Amazon EC2 review Restore selection Default Setup mode
Calcite Next and you are redirected to the Review page. Carefully review the selected
Restore job selections, and then, click Submit to create the restore job, as shown in
Figure 6-78 on page 225.
This chapter describes how to back up and restore Microsoft Windows file system data and
includes the following topics:
7.1, “Supported platforms and browser requirements” on page 228
7.2, “Prerequisites and configuration” on page 228
7.3, “File systems backup with IBM Spectrum Protect Plus” on page 240
7.4, “File systems restore with IBM Spectrum Protect Plus” on page 247
The following versions of the Microsoft Windows (64-bit kernel) operating systems are
supported:
Windows 2012 R2 (Standard and Datacenter editions)
Windows 2016 (Standard and Datacenter editions)
Windows 2019 (Standard and Datacenter editions)
The following Microsoft Windows file systems are supported as local file systems:
Microsoft Windows ReFS (IBM Resilient® File System)
Microsoft NTFS (New Technology File System)
The following browsers are supported to use the File Systems Restore GUI:
Firefox 55.0.3 and later
Google Chrome 60.0.3112 and later
Microsoft Edge 40.15063 and later
Microsoft Edge HTML 15.15063 and later
The SLA Policy can be created and assigned to the single file systems or to the entire file
server.
Figure 7-1 Service Level Agreement (SLA) policy for Files Systems
– Additional Copies
By selecting the additional copies option, you can add copies to the repository server,
IBM Spectrum Protect server, or the Cloud services (S3).
Figure 7-2 Enable Additional copies (incremental copy) and Archive object storage (full copy)
Connectivity requirements
Verify or set up the following connectivity requirements:
Open firewall ports 5985 and 5986 between IBM Spectrum Protect Plus and Microsoft
Windows File Systems server to allow IBM Spectrum Protect Plus server to connect to the
file systems server by using the Microsoft Windows Remote Management (WinRM).
Open firewall port 9085 to enable the IBM Spectrum Protect Plus File Systems Restore UI
to connect to the restore service.
On the file server, the WinRM service must be set up and running.
For more information about connectivity and other requirements, see the following resources:
Windows file systems backup and restore requirements: IBM Spectrum Protect Plus
V10.1.6
System requirements: IBM Spectrum Protect Plus V10.1.6
IBM Knowledge Center
The architecture overview that is shown in Figure 7-3 on page 231 shows the communication
flow and interactions between components that are needed for the file systems restore and
firewall ports that must be opened for communication. The following main components also
are shown:
IBM Spectrum Protect plus server
IBM Spectrum Protect Plus Browser Restore User Interface
IBM Spectrum Protect Plus vSnap server with metadata database
Microsoft File server with file systems
From the IBM Spectrum Protect Plus GUI, select, Manage Protection → File Systems →
Microsoft Windows.
Next, click Add new file server, and the window that is shown in Figure 7-5 on page 233, is
displayed. Enter more configuration details under the Edit file server properties section.
As part of the file server registration process, the application agent is pushed from the IBM
Spectrum Protect Plus server to the file server and other l Microsoft Windows services that
are needed for the IBM Spectrum Protect Plus file system protection agent are set up.
In the Manage file servers tab, select file server. From Actions menu, you can start the
inventory manually or select the Test action, as shown on Figure 7-7.
.
Figure 7-8 Example of the test results check of the file server
Note: On the same system, a configured backup agent cannot be used for file systems
back ups and IBM Spectrum Protect Plus application backup protection at the same time.
To view the output of the inventory, select Jobs and Operations → Job History, as shown in
Figure 7-10.
If you are experiencing similar issues on VMmware, you can validate it by running following
commands:
To identify the VMs with the same UUID, run the following command at the CLI by way
of SSH to verify the UUID:
vmkfstools -J getuuid <vmname>.vmdk
If you identified the VMs with the same UUID, run the following command to change the
ddb UUID:
vmkfstools -J setuuid <vmname>.vmdk
On the operating system, you can open PowerShell with admin rights and run the
following command. You do not need to modify it. The command returns a list of all
volumes and their GUIDs:
GWMI -namespace root\cimv2 -class win32_volume | FL -property DriveLetter,
DeviceID
For more information about IBM Spectrum Protect Plus known issues and limitations in the
file system application server, see this web page.
To create new or manage existing exclude lists, from the IBM Spectrum Protect GUI select:
Manage protection → File systems → Microsoft Windows. The Windows Backup window
is displayed.
Select one or more registered file servers, and click Select Options, which opens another
view in which you can select Modify Exclude List for the selected Microsoft file server. The
exclusion list is processed from the top-down based on the definition statement. Update the
Exclude list with excluded syntax and click Save to submit the changes.
The exclude rules syntax supports various wildcards, characters, and patterns.
The exclude rules can be set to apply to all file servers and their file systems. You also can
specifically customize the exclude list for each of the file servers and each file system
separately, as shown in the example in Figure 7-11 on page 238.
For more information about the exclude rules syntax, see IBM Knowledge Center.
Important: As shown on Figure 7-12 on page 239, file system types that are not
supported, such as FAT32 or GPFS, are grayed out. These types cannot be assigned to
the backup SLA policy.
The Spectrum Protect Plus File System Data Protection is checking the Registry Key of the
file server and automatically excluding from backup and recovery actions, all the files and
directories present in the folder Files Not to Backup.
Note: As shown in Figure 7-13 on page 239, the Microsoft Windows registry key
information for files not to be backup can be found in the following directory:
SYSTEM\CurrentControlSet\Control\BackupRestore\FilesNotToBackup
In the Windows Backup window, proceed with the backup configuration by selecting a
Microsoft Windows file server. Then, click Select an SLA policy, as shown in Figure 7-14.
Select the SLA Policy and then, click Save.
Figure 7-14 Select and assign SLA policy to the file server
On-demand backups can be started individually for selected file system separately under file
server by selecting the file system drive and clicking Run, as shown Figure 7-16.
If the SLA policy is configured with the replication option, clicking Start (as shown in
Figure 7-15 on page 241) opens the Start Options window in which you can select the
Backup to vSnap option (as shown on Figure 7-17 on page 242) or Replicate to a
secondary vSnap server.
Select the Backup to vSnap option and click OK to confirm. The backup starts immediately
in accordance with the selected SLA policy.
The first file system backup is always a full backup. All subsequent backups are incremental
forever backups. During the backup operation, CIFS shares from the vSnap server are
mounted to the file system. Mounted CIFS shared activity that is started in background is not
visible to the Administrator user.
During the first full backup operation, a scan of the file systems is performed and the result of
the scan is stored in the newly created database that contains metadata information for each
of the files. For any subsequent backup, files are compared against metadata information;
that is, if files were deleted, they are marked as expired. If files were created, they are
included in the scope of the backup task.
In the following action, SPP takes a consistent snapshot of all data and metadata, which is
saved as point in time for the backup recovery.
For subsequent backups, the same CIFS file shares are mounted and the database is
updated with new metadata entries, including the files that were created or changed. After the
operation is completed, a new snapshot is taken.
The metadata database holds information about each individual file’s attributes, such as size,
security, and reparse information. The vSnap server contains only a copy of the files content.
Files without content (such as symbolic links), do not have a copy on the vSnap server; those
files are included as empty directories.
Note: In the status from the job log view, a message informs the administrators about
non-supported file systems that were skipped, as shown on Figure 7-19.
Figure 7-19 Warning message about not supported file systems types
In the Jobs and Operation tab by selecting the Running Jobs status, as shown in
Figure 7-20. The Overall Progress column shows all active file systems backups.
If you want continue sequences of the Incremental forever backups, you must revert the file
system path name or the drive letter on the Windows platform back to the original.
Alternatively, you can run a new full backup by removing the SLA policy from
the file system and reassign it again by rerunning the backup job operation.
Figure 7-21 How to create Ad hoc backup from Job and operation window
Using either option opens the same window that is shown in Figure 7-23 in which you can
configure the ad hoc backup.
To configure the ad hoc backup, scroll down and click Select SLA policy. In our example, we
choose the SLA Policy called Windows File Systems, as shown in Figure 7-23. Click Next to
continue.
When your selection is completed, click Next to be presented with a summary view of the ad
hoc backup operation, as shown in Figure 7-25.
Review the summary and then, click Submit to start the backup. You are redirected to the
Jobs and Operation window view, as shown in Figure 7-20. In this view, you can monitor the
progress of the backup process.
Note: For the restore operation, you can select only one file system at a time.
Using the search field allows you to locate a specific file system to restore by entering the
name of the file system, such as “data”, as shown on Figure 7-28. or partial string information
like “dat”. The search results display all file systems that match the specified search string,
including host names of the file servers.
Figure 7-28 Use Search option to display file systems for restore operation
After selecting the date range, the window closes and returns you to the selection window in
which you select a backup recovery point. The backup is highlighted for the restoration
operation that was taken by a snapshot, as shown on Figure 7-29. Click Next.
Tip: This option is the default and it is best to keep it selected if issues occur when
mounting a file share for the restore operations. This option allows the system to
automatically clean up any left over mounted file shares.
In the next window, as shown on Figure 7-31 on page 250, the Run cleanup immediately on
job failure option is available.
Before submitting the restore process operation, review the details of the selected sources
and snapshot date, as shown on Figure 7-32. Start the restore by clicking Submit.
The guidance that is provided corresponds to the ongoing activity that is carried out. After
reviewing the details, click OK. You are redirected to the Jobs and Operations page.
This task stays open until you cancel the operation after the successful item restore is
completed.
Be patient:. The preparation for the restore activity can take several minutes to complete
until the mounted share is ready for the item recovery process.
The Info window that is shown in Figure 7-36 is displayed. The link that is provided can be
copied and used to open the browser restore interface. This option is advantageous when you
cannot directly access the environment and you must use an example jump host for the
restore operation. If you have an issue with DNS, the Host entry can be replaced with an IP
address.
Figure 7-36 Information message with link point to the browser restore interface
In the File System Restore interface that is displayed in the browser, you can also search
through the directory structure. By clicking the arrow icon, you can select individual
directories with full content or choose single files that were backed-up.
The files or directories that you selected move to the right side in the Restore List pane, as
shown in Figure 7-37 on page 253. You can restore the data to their original location or you
can specify an alternative location with the fully qualified path where files should be restored
by clicking Options. Start the restore process by clicking Restore. After the restoration task
completes, the Restore Tasks pane is updated with the restore operation details.
After the restoration process is complete successfully, from the top right corner, click the
menu icon and select Sign Out, as shown in Figure 7-38.
Note: A default time-out function also is available that automatically signs you out of the
restore interface if you do not manually sign out.
Note: During any active restoration operation, the Cancel File restore function is inactive to
avoid conflict with or interruption of the ongoing restoration activity.
The Job History tab is updated with a status of “Completed” for the recovery process, as
shown in Figure 7-40.
In the operating system directory structure view, as shown in Figure 7-41, the restored file
names include timestamps that indicate the date when the restore was completed.
Although other IBM Spectrum Protect Plus features focus on virtual environments, the
database and application support of IBM Spectrum Protect Plus includes databases on virtual
and physical servers.
For more information about supported databases and environments, see IBM Spectrum
Protect Plus Installation and User’s Guide.
This chapter describes backup and restore of databases and data reuse by using IBM
Spectrum Protect Plus. It includes the following information:
Oracle database examples are used in this chapter. For more information about specific
databases, see the following chapters:
Chapter 9, “Backing up and restoring MongoDB databases” on page 279
Chapter 10, “Backing up and restoring Db2 databases” on page 291
Chapter 11, “Backing up and restoring SQL Server” on page 309
Note: IBM Spectrum Protect Plus offers data reuse functions in addition to backup and
restore. You can use the database backup data to create a permanent copy (or clone) of
your production database, or to temporarily establish a database copy directly from the
vSnap server volumes.
Backup, restore, and data reuse handling functions for the supported (relational) databases
are all similar in IBM Spectrum Protect Plus. Therefore, the examples in this section are valid
for all supported databases to a large extent. However, the examples and figures apply to a
specific database in some cases. For this chapter, we chose Oracle Database.
The details in Chapter 9, “Backing up and restoring MongoDB databases” on page 279,
Chapter 10, “Backing up and restoring Db2 databases” on page 291, and Chapter 11,
“Backing up and restoring SQL Server” on page 309 in this Redbooks publication provide
additional information about data protection of these particular databases.
For more information about supported databases and environments, see IBM Spectrum
Protect Plus Installation and User’s Guide.
In the IBM Spectrum Protect Plus GUI, select Accounts → Identity → Add Identity to enter
the user definition for your specific databases, as shown in Figure 8-1.
Tip: If you use identical operating system users and passwords for multiple database
servers, IBM Spectrum Protect Plus allows you to manage these databases under one
identity.
Figure 8-3 shows an Oracle database example. The name of the discovered database is SPP.
If you save this application server entry, IBM Spectrum Protect Plus automatically starts an
inventory job. This job confirms a network connection, adds the application server to the IBM
Spectrum Protect Plus database, and then catalogs the instance. Switch to the Jobs and
Operations menu to check the job results.
Section 1.3, “SLA backup policies” on page 19 discusses this topic in more detail.
Click the Select options button to configure a log backup schedule, as shown in Figure 8-4.
If you configure log backups for the database, IBM Spectrum Protect Plus performs the
following actions:
Mounts another target volume for log backups to the database server. This volume
remains mounted to the database server at all times.
Schedules a cron job that regularly starts the log backup. Example 8-1 shows a sample
crontab entry.
Note: This example is an Oracle example. The IBM Spectrum Protect Plus implementation
of database log backup varies depending on the database type.
The SLA policy that you assigned to your database defines the schedule time for the first
backup. If you did not define a schedule, or you do not want to wait for the first automatic
backup schedule, click the Run button or scroll down to the SLA policy that you provided for
this database and select the Actions button to start the database backup.
Switch to the Jobs and Operations menu to check the job results.
8.2 IBM Spectrum Protect Plus database restore and data reuse
IBM Spectrum Protect Plus features a restore wizard that simplifies restores for virtual
machines and databases. The wizard guides you through the configuration of restore types
and parameters, and optionally schedules a job that performs the actual restore.
IBM Spectrum Protect Plus treats data reuse and data recovery as a restore activity. In either
case, you must create a restore job. The Databases and the Jobs and Operations menus in
IBM Spectrum Protect Plus show a button that is used to start creating a restore job. The
parameters that you select during job creation define which activity is performed.
The following list describes the parameters that control the final restore or data reuse activity:
Type of Restore:
– On-Demand Snapshot: one-time restore operation (you choose with-in the list of
backup date and time)
– On-Demand Point in Time: one-time restore by selecting a point-in-time backup of that
database (you specify a point in time or a transaction number)
– Recurring: repeating point-in-time restore job that runs on schedule
Restore Method:
– A production restore overwrites the original database or creates a database copy with
a different database name. In the database copy case, you must specify a new
database name and the destination paths.
– A test restore mounts the vSnap server directories with a database backup to a
database server, recovers and opens the database. You can rename the database.
– An instant access restore also mounts the vSnap server directories with a database
backup to a database server, but does not recover or open the database
Destination:
– Restore to the original instance
– Restore to an alternative instance
The following sections describe examples for these use cases. The sample database is
Oracle Database 12c.
Before you start to create a restore job, you must first select the database and an associated
backup to restore, as shown in Figure 8-6.
In the IBM Spectrum Protect Plus restore wizard, you can set up such a user requirement by
choosing the following parameter settings:
Restore type: On-demand point in time (or On-demand snapshot, depending on the
available backups)
Restore method: Test
Destination: Original or alternative instance
First, select the database instance and an associated database backup, as shown in
Figure 8-6. In addition, select a site and a location for the instance to restore. These settings
depend on your specific environment, which can include a cloud or copy location, or a
secondary site that you use for replication.
For our use case, we decided to create the test database in an alternative destination (which
means not on the original production server) and give the database a new name. Figure 8-8
and Figure 8-9 show the corresponding parameter selections.
IBM Spectrum Protect Plus does not reflect the new database name in the name of the
mounted directory or in the data file names, but it starts the database with the new database
identifier (System ID, SID). See Example 8-2 and Example 8-3.
t6-vm-lx:/ # ls /mnt/spp/vsnap/vpool1/fs8/SPP
arch
control01.ctl
controlfile.ctl
controlfile.txt
data_D-SPP_I-2016102274_TS-SYSAUX_FNO-3_38u4doto
data_D-SPP_I-2016102274_TS-SYSTEM_FNO-1_39u4dotv
data_D-SPP_I-2016102274_TS-UNDOTBS1_FNO-4_3au4dou7
data_D-SPP_I-2016102274_TS-USERS_FNO-7_3cu4douc
pfile.txt
redo01.log
redo02.log
tempfile_1.dbf
Example 8-3 Database instance started by an IBM Spectrum Protect Plus restore job
t6-vm-lx:/ # su - oracle
SQL> exit
Disconnected
oracle@t6-vm-lx:~> ORACLE_SID=TQQ
Connected to:
Oracle Database 12c Enterprise Edition Release 12.2.0.1.0 - 64bit Production
The IBM Spectrum Protect Plus test restore job that you started stays active until you
manually terminate it. In the Job and Operations menu, the job status is shown as
“Resource active”. To terminate the job, select it and choose End instant disk restore.
In comparison to the test restore, an instant access restore job does not start a database;
therefore, you do not need to select a database instance as a restore target.
From the mounted file system, as shown in Example 8-4, you can use the data for custom
recovery; for example:
Reload individual files such as control files, configuration files, and data files.
Rebuild a customized database copy.
oracle@t6-vm-lx:/mnt/spp/vsnap/vpool1/fs5/SPP> ls -l
total 733166
drwxr-xr-x 2 oracle oinstall 3 Jun 21 15:57 arch
-rw-r----- 1 oracle oinstall 10698752 Jun 21 15:57 controlfile.ctl
-rw-r--r-- 1 oracle oinstall 5920 Jun 21 15:58 controlfile.txt
-rw-r----- 1 oracle oinstall 1415585792 Jun 21 15:57 data_D-SPP_I-2016102274_TS-SYSAUX_FNO-3_38u4doto
-rw-r----- 1 oracle oinstall 870326272 Jun 21 15:57 data_D-SPP_I-2016102274_TS-SYSTEM_FNO-1_39u4dotv
-rw-r----- 1 oracle oinstall 330309632 Jun 21 15:57data_D-SPP_I-2016102274_TS-UNDOTBS1_FNO-4_3au4dou7
-rw-r----- 1 oracle oinstall 5251072 Jun 21 15:57 data_D-SPP_I-2016102274_TS-USERS_FNO-7_3cu4douc
-rw-r--r-- 1 oracle oinstall 974 Jun 21 15:58 pfile.txt
As described in 8.2.1, “Test restore”, the instant access job remains active with the “Resource
active” state until you terminate it manually. To terminate the job, select it and choose the End
instant disk restore action.
First, select the database instance and an associated database backup, as shown in Figure
8-6 on page 260. In addition, select a site and a location for the instance to restore. These
settings depend on your specific environment, which can include a cloud or copy location, or
a secondary site that you use for replication.
The next two selections indicate what we are trying to achieve; that is, production restore to
the original instance, as shown in Figure 8-12 and Figure 8-13.
For a restore of a production database, the IBM Spectrum Protect Plus restore wizard
assumes a database rollforward to a specific point in time that you can configure in the
next menu.
You must also decide whether to overwrite an existing database, as shown in Figure 8-14 on
page 265. IBM Spectrum Protect Snapshot provides an auxiliary protection against an
unintended data overwrite: If the database still exists and you do not select the overwrite
choice box, the restore job fails.
Carefully review the job summary that IBM Spectrum Protect Plus displays (Figure 8-15) and,
if the information describes what you are trying to achieve, run the restore job.
The intent here is to provide technical details about how the process works. For more
information about how to configure backup and run recovery operations for databases with
IBM Spectrum Protect Plus, see the following resources:
8.4, “Oracle overview” on page 269
Chapter 9, “Backing up and restoring MongoDB databases” on page 279
Chapter 10, “Backing up and restoring Db2 databases” on page 291
Chapter 11, “Backing up and restoring SQL Server” on page 309
Chapter 12, “Backing up and restoring Microsoft Exchange data” on page 329
For more information about vSnap server, see 1.2.3, “vSnap Backup Storage server” on
page 13.
MongoDB: Unlike the other supported databases, MongoDB does not have log
management configurable in IBM Spectrum Protect Plus.
For each SLA and each database included in that SLA, the following resources are created
on the vSnap server to store backups:
One primary data vSnap server volume
One primary log vSnap server volume
These data and log volumes are made available to the database server, as shown in
Figure 8-16.
Figure 8-16 How database server access their respective vSnap server volumes
Table 8-1 lists what actions take place for data backup and describes the mechanism that is
used by IBM Spectrum Protect Plus to handle the application logs backup.
Microsoft SQL VSS snapshot, copy all files to Windows task scheduler
iSCSI LUN
Microsoft Exchange VSS snapshot, copy all files to Windows task scheduler
iSCSI LUN
IBM Db2 LVM snapshot, copy all files to db2 archive log scheduler
share
MongoDB LVM snapshot, copy all files to Copy journal with data file
share
RMAN does not permit to make inconsistent backups when the database is in
NOARCHIVELOG mode.
Therefore, IBM Spectrum Protect Plus requires that the Oracle database to be in
ARCHIVELOG mode.
A point-in-time Production restore creates a temporary vSnap server clone volume of the last
vSnap server data volume before the selected point in time and mounts that clone to the
target server. A copy then occurs on the target server, from the clone volume to the
production volume. After the copy process completes, the clone volume is dismounted and
deleted from the vSnap server.
The next step is to create a temporary clone of the log volume that contains database logs
that are created after the selected point in time and mount that clone to the target. This clone
contains the log backup with database transactions that occurred after the data was restored
in the first step, and allows a rollforward recovery until the specified point in time.
The Test restore works the same way as point in time production restore, but the production
data is not copied back. The restore data is provided as a share from the vSnap server.
The Instant Access restore creates a temporary vSnap server clone volume of the selected
(point in time) backed up data and mounts that clone to the target application server for
access. The same clone and mount operation occurs on the log volume of that same point in
time.
These clones allow read/write access, so the application can work with the data. However,
when the instant access process completes, the data modifications are not persistent, and
any modifications that were made during the instant access are lost. The original backup
does not change.
The discovery process identifies if multi-threading processing is enabled, and prompts the
user for the credentials. Enter the credentials for multi-threaded databases at the time of
registration. IBM Spectrum Protect Plus passes on the credentials to the Oracle agent during
backup, and the agent uses the credentials to log in to the database.
Note: When restoring an Oracle database that was configured for multithreading at the
time of backup, the restored database is non-multithreaded. The restored database must
be manually reconfigured to use multi-threading.
As listed in the prerequisites, archive logs are enabled, which implies that local cleaning of
these logs is required. IBM Spectrum Protect Plus can perform this task. To control the local
archive log cleaning by way of IBM Spectrum Protect Plus, select the Enable Log Backup
option and specify the Primary log retention in days parameter in the Backup Options
window, as shown in Figure 8-17.
Figure 8-18 shows the parameter controlling the local archive log cleaning.
For more information about the commands that are used by IBM Spectrum Protect Plus, see
8.4.7, “Oracle commands used by IBM Spectrum Protect Plus” on page 271
Note: For archive log backups, it is important to decide up front which mechanism is
preferred to manage the local archive log deletion: controlled by IBM Spectrum Protect
Plus through the option that is shown in Figure 8-18 or the database administrator prefers
to control it on their side. In the latter choice, the archive log must be kept at least for the
time as defined in the Log Backup Frequency and StartTime setting in the IBM Spectrum
Protect Plus SLA Policy so that IBM Spectrum Protect Plus can take them for backup.
8.4.5 Compression
IBM Spectrum Protect Plus uses its own compression and deduplication mechanisms. It does
not use the Oracle Advanced Compression feature (which requires an extra license).
for more information about requirements, IBM Spectrum Protect Plus Installation and User’s
Guide.
Any command that is used for the database backup, archive logs backup, and archive logs
cleaning can be found in the Job log when the Detail filter is enabled.
The details that are shown in Example 8-6 - Example 8-9 on page 272 are extracted from job
logs where you can see which RMAN commands were used by IBM Spectrum Protect Plus to
perform the backup.
Example 8-6 RMAN commands used by IBM Spectrum Protect Plus to do archive log backup
RMAN> set echo off;
2> connect target *
3> run {
4> configure controlfile autobackup off;
5> set command id to 'spp_logbackup_1591215736';
6> allocate channel spp1 type disk format
'/mnt/spp/vsnap/vpool1/fs3/10_0_250_32/SPP/%h_%e_973347459.dbf';
7> backup as copy archivelog from scn 4398899;
8> release channel spp1;
9> }
10> exit;
Example 8-7 RMAN command used by IBM Spectrum Protect Plus to do database backup
connect / as sysdba;
set timing off;
alter system archive log current;
exit;
connect target /;
run {
configure controlfile autobackup off;
set command id to 'SPP_BACKUP_1006_1591907693';
allocate channel spp1 type disk format
'/mnt/spp/vsnap/vpool1/fs4/10_0_250_32/SPP/arch/%h_%e_973347459.dbf';
allocate channel spp2 type disk format
'/mnt/spp/vsnap/vpool1/fs4/10_0_250_32/SPP/arch/%h_%e_973347459.dbf';
backup as copy archivelog from scn 5202016 until scn 5202018;
release channel spp1;
release channel spp2;
}
exit;
connect / as sysdba;
set timing off;
create pfile='/mnt/spp/vsnap/vpool1/fs4/10_0_250_32/SPP/pfile.txt' from spfile;
exit;
Example 8-8 RMAN commands used by IBM Spectrum Protect Plus to do controlfile backup
RMAN> set echo off;
2> connect target *
3> run {
4> set command id to 'SPP_BACKUP_1006_1591855534';
5> allocate channel spp1 type disk format '/mnt/spp/tmp/SPP_spp_backup_1006.ctl';
6> backup as copy current controlfile reuse tag 'SPP_BACKUP_1006';
7> }
8> exit;
echo set off
Example 8-9 RMAN commands used by IBM Spectrum Protect Plus to do local archive log cleaning
set echo off;
connect target /;
Several environments exist in which the database or other application requires their backup to
be integrated into a sequence of actions, in a specific order. These tasks are usually
managed by a scheduler, such as Tivoli Workload Scheduler.
The intent of this section is to explain which steps and features can be used within IBM
Spectrum Protect Plus to synchronize the backup with an external scheduler. Although the
backup is still triggered by an IBM Spectrum Protect Plus policy, we can use the pre-script
option to have IBM Spectrum Protect Plus run a piece of code on the server host. In our
example, we show how to wait for an external scheduler flag before triggering the backup.
Example 8-10 shows the few lines of code that we use as a pre-script. This code is going to
loop until a specific file (acting as a flag) is placed in a specific location by an external
mechanism. This flag file is the signal for IBM Spectrum Protect Plus to trigger the backup.
Example 8-10 Pre-script to make an IBM Spectrum Protect Plus backup waiting for external signal
#! /bin/sh
while [ ! -f /tmp/external_scheduler.flag ]
do
date >> /tmp/SPP_wait4external_scheduler.log
echo " Flag /tmp/external_scheduler.flag not there, wait to start backup " >>
/tmp/SPP_wait4external_scheduler.log
sleep 60
done
echo " Flag /tmp/external_scheduler.flag is here, backup time ! " >>
/tmp/SPP_wait4external_scheduler.log
Tips: Supported scripts include shell scripts for Linux-based machines and batch and
PowerShell scripts for Windows-based machines. Scripts must be created by using the
associated file format for the operating system.
Running the dos2unix command before uploading the script in IBM Spectrum Protect Plus
might help you to ensure suitable format of a shell script if you encounter a formatting
problem (that is, ^M at end of line).
The use of the scripts with IBM Spectrum Protect Plus is an easy three-step process:
1. Define the script.
2. Define the script servers.
3. Update the SLA policy options from the SLA Policy Status page.
Defining the script means uploading the script to IBM Spectrum Protect Plus, as shown in
Figure 8-19. Click Browse to select and upload the script that you plan to run on the
application or database server as part of the backup job.
The second step is to define the Script Server, as shown in Figure 8-20. Select System
Configuration → Script. Specify the Host address, login credentials, and operating system
type for which you plan to use script.
Figure 8-20 Define SCript Server by specifying its address and credentials
In our example, we want to run a script to check whether an Oracle backup ran. We select
Manage Protection → Databases → Oracle → SLA Policy Status. Then, we select Policy
Options, as shown in Figure 8-21.
Figure 8-21 Open the Policy Options to enable the use of a script for that SLA Policy run
When you click Policy Options, a pop-up window opens (see Figure 8-22) and you must
specify whether you want to enable pre-script or post-script, and which script to run.
Figure 8-22 Configure Policy Options to use a specific script for pre or post backup tasks
Whenever the SLA policy is used, completes the pre-script step before triggering the backup
commands. Moreover, if you disable the Continue job/task on script error option, the backup
does not run if the pre-script failed.
Figure 8-23 shows the output log that lists the execution of pre-script.
Figure 8-23 Job log showing that pre script action is executed on the target server t3-vm-lx
Figure 8-24 shows the output log when the pre-script completed so the backup job continues
and triggers the backup of (in our example) the Oracle database.
Figure 8-24 Job log showing that backup action is happening after the pre script completed successfully
Tip: For more information about pre-script or SLA policy options in the job log, enable the
Detail filter of the Job Log.
Note: Although database configuration and handling is widely similar for databases in IBM
Spectrum Protect Plus, some differences exist for the supported database systems. We
describe that information in Chapter 10, “Backing up and restoring Db2 databases” on
page 291, and Chapter 11, “Backing up and restoring SQL Server” on page 309
For more information about generic test restore or DevOps use cases, see Chapter 8.
“Backing up and restoring databases” on page 255. This chapter also describes database
backup, restore, and DevOps use cases in general, but refers specifically to an Oracle
database whenever necessary.
Current restrictions
In IBM Spectrum Protect Plus version 10.1.6, MongoDB is configured as a stand-alone
instance or replica set. Currently, IBM Spectrum Protect Plus does not support backup
operations of MongoDB sharded cluster instances. A backup always includes all databases in
the instance.
IBM Spectrum Protect Plus offers a two-stage process to access a MongoDB database. First,
you register the database server with an IP name or address, an operating system user, and
a corresponding password. IBM Spectrum Protect Plus initiates a database discovery job on
this server. If you run your MongoDB without authentication, the database registration in IBM
Spectrum Protect Plus is complete at this point.
Also, if you secured your databases on the database level, you specify more user credentials
for each secured database that IBM Spectrum Protect Plus discovered.
9.1.3 “MongoDB databases with authentication enabled” on page 281 describes how to
enable MongoDB authentication.
9.1.4 “Register a MongoDB server” on page 283 describes the MongoDB registration in IBM
Spectrum Protect Plus.
If your MongoDB database is configured without credentials, you should secure it. There
are many MongoDB databases open on the internet, providing the opportunity for massive
data breaches.
For more information about available authentication options, see the MongoDB manuals,
which are available at this website.
MongoDB authentication requires the definition of at least one MongoDB user. If database
authentication is enabled, IBM Spectrum Protect Plus must provide a user name and a
password to run backup and restore activities.
For each MongoDB user that you plan to use for backup and restore with IBM Spectrum
Protect Plus, specify MongoDB access roles by using the db.grantRolesToUser() command,
as shown in Example 9-2.
> db.grantRolesToUser("mdbuser",
[ { role: "hostManager", db: "admin" },
{ role: "clusterMonitor", db: "admin" } ] )
> db.grantRolesToUser("mdbuser",
[ { role: "clusterManager", db: "admin" } ] )
The clusterManager role is required only for running test restore operations of replica sets.
If you decide to create a new or dedicated user for backup and restore purposes, you can use
the db.createUser() command, as shown in Example 9-3. According to the MongoDB
manuals, the ClusterAdmin role includes the clusterManager, clusterMonitor, and
hostManager roles.
Example 9-3 Create a MongoDB user with the permissions required by IBM Spectrum Protect Plus
> show dbs
admin 0.000GB
config 0.000GB
local 0.000GB
> use admin
switched to db admin
> db.createUser(
{
user: "mdbuser",
pwd: "mypasswd",
roles: [ "readWrite", "dbAdmin","clusterAdmin" ]
}
)
Note: Enhanced database administration permissions are required to create users and
grant roles. The roles that are required for backup and restore with Spectrum Protect Plus
are not sufficient.
For MongoDB authentication to take effect, restart the MongoDB daemon (mongod) with the
“--auth” option. Example 9-4 shows how to start the daemon on a Linux command line.
Create identities
Based on your decision to run your MongoDB database with or without authentication, one or
two user definitions are required: an operating system user and optionally a MongoDB user.
You can specify the users in the Add application server menu, but we recommend explicitly
creating a so-called Identity with a customized name first. Figure 9-1 and Figure 9-2 show
Identities for an operating system and a MongoDB user. The two user names can be identical.
If you want to start a database discovery job on the server, click Get Instances. If IBM
Spectrum Protect Plus discovers databases, it shows the connection data for these
databases: IP name or address, and IP port.
For more information about handling of MongoDB databases with authentication, see
section 9.1.3.
For more information about required configuration steps and parameters, see IBM Spectrum
Protect Plus Installation and User’s Guide, which is available at IBM Knowledge Center.
For more information about the configuration of other use cases, see 8.2 “IBM Spectrum
Protect Plus database restore and data reuse” on page 259.
For more information, see 1.3 “SLA backup policies” on page 19.
After you set up an SLA policy for your MongoDB backup job, you can choose to configure
extra options for that job. More SLA options include running scripts, and forcing a full base
backup.
Now, you also decide whether to perform a backup of a single database (click Run), use the
Create Job wizard, or perform a backup of all applications that are included in the SLA policy
(click Actions).
Figure 9-4 MongoDB instance discovered by IBM Spectrum Protect Plus with an SLA policy assigned
Wait until a backup is automatically scheduled or scroll down to the SLA policy section in the
window and select Actions → Start to manually start a backup. This process is IBM
Spectrum Protect Plus standard handling, and not specific to MongoDB environments.
To run an on-demand backup job for multiple MongoDB databases that are associated with
an SLA policy, click Create job, select Ad hoc backup, and follow the instructions.
Note: Do not run inventory jobs at the same time that MongoDB backup jobs are
scheduled.
During incremental backups, the created volume is reused. The IBM Spectrum Protect Plus
MongoDB agent mounts the share on the MongoDB server where the backup is performed.
Switch to the Jobs and Operations menu to display the job protocol and optionally download
the job logs and command files.
For more information about the configuration of other use cases, see 8.2 “IBM Spectrum
Protect Plus database restore and data reuse” on page 259.
The next two selections express what we are trying to achieve: A production restore to the
original instance, as shown in Figure 9-8 and Figure 9-9 on page 288.
For an on-demand snapshot restore of a production database, the IBM Spectrum Protect
Plus restore wizard assumes a subsequent database rollforward to the end of logs included in
the backup (see Figure 9-10).
You must also decide about overwriting a database. IBM Spectrum Protect Snapshot provides
an auxiliary protection against an unintended data overwrite; that is, if the database still exists
and you do not select the overwrite option, the restore job fails.
In IBM Spectrum Protect Plus, an on-demand snapshot restore is not scheduled. Spectrum
Protect Plus runs it only once, as shown in Example 9-11.
Finally, switch to the Job and Operations menu to check the job results (see Figure 9-12).
IBM Db2 Version 10.5, 11.1, 11.5 and later maintenance levels: Enterprise Server Edition are
supported at the time of this writing.
To manage Db2 databases with IBM Spectrum Protect Plus the following prerequisites must
be met:
Define a dedicated IBM Spectrum Protect Plus agent user, for example sppagent, on every
Db2 server with the required privileges for sudo, as shown in Example 10-1.
Db2 archive logging is activated and Db2 is in recoverable mode, which requires that at
least LOGRETAIN is enabled.
In this IBM Redbooks publication, the Db2 database example consists of a multi-partitioned
Db2 Database Partitioning Feature (DPF) database version 10.5 that is running on two Red
Hat Enterprise Linux Server hosts, as shown in Figure 10-1.
In our example, the Db2 partitions 0, 1, 2, and 3 are spread over the two servers kansasprod1
and floridaprod1, as shown in the db2nodes.cfg file in Example 10-2.
To be able to manage the Db2 DPF database with IBM Spectrum Protect Plus the parallel
backup mode, as shown in Figure 10-2 has to be enabled. To run parallel backup processing
of partitions in your Db2 environment, ensure that one of the following prerequisites is met:
The Db2 registry variable DB2_PARALLEL_ACS is set to YES, for example: db2set
DB2_PARALLEL_ACS=YES
In earlier versions of Db2, the backup mode is determined by the Db2 registry variable
DB2_WORKLOAD. To enable parallel backup mode, run the Db2 command db2set
Db2_WORKLOAD=SAP. Check with the Db2 command db2set -all Db2_WORKLOAD.
Figure 10-2 Parallel backup mode with Db2 Advanced Copy Services (ACS)
IBM Spectrum Protect Plus triggers the Db2 agent once per host, and if there is more than
one partition on the host, Db2 will trigger ACS for each partition individually. A dedicated
protocol file is available per partition that is later stored on the vSnap server volume. The Db2
agent can handle the multiple invocations of its ACS scripted part through Db2.
In parallel backup mode, which is the default mode for an SAP Db2 database, all partitions
are suspended before Db2 issues snapshot requests. The requests are then performed in
parallel on all partitions, as shown in Figure 10-2. IBM Spectrum Protect Plus runs the Db2
backup command on the Db2 catalog partition. The main Db2 ACS processes are:
1. Prepare phase: The write operations of the database are suspended; that is, WRITE
SUSPEND is set automatically on the database. Db2 prepares the file systems, checks
space requirements in the storage system and does other things to keep the database
consistent.
2. Snapshot phase: Db2 instructs the Db2 agent to perform a software snapshot on each
partition in parallel. The snapshot request is done by taking software snapshots of the
corresponding volumes.
3. Verify phase: Db2 checks if the snapshot was taken successfully. If the snapshot is
correct, the data is moved to the vSnap server by the Db2 agent.
For more information about updates to the Db2 database prerequisites, see Spectrum Protect
Plus- All Requirements, which is available at this web page.
For IBM Spectrum Protect Plus, the Db2 archive logging must be enabled and Db2 must be in
recoverable mode. If log backup is enabled in IBM Spectrum Protect Plus, one of the Db2
parameters, LOGARCHMETH1 or LOGARCHMETH2, is updated with the path of the vSnap
pool for the log files, as shown in Example 10-3. Therefore, it is important that one of the
LOGARCHMETH parameters includes the value OFF and can be used for a vSnap log
volume assignment.
Note: To successfully enable Db2 log backup in Spectrum Protect Plus, the Db2 agent
expects (and verifies) that all partitions have unique settings for logarchmeth1 and
logarchmeth2.
Log backup transaction files are copied to this share according to the schedule created for log
backup.
If the DB2 backup job is running, we can see an NFS share on the file system that is
associated with the SLA. As shown in Example 10-4, running the vSnap CLI command vsnap
share show lists the active share, in which the Volume ID 3671 and the share name
/vsnap/vpool1/fs148 can be identified.
ID: 3671
NAME: /vsnap/vpool1/fs148
SHARE TYPE: nfs
VOLUME ID: 148
PARTNER ID: N/A
CREATED: 2020-06-30 11:58:46 UTC
UPDATED: 2020-06-30 11:58:46 UTC
SHARE OPTIONS:
The share is used to transfer the backup data from the database to the vSnap server.
After the backup of the log completes, log backup transaction files are copied to this share
according to the schedule that was created for log backup, as shown in Example 10-5.
Example 10-5 Log backup transaction files copied into NFS shared VSnap in DB2 guest spp-db2-01
[root@spp-db2-01 ~]# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/mapper/rhel-root 38G 9.8G 28G 27% /
devtmpfs 1.9G 0 1.9G 0% /dev
tmpfs 1.9G 12K 1.9G 1% /dev/shm
tmpfs 1.9G 25M 1.9G 2% /run
tmpfs 1.9G 0 1.9G 0% /sys/fs/cgroup
/dev/sda1 1014M 143M 872M 15% /boot
/dev/mapper/rhel-home 19G 844M 18G 5% /home
/dev/mapper/db2-data 15G 240M 14G 2% /db2_data
/dev/mapper/db2-log 9.8G 116M 9.1G 2% /db2_log
tmpfs 380M 12K 380M 1% /run/user/42
192.168.5.234:/vsnap/vpool1/fs148 898G 128K 898G 1% /mnt/spp/vsnap/vpool1/fs148/192_168_5_234
tmpfs 380M 0 380M 0% /run/user/0
Note: The Run button is enabled only for a single database backup. Also, the database
must have an SLA policy applied.
To run an on-demand backup job for multiple Db2 databases that are associated with an SLA
policy, click Create job. Then, select Ad hoc backup and follow the instructions.
Log in to one of the Db2 database server by using SSH and check where the backup is
created. Run the df -h command, as shown in Example 10-6, and review the vSnap server
volumes.
Example 10-6 vSnap server volumes for data and log backup
[root@spp-db2-01 C0000000]# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/mapper/rhel-root 38G 9.8G 28G 27% /
devtmpfs 1.9G 0 1.9G 0% /dev
tmpfs 1.9G 12K 1.9G 1% /dev/shm
tmpfs 1.9G 26M 1.9G 2% /run
tmpfs 1.9G 0 1.9G 0% /sys/fs/cgroup
/dev/sda1 1014M 143M 872M 15% /boot
/dev/mapper/rhel-home 19G 989M 18G 6% /home
/dev/mapper/db2-data 15G 240M 14G 2% /db2_data
/dev/mapper/db2-log 9.8G 116M 9.1G 2% /db2_log
tmpfs 380M 12K 380M 1% /run/user/42
192.168.5.234:/vsnap/vpool1/fs148 898G 128K 898G 1% /mnt/spp/vsnap/vpool1/fs148/192_168_5_234
tmpfs 380M 0 380M 0% /run/user/0
tmpfs 380M 0 380M 0% /run/user/1003
192.168.5.234:/vsnap/vpool1/fs113 898G 25M 898G 1% /mnt/spp/vsnap/vpool1/fs113/192_168_5_234
One vSnap server log volume is used for multiple Db2 partitions. A single log archive volume
on vSnap server is sufficient because the log paths are orthogonal because of the Db2
NODEXXXX element in each of the log paths. Log volumes stay mounted on the Db2
application server. When the backup completes, you \ see the status Completed, as shown in
Figure 10-8 on page 301.
After you select an SLA policy for your Db2 backup job, you can choose to configure extra
options for that job. Other SLA options include running scripts and forcing a full base backup.
For more information, see 8.5, “Database backup with pre-script and post-script” on
page 274.
IBM Spectrum Protect Plus automatically deletes older transactional logs after a successful
database backup. This action ensures that the capacity of the log archive volume is not
compromised by retention of older log files. These truncated log files are stored in the vSnap
server repository until the corresponding backup expires and is deleted. The retention period
of database backups is defined in the assigned SLA policy.
Db2 database restore with IBM Spectrum Protect Plus supports several restore methods that
are explained in the following sections.
Important: For all restore operations, Db2 must be at the same version level on the source
and target hosts. In addition to that requirement, you must ensure that an instance with the
same name as the instance that is being restored exists on each host. This requirement
applies when the target instance has the same name, and when the names are different. In
order for the restore operation to succeed, both instances must be provisioned, one with
original name and the other with the new name.
The combination of these selections define which action to perform, including the following
examples:
Restore a database restore and optionally overwrite an existing database
Establish a copy of a previously backed up database (DevOps)
Get access to the database files (data and metadata) of a previous backup
Note: When you are restoring a multi-partitioned database to an alternate location, ensure
that the target instance is configured with the same partition numbers as the original
instance. All of those partitions must be on a single host.
For more information about database examples that show a test restore or instant access,
see “IBM Spectrum Protect Plus database restore and data reuse” on page 259.
As shown in Figure 10-9, the user must select the Db2 database that requires a restore.
In the IBM Spectrum Protect Plus restore wizard, the following parameters must be selected
to start a traditional database restore that overwrites the database:
Restore type: On-Demand Point in Time
Restore location type and location can vary. Here, we use Site and Primary.
Restore method: Production
Destination: Restore to original Instance
Restore Method: Production
Job options: Overwrite existing database
The next step is to select the type of restore, as shown in Figure 10-11. Here, On-demand
Point in Time was selected.
There are three restore methods available, as shown in Figure 10-13. In our scenario we are
choosing a Production restore.
Production restore
A production restore either overwrites the original database or creates a database copy on an
alternate host and optionally in an alternate database instance.
For Devops scenarios, it is possible to create a restore job that runs periodically at a specific
time. In our scenario, we create an on-demand restore job that runs only once. As a further
restore job option, we select Overwrite existing databases, as shown in Figure 10-15.
Finally, the Review page is displayed and after checking all values, the on-demand restore job
can be submitted. See Figure 10-16. To start the on-demand restore job, click Submit.
Figure 11-1 Windows Remote Shell configured into Microsoft SQL Server
An IBM Spectrum Protect Plus agent user must have “Log on as a service” rights on the
SQL application server.
The login credentials must have public and sysadmin permissions enabled, plus
permission to access cluster resources in a SQL Server AAGs environment.
To perform log backups, the SQL Server agent service user must be a local Windows
administrator and must have the sysadmin permission enabled to manage SQL Server
agent jobs.
The host name of the IBM Spectrum Protect Plus appliance should be resolvable from the
SQL application servers.
The Microsoft SQL Server Guest Network Adapter Backup must have the option “Client for
Microsoft Networks” enabled to prevent CIFS share issues, when Databases SQL Backup
Logs are defined and configured, as shown in Figure 11-3.
Figure 11-3 Client for Microsoft Networks option enabled into MIcrosoft SQL Server
For more information about the SQL Server database prerequisites, see IBM Spectrum
Protect Plus- All Requirements, which is available at this web page.
In the IBM Spectrum Protect Plus GUI navigation pane, click Manage Protection →
Databases → SQL → Manage Application Servers → Add Application Server.
Enter the required login credentials for the SQL application server, as shown in Figure 11-4.
In this example, the IBM Spectrum Protect Plus admin includes predefined the SQL Server
Admin in Accounts → Identity → Add Identity.
Perform a configuration test of the newly assigned SQL Server in IBM Spectrum Protect Plus,
as shown in Figure 11-5 on page 313.
If SQL application servers are attached to a domain, a user name in the format domain\Name
must be used. If a user is a local administrator, the format .\<local administrator> must be
used.
For failover clusters and AAGs, each node must be registered by name or IP address. If fully
qualified domain names are used, they must be resolvable and routeable from IBM Spectrum
Protect Plus.
Assign the selected SQL Server database to an SLA policy to create a backup job. SQL
Server backups run in a “Base-Once-Incremental-Forever” scheme. During the initial base
(full) backup, IBM Spectrum Protect Plus creates a vSnap server volume and mounts it to the
SQL application server over iSCSI.
Note: An iSCSI route must be enabled between the SQL Server and vSnap server. For
more information, see this web page.
Optionally, the SQL Server admin can click the Select Options button to enable Log Backup,
as shown in Figure 11-6. With log backup enabled, IBM Spectrum Protect Plus manages the
log backup by using the SQL Server agent service.
To complete log backups, the SQL Server Agent service user must be a local Windows
administrator and must have the sysadmin permission enabled to manage SQL Server agent
jobs. Also, the SQL VSS Writer service running on the local SQL Server system must be
started from a local system user.
The agent uses the administrator account to enable and access log backup jobs. The IBM
Spectrum Protect Plus SQL Server agent service user must also be the same as the SQL
Server service and SQL Server agent service account for every SQL Server instance to be
protected.
Set the maximum number of data streams per database to the backup storage. This setting
applies to each database in the job definition. Databases can be backed up in parallel if the
value of the option is set to 1. Multiple parallel streams might improve backup speed, but high
bandwidth consumption might affect overall system performance.
It also can be monitored by selecting Jobs and Operations → Running Jobs → Progress,
as shown in Figure 11-8.
Note: The Microsoft SQL Server agent sets the VSS backup type to COPY_ONLY for all
database backups.
Depending on what type of SQL backup log is required, it can be configured by using one of
the following methods:
With Truncate SQL Logs option activated on Virtualized Systems wizard
Note: If you multiple backup solutions are performing log truncation, you can establish
discontinuity in the log chain. It must be ensured that the log truncation occurs only once
during a backup.
With this option activated, logs might be truncated during the VM Backup as a result of log
clearing. In this case, you can restore a VM only; a roll forward of the transaction log data
cannot be performed.
The option to truncate SQL logs can be defined under Manage Protection → Virtualized
Systems → Vmware or Hyper-V → Select VM Server → Select Options, as shown in
Figure 11-9.
Note: For more information about how to enable Log Truncation, see Protecting Virtualized
Systems - Backing up Vmware / Hyper-V data Guides, which is available at IBM
Knowledge Center:
Backing up VMware data
Backing up Hyper-V data
Under Options, select Enable Log Backup and define a Log Backup Frequency, as
shown in Figure 11-12.
The enabled SQL log backup schedule option can also be reviewed in the Microsoft SQL
Server system, as shown in Figure 11-13 on page 320 under Task Scheduler → Task
Scheduler Library → IBM → SPP Windows Agent.
Note: To run the Windows log backup task, the IBM Spectrum Protect Plus agent user
must have the Log On As Batch Job assignment privilege.
Note: For more information about how to enable Log backup, see Backing Up SQL Server
Data Guide, which available at IBM Knowledge Center.
If the SQL backup SLA job is running, you can see a share smb on the file system, which is
associated with the SLA. The vSnap CLI command vsnap share show, as shown in
Example 11-1, lists the active share where the Volume ID 1 and the file system name
/vpool1_fs2 can be identified.
ID: 1
NAME: vpool1_fs2
SHARE TYPE: smb
VOLUME ID: 2
PARTNER ID: N/A
CREATED: 2020-06-03 12:06:15 UTC
UPDATED: 2020-06-18 06:00:57 UTC
SHARE OPTIONS:
ALLOWED HOSTS:
10.0.250.46
The shared volume is used to transfer the backup data from the database to the vSnap
server.
After the log backup completes, log backup transaction files are copied to this share, as
shown in Example 11-2.
One ad-hoc job can be started from Manage Protection → Databases → SQL → Create
Job → Ad hoc Backup → Select SLA Policy → Select Source, as shown in Figure 11-14.
Figure 11-14 Ad Hoc SQL Backup showing Name, Location and SLA Policy
Multiple sessions from the same SLA policy can be started from Manage Protection →
Databases → SQL → Create Job → Ad hoc Backup → Select SLA Policy → Select
Source. The sessions can be monitored from Jobs and Operation → Running Jobs, as
shown in Figure 11-15.
Figure 11-15 Multiple running sessions from the same SLA policy
Note: Only users with administrator credentials can manage global preferences.
Enable SQL Server databases restored in test mode eligible for backup
When this option is selected, SQL Server databases that were restored in test mode are
available for selection in the SQL Backup pane or ad hoc backup wizard.
Allow SQL database backup when transaction log backup chain is broken
Run a database SLA backup job when IBM Spectrum Protect Plus detects a break in the
log backup chain for a database.
Rename SQL data and log files when database is restored in production mode with new
name
This options allows to rename SQL database and log files files during a production or test
restore job. This field applies only when a new database name is provided during an SQL
database restore job.
IBM Spectrum Protect Plus treats data reuse and data recovery as a restore activity. In both
cases, you must create a restore job. A restore job can be started by making one of the
following selections in IBM Spectrum Protect Plus:
Manage Protection → Databases → SQL → Create Restore Job
Jobs and Operations → Create Restore Job → Restore
The parameters that you select during backup job creation define which is performed.
The following main parameters control the final restore or data reuse activity:
Type of Restore:
– On-Demand Snapshot
– On-Demand Point in Time
– Recurring
Restore Method:
– A production restore either overwrites the original database or creates a database copy
with a different database name. In the latter case you must specify a new database
name and the destination paths.
– A test restore mounts the vSnap server directories with a database backup to a
database server, recovers and opens the database. You can chose to rename the
database.
– An instant access restore also mounts the vSnap server directories with a database
backup to a database server, but does not recover or open the database. An instant
access restore of an Always On database is restored to the local destination instance.
Note: The SQL Server system databases (master, msdb, model) can be restored only
with Instant Access mode in IBM Spectrum Protect Plus.
Destination:
– Restore to the original instance
– Restore to an alternate instance
The combination of these selections define which action to perform, including the following
examples:
Perform a database restore and optionally overwrite an existing database
Establish a copy of a previously backed up database (DevOps)
Get access to the database files (data and metadata) of a previous backup
In the first example scenario, a Production restore of a SQL Server stand-alone database is
performed by using SQL Server version 2012. As shown in Figure 11-17 on page 325, the
databases ESCC and IBM2 are selected for the restore. By selecting the blue plus sign, a
backup is associated with the database.
For more information about database examples that show a test restore or instant access,
see “IBM Spectrum Protect Plus database restore and data reuse” on page 259.
Other restore parameters that must be specified are shown in Figure 11-18:
Restore type: On-Demand: Snapshot
Runs a one-time restore job from a database snapshot. The restore job starts immediately
upon the completion of the wizard.
Restore location type: Site
The site where snapshots were backed up. The site is predefined in IBM Spectrum Protect
Plus.
Location = Primary
The primary site location from which to restore snapshots.
When selecting production mode, you can also specify a new folder for the restored database
by expanding the database section and entering a new folder name.
Enable the restore job to overwrite the selected database. By default, this option is not
enabled, as shown in Figure 11-21 on page 327.
Note: Before you run restore operations in an SQL Server Always On environment by
using the production mode with the Overwrite existing databases option, ensure that the
database is not present on the replicas of the target availability group. As a prerequisite,
manually clean up the original databases (to be overwritten) from all replicas of the target
availability group.
In the Review page, check all entered restore job parameters, as shown in Figure 11-22. Click
Submit to start the on-demand restore job.
IBM Spectrum Protect Plus mounts the vSnap server backup volume at the SQL application
server and copies the backup data to the source.
Figure 11-23 Mount of vSnap server volume for the restore on the SQL application server
As shown in Figure 11-24, we select the new Standby mode Job Options and perform the
restore similar to the previous example.
IBM Spectrum Protect Plus mounts the vSnap server backup volume at the SQL application
server and copies the backup data to the source. Figure 11-25 shows that the new Database
IBM2_TEST was restored with Standby/Read-Only mode.
This chapter describes how to set up IBM Spectrum Protect Plus to protect Microsoft
Exchange Servers, and explores common scenarios and best practices. It includes the
following topics:
12.1, “Microsoft Exchange server” on page 330
12.2, “Prerequisites for protection in IBM Spectrum Protect Plus” on page 332
12.3, “IBM Spectrum Protect Plus configuration for Exchange” on page 339
12.4, “Backup jobs overview” on page 341
12.5, “Restore jobs” on page 349
Edge/Transport X X X
Client Access X
Mailbox X X X
The Edge/Transport role is used to transport mail from external sources into the Exchange
infrastructure. A server with installed Edge/Transport is usually placed in a specific secured
firewall zone because it is directly connected to the internet. If this role is the only role that is
installed on the server, the server needs no Exchange-specific protection (because it has no
persistent user data; it acts only as a proxy).
The Client Access role is a separate role in Exchange 2013 and was merged into the mailbox
role in Exchange 2016 and 2019. If a server is installed with Client Access Server role only,
the same type of protection applies that is used for Edge/Transport only servers.
Only Microsoft Exchange servers with installed Mailbox role are protected by IBM Spectrum
Protect Plus Backup and Restore for Microsoft Exchange. These servers are usually called
mailbox servers. In the IBM Spectrum Protect Plus GUI, they are referred to as Application
Servers.
A ReplayLagTime and TruncationLagTime can be defined for every copy to ensure that the
copy does not commit or truncate the replicated logs before the ReplayLagTime and
TruncationLagTime are reached. The default value of these two parameters is 0 seconds and
the maximum value is 14 days.
A database copy with default settings is a nearly real-time copy (there is always the gap of the
active log file, which is not shipped to inactive copy yet) of the active copy.
For example, a database copy with a ReplayLagTime of 7 days is a copy that lags the active
copy by 7 days. A lagged copy ensures that if the active database copy becomes corrupted, a
working copy (7 days back in time) is still available that can be used to fix the corruption or be
used as a new base to apply the logs until the corruption occurred.
IBM Spectrum Protect Plus adds data protection capabilities that can be used whenever the
built-in solutions are not satisfying or in case of a disaster.
IBM Spectrum Protect Plus is a zero touch data protection product; therefore, no installation
on the Exchange Mailbox Servers is needed. However, some requirements must be met to
enable IBM Spectrum Protect Plus to access Exchange Mailbox Servers and perform backup
or restore tasks.
For more information about these requirements, see IBM Knowledge Center.
This Windows system can be one of the Exchange Mailbox servers, but Microsoft advises
against installing Outlook on an Exchange Mailbox Server. Therefore, it is best to use a
separate Windows server.
To use the remote management features, you must first install and enable Windows
PowerShell 3.0, or later, on all IBM Spectrum Protect Plus protected Exchange servers and
the remote server from which you intend to run the IBM Spectrum Protect Plus MMC GUI.
To download, install, and enable the software, follow the instructions in Microsoft Windows
Management Framework 3.0 Downloads. The remote server and Application server must be
in the same domain.
This installation is called Granular remote package. The installation steps be found in the
readme file for the Spectrum Protect Plus MMC GUI, which we included here for
convenience.
Installation steps
Deploy the granular restore package to a remote server that has Microsoft Outlook installed.
The following installation steps are performed only once. After the granular restore package is
installed, you can continue to use it to perform later granular restore operations:
1. Copy the granular restore package, which is in C:\Program Files\IBM\IBM Spectrum
Protect Plus\tools\exchange\imr\<version>TIV-TSMEXC-Win.ex, from the Application
Server to the remote server from where you manage the granular restore operations. Also,
note that <version> indicates the version.
2. On the remote server, run the following commands to install the package (these
commands assume that you copied to the C:\temp directory):
a. Create the installation diagnostic folder:
mkdir C:\temp\diag
b. Install MMC GUI and granular components:
C:\temp\imr\install_imr.bat *-TIV-TSMEXC-Win.exe 10.1.7 c:\temp
Where * is the MMC GUI version.
Optionally, for more remote configuration verification, complete the following steps:
1. Set the credentials object you used. Usually, this credential is a domain administrator:
$creds = Get-Credential
a. On the Application Server and remote server, run the following cmdlet to verify basic
remote connection:
Invoke-Command -ComputerName $remote_server_host_name -ScriptBlock { pwd }
-Credential $creds
For our example, we show the commands that run in our test environment, which consists of
the following servers:
Windows 10 server ("windows10.xxxxxxx.lab,192.168.111.66"), as shown in
Example 12-1
Exchange server ("epc-exchange.xxxxxxx.lab,192.168.111.167"), as shown in
Example 12-2 on page 335
wsmid : http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd
ProtocolVersion : http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor : Microsoft Corporation
ProductVersion : OS: 0.0.0 SP: 0.0 Stack: 3.0
wsmid : http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd
ProtocolVersion : http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor : Microsoft Corporation
ProductVersion : OS: 0.0.0 SP: 0.0 Stack: 3.0
cfg : http://schemas.microsoft.com/wbem/wsman/1/config/client/auth
lang : en-US
Basic : true
Digest : true
Kerberos : true
Negotiate : true
Certificate : true
CredSSP : true
Path PSComputerName
---- --------------
C:\Users\Administrator.xxxxxxx\Documents epc-exchange.xxxxxxx.lab
Path PSComputerName
---- --------------
C:\Users\spp\Documents epc-exchange.xxxxxxx.lab
WSManConfig: Microsoft.WSMan.Management\WSMan::localhost\Client
wsmid : http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd
ProtocolVersion : http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor : Microsoft Corporation
ProductVersion : OS: 0.0.0 SP: 0.0 Stack: 3.0
wsmid : http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd
ProtocolVersion : http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor : Microsoft Corporation
ProductVersion : OS: 0.0.0 SP: 0.0 Stack: 3.0
cfg : http://schemas.microsoft.com/wbem/wsman/1/config/service/auth
lang : en-US
Basic : false
Kerberos : true
Negotiate : true
Certificate : false
CredSSP : true
CbtHardeningLevel : Relaxed
Path PSComputerName
---- --------------
C:\Users\spp\Documents windows10.xxxxxxx.lab
Path PSComputerName
---- --------------
C:\Users\Administrator\Documents windows10.xxxxxxx.lab
Use the same credentials as used by Spectrum Protect Plus GUI. Select Manage
Protection → Databases → Exchange → Backup → Manage Application Servers →
Add Application Server.
3. Test the connection to the Application Server. Select Application Server node and then,
click the Test Connection tab.
From this output, consider the information about CredSSP, which indicates that the
configuration is successful and a connection is possible.
4. Click OK to close the Manage Computers window.
To configure an exchange server in IBM Spectrum Protect Plus, start the IBM Spectrum
Protect Plus Server GUI and log in to the dashboard.
Figure 12-5 shows how to add or edit an Application Server. The Host address can be the
Server name or IP address. The User ID must be entered for the first Exchange Server with
the domain or user ID and password. For any other Application Servers, the same user ID can
be used by selecting the Use existing user option and then, selecting it from the drop-down
menu.
The Maximum concurrent database number (default: 10) is used to reduce or raise the
number of mailbox databases that are backed up concurrently. In production environments,
the default of 10 is a good starting point and is raised incrementally only to avoid overloading
the Microsoft Exchange Server.
After the Application Server is registered, the Mailbox databases on the server can be
browsed and SLAs can be assigned.
The Run Inventory button can be used to immediately query the Microsoft Exchange Server
for a list of databases and their status. The list also indicates whether the Mailbox database is
using circular logging or not. Databases with disabled circular logging are flagged with Yes in
the Eligible for Log backup column. Databases can also be filtered by using the Search box or
the view can be switched from Standalone/Failover Cluster to a list of DAG enabled Mailbox
databases.
To configure the protection of DAG-enabled Mailbox databases, the view must be changed to
“Database Availability Groups”.
By default, the backup is performed on the active copy, which might interfere with the
Exchange user workload. To switch the protection to a passive copy in Options, select the
Backup preferred node. This option can be pointed to the Exchange Mailbox Server with the
lowest activation preference. This setting ensures that the backup is performed on the
passive copy, which is the last copy to take over the Active copy role in the cluster.
Generally, it is preferred to create dedicated SLA policies for single databases or for groups of
logically related databases.
For more information about SLA policies, see 1.3, “SLA backup policies” on page 19.
Select an Exchange instance to back up all the data in that instance. Optionally, you can click
an instance name and then, select individual databases that you want to back up.
Three choices are available: Run, Select an SLA policy, and Select options, as shown in
Figure 12-9.
Gold is the most frequent with the shortest retention rate. You can also create a custom SLA
policy or edit a policy, as we did by selecting the Exchange_Silver SLA policy, as shown in
Figure 12-10. Click Save to confirm your choice.
Now, the SLA selection can be verified and options can be defined for the scheduled backup
job by clicking Select Options, as shown in Figure 12-11.
Configure the SLA policy by clicking the icon in the Policy Options column of the SLA Policy
Status table, as shown in Figure 12-13.
To run the policy outside of the scheduled job, select the instance or database and then, click
Actions → Start.
The status changes to Running for your chosen SLA. To pause the schedule, click Actions →
Pause Schedule. To cancel a job after it starts, click Actions → Cancel (see Figure 12-15).
2. You are presented with a choice for Ad hoc backup or Restore. Select Ad hoc backup
(see Figure 12-17).
4. Select a predefined SLA policy. After clicking the SLA policy, the defined values for that
policy are shown (see Figure 12-19).
5. Select the database to back up. If many databases are available, use the search function
to easily find the wanted database. Now, the database can be added to the backup job list
by clicking the blue plus sign (+), as shown in Figure 12-20.
7. As shown in Figure 12-22, a message is displayed to confirm that the job was submitted.
Click OK to close the message.
The Ad hoc backup job can be monitored under the Jobs and Operations pane, as
shown in Figure 12-23.
Two options are available to restore Microsoft Exchange data. It is possible to recover a
complete Exchange Database into any database or Recovery Database (RDB) or to recover
individual items, such as mailboxes or individual emails.
In both cases, you find the entry point for the procedure in the Jobs and Operations panel or
the Manage Protection panel, as shown in Figure 12-24.
To create the restore job, select Create Job in the Manage Protection - Exchange menu.
Then, select Restore, as shown in Figure 12-25.
– On-Demand Point-in-Time
In this case, the available restore location sites are: Demo, Primary, and Secondary
(see Figure 12-29).
3. For our scenario, we select On-Demand: Snapshot. After selecting one of the available
backups, click Next. You are presented with the next step, which is to select amongst two
restore methods: Complete Restore or Item Recovery.
In our example, we proceed with the restore into production, as can be the case in a situation
where the source database is corrupted and must be replaced.
After clicking Next, set the destination and choose restore into the original instance, as shown
in Figure 12-33.
By clicking Next, other job options are available that are necessary for the recovery. The
choice here is: No Recovery or Recover until end of backup.
The options Recover until end of available logs and Recover until specific point-in-time
are not available for this type of restore because no log backups are available.
Click Next to proceed. The last panel displays a summary for review, as shown in
Figure 12-35. Click Submit to start the restore job.
After completion, the job information is moved into the Job History window, as shown in
Figure 12-37.
Refer to the prerequisites, described in 12.2.1, “Granular restore remote package installation”
on page 332.
In both cases, the restore procedure is started as described in 12.5, “Restore jobs” on
page 349.
This type of restore uses a Recovery Database (in our case, MDB1.RDB). The rest of the
procedure is similar to what is described in 12.5.1, “Complete Restore” in successively setting
destination and job options and then submitting the job.
After the restore job is started, it can be monitored in the Jobs and Operations panel.
The recovery database is created and the snapshot is mounted as Recovery Database
(RDB). An excerpt from the job login Example 12-3 shows the steps that are performed.
Clicking the information icon (as indicated by the arrow in Figure 12-39) in the Type column
provides more information about how to start the IBM Spectrum Protect Plus MMC GUI. This
GUI is automatically installed during the restore procedure on the Exchange server (see
Figure 12-40).
Figure 12-40 Information how to start the IBM Spectrum Protect MMC GUI
You must decide which target to use to proceed with the item recovery: install the MMC GUI in
combination with Outlook 2016 on the Exchange Server or run it on a separate server.
4. Click Wizards and the configuration option IBM Spectrum Protect Plus configuration is
shown. Click Start to run the wizard. The result should display failed: 0, as shown in
Figure 12-43.
5. Click Next and the wizard proceed and completes the process.
The warning about VSS Provider Check can safely be ignored because no IBM VSS
Hardware Provider is installed and it is not necessary when restoring from IBM Spectrum
Protect Plus.
9. The Recovery Database (RDB) opens, but no mailbox is selected. The mailboxes appear
as closed. Proceed with the recovery by selecting the Mailbox Restore Browser view, as
shown in Figure 12-46.
By clicking the mailbox icon (in our example, SPP), the mailbox is populated and the items
are provided for recovery. This process can take some time.
In the Actions column on the right side of the display, the choices for the recovery are
listed. The column is divided into Folder Actions and Message Actions sections. We can
recover folders or single messages.
11.Click the Restore Messages to Original Mailbox entry. The restore from the Recovery
Database (RDB) goes done into the active database. The restore progress and the result
are displayed in a separate window, as shown in Figure 12-48.
Item Recovery restore job also can be stopped is in Jobs and Operations → Active
Resources by clicking the three vertical dots and selecting Cancel job, as shown in
Figure 12-50.
The Job History Job Logs includes the detailed log of the cleanup procedure and is confirmed
with a success message, as shown in Figure 12-51.
The Exchange server must be added as a managed computer so that it appears in the
Group → Dashboard view, as shown in Figure 12-52.
After expanding the Protect and Recover Data entry, the Mailbox Restore Browser shows the
available mailbox items in Recovery Database (RDB) that are connected to the Exchange
Server and provided through the PowerShell communication.
The recovery procedure on a remote system is identical to the recovery procedure on the
Exchange Server, as described in “Item Recovery by using an Exchange Server” on
page 357.
This chapter explains how to effectively protect Microsoft 365 data by using IBM Spectrum
Protect Plus.
Product name update: Microsoft Corporation announced new product names, effective
21 April 2020, for its Office 365 offerings for small and medium businesses. With this
announcement, all small and medium business plans transitioned to the new Microsoft 365
brand.
In IBM Spectrum Protect Plus V10.1.6, the user interface and documentation use the
original product name, Office 365. For more information, see this Microsoft 365 blog entry.
Figure 13-1 Protecting Microsoft 365 with IBM Spectrum Protect Plus
For more information about the IBM Spectrum Protect Plus components that are shown in
Figure 13-1, see Chapter 1, “IBM Spectrum Protect Plus product architecture and
components” on page 1.
13.2 Prerequisites
To protect Microsoft 365 application with IBM Spectrum Protect Plus, you must register the
application with Azure Active Directory and grant appropriate access permissions. An active
Microsoft 365 subscription and a Microsoft 365 administrative userID are also required.
Figure 13-2 shows the supported subscriptions in the Global Microsoft 365 Regions.
Figure 13-2 Coverage matrix for application levels supported by IBM Spectrum Protect Plus
The registration process is described in 13.2.2, Microsoft 365 application registration and
API permissions on page 368.
The management of cloud data also requires a proxy host server that must be installed
separately. For more information, see 13.2.1, Proxy host server on page 367.
As shown in Figure 13-1 on page 366, the proxy host server must run on a dedicated virtual
or physical server and a Linux based operating system.
Supported operating systems are Red Hat or CentOS 7.X based Linux systems. Installation
can be performed on a physical or virtual machine.
The same packages must be installed on the proxy host server, including the following
examples:
Java 8
Libicu
NFS client
Depending on the Linux distribution and edition, these packages are preinstalled or can easily
be added by using the corresponding package manager. For more information, see the
operating system’s manual.
For more information about all of the requirements and open network ports, see IBM
Knowledge Center.
3. Enter a descriptive name for the new App registration and ensure that the supported
account type is set to the wanted organization directory, as shown in Figure 13-5 on
page 369.
Note: Real names, IDs, and IP addresses are blanked out in the figures for
confidentiality reasons.
After completing this page, the Application (client) ID, Directory (tenant) ID, and Object ID
are shown. These IDs are used by IBM Spectrum Protect Plus to connect and
authenticate to Microsoft 365 services (see Figure 13-6).
4. After creating the App registration, a Client secret must be generated. Select Manage →
Certificates & Secrets? → New Client Secret, as shown in Figure 13-7.
6. After completing the App registration, grant the API permissions as listed in Table 13-1. S
Enter the credentials that were obtained from Azure Active Directory page, as shown in
Figure 13-10.
For the Proxy properties (see Figure 13-11), enter the host address or DNS name and user
ID of the predefined Application Server, as described in 13.2.1, “Proxy host server”.
Also, the maximum number of concurrent sessions (Microsoft 365 accounts) can be set. The
default is 10, as shown in Figure 13-12.
After clicking Save, IBM Spectrum Protect Plus verifies the settings and registers the
application server.
If the verification was successful, the message that is shown in Figure 13-13 is displayed.
An SLA can be assigned at different organization levels of the Microsoft 365 account:
Calendars
Contacts
Mailbox
OneDrive
Other than the possibility to run simple restore requests within Microsoft 365 by relying on
certain recycle bins, no protection is available for other scenarios, such as the following
example:
Corruption or encryption of user data by malicious software
Preserving deleted user data over default deletion period
Erroneous or deliberate manipulation of data
These risks must be addressed by the customer. The use of IBM Spectrum Protect Plus
provides protection against any type of potential data loss by allowing Microsoft 365 data to
be backed up in a different and independent location and for long-term retention.
Integrating IBM Spectrum Protect or Object Storage into your Microsoft 365 protection
strategy helps to provide more restore points on lower-cost storage and with lower total cost
of ownership (TCO).
Figure 13-16 Sample Microsoft 365 accounts (real names are redacted)
When selecting a single mail address, the drill-down scope can be changed to Calendars,
Contacts, Mailbox, and OneDrive (see Figure 13-17).
A best practice is to assign an SLA that contains the general requirements of the organization
at the Organization level. This SLA is inherited by all underlying accounts and items. For any
accounts that feature special SLA requirements, an exception can be made at the wanted
level.
Also, in the toggle box that is shown in Figure 13-18, accounts can be filtered to show only
accounts that are not in an SLA or in any defined SLA.
Inside the Accounts, specific Items can be added to Restore by clicking the plus sign (+)
button, as shown in Figure 13-22.
Instead of selecting items manually, the Search box can be used to find specific accounts
or items.
4. Selecting the wanted items and click Next. A Snapshot type and destination must be
configured. The Type of Restore is On-demand Snapshot and the selection of Location
Type and Location depends on the vSnap server configuration and Sites, as shown in
Figure 13-23.
6. Highlight the snapshot to restore by clicking Backup in the Available column. To proceed
to the Restore destination window, click Next.
Here, you also can define whether the Restore is performed into the original account or in
any other account in the same organization.
The Restore Path is optional and can be any subfolder (if the subfolder does not exist, it is
created) inside the defined Microsoft 365 account. A slash is used to separate between
folder and subfolders, as shown in example Figure 11-23.
The Microsoft 365 function uses data protection for mailboxes that are hosted in Microsoft
Azure. Therefore, a combination of two solutions can be used to protect the complete
Exchange Hybrid Environment.
However, mailboxes that are moving from on-premises Exchange to Microsoft Azure and vice
versa must be tracked.
Kubernetes (commonly stylized as k8s) is an open source container orchestration system for
automating application deployment, scaling, and management. If you compare Kubernetes
with the vCenter Server, it unifies resources from individual hosts that are sharing them
among the entire cluster. It unifies resources by managing the assignment of VMs to the
hosts and the allocation of resources to the VMs within a specific host that is based on the
policies that the system administrator sets.
The critical distinction between containers and VMs is that VMs share the hardware, but each
VM has an independent but isolated operating system instance. Containers share the core
operating system (kernel), but individual applications running on it are separated and
unaware of each other.
Figure 14-1 on page 384 shows how the three deployment models characteristics differ.
Traditional deployment workloads examples include physical and bare metal deployments,
files, databases, and applications. The virtualized deployment consists of multiple VMs, each
with a separate operating system on a single physical server’s CPU cores. The
container-based deployment, allows multiple applications to be within the same operating
system but with their own independent sets of libraries and isolated storage and networking.
Within Kubernetes, nodes are the underlying machines that run the containers. Nodes can
have one or more roles, and the two most common roles are worker nodes and master nodes.
Master nodes run the command and control components of Kubernetes that provide the
orchestration and intelligence. Worker nodes are responsible for running the containers.
Comparing Kubernetes to VMware, the master nodes provide functions that are similar to
what is found in the vCenter or vCloud director; worker nodes are analogous to ESXi servers.
The most straightforward construct for the containers is a pod. A pod contains one or more
containers. Real-world workloads often use higher-level constructs, such as daemon sets,
stateful sets, and deployments. These constructs define aspects of the environment, such as:
How many copies of a POD are running.
Their placement relative to each other.
Exposing the pods in the network.
How they use storage.
The distinctions between the nodes are beyond the scope of this document. Although a
like-for-like construct is not available within traditional VMware, thinking of these as a vApp is
a starting point.
Pods that are running in Kubernetes are stateless by default. Being stateless means that
when restarted, data that is generated during the previous run is not accessible. No direct
equivalent is available to this behavior in VMware. Persistent data volumes in Kubernetes
solve this problem and can originate from several underlying storage technologies, such as
the following examples:
AWS Elastic Block Storage
Azure Volume
vSphere Volume
NFS
iSCSI
CephRBD
Portworx
Many container images are stateless, meaning they do not need to retain any data between
runs. The image includes the code that is necessary to operate along with any libraries that
are needed or other components. Kubernetes passes along configuration items through
constructs, such as config maps and secrets. The Kubernetes metadata database stores and
secures those items and expects them to be reasonably sized.
Some applications, however, require data to be retained across multiple runs or restarts of the
container. A classic example is a relational database. Redeploying an empty database is of
no use if the data is gone. To handle this issue, Kubernetes introduces the idea of persistent
data volumes that can be attached to stateful containers. These attachments are known as
claims.
Kubernetes inherently offers various capabilities to make applications resilient, whether they
are stateless or stateful. It monitors running groups of containers (pods) and ensures that the
requested number of copies of are running always. It can also move them around between
the physical worker nodes that are running the containers. If a worker node fails, this behavior
protects against routine hardware failures. The underlying infrastructure design drives the
availability of the container image registry and persistent data.
Although this behavior helps protect against infrastructure failure by providing redundancy, it
does not provide resiliency. It is not possible to return to a known good state to deal with
human error, ransomware, or other higher-level modes of failure. Production-ready resiliency
that is equivalent to that resiliency that is found in systems requires an external data
protection approach.
Jane is the Kubernetes administrator who must ensure that her workloads are up and
running. Jose is the backup administrator, and he is ultimately responsible for ensuring
protecting the data across the company. Because the organization uses many data types and
platforms, Jose needs a single centralized way of viewing and interacting with the data
protection capabilities rather than dealing with a half dozen different point solutions.
Jane focuses on all aspects of container management, including protection, and her method
of administration is by way of the kubectl CLI. Fortunately, IBM Spectrum Protect Plus
accommodates both with a self-service approach in which Jane manages and performs data
protection operations through native kubectl commands that operate on YAML files or by
using the IBM Spectrum Protect Plus RBAC enabled web interface.
IBM Spectrum Protect Plus focuses on protecting persistent data within Kubernetes
environments. Unlike stateless containers or images, persistent data cannot be redeployed if
it is lost because it is lost forever. As with other data types, it is essential to ensure that the
data is not only captured, but is usable. To accomplish this goal, IBM Spectrum Protect Plus
integrates with the CSI API layer of Kubernetes.
By using this layer, IBM Spectrum Protect Plus makes API calls to create a point-in-time
consistent snapshot of the CSI volume. It then can mount the snapshot on an alternative
container (known as a Data Mover) that is part of IBM Spectrum Protect Plus and transfer the
data to the vSnap server for storage along with the other backup types.
IBM Spectrum Protect Plus uses the CSI to start and persist snapshots for Kubernetes PVC
by using Ceph block storage in version 10.1.5 and 10.1.6. An application developer uses the
native Kubernetes command line (kubectl) to perform this function in a self-service manner
and can create Kubernetes-aware backup scheduling automation.
The backup Service Level Agreements (SLAs), also known as backup policies in IBM
Spectrum Protect Plus, provide control for scheduling, snapshot retention, and copy to vSnap
server. If the original volume is damaged or lost, the snapshot or copy backups on the vSnap
servers can facilitate recovery. Figure 14-2 shows how Kubernetes' Backup Support is
deployed in the Kubernetes environment and interacts with IBM Spectrum Protect Plus.
An operator governs the IBM Spectrum Protect Plus components that are installed within
Kubernetes. It, in turn, manages several deployments in a microservices architecture (see
Figure 14-3).
For more information about prerequisites, including a list of supported operating systems,
Kubernetes versions, and CSI drivers, see IBM Knowledge Center.
The use of the Helm-based approach requires creating a pull secret. Pull secrets are used by
registries, such as the IBM registry, to ensure that the request to pull-down a container image
is coming from an entitled user.
The offline method is also registry-based. Rather than pulling the images down from the IBM
public registry, it instead pushes them first from the downloaded package into the private
registry that is used by Kubernetes. The installer must know about your private Docker
registry so it can push the container images for the IBM Spectrum Protect Plus product to it.
Then, the Helm charts are used but point to the private registry instead.
Note: Separate installers are used for each approach. Attempting to use the offline
installer with the IBM registry results in the installer attempting to push to it rather than pull
from it and fail.
Although the installer can run from any Linux machine, it expects the following components to
be in place:
Kubectl: Kubectl is the Kubernetes command-line management tool. It must be installed
and configured to communicate with the cluster IBM Spectrum Protect Plus is configured
to protect.
Helm: Helm is a Kubernetes tool for automation software installation. It requires
initialization to work with a specific cluster.
Docker: Docker must be installed and the Docker service must be running to facilitate
offline installations, even when a containerization engine other than Docker is used.
This script deploys a specific version of the Helm client from the v2 family, which can be older
than the version of Helm that is used in the environment. Helm v3 represents a substantial
change; the v3 family no longer uses tiller on the cluster.
Although the Helm setup script that is provided by IBM Spectrum Protect Plus attempts to
configure RBAC for Helm correctly by creating a service account for the tiller deployment and
a clusterrolebinding, it does not force the redeployment of tiller if it is running on the cluster.
After running the script, use a basic command, such as helm is to confirm that the Helm
client is functioning correctly. If errors occur, you might need to debug the RBAC configuration
for the running tiller instance or use Helm reset to remove the configuration, followed by
rerunning the SPP provided script. The script expects the tiller deployment to be running as a
service account. You can confirm this configuration by checking the deployment YAML by
running the following command:
kubectl --namespace kube-system get deploy tiller-deploy -o yaml
...
serviceAccount: tiller
serviceAccountName: tiller
....
In early versions of 10.1.6, the helm_install_k8s.sh script leaves behind the Helm and tiller
binaries in a subdirectory that is named linux-amd64 in whatever directory from where you
ran the script. If you ran the script from a directory that is part of the installer structure, it must
be removed before proceeding to avoid an error during the installation. Failure to remove it or
run it from a directory outside the installation path results in installations failing with the
following message:
Error: grpc: received message larger than max (81905241 vs. 20971520)
Also, the installer includes a connectivity test capability. It attempts to connect from wherever
it is running to the IBM Spectrum Protect Plus server, even if it is running outside the cluster.
For more information about how to enable an alpha feature in Kubernetes 1.16 see, IBM
Knowledge Center.
If the Metrics Server does not return data, the number of data movers that are used for
backup operations is limited, which might negatively affect performance; therefore, it is
recommended to have the Metrics Server correctly configured in the Kubernetes cluster.
For more information about how to validate and enable the Metrics Server see, IBM
Knowledge Center.
# ---------------------------------------------
# GLOBAL BAAS CREDENTIALS
# ---------------------------------------------
BAAS_ADMIN="isppadmin"
# PRODUCT ACCOUNT PASSWORD (leave empty "" to be prompted for it)
BAAS_PASSWORD=""
# ---------------------------------------------
# PRODUCT LICENSE CHECK
# ---------------------------------------------
LICENSE="ACCEPTED"
# ---------------------------------------------
# IBM SPECTRUM PROTECT PLUS (SPP) CONFIGURATION
# ---------------------------------------------
SPP_IP_ADDRESSES="10.0.240.222"
SPP_PORT="443"
# ---------------------------------------------
# NETWORKPOLICY CONFIGURATION OPTIONS
# ---------------------------------------------
CLUSTER_CIDR="192.168.0.0/16"
CLUSTER_API_SERVER_IP_ADDRESS="10.0.240.150"
CLUSTER_API_SERVER_PORT="6443"
CLUSTER_NAME="Prague-K8s-Cluster"
# ---------------------------------------------
# PRODUCT DEPLOYMENT AND CONFIGURATION OPTIONS
# ---------------------------------------------
PRODUCT_NAMESPACE="baas"
OPERATOR_NAMESPACE="default"
PRODUCT_TARGET_PLATFORM="K8S"
PRODUCT_LOCALIZATION="en_US"
PRODUCT_LOGLEVEL="INFO"
# ----------------------
# PRODUCT IMAGE REGISTRY
# ----------------------
PRODUCT_IMAGE_REGISTRY="10.0.240.150:5000"
PRODUCT_IMAGE_REGISTRY_NAMESPACE="baas"
PRODUCT_IMAGE_REGISTRY_SECRET_NAME=""
------------------------[CONFIRMATION REQUIRED]------------------------
Would you like to verify the connectivity to IBM Spectrum Protect Plus server?
Please enter 'yes' to continue: yes
-----------------------------------------------------------------------
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 2983 0 2983 0 0 4598 0 --:--:-- --:--:-- --:--:-- 4596
Successfully verified connectivity to IBM Spectrum Protect Plus server
10.0.240.222
Created namespace >>baas<< for product secrets.
secret/baas-secret created
### Starting installation of product release baas version 10.1.6 at Wed Jul 29
12:13:31 CEST 2020 ###
------------------------[CONFIRMATION REQUIRED]------------------------
Please confirm to continue with installation to target cluster
>>kubernetes-admin@kubernetes<<:
Please enter 'yes' to continue: yes
-----------------------------------------------------------------------
Using existing namespace >>baas<< for product deployment.
NOTES:
-----------------------------------------------------------
Product: IBM Spectrum Protect Plus Kubernetes Backup Support
-----------------------------------------------------------
During the installation process, the Kubernetes Backup Support automatically registers to the
IBM Spectrum Protect master server. You can validate this registration by accessing the GUI
and selecting Manage Protection → Containers → Kubernetes.
If an error occurs within the automatic registration, the Kubernetes cluster can be registered
manually by using the IBM Spectrum Protect Plus application. This process is performed from
within the IBM Spectrum Protect GUI by selecting Manage Protection → Containers →
Kubernetes → Manage Clusters. It requires the user to enter the following information:
The cluster name: This name must match the value in the baas_config.cfg file that is
used for installing the Kubernetes side IBM Spectrum Protect Plus components. Although
it can be an IP, the use of a meaningful name is recommended.
Host address: This address is the address of the Kubernetes master service. In production
environments with multiple masters, this address is represented by a service or load
balancer.
Port number: This port is used to connect to the IBM Spectrum Protect Plus agent within
Kubernetes. It can be obtained by running the kubectl get service -n baas | grep
baas-spp-agent command.
User ID: This ID is not a traditional user name; rather, it is generated by the IBM Spectrum
Protect Plus Kubernetes installer and stored as a secret within Kubernetes. It can be
obtained by running the following command:
echo "`kubectl get secret baas-secret -n baas -o yaml | /bin/grep datamoveruser
| cut -d: -f2 | tr -d ' ' | base64 -d`"
Because this ID appears cryptic, an identity must be created for it by using a meaningful
name. This process can be done in the GUI by selecting Accounts → Identity.
Password: As with the user ID, this information is generated by the installer within
Kubernetes. It can be obtained by running the following command:
echo "`kubectl get secret baas-secret -n baas -o yaml | /bin/grep
datamoverpassword | cut -d: -f2 | tr -d ' ' | base64 -d`"
You can now browse through the namespaces and see individual persistent volumes, as
shown in Figure 14-6.
In addition, store backups within IBM Spectrum Protect Plus vSnap server repositories for
longer-term and lower-cost protection. Having an extra copy in a vSnap server also protects
against primary storage issues that affect production volumes and snapshots.
Figure 14-7 shows an example SLA for Kubernetes Backup Support. It creates CSI
snapshots every 6 hours and retains them for one day. It mounts the latest snapshot to a data
mover once per day and copies it to a vSnap in the “Primary” site. The retention of data in the
vSnap server is three days in this example.
Defining an SLA is only part of the picture. Within IBM Spectrum Protect Plus, an
administrator must discover data and bind it to an SLA for data protection operations, such as
snapshots and backup copies to occur. In the case of Kubernetes, the following methods are
available for declaring which persistent volumes to protect:
Everything in the cluster: As the name suggests, this option protects all volumes. However,
use it with caution in cases where multiple storage classes are in use and some of them
cannot perform CSI snapshots.
Namespace level backups: This option backs up all persistent volumes within a specific
namespace by using the indicated SLA.
Label-based backups: This method backs up all persistent volume claims with a specified
label that is attached to them. The label is on the claim rather than the pod or deployment.
PVC names: This method allows the user to specify a static list of PVCs to protect.
Note: During the initial installation instructions, the installation instructions specify to
register a pull secret in each namespace that requires protection so that Kubernetes can
pull the image from the registry. When developers or DevOps engineers create
namespaces, they must complete this procedure for the new namespaces as well or
backups fail.
Select one or more volumes and assign an SLA in the same way as you assign an SLA to any
other workload, such as a VM or application.
Figure 14-10 shows a PVC demo-pvc in namespace demo, which was assigned to SLA
Container-6h-1d.
Example 14-3 shows how a Kubernetes administrator can assign SLA Container-6h-1d to
PVC demo-pvc by using kubectl and a YAML file.
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: demo-pvc
namespace: demo
spec:
requesttype: backup
sla: Container-6h-1d
encryption: no
volumesnapshotclass: csi-rbdplugin-snapclass
[root@prague-k8-master spp]# kubectl apply -f demo-pvc-backup.yaml
Because many of these containers might rely on persistent data that is stored in different
persistent volumes, it makes sense to assign all of these volumes to the same SLA to ensure
that data is protected at the same point-in-time and that it is retained for the same amount of
days.
Labels: In addition to assigning SLAs to single PVCs, IBM Spectrum Protect Plus can
assign a SLA to a set of PVCs based on a label.
In the native command line, backup requests are created by applying a YAML file. In this
example, we must change the request type from Backup to BackupLabel or alternatively to
BackupNamespace.
After the SLA is assigned, the backups are automatically scheduled or can be triggered by
manually starting the corresponding SLA.
Figure 14-11 Restore PVC backup from vSnap server copy to new volume
Example 14-5 shows the new target volume and the temporary data mover.
Example 14-5 Show restore target volume and temporary data mover
[root@prague-k8-master ~]# kubectl get pvc -n demo
NAME STATUS VOLUME CAPACITY ACCESS MODES
demo-pvc Bound pvc-1f122c61-6396-4b51-9cc7-862cf5770522 1Gi RWO
demo-pvc-restored-from-vsnap Bound pvc-86eaf822-a1df-4206-948f-6f8e1257039a 1Gi RWO
When the restore is completed, the Kubernetes administrator can decide how to continue; for
example, mount the new volume to a pod or container.
For more information about how to restore data by using the UI, see IBM Knowledge Center.
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: name_of_restore_request
namespace: namespace
spec:
requesttype: restore
pvcname: pvc_name
targetvolume: target_volume_for_restore
storageclass: storage_class_of_target_volume
restorepoint: timestamp_of_backup
restoretype: fast | copy
In addition to the original and target name of the PVC, you also must specify the timestamp of
the backup image that you want to restore. A list of available backup images can be
determined by using the kubectl describe baasreq command, as shown in Example 14-4 on
page 402.
For more information about how to restore data by using the native command line, see IBM
Knowledge Center.
This chapter discusses different approaches to increase the level of protection of backup data
by replicating data or creating additional copies.
Important: None of the techniques that are discussed in this chapter are moving or
migrating data from one storage tier to another. All methods that are described are
establishing extra copies. However, different lifecycles can be applied to each copy, which
keeps “hot data” on a fast storage while placing “cold data” on a slower, low-cost storage.
Redundant Array of Independent Disks (RAID) technology can be used to protect vSnap
servers against data loss that is caused by a hardware failure of a single disk - either by using
software RAID inside the vSnap or by using hardware or software features of the underlying
storage system that provides the capacity to the vSnap pool.
However, there might be reasons to create additional copies of backup data, for instance, to
be able to recover from a disaster or to store long-term data on lower-cost storage.
Replication of data between vSnap servers can be done for various reasons, including the
following examples:
Protecting the backup data against the complete loss of a vSnap system.
Protecting the backup data against the loss of a whole data center (assuming that the
replication target is in a remote data center).
Storing a copy of data in a remote site with a longer retention when not enough space
exists in the primary site; for example, replicating data from small branch offices to a large
central data center.
Migration of a vSnap system.
Note: As an option, additional copies can be created from the replication target vSnap. An
example includes replicating backup data daily from a vSnap in a small branch office to a
remote vSnap in a central data center and from there, creating a full copy to an Object
Storage or to a IBM Spectrum Protect server tape pool monthly.
For more information about how to configure IBM Spectrum Protect Plus for the creation of
additional full and incremental copies to an IBM Spectrum Protect server, see 15.6, “Creating
incremental and full copies of backup data to an IBM Spectrum Protect server” on page 448.
By assigning a virtual machine (VM) or an application to more than one SLA backups can be
created of the same entity in two different locations (sites) and at different points in time.
However, in this case, it is no longer a copy because additional vSnaps are used for more
frequent backups. The key difference is the fact that the primary data is being backed up
twice, which results in two independent “primary” backup versions of the same VM or
application.
Important: Increasing the backup frequency adds load to the hypervisor (for example,
VMware snapshots must be created more often) or to the application (for example,
because it is set to back up mode more often). Because of network latency, additional
backups to a distant site might experience slower performance and cannot benefit from
compression because it is being used when replicating backup data between two vSnap
servers.
The following table summarizes the different options and their characteristics:
Table 15-1 Comparison of different options to create additional copies of backup data
Copy Option Access to Long-term Air Gap Cost Comment
data Readiness
The replication target (receiving) vSnap server must belong to a different site than the source
(sending) vSnap server. For more information about the relationship and options of sites and
vSnap servers for replication, see the chapter Replication considerations in the IBM Spectrum
Protect Plus Blueprints.
In addition, the following configuration tasks must be completed to enable replication between
vSnap servers:
A replication partnership is configured between all vSnap servers.
The replication policy is configured as part of the SLA.
2. Click the plus sign that is below the Configure Storage Partners section and choose the
partner server from the pull-down menu. Now, click Add Partner to establish the
partnership, as shown in Figure 15-2.
Figure 15-2 Add vSnap server as storage partner in the vSnap server properties page
After the partner is added, it is listed as a storage partner with information about the site
that contains the partner vSnap server, as shown in Figure 15-3.
In Example 15-1, we run the vSnap CLI command vsnap partner show to list the vSnap
partner server.
Example 15-1 List vSnap partner server on the Primary site vSnap
[serveradmin@t4-spp-vsnap ~]$ vsnap partner show
ID | PARTNER TYPE | MGMT ADDRESS | API PORT | SSH PORT
---------------------------------------------------------------------------------------
4b34983b741447a6a41a96a62525cf87 | vsnap | t4-spp-vsnap-dr | 8900 | 22
3. Run the same command that is shown in Example 15-2 on the second vSnap server for
the Secondary site, which lists also the partner vSnap server.
Example 15-2 List vSnap partner server on the Secondary site vSnap
[serveradmin@t4-spp-vsnap-dr home]$ vsnap partner show
Replication partnership between both vSnap servers is now configured and can be used by
an SLA in both directions.
2. The Replication Policy section is not enabled by default. Select the Backup Storage
Replication option, adjust the Start Time as required and choose Secondary as the
Target Site, as shown in Figure 15-4. Click Save to save your changes.
Note: If more than one vSnap server was selected as a target for replication, the
replication process chooses the server with the most free space.
For more information about vSnap storage utilization, select Reports and Logs →
Reports → vSnap Storage Utilization Report → as shown in Figure 15-8.
For example, you can generate one report to obtain vSnap Storage Utilization with Replica
Destination Volumes with the including option, as shown in Figure 15-9 on page 415, and
another report with Replica Destination Volumes with the excluding option, as shown in
Figure 15-10 on page 415. Then, the results can be compared.
Figure 15-10 vSnap Storage Utilization with Replica Destination Volumes excluding, vSnap-dr at 4%
In this case, the result of the comparison is that space that is replicated on the Target vSnap
is 18% of the total vSnap disk space.
Example 15-3 shows these steps in detail. The replication job creates a target volume (ID 3)
on the target vSnap server t4-spp-vsnap-dr. The vSnap CLI command vsnap volume show is
listing it.
Example 15-3 Replication target volume is created on the target vSnap server
[serveradmin@t4-spp-vsnap-dr home]$ vsnap volume show
ID | TYPE | POOL | IS CLONE | TOTAL | FREE | USED | NAME | TAGS
-------------------------------------------------------------------------------------------------------------------
1 | filesystem | 1 | No | 99.99GB | 96.34GB | 24.00KB | vsnap_metadata_cloud | N/A
2 | lun | 1 | No | 2.00TB | 2.00TB | 14.30MB | spp_1728a608d05_spp_1004_2002_1727A158CDC | N/A
3 | filesystem | 1 | No | 99.99GB | 96.34GB | 635.00KB | spp_1728a60a7e4_spp_1004_2002_1727A13274D | N/A
In the next step, the replication relationship between both volumes is configured on both
vSnap servers. The vSnap CLI command vsnap relationship show displays these
relationships, as shown in Example 15-4, for the source vSnap server t4-spp-vsnap and in
Example 15-5 for the target vSnap server t4-spp-vsnap-dr.
ID: df31519488e093914295b620d6cf3254
PARTNER ID: 4b34983b741447a6a41a96a62525cf87
PARTNER TYPE: vsnap
PARTNER ADDR: t4-spp-vsnap-dr
LOCAL ROLE: primary
LOCAL POOL ID: 1
LOCAL VOL ID: 3
LOCAL VOL NAME: spp_1004_2002_1727A158CDC
REMOTE POOL ID: 1
REMOTE VOL ID: 2
REMOTE VOL NAME: spp_1728a608d05_spp_1004_2002_1727A158CDC
LAST SYNC STATUS: COMPLETED
LAST SYCNED SNAP ID: 57
LAST ATTEMPT SNAP ID: 57
CREATED: 2020-06-06 16:04:45 UTC
UPDATED: 2020-06-06 16:04:45 UTC
The parameters Partner Address, Local Volume ID, Local Volume Name, Remote Volume ID
and Remote Volume Name are used to identify which vSnap servers and volumes are used
for this relationship.
When the replication is running, a session is created for the replication on the source vSnap
server. In Example 15-7 the command vsnap session show lists the replication session on the
source server t4-spp-vsnap. The status field indicates whether it is an Active session or a
Completed session.
ID: 106
RELATIONSHIP ID: b3b0d887744e23aec938528f00d2a546
PARTNER ID: N/A
PARTNER TYPE: vsnap
REPL ADDRESS: 10.0.250.43
LOCAL SNAP ID: 44
LOCAL SNAP NAME: spp_1010_2001_6_172bbbaee99
REMOTE SNAP ID: 59
REMOTE SNAP NAME: spp_1010_2102_172d162ecbd_Silver
PRIORITY: 50
STATUS: ACTIVE
CANCELLED: No
SENT: 2.93GB
QUEUED: 2020-06-20 10:59:20 UTC
STARTED: 2020-06-20 10:59:22 UTC
ENDED: N/A
MESSAGE: Transferred 2.93GB of 17.34GB; 17% complete; Average throughput 100.06MB/s
ID: 106
RELATIONSHIP ID: b3b0d887744e23aec938528f00d2a546
PARTNER ID: N/A
PARTNER TYPE: vsnap
REPL ADDRESS: 10.0.250.43
LOCAL SNAP ID: 44
LOCAL SNAP NAME: spp_1010_2001_6_172bbbaee99
REMOTE SNAP ID: 59
REMOTE SNAP NAME: spp_1010_2102_172d162ecbd_Silver
PRIORITY: 50
STATUS: COMPLETED
CANCELLED: No
SENT: 17.37GB
QUEUED: 2020-06-20 10:59:20 UTC
STARTED: 2020-06-20 10:59:22 UTC
ENDED: 2020-06-20 11:02:32 UTC
MESSAGE: Completed
ID: 65
NAME: spp_1010_2102_172d1685d94_Silver
PARENT ID: 4
PARENT NAME: spp_172d162ed86_spp_1010_2001_172bbb8773f__group7e7ae94b6398496
POOL ID: 1
POOL NAME: primary
HAS CLONES: No
USED SPACE: 0.00KB
VERSION ID: 7656150810181148115
CREATED: 2020-06-20 11:05:41 UTC
UPDATED: 2020-06-20 11:05:41 UTC
The relationship of the volumes on the source and the target server is updated (see
Example 15-9) for the source vSnap server and in Example 15-10 for the target vSnap server.
ID: b3b0d887744e23aec938528f00d2a546
PARTNER ID: 4b34983b741447a6a41a96a62525cf87
PARTNER TYPE: vsnap
PARTNER ADDR: t4-spp-vsnap-dr
LOCAL ROLE: primary
LOCAL POOL ID: 1
LOCAL VOL ID: 6
LOCAL VOL NAME: spp_1010_2001_172bbb8773f__group7e7ae94b6398496985ca5f389ab892a
REMOTE POOL ID: 1
REMOTE VOL ID: 4
REMOTE VOL NAME: spp_172d162ed86_spp_1010_2001_172bbb8773f__group7e7ae94b6398496
LAST SYNC STATUS: COMPLETED
LAST SYCNED SNAP ID: 65
LAST ATTEMPT SNAP ID: 65
CREATED: 2020-06-20 10:59:20 UTC
UPDATED: 2020-06-20 10:59:20 UTC
ID: b3b0d887744e23aec938528f00d2a546
PARTNER ID: 9b44fb0c808b434688b7e8e70a6b391a
PARTNER TYPE: vsnap
PARTNER ADDR: t4-spp-vsnap
LOCAL ROLE: replica
LOCAL POOL ID: 1
LOCAL VOL ID: 4
LOCAL VOL NAME: spp_172d162ed86_spp_1010_2001_172bbb8773f__group7e7ae94b6398496
REMOTE POOL ID: 1
REMOTE VOL ID: 6
Note: Copy to standard Object Storage operates at a block level (incremental copies)
and must copy only the changed block data since the last copy. IBM Spectrum Protect
Plus can reconstruct any of the recovery points from that point. Archive Object Storage
or tape are different because they are always a full copy.
Additional Copies to archive Object Storage or tape to create additional full copies of
backup data into a “cold” storage tier.
Archive Object Storage archive is a long-term storage method that copies data to one of
the following storage services: Amazon Glacier, IBM Cloud Object Storage Archive Tier, or
Microsoft Azure Archive.
Tape storage means that data is stored on physical tape media or in a virtual tape library
that is connected to an IBM Spectrum Protect server. By storing tape volumes at a secure,
offsite location that is not connected to the internet, you can help to protect your data from
online threats, such as malware and hackers.
Copying snapshots to tape or Object Storage archive provides extra cost and security
benefits. However, because copping to these storage types requires a full data copy, the
time that is required to copy data increases. In addition, the recovery time can be
unpredictable and the data might take longer to process before it is usable.
15.4.1 Prerequisites
To create additional copies of vSnap data to Object Storage, the following requirements must
be met:
A disk cache area is present on the vSnap server.
To create additional copies of vSnap data to tape or archival storage, the requirements are
similar to the Object Storage requirements; however, the vSnap disk cache area is not
required for full archival operations.
Note: Object Storage copy SLA only sends the latest backup, not the intermediate
backups.
During restore operations, the disk cache area is used to cache downloaded objects and
store any temporary data that might be written into the restore volume.
The cache area must be configured in the form of an XFS file system that is mounted at
/opt/vsnap-data on the vSnap server. If this mount point is not configured, copy or restore
jobs fail with the following error:
Cloud functionality disabled: Data disk /opt/vsnap-data is not configured.
Note: For new virtual vSnap appliance deployments starting at version 10.1.3, a
pre-configured disk cache area of 128 GB size is mounted to /opt/vsnap-data.
For all custom vSnap server installations and virtual vSnap appliances that were upgraded
from version 10.1.1, the cache area must be configured manually.
For more information about sizing, configuring, or increasing the cache area, see the latest
version of the IBM Spectrum Protect Plus Blueprints.
Multipath configuration
During copy operations to Object Storage, IBM Spectrum Protect Plus attaches and detaches
virtual cloud devices on vSnap servers. If the multipath configuration is enabled on the vSnap
server by using dm-multipath, the configuration can interfere with the copy operation.
Tip: To avoid this interference, the virtual cloud devices must be excluded from the
multipath configuration.
Add the following lines under the blacklist section of the multipath configuration file
/etc/multipath.conf:
blacklist {
device {
vendor "LIO-ORG"
product ".*"
}
}
Note: If the Object Storage endpoint or repository server uses a self-signed certificate, the
certificate must be specified while registering the Object Storage or repository server in the
IBM Spectrum Protect Plus user interface. Because this process occurs during the
registration of the Object Storage provider in the IBM Spectrum Protect Plus UI, it does not
need to be prepared in advance.
443 T vSnap Object Storage Allows the vSnap server to communicate with
C server Server enpoints Amazon Simple Storage Service (S3), Microsoft
P Azure, or IBM Cloud Object Storage endpoints.
9000 T vSnap Repository Server Allows the vSnap server to communicate with IBM
C server endpoints Spectrum Protect (repository server) endpoints.
P
Important: Native lifecycle management performed by the Object Storage provider is not
supported. IBM Spectrum Protect Plus manages the lifecycle of uploaded objects
automatically by using an incremental-forever approach in which older objects can still be
used by newer snapshots. Automatic or manual expiration of objects that are outside of
IBM Spectrum Protect Plus lead to data corruption.
For performance reasons, the selected Region should be close to the geographical region
where the vSnap server system is located.
Note: Amazon S3 supports various storage classes for storing objects into a bucket. IBM
Spectrum Protect Plus “hot” incremental copies store objects to the default storage class,
which is S3 STANDARD.
5. In the Bucket settings for Block Public Access, keep the values set to the defaults, as
shown in Figure 15-12.
Complete the following steps to create a User Account for Amazon S3 bucket access:
1. Log in to the AWS console at: https://console.aws.amazon.com.
2. Enter IAM into the Find Services search bar and select Manage Access to AWS
resources.
3. Select Users in the left pane and then, click Add User, as shown in Figure 15-14 and
Figure 15-15.
4. Create a username and select only Programmatic access. Then, click Next.
6. Click Create User. Click Show ion the Secret Access key column and keep this key and
the Access key ID, as shown in Figure 15-17.
.
IBM Spectrum Protect Plus directly uploads data files to the Glacier tier. Some small
metadata files are stored in the default tier for the bucket. A copy of these metadata files is
also placed into the Glacier tier for disaster recovery purposes.
The vSnap server must communicate with IBM Spectrum Protect (repository server)
endpoints.
Complete the following steps to add an Amazon S3 Archive Object Storage bucket:
1. Log in to the AWS console at: https://console.aws.amazon.com/s3/.
2. Create one Amazon S3 Bucket and User as described in “Amazon S3 copy requirements
(“hot” incremental copies)” on page 422.
For performance reasons, the selected Region should be close to the geographical region
where the vSnap server system is located.
Complete the following steps to add a IBM Cloud Object Storage bucket:
1. Log in to the AWS console: https://cloud.ibm.com.
2. Click Create Source.
3. Select Object Storage from the provider list.
4. Select Standard Pricing Plan → Add Service Name → Select a Resource Group (if a
group was configured) → Create, as shown in Figure 15-19.
6. Select Storage → Choose Object Storage has been created, as shown in Figure 15-21.
Displaying Credential User Resume, obtained Access Key ID, Secret Access Key, and
Endpoints values as shown in Figure 15-25.
IBM Spectrum Protect Plus creates a single lifecycle management rule on the bucket to
migrate data files to the archive tier. The bucket must have the Name Index setting enabled.
For performance reasons, the selected Region should be close to the geographical region
where the vSnap server system is located.
You can use a cool storage tier for cost-effective, long-term storage. However, it is more costly
to restore data from a cool storage tier than from a hot storage tier.
Complete the following steps to add a Microsoft Azure hot storage container:
1. Log in to the Azure portal and click Storage accounts (see Figure 15-27).
2. Click Create Account to create the storage account. Select a resource group or create a
resource group for the new storage account.
3. Enter the name for the storage account and choose the location. Select the Access tier (in
our example, Hot storage) and click Next (see Figure 15-28).
Figure 15-28 Defining Azure Storage account Hot tier and region
4. Keep the options at their default settings, including the settings in the Advanced tab, as
shown in Figure 15-29. Click Next.
5. Optionally, create a tag for the new storage account and click Review+Create to review
the settings. Verify all settings and click Create, as shown in Figure 15-30.
7. Create a Blob container by selecting Containers under Blob service in the navigation
pane, as shown in Figure 15-32.
8. Enter a name for the storage container and click OK. A blob container for copy use is
created, as shown in Figure 15-33.
Some small metadata files are stored in the default tier for the container. A copy of these
metadata files is also placed in the archive tier for disaster recovery purposes.
Complete the following steps to add a Microsoft Azure cold storage container:
1. Log in to the Azure portal and click Storage accounts.
2. Complete the steps that are described in “Amazon S3 copy requirements (“hot”
incremental copies)” on page 422, but choose Cold as the default access, as shown in
Figure 15-34.
Figure 15-34 Defining Microsoft Azure Storage account Cold tier and region
Before you back up data in a production environment to any other S3 compatible Object
Storage, ensure that the Object Storage is validated for use with IBM Spectrum Protect Plus.
The different compatible providers are listed in Table 15-3, along with some useful links to the
documentation of those providers. For more information about the latest version of this table,
see this web page.
Red Hat Ceph V10.1.6 Standard Object About configuring and administering Ceph S3 Object
Object Storage Storage buckets Storage, see this web page.
Dell EMC Elastic V10.1.6 Standard Object See the Quick Start guide.
Cloud Storage Storage buckets
OpenIO Object V10.1.6 Standard Object See the Quick Start guide.
Storage Storage buckets
Note: For IBM Spectrum Protect Plus, the repository server must be an IBM Spectrum
Protect server Version 8.1.8 or later.
IBM Spectrum Protect Plus offers the Archive option, which stores additional full copies of
backup data into an IBM Spectrum Protect Tape storage pool. To support the selection of
different target storage types (“storage classes”) by using the S3 protocol, IBM Spectrum
Protect server version 8.1.8 was enhanced with a new storage pool type (“ColdDataCache”)
and a new policy domain type (“ObjectDomain”). Consequently, all IBM Spectrum Protect
ObjectClient nodes that store data for IBM Spectrum Protect Plus must be assigned to an
ObjectDomain in IBM Spectrum Protect.
If you are planning to copy or archive IBM Spectrum Protect Plus data to an IBM Spectrum
Protect server, three configurations are available (as listed in Table 15-4). Choosing the one
to configure depends on which scenario applies to your data protection needs.
Copying to standard Object Copy data to To copy data to standard Object Storage to the
Storage when you are running standard IBM Spectrum Protect server, must create a
daily or less frequent copies to Object Storage cloud-container or directory-container storage
standard Object Storage. (Hot). pool, and set up the object agent component of
IBM Spectrum Protect. For more information,
see steps 2 - 4 in “Setting up and configuring
data transfer communication”.
Copying to tape when you are When you To copy data to tape, you must create a
creating a weekly or less copy data to cloud-container or directory-container storage
frequent full-copy of your data tape, a full pool for tape, and a cold-data-cache storage
to tape storage. copy of the pool on the IBM Spectrum Protect server. For
data is created more information, see steps 1-4 in “Setting up
at the time of and configuring data transfer communication”.
the copy
process
(Cold).
Mixture of standard Object Secure your This scenario is a combination of the previous
Storage and long-term copying data in cases; that is, data is stored to tape and on
to tape. incremental standard Object Storage at the IBM Spectrum
backups on the Protect server. The required data storage pools
IBM Spectrum also are set up for both scenarios.
Protect server,
and retaining
data on tape
for longer term
security.
Note: Copying to an IBM Spectrum Protect server with cloud containers instead of copying
directly from the IBM Spectrum Protect Plus server to S3 Object Storage can be done for
several reasons, including the following examples:
Deduplication and compression
Additional Object Storage targets can be added
Consolidated management can be done by using IBM Spectrum Protect server.
Note: For more information about how to create a ColdDataCache storage pool in IBM
Spectrum Protect 8.1.10, see IBM Knowledge Center.
For more information about how to configure an ObjectDomain in IBM Spectrum Protect,
see IBM Knowledge Center.
Because all object providers (Amazon S3, IBM Cloud Object Storage, Microsoft Azure Blob,
and IBM Spectrum Protect) use the Amazon S3 protocol, the process for registering them to
IBM Spectrum Protect Plus is similar as well.
6. Select the bucket to be used for copy operations (incremental copy to a “hot” tier).
7. (Optional) Select the bucket to be used for archive operations (to “cold” tier).
8. Click Register to add the provider to the Object Storage servers table.
Complete the following steps to add and register an IBM Spectrum Protect server as a
backup storage provider:
Select System Configuration → Backup Storage → Repository Server.
Click Add Repository Server.
Complete all fields in the Register Repository Server pane:
– Enter a meaningful Name to identify the repository server.
– Enter the high-level-address (HLA) of the repository server object agent in the
Hostname field.
– Enter the TCP port that is used by the object agent (default: 9000).
– Use an existing key or specify the Key name, Access key, and Secret key.
– Use a Certificate, or alternatively upload or copy and paste a certificate.
Click Register to add the provider to the Object Storage servers table, as shown in
Figure 15-38.
Note: When registering Object Storage providers, different buckets can be selected for
incremental copy or full archival operations.
When registering IBM Spectrum Protect as a repository server, the selection of different
buckets for copy and archive operations is not required. The configuration of the
ObjectDomain in the IBM Spectrum Protect server automatically ensures that “hot” data is
stored in a container storage pool and “cold” data is stored to the ColdDataCache storage
pool (which is migrated to tape later on).
Note: The Recovery Point Objective (RPO) of a backup object is always controlled by the
parameters of the Main Policy in the Operational Protection section.
Additional Copies: This section includes all parameters that belong to the creation of
additional copies of data from a vSnap server into object, archive, or tape storage:
a. Standard Object Storage: Controls Retention, Schedule, Source, and Target for
incremental copies to a “hot” storage tier (Object Storage or IBM Spectrum Protect
container storage pool).
b. Archive Object Storage: Controls Retention, Schedule, Source, and Target for full
copies to a “cold” storage tier (Object Storage archive storage or IBM Spectrum Protect
tape storage pool).
In the parameters of the Additional Protection section, you allow can control when and where
to create additional copies and how long these copies are retained.
Important: Implement different schedules for the main policy, replication policy, and the
creation of additional copies. The additional copies should be created after the operational
backups and replication complete.
Additional copies to a “hot” storage tier often are kept for a short term. Configure a short
retention or select the Same retention as source selection option.
Additional copies to a “cold” storage tier (Archives) are usually kept for a long time. Select
a retention of months or years. Some Object Storage providers charge an extra cost if data
is deleted from their archive tier before the minimum lifetime is reached.
The example in Figure 15-40 on page 443 shows how to configure a SLA Policy Backup using
the IBM Spectrum Protect Plus GUI. Select Manage Protection → Policy Overview → Add
SLA Policy, as shown in Figure 15-39.
The example in Figure 15-40 on page 443 shows creating a daily incremental copy of data
from the primary vSnap to a IBM Spectrum Protect server container storage pool (by using
the same retention that is used for the primary backup) and a monthly full copy to a tape pool
at the same IBM Spectrum Protect server (using a retention of 3 months).
For more information about how to create an SLA policy, see IBM Knowledge Center.
Example 15-11 shows the use of the vSnap CLI command vsnap cloud partner show to list
the Object Storage partner server and its bucket sppsvh001.
As shown in Example 15-12, the copy Object Storage job creates a target volume (ID
9d01a010593441669d6c055554ec420c) on the target vSnap server t4-spp-vsnap. The vSnap
CLI command vsnap cloud volume show lists it.
Example 15-12 Copy Object Storage target volume is created on the target vSnap server
[serveradmin@t4-spp-vsnap ~]$ vsnap cloud volume show
ID | PARTNER ID | TYPE | IS CLONE | NAME | TAGS
----------------------------------------------------------------------------------------------------------------------------------------------------------
9d01a010593441669d6c055554ec420c | de1a9c3882094c71986c06e7bad18bd7 | filesystem | No | spp_1007_2112_16efaed8584__group0_95_ | N/A
8358edb231c74a74b37fdf1a928e33ad | de1a9c3882094c71986c06e7bad18bd7 | filesystem | No | spp_1008_2114_16efc8e5b4c__group0_95_ | N/A
a76874dea062484fadcda57202e40d46 | de1a9c3882094c71986c06e7bad18bd7 | lun | No | spp_1014_2107_16FCA57CF92
ID: e09e5526309f47acaa2d3a8585cbb57b
PARTNER ID: de1a9c3882094c71986c06e7bad18bd7
PARTNER TYPE: cloud
LOCAL POOL ID: 1
LOCAL VOL ID: 5
REMOTE VOL ID: 0b7a2b6c04aa4bf2b3e5bc10b8327663
LOCAL VOL NAME: spp_1007_2112_16efaed8584__group0_95_
REMOTE VOL NAME: spp_1007_2112_16efaed8584__group0_95_
LAST SYNC STATUS: COMPLETED
LAST SYCNED SNAP ID: 4720
LAST ATTEMPT SNAP ID: 4778
LAST SYCNED DB CHECKSUM: 43dc837b24356f0908c516f10be646b3
LAST SYNCED BIN CHECKSUM: f2737219118a3695eee632c8a58c0945
CREATED: 2020-06-21 08:29:16 UTC
UPDATED: 2020-06-21 08:29:16 UTC
A empty Object Storage Snapshot is created by running the vsnap cloud snapshot show
command, as shown in Example 15-14. The details of the snapshot are available by running
the vsnap cloud snapshot show --id 7196997217654727064 --partner_id
de1a9c3882094c71986c06e7bad18bd7 command.
[serveradmin@t4-spp-vsnap ~]# vsnap cloud snapshot show --id 7196997217654727064 --partner_id de1a9c3882094c71986c06e7bad18bd7
ID: 7196997217654727064
VERSION: 7196997217654727064
VOLUME: d0332652c53045599ce2f98f74a86fc8
NAME: spp_1008_2435_172d5c91288_SVH-VM-BACKUP-LNX
PARTNER ID: de1a9c3882094c71986c06e7bad18bd7
PARTNER TYPE: cloud
CLOUD OBJECT COUNT: No
USED SPACE: 0.00KB
CREATED: 2020-06-21 00:08:07 UTC
UPDATED: 2020-06-21 00:08:07 UTC
RESTORABLE: Yes
FILESYSTEM TYPE: N/A
PATHS: N/A
SOURCE SIZE: N/A
Example 15-15 Copy Object Storage session using the vSnap CLI
[serveradmin@t4-spp-vsnap ~]# vsnap cloud session show
ID | ACTION | RELATIONSHIP | LOCAL SNAP | VERSION | STATUS | SENT | STARTED
| ENDED
----------------------------------------------------------------------------------------------------------------------------------------------------------------
----------------------------
1b8d1f80f9124e318b85192b74942e38 | upload | 1d90b09e27c14bc8b7d0756ff051c0d9 | 4787 | 7196997217654727064 | ACTIVE | 55.13MB | 2020-06-21 07:27:42
UTC | N/A
ID: 1b8d1f80f9124e318b85192b74942e38
PARTNER ID: de1a9c3882094c71986c06e7bad18bd7
PARTNER TYPE: cloud
RELATIONSHIP ID: 1d90b09e27c14bc8b7d0756ff051c0d9
LOCAL SNAP ID: 4787
LOCAL SNAP NAME: spp_1008_2174_193_172d436fe9b
REMOTE SNAP NAME: spp_1008_2435_172d5c91288_SVH-VM-BACKUP-LNX
PRIORITY: 50
STATUS: ACTIVE
SENT: 55.13MB
QUEUED: 2020-06-21 07:27:19 UTC
STARTED: 2020-06-21 07:27:42 UTC
ENDED: N/A
MESSAGE: Transferred 55.13MB of 105.62MB; 52% complete; Average throughput 15.3 MB/s
VERSION: 7196997217654727064
REMOTE VOL ID: d0332652c53045599ce2f98f74a86fc8
MAX OBJECT SIZE: 16777216
NUM OBJECTS WRITTEN: No
BUCKET ID: sppsvh001
ACTION: upload
REBASE: No
IS CANCELLED: No
LOCAL POOL ID: Yes
LOCAL VOL ID: 193
CLONE VOL ID: N/A
CLONE VOL NAME: N/A
ID: 1b8d1f80f9124e318b85192b74942e38
PARTNER ID: de1a9c3882094c71986c06e7bad18bd7
PARTNER TYPE: cloud
RELATIONSHIP ID: 1d90b09e27c14bc8b7d0756ff051c0d9
LOCAL SNAP ID: 4787
LOCAL SNAP NAME: spp_1008_2174_193_172d436fe9b
REMOTE SNAP NAME: spp_1008_2435_172d5c91288_SVH-VM-BACKUP-LNX
PRIORITY: 50
STATUS: COMPLETED
SENT: 105.62MB
QUEUED: 2020-06-21 07:27:19 UTC
STARTED: 2020-06-21 07:27:42 UTC
ENDED: 2020-06-21 07:39:08 UTC
MESSAGE: Completed
VERSION: 7196997217654727064
REMOTE VOL ID: d0332652c53045599ce2f98f74a86fc8
MAX OBJECT SIZE: 16777216
NUM OBJECTS WRITTEN: No
BUCKET ID: sppsvh001
ACTION: upload
REBASE: No
IS CANCELLED: No
LOCAL POOL ID: Yes
LOCAL VOL ID: 193
CLONE VOL ID: N/A
CLONE VOL NAME: N/A
You can improve (reduce) the RPO by assigning a VM, an application, or an IBM Spectrum
Protect Plus catalog backup to more than one SLA in parallel. Similar to replication, this
creates backups of the same entity (VM, application, or IBM Spectrum Protect Plus catalog
backup) in two different locations (sites). The key difference is the fact that the primary data is
being backed up twice, which results in two independent “primary” backup versions of the
same entity.
The result is to have two copies of backup data with an RPO of 24 hours.
The result is to have two copies of backup data with an RPO of 12 hours.
Note: A similar result can be achieved with a single, replication-enabled SLA by changing
the schedule from daily to twice daily.
In addition to the fact that the RPO can be improved and independent copies can be created
with Multi-SLA backup, it is important to understand that the method has some limitations and
drawbacks compared to a replication approach:
Increasing the backup frequency adds more load to the hypervisor (for example, VMware
snapshots need to be created more often) or to the application (for example, because it is
set to back up mode more often).
Additional backups to a distant site might negatively impact performance because they
cannot benefit from compression as it is being used when replicating backup data
between two vSnap servers.
Microsoft SQL server backups and IBM Db2 backups are limited to a single SLA when log
backup is enabled. Having such applications assigned to two different SLAs at the same
time with log backup enabled, this might lead to unpredictable results and require manual
intervention.
An Object storage Copy retains compression during transfer and storage, but not
deduplication.
Databases Applications, as the secondary copy, are not copying logs to any S3 storage
(Object Storage or Repository Server).
Note: Object Storage repository contains a full version and not partial data. It means that it
is possible to restore those copies from any vSnap, regardless of where they are located.
Note: In this example, we assume that we have a running version 10.1.6 IBM Spectrum
Protect Plus server with a dedicated vSnap server and a running version 8.1.8 IBM
Spectrum Protect server on a Linux operating system with a tape library attached. A
directory container pool and a tape storage pool also exist.
Both types of additional copies (“hot” incremental copy to a directory container pool and a
“cold” full copy/Archive to a tape storage pool) are configured.
In this example, we use the IBM Spectrum Protect server administrative command line to
define a ColdDataCache storage pool named SPP-TAPECACHE, which uses four directories
in a local file system and a tape storage pool (TAPEPOOL) as the next storage pool in the
hierarchy:
define stgpool SPP-TAPECACHE stgtype=colddatacache nextstgpool=TAPEPOOL \
directory=/tsm/stg/colddatacache1,/tsm/stg/colddatacache2,/tsm/stg/colddatacache3,
/tsm/stg/colddatacache4
Defining an ObjectDomain
After the ColdDataCache storage pool is created, an ObjectDomain must be defined. As part
of the command that defines an ObjectDomain, the following storage pools must be specified:
A StandardPool, which must be a directory- or cloud-container storage pool that is used
for “hot” incremental copies of vSnap backup data.
A ColdPool, which must be a ColdDataCache storage pool that is used for “cold” full
copies/archives of vSnap backup data.
Note: When defining a policy domain of type ObjectDomain, a policy set and two
management classes (STANDARD and COLD) are automatically defined and activated.
The management classes are configured in a way that the application (in this case SPP)
controls the data lifecycle.
Example 15-16 shows the copy group parameters that have been automatically configured.
Defining an ObjectClient
The easiest way to register an ObjectClient to an IBM Spectrum Protect server is using the
IBM Spectrum Protect Operations Center (OC).
After the IBM Spectrum Protect Operations Center wizard prepares the configuration, the
agent must be started from the IBM Spectrum Protect server operating system command
line.
If the ObjectAgent is running (for example, because other ObjectClients use the IBM
Spectrum Protect server), this task can be skipped.
Figure 15-43 Add ObjectClient wizard in the IBM Spectrum Protect Operations Center
3. When the ObjectAgent configuration is complete, it must be started through the operating
system command line. To obtain the necessary commands, click View steps, as shown in
Figure 15-45.
Figure 15-45 Obtaining the command to start the ObjectAgent by using the OS command line
4. Log in to the IBM Spectrum Protect server operating system and review the ObjectAgent
configuration file that was created by the IBM Spectrum Protect Operations Center wizard,
as shown in Example 15-17.
6. After the ObjectAgent is started, the ObjectAgent registration continues in the IBM
Spectrum Protect Operations Center. As shown in Figure 15-46, specify an ObjectClient
name and contact details and then, click Next.
Note: The wizard should show the Standard- and Cold copy destinations for the
ObjectDomain.
8. Click Next to configure the client and open the final window of the Add ObjectClient
wizard, as shown in Figure 15-48 on page 454.
Important: The summary window of the Add ObjectClient wizard contains all of the
information that is needed later in the IBM Spectrum Protect Plus user interface to register
a Repository Server:
S3 access key id
S3 secret access key
ObjectAgent URL
ObjectAgent certificate
Write down, copy, and store this information in a safe place because it is needed to
complete the configuration procedure.
The preparation of the IBM Spectrum Protect server is now complete. As a next step, the IBM
Spectrum Protect server must be registered in IBM Spectrum Protect Plus as a Repository
server. This process is described next.
Tip: In the example that is shown in Figure 15-49, we paste the S3 access key and the
content of the ObjectAgent certificate file directly into the corresponding dialog boxes.
3. Click Register to start the registration process. When this process is complete, you
receive a confirmation message, as shown in Figure 15-50.
15.6.3 Creating an SLA that creates regular additional copies to IBM Spectrum
Protect
In this example, we define an SLA with the following specifications:
Name: Primary-with-Tape-Archive
Type: VMware, Hyper-V, Exchange, Office365, SQL, Oracle, DB2, MongoDB, Catalog,
and Windows File Systems
Backup Policy:
– Retention: 7 days
– Frequency: daily
– Target Site: Primary
Replication Policy: No replication between vSnaps is used in this example
Additional Copies - Standard Object Storage:
– Retention: Same as source (7 days)
– Frequency: daily
– Source: Backup Policy Destination (means: data from original vSnap - not from a
replica)
– Destination: Repository Server
– Target: ESCC-SP-SRV
Additional Copies - Archive Object Storage:
– Retention: 3 months
– Frequency: Weekly, on Sundays
– Source: Backup Policy Destination (means: data from original vSnap - not from a
replica)
– Destination: Repository Server
– Target: ESCC-SP-SRV
Figure 15-52 shows the configuration for the additional copies to IBM Spectrum Protect.
To configure this replication in the SLA, the SLA parameter “Source” must be changed
from “Main Policy Destination” to “Replication Policy Destination”.
Because the SLA consists of three sections (“Backup to vSnap”, “Copy”, and “Archive”) we
run it three times in a sequential manner. Complete the following steps:
1. Create a backup of the VM into a vSnap, as shown in Figure 15-53.
Click:
2. Wait until the backup job is complete. As shown in Figure 15-54, the data is copied from
the vSnap to the directory container storage pool on the IBM Spectrum Protect server.
This full copy is used for the first run, but is incremental for all subsequent job runs.
Click:
Click:
4. Confirm that the backup and copy jobs completed successfully. Figure 15-56 shows the
different job logs.
Note: IBM Spectrum Protect Plus Copy Object Storage is set to fail if nothing is available to
copy. The SLA job status can be one of three types: Completed, Partial, or Failed.
Completed status is when a recovery point exists for this SLA job that runs. If no recovery
points exist for that job, it is marked with a Partial or Failed status.
We demonstrate the REST API documentation and how users can discover and use the API
for monitoring, configuring, and administration tasks. We also show how to discover API calls
and their parameters to build a customized Python script for user-started backups of a single
virtual machine (VM) from command line by using REST API services.
Finally, the sppclient utility is introduced. It is a Python module that encapsulates REST API
complexity and reuses code for reoccurring tasks. The sppclient utility features a set of more
than 20 Python scripts that demonstrate how to realize workflows with REST instead of the
use of the GUI.
In general, REST (also known as RESTful) APIs share the following characteristics:
RESTful systems use stateless protocols. That means the server does not hold any record
of previous interactions with clients. Every client request and interaction need to be
handled based entirely on information that comes from the client.
Stateless components can be easily redeployed after failures occurred and can be started.
RESTful APIs are popular in web deployments, cloud computing, and micro services.
RESTful APIs scale out well as they can be started, stopped, and restarted easily when
needed because they do not need to preserve any client data or session states.
RESTful clients send requests to a resource’s URI and expects a response; for example,
in HTML, XML, and JSON. While there are several response formats, JSON is the most
widely adopted format. IBM Spectrum Protect Plus uses the JSON format for requests and
responses over HTTP.
The following REST operations are available for HTTP:
– GET
– HEAD
– POST
– PUT
– PATCH
– DELETE
– CONNECT
– OPTIONS
– TRACE
IBM Spectrum Protect uses the GET, POST, PUT, and DELETE operations.
An example how a REST application programming interface (API) enables client applications
is shown in Figure 16-1. How to access and manage resources on a server by sending
requests and receiving responses by using the HTTP or HTTPS protocols is shown.
By using the REST API, IBM Spectrum Protect Plus can integrate with automation tools, such
as Jenkins, Puppet, and Ansible. Furthermore, any programming language that can make
REST calls can be used (for example, Python, JavaScript, and PowerShell). The necessity to
have a deeper look at the REST API mostly becomes relevant when the IBM Spectrum
Protect Plus Environment is scaling out.
The GUI might not be always the best fit for every client for the following reasons:
Increasing number of Hypervisors and VMs to configure and protect.
Amount and variety of applications.
Quantity of vSnap servers and VADP proxy servers
The need to check in an automated way the SLA's status (for example, if it failed, or ended
partial, or completed successfully).
Monitoring the SPP environment in terms of resource utilization (CPU, RAM, vSnap pool
capacity), job logs, and warnings or error messages.
The REST API PDF describes the essentials of REST in detail. It provides guidance to
session handling and four basic HTTP methods for applications to interact with: GET, POST,
PUT, and DELETE. Additionally, it contains plenty of RESTful API examples that demonstrate
interaction, basic functions such as retrieving a session ID, assigning a VM, and starting a job,
JSON filtering, pagination, and a large subset of available REST API endpoints.
The reference describes the general information about the API design along with guidance
and examples to script and interact with IBM Spectrum Protect Plus. In the reference, the
topics are grouped and correspond to the product GUI menu structure. For example, the user
finds the API functions related to a “vSnap” under System Configuration → Backup
Storage: Disk, as shown in Figure 16-3.
This publication describes the process to identify more endpoints in 16.4.2, “Trace GUI REST
operations by using Firefox” on page 474.
For most API operations, the API documentation provides the following resources:
Screen captures of the equivalent GUI function with detailed explanations.
Sample code in Python, which can be adopted by the user for integration into customized
scripts.
Information about how to:
– Design the API request (GET, POST, UPDATE, and DELETE)
– How to define parameters and filters, pagination, and so on
During exploration of the REST API endpoint that is called site, we demonstrate the use of
several different methods. However, all methods are following the sequence that is shown in
Figure 16-5:
1. The client utility (for example, curl, Python libraries) connects to the API and transmits
username and password in an HTTP header. In the case of valid credentials, the API
responds with a unique authentication token. The IBM Spectrum Protect Plus API expects
an authentication token as the sessionid attribute in all other API requests.
2. The client performs a POST operation.
3. The client performs a GET operation on the API endpoint site. Although a GET operation
retrieves information only from the API with no changes, a POST or PUT operation creates
or updates information by using the endpoint with data that must be specified in the
request body. In step 2, 3, and 4, the sessionid is used as authentication token.
4. The session ends and the authentication token is invalidated.
Figure 16-5 REST API call to endpoint site, including request of authentication token
16.3.1 CURL
We demonstrate the steps that are required to perform the steps that are shown in
Figure 16-5 on page 466 by using the command-line utilities curl and jq. This simple
example demonstrates the use of the REST operations POST, GET, and DELETE.
After successful authentication, the HTTP status code equals 200 and the response is in
JSON format. An excerpt of the JSON response message is shown in Example 16-1. The
most important information from this response is the value of the key sessionid.
Example 16-1 Retrieve login information with sessionid from the API with curl (truncated)
command: curl -sS -k -X POST -H 'Accept:application/json' -H 'Content-type:application/json' --user
"restapiuser:pass4AP!" https://spphost/api/endeavour/session
This authentication token is used for more communication with the API until the token expires
or the user invalidated the token by sending a DELETE command to the endpoint. The
response message contains information that is related to the user account and so-called
Hypermedia as the Engine of Application State (HATEOAS) components. HATEOAS is a
component of a REST architecture that enables the client to interact with the server and
discover information dynamically though hypermedia or response links.
The client does not require up front knowledge of methods of resource interaction.
Example 16-1 shows such a response links to change a user’s password (see the
changePassword response link in Example 16-2). The response from the API endpoint
contains more links or API endpoints that are related to session or user management.
Example 16-2 Retrieve a sessionid from the API with curl and Python pretty-print formatting
command: curl -sS -k -X POST -H 'Accept:application/json' -H 'Content-type:application/json' --user
"restapiuser:pass4AP!" https://spphost/api/endeavour/session | python -m json.tool
response:
{
"sessionid": "49531dd8345c417aa7d47b4179ecc03a",
"user": {
"links": {
"self": {
"rel": "self",
"href": "https://spphost/api/security/user/1001"
},
"up": {
"rel": "up",
"href": "https://spphost/api/security/user"
},
"changeMetadata": {
"rel": "action",
In addition to the previous example, we use the Python module json.tool to format the JSON
response and transform it from a single line string into a formatted output with indents and
key-value pairs per line.
For advanced JSON parsing, filtering, and transformations of the JSON responses, we
recommend the tool jq. For more information about this tool, see this web page.
The jq tool is a flexible command-line JSON processor and provides powerful options to
extract values from the JSON responses. If you pipe the JSON output to the jq tool (see
Example 16-3), the output is formatted similar to the pretty-print function of the json.tool
Python module.
Example 16-3 Retrieve a sessionid from the API with curl and JQ for pretty-print formatting
command: curl -sS -k -X POST -H 'Accept:application/json' -H 'Content-type:application/json' --user
"restapiuser:pass4AP!" https://spphost/api/endeavour/session | jq .
result: the formatted result looks almost identical to the output of the Python formatting
The jq tool provides functions beyond the pretty-print formatting. It provides extra functions,
such as customized formatting, key value transformations, calculations, and filtering. A simple
filter on the key sessionid is used in Example 16-4 to display only the value of the wanted
attribute that is reused for more authentication.
Example 16-4 Retrieve a sessionid from the API with curl and JQ for pretty-print formatting and filtering
command: curl -sS -k -X POST -H 'Accept:application/json' -H 'Content-type:application/json' --user
"restapiuser:pass4AP!" https://spphost/api/endeavour/session | jq '.sessionid'
response: "49531dd8345c417aa7d47b4179ecc03a
Note: When specifying the parameters -iL, piping curl output to the jq tool fails. The extra
parameters are modifying the output in a way that it is only a JSON formatted string and
thus, the jq tool no longer can parse and format the output. Therefore, we specify the
parameters -iL for demonstration purposes during dedicated examples in which we must
check the HTTP response code. For example, response status code 201 indicates that a
new resource was successfully created.
response:
HTTP/1.1 201
X-Application-Context: zuul:443
Date: Fri, 28 Jun 2019 11:33:18 GMT
Content-Type: application/json;charset=UTF-8
Transfer-Encoding: chunked
{"links":{"self":{"rel":"self","href":"https://spphost/api/site/3106","hreflang":null,"media":null,"title":null,"type
":null,"deprecation":null},"up":{"rel":"up","href":"https://spphost/api/site","hreflang":null,"media":null,"title":nu
ll,"type":null,"deprecation":null},"edit":{"rel":"update","href":"https://spphost/api/site/3106","hreflang":null,"med
ia":null,"title":null,"type":null,"deprecation":null},"delete":{"rel":"delete","href":"https://spphost/api/site/3106"
,"hreflang":null,"media":null,"title":null,"type":null,"deprecation":null},"usedby":{"rel":"related","href":"http://l
ocalhost:8082/api/endeavour/association/resource/site/3106?action=listUsingResources","hreflang":null,"media":null,"t
itle":null,"type":null,"deprecation":null},"netapp":{"rel":"related","href":"https://spphost/api/netapp?siteId=3106",
"hreflang":null,"media":null,"title":null,"type":null,"deprecation":null},"vsphere":{"rel":"related","href":"https://
spphost/api/vsphere?siteId=3106","hreflang":null,"media":null,"title":null,"type":null,"deprecation":null},"resourcep
rovider":{"rel":"related","href":"https://spphost/api/site/3106/resourceprovider","hreflang":null,"media":null,"title
":null,"type":null,"deprecation":null}},"id":"3106","name":"REST_site3","description":"site created via
REST","defaultSite":false,"throttles":null,"demo":false,"rbacPath":"root:0/site:0/site:3106"}
To confirm that the site creation was successful, run a GET operation on the site endpoint, as
shown in Example 16-6.
output:
{"name":"Secondary","id":"2000","description":"secondary site","defaultSite":false}
{"name":"Primary","id":"1000","description":"Primary Site","defaultSite":true}
{"name":"Demo","id":"3000","description":"Demo site","defaultSite":false}
{"name":"REST_site","id":"3106","description":"site created by REST command","defaultSite":false}
A site can be deleted by running a REST command without any confirmation, as shown in
Example 16-7. The response status code 204 indicates that the resource was deleted
successfully. The API method DELETE is run on endpoint /api/site/siteid, whereas the
siteid must be replaced by the integer value of the corresponding site; for example, 3106 for
the site that was created by using REST API.
The advantage over the use of curl is that you can reuse frequently used queries and
headers. The RESTclient generates the HTTP request that is based on several building
blocks, such as Authentication header and Content type header. If you installed the
RESTclient plug-in, you can start the tool within the browser by clicking the icon.
2. Define the headers (see Figure 16-7) to specify the type of accepted responses from the
server and the message format for request from the client to the server (Content-Type).
Figure 16-8 RESTclient with response header, status code and curl command
3. Select the Preview tab in the Response section to view the formatted JSON response
from the API. The response contains session and user-related information from which we
are interested only in the sessionid key-value pair, which is highlighted in Figure 16-9.
The RESTclient displays the response status code 201 (created successfully) and the curl
command, as shown at the bottom of Figure 16-11, which accomplishes the same result.
16.4.1 Overview
You might want to start a backup of a single VM or a subset of available VMs, but not all VMs
that are assigned to a specific SLA. This backup can be achieved by using the GUI and
selecting the wanted VMs or by running a suitable REST operation. The following use cases
show when a REST API-driven backup might be useful:
Use of the GUI is not an option because of large amounts of hypervisors and VMs, which
results in time-consuming GUI operations.
An immediate required backup is a frequently occurring task.
A backup of a VM is part of a customized and automated deployment workflow; for
example, a VM is created by using the hypervisors REST API or other deployment
techniques, and then it is added to a SLA at the IBM Spectrum Protect Plus Server by
using scripts/REST operations. Users might want to create a backup and potentially a test
restore or clone immediately as part of their deployment process.
Based on the client’s requirements, we demonstrate how to identify the required steps to
trigger an immediate VM backup by using REST commands. As the flow chart in Figure 16-12
on page 474 outlines, two main options are available to identify the REST endpoints or URIs,
the suitable methods, and input and return values:
The API endpoints are described in the API documentation.
The IBM Spectrum Protect Plus GUI is communicating to the back-end server by way of
REST calls (client side-started) and we can monitor the network traffic within the browser.
A browser’s development function is useful here because most modern browsers provide
such functions:
– Firefox calls them web developer functions (CTRL + SHIFT + E).
– Chrome provides the inspect (CTRL + SHIFT + I) function.
– In Microsoft Edge, select More Tools → Developer tools (F12).
As we demonstrate next, the browser inspect method is helpful because it helps to identify
not only the wanted API endpoint, but also the real information about action, input
parameters, and their values, and the API response status codes and API request
responses in JSON format.
After the network monitoring tool is started, return to the IBM Spectrum Protect Plus GUI and
start a backup job for one or two VMs without running the entire SLA, which backs up all
assigned VMs and not only a subset.
Select Manage Protection → Hypervisors → VMware and choose the wanted vCenter and
the VMs. Before clicking Run, switch to the Web Developer window and clear the content.
As shown in Figure 16-14, the three functions are highlighted in red: clear, pause network
recording, and the Network tab. After the backup is started from the GUI, the Networking
monitoring window shows one or more entries. We are interested in the line with the API
operation to the request the URL /ngp/hypervisor?action=adhoc.
When the specific line is selected, more information can be obtained from the Header tab
(see Example 16-10) and the Params tab (see Example 16-11).
Example 16-10 Header tab shows the API operation POST and the API request URL
Request URL:https://spphost/ngp/hypervisor?action=adhoc
Request method:POST
From Example 16-10, we identified the required action (POST) and the request URL. From
Example 16-11, we determined the parameter names and their values that must be passed
with an API request within the request body, which is also referred to as data (in curl) or
payload (in Firefox). Although slaPolicyName (for example, Gold, Silver, and Bronze) and
subtype (vmware or hyperv) are self-explaining, the resource parameter is an array of one or
more custom-built URLs, one for each VM to be backed up.
In addition to the API URL and the method, we identified that we must pass more information
with the API operation POST as data. This information can be captured during tracing of the
network traffic with the web developer (see Figure 16-14).
The more complex resource parameters are built upon the API endpoint, which includes the
hypervisor id and the unique id of the VM, as shown in Example 16-12.
In 16.4.3, “Python code overview” on page 476, we describe the basic steps to implement a
Python script that triggers a VM backup. The example does not reuse functions of the
sppclient Python package; instead, it uses the native request library. The code does not
implement command-line parsing for input parameters, such as vmnames to be backed up.
Outlook
In a productive implementation of such a Python script, the user might want to specify a list of
VMs by their names instead of using their unique ID or pass a comma-separated value list of
VMs to the script. The programmer must retrieve a list of hypervisors, then retrieve all VMs of
each hypervisor and iterate through the list of objects (list of VMs) to find the wanted VM by its
name. From hereon, it is possible to use the objects VM ID to build the resource string.
These extra steps make such a script much more comfortable and dynamically usable.
However, because we are intending to introduce the basic steps to achieve a task over the
introduction of Python programming techniques, we are keeping the functions as simple as
possible.
Although the log in function in Example 16-13 is responsible to retrieve the sessionid by way
of a PUT request operation, the logout function in Example 16-14 on page 477 invalidates
the sessionid by sending a DELETE operation to the API URL /api/endeavour/session.
The sessionid and its value are reused as parameters in HTTP headers throughout this
script until the session is stopped at the end of the script. Each request returns a request
status code that can be evaluated to determine whether the operation was carried out as
expected.
urllib3.disable_warnings(urllib3.exceptions.InsecureRequestWarning)
username = 'restapiuser'
password = getpass.getpass()
host = "https://spphost:443/"
session = requests.Session()
sessionid = responseJson['sessionid']
if (responseCode != 200):
print("request not successful. responseCode: " + responseCode)
sys.exit(1)
else:
return sessionid
Although the log-in function that is shown in Example 16-13 on page 476 expects a return
value of 200 for a successful authentication, the log-out function that is shown in
Example 16-14 is expecting a response return code of 204 for successful DELETE operation.
For a list of REST API response codes, see 16.6, “API response code” on page 485.
def logout(sessionid):
if (responseCode != 204):
print("request not successfull. responseCode: " + str(responseCode))
sys.exit(1)
else:
print("\nLogout successful")
To query information from the API, the query_endpoint function is updating the header with
the new sessionid so that the specification of username and password is no longer required.
Also, the function is sending a request GET command to the specified URL. The
listHypervisors function that is show in Example 16-15 is querying the API for a list of
hypervisors and evaluating the response. The response contains the response status code
and the response to the request in JSON format.
If the response.status_code returns 200 for a successful operation, the JSON response is
stored in the responseJson variable. With Python, we can easily access the objects and
variables by referencing them by their name. From a query of the endpoint/api/hypervisor with
curl, we identified the structure of the returned JSON starting and determined that the
response contains an array that is called hypervisors, which can be directly accessed by
using hypervisorList=responseJson['hypervisors']. Inside the loop for each hypervisor,
one line is printed with only selected attributes (here, the id and name).
def listHypervisors(sessionid):
endpoint = "/api/hypervisor"
response = query_endpoint(sessionid, endpoint)
if response.status_code == 200:
print()
hypervisor_fmt = " {:<5.5s} | {:<30.30s}"
print(hypervisor_fmt.format("ID", "Hypervisor Name"))
print("-" * 40)
responseJson = response.json()
hypervisorList = responseJson['hypervisors']
After the first functions are defined, we call the functions from the main function (see
Example 16-16). We modify the main function while the script capabilities expand.
Example 16-16 Add main function and sample code to retrieve all registered Hypervisors
def main():
sessionid = login()
listHypervisors(sessionid)
logout(sessionid)
if __name__ == "__main__":
main()
When the script is started, the user is prompted to provide the user password. The username
restapiuser and the server hostname spphost are hardcoded in this script. The function from
Example 16-15 on page 477 generates the list that is shown in Example 16-17. In a later
step, we reuse a hypervisor’s ID to retrieve a list of all VMs that are registered to the
hypervisor.
ID | Hypervisor Name
----------------------------------------
1001 | vcenter-b.escc.workshop
1002 | vcenter-a.escc.workshop
1003 | vcenter-c.escc.workshop
Logout successful
To get a list of VMs for a specified hypervisor (by ID), a new endpoint URL is created. As
shown in Example 16-18, we query hypervisor vcenter-b.escc.workshop, which results in the
API URL: /api/hypervisor/1001/vm.
for vm in responseJson['vms']:
print(vmlist_fmt.format(vm['id'], vm['name'], str(vm['hypervisorManagementServerID'])))
With the function parameters sessionid and hypervisorID=1001, the list that is shown in
Example 16-19 is generated from the function listVMs.
As shown in Example 16-20, we define the function startBackup where we specify the
endpoint to trigger the backup /ngp/hypervisor?action=adhoc and create the other
parameters that must be specified as data of the HTTP POST operation. The most complex
part is the definition of the resource array that contains one or more API URLs, one for each
VM to be backed up.
endpoint = "/ngp/hypervisor?action=adhoc"
url = host + endpoint
resource=[]
requestHeaders = {'Accept': 'application/json', 'Content-type': 'application/json'}
requestHeaders.update({'X-Endeavour-Sessionid': sessionid})
for vm in vmsToBackup:
vmresource = 'https://10.0.250.41/api/hypervisor/' + vm['hypervisorId'] + "/vm/" + vm['vmid'] + "?from=hlo"
resource.append(vmresource)
Each resource element is built form the API endpoint for hypervisors plus the hypervisor ID
and the VM ID, followed by the HTTP parameter ?from=hlo. We can search through two
primary catalogs in IBM Spectrum Protect Plus: recovery and hlo. Recovery shows resources
that were been backed up and are available for restore. The hlo catalog lists resources that
were inventoried from various registered providers. Example 16-21 shows a valid resource
that is based on Example 16-20.
Example 16-22 Python code: Updated main function with list of VMs to back up
def main():
sessionid = login()
#listHypervisors(sessionid)
#listVMs(sessionid, 1001)
vmsToBackup=[]
vmsToBackup.append({'vmid':'1bebb22a3857d152c364c67579be380c','hypervisorId':'1001', 'subtype':'vmware'} )
vmsToBackup.append({'vmid':'a25b9e25c02b3db9dd0cfe4f1f514ffd','hypervisorId':'1001', 'subtype':'hyperv'} )
logout(sessionid)
After the code that is shown in Example 16-22, the output looks similar to the output that is
shown in Example 16-23. The script ran twice. Although the first run was successful, the
second run failed with status_code 404 because an SLA Policy of the same type (Silver) is
still running. Only one job per SLA can be started at the same time.
Logout successful
py backupVM.py
{"subtype": "vmware", "slaPolicyName": "Silver", "resource":
["https://10.0.250.41/api/hypervisor/1001/vm/1bebb22a3857d152c364c67579be380c?from=hlo",
"https://10.0.250.41/api/hypervisor/1001/vm/d42842a87ba64c15b13f535986a240a5?from=hlo"]}
response JSON:{"statusCode": 404, "response": {"rc": "Failed to run an already running SLA Policy \"Silver\""}}
Logout successful
The client is provided AS-IS without guarantee to run and with no support. The project is a
collection of scripts as part of the module sppclient with more than 20 examples for SPP
REST API scripts written in Python.
The integration of the sppclient project eases interaction with SPP’s REST API and is
intended for testing, monitoring, and automation. The module is registered in the Python
Package Index (PyPI) and can be installed with all other module requirements by running the
pip install sppclient command.
For various aspects in the day-to-day business of using IBM Spectrum Protect Plus, the
REST API can be helpful to simplify and automate repeating tasks and monitoring activities.
The sppclient project is a convenient and easy way forward to implement script-based
solutions for IBM Spectrum Protect Plus.
Note: The sppclient with it’ sample scripts is provided as-is without support or guarantee
to run error free. The sppclient is provided for demonstration purposes of REST API
capabilities with Python and is not an official IBM tool nor the development of more scripts
part of product plans. The sppclient and the sample scripts are built by users, testers, and
developers to fulfill their needs for testing and monitoring.
Although can contribute to the project if you developed your own solutions that are based
on the sppclient module, do not expect active issue tracking, development, or bug fixing.
We attach a list of script names while we introduce a subset of the list (highlighted in bold in
the following list) with some other information. Most of the scripts are self-explaining by their
script name or include a small help section that describes the purpose of the script.
The following sample scripts were implemented and made available in the GitHub repository:
appassigntosla.py
vmwaretestrestore.py
createslapolicy.py
deletesite.py
filerestore.py
get_alerts.py
get_sessions.py
getJSON.py
joblist.py
registerhypervisor.py
registervsnap.py
runjob.py
spplogcollect.py
sppvmbackupinfo.py
sqladhocbackup.py
sqlcopies.py
sqlrestore.py
storageList.py
systemInfo.py
appassigntosla.py
Use this script to assign one or more databases to an SLA policy. A comma-separated list of
database names along with the wanted SLA name must be specified. The names are
case-sensitive.
Syntax
Usage: appassigntosla.py [options]
Options:
-h, --help show this help message and exit
--user=USERNAME SPP Username
--pass=PASSWORD SPP Password
--host=HOST SPP Host, (ex. https://172.20.49.49)
--type=TYPE Application type: sql, oracle or db2
--dbs=DBS Database name(s) (comma seperated)
--sla=SLA SLA Policy Name
Example
python appassigntosla.py --user=restapiuser --pass=pass4AP! --host=https://10.0.250.41:443 --type=sql
--sla=Bronze --dbs="ESCC",”SQL_ITSO”
get_alerts.py
The intention of this script is to provide a command-line equivalent to the alert message
display in the GUI. Various optional parameters can be specified to filter by timeframe,
acknowledged state, and alert type, along with an optional full text search. The script shows
only alerts and not job-related messages (check get_messages.py).
Syntax
Usage: get_alerts.py [options]
Options:
-h, --help show this help message and exit
--user=USERNAME SPP Username
--pass=PASSWORD SPP Password
--host=HOST SPP Host, (ex. https://172.20.49.49)
--type=TYPE type of alert: ERROR or WARN (optional)
--ack=ACK acknowledged: True or False (optional)
--sort=SORT sort order: DESC or ASC (optional)
--timeframe=TIMEFRAME specify how many hours to look backwards: [int] (optional)
--search=SEARCH search within the alert message text (optional)
Example
python get_alerts.py --host="https://spphost" --user=restapiuser --pass=pass4AP! --type=warn --search=low
-----------------------------------------------------------------------------------------------------------------
2019-07-04 16:43:59 | WARN | True | 10.0.250.48 (Vsnap): free disk space 19,370 MB (18.92% free) lower than
threshold 20%.
getJSON.py
The getJSON.py script is a simple Python script to query the IBM Spectrum Protect Plus
REST API endpoints with GET operations. It is similar to what a user can do by using curl
commands. However, the script provides some advantages over curl.
The getJSON.py handle the session (log in and log out) for the user; by using curl, a
sessionid must be retrieved first and passed along in all GET operations in the headers. Also,
the getJSON.py script generates a pretty-formatted output or an unformatted output (raw). It
implements a verbose option that then also includes HATEOAS information, such as
discoverable links.
The script is helpful if a user is evaluating the REST API responses step by step and might
want to apply more commands, such as grep or jq for filtering of key-value-pairs or to identify
the structure of the JSON formatted response for more programming.
The script provides another parameter that is intended for API discovery during script
programming. When the user specifies the -a parameter, the --host, --user, and --pass
parameters are obsolete because this information is stored in a file that is called auth.txt.
The structure and content of the file are shown in Example 16-24.
Syntax
Usage: getJSON.py [options]
Options:
-h, --help show this help message and exit
--user=USERNAME SPP Username
--pass=PASSWORD SPP Password
--host=HOST SPP Host, (e.g. https://172.20.49.49)
--endpoint=URL, --url=URL
API endpoint, e.g. --endpoint="api/site/{siteID}"
--filter=FILTER optional, filter as JSON, e.g.:
[{"property": "type", "op": "=", "value": "WARN"}]
--sort=SORT optional, sort as JSON, e.g.: [{"property": "name", "direction": "DESC|ASC"}]
--pagesize=PAGESIZE optional, number of max results
-v verbose information, incl. links objects
-a use file with host address and user credentials, use exclusivly to user, pass, and host
-r do not format JSON, display RAW message
Example
The following example demonstrates the use of the -a flag. Because the -v (verbose)
parameter is not specified, the HATEOAS information is not included in the output.
The server returns only one site object in the response while more sites are defined. The total
number of objects in the sites list "total": 5.
The simple example demonstrates how to query the API and gives the user or programmer
an idea of the JSON response and its structure. This information is useful if the objects and its
members are accessed; for example, in Python code.
Endpoint: https://10.0.250.41/api/site
restURL: https://10.0.250.41/api/site?pageSize=1
{
"page": 1,
"sites": [
{
"defaultSite": true,
"description": "Primary Site",
"id": "1000",
"name": "Primary",
"rbacPath": "root:0/site:0/site:1000",
"throttles": null
}
],
"total": 5
}
systemInfo.py
This script is inspired by the IBM Spectrum Protect command query system and intends to
provide an at-a-glance overview of system and storage utilization, health, and database
backups.
Example
py systemInfo.py -a
==================================================
SPP Server information:
==================================================
cpuUtil : 20.99
memory_size : 47.01
memory_util : 0.62
compressionRatio : 1.94
deduplicationRatio : 1.36
sizeFreeAllStorage : 841.15
sizeTotalAllStorage : 962.55
sizeUsedAllStorage : 121.40
unavailable : 1
==================================================
filesystems: 4
==================================================
==================================================
catalog backups (backup, replication & offload)
==================================================
jobName : catalog_SPP-backup
status : COMPLETED
duration : 0:04:10
results : COMPLETED
start : 2019-04-04 07:00:00
end : 2019-04-04 07:04:10
nextFireTime : 2019-04-04 12:00:00
vmwareadhocbackup.py
This script can be used to trigger an ad hoc backup of a VM by specifying the VM’s name.
The sla parameter is optional and required only if the VM is assigned to more than one SLA.
Syntax
Usage: vmwareadhocbackup.py [options]
Options:
-h, --help show this help message and exit
--user=USERNAME SPP Username
--pass=PASSWORD SPP Password
--host=HOST SPP Host, (ex. https://172.20.49.49)
--filter=FILTER Filter for unique datacenter, cluster or folder name in case VM name is not unique (optional)
--vm=VM VM Name
--sla=SLA SLA policy to run if VM is assigned to multiple
Example
python vmwareadhocbackup.py --user=restapiuser --pass=pass4AP! --host=https://10.0.250.41:443
--vm="t4-vm-win-sklm1" --sla="Silver"
201 Created A new resource was created successfully. The resource’s URI is
available from the response’s Location header.
400 Bad Request The request was malformed. The response body includes an error
that provides more information.
403 Forbidden Generally related to permissions through Role Base Access Control.
503 Service Unavailable Too many requests are going to the same controller.
The publications that are listed in this section are considered particularly suitable for a more
detailed discussion of the topics that are covered in this paper.
IBM Redbooks
The following IBM Redbooks publication Protecting the VMware Environment with IBM
Spectrum Protect, REDP-5252, provides more information about the topic in this document.
This publication might be available in softcopy only.
You can search for, view, download, or order this document and other Redbooks, Redpapers,
Web Docs, draft, and additional materials, at the following website:
ibm.com/redbooks
Online resources
The following websites are also relevant as further information sources:
Featured Documents for IBM Spectrum Protect Plus:
https://www.ibm.com/support/pages/featured-documents-ibm-spectrum-protect-plus
IBM Spectrum Protect Plus BluePrints:
https://ibm.biz/IBMSpectrumProtectPlusBlueprints
IBM Knowledge Center:
https://www.ibm.com/support/knowledgecenter/en/SSNQFQ/landing/welcome_ssnqfq.ht
ml
IBM Spectrum Protect Plus Support:
https://www.ibm.com/mysupport/s/topic/0TO50000000IQWtGAO/spectrum-protect-plus?
language=en_US&productId=01t50000004uZGc
IBM Spectrum Protect Plus - All Requirements Doc:
https://www.ibm.com/support/pages/ibm-spectrum-protect-plus-all-requirements-do
c
IBM Spectrum Protect Plus V10.1.x Update History:
https://www.ibm.com/support/pages/update-history-ibm-spectrum-protect-plus-v101
x
Download Spectrum Protect Plus 10.1.6.x:
https://www.ibm.com/support/pages/download-information-version-1016x-ibm-spectr
um-protect-plus
Download Spectrum Protect Plus 10.1.6x interim fixes:
https://www.ibm.com/support/pages/node/6254732
REDP-5532-01
ISBN 0738459194
Printed in U.S.A.
®
ibm.com/redbooks