TSP11G1 Course
TSP11G1 Course
TSP11G1 Course
IBM Training
2018 edition
NOTICES
This information was developed for products and services offered in the USA.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM
representative for information on the products and services currently available in your area. Any reference to an IBM product, program,
or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent
product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this
document does not grant you any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive, MD-NC119
Armonk, NY 10504-1785
United States of America
The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local
law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein;
these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s)
and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve as an
endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and use of those
websites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other
publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other
claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those
products.
This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible,
the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to
the names and addresses used by an actual business enterprise is entirely coincidental.
TRADEMARKS
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many
jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM
trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems
Incorporated in the United States, and/or other countries.
Cell Broadband Engine is a trademark of Sony Computer Entertainment, Inc. in the United States, other countries, or both and is used
under license therefrom.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and
Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
IT Infrastructure Library is a Registered Trade Mark of AXELOS Limited.
ITIL is a Registered Trade Mark of AXELOS Limited.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
Linear Tape-Open, LTO, the LTO Logo, Ultrium, and the Ultrium logo are trademarks of HP, IBM Corp. and Quantum in the U.S. and
other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries,
or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Uempty
Unit 2 Installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Lesson 1 Install IBM Spectrum Protect Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Obtaining the IBM Spectrum Protect Virtual Appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-5
Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
VMware installation example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-7
IBM Spectrum Protect installation steps - example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Specify the location and name of the template file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Name your virtual machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10
Choose a datastore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-11
Provision disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-12
Select networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-13
Specify network properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
Start deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Start up and document your virtual machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-16
Manual configuration of network and IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-17
Uploading the product key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18
Sign on to IBM Spectrum Protect Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-19
Lesson 2 Add vSnap storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20
Backup storage – vSnap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-21
vSnap Server deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22
Add vSnap storage user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-23
Register a backup storage resource . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-24
Work with disk storage resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-25
Add disks to expand storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-26
Manage vSnap using the command line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-27
Console and vSnap updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-28
Perform update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-29
Update process completion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-30
Remote vSnap server update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-31
Lesson 3 Configure a VADP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-32
VADP proxy introduction and requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-33
Install a VADP proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-34
Set VADP proxy options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-35
Use proxies for backup jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36
VADP proxy update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-37
Lesson 4 Configure SLA policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-38
Default policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-39
Add a new SLA Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-40
Edit existing SLA Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-41
Unit glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-42
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-43
Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-44
Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-45
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-46
Exercise introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-47
Uempty
Unit 3 Data protection for virtual machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Unit objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Lesson 1 VMware backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Virtual machine backup introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Add a VMware provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-6
Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
VMware backup source selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
VMware backup selection using tagging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Backup options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-11
VMware backup workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12
File metadata indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
File indexing requirements - Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
File indexing requirements - Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-15
File indexing backup metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-16
Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
VMware restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
VMware restore modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-19
VM restore recovery points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-20
VM restore destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
VM restore network settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-22
Test mode restore workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Restore an individual file to a virtual machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
File restore options and destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Lesson 2 Hyper-V backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-26
Hyper-V provider registration prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-27
Register a Hyper-V provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
Hyper-V backup management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29
Hyper-V backup workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-30
Hyper-V restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-31
Hyper-V restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-32
Monitoring jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-33
Unit glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-34
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-35
Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-36
Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-37
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-38
Exercise introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39
Uempty
Privileges on the SQL server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9
Register your SQL Server provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Inventory and test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11
Create a SQL server backup job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-12
Enabling log backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
Block level backups of SQL databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
SQL restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-15
Restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-16
Advanced options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-17
SQL Server system DB recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-18
Lesson 3 Oracle database protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-19
Users and permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20
Add an Oracle provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-21
Create an Oracle backup job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-22
Create an Oracle restore job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-23
Oracle recovery options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Advanced job definition options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-25
Lesson 4 Db2 database protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-26
Supported platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Db2 prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-28
Add a Db2 provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
Create a Db2 backup job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-30
Select SLA policy and options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Create a Db2 restore job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Db2 restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-33
Recovery options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-34
Unit glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-35
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-36
Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37
Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-38
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-39
Exercise introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-40
Uempty
SLA Policy settings for vSnap replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-16
Recovery from replicated copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-17
Lesson 3 Offload options and setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18
Offloading data from IBM Spectrum Protect Plus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-19
Offloading process methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
Link IBM Spectrum Protect Plus to IBM Spectrum Protect for offload . . . . . . . . . . . . . . . . . . . . . . . . . 5-21
Restore operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22
Lesson 4 Catalog backup and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-23
Run and manage the offload process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-24
Catalog backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-25
Restore the IBM Spectrum Protect Plus catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
Catalog restore options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27
Pause and release schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-28
Unit glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-29
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-30
Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-31
Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-32
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-33
Exercise introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-34
Uempty
Protected VMs reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-29
Protected databases report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-30
VM Backup History report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-31
Custom reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-32
Locate and run a custom report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-33
SMTP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-34
View and download reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-35
Lesson 4 Log files and support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-36
Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-37
Download as csv . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-38
Download System Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-39
Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-40
Log retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-41
The IBM Spectrum Protect Plus Administrative Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-42
IBM Spectrum Protect Admin Console actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-43
Unit glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-44
Unit summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-45
Review questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-46
Review answers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-47
Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-48
Exercise introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-49
Uempty
Course description
Details
Delivery method Classroom or instructor-led online (ILO)
Course level ERC 1.0
This course is a new course.
Product and version IBM Spectrum Protect Plus 10.1.2
Recommended 2 days
duration
Skill level Intermediate
Uempty
Course overview
In this two-day course, you learn how to install, configure and administer IBM Spectrum Protect Plus
v10.1.2. You begin with a review of the software capabilities, requirements, and architecture. Then,
through lecture and hands-on labs, you learn how to perform the various tasks required to configure the
environment on an installed virtual appliance. You customize SLA policy, and make use of available
options to protect virtual machines and applications, as well as the IBM Spectrum Protect Plus catalog.
You monitor and manage jobs, plan and prepare for disaster recovery, generate and view log files, and
create custom reports.
Course overview
Uempty
Course prerequisites
• Experience with protecting applications and virtual machines
• A basic understanding of IBM Spectrum Protect
• Familiarity with Windows and Linux operating systems
Course prerequisites
Uempty
Course objectives
• Describe the features and functions, and use the sizer tool
• Install and configure the server, vSnap, VADP proxy, and configure SLA Policy
• Protect and recover virtual machines
• Protect and recover applications
• Configure replication for protecting vSnap and disaster recovery
• Perform daily operations, maintenance, and create custom reports
Course objectives
Uempty
Agenda: Day 1
• Course introduction
• Unit 1: IBM Spectrum Protect Plus introduction
Exercises: Overview and Architecture
• Unit 2: Installation and configuration
Exercises: Installation and configuration
• Unit 3: Data protection for virtual machines
Exercises: Protecting virtual machines
Agenda: Day 1
Uempty
Agenda: Day 2
• Unit 4: Data protection for applications
Exercises: Protecting applications
• Unit 5: Replication and disaster recovery
Exercises: Disaster Recovery
• Unit 6: Daily operations, reporting, and maintenance
Exercises: Operations and troubleshooting
Agenda: Day 2
Uempty
Introductions
• Name
• Company
• Where you live
• Your job role
• Your current experience with the products and technologies in this course
• Do you meet the course prerequisites?
• What you expect from this class
Introductions
Uempty
Class logistics
• Course environment
• Start and end times
• Lab exercise procedures
• Materials in your student packet
• Topics not on the agenda
• Evaluations
• Breaks and lunch
• Outside business
• For classroom courses:
Lab room availability
Food
Restrooms
Fire exits
Local amenities
Class logistics
This unit provides an introduction to IBM Spectrum Protect Plus features and functions. You learn
about the architecture, and how to use the blueprints and sizer to customize your implementation.
Uempty
Unit objectives
When you complete this unit, you can perform the following tasks:
• Describe the use case for IBM Spectrum Protect Plus
• List the features and functions
• Describe the architecture
• Review the requirements
• Reference the Blueprints
• Use the sizer tool
Unit objectives
Uempty
Topics
• Lesson 1: Introduction to IBM Spectrum Protect Plus
• Lesson 2: Components
• Lesson 3: Architecture and sizing
Topics
Uempty
Lesson 1 Introduction to IBM Spectrum Protect
Plus
This lesson is an introduction to IBM Spectrum Protect Plus and how it was designed to provide
modern data protection and data reuse for virtual machines and applications.
Uempty
The backup and recovery solution for virtual machines and applications
IBM Spectrum Protect Plus is a modern data protection solution for your virtual machines and
applications. It supports:
• Virtual machines:
• VMware
• Hyper-V
• Database applications:
• Oracle
• SQL
• Db2
The backup and recovery solution for virtual machines and applications
IBM Spectrum Protect Plus is the newest addition to the Spectrum family of products, and is
designed to be easy to implement and use. It is designed to help you create automated,
policy-driven jobs, to automate the protection of your virtual machines and applications.You can use
the link provided to get a free 30-day trial.
Uempty
IBM Spectrum Protect Plus is designed to be easy to deploy and easy to manage. It is deployed as
an appliance and can be up and running in under an hour. The default policies allow you to
immediately associate a virtual machine or application with a level of protection and automate the
backup process. Because it is application aware, the options for each type of protection job is
specific to the requirements for that application. The appliance comes with a virtual vSnap storage
server, but you can implement it with physical storage as well. The scalable architecture allows you
to add multiple sites and storage devices, and with the integration to IBM Spectrum Protect, this
expands the capabilities for retention to include a wide variety of devices.
Uempty
IBM Spectrum Protect and IBM Spectrum Protect Plus are combined to create the most
comprehensive, secure, data management and reuse solution on the market. IBM Spectrum
Protect Plus provides agentless backups in the form of snapshots. These snapshots can be used
for recovery, but also can be staged for various testing purposes, devops, analytics, and so forth.
Integration with IBM Spectrum Protect provides additional retention capabilities to ensure
regulatory compliance and provide off-site copies for disaster recovery. We use incremental forever
backup methodology, deduplication and compression to reduce the amount of data you store, and
encryption to secure it all.
Uempty
• Through the SLA Policy, you can offload snapshots to IBM Spectrum Protect server storage.
• IBM Spectrum Protect offload provides:
• Long-term granular control of retention
• Recovery from offloaded copy
• Data movement capabilities in IBM Spectrum Protect allow you to move the data to a wider variety of
devices and media, including cloud and tape.
• You can also replicate data to a second vSnap server to provide protection for the primary
• Replication provides:
A secondary copy to protect the primary vSnap data in case of hardware failure
A secondary copy you can use for virtual machine or application data recovery
IBM Spectrum Protect Plus provides additional recovery options to ensure your data is recoverable.
This includes not only the offload to IBM Spectrum Protect, but also the ability to replicate the data
in the local vSnap server to a vSnap server at a second site. This ensures that if your primary
vSnap is unavailable, you can point to the remote vSnap to recover your data.
Uempty
Role-based access control, also referred to as RBAC, allows you to control user access to IBM
Spectrum Protect Plus. A user can be limited to only specific resources, and further restricted to
specific actions on those resources, as determined by the permissions you set.
You also create identities to allow access to the systems that you are backing up, where necessary.
These are created separately, and are required when you set up jobs to run backup and recovery
operations.
Uempty
• Gold
• Silver DEFAULT
• Bronze
• Custom
You can build your own
policies to meet your
Service Level Agreement
(SLA)
IBM Spectrum Protect Plus comes with a set of three basic policies, gold, silver, and bronze. Each
job you create is associated with a policy that controls the snapshot frequency and retention. This
automation out of the box makes it easy to start protecting data right away. You can also create
custom SLA policies as needed.
Uempty
• Benefits:
Global reach
Seamless integration
Rapid provisioning
Simplification
Flexible
Single management console
• More information:
https://www.ibm.com/support/knowledgecenter/SSNQFQ/landin
g/welcome_ssnqfq.html
IBM Knowledge Center link:
https://www.ibm.com/support/knowledgecenter/SSNQFQ_10.1.
2/spp/c_spp_cloud.html
We also have IBM Spectrum Protect Plus on IBM Cloud with different options to available to meet
your data recovery and redundancy requirements. IBM Spectrum Protect Plus can be deployed on
site in your own data center or in the IBM cloud as a service.
Blueprints and tools are available to help you get started using either deployment methodology.
IBM Spectrum Protect Plus on IBM Cloud provides a global reach to expand your hybrid cloud
footprint to up to 30 enterprise-class IBM Cloud datacenters around the world. This provides
seamless integration across your hybrid cloud with IBM Cloud infrastructure. You can rapidly
provision an enterprise-class VMware environment with on-demand IBM Cloud Bare Metal Servers
and virtual servers by using automated deployment configuration of the VMware environment.
IBM Spectrum Protect Plus on IBM Cloud provides a simplified VMware cloud platform you can use
without identifying, procuring, deploying, and managing the underlying physical compute, storage,
and network infrastructure, or software licenses. You can manage your VMware workloads based
on your business needs.
Using a single console, you can deploy, access, and manage the VMware environments on IBM
Cloud.
Uempty
Lesson 2 Components
Lesson 2: Components
In this lesson you review the components that are provided as part of the IBM Spectrum Protect
Plus appliance, and how they function together.
Uempty
Components
Software packages or appliances include:
• IBM Spectrum Protect Plus software
Web-based GUI, scheduler, catalog engine
Typically one per environment
Virtual machine
• vSnap storage server
Storage server repository for snapshots
One or more per environment
Virtual or physical
• VADP Proxy
Shifts processing load off the host for VMware environments
One or more per environment
Virtual or physical
Components
IBM Spectrum Protect Plus software is packaged as an appliance. There are three parts to this
package. First is a virtual machine that contains the web-based GUI, a scheduler, and the catalog
engine. You need one per environment. Next, you have the vSnap storage server, which is the
repository for your stored data. The package includes a virtual vSnap, but you can implement with a
physical vSnap, and can also add additional vSnap servers. You need at least one per
environment. Finally, you have the VADP Proxy, which is required for VMware environments, and
runs on Linux. This too, can be physical or virtual, and you use one or more per environment.
Uempty
Dashboard navigation
• Navigate primarily using the navigation tree on the left side of the GUI
• Each top level menu section expands to a menu tree
• Menus provide wizards to guide you through various administrative tasks
• All access is controlled using RBAC
• The dashboard includes various links inside the pages, and filters to customize various views
Dashboard navigation
The web-based GUI is used to manage IBM Spectrum Protect Plus. The navigation menu on the
left side of the GUI is grouped into expandable sections to provide access to various management
menus and utilities. The Dashboard view is grouped into several sections. The Job Status section
provides an overall status of data protection. You can see at a glance if there are jobs failing and
can filter the view as needed. The view is dynamically changed, depending on your criteria.
Uempty
Farther down the Dashboard view is the Job Status Over Time section. This provides another view
of the status that fills in as your begin running jobs. This pane displays information about the status
of those jobs and allows you to quickly see if you need to address any issues. Data points provide
additional information and access to logs for problem determination.
Uempty
At the bottom of the Dashboard, there is information on capacity. This helps you keep track of how
much space you are using, if your storage devices are filling up, and how much savings you are
getting from any data reduction techniques that are being used, such as deduplication and
compression. The link at the bottom of the page takes you to the backup storage page so you can
access more detailed information.
Uempty
• Scheduler
IBM Spectrum Protect has a built-in scheduler
Jobs are scheduled for:
í Protecting virtual machines and applications
í Protecting the catalog
í Running inventory
í Performing cleanup activities
Schedules can be held and released through the
associated job
IBM Spectrum Protect Plus uses a catalog to track storage inventory, and for indexing virtual
machine snapshots. Inventory jobs run to update the catalog with the latest information about the
environment and data recovery points. The catalog must be backed up to ensure recoverability. The
scheduler is built in and is used for all job scheduling through SLA Policy. To keep a schedule from
running during maintenance, for example, you can pause and release the job.
Uempty
The vSnap storage server is used as the primary backup destination for all of your snapshots.
When you initially set up the appliance, a default vSnap with the name vSnap-Default is
automatically installed. You add more vSnap storage servers, virtual or physical, to size the storage
up to the capacity you require.
Uempty
Another component that is optional for use in running jobs to protect VMware virtual machines is
the VADP proxy. VADP proxies are used for load balancing the backup process to reduced the load
on the IBM Spectrum Protect system resources. The more proxies you use, the faster the jobs run.
The VADP proxy runs on Linux.
Uempty
Lesson 3 Architecture and sizing
In this lesson, you learn about how the components work together. This includes a review of the
blueprints that are provided to guide you in implementing the product, as well the sizing tool to help
you appropriately size the environment for your data storage requirements.
Uempty
Data movement
Virtual Machines and Applications
Spectrum Policies
Hypervisors Protect Plus Catalog
API Calls
Storage Server Storage
Block-level Spectrum Protect Plus Spectrum Protect Plus
incremental forever vSnap Storage Manager Asynchronous data replication vSnap Storage Manager
backup
Databases
Scalable Storage Pool Scalable Storage Pool
Restore to
production
Disk Tape
Copy to IBM
Spectrum Test/Dev DevOps Reporting Analytics Operations
Protect
Cloud Object
Data Reuse
21 © Copyright IBM Corporation 2018
Data movement
This chart shows how data moves through each component and give high-level view of the
architecture. The process shows the following data movement:
1. IBM Spectrum Protect plus uses API calls to initiate backup jobs.
3. This snapshot can be asynchronously replicated to a second vSnap storage server to protect
the primary vSnap, and provide a secondary source for recovery.
4. The snapshot in the vSnap storage can be mounted for recovery or reuse.
5. The snapshot can be offloaded to IBM Spectrum Protect for long term storage.
6. The vSnap storage copy of the snapshot is used for your primary recovery point for restore to
production.
Uempty
Requirements
IBM Spectrum Protect Plus virtual appliance Virtual Machine Configuration
Before deploying to the host, ensure you have the following: For initial deployment, configure your virtual machine to be a
• The correct OVF template, which has an OVA extension, 64-bit eight core machine with 48 GB of memory minimum
and is approximately 1.4 GB for VMware or the Hyper-V Port Requirements
zip (SPP-{release}) file that requires 8 GB of free space Refer to the User’s Guide for an extensive list and a diagram
when unzipped showing communication paths managed by IBM Spectrum
• vSphere 5.5, 6.0, or 6.5 or Microsoft Hyper-V Server 2016 Protect Plus
• Network information and VMware/Microsoft host VMware Requirements
information • vSphere 5.5 and later
• An available static IP address or access to DHCP • vSphere 6.0 and later
Disk Sizing Requirements • vSphere 6.5 and later (including vSphere 6.7)
The appliance has three virtual disks that total 400 GB of Ensure that the latest version of VMware Tools is installed in
storage your environment. IBM Spectrum Protect Plus was tested
• 50 GB - OS and application (includes 16 GB for the swap against VMware Tools 9.10.0
partition + 256 MB for the boot partition) Hyper-V Requirements
• 100 GB - Configuration data related to jobs, events, and Microsoft Hyper-V
yp Server 2016
logs
Always check online documentation (including technotes) for
• 250 GB - On-board vSnap server (Inventory data)
the latest list of requirements:
https://www.ibm.com/support/knowledgecenter/SSNQFQ_10.1.
2/spp/c_spp_system_reqs.html
22 © Copyright IBM Corporation 2018
Requirements
Requirements are listed for the host, as well as for the virtual machine configuration. There is an
extensive list online that describes the port requirements as well. Always check online for the latest
requirements before you begin an implementation.
Uempty
IBM provides a set of blueprints and a sizer to help you implement your IBM Spectrum Protect Plus
environment. The blueprints describe various scenarios with two or more sites, as well as
instructions on using the sizing tool. The blueprint documentation provides guidance on choosing
the appropriate technologies, and hardware. This includes decisions on what kind of RAID (6) is
preferred, use of compression, deduplication, replication and other considerations for use. You also
look at the use of physical versus virtual vSnap servers, and the advantages of each, plus much
more.
Uempty
vCenter datacenter
datacenter
datacenter
vSnap server
vSnap server vSnap server
replication
This is an example referenced from the IBM Spectrum Protect Plus blueprints that shows a two-site
implementation.
When deploying to additional sites, you run operations for all locations from the primary site, where
the IBM Spectrum Protect Plus server is installed. You might choose to replicate from vSnap to
vSnap with both holding data for both sites, or you might want to have a dedicated vSnap on each
site that is just for storing replicated data from another source server. In either case, it is important
to size each site appropriately for the workload.
Uempty
Unit glossary
Review the key words and concepts for this unit:
• Role-based access control (RBAC)
• VSnap storage server
• VADP proxy
• Inventory
• Catalog
• Blueprints
• Sizing tool
Unit glossary
You should now be familiar with all of the key words and concepts for this unit.
Uempty
Unit summary
Now that you have completed this unit, you can perform the following tasks:
• Describe the use case for IBM Spectrum Protect Plus
• List the features and functions
• Describe the architecture
• Review the requirements
• Reference the Blueprints
• Use the sizer tool
Unit summary
Uempty
Review questions
1. True or False: IBM Spectrum Protect Plus supports offload to IBM Spectrum Protect.
2. Which of the following default SLA Policies is provided?
A. Gold
B. Platinum
C. Copper
D. Gold_offload
3. What type of storage can be used for vSnap repositories?
A. Tape
B. Object storage
C. Block
D. Blob
Review questions
Uempty
Review answers
1. True.
2. A. Gold
3. C. Block
Review answers
Uempty
Exercises
Uempty
Exercise introduction
In these exercises, you perform the following tasks:
• Log on to your lab environment
• Review the IBM Spectrum Protect Plus blueprints and online help
• Create a sizing using the sizing spreadsheet
Exercise instruction
In this unit, you learn how to install and configure IBM Spectrum Protect Plus virtual appliance, add
the vSnap storage, configure a VADP proxy, and set up SLA Policy.
Uempty
Unit objectives
When you complete this unit, you can perform the following tasks:
• Perform installation for Hyper-V and VMware environments
• Configure VADP proxy
• Add vSnap storage
• Configure policy based on a Service Level Agreement (SLA)
Unit objectives
Uempty
Topics
• Lesson 1: Install IBM Spectrum Protect Plus
• Lesson 2: Configure VADP proxy
• Lesson 3: Add backup storage
• Lesson 4: Configure SLA policy
Topics
Uempty
Lesson 1 Install IBM Spectrum Protect Plus
In this lesson, you review the process of installing the IBM Spectrum Protect Plus appliance.
Uempty
IBM Spectrum Protect Plus is only provided as a virtual appliance. The requirements vary
depending on how you plan to implement the product, and what you are protecting. There are
additional requirements for file indexing, use of a VADP proxy, and installation on physical or virtual
machines.
It is suggested that once you have downloaded the file, you run the MD5 checksum that is
provided, to ensure the software package is intact.
If you start with the try and buy version, you must obtain the license separately. The passport
advantage appliance includes the license file.
Uempty
Installation
• The installation of the appliance only takes about 10-15 minutes.
• To install IBM Spectrum Protect Plus in a VMware environment
You deploy an OVF template as a virtual appliance that includes the application, and is created on a VMware
host such as an ESX or ESXi server.
A local vSnap server that is pre-named and registered is also installed on the virtual machine.
• To install the IBM Spectrum Protect Plus in a Microsoft Hyper-V environment
You import a Hyper-V template which creates a virtual appliance that includes the IBM Spectrum Protect Plus
application on a Hyper-V virtual machine.
A local vSnap server that is pre-named and registered is also installed on the virtual machine.
• Refer to the installation steps as shown in your product version of the IBM Spectrum Protect Plus
Installation and User’s Guide.
Installation
Installation actually means deploying a template as a virtual appliance. The entire process,
regardless of the installation package, takes about 15 minutes. For larger production workloads, it
is recommended that you use a separate vSnap appliance, instead of the one you get with the
appliance.
Uempty
ISCSI
192.168.100.2
192.168.100.3
192.168.100.7 SAN
192.168.100.9
And so on…
NFS
In this class, the environment has been installed for you, so the upcoming series of slides provides
you with an overview of the installation process. In this example, the installation is for VMware. For
this installation you need a VMware vSphere client, the OVA file, a list of IP addresses (or DHCP
information), and a datastore with sufficient storage.VMware environments are installed using the
OVA file. An OVA file is a package that contains all the components of the virtual machine.
Uempty
You begin with the vSphere client and the deployment of the OVF template. If you are using a later
version of the vSphere Client, it might look slightly different than the example, but the steps are the
same. The screen shot shown is from the vSphere Client. Your version of VMware might also allow
you to deploy from the VSphere web client, so again, your steps might vary slightly. See your
specific VMware documentation for further details.
Uempty
Next you specify a location for the template file and accept the license agreement.
Uempty
Here you decide what to name your virtual machine, and where it will be located. When you name
the virtual machine, use a name that is meaningful for you, as this becomes the name of your IBM
Spectrum Protect Plus virtual machine.
Uempty
Choose a datastore
• Identify the datacenter, server, and
resource pool for deployment.
When prompted to select storage, select
from datastores that are already
configured on the destination host.
The virtual machine configuration file and
virtual disk files are stored on the
datastore.
• Select a datastore that is large enough
to accommodate the virtual machine
and all of its virtual disk files.
• Click Next.
Choose a datastore
Select a datastore for the deployment that has enough capacity for the IBM Spectrum Protect Plus
virtual machine and all of its virtual disk files. Use a different datastore for IBM Spectrum Protect
Plus than the one that contains the virtual machines you are protecting.
Uempty
Provision disks
• Select a disk format to store the virtual
disks.
Thick provisioning is preselected for
optimized performance.
í Thin provisioning requires less disk space, but
will impact performance.
í Thin provisioning changes the way the vSnap
server sees the amount of free space available
in the storage pool.
• Click Next.
Provision disks
Once you have selected a datastore, you choose a format to store the virtual disks. Disks that are
attached to vSnap servers must be thick provisioned. If disks are thin provisioned, the vSnap server
will not have an accurate view of free space in the storage pool, which might lead to data corruption
if the underlying datastore runs out of space. Thick provisioning is also recommended for best
performance.
Uempty
Select networks
• Select networks for the deployed
template to use.
Several available networks on the
ESX server may be available by
clicking Destination Networks.
Select a destination network that
allows you to define the
appropriate IP address allocation
for the virtual machine
deployment.
• Click Next.
Select networks
Select a network that is available for the IBM Spectrum Protect virtual machine to use. See your
VMware documentation for more information about virtual switches.
Uempty
Note that a default gateway must be configured properly before deployment. Multiple DNS strings
are supported, and must be separated by commas with no spaces.
The network prefix should be specified by a network administrator. The network prefix must be
entered using Classless Inter-domain Routing (CIDR) notation; valid values are between 1 and 32.
If you do not have access to a DHCP server and want to use a static IP address, assign a static IP
with the NetworkManager Text User Interface (nmtui).
Uempty
Start deployment
• Review your template deployment
selections.
• Click Finish to exit the wizard and
to start deployment of the OVF
template.
Start deployment
A final review page is provided for you to confirm your selections. Review all of the information
provided, then click Finish to start the deployment process.
Uempty
After you power on the virtual machine (from the vSphere client in this case) it takes some time to
start up the various components. Document the IP address of the newly created virtual machine.
You need the IP address to access the application. You can find the IP address in vSphere Client by
clicking your newly created virtual machine and reviewing the Summary tab.
Uempty
As noted in the installation process example, you can use NetworkManager TUI (NMTUI) to work
with network settings on the system if you plan to use a static IP address. This does require sudo
privileges. Note that IBM Spectrum Protect Plus has not been tested for IPv6 environments.
Uempty
Note: This is only required if you upgrade from the trial version.
18 © Copyright IBM Corporation 2018
Be sure to document the new password along with the other setup information.
Uempty
Now you can start using IBM Spectrum Protect Plus right out of the box. If you have trouble starting
the GUI, try clearing the browser history. If you find the GUI does not start, it might be because the
components are not all started yet. You can open the console and run the top command to check
the CPU utilization. When that settles down to a small percentage, as shown in the example, your
system should be ready for use.
Uempty
Lesson 2 Add vSnap storage
In this lesson, you learn how to add and configure a vSnap storage server, that is the repository for
storing your snapshots.
Uempty
IBM Spectrum Protect Plus only supports block storage for the vSnap storage server. Storage used
for the vSnap repository can be single disks, or protected with hardware RAID. IBM Spectrum
Protect Plus also supports software RAID.
Uempty
For each additional vSnap storage server that is not part of the appliance, you need to create a
vSnap user. You can do this using the console command line.
Uempty
The vSnap user credentials are used by Spectrum Protect Plus to access the storage. This is an
example of an id that is created and then added into identities.
Uempty
• Click Save
• vSnap is added to the Disk Storage
table
Existing user assumes you have created an Identity. You can do this in the Accounts menu Identity
page.
Uempty
Data is encrypted on write to vSnap repository, and data is decrypted on read from vSnap
repository. IBM Spectrum Protect Plus manages the keys for you. Notice that deduplication is
enabled at the storage pool level, so it is not enabled by default.
Enable Compression – Each incoming block of data is compressed using an algorithm before it is
written to the storage pool. Compression requires additional CPU resources.
Enable Deduplication – Each incoming block of data is hashed and compared to a record of
existing blocks in the storage pool, and only new or changed blocks are written. If compression is
enabled, the blocks are compared after data has been compressed. Deduplication is disabled by
default because it uses a significant of memory (proportional to the amount of data in the pool) to
maintain the deduplication table of block hashes.
Synchronous Write Mode – Disabling synchronous writes can lead to data loss and silent
corruption of backup data if the storage server experiences an abrupt shutdown or reboot during a
backup job. Do not disable this option unless the storage server resides in a stable environment
that is adequately secured against hardware and power failures.
Encryption Enabled – This option displays the encryption status of the vSnap server. Encryption
can only be enabled during vSnap initialization. This option is for informational purposes only.
Data is encrypted on write to the vSnap repository, and is decrypted on read from the vSnap
Repository. IBM Spectrum Protect Plus manages the keys for you.
Uempty
When you add new disks, the vSnap pool expands by the size of the disks that are added. This is
the only way to increase the storage pool size. You cannot expand existing disks, and removing or
migrating existing drives is also not supported. Protect your vSnap storage disk through some form
of RAID.
Uempty
Most tasks you need to perform in IBM Spectrum Protect Plus can be accomplished using the
web-based GUI. The command line, however, does provide some additional information on your
vSnap configuration. See the IBM Spectrum Protect Plus Installation and User’s Guide for more
information on command usage.
Uempty
The Spectrum Protect Plus Admin Console helps you pull in and apply the update packages that
you have downloaded to your system. The VM is labeled SPP Admin Console in the lab
environment.
There are some considerations to think about before you update IBM Spectrum Protect Plus:
• Remember you must update the vSnap servers and any VADP proxies that are not part of the
virtual appliance separately.
• Not all components are updated in every patch.
• Be sure to take a snapshot of your virtual machine before you patch it in case you need to revert
to the previous version for any reason.
• The updates process through the Administrative Console includes IBM Spectrum Protect Plus
features as well as the operating system and file system.
– IMPORTANT: Do not use any other method to update these components.
• Ensure all jobs are in an idle state, then put them on hold while the procedure runs. You can
hold the schedule for each job using the Actions menu, and release them once the update is
complete.
Uempty
Perform update
• Ensure all jobs are in an idle state, then
put them on hold while the update runs.
• Open the IBM Spectrum Protect Plus
administrative console
• Select Manage updates and hotfixes
• Click Browse to select
• Click Upload Update Image (or) Hotfix
• Click yes to update
Perform update
This is only updating the IBM Spectrum Protect Plus appliance. Other operations are necessary to
update the vSnap storage server.
Uempty
Remember that the images you download from Fix Central do not contain the license file. You must
have a licensed base level package installed to use these images.
Uempty
Uempty
Lesson 3 Configure a VADP proxy
In this lesson, you learn about the purpose of using VADP proxies, and how to install and configure
them.
Uempty
If you have proxies available, the entire processing load is shifted to the proxy servers. If you do not
have any proxies, the entire load stays on the host.
Within a backup job, the processing load for any single virtual machine is shifted to a single proxy
system. Proxies are available to run any job, so if a proxy server goes down or is not available,
another proxy can take over and complete the job. If a proxy server fails while the job is running, the
job might fail.
The proxy must have the ability to mount NFS file systems, which in many cases requires an NFS
client package to be installed. The exact package details vary based on the distribution, but are
required for VADP proxy usage.
Uempty
• Click Install
• Select Actions > Initialize
The version of the VADP proxy installer that is included with IBM Spectrum Protect Plus includes
Virtual Disk Development Kit (VDDK) version 6.5. This version of the VADP proxy installer provides
the external VADP Proxy support with vSphere 6.5.
Uempty
With IBM Spectrum Protect Plus, there are three transport modes. You can choose one or more of
these:
• SAN – requires applications to run on a backup server with access to SAN storage.
• Hotadd – allows devices to be added (hot) while a machine is running.
• NBD and NBDSSL Transport – If necessary, networked storage applications can use LAN
transport for data access, either NBD (network block device) or NBDSSL (same but encrypted).
The SAN transport mode is only supported on physical VADP proxies, while hotadd is only
supported on virtual VADP proxies.
If you selected the NBDSSL transport mode, enable compression to increase the performance of
data transfers. To turn off compression, select disabled.
Uempty
To uninstall a proxy, you run the following command on the host system from the uninstall
subdirectory of the installation directory /opt/IBM/SPP/:
./uninstall_vndkbackup
Uempty
Before you update anything, be sure you have backed up the IBM Spectrum Protect Plus
application before you suspend the jobs. Any current operations on the VADP proxy will continue as
normal until complete. When all operations on the proxy are complete, you can continue.
After you update the VADP proxies, run the VMware backup job and confirm the use of the proxy by
checking the job log.
Uempty
Lesson 4 Configure SLA policy
In this lesson, you learn how to configure and use SLA policies to control frequency and retention of
backups.
Uempty
Default policy
Default policy
Backup policies, also referred to as Service Level Agreement (SLA) policies, are used to control
backup jobs, provide scheduled automation, and control retention. There are three policies
provided out of the box, but you can edit those to meet your requirements, and create as many
additional custom policies as you need. The pane at the top of the Policy Overview page shows
how many systems utilize each SLA and any that are unprotected.
Uempty
Only use encrypted disk storage – You can select this check box to ensure data from this policy
is backed up to only encrypted vSnap servers, assuming your environment includes both encrypted
and unencrypted vSnap servers.
Important: If you select this option and there are no encrypted vSnap servers available, the jobs
associated with this policy will fail.
There is also the option to offload snapshots from the vSnap server to IBM Spectrum Protect
container storage. This is covered in a later Unit.
Uempty
Default policies and custom policies can be edited to meet your retention requirements. Once you
have created a policy, you cannot change the name of it, but you can delete it.
Important: Deleting an SLA policy will remove the policy along with all of the associated backup
data. You cannot reverse this action. Changing an SLA policy will change the retention of all
previously backed up data associated with the SLA policy. Use caution when performing these
actions.
You also use policy settings to configure replication and offload. These topics are covered in a later
unit.
Uempty
Unit glossary
Review the key words and concepts for this unit:
• NetworkManagement Text User Interface (nmtui)
• SLA Policy
• VADP proxy
• vSnap storage server
• Fix Central
Unit glossary
You should now be familiar with all of the key words and concepts for this unit.
Uempty
Unit summary
Now that you have completed this unit, you can perform the following tasks:
• Perform installation for Hyper-V and VMware environments
• Configure VADP proxy
• Add vSnap storage
• Configure policy based on a Service Level Agreement (SLA)
Unit summary
Uempty
Review questions
1. True or False: Patches for IBM Spectrum Protect Plus are downloaded from Fix Central.
2. True or False: A vSnap server can be run on either a physical or virtual machine.
3. Which of the following tasks is part of creating a vSnap storage server?
A. Issue the vsnap user create command to create the user that access the storage.
B. Issue the vsnap disk create command to create the vsnap disks used for storing data.
C. Issue the net user type=vsnap command to create the vsnap user when running on Windows.
D. Issue the define vsnap group command to define a group with permissions to access the vSnap server.
Review questions
Uempty
Review answers
1. True
2. True
3. A. Issue the vsnap user create command to create the user that access the storage.
Review answers
Uempty
Exercises
Uempty
Exercise introduction
In these exercises, you perform the following tasks:
• Review IP information on the IBM Spectrum Protect Plus appliance
• Configure vSnap storage
• Review and define SLA Policies
Exercise introduction
In this unit, you learn how to protect your virtual machines, including VMware and Hyper-V
systems.
Uempty
Unit objectives
When you complete this unit, you can perform the following tasks:
• Add a VMware provider
• Add a Hyper-V provider
• Create backup jobs for VMware and Hyper-V
• Create restore jobs for VMware and Hyper-V
• Run and monitor jobs
Unit objectives
Uempty
Topics
• Lesson 1: VMware backup and restore
• Lesson 2: Hyper-V backup and restore
Topics
Uempty
Lesson 1 VMware backup and restore
In this lesson, you focus on how to use IBM Spectrum Protect to back up and restore entire
VMware virtual machines as well as virtual machine files.
Uempty
The first task is to add the provider (hypervisor) to IBM Spectrum Protect Plus so it can catalog the
virtual machines it contains. That cataloging is the purpose of running the inventory job. An
inventory job runs anytime you add a new provider, and you can run it manually if you make any
changes that should be cataloged.
Hint: If your database is virtualized, you might want to exclude the disks that contain the database
tables and logs from VM backups.
Uempty
The host name must be a resolvable IP address or resolvable path and machine name. If you
select to use an existing user, that user must already be established in the system and have access
to the provider. Port 80 is used for non-SSL connections, and port 443 is used for SSL connections.
Uempty
Options
• Options
Max number of VMs to process concurrently
per ESX server (default is 3)
Click Save
í IBM Spectrum Protect Plus validates the
connection to the provider at this point.
Options
The one option here is used to set the maximum number of concurrent virtual machine snapshots
to process on the ESX server. When this is complete, you can click Save, and the provider is listed
in the VMware backup page.
Uempty
Inventory
• All providers added are automatically cataloged after registration.
• A high-level inventory job called Default Hypervisor Inventory is created for you.
• You cannot change the time the job is scheduled to run, but you can run it manually at any time using
the Actions menu.
Inventory
Immediately after provider registration, an inventory job runs to catalog the information about the
provider. You can run inventory manually at any time using the Actions menu, if you make changes.
Uempty
All virtual machines in the selected datastore, folders and subfolders are included in the backup,
and any virtual machines you add later will also be included in the backup automatically.
Uempty
If you have added tags for your virtual machines in vSphere, those tags can be used when you
create a job in IBM Spectrum Protect Plus. The tags are picked up by the inventory job and stored
in the catalog. When creating a backup job, use the search function to search to filter results.
Options include VMs and Templates, VM(s), Datastore, and Tags & Categories.
When you restore a VMware virtual machine, you can retain those tags by selecting the option,
Restore VM Tags.
Uempty
Backup options
• Skip Read-only datastores – skips datastores mounted as read-only
• Skip temporary datastores – skips datastores that are temporarily restored/mounted by IBM Spectrum Protect Plus
• VADP Proxy settings – By site or By proxy
• Make VM snapshot application/file system consistent – by default this is enabled to quiesce the application and
system state to enable a consistent snapshot.
VM Snapshot retry attempts – controls the number of times the job will retry the snapshot before failure
• Truncate SQL logs – truncates SQL logs during backup
• Catalog file metadata – analyzes and stores metadata about mounted filesystems
This is required for File Restore functionality
• Guest OS User info – is required for file metadata cataloging, SQL log truncation and certain restore options such as re-
IP
Backup options
Once you have selected what you want to back up, there are additional backup options. Notice that
this is where you can select a VADP proxy for use.
Uempty
This slide describes the steps you take to choose the backup source and options, and then how
IBM Spectrum Protect Plus processes the backup and catalogs the changes.
Uempty
https://www.ibm.com/support/knowledgecenter/SSNQFQ_10.1.2/spp/r_spp_system_reqs_file.html
Supported volumes include VMDK or VHD volumes that are mounted through the configuration of
the virtual machine. iSCSI disks that are mapped directly to the guest operating system are not
indexed.
Note: File indexing and file restore are not supported using an offloaded copy.
Uempty
Connectivity Requirements
All firewalls must be configured to allow IBM Spectrum
Protect Plus to connect to the server through WinRM
(Windows Remote Management)
14
When file indexing is enabled in a Windows environment, the following directories on the resource
are skipped:
• /Drivers
• /Program Files
• /Program Files (x86)
• /Windows
• /winnt.
Files in these directories are not added to the inventory and are not eligible for file recovery.
Note: Consider using Active Directory or LDAP to ensure consistency of user access and
permissions across the environment.
Uempty
15
When file indexing is configured in a Linux environment, the following directories on the resource
are skipped:
• /tmp
• /usr/bin
• /Drivers
• /bin, /sbin
Files in these directories are not included in the IBM Spectrum Protect Plus inventory and are not
available for file recovery.
Uempty
When a files system is indexed, temporary metadata files are stored in a directory and are deleted
as soon as the indexing is complete. The amount of free space varies based on the number of files
being indexed. Ensure that you have approximately 350 MB of free space per 1 million files.
Uempty
Test
• The test function is used to verify that your credentials for File level backup allow you sufficient
access to the machine you are protecting.
It tests all permissions, IP connectivity, username and password, all the way down to the virtual machine
level.
Test
The test verifies your credentials and access to the system you are protecting. If the test fails, you
are provided with information about the cause.
Uempty
VMware restore
• VMware Restore jobs support Instant VM Restore and Instant Disk Restore scenarios, which are created
automatically based on the selected source.
• If a VMDK is selected for restore, you are automatically presented with options for an Instant Disk Restore job,
which provides instant write access to data and application recovery points.
• A snapshot is mapped to a target server where it can be accessed or copied.
• All other sources are restored through Instant VM Restore jobs, which can be run in a variety of modes.
VMware restore
In the Restore List section on the right, you can select to Restore by site or Restore by
cloud/repository server. The default is to restore from the primary site as that is generally expected
to be the fastest. Site selection is not supported for specific restore points. If you select Restore by
cloud/repository server, the source is automatically selected for you.
Uempty
VM restore modes
• Test Mode
Creates temporary VMs for development/testing, snapshot verification and DR verification on a scheduled,
repeatable basis without affecting production environments.
Can use fenced networking to establish a safe environment without interfering with production.
VMs created through Test mode are given unique names and UUIDs to avoid conflicts.
• Clone Mode
Creates copies of VMs for use cases requiring permanent or long-running copies for data mining or duplication
of a test environment in a fenced network.
VMs created through Clone mode are given unique names and UUIDs to avoid conflicts.
• Production Mode
Enables DR at the local site from primary storage or a remote DR site, replacing original VM with recovery
image. All configurations are carried over as part of the recovery, including names and UUIDs
The restore type you choose is based on the reason you are restoring the virtual machine. In test
mode, you can create a test copy with a new name and new UUID so you can take actions on that
system without affecting the original. A cloned copy is meant for longer running copies for purposes
such as data mining. Production mode restore is used to replace a damaged primary and can be
used for disaster recovery. It overwrites the existing copy, using the same name and UUID as the
original. You can move a VMware backup from Test Mode to Production mode. You have the option
to set an IP address or subnet mask for virtual machines that you want to use for development/
testing or disaster recovery. You can also back up encrypted virtual machines in vSphere 6.5
environments and later.
Uempty
If your vCenter is down, you can restore directly to the ESX host. Ordinarily the restore
process goes through the vCenter.
Uempty
VM restore destinations
• Original ESX Host or Cluster - Restores
to the original host or cluster.
• Alternate ESX Host or Cluster - Restores
to a local destination different from the
original host or cluster, then select the
alternate location from available resources.
From the vCenter section, select an alternate
location. Selections can be filtered by either
hosts or clusters.
• ESX Host if vCenter is down - Use this to
bypass the vCenter and restore directly to
the ESX host.
VM restore destinations
Uempty
To create a new mapping, select Add mappings for subnets and IP addresses for VM guest OS on
destination, then click Add Mapping. Enter a subnet or IP address in the source field. In the
destination field, select DHCP to automatically set configuration information if DHCP is available on
the client. Select Static to enter a subnet or IP address, subnet mask, gateway, and DNS.
Note: Subnet / IP Address, Subnet Mask, and Gateway are required fields. If a subnet is entered
as a source, a subnet must also be entered as a destination.
The IP reconfiguration is bypassed for virtual machines where a static IP is used but no suitable
subnet mapping is found, or when the source system is powered off and there is more than one
associated network interface card (NIC). In a Windows environment, if a virtual machine is DHCP
only, then IP reconfiguration is skipped for that virtual machine. In a Linux environment, all
addresses are assumed to be static, and only IP mapping is available.
Uempty
This slide shows the task flow when you use test mode and what occurs in IBM Spectrum Protect
Plus during this process.
Uempty
This process requires you to have successfully run a backup job with Catalog file metadata
enabled.
Uempty
Note: When restoring to an alternate location, credentials must be established for the alternate
virtual machine through the Guest OS Username and Guest OS Password option within the
backup job definition.
Uempty
Lesson 2 Hyper-V backup and restore
In this lesson, you learn how to configure and manage Hyper-V backup and restore operations.
Uempty
Uempty
Uempty
Uempty
Uempty
Hyper-V restore
Hyper-V restore
Uempty
Uempty
Monitoring jobs
• You can monitor a job in the Job
Sessions pane just below the section
where you start a backup or restore
operation.
• You can also use the Job monitor to
review the activity by selecting Jobs and
Operations > Monitoring.
• Expand the job to view the job log
You can click the cloud icon to download the
job log if needed.
• You can run a failed job again from the
Actions menu.
Monitoring jobs
Uempty
Unit glossary
Review the key words and concepts for this unit:
• Provider
• Hyper-V
• VMware
• Restore modes: production, clone, and test
• Job Monitor
• File restore
Unit glossary
You should now be familiar with all of the key words and concepts for this unit.
Uempty
Unit summary
Now that you have completed this unit, you can perform the following tasks:
• Add a VMware provider
• Add a Hyper-V provider
• Create backup jobs for VMware and Hyper-V
• Create a restore jobs for VMware and Hyper-V
• Run and monitor jobs
Unit summary
Uempty
Review questions
1. True or False: IBM Spectrum Protect Plus supports choosing VMware virtual machines for backup
using tags.
2. In order to perform Hyper-V backups, which service must be running on the Hyper-V host?
A. The server service
B. The IBM Spectrum Protect Plus booster service
C. iSCSI initiator service
D. The VADP proxy server service
3. What backup option must be selected to enable file level restore for a virtual machine?
A. Enable file level restore
B. Catalog file metadata
C. Engage file catalog
D. Enable guest tools
Review questions
Uempty
Review answers
1. True.
2. A. iSCSI initiator service
3. B. Catalog file metadata
Review answers
Uempty
Exercises
Uempty
Exercise introduction
In these exercises you perform the following tasks:
• Review hypervisor definitions and update inventory
• Apply an SLA Policy to a backup job
• Back up virtual machines
• Perform production restore
• Restore a file within a virtual machine
Exercise introduction
In this unit, you learn how to protect applications data such as Oracle, Db2, and SQL server, and
how to use the various options for restore.
Uempty
Unit objectives
When you complete this unit, you can perform the following tasks:
• Describe application support
• Add providers for SQL Server, Oracle, and DB2
• Create backup jobs
• Create restore jobs
Unit objectives
Uempty
Topics
• Lesson 1: Introduction to application support
• Lesson 2: SQL database protection
• Lesson 3: Oracle database protection
• Lesson 4: Db2 database protection
Topics
Uempty
Lesson 1 Introduction to application protection
In this lesson, you are introduced to IBM Spectrum Protect Plus application protection, and review
the common requirements and features.
Uempty
After you have backup jobs created for your application, the automation through SLA policy and
monitoring of jobs is the same as for virtual machines. With applications, you might find more use
for using scripts to manage the backup and recovery processes.
Uempty
While there are many similarities in how you set up protection for applications, there are also some
differences that are important. For each application there are different prerequisites, including
required permissions, as well as space and configuration requirements. The next several lessons
cover each supported application separately.
Uempty
Lesson 2 SQL database protection
In this lesson, you learn about the specifics of backing up and restoring your SQL database using
IBM Spectrum Protect Plus.
Uempty
• Ensure the time is consistent between the Domain Controller and the IBM Spectrum Protect Appliance
Not to exceed 5 minutes difference
Use Network Time Protocol (NTP) to ensure the time remains consistent between systems.
Log on as a service can be enabled through the Local Security Policy on your local computer. You
can access the menu to enable this setting through the Control Panel or through Server Manager.
Additional instructions are available online to show you how to add the Log on as a service right to
an account for a Group Policy object when you are using a domain controller.
For Kerberos-based authentication only, the user identity must be specified in the
username@FQDN format. The user name must be able to authenticate using the registered
password to obtain a ticket-granting ticket (TGT) from the key distribution center (KDC) on the
domain specified by the fully qualified domain name.
Uempty
You can use a single user account for all SQL servers, or different users for each SQL server. In
either case, the account must have sufficient privileges on the SQL server to access resources
needed to run jobs and enable log backups.
Uempty
To register a SQL Server in IBM Spectrum Protect Plus, you must have credentials established as
noted in the requirements. An inventory of the instances and databases of that application server
are collected and added to the catalog. This inventory information enables you to run backup and
restores, and create reports.
Uempty
The Default Application Server Inventory job log provides information about what is captured for
that specific inventory job. In the text you can see this job contains at least three types of tasks: job
resolution, inventory virtual machines and inventory physical servers.
Note: This initial inventory job takes about 4-5 minutes to complete in this lab environment. In a
production environment, the time would be significantly longer, as there would be much more to
discover and catalog. When this job shows the status COMPLETED, you are ready to start
creating the backup job.
Uempty
If you are at the point of creating a SQL backup job, you need to have the policy you want it to be
associated with already created.
When monitoring a job, the output is broken into sections. If the job is not finished and you want to
see more log detail, look to the bottom and you can select next page. Click the circular arrow icon to
update the page while the job is running so you can access more pages.
Uempty
If you enable log backup on a job for a database that is not eligible for log backup, you receive a
warning, and the job continues.
Uempty
14
This is describing the flow of the backup process and how it works. If you start a job manually, then
start the same job again too quickly, the first job is aborted and the second one runs. Each of these
jobs generates an entry in the Job Monitoring page.
Uempty
SQL restore
• Expand Manage Protection
> Applications > SQL
• Click Restore
• Search Options:
Show all or a specific site
View:
í Standalone/Failover
Cluster
í AlwaysON
SQL restore
Uempty
Restore options
• Restore options include:
Destination
í Restore to original instance
í Restore to alternate instance
Name/New Database Name
(option is only available when
restoring to the original instance)
í Current name is displayed and a
field is available to specify a new
database name
Restore Types include:
í Test, Production, or Instant Access
í Instant access mounts the
database so you can restore from
the mounted snapshot which can
be seen in Disk Management.
í When you select instant access, it
shows you where disks will be
mounted.
Restore options
Alternate vSnap – If you want to restore to a restore point that is not the latest version, and that
resides on another vSnap, select Use alternate vSnap server for the restore job, then select a
server from the Select alternate vSnap menu.
Recovery Options
– No Recovery sets the database to a restoring state. You can manually restore logs if you
are not managing them through IBM Spectrum Protect Plus.
– Recovery until end of backup restores the database to the state represented by the
backup.
– Recover until specific point in time enables you to recover to a point in time using the log
files. The options for point-in-time recovery are selecting using a calendar and a drop-down
menu with the option to select a time.
By Time
By Transaction ID
Application Options
– Overwrite existing database (disabled by default)
– Maximum Parallel Streams per Database
Uempty
Advanced Options
• Advanced options change slightly
depending on the restore type you
choose. They include:
Run cleanup immediately on job failure
Allow session overwrite
Continue with restore even if it fails
Protocol Priority
í instant access only
í iSCSI or Fibre Channel
Advanced options
IBM Spectrum Protect Plus finds the restore points that directly proceed and follow the selected
point-in-time. During the recovery, the older data backup volume and the newer log backup volume
are mounted. A temporary restore point is created if the point-in-time is after the last backup.
Uempty
18
Uempty
Lesson 3 Oracle database protection
In this lesson, you learn how to use IBM Spectrum Protect Plus to backup and restore your Oracle
database data.
Uempty
Place the following lines at the end of your sudoers configuration file, typically /etc/sudoers. If your
existing sudoers file is configured to import configuration from another directory (for example,
/etc/sudoers.d), you can also place the lines in a new file in that directory:
Defaults:sppagent !requiretty
Defaults:sppagent env_keep+="ORACLE_HOME"
Defaults:sppagent env_keep+="ORACLE_SID"
sppagent ALL=(ALL) NOPASSWD:ALL
Ensure that the user and group IDs of the Oracle users (e.g. oracle, oinstall, dba) are consistent
across all the servers so that IBM Spectrum Protect Plus can move data between Oracle servers
without authentication issues.
Uempty
Uempty
More detail on how to create users with role based access controls is provided in Unit 6.
Uempty
Uempty
Uempty
Uempty
Lesson 4 Db2 database protection
In this lesson, you learn how to back up and recover data for your Db2 databases.
Uempty
Supported platforms
• Db2 Enterprise Server Edition
Version 10.5 and later 10.5.x Fix Packs
Version 11.1 and later 11.1.x Fix Packs
• Linux x86_64
RHEL 6.8 and RHEL 7.0+
SLES 11 SP4+ and SLES 12 SP1+
Supported Filesystems: ext2, ext3, ext4, xfs
• AIX on System p
Version 7.1+ and 7.2+
Supported Filesystems: JFS2
Supported platforms
Uempty
Db2 prerequisites
• General prerequisites
The Db2 application server must be registered with a user that has password less super user privileges using
sudo.
í If running in AIX or Linux environment, make sure the version of sudo is at the correct level.
Activate Db2 archive logging, and ensure that Db2 is in recoverable mode.
Ensure that you do not have nested mount points.
https://www.ibm.com/support/knowledgecenter/en/SSNQFQ_10.1.2/spp/r_ispp_db2_prerequisites.html
• Space requirements
Ensure you have sufficient free space on the target and source hosts, and in the vSnap repository.
Extra free disk space is required on the volume groups for creating temporary LVM snapshots of the logical
volumes where the database and logs are stored.
https://www.ibm.com/support/knowledgecenter/en/SSNQFQ_10.1.2/spp/r_ispp_db2_space.html
• As with other applications, you must assign the user roles and resource groups to grant access. This
is done through the Accounts pane.
Db2 prerequisites
Uempty
• Click Save.
This confirms a network connection, adds the provider to the
database, then catalogs the provider.
• Use the Actions > Test function to verify the connection.
• Registering a new machine automatically triggers an inventory
for the first time
29 © Copyright IBM Corporation 2018
Uempty
Uempty
Uempty
Creating a Db2 restore job is very similar to creating the other types of jobs. If you create the job
and select restore without any further options, it overwrites the target location.
Uempty
Uempty
Recovery options
• Recovery options include
No recovery
Recover until end of backups
Recover until end of available logs
Recover until specific point in time
• Application Options
Overwrite existing database
Maximum Parallel Streams per Database
Specify the size of the Db2 database memory in kilobytes (KB)
• Advanced options
Run cleanup immediately on job failure
Continue with restores of other selected databases even if one fails
• Script Settings
Any pre-scripts or post-scripts you want to use are enabled as with other supported hypervisors and apps.
• To schedule a recovery, click Manage Jobs(s) and define a trigger for the job definition.
Recovery options
Point-in-time recovery is not supported when one or more data files are added to the database in
the period between the chosen point-in-time and the time that the preceding backup job ran.
Uempty
Unit glossary
Review the key words and concepts for this unit:
• Log backup
• Permissions
Unit glossary
You should now be familiar with all of the key words and concepts for this unit.
Uempty
Unit summary
Now that you have completed this unit, you can perform the following tasks:
• Describe application support
• Add providers for SQL Server, Oracle, and Db2
• Create backup jobs
• Create restore jobs
Unit summary
Uempty
Review questions
1. True or False: IBM Spectrum Protect Plus supports transaction log backups for Db2, Oracle, and
SQL Server.
2. Which restore granularity is supported by IBM Spectrum Protect Plus for application backups?
A. Container
B. Database
C. Record
D. Table
3. Which of the following tasks must be done before an application can be backed up?
A. Add the provider
B. Install dbbackup.scripts on the host
C. Add a node to IBM Spectrum Protect Plus
D. Distribute SSL certificates to the database server
Review questions
Uempty
Review answers
1. True.
2. B. Database
3. A. Add the provider
Review answers
Uempty
Exercises
Uempty
Exercise introduction
In these exercises, you perform the following tasks:
• Change the SQL server recovery model
• Define a SQL server provider
• Define a SQL server SLA and apply it to a database
• Back up a SQL server database
• Perform a restore test on a SQL server database
Exercise introduction
In this unit, you learn about features of IBM Spectrum Protect Plus that can help you with your
disaster recovery strategy, and create a plan for recovery that can be tested and verified.
Uempty
Unit objectives
When you complete this unit, you can perform the following tasks:
• Plan disaster recovery strategies
• Create sites
• Configure and run vSnap replication
• Set up offload to IBM Spectrum Protect
• Restore from replicated and offloaded data
• Protect the catalog
Unit objectives
Uempty
Topics
• Lesson 1: Disaster recovery options
• Lesson 2: vSnap storage replication and restore
• Lesson 3: Offload options and setup
• Lesson 4: Catalog backup and recovery
Topics
Uempty
Lesson 1 Disaster recovery options
In this lesson, you review the basics of disaster recovery, and the tools within IBM Spectrum Protect
Plus that can be used for that purpose.
Uempty
Uempty
Create sites
• A site is a grouping of backup storage servers that is
usually based on location.
Use meaningful names to help identify your sites.
• Creating sites enhances backup performance and
provides a more accurate representation of the
actual environment.
• Replication from one site to the other provides copies
for use in disaster recovery
• To define additional sites:
Expand System Configuration and click Site
Click the +Add Site button to add new
Type in new site name
Click Save
• The site is displayed in the Sites table and can be
associated with new and existing backup storage
servers.
• You can also Edit or Delete an existing site
Use caution when editing or deleting a site. 6 © Copyright IBM Corporation 2018
Create sites
Uempty
Recovery options
• Recovery options provide you with various ways to confirm the recoverability of your data
• Restores types can be used to test recovery or move a recovered system to production
• You can recover to the original system or to an alternate location
Recovery options
Uempty
• Select Continue job/task on script error to continue running the job if the script associated with the job fails
Upload scripts and specify script server name Settings for including a script in recovery job
Uempty
Test Mode
• Test Mode creates temporary virtual machines for development/testing, snapshot verification, and
disaster recovery verification on a scheduled, repeatable basis without affecting production
environments.
• A system that has been recovered using Test Mode is shown as an Active Resource.
• Virtual machines created in Test mode have unique names and identifiers to avoid conflicts within
your production environment.
• Fenced networking can provide a safe environment for disaster recovery testing without impacting
the production systems.
For more information on creating a fenced network see the IBM Spectrum Protect Plus User’s Guide.
Test Mode
Uempty
Production Mode
• You can use Production Mode to initiate a recovery at the local site from primary storage or a
remote disaster recovery site, replacing original machine images with recovered images
• All configuration information is carried over as part of the recovery, including names and
identifiers, and all copy data jobs associated with the virtual machine continue to run
• Specific to virtual machine recovery:
You can also set an IP address or subnet mask for virtual machines to be repurposed for
development/testing or disaster recovery use cases
í Supported mapping types include IP to IP, IP to DHCP, and subnet to subnet
• When you back up and restore vSphere 6.5 and later, that are encrypted, this is how the
encryption is handled:
Restore to the original location keeps the encryption intact
Restore to an alternate location requires you to manually encrypt through vCenter after the restore is done
Production Mode
Uempty
You can use the Actions menu on the restore pane for the following tasks:
Cleanup removes the virtual machine and all associated resources.
í This action is only for temporary virtual machines that are no longer needed.
Move to Production migrates the virtual machine to the datastore on the Production network.
í This replaces the machine for production use.
Clone is used to create a copy of the virtual machine to the datastore on the Test network.
í This can be used for testing recovery or data reuse.
Uempty
Uempty
Lesson 2 vSnap replication
In this lesson, you learn about vSnap replication, how it works, and how to configure it in multiple
sites.
Uempty
IBM Spectrum Protect Plus allows you to asynchronously replicate from a source vSnap to a target
vSnap. This process provides protection for your primary copy as well as an alternate location from
which you can recover, in case the primary site becomes unavailable for any reason.
Uempty
Enable replication
• Steps to configure:
1. Create sites
2. Set up a partnership between the vSnap storage servers
3. Define replication settings and schedule in SLA Policy
• SLA Policy settings allow you to define when the
replication runs and on which day(s)
• Once you have your sites set up, you can replicate
from your primary vSnap to your secondary site
vSnap.
• Replication occurs automatically when the job
associated with the SLA Policy is scheduled
If the replication job is run ad-hoc, you select the
action to backup to vSnap or run replication
Enable replication
Uempty
Uempty
Uempty
Lesson 3 Offload options and setup
In this lesson, you learn how to offload data from IBM Spectrum Protect Plus to IBM Spectrum
Protect, for longer term data retention.
Uempty
Uempty
(daily)
2
2. Offload from the vSnap server – with this
method, you use full backups directly from
the vSnap storage server
í For less frequently created (monthly)
created recovery points
í To choose this option, select Leverage
most recent backup option in the SLA
Policy.
Uempty
Link IBM Spectrum Protect Plus to IBM Spectrum Protect for offload
• aC
aC
Here you can create the link to IBM Spectrum Protect. With the link added, you can then enable offload to
IBM Spectrum Protect.
21
Link IBM Spectrum Protect Plus to IBM Spectrum Protect for offload
Uempty
Restore operations
• Restore – Both restores from vSnap and recoveries of offloaded data are triggered from IBM
Spectrum Protect Plus.
IBM Spectrum Protect Plus is used to restore the snapshots from vSnap to the original or alternate hypervisor.
IBM Spectrum Protect for Virtual Environments is used to recover snapshots from IBM Spectrum Protect
servers to the original or alternate hypervisor.
When restoring from an offload-based SLA Policy, you must select specific recovery points. Offload-based
restores are not compatible with Use latest version recovery points.
Restore operations
Uempty
Lesson 4 Catalog backup and recovery
In this lesson, you learn how to protect and recover the IBM Spectrum Protect Plus catalog.
Uempty
Uempty
Catalog backup
• In the SLA Policy Status pane, click Actions > Start next to Cat_SLA to do an ad-hoc backup of the
Catalog.
• Expand the job logs and you can monitor the progress
Catalog backup
Uempty
Uempty
Uempty
Uempty
Unit glossary
Review the key words and concepts for this unit:
• Sites
• vSnap replication
• Catalog
• IBM Spectrum Protect
• Container storage
Unit glossary
You should now be familiar with all of the key words and concepts for this unit.
Uempty
Unit summary
When you have completed this unit, you can perform the following tasks:
• Plan disaster recovery strategies
• Create sites
• Configure and run vSnap replication
• Set up offload to IBM Spectrum Protect and the cloud
• Restore from replicated and offloaded data
• Protect the catalog
Unit summary
Uempty
Review questions
1. True or False: You can recover data from an IBM Spectrum Protect Plus replicated vSnap repository
copy.
2. Which of the following statements is true?
A. The IBM Spectrum Protect Plus catalog protects itself automatically.
B. The IBM Spectrum Protect Plus catalog is protected through online replication.
C. The IBM Spectrum Protect Plus catalog is protected through a scheduled backup job.
3. A system that has been recovered using Test Mode is shown as _______________.
A. An active resource
B. An unavailable resource
C. An online resource
Review questions
Uempty
Review answers
1. True.
2. C. The IBM Spectrum Protect Plus catalog is protected through a scheduled backup job.
3. B. An active resource
Review answers
Uempty
Exercises
Uempty
Exercise introduction
In these exercises, you perform the following tasks:
• Add a vSnap server and set it’s storage partner
• Configure an SLA for replication
• Perform an ad hoc backup and replication
• Test disaster recovery for a replicated virtual machine
• Protect the catalog
Exercise introduction
In this unit, you learn about the daily operations required to maintain IBM Spectrum Protect Plus.
This includes adding new users and controlling their access, monitoring operations, accessing log
files and downloading them for support, as well as generating and sending reports.
Uempty
Unit objectives
When you complete this unit, you can perform the following tasks:
• Add users and control access
• Use LDAP to secure credentials
• Monitor jobs
• Send log and information to support
• Generate reports
• View and send reports
Unit objectives
Uempty
Topics
• Lesson 1: User access
• Lesson 2: Job monitoring
• Lesson 3: Troubleshooting and logs
• Lesson 4: Reporting
Topics
Uempty
Lesson 1 User access
In this lesson, you learn how to control user access using Role Based Access Control (RBAC), and
provide credentials as needed for protecting applications.
Uempty
You create users to enable and control access to IBM Spectrum Protect Plus.
Uempty
LDAP
• Before importing an LDAP group, you must register an LDAP provider in IBM Spectrum Protect Plus
• Select System > LDAP/SMTP and click the + button to add SMTP server
If you select User existing user, you can choose from a list of established user credentials
LDAP
You can add a Lightweight Directory Access Protocol (LDAP) and a Simple Mail Transfer Protocol
(SMTP) server for IBM Spectrum Protect Plus to use for setting up users and credentials, and using
reporting functions. These are both configured in the System Configuration menu. Refer to the IBM
Spectrum Protect Plus User’s Guide for details on Creating a user account for an LDAP group.
Uempty
Role-based access control allows you to strictly control who has access to what resource, and
which activities they can perform on that resource.
Uempty
User roles
• Roles determine the actions that a user can perform on the resources in a resource group. There are
several predefined roles available:
Application Admin
Backup Only
Restore Only
Self Service
SYSADMIN – has access to all resources and privileges
VM Admin
• You can create a role:
New role: you choose all the permissions - none are selected by default
From template: you have an existing set of permissions that you can customize
• Roles can be applied to any new and existing user accounts
User roles
A set of predefined roles is available to help you set up users with permissions based on their role
in the organization. This can include multiple roles.
Uempty
Any resource added to IBM Spectrum Protect Plus can be included in a resource group, along with
individual IBM Spectrum Protect Plus functions and screens. Through a combination of assigning
specific resources and roles to each user, you limit their access to only what they need to work with
and only tasks they need to perform on the resources to which they have access.
Uempty
Resource types
Resource type Subtype Description – Used to grant access to:
Screen To grant or deny access to screens in SPP interface. If the screen is not included
in user’s resource group, the user cannot access functions in screen regardless
of permissions granted to the user
SLA Policy Access to SLA Policies for Backup operations
Table referenced from online help in IBM Spectrum Protect Plus
10 © Copyright IBM Corporation 2018
Resource types
This table shows a breakdown of what resource types are available, and the subtypes that they
contain. For example, the resource type named Hypervisor can be assigned to a user, but you can
limit it to only VMware if that is what the user does.
Uempty
System resource types are subdivided into a larger set of subtypes, so you can control access those system
specific resources in a more granular fashion.
Resource type Subtype Description – Used to grant:
System Logs Access to viewing and downloading Audit and System logs
System Script Server Access to script servers, where scripts are run during a backup or restore job
System Site Access to sites, which are assigned to vSnap backup storage servers
System resources are further subdivided. You can give a user System resource that allows them
only the ability to access LDAP servers, for example, but not VADP proxy servers.
Uempty
Add an identity
• Identities are used to provide user credentials for access to machines and applications you are
protecting
• You can add, edit, and delete identities
• Once added, you can select an existing user to provide those credentials
Add an identity
For any resource you add to IBM Spectrum Protect Plus, you must have access to that resource.
You create identities for this purpose. They are then available as an existing user. You can use
Active Directory or LDAP to manage these user credentials.
Uempty
Lesson 2 Job monitoring and status
In this lesson, you learn about the various jobs, how to monitor them, and how to track the overall
status of the environment.
Uempty
You use filters to set the period of time that is displayed in the interface.
Uempty
Alerts
Alerts
For every job that has errors or has failed, you get an alert that you can see by clicking the bell at
the top of the page. This allows you to quickly find any issues that need to be addressed.
Uempty
The Capacity Summary shows usage and availability of the vSnap storage servers to IBM
Spectrum Protect Plus. You can adjust the Storage error period value to display information
reflecting the time frame you require.
Uempty
• CPU
• Memory
• Configuration catalog
stores information about
system configuration
• Recovery catalog
stores information about
recovery points
• File Catalog
stores information for file
indexing
You can review the System Information section of the Job Monitor to keep track of the memory and
CPU usage. It also shows the capacity and usage of the various catalogs that contain information
about the system and your recovery data.
Uempty
You can view the status, rerun jobs, hold and restart jobs from the job monitor. Expanding the job in
the job monitor shows the detailed activity within the job. When a job has failed, you can view this
information to determine the cause, and take action to correct and rerun the job.
Uempty
Inventory jobs
• The IBM Spectrum Protect Plus database contains all the object meta data required to allow rapid
data retrieval and reporting. A catalog of objects is maintained for each resource that enables you to
browse, search, analyze, back up, and restore data in IBM Spectrum Protect Plus.
• Inventory jobs run daily to keep the catalog up to date.
Updates information used for reporting
• Default inventory jobs include:
Default Storage Server Inventory
Default Hypervisor Inventory
• These jobs run once a day by default, and can be run manually through the Actions menu at any time.
Default inventory job has a set schedule that cannot be changed
Be sure you do not run an inventory job when it might conflict with other activities
Manually run the job when you have made changes you need the system to pick up
Inventory jobs
There are some default inventory jobs that are provided with the product. They are run once a day
by default, and you cannot change the time they run. You can run them anytime using the actions
menu. Ensure that you create your backup and recovery jobs so the schedules do not conflict with
the inventory jobs.
Uempty
Maintenance job
• The Maintenance job removes resources and associated objects created by IBM Spectrum Protect
Plus when a job in a pending state is deleted.
What the maintenance job does:
í Reclaims space on storage devices
í Cleans up the catalog and removes all information related to the deleted job
í Removes related snapshots including all recovery points
í When the maintenance job is complete, data from any deleted job is no longer recoverable
The Maintenance job is automatically created and cannot be deleted.
It runs once a day on a set schedule.
í The schedule can be stopped and restarted.
Maintenance job
The Maintenance job removes resources and associated objects created by IBM Spectrum Protect
Plus when a job in a pending state has been deleted. Carefully consider the removal of any job as
maintenance does remove all related data.
Uempty
You might need to expire a restore point if the backup data it generated contains a corrupted or
infected copy.
Uempty
There are several reasons you might need to pause and release jobs. These include various
configuration tasks like upgrading of the IBM Spectrum Protect Plus server or vSnap storage,
changing of policy options or values, and so forth.
Uempty
IBM Spectrum Protect Plus makes it very easy to download and view job logs. You can click the
cloud icon as seen in the view above, and save the file to your local system downloads folder.
These can viewed as a Microsoft Excel spreadsheet.
Uempty
Lesson 3 Reporting
Lesson 3: Reporting
In this lesson, you learn about the various reports available, how to create custom reports, and how
to run them and send them by email.
Uempty
IBM Spectrum Protect Plus provides a series of very useful reports out of the box. You can use
these reports as is, or customize them for your needs, and save them with a new name.
Uempty
The Backup Storage Utilization report category contains a report on the usage of your vSnap
storage. The report options allow you to customize the output to include one or more vSnap storage
servers, exclude replica destination volumes, and show resources protected per vSnap storage.
Uempty
The screen capture shows an example of a vSnap storage utilization report that includes all of the
information. You can view the reports in the page, and dynamically sort the table headers by
clicking them.
Uempty
Protection reports
• Protection reports display the
protection status of resources.
• In the reporting category, you can
expand the list to access the
following reports:
Protected VMs reports
Protected Databases report
VM Backup History report
Database Backup History report
VM SLA Policy Compliance Report
Database SLA RPO Compliance
Report
Protection reports
These are very important because you can produce a set of reports from this that shows what’s
included in an SLA and what is being protected.
Uempty
• Report includes:
Summary View
í An overview of the virtual machine protection status.
í The number of unprotected and protected virtual
machines.
í Manage Capacity of the protected virtual machines
(Manage capacity = Used Capacity of a virtual
machine)
Detail View
í This view provides further information about the
unprotected and protected virtual machines, such as
names and location.
One of the most important reports shows the status of protection for the virtual machines you are
protecting with IBM Spectrum Protect Plus. This report includes all supported hypervisors by type
and name, how they are being protected, and if any are not being protected.
Uempty
This is the basic Protected Databases report, showing only the SQL section, so you can see the
type of information that is displayed in the output. You can customize this report as noted in the
slide.
Uempty
The VM Backup History report is another example of one of the reports available in the Protection
category. This can be useful for problem troubleshooting issues for jobs that fail. You can use the
options shown in the example to customize this report.
These are just a few examples of the reports that are available out of the box for IBM Spectrum
Protect Plus.
Uempty
Custom reports
• To create a custom report:
Expand the category that contains the report
you want to customize
Select the report and choose Options
Update the options – these vary by report
For example in the VM Backup History
report:
í VMs – All or select a specific virtual machine
í Status – All, Failed, or Success
í SLA Policy – All, or you can select one or more
Policies
í Backup History – All, Past 30 Days, or Past 90
Days
Save the custom report with a new name
with no spaces
Custom reports
All reports in IBM Spectrum Protect Plus can be customized. The options available vary, depending
on the report you select. You cannot change the original report, so if you change anything in the
Options for report, it is considered a new report and must be saved with a new name.
Uempty
All custom reports are listed as a new report under the original report you customized to create it.
Expand the report section to find and run these custom reports.
Uempty
SMTP Settings
• You must add a Simple Mail Transfer Protocol (SMTP) server to send reports by email.
• Only one SMTP server can be added.
SMTP Settings
As noted in the unit where LDAP was presented, you can also add an SMTP server for sending
reports by email. You can set this up from the System Configuration > LDAP/SMTP menu.
Hint: You can use only configure one SMTP server per IBM Spectrum Protect server.
Uempty
As with the logs, IBM Spectrum Protect Plus makes it very easy to view and download reports. All
reports can be viewed in the page as they are created. Use the Download button to export them in
PDF or Excel format.
Uempty
Lesson 4 Log files and support
In this lesson you learn how to access log files and collect them for support.
Uempty
Audit Log
• To access this page, select Reports
and Logs > Audit Log
• Search for logs by User – wildcards
can be used.
• Additional Filters can be included:
Description
Access Date Range
í Select two dates from the calendar to
specify a range
í Click the Search icon to see results
Audit Log
The audit log contains information about activities in your environment, including a description of
the activity, and who is running it. You might be many pages of logs to search to find the log you
want. The filters provided allow you to narrow down the view to help you find what you need.
Uempty
Download as csv
• Once you have a set of audit logs you want to save, click Download and Save the files as .csv
Download as csv
These logs can be easily downloaded using the button at the bottom of the page. The download is
a .csv file that can be viewed with a spreadsheet program.
Uempty
You might be asked by support to download the system logs for review. These logs contain a series
of folders with files that provide information on various components of IBM Spectrum Protect.
Uempty
Support
• Customer is responsible for managing and
updating:
IBM Spectrum Protect Plus
IBM Spectrum Protect Plus in the IBM
Cloud
• IBM Spectrum Protect Plus release levels
include 10.1.0, 10.1.1, and 10.1.2, the latest
release.
• IBM Spectrum Protect Plus support:
https://www.ibm.com/mysupport/s/topic/0TO5
0000000IQWtGAO/spectrum-protect-
plus?language=en_US&productId=01t500000
04uZGc
• IBM Cloud Portal support:
https://console.bluemix.net/docs/services/vmw
aresolutions/vmonic/trbl_support.html#contact
ing-ibm-support
Support
If you are running the purchased product, not on the cloud, you will need to open a ticket to get
support. The cloud portal support is provided separately, as shown in the example.
Uempty
Log retention
• The retention value for job logs (version 10.1.2) is 180 days by default.
• When the maintenance job runs, all the job logs earlier than the number of retention days are
removed.
• Another time logs are deleted is when you delete a job. All logs associated with a deleted job are
removed from IBM Spectrum Protect Plus, so it is advised to download job logs before the
Maintenance job runs again.
The maintenance job, as with any other job, can be paused and resumed as necessary.
Log retention
Attention: Be sure to take care when deleting any jobs or SLA Policies to ensure that the
associated recovery data is no longer needed.
Uempty
The IBM Spectrum Protect Plus Administrative Console is a separate interface that helps you
manage your environment. This includes information about your environment, and options for
managing updates, certificates, and licensing.
Uempty
When updates and hotfixes are available, they are automatically loaded for you. When this
happens, a flashing message is displayed to indicate that. Click the Get Started Button to view the
System Admin information.
The remaining sections can be selected to manage the licenses, certificates, and updates. A final
section is provided to allow you to perform system actions as shown. An option at the bottom of this
page allows you to work with the time zone setting.
Hint: Clear the cache in your browser after an update. You might need to re-enter your
credentials if they are saved in the form. If DNS is down or not functioning, the Manage Updates
menu item might not be available.
Uempty
Unit glossary
Review the key words and concepts for this unit:
• IBM Spectrum Protect Plus System Console
• Jobs
• Logs
• RBAC
• LDAP
• Active Directory
Unit glossary
You should now be familiar with all of the key words and concepts for this unit.
Uempty
Unit summary
Now that you have completed this unit, you can perform the following tasks:
• Add users and control access
• Use LDAP to secure credentials
• Monitor jobs
• Send log and information to support
• Generate reports
• View and send reports
Unit summary
Uempty
Review questions
1. True or False: IBM Spectrum Protect Plus integrates with both Active Directory and LDAP.
2. What should you do before updating the IBM Spectrum Protect Plus server?
A. Use the Actions menu to pause jobs from the Jobs Monitor.
B. Shut down IBM Spectrum Protect Plus.
C. Log on to the IBM Spectrum Protect Plus console and issue the sppreconcile command.
3. What can be done on the Restore Point retention pane?
A. Remove a specific VM from vSnap storage.
B. Remove the restore points from a specific run of an SLA.
C. Remove a specific database from vSnap storage.
Review questions
Uempty
Review answers
1. True.
2. A. Use the Actions menu to pause jobs from the Jobs Monitor
3. B. Remove the restore points from a specific run of an SLA.
Review answers
Uempty
Exercises
Uempty
Exercise introduction
In these exercises, you perform the following tasks:
• Create a view-only user
• Test a view-only user
• Review jobs and job logs
• Use the dashboard
• Run reports
• Collect logs for support
Exercise introduction