Deployment guide series tivoli continuous data protection for files v3.1 sg247423

7,633 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
7,633
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Deployment guide series tivoli continuous data protection for files v3.1 sg247423

  1. 1. Front coverDeployment Guide Series:Tivoli Continuous DataProtection for Files V3.1Deployment best practicesIntegration with TSM and NotesCase studies,troubleshooting , tips Vasfi Gucer Greg Bass Wolfgang Beuttler Marcia Kuboibm.com/redbooks
  2. 2. International Technical Support OrganizationDeployment Guide Series: Tivoli Continuous DataProtection for Files V3.1August 2007 SG24-7423-00
  3. 3. Note: Before using this information and the product it supports, read the information in “Notices” on page xix.First Edition (August 2007)This edition applies to IBM Tivoli Continuous Data Protection for Files Version 3, Release 1.© Copyright International Business Machines Corporation 2007. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADPSchedule Contract with IBM Corp.
  4. 4. Contents Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi The team that wrote this book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiiiPart 1. Planning and architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1. Introduction to Tivoli Continuous Data Protection for Files. . . 3 1.1 General overview of Tivoli Continuous Data Protection for Files . . . . . . . . 5 1.1.1 What is Tivoli Continuous Data Protection for Files? . . . . . . . . . . . . . 5 1.1.2 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . 6 1.1.3 Who should use Tivoli Continuous Data Protection for Files? . . . . . . 9 1.2 How Tivoli Continuous Data Protection for Files works. . . . . . . . . . . . . . . 11 1.3 Main features of Tivoli Continuous Data Protection for Files . . . . . . . . . . 13 1.4 Value proposition of Tivoli Continuous Data Protection for Files . . . . . . . 14 1.4.1 Benefits of using Tivoli Continuous Data Protection for Files . . . . . . 17 1.4.2 Unique differentiators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Chapter 2. Product architecture, planning, and deployment . . . . . . . . . . 19 2.1 Product architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.1.1 Main components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.1.2 Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 2.1.3 Daemon architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2.2 Planning for deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 2.2.1 What are my critical files? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.2.2 Where should I back my files up to? . . . . . . . . . . . . . . . . . . . . . . . . . 26 2.2.3 How often do I need to back up different types of files? . . . . . . . . . . 26 2.2.4 Do I need e-mail and scheduled backups? . . . . . . . . . . . . . . . . . . . . 27 2.2.5 Do I need the Vault feature? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 2.2.6 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29© Copyright IBM Corp. 2007. All rights reserved. iii
  5. 5. 2.3 Best practices and sizing considerations . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.3.1 Overall summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.3.2 Corporate scenario- Tivoli Continuous Data Protection for Files with Tivoli Storage Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 2.3.3 Corporate scenario- file server as remote storage target for Tivoli Continuous Data Protection for Files workstations . . . . . . . . . . . . . . 32 2.3.4 Corporate scenario- Tivoli Continuous Data Protection for Files loaded on file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.3.5 Home user scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 2.4 Tivoli Continuous Data Protection for Files installation requirements . . . . 34 2.4.1 Basic installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 2.4.2 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Part 2. Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Chapter 3. Installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 39 3.1 Basic installation and configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.1.1 Installing Tivoli Continuous Data Protection for Files . . . . . . . . . . . . 40 3.1.2 Configuration using the Initial Configuration Wizard . . . . . . . . . . . . . 48 3.2 Advanced installation options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 3.2.1 Installation using command-line parameters. . . . . . . . . . . . . . . . . . . 65 3.2.2 Silent installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 3.2.3 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 3.2.4 Pull installation (upgrade) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 3.2.5 Providing a configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 3.3 Advanced configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 3.3.1 Settings Notebook. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 3.3.2 Central Administration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 3.4 Additional considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 3.4.1 Installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 3.4.2 Interpreting file and folder patterns . . . . . . . . . . . . . . . . . . . . . . . . . 109 3.4.3 Including and excluding files from protection . . . . . . . . . . . . . . . . . 111 3.4.4 Vault duration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114 3.4.5 Default protection settings (Settings Notebook) . . . . . . . . . . . . . . . 116 Chapter 4. Proof of concept scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 4.1 Product features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 4.2 Single user environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 4.2.1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 4.2.2 Single computer with external storage . . . . . . . . . . . . . . . . . . . . . . 126 4.2.3 Single computer with ISP connection . . . . . . . . . . . . . . . . . . . . . . . 136 4.3 Multiple computers in a home or small business. . . . . . . . . . . . . . . . . . . 145 4.3.1 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 4.3.2 Small business with Tivoli Storage Manager Express . . . . . . . . . . 151iv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  6. 6. 4.3.3 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . 1674.4 Tivoli Continuous Data Protection for Files in an enterprise environment180 4.4.1 Enterprise environment with Tivoli Storage Manager . . . . . . . . . . . 180 4.4.2 Enterprise with Tivoli Continuous Data Protection for Files loaded on file servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 4.4.3 Enterprise and remote offices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2274.5 Restore scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 4.5.1 Restore from local disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230 4.5.2 Restore from remote storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 4.5.3 Restore from Tivoli Storage Manager or Tivoli Storage Manager Express to a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251Chapter 5. Troubleshooting, hints, and tips . . . . . . . . . . . . . . . . . . . . . . . 2555.1 Installation issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 5.1.1 Disk space. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 5.1.2 Non-privileged users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 5.1.3 Port conflicts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 5.1.4 Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 5.1.5 Pull installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2865.2 Replication issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291 5.2.1 Removable disk issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 5.2.2 File server issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 5.2.3 WebDAV issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 5.2.4 Tivoli Storage Manager issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 5.2.5 Transient conditions (remote storage location not reachable) . . . . 3435.3 System operation and log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 5.3.1 Tivoli Continuous Data Protection for Files system operation files . 347 5.3.2 Tivoli Continuous Data Protection for Files logs . . . . . . . . . . . . . . . 348 5.3.3 Tivoli Storage Manager specific log files . . . . . . . . . . . . . . . . . . . . . 3505.4 Tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 5.4.1 Before you start. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 5.4.2 How to run a trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 5.4.3 Tracing example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Contents v
  7. 7. Part 3. Planning for a client engagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 Appendix A. Project planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 Required skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Available resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Solution description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Solution deployment tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Strategies for successful implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Appendix B. Sample Statement of Work for Tivoli Continuous Data Protection for Files deployment . . . . . . . . . . . . . . . . . . . . . 375 Building a protected environment for user workstations. . . . . . . . . . . . . . . . . 376 Abbreviations and Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385vi Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  8. 8. Figures 1-1 Why Tivoli Continuous Data Protection for Files is needed . . . . . . . . . . . . 8 1-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files . . 11 1-3 General overview of Tivoli Continuous Data Protection for Files . . . . . . . 12 2-1 Agent-driver interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 2-2 Replication threads . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 3-1 Installation Setup Language window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3-2 InstallShield Wizard is being prepared . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 3-3 Information window including the build number . . . . . . . . . . . . . . . . . . . . 42 3-4 Software License Agreement options . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 3-5 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 3-6 Ready to Install window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 3-7 Installation progress window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 3-8 Installation completed window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 3-9 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 3-10 What is Critical page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 3-11 Folder and Files Settings dialog box (critical files) . . . . . . . . . . . . . . . . . 51 3-12 Select folders dialog box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 3-13 Applications and Extensions box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 3-14 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 3-15 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 3-16 Initial Backup page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 3-17 Summary page with initial backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 3-18 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 3-19 Message that a new version is being installed . . . . . . . . . . . . . . . . . . . . 73 3-20 Message to reboot system after pull installation . . . . . . . . . . . . . . . . . . . 73 3-21 General page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 3-22 Files to Protect page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 3-23 Folders and Files box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 3-24 Folder and Files Settings dialog box (include/exclude). . . . . . . . . . . . . . 81 3-25 Select folders box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 3-26 Applications box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 3-27 Application Settings box (applications viewed by ranking) . . . . . . . . . . . 84 3-28 Vault box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 3-29 Vault Settings box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 3-30 Back up with new settings check box . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 3-31 E-mail Protection page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 3-32 E-mail Application: list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 3-33 E-mail Application Data Folder: text field . . . . . . . . . . . . . . . . . . . . . . . . 90© Copyright IBM Corp. 2007. All rights reserved. vii
  9. 9. 3-34 Folder and Files Settings box (schedules) . . . . . . . . . . . . . . . . . . . . . . . 91 3-35 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93 3-36 Remote Storage page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 3-37 Advanced page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 3-38 Central Administration Settings window . . . . . . . . . . . . . . . . . . . . . . . . 104 3-39 Successfully published fpcommands.xml pop-up window . . . . . . . . . . 105 3-40 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 3-41 Folder and Files Settings box (example include/exclude settings) . . . . 113 4-1 Single computer, local disk only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 4-2 General Configuration for a single user with local disk configuration . . . 124 4-3 Files to protect in a single user with local disk configuration. . . . . . . . . . 125 4-4 Continuous protection file directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 4-5 Single computer, with external storage . . . . . . . . . . . . . . . . . . . . . . . . . . 127 4-6 General configuration for a single user scenario with external disk . . . . 128 4-7 Selection of important files to continuously protect in a single user scenario with external disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 4-8 Configuring the remote storage for scheduled protection . . . . . . . . . . . . 130 4-9 Configuring files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . 131 4-10 Configure the frequency and time to start the scheduled protection . . . 132 4-11 Start an initial backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 4-12 Original directory and files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 4-13 Replicated directory and files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 4-14 Single computer, with ISP connection. . . . . . . . . . . . . . . . . . . . . . . . . . 136 4-15 Continuous protection for a single computer with ISP connection . . . . 138 4-16 Important files continuous protection in a single user with an ISP connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 4-17 Remote storage with ISP configuration. . . . . . . . . . . . . . . . . . . . . . . . . 140 4-18 Username and password to access Web server. . . . . . . . . . . . . . . . . . 141 4-19 Configure the frequency and time to start the scheduled protection to an ISP provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 4-20 Files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 4-21 Activity report for changed files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 4-22 Activity report for changed file pres1.ppt. . . . . . . . . . . . . . . . . . . . . . . . 144 4-23 Sub-file functionality example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 4-24 Home network with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146 4-25 General configuration without continuous protection . . . . . . . . . . . . . . 147 4-26 Map network drive in each computer . . . . . . . . . . . . . . . . . . . . . . . . . . 148 4-27 Configure user and password to access the file server . . . . . . . . . . . . 148 4-28 Configure remote storage for scheduled protection . . . . . . . . . . . . . . . 149 4-29 Configure schedule and select application for scheduled protection . . 150 4-30 Select files for scheduled protection . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 4-31 Small business without file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 4-32 Computers and applications option on Tivoli Storage Manager Express153viii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  10. 10. 4-33 Wizard to add computers and optionally deploy the backup client software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1544-34 Select option to add a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1554-35 Installation settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1564-36 Confirm settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1574-37 Stop Tivoli Storage Manager Express service . . . . . . . . . . . . . . . . . . . 1574-38 Start Tivoli Storage Manager Express in foreground mode . . . . . . . . . 1584-39 Configure node with delete permission . . . . . . . . . . . . . . . . . . . . . . . . . 1584-40 Shutdown Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . 1594-41 Start Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . 1594-42 Reset the password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1594-43 Windows credentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1604-44 New password information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1604-45 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1614-46 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 1624-47 Remote storage configuration for Tivoli Storage Manager Express . . . 1634-48 Node password on Tivoli Storage Manager Express server . . . . . . . . . 1644-49 Select applications, files, and frequency to back up to Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1654-50 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 1664-51 Filespace on Tivoli Storage Manager Express . . . . . . . . . . . . . . . . . . . 1674-52 Small business with a file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1684-53 Map network drive and reconnect at logon . . . . . . . . . . . . . . . . . . . . . . 1694-54 Configure user name and password to access the file server . . . . . . . 1694-55 General configuration for this scenario . . . . . . . . . . . . . . . . . . . . . . . . . 1704-56 Files to protect in continuous backup . . . . . . . . . . . . . . . . . . . . . . . . . . 1714-57 Configure remote storage for continuous and scheduled protection. . . 1724-58 Configure directories, files, and frequency for schedule protection . . . 1734-59 Select files and directories for scheduled protection . . . . . . . . . . . . . . . 1744-60 Inform password for encrypted files . . . . . . . . . . . . . . . . . . . . . . . . . . . 1744-61 Replicated files with encryption option on file server . . . . . . . . . . . . . . 1754-62 Computers and applications on Tivoli Storage Manager Express . . . . 1764-63 Excluded files on Tivoli Storage Manager Express client . . . . . . . . . . . 1774-64 Remove directory from dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1784-65 Files to backup on Tivoli Storage Manager Express. . . . . . . . . . . . . . . 1794-66 Example of enterprise environment with Tivoli Storage Manager centric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1814-67 Lab environment (Tivoli Storage Manager centric) . . . . . . . . . . . . . . . . 1834-68 Add nodes to Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . 1854-69 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1864-70 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 1874-71 Remote storage configuration to Tivoli Storage Manager . . . . . . . . . . . 1884-72 Node password on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . 189 Figures ix
  11. 11. 4-73 Select applications, files, and frequency to back up to Tivoli Storage Manager Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 4-74 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 190 4-75 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 4-76 Initial Tivoli Continuous Data Protection for Files panel . . . . . . . . . . . . 192 4-77 Central administration configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 4-78 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 4-79 Rename fpcommands.xml to use push installation . . . . . . . . . . . . . . . . 195 4-80 Push installation on Bruge, Windows 2003 server . . . . . . . . . . . . . . . . 196 4-81 Warning message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 4-82 Scheduled backup reports table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 4-83 Expiration example on Tivoli Storage Manager Server . . . . . . . . . . . . . 199 4-84 Example of enterprise environment with Tivoli Storage Manager and file server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 4-85 Lab environment (Tivoli Storage Manager and file server) . . . . . . . . . . 203 4-86 General configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 4-87 Files to protect in continuous protection . . . . . . . . . . . . . . . . . . . . . . . . 205 4-88 Remote storage configuration to file server Florence . . . . . . . . . . . . . . 206 4-89 Select applications, files, and frequency to back up to a file server . . . 207 4-90 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 208 4-91 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 4-92 Central administration configuration for group A. . . . . . . . . . . . . . . . . . 210 4-93 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 4-94 Remote storage configuration to file server Cairo . . . . . . . . . . . . . . . . . 211 4-95 Select applications, files and frequency to backup to file server Cairo . 212 4-96 Create the include list for scheduled protection . . . . . . . . . . . . . . . . . . 213 4-97 Advanced settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214 4-98 Central administration configuration for group B. . . . . . . . . . . . . . . . . . 215 4-99 Publish settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 4-100 Central Management Report for Group B . . . . . . . . . . . . . . . . . . . . . . 218 4-101 Files to protect on file server Florence . . . . . . . . . . . . . . . . . . . . . . . . 219 4-102 Protected vaulting settings on file server Florence . . . . . . . . . . . . . . . 219 4-103 Files to protect on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . 220 4-104 Protected vaulting settings on file server Cairo. . . . . . . . . . . . . . . . . . 220 4-105 Message error when trying to delete vaulted files . . . . . . . . . . . . . . . . 221 4-106 Protect Lotus Notes 7, using scheduled continuous protection . . . . . 222 4-107 Password for Lotus Notes Database. . . . . . . . . . . . . . . . . . . . . . . . . . 222 4-108 Notes files on file server Cairo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 4-109 Backup policy on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . 224 4-110 Register node on Tivoli Storage Manager server . . . . . . . . . . . . . . . . 225 4-111 Example of dsm.opt file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 4-112 Validate password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 4-113 Schedule backup on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . 226x Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  12. 12. 4-114 Enterprise and remote offices example. . . . . . . . . . . . . . . . . . . . . . . . 2274-115 Status page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2284-116 Welcome page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2294-117 Files to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2304-118 Search BackupMe.txt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2314-119 Search status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2324-120 Select the file to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2324-121 Restore Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2334-122 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2344-123 View report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2344-124 Select remote storage to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2354-125 Tivoli Continuous Data Protection for Files searching files . . . . . . . . . 2364-126 Select file name and version of file to restore . . . . . . . . . . . . . . . . . . . 2364-127 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2374-128 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2384-129 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2384-130 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2394-131 Tivoli Continuous Data Protection for Files searching for files . . . . . . 2394-132 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2404-133 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2414-134 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2424-135 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2424-136 Check the restored file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2434-137 Tivoli Continuous Data Protection for Files Change Search Location window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2434-138 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2444-139 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2454-140 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2464-141 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2464-142 Select remote storage to restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2474-143 Tivoli Continuous Data Protection for Files searching for files . . . . . . 2484-144 Select files to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2484-145 Versions of notes file log.nsf on file server . . . . . . . . . . . . . . . . . . . . . 2494-146 Select location to restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2494-147 Summary information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2504-148 Status page, view report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2504-149 The restored notes file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2514-150 Tivoli Storage Manager backup-archive client . . . . . . . . . . . . . . . . . . 2514-151 Restore Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2524-152 Select destination folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2534-153 Report status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2545-1 Ready to Install the Program window . . . . . . . . . . . . . . . . . . . . . . . . . . . 2565-2 Out of Disk Space window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Figures xi
  13. 13. 5-3 Custom Setup window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258 5-4 Cancel installation window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 5-5 InstallShield Wizard Completed window (canceled installation) . . . . . . . 259 5-6 Setup Type (of installation) window . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 5-7 Destination Folder window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 5-8 Change Current Destination Folder window . . . . . . . . . . . . . . . . . . . . . . 262 5-9 Error message during non-privileged user installation . . . . . . . . . . . . . . 263 5-10 Port 9003 already being used by another program . . . . . . . . . . . . . . . . 265 5-11 Tivoli Continuous Data Protection for Files reporting a problem . . . . . . 266 5-12 Tivoli Continuous Data Protection for Files unable to start the Initial Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 5-13 Tivoli Continuous Data Protection for Files entries in the event log . . . 268 5-14 Error entry in the Windows system event log . . . . . . . . . . . . . . . . . . . . 269 5-15 Port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . 270 5-16 Modifying the FpPort DWORD Value . . . . . . . . . . . . . . . . . . . . . . . . . . 271 5-17 Changing the port number to 9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271 5-18 New port number in the FpPort DWORD Value . . . . . . . . . . . . . . . . . . 272 5-19 Original start.html file with port 9003 . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 5-20 File start.html after editing (now using port 9005) . . . . . . . . . . . . . . . . . 274 5-21 Netstat -a output showing the usage of the new port 9005. . . . . . . . . . 276 5-22 HTML listener now successfully listening on port 9005 (Event Viewer) 277 5-23 Tivoli Continuous Data Protection for Files user interface using port 9005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 5-24 Shortcut in the quick launch area . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279 5-25 Push installation failing due to remote computer not being available . . 281 5-26 Check if remote system is available using the ping command . . . . . . . 282 5-27 Push installation failing due to wrong user name or wrong password . 283 5-28 Push installation failing due to wrong command syntax . . . . . . . . . . . . 284 5-29 Successful push installation of Tivoli Continuous Data Protection for Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 5-30 Tivoli Continuous Data Protection for Files (pull) installation message 287 5-31 Event message due to installation of new software version . . . . . . . . . 288 5-32 FPcommand.bat file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 5-33 Options file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 5-34 Message to reboot the computer after the (pull) installation . . . . . . . . . 290 5-35 External USB disk named USB_Drive mapped as drive F:. . . . . . . . . . 292 5-36 Drive F: (USB_Drive) as remote backup target (external device) . . . . . 293 5-37 Disk full informational message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 5-38 Event log entry due to target backup device being full (Event ID: 6077)294 5-39 Remote storage location inaccessible due to disk / file system full (Status page) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 5-40 Tivoli Continuous Data Protection for Files experiencing a problem. . . 295 5-41 Event log entry due to disk / file system full condition (Event ID: 6000) 296xii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  14. 14. 5-42 Modified settings in the Remote Backup page to save space on the remote target location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2975-43 Changed drive letter assignments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2985-44 Informational message that the network target cannot be reached . . . 2995-45 Event entry due to replication problem caused by changed drive letters (Event ID: 6069) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3005-46 Remote storage location inaccessible due to changed drive letter assignment (Status page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3015-47 Shared network folder e$ on file server Izmir mapped to drive (W:) . . . 3035-48 Using the UNC name instead of the drive letter for the remote storage location (Remote Storage page). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3045-49 Using a WebDAV server as the remote storage destination . . . . . . . . . 3065-50 Tivoli Continuous Data Protection for Files needs a password (informational message) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3075-51 Tivoli Continuous Data Protection for Files prompts for a password to access the WebDAV server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3075-52 Entering user name and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3085-53 The two passwords do not match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3085-54 WebDAV server not reachable because no Internet connection is available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3095-55 WebDAV server can be reached again (Internet connection established) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3095-56 Default (minimum) dsm.opt file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3105-57 Using a Tivoli Storage Manager server as a remote backup location (Helsinki). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3135-58 Window explains target location (Helsinki) is not responding properly . 3145-59 Tivoli Continuous Data Protection for Files warning message . . . . . . . 3145-60 Event log entry due to unknown or incorrect ID (node name) entered . 3155-61 Entries in dsierror.log caused by unknown or incorrect ID (node name) entered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3155-62 Tivoli Continuous Data Protection for Files prompting for a password to access the Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . . . . 3185-63 Informational entry in the event log (password information needed) . . 3195-64 Event log entry due to insufficient permission to delete backed up data3205-65 Error messages in dsierror.log due to insufficient permissions to delete backed up data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3215-66 Event log entry when storing more versions of files as defined on remote storage location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3225-67 Tivoli Continuous Data Protection for Files unable to unlink the file (Event ID: 6086). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3235-68 FilePath ERROR entry (Event ID: 6000) in event log due to a permission problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3245-69 Entry in file purge_failed.log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Figures xiii
  15. 15. 5-70 File dsierror.log with error messages ANS1126E . . . . . . . . . . . . . . . . . 325 5-71 Target location (Helsinki) is not responding properly (window). . . . . . . 331 5-72 Entry in event log due to session being rejected from Tivoli Storage Manager server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 5-73 ANS1355E message in dsierror.log file (session rejected) . . . . . . . . . . 332 5-74 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 333 5-75 Entry in file replication-failed.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 5-76 Informational message about the network target being not reachable . 336 5-77 TCP/IP connection error messages in file dsierror.log . . . . . . . . . . . . . 336 5-78 Event log entry caused by the network target being not available (Event ID: 6069). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 5-79 Entry in file replication-active.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 5-80 Entries in file replication-queue.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 5-81 Modified dsm.opt file containing an exclude statement for *.txt files . . . 340 5-82 Entry in event log due to file being excluded from backup (Event ID: 6000) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 5-83 Replication engine unable to copy the file (Event ID: 6086) . . . . . . . . . 342 5-84 ANS1115W warning message in dsierror.log (excluded file) . . . . . . . . 343 5-85 Remote storage location not reachable (notification message) . . . . . . 344 5-86 Remote storage location inaccessible (Status page) . . . . . . . . . . . . . . 345 5-87 Remote storage location reachable again (notification message) . . . . 346 5-88 Remote storage location accessible again (Status page) . . . . . . . . . . . 346 5-89 FilePath agent in interactive mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 5-90 Command to start a Tivoli Continuous Data Protection for Files trace . 354 5-91 Create file.doc to trigger an activity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 5-92 DebugView capturing the trace output . . . . . . . . . . . . . . . . . . . . . . . . . 355 5-93 Command to stop the trace. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 5-94 Quitting the interactive mode of the FilePath agent . . . . . . . . . . . . . . . 355 5-95 Functionality overview of Tivoli Continuous Data Protection for Files. . 377xiv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  16. 16. Tables 1-1 Comparison between Tivoli Continuous Data Protection for Files and traditional backup solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2-1 Summary of protection methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 3-1 Default installation and data directories . . . . . . . . . . . . . . . . . . . . . . . . . 109 3-2 File and folder pattern matches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 3-3 Interaction of inclusion and exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 3-4 General page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 3-5 Files to Protect page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 3-6 E-mail Protection page default settings. . . . . . . . . . . . . . . . . . . . . . . . . . 118 3-7 Remote Storage page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . 118 3-8 Advanced page default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118 4-1 Tivoli Continuous Data Protection V3.1 feature support matrix . . . . . . . 122 4-2 Central administration folder configurations for managing clients. . . . . . 192 4-3 Lifecycle file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 4-4 Characteristics of file on Tivoli Storage Manager . . . . . . . . . . . . . . . . . . 198 4-5 Central administration folder configurations for managing clients. . . . . . 216 5-1 Description of options used in dsm.opt . . . . . . . . . . . . . . . . . . . . . . . . . . 311 5-2 Some additional useful dsm.opt options . . . . . . . . . . . . . . . . . . . . . . . . . 312 5-3 Important system operation files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 5-4 Installation log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 5-5 Replication logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 5-6 Scheduled protection logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 5-7 Local pool log file and gendb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 5-8 Tivoli Storage Manager API log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 5-9 Solution tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363 5-10 Solution demonstration tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 5-11 Skill adjustment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 5-12 Major solution deployment tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 5-13 Technical requirement gathering sample examples . . . . . . . . . . . . . . . 366 5-14 Solution planning sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 5-15 Solution implement sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368 5-16 Solution test sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 5-17 Solution client training sub-tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 5-18 Engagement closing sub-tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370© Copyright IBM Corp. 2007. All rights reserved. xv
  17. 17. xvi Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  18. 18. Examples 5-1 Registering node florence without delete backup permission (register node) 316 5-2 Details of node florence without delete backup permission (query node) 317 5-3 Select command output displaying too much active versions of a file . . 326 5-4 Register node florence with backdelete=yes parameter (register node). 326 5-5 Update existing node florence with backdelete=yes parameter (update node) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 5-6 Details of node florence with delete backup permission (query node) . . 327 5-7 Select command output displaying active and inactive versions of a file 328 5-8 Running expiration on the Tivoli Storage Manager server (expire inventory) 328 5-9 Select command output after running expiration (only active versions) . 329 5-10 Tivoli Storage Manager client sessions disabled on Tivoli Storage Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 5-11 Enable Tivoli Storage Manager client sessions again (enable sessions)334 5-12 Tivoli Storage Manager client sessions enabled on IBM Tivoli Storage Manager server (query status) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 5-13 Tracing example (trace mask=fpl_meta). . . . . . . . . . . . . . . . . . . . . . . . 355© Copyright IBM Corp. 2007. All rights reserved. xvii
  19. 19. xviii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  20. 20. NoticesThis information was developed for products and services offered in the U.S.A.IBM may not offer the products, services, or features discussed in this document in other countries. Consultyour local IBM representative for information on the products and services currently available in your area.Any reference to an IBM product, program, or service is not intended to state or imply that only that IBMproduct, program, or service may be used. Any functionally equivalent product, program, or service thatdoes not infringe any IBM intellectual property right may be used instead. However, it is the usersresponsibility to evaluate and verify the operation of any non-IBM product, program, or service.IBM may have patents or pending patent applications covering subject matter described in this document.The furnishing of this document does not give you any license to these patents. You can send licenseinquiries, in writing, to:IBM Director of Licensing, IBM Corporation, North Castle Drive, Armonk, NY 10504-1785 U.S.A.The following paragraph does not apply to the United Kingdom or any other country where suchprovisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATIONPROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS ORIMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimerof express or implied warranties in certain transactions, therefore, this statement may not apply to you.This information could include technical inaccuracies or typographical errors. Changes are periodically madeto the information herein; these changes will be incorporated in new editions of the publication. IBM maymake improvements and/or changes in the product(s) and/or the program(s) described in this publication atany time without notice.Any references in this information to non-IBM Web sites are provided for convenience only and do not in anymanner serve as an endorsement of those Web sites. The materials at those Web sites are not part of thematerials for this IBM product and use of those Web sites is at your own risk.IBM may use or distribute any of the information you supply in any way it believes appropriate withoutincurring any obligation to you.Information concerning non-IBM products was obtained from the suppliers of those products, their publishedannouncements or other publicly available sources. IBM has not tested those products and cannot confirmthe accuracy of performance, compatibility or any other claims related to non-IBM products. Questions onthe capabilities of non-IBM products should be addressed to the suppliers of those products.This information contains examples of data and reports used in daily business operations. To illustrate themas completely as possible, the examples include the names of individuals, companies, brands, and products.All of these names are fictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.COPYRIGHT LICENSE:This information contains sample application programs in source language, which illustrate programmingtechniques on various operating platforms. You may copy, modify, and distribute these sample programs inany form without payment to IBM, for the purposes of developing, using, marketing or distributing applicationprograms conforming to the application programming interface for the operating platform for which thesample programs are written. These examples have not been thoroughly tested under all conditions. IBM,therefore, cannot guarantee or imply reliability, serviceability, or function of these programs.© Copyright IBM Corp. 2007. All rights reserved. xix
  21. 21. TrademarksThe following terms are trademarks of the International Business Machines Corporation in the United States,other countries, or both: Redbooks (logo) ® Lotus Notes® Redbooks® AIX® Lotus® System p™ Domino® Notes® Tivoli® IBM® Passport Advantage®The following terms are trademarks of other companies:Oracle, JD Edwards, PeopleSoft, Siebel, and TopLink are registered trademarks of Oracle Corporationand/or its affiliates.NetApp, and the Network Appliance logo are trademarks or registered trademarks of Network Appliance,Inc. in the U.S. and other countries.Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, othercountries, or both.Internet Explorer, Microsoft, Outlook, Windows Server, Windows Vista, Windows, Win32, and the Windowslogo are trademarks of Microsoft Corporation in the United States, other countries, or both.Intel, Pentium, Intel logo, Intel Inside logo, and Intel Centrino logo are trademarks or registered trademarksof Intel Corporation or its subsidiaries in the United States, other countries, or both.Other company, product, or service names may be trademarks or service marks of others.xx Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  22. 22. Preface Tivoli Continuous Data Protection for Files is specifically targeted at user computers, such as mobile computers and workstations, as well as file servers. It provides continuous data protection of files, providing the highest level of protection possible, yet is simple to use and administer. This book presents a deployment guide for Tivoli Continuous Data Protection for Files Version 3.1. We cover planning, installing, and troubleshooting Tivoli Continuous Data Protection for Files for several use case scenarios. In addition, we provide some case studies, including integration with IBM Tivoli Storage Manager, that can be used as a proof of concept or demonstration of the product at a client environment. This book is geared for IT Specialists who will be working on Tivoli Continuous Data Protection for Files installations and proof of concepts.The team that wrote this book This book was produced by a team of specialists from around the world working at the International Technical Support Organization, Austin Center. Vasfi Gucer is an IBM® Certified Consultant IT Specialist working at the ITSO Austin Center. He worked with IBM Turkey for 10 years and has been with the ITSO since January 1999. He has more than 12 years of experience in systems management, networking hardware, and distributed platform software. He has worked on various Tivoli® customer projects as a Systems Architect in Turkey and the United States. Vasfi is also a Certified Tivoli Consultant. Greg Bass is a Tivoli storage specialist in the Techline presales support organization based out of Austin, Texas. Greg has been supporting Tivoli storage products since 2000 when he was hired by the Tivoli Sales Infrastructure Group (SIG). Greg originally joined IBM in 1999 when he was brought to Austin to provide technical support for Lotus® Notes® and Domino® servers. Greg has been in the technology realm for over 15 years. Prior to IBM, Greg worked in the San Francisco bay area for PC Computing magazine, Oracle® and an Internet startup called Fabrik. Wolfgang Beuttler is an IBM Tivoli Storage Manager Support Specialist in Mainz, Germany. He works for the Tivoli Storage Manager front- and back-end support team and provides support to clients all over the world, including onsite© Copyright IBM Corp. 2007. All rights reserved. xxi
  23. 23. support. He has more than 14 years of experience in IT and eight years of experience with IBM and the Tivoli Storage Manager product portfolio, starting with ADSM Version 3.1. His areas of expertise include defect as well as non-defect problem determination of Tivoli Storage Manager products. Marcia Kubo is an IT Presales Support Specialist, in Brazil. She has eight years of experience in the IT field. She has been working for IBM since 2004. Her areas of expertise include IBM System p™ and AIX®, IBM Storage and Data Protection solutions. She is an ITIL Certified, Tivoli Productivity Center V3.1 Certified, IBM Certified Deployment Professional: Tivoli Storage Manager V5.3, IBM Certified Storage Administrator: Tivoli Storage Manager V5, and an IBM Certified Advanced Technical Expert for AIX version V4. Thanks to the following people for their contributions to this project: Arzu Gucer, Bart Jacob International Technical Support Organization, Austin Center Terry Copeland, William Haselton, Linda Sandmann, Jennifer Shaw, Eric Schaefer, Chris Stakutis, Daniel Thompson, Erik Wilkinson IBM USABecome a published author Join us for a two- to six-week residency program! Help write a book dealing with specific products or solutions, while getting hands-on experience with leading-edge technologies. You will have the opportunity to team with IBM technical professionals, Business Partners, and Clients. Your efforts will help increase product acceptance and customer satisfaction. As a bonus, you will develop a network of contacts in IBM development labs, and increase your productivity and marketability. Find out more about the residency program, browse the residency index, and apply online at: ibm.com/redbooks/residencies.htmlxxii Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  24. 24. Comments welcome Your comments are important to us! We want our books to be as helpful as possible. Send us your comments about this book or other IBM Redbooks® in one of the following ways: Use the online Contact us review Redbooks form found at: ibm.com/redbooks Send your comments in an e-mail to: redbooks@us.ibm.com Mail your comments to: IBM Corporation, International Technical Support Organization Dept. HYTD Mail Station P099 2455 South Road Poughkeepsie, NY 12601-5400 Preface xxiii
  25. 25. xxiv Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  26. 26. Part 1Part 1 Planning and architecture In this part we introduce the planning and architecture considerations for Tivoli Continuous Data Protection for Files V3.1.© Copyright IBM Corp. 2007. All rights reserved. 1
  27. 27. 2 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  28. 28. 1 Chapter 1. Introduction to Tivoli Continuous Data Protection for Files The newest phase in the evolution of file backup is real time protection, and IBM Tivoli Continuous Data Protection for Files delivers a compelling solution offering a unique blend of continuous data protection and scheduled data protection in a single product. Tivoli Continuous Data Protection for Files is a solution for both file servers and user endpoints such as notebooks and workstations. Tivoli Continuous Data Protection for Files exploits the increasing availability of affordable disk storage by offering multiple disk-based target options for copies of your data. Instead of waiting for a scheduled interval, Tivoli Continuous Data Protection for Files backs up your files the moment they are saved, in real time. Whats more, it does this effortlessly and transparently, in some cases eliminating the backup window. This chapter provides an introduction to Tivoli Continuous Data Protection for Files and discusses the following topics: “Introduction to Tivoli Continuous Data Protection for Files” on page 3 “How Tivoli Continuous Data Protection for Files works” on page 11 “Main features of Tivoli Continuous Data Protection for Files” on page 13© Copyright IBM Corp. 2007. All rights reserved. 3
  29. 29. “Value proposition of Tivoli Continuous Data Protection for Files” on page 144 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  30. 30. 1.1 General overview of Tivoli Continuous DataProtection for Files It is important to understand the evolution of data protection applications and the environments in which they operate in order to fully appreciate the Tivoli Continuous Data Protection for Files solution.1.1.1 What is Tivoli Continuous Data Protection for Files? Tivoli Continuous Data Protection for Files is a unique hybrid approach to file backup that combines replication with traditional backups. Tivoli Continuous Data Protection for Files is a real time, continuous data protection solution for mobile computers, workstations, and fileservers. Backups can go to one or more disk targets. Files are copied and saved in their native format. Tivoli Continuous Data Protection for Files is also highly tolerant of transient network connectivity. Easy-to-use wizards allow for simple configuration and file restoration. In addition, Tivoli Continuous Data Protection for Files is engineered specifically to support Lotus Notes and Microsoft® Outlook® mail clients. Tivoli Continuous Data Protection for Files will back up your most important files the moment they change instead of waiting for a scheduled backup. Non-critical files can be backed up on a scheduled basis. It works in the background, similar to a virus scanner, and is therefore completely transparent to the user. Since Tivoli Continuous Data Protection for Files has a single end-point architecture, there is no need for additional components such as a server component. It requires only a single installation on the system where the files to be protected are located. Tivoli Continuous Data Protection for Files keeps copies of your data in their native file format and does not modify or encode them in any way. This transparency allows for direct access to the copied files with our without the Tivoli Continuous Data Protection for Files GUI. In addition to providing multiple recovery points through file versioning, Tivoli Continuous Data Protection for Files provides additional redundancy by allowing multiple options for target destinations for your copied files: On local disk for protection, even when not connected to a network To a network file server or NAS device for remote machine protection To an IBM Tivoli Storage Manager (Tivoli Storage Manager) or IBM Tivoli Storage Manager Express (Tivoli Storage Manager Express) server To a Web-based device through http or https Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 5
  31. 31. Table 1-1 demonstrates the differences between Tivoli Continuous Data Protection for Files and traditional backup approaches. Table 1-1 Comparison between Tivoli Continuous Data Protection for Files and traditional backup solutions Tivoli Continuous Data Traditional backup Protection for Files solutions When to protect Continuous for highly Scheduled, full system important files, scheduled for others How to detect Journal-based on all file Journal-based on some file systems systems Where copies are stored Disk only, locally or Typically on tape remote; Tivoli Storage Manager Storage format Left “native”, online as files Wrapped into a proprietary format Management / Simplified per-client Client-server concept; administration administration only server component typically complexity more expensive/complex So overall, Tivoli Continuous Data Protection for Files provides simple, effective, and real time file protection for: Accidental file deletion File corruption Unwanted file alteration Disk crashes Other unforeseen losses1.1.2 Why Tivoli Continuous Data Protection for Files is needed Businesses today are increasingly concerned with protecting their data. Losing key business information can hamper productivity, delay projects, and divert resources and calls to the help desk. It can also harm organizations when they face regulatory scrutiny. In fact, many businesses today are legally required to use formal data protection. Data corruption is a regular concern, and companies need better recovery point capabilities. Often the most valuable files are those that the users are working with right now. In addition, companies need sophisticated policy-based data management that enables them to focus on data with the most business value.6 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  32. 32. Although most companies have implemented solutions for protecting enterprisedata, data residing on workstations and notebooks is often underprotected—even though it amounts to 60 percent of all corporate data, accordingto some industry experts. This is particularly true where lost data cansignificantly impact productivity and viability. Additional facts to consider: In many companies, about 60-70% of corporate data resides on notebooks and workstations which are rarely, if ever, backed up. Almost half of small to medium sized businesses admit to having no formal data protection procedure. The loss of productivity due to data loss on user computers is a growing concern. Virus and data corruption on file servers is an increasing problem. – Companies need better recovery point capabilities. Today’s backup and recovery solutions are usually scheduled and tend to miss the most valuable data- what the user is working on right now. Mobile computer/desktop data protection is a growing problem: – Corporate data centers are reluctant to take on mobile computer management. – The business impact of lost data on mobile computers/desktops is increasing: • Specific segments, such as law firms, medical practices, consulting, and so on, can have a very significant impact to productivity and liability. • The aggregate impact to large corporations is significant.With this in mind, Tivoli Continuous Data Protection for Files is designed to helpalleviate clients concerns and provide simple, effective, and efficient dataprotection and integrity. Key client issues driving the requirements for continuousdata protection are: Critical information assets are being stored across the organization; they are no longer consolidated on just a few key servers. The complexity and expense associated with the replication of information assets across an organization. A shortage of skilled people resources, which demands that highly automated tools be deployed to help allow consistent practices across platforms, minimize human error, and improve the amount of storage a single storage administrator can handle. Meeting service-level objectives by providing continuous availability of data. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 7
  33. 33. The integrity of data for governance and security requirements. Backups taken “only” on a scheduled basis allow too much productivity loss. For several years a major market trend has been the steady decline in the cost of disk storage (local hard drives, SAN disks, removable disks, NAS devices, and so on). This trend makes file protection using disk replication technologies more cost effective compared to traditional backup/recovery solutions, which primarily use tape as their storage repository. Tivoli Continuous Data Protection for Files leverages this development by utilizing a traditional backup and recovery solution while also employing data replication techniques. In the long term, this approach will lead to maximized efficiency and productivity in terms of both human and financial resources. For more information about the value proposition and the benefits of using Tivoli Continuous Data Protection for Files, refer to section 1.4, “Value proposition of Tivoli Continuous Data Protection for Files” on page 14. Why is Tivoli Continuous Data Protection for Files needed? 1. Employee productivity declines when data assets are lost or difficult to recover. Recovery from a Recovery from tape disk image copy 2. Business and regulatory requirements for data continuity are increasing. Cost 3. Disk costs are declining, making replication technologies more cost effective. 4. Critical data assets found in remote Recovery Time Objective offices, mobile computers, and desktops are often not protected. Tivoli Continuous Data Protection for Files 5. Employee productivity declines with delivers faster recovery of file assets difficult recovery of data and recreation of lost assets. Figure 1-1 Why Tivoli Continuous Data Protection for Files is needed8 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  34. 34. 1.1.3 Who should use Tivoli Continuous Data Protection for Files? The concept and design of Tivoli Continuous Data Protection for Files makes it ideal to protect both home computing environments and workstations or large file servers in business critical environments. Generally speaking, Tivoli Continuous Data Protection for Files should be used by everyone who has the need to continuously protect files in real time. Ideal candidates for Tivoli Continuous Data Protection for Files are organizations with valuable data spread across multiple locations, departments, and file servers, or those whose IT infrastructure includes desktops and mobile computers which are not protected adequately or frequently. Tivoli Continuous Data Protection for Files might also be of interest for enterprise clients with large file servers already using traditional backup solutions like Tivoli Storage Manager or Veritas NetBackup. Due to the amount of data needed to be backed up, large file servers are often unable to meet their backup window. Data loss can also occur after the point of the last scheduled backup. Tivoli Continuous Data Protection for Files with its continuous backup methodology is therefore a perfect complement to traditional backup solutions. Overall, Tivoli Continuous Data Protection for Files could be the answer when: Clients are considering buying disks as an alternative to tape for simpler administration and configuration and faster recovery service levels. Clients view data as a major corporate asset. Clients are considering snapshot technologies. With Tivoli Continuous Data Protection for Files, there is no need to understand advanced IT concepts such as snapshots, mirrors, synchronous versus asynchronous and how to configure, maintain, and manage such elements. Clients are concerned about their ability to meet service and availability levels with a minimal to zero backup window. Skilled storage administrators are difficult to find and retain. Employee productivity suffers due to accidental data loss and recreating files from scratch. Organizations are considering a backup solution for remote offices Tivoli Continuous Data Protection for Files is ideal for remote office servers, because it will maintain a local backup of files and replicate data to centrally based servers while tolerating issues with network connectivity. System administrators need their computer systems to be online 24x7 with minimum CPU or network impact during data protection operations. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 9
  35. 35. The organization is considering how to easily protect information assets found on individual desktops and mobile computers with minimum administration. The organization needs to protect critical files from alteration, deletion, viruses, and corruption.10 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  36. 36. 1.2 How Tivoli Continuous Data Protection for Filesworks Tivoli Continuous Data Protection for Files is a new backup paradigm using a unique hybrid approach by combining modern replication technologies with traditional backup methods. It does so by taking all the benefits from each technology and uniting them together into a completely new product: Tivoli Continuous Data Protection for Files. Tivoli Traditional Continuous Replication Data backups Protection for Files • To-disk duplication • Versioning of files • Lightning fast • Central administration • Real time for important files • Archiving (vaulting) • Tolerant of transient • Retention networks • Highly scalable • Multiple targets Figure 1-2 Unique hybrid approach of Tivoli Continuous Data Protection for Files But how does it work? Figure 1-3 on page 12 gives a general overview on how Tivoli Continuous Data Protection for Files works. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 11
  37. 37. Figure 1-3 General overview of Tivoli Continuous Data Protection for Files Tivoli Continuous Data Protection for Files tracks the creation of new files or changes to existing files. If the file is included in your list of protected files or file types an immediate copy is made into a backup area (a separate directory tree) on the local disk. Tivoli Continuous Data Protection for Files can store multiple versions of each file subject to the local “pool size” which can be configured by the user. When the pool is full, the oldest copies (versions) are removed to make room for newer ones. The same file can also be sent to a remote storage area, such as a removable disk, file server, NAS device, and WebDAV server for remote protection. Another copy of the file can be sent to a Tivoli Storage Manager server or Tivoli Storage Manager Express server. Traditionally, Tivoli Storage Manager is a data protection product often used in larger business environments. Those clients might find Tivoli Continuous Data Protection for Files useful as a real time client solution for mobile computers and workstations, but they still want most of the protected data to be managed by a Tivoli Storage Manager server. Note: The Tivoli Continuous Data Protection for Filescode installs the Tivoli Storage Manager API automatically, so there is no need to install a separate API package. If scheduled protection is enabled, then files associated with scheduled protection will be queued for transmission to the remote target based on the12 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  38. 38. interval that has been selected within Tivoli Continuous Data Protection for Files (Hourly, Daily, Weekly, Monthly). When the interval expires, Tivoli Continuous Data Protection for Files will copy changed files to the remote target storage location. The types of protection offered by Tivoli Continuous Data Protection for Files (continuous or scheduled, local or remote) can be easily configured by the user in multiple combinations. This allows the user to protect their assets in a highly flexible manner. To summarize how Tivoli Continuous Data Protection for Files works, we have to differentiate between continuous and scheduled backup concepts: Files protected continuously: – Specify multiple storage locations for continuously protected files. – The target area(s) will capture a copy of the file each time it is saved. – The local target area is auto-managed as a pool with a configurable size. – There is an option to specify a remote file server for off-machine protection; it is still real time, but tolerant of transient networks. – There is an option to specify a Tivoli Storage Manager server or Tivoli Storage Manager Express server for off-machine protection; it is still real time, but tolerant of transient networks. Files protected by scheduled backups (primarily mail files): – Mail files are protected on a scheduled basis by being sent to the remote file server or Tivoli Storage Manager server. – Change-journal eliminates having to take processor resources to scan the file system. – Files are “versioned” on a remote file server, allowing for point-in-time restore. – Remote versions are automatically managed to a configurable pool size.1.3 Main features of Tivoli Continuous Data Protectionfor Files At the time of this publication, the latest version of Tivoli Continuous Data Protection for Files was version 3.1. The main features of this version are: Completely automated continuous protection of important files When a file is saved: – A copy is stored in a pool on local disk. Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 13
  39. 39. – Another copy can be sent to a file server, NAS device, or WebDAV server, Tivoli Storage Manager, or Tivoli Storage Manager Express server Real time data protection High/low priority files options Tivoli Continuous Data Protection for Files allows user designated files to be backed up continuously as soon as they change. The user can also designate less important or constantly changing files to be saved on a scheduled basis (Hourly, Daily, Weekly, Monthly). File include/exclude options Tivoli Continuous Data Protection for Files offers the usage of include/exclude lists. By using them, the client can define precisely what type of files will be included for protection. They can also specify a list of files or directories that will be excluded by Tivoli Continuous Data Protection for Files and not backed up or vaulted. Tolerant of transient networks Versioning of files Archive retention Scalable Small foot print Tivoli Continuous Data Protection for Files can be installed in a few minutes on a system and will only use about 21 MB of disk space. Simplified management and central administration Due to its simplified management concept, Tivoli Continuous Data Protection for Files provides a central administration interface that allows the user to restore his own files quickly and easily. No server component required Maintains native file format Tivoli Continuous Data Protection for Files maintains files in their natural format and does not encode them in a proprietary format or modify them in any other way.1.4 Value proposition of Tivoli Continuous DataProtection for Files For business units dependent on data availability and rapid data recovery, Tivoli Continuous Data Protection for Files provides uniquely efficient and effective14 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1
  40. 40. data protection to ensure business continuity, employee productivity, and integrityof information assets.For storage managers and administrators responsible for protecting data whilecontaining cost, Tivoli Continuous Data Protection for Files simplifiesheterogeneous storage management and provides real options for an integrateddata protection solution across all information assets.Tivoli Continuous Data Protection for Files: Provides easy to use data protection and integrity, requires little or no training to use Improves employee productivity by providing real time backups of data, so when a failure occurs, the recovery can be the latest version, not the last time a scheduled backup ran Improves IT productivity and labor resource utilization, because users can more easily recover files without IT involvement Improves network and bandwidth usage, because it is optimized to send data through network only when it is connected with no user or IT manual intervention required for optimizing the bandwidth usageThe value proposition using Tivoli Continuous Data Protection for Files can besummarized as follows: Reduced or eliminated backup window – Improved backup resource utilization – Better return on investment (ROI) and total cost of ownership (TCO) Note: In finance, the return on investment (ROI)a is a calculation used to determine whether a proposed investment is wise, and how well it will repay the investor. It is calculated as the ratio of the amount gained (taken as positive), or lost (taken as negative), relative to the basis. Total cost of ownership (TCO)b is a financial estimate designed to help consumers and enterprise managers assess direct and indirect costs related to the purchase of any capital investment, such as (but not limited to) computer software or hardware. a. Definition taken from article “Return on investment”, found at: http://en.wikipedia.org/wiki/Return_on_investment b. Definition taken from article “Total cost of ownership”, found at: http://en.wikipedia.org/wiki/Total_cost_of_ownership Improved recovery point objective (RPO) Chapter 1. Introduction to Tivoli Continuous Data Protection for Files 15
  41. 41. – Reduced loss of data – Improved productivity Note: The RPO is the degree of difference between the active online data and the disaster recovery copy of that data. An RPO of zero would mean that the primary copy and the disaster recovery copy are in exact synchronization. A failure would result in zero loss of data. Improved recovery time objective (RTO) – User initiated restore, zero administration intervention – Optional recovery from disk (local or remote) Note: The RTO is the amount of time after a failure that someone is willing to spend before a given application or group of data is back up and available. An RTO of zero means that failures should cause zero disruption.16 Deployment Guide Series: Tivoli Continuous Data Protection for Files V3.1

×