IBM Tivoli Storage Resource Manager: A Practical Introduction Front cover
by user
Comments
Transcript
IBM Tivoli Storage Resource Manager: A Practical Introduction Front cover
Front cover IBM Tivoli Storage Resource Manager: A Practical Introduction Take control of storage resources in your enterprise Receive early alerts of storage problems New! ESS reporting and Tivoli integration Charlotte Brooks Michel Baus Michael Benanti Ivo Gomilsek Urs Moser ibm.com/redbooks International Technical Support Organization IBM Tivoli Storage Resource Manager: A Practical Introduction August 2003 SG24-6886-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xxiii. Second Edition (August 2003) This edition applies to IBM Tivoli Storage Resource Manager (product number 5698-SRM), IBM Tivoli Storage Resource Manager for Databases (product number 5698-SRD), IBM Tivoli Storage Resource Manager for Chargeback (product number 5698-SRC), and IBM Tivoli Storage Resource Manager Express Edition (5698-SRX) © Copyright International Business Machines Corporation 2003. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiv Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The team that wrote this redbook. . . . . . . . . . . . . . . . . . . Become a published author . . . . . . . . . . . . . . . . . . . . . . . Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...... ...... ...... ...... ....... ....... ....... ....... ...... ...... ...... ...... . . . . . . . xxv . . . . . . xxvi . . . . . . xxvii . . . . . .xxviii Summary of changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix October 2003, Second Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxix Part 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1. Introduction to Storage Resource Management . . . . . . . . . . . . . . . . . . . . . . 3 1.1 What is Storage Resource Management? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.1.1 Storage Resource Management, then and now . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2 Storage management issues today. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.2.1 Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.2.2 Storage costs too much, and money is not used efficiently . . . . . . . . . . . . . . . . . . 8 1.2.3 Unmanaged storage costs too much, and the scope is large . . . . . . . . . . . . . . . . 12 1.2.4 Storage management functions defined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 1.2.5 Architecture for a suite of Storage Management solutions . . . . . . . . . . . . . . . . . . 15 1.2.6 Standards and Storage Resource Management tools . . . . . . . . . . . . . . . . . . . . . 16 1.3 Objectives of Storage Resource Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Chapter 2. Introduction to IBM Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . 2.1 IBM Tivoli Storage Resource Manager overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.1 Business purpose of Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . 2.1.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.3 IBM Tivoli Storage Resource Manager products . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.4 Components of IBM Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . 2.1.5 Supported platforms for IBM Tivoli Storage Resource Manager. . . . . . . . . . . . . . 2.1.6 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Enhancements to Tivoli Storage Resource Manager V 1.2 . . . . . . . . . . . . . . . . . . . . . 2.2.1 Automated filesystem extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.2 Enterprise Storage Server (ESS) integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.3 TEC integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.4 Cloudscape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2.5 UDB/DB2 support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Justification for IBM Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . . . . . 2.3.1 Improving storage return on investment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4 Functions of IBM Tivoli Storage Resource Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4.1 Basic menu displays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4.2 Discover and monitor Agents, disks, filesystems, and databases . . . . . . . . . . . . 2.4.3 Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.4.4 Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . © Copyright IBM Corp. 2003. All rights reserved. 23 24 24 24 25 26 28 29 29 29 30 30 30 30 30 31 31 32 35 38 41 iii 2.4.5 Chargeback: Charging for storage usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 2.5 Chapter summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Part 2. Design considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Chapter 3. Deployment architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1 IBM Tivoli Storage Resource Manager architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 IBM Tivoli Storage Resource Manager Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.1 Discovery of unmanaged Windows systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.2 Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 IBM Tivoli Storage Resource Manager Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4 Deployment considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.1 Repository database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.2 CIM/OM server placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.3 NAS Agent placement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.4.4 Novell NetWare Agent placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5 Deployment scenarios. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.5.1 Standalone Server installation with local database. . . . . . . . . . . . . . . . . . . . . . . . 3.5.2 Standalone Server installation with remote database . . . . . . . . . . . . . . . . . . . . . . 3.5.3 Standby Server installation for HA using remote database. . . . . . . . . . . . . . . . . . 3.5.4 Windows cluster install of IBM Tivoli Storage Resource Manager Server . . . . . . 3.5.5 AIX cluster installation of IBM Tivoli Storage Resource Manager Server . . . . . . . 47 48 49 50 51 52 53 53 54 55 58 59 59 59 60 61 62 Part 3. Installation and basic operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Chapter 4. IBM Tivoli Storage Resource Manager installation . . . . . . . . . . . . . . . . . . . 67 4.1 Supported operating system platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 4.2 Supported databases for repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 4.3 Tivoli Storage Resource Manager Server install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 4.3.1 Lab environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 4.3.2 Database creation for repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 4.3.3 Installation of the Server code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 4.3.4 Microsoft SQL-Server as repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 4.3.5 Installing Cloudscape as a test database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 4.3.6 Configuration for Web access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 4.3.7 Installation of the GUI code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 4.3.8 Installing the Server code on UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 4.4 Installing the Agent code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 4.5 Applying maintenance to Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . 93 4.5.1 Planned upgrade installation for Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 4.6 Basic administrative tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 4.6.1 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 4.6.2 Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 4.6.3 Administration: Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 4.6.4 Administrative Services: Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 4.6.5 Administrative Services: Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 4.6.6 Administrative Services: Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 4.7 Microsoft Cluster installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123 4.7.1 Microsoft Cluster initial setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 4.7.2 Adding shared disk resource for DB2 instance and SRM installation . . . . . . . . . 133 4.7.3 Installation of DB2 database on both nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 4.7.4 Setting up a clustered instance in DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 4.7.5 Installing IBM Tivoli Storage Resource Manager Server on both nodes. . . . . . . 135 4.7.6 Copying the repository database to the clustered instance . . . . . . . . . . . . . . . . 137 iv IBM Tivoli Storage Resource Manager: A Practical Introduction 4.7.7 Editing the Server config file to reflect the database change . . . . . . . . . . . . . . . 4.7.8 Creating clustered resources for the Server and Agent . . . . . . . . . . . . . . . . . . . 4.8 Manager HA install using remote Oracle database. . . . . . . . . . . . . . . . . . . . . . . . . . . 4.8.1 Testing the standby HA installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.9 CIM/OM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.9.1 What is CIM/OM? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.9.2 CIM/OM Server installation for ESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.9.3 CIM/OM configuration in IBM Tivoli Storage Resource Manager . . . . . . . . . . . . 138 138 142 145 145 145 146 153 Chapter 5. Operations: Policy, Quotas, and Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1 OS Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.1 Navigation tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.2 Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.3 Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.4 Pings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.5 Probes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.6 Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.7 Scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 OS Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.1 Alerting navigation tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.2 Computer Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.3 Filesystem Alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.4 Directory Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.5 Alert logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3 Policy management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.1 Filesystem extension and LUN provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.2 Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.3 Network Appliance Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.4 Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.5 Scheduled actions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4 Database monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4.1 Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4.2 Probes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4.3 Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4.4 Scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5 Database Alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5.1 Instance Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5.2 Database-Tablespace Alerts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5.3 Table Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5.4 Alert log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6 Databases policy management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6.1 Network Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6.2 Instance Quota . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6.3 Database Quota . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.7 Database administration samples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.7.1 Database up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.7.2 Database utilization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.7.3 Need for reorganization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 160 160 162 172 174 177 180 185 189 192 194 197 198 198 200 200 217 223 224 229 230 231 232 233 234 235 235 237 240 240 241 241 242 242 242 242 242 243 Part 4. Customizing and advanced operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Chapter 6. Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 6.1 Tivoli Storage Resource Manager reporting capabilities. . . . . . . . . . . . . . . . . . . . . . . 248 6.1.1 Major reporting categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Contents v vi 6.2 Using the standard reporting functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.1 Asset Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.2 Storage Subsystems Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.3 Availability Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.4 Capacity Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.5 Usage Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.6 Usage Violation Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.7 Backup Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3 Tivoli Storage Resource Manager ESS Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.3.1 ESS Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4 IBM Tivoli Storage Resource Manager top 10 reports . . . . . . . . . . . . . . . . . . . . . . . . 6.4.1 ESS used and free storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.2 ESS attached hosts report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.3 Computer Uptime reporting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.4 Growth in storage used and number of files . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.5 Incremental backup trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.6 Database reports against DBMS size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.7 Database instance storage report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4.8 Database reports size by instance and by computer . . . . . . . . . . . . . . . . . . . . . 6.4.9 Locate the LUN on which a database is allocated . . . . . . . . . . . . . . . . . . . . . . . 6.4.10 Finding important files on your systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5 Creating customized reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.1 System Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.2 Reports owned by a specific username . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.5.3 Batch Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.6 Setting up a schedule for daily reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.7 Setting up a reports Web site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.8 Charging for storage usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 252 262 262 263 266 268 287 297 297 316 316 318 319 321 324 327 328 329 331 333 345 345 348 351 360 361 364 Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager . . . . . . . . 7.1 IBM Tivoli Storage Resource Manager environment. . . . . . . . . . . . . . . . . . . . . . . . . . 7.1.1 IBM Tivoli Storage Resource Manager Server . . . . . . . . . . . . . . . . . . . . . . . . . . 7.1.2 Tivoli Storage Resource Manager Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2 Integration with IBM Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.1 IBM Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.2 Setup for backing up Tivoli Storage Resource Manager. . . . . . . . . . . . . . . . . . . 7.2.3 Tivoli Storage Manager Server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.4 Client configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.2.5 Additional considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3 Backup procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3.1 Agent files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3.2 Server files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.3.3 IBM Tivoli Storage Resource Manager database . . . . . . . . . . . . . . . . . . . . . . . . 7.4 Restore procedures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.4.1 Restore Agent files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.4.2 IBM Tivoli Storage Resource Manager Server files . . . . . . . . . . . . . . . . . . . . . . 7.4.3 Tivoli Storage Resource Manager database. . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.5 Disaster Recovery procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.5.1 Windows 2000 restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.5.2 ITSRMDB database restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.6 Database maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7.7 IBM Tivoli Storage Resource Manager with SQL-Server . . . . . . . . . . . . . . . . . . . . . . 7.7.1 Using Oracle for the IBM Tivoli Storage Resource Manager database . . . . . . . 369 370 370 371 371 371 372 373 374 378 378 379 381 382 387 387 390 392 396 396 399 401 404 408 IBM Tivoli Storage Resource Manager: A Practical Introduction Part 5. Tivoli Systems Management integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 Chapter 8. Integration with Tivoli Enterprise Console. . . . . . . . . . . . . . . . . . . . . . . . . 8.1 Introduction to Tivoli Enterprise Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.2 Lab environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.3 Configuring the Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.4 Configuring TEC Event Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.5 Event format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8.6 Tivoli Storage Resource Manager event forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . 411 412 413 414 418 426 427 Chapter 9. Integration with Tivoli Enterprise Data Warehouse . . . . . . . . . . . . . . . . . . 9.1 Introduction to Tivoli Enterprise Data Warehouse. . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.2 Tivoli Storage Resource Manager Warehouse Pack . . . . . . . . . . . . . . . . . . . . . . . . . 9.3 Tivoli GUID and Data Warehouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.4 Configuring TEDW: Importing Warehouse Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.4.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.4.2 Installing the Warehouse Enablement Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.4.3 Register the Tivoli Storage Resource Manager database with ODBC . . . . . . . . 9.4.4 Configuring Tivoli Enterprise Data Warehouse . . . . . . . . . . . . . . . . . . . . . . . . . . 9.4.5 Configure ETLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9.4.6 Verifying data in DB2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431 432 433 434 434 435 435 439 444 448 455 Chapter 10. Integration with Tivoli Configuration Manager . . . . . . . . . . . . . . . . . . . . 10.1 Introduction to IBM Tivoli Configuration Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.2 Inventory - determine who has got which version . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.2.1 Create an inventory profile in Tivoli Framework . . . . . . . . . . . . . . . . . . . . . . . . 10.3 Software distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10.3.1 Build software package with Software Package Editor . . . . . . . . . . . . . . . . . . . 10.3.2 Create software distribution profile in Tivoli Framework . . . . . . . . . . . . . . . . . . 457 458 459 459 470 470 478 Chapter 11. Integration with Tivoli Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.1 Introduction to IBM Tivoli Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11.2 Tivoli Monitoring with Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . . 11.3 Daemons to monitor and restart actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 485 486 486 487 Part 6. Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 Appendix A. Example scripts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 Tivoli Storage Resource Manager for Databases scripts . . . . . . . . . . . . . . . . . . . . . . . . . . 497 Backup and restore scripts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 Appendix B. Additional material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Locating the Web material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Web material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System requirements for downloading the Web material . . . . . . . . . . . . . . . . . . . . . . . How to use the Web material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 503 503 503 504 Abbreviations and acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . Other resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Referenced Web sites . . . . . . . . . . . . . . . . . . . . . . . . . . . How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . IBM Redbooks collections. . . . . . . . . . . . . . . . . . . . . . ...... ...... ...... ...... ...... ....... ....... ....... ....... ....... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... Contents 507 507 507 508 508 vii Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 viii IBM Tivoli Storage Resource Manager: A Practical Introduction Figures 1-1 1-2 1-3 1-4 1-5 1-6 1-7 1-8 1-9 1-10 1-11 1-12 1-13 1-14 2-1 2-2 2-3 2-4 2-5 2-6 2-7 2-8 2-9 2-10 2-11 2-12 2-13 2-14 2-15 3-1 3-2 3-3 3-4 3-5 3-6 3-7 3-8 3-9 3-10 3-11 3-12 3-13 4-1 4-2 4-3 4-4 4-5 4-6 Storage Resource Management definitions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Storage management issues today . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Infrastructure growth issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 SRM helps you recapture dollars already spent on storage . . . . . . . . . . . . . . . . . . . 10 Predicted savings from managed storage versus unmanaged storage. . . . . . . . . . . 11 The need for storage management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Scope of the problem - total storage, total number of filesystems . . . . . . . . . . . . . . . 13 Number and cost of storage administrators needed . . . . . . . . . . . . . . . . . . . . . . . . . 14 Storage Management disciplines - architecture for a suite of solutions. . . . . . . . . . . 16 Storage standards organizations and their standards . . . . . . . . . . . . . . . . . . . . . . . . 17 SMIS/CIM/WBEM management model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 SMI Specification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 CIM Agent & CIM Object Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Objectives of Storage Resource Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Tivoli Storage Resource Manager architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 IBM Tivoli Storage Resource Manager products . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Components of Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Tivoli Storage Resource Manager functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Agent summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Tivoli Storage Resource Manager - dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Availability Report - Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Asset Report of discovered disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Asset Report of database tablespaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Summary View - by filesystem, disk space used and disk space free. . . . . . . . . . . . 38 Asset Report - BANDA assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Historical report of filesystem utilization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 SRM Reports on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 Alert Log and details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Business benefits of Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . . . 44 IBM Tivoli Storage Resource Manager architecture . . . . . . . . . . . . . . . . . . . . . . . . . 48 IBM Tivoli Storage Resource Manager Server roles . . . . . . . . . . . . . . . . . . . . . . . . . 49 Unmanaged systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 SRM Agent tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 CIM/OM server placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Setup of SRM Agent for NAS devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 After setting 311 for NAS discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Setup of SRM Agent for NetWare systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Installation with local database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Installation with remote database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 HA setup with remote database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Windows 2000 cluster setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 AIX cluster setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Supported operating system platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 Supported databases for repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Installation of Tivoli Storage Resource Manager Server . . . . . . . . . . . . . . . . . . . . . . 70 Initial installation screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Selecting product to install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Enter licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 © Copyright IBM Corp. 2003. All rights reserved. ix 4-7 4-8 4-9 4-10 4-11 4-12 4-13 4-14 4-15 4-16 4-17 4-18 4-19 4-20 4-21 4-22 4-23 4-24 4-25 4-26 4-27 4-28 4-29 4-30 4-31 4-32 4-33 4-34 4-35 4-36 4-37 4-38 4-39 4-40 4-41 4-42 4-43 4-44 4-45 4-46 4-47 4-48 4-49 4-50 4-51 4-52 4-53 4-54 4-55 4-56 4-57 4-58 4-59 x Selecting the database engine for the repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Creating account for running the service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Selecting the database for the repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Repository parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Server setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 NAS settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Space requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Before copying files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 User create for UDB account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Installation completed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Selecting Microsoft SQL Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Microsoft SQL-Server parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Repository parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Cloudscape selection to install. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Cloudscape warning for production use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Creating virtual Web directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Defining the alias name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82 Defining the directory for Web access files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 Access permissions for virtual directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83 IBM Tivoli Storage Resource Manager main Web window . . . . . . . . . . . . . . . . . . . . 84 Granting permission for the applet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Main administration GUI screen. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 Opening properties for the tsrm Web directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Tsrm properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Document properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87 Selecting GUI to install. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Server name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Size and directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89 Agent install selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Agent parameters setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 Space requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Novell logon ID creation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91 Selecting to apply the maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 Product maintenance selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94 DB2 admin user ID and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Maintenance finished . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Select Agent to upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Schedule agent upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Force upgrade on Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Alert selection for failed Agent upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Server login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Main panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 Menus in GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Tool Bar functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Right-click menu on Services tree components. . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Agent General view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Agent Details view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 Agent Jobs view. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Right-click menu on Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106 Agent log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 License Keys editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Adding new license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Licenses for IBM Tivoli SRM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109 IBM Tivoli Storage Resource Manager: A Practical Introduction 4-60 4-61 4-62 4-63 4-64 4-65 4-66 4-67 4-68 4-69 4-70 4-71 4-72 4-73 4-74 4-75 4-76 4-77 4-78 4-79 4-80 4-81 4-82 4-83 4-84 4-85 4-86 4-87 4-88 4-89 4-90 4-91 4-92 4-93 4-94 4-95 4-96 4-97 4-98 4-99 4-100 4-101 4-102 4-103 4-104 4-105 4-106 4-107 4-108 4-109 4-110 4-111 4-112 Licensing Novell NetWare Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Licenses for Tivoli Storage Resource Manager for NAS . . . . . . . . . . . . . . . . . . . . . NAS devices logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Login definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Licenses for Tivoli Storage Resource Manager for Databases . . . . . . . . . . . . . . . . RDBMS Logins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Defining RDBMS Login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alert Disposition screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Log File Retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filters for Quota Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Agent selection for NAS and NDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Defining the NAS Agent for Scan/Probe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Defining the Novell NetWare Agent for Scan/Probe . . . . . . . . . . . . . . . . . . . . . . . . History Aggregator definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NetWare Tree Login Administration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Novell Tree Login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . History retention: Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . . . . . . . Removed Resource Retention: Tivoli Storage Resource Manager . . . . . . . . . . . . . History retention: Tivoli Storage Resource Manager for Databases . . . . . . . . . . . . Removed Resource Retention: Tivoli Storage Resource Manager for Databases . Cluster installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cluster Wizard Welcome panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HCL requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Node selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cluster name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cluster user ID . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Shared disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Quorum disk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Private network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Public network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Network priority for internal cluster communication . . . . . . . . . . . . . . . . . . . . . . . . . Cluster IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Joining the cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Joining cluster name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Account for running the service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Running cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 clustered instance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database on first node. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Service mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database on second node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Password change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resource dependences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Server service name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Agent service name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Cluster view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Starting Oracle Database Configuration Assistant. . . . . . . . . . . . . . . . . . . . . . . . . . Selecting the database name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database connection information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting services to manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CIM/OM for ESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CIM/OM server supported platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 110 111 111 112 113 113 114 115 116 117 118 118 119 119 120 120 121 122 123 124 125 125 126 126 127 127 128 128 129 129 130 131 131 132 132 133 135 136 136 137 139 140 140 141 141 142 143 143 144 144 146 147 Figures xi 4-113 4-114 4-115 4-116 4-117 4-118 4-119 4-120 4-121 4-122 4-123 4-124 4-125 5-1 5-2 5-3 5-4 5-5 5-6 5-7 5-8 5-9 5-10 5-11 5-12 5-13 5-14 5-15 5-16 5-17 5-18 5-19 5-20 5-21 5-22 5-23 5-24 5-25 5-26 5-27 5-28 5-29 5-30 5-31 5-32 5-33 5-34 5-35 5-36 5-37 5-38 5-39 5-40 xii ESS CIM/OM startup screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Welcome screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Current version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install size . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installation finished . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CIM/OM Logins in navigation tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Defining CIM/OM login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Running discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Finding CIM/OM discovery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery job output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Storage Subsystem Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Storage Resource Manager Monitoring features . . . . . . . . . . . . . . . . . . . . . . OS Monitoring tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Scan job creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OS Monitoring - Jobs list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Storage Resource Manager Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer Group definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Save a new Computer Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Final Computers Group definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem Group definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Directory group definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computers by directory definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Directories by computer configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Final Directories Group definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . List of available users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . List of available user after Scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery When to Run options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Discovery job options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping job configuration - Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping job configuration - When to Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping job configuration - Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ping failed popup for GALLIUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mail message for GALLIUM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Probe process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Probe configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Probe alert - mail configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Profile - Statistics tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Profile - File filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Condition Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Profile - Conditions Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Profile - New condition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Profile - Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Profile save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Scan configuration - Filesystem tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Scan configuration - Profiles tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . New Scan - Save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alerts mechanisms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Tivoli Storage Resource Manager: A Practical Introduction 148 149 149 151 152 152 153 154 154 155 156 157 157 160 161 161 162 163 164 164 165 166 167 168 168 169 170 171 172 173 173 174 175 175 176 177 177 178 179 179 180 182 183 184 184 184 185 185 186 187 188 188 190 5-41 5-42 5-43 5-44 5-45 5-46 5-47 5-48 5-49 5-50 5-51 5-52 5-53 5-54 5-55 5-56 5-57 5-58 5-59 5-60 5-61 5-62 5-63 5-64 5-65 5-66 5-67 5-68 5-69 5-70 5-71 5-72 5-73 5-74 5-75 5-76 5-77 5-78 5-79 5-80 5-81 5-82 5-83 5-84 5-85 5-86 5-87 5-88 5-89 5-90 5-91 5-92 5-93 Alert - SNMP trap sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alert - Logged alerts sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alert - Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alerts - Windows Event viewer sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alerts - Mail sample . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OS Alerting tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem alert creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer alerts - Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer alerts - RAM decreased script parameters . . . . . . . . . . . . . . . . . . . . . . . Computer alerts - Disk not found script parameters . . . . . . . . . . . . . . . . . . . . . . . . Computer alerts - Computers tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem Alerts - Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem alert - Freespace default mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alerts log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Detailed Alert information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem Extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Extension tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LUN provisioning tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . When to Enforce Policy tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alert tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Save filesystem changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selected filesystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Extension parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alert definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rule for /opt extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Successful extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Extension log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . /essfs1 filesystem expansion definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Extension parameters for /essfs1 FS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Provisioning parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem extension on /essfs1 filesystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LUN provisioning for /essfs1 filesystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS LUNs for filesystem expansion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Network Quotas - Users tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Profile with user summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Network Quotas - Filesystem tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . User Network Quotas - Alert tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer Quota - Alerts log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Filesystem Quota - Alerts log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraints. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraint - File Types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraint - Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraints - Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraints - File filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraints - File filter changed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraints - Alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraints - Script parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduled actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduled action - Script options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Databases - Navigation Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database group definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figures 190 191 191 192 192 193 194 195 196 196 196 197 198 199 200 201 202 202 204 205 206 207 208 208 209 209 210 210 212 212 213 214 216 217 218 219 220 220 221 222 223 224 225 225 226 227 227 228 228 229 230 231 232 xiii 5-94 5-95 5-96 5-97 5-98 5-99 5-100 6-1 6-2 6-3 6-4 6-5 6-6 6-7 6-8 6-9 6-10 6-11 6-12 6-13 6-14 6-15 6-16 6-17 6-18 6-19 6-20 6-21 6-22 6-23 6-24 6-25 6-26 6-27 6-28 6-29 6-30 6-31 6-32 6-33 6-34 6-35 6-36 6-37 6-38 6-39 6-40 6-41 6-42 6-43 6-44 6-45 6-46 xiv Database Probe definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database profile definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database Scan definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Instance Alert definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Instance Alert output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database alert definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database Quota - Users tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reporting capabilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Tivoli Storage Resource Manager main screen showing reporting options . . . Tivoli Storage Resource Manager standard reporting . . . . . . . . . . . . . . . . . . . . . . . Tivoli Storage Resource Manager Lab Environment . . . . . . . . . . . . . . . . . . . . . . . . Reporting - Asset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reporting - Asset - By Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Report - GALLIUM assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reporting - Assets - System-wide view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitored directories report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Northwind database asset details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System-wide view of database assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a new database table group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add SQL Server tables to table group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add Oracle tables to table group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tables added to table group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Table group added to scan job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Displaying Scan job logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tables by total size asset report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reports - Availability - Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reports - Availability - Computer Uptime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disk capacity report selection window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Capacity report - A23BLTZM Disk 0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database Capacity report by Computer Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . Largest tables by RDBMS type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitored tables by RDBMS type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Constraint - Filesystems tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Constraint - file types tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit a Constraint file filter - before change. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit a Constraint file filter - after change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Constraint - Options tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Constraint - Alert tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Constraint - save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraint violation report selection screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Constraint violations by computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Graph of capacity used by Constraint violating files . . . . . . . . . . . . . . . . . . . . . . . . Alert log showing Constraint violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Quota - Users tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Quota - Computers tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Quota - When to Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Quota - Alert. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Quota - save. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Run new Quota job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alert Log - Quota violations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Alert Log - Quota violation detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Quota violations by computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Quota violation graphical breakdown by file size . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Tivoli Storage Resource Manager: A Practical Introduction 233 233 234 236 237 238 241 248 249 251 252 253 253 254 255 256 257 257 258 258 259 259 260 260 261 262 263 264 265 266 267 268 269 270 271 271 272 273 273 274 275 275 276 277 277 278 279 279 280 280 281 281 282 6-47 6-48 6-49 6-50 6-51 6-52 6-53 6-54 6-55 6-56 6-57 6-58 6-59 6-60 6-61 6-62 6-63 6-64 6-65 6-66 6-67 6-68 6-69 6-70 6-71 6-72 6-73 6-74 6-75 6-76 6-77 6-78 6-79 6-80 6-81 6-82 6-83 6-84 6-85 6-86 6-87 6-88 6-89 6-90 6-91 6-92 6-93 6-94 6-95 6-96 6-97 6-98 6-99 Create database Quota - Users tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create database Quota - Instances tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a database Quota - When to Run tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a database Quota - Alert tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a database Quota - Save . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Run the database Quota . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB Quota violation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database Quota violation report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup Reporting options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Files most at risk report - selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Modified Files not backed up selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Modified Files not backed up chart overall view . . . . . . . . . . . . . . . . . . . . . . . . . . . Files need backed up chart in detail view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Files not backed up bar chart detail view. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup storage requirements per filesystem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Backup storage requirement per computer and per filesystem . . . . . . . . . . . . . . . . Incremental reporting per Node and Filesystem based on files. . . . . . . . . . . . . . . . Incremental Range Size select By Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Incremental Range Sizes Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Storage Manager preference settings for archive attribute . . . . . . . . . . . . . . ESS Reporting capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS reporting lab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Creating ESS probe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS - When to probe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS - Alert tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS - probe job status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Probe job log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Asset by storage subsystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS disk group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disks in volume spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disk and LUN association with volume space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hot spare LUN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS all disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS all LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By Computer - Relate Computer to . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By Computer - storage subsystem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By Computer - LUNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By Computer - disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By filesystem/logical volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By filesystem/logical volumes - storage subsystem. . . . . . . . . . . . . . . . . . . . . . . . . By filesystem/logical volume - LUN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By filesystem/logical volume - Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By Storage Subsytems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By Storage subsystem - Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By storage subsystem - filesystem/logical volume. . . . . . . . . . . . . . . . . . . . . . . . . . By LUNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By LUN - computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . By LUNS - filesystem/logical volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disks - computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Disks - filesystem/logical volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS relation to computer selected by disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Report for Filesystem/Logical Volumes Part 1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figures 283 283 284 284 285 285 286 286 287 288 289 289 290 290 291 292 293 294 295 296 297 298 299 299 300 301 301 302 302 303 304 305 306 307 308 308 309 309 310 310 311 311 312 312 313 313 314 314 315 315 316 317 317 xv 6-100 6-101 6-102 6-103 6-104 6-105 6-106 6-107 6-108 6-109 6-110 6-111 6-112 6-113 6-114 6-115 6-116 6-117 6-118 6-119 6-120 6-121 6-122 6-123 6-124 6-125 6-126 6-127 6-128 6-129 6-130 6-131 6-132 6-133 6-134 6-135 6-136 6-137 6-138 6-139 6-140 6-141 6-142 6-143 6-144 6-145 6-146 6-147 6-148 6-149 6-150 6-151 6-152 xvi Report for Filesystem/Logical Volumes Part 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer view to the filesystem with capacity and free space . . . . . . . . . . . . . . . . ESS selection per computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ESS connections to computer report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer Uptime report selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer Uptime report part 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Computer Uptime report graphical combined (stacked bar) . . . . . . . . . . . . . . . . . . Computer Uptime report graphical (bar chart) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Generate Full Backup Size report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Select History chart for File count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . History chart space used by a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . History chart: File count . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Incremental Range selection based on filespace . . . . . . . . . . . . . . . . . . . . . . . . . . Summary of all filespace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selection for Filesystem and computer to generate a graphic. . . . . . . . . . . . . . . . . Bar chart for Incremental Range Size by Filesystem. . . . . . . . . . . . . . . . . . . . . . . . Pie chart selected with number of files which have modified. . . . . . . . . . . . . . . . . . Total Instance storage used network wide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DBMS drill down to the computer reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DBMS drill down to the computer result. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DBMS report Total Instance Storage by Instance . . . . . . . . . . . . . . . . . . . . . . . . . . Instance report RDBMS overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Instance running on computer TONGA first part . . . . . . . . . . . . . . . . . . . . . . . . . . . Instance running on computer TONGA second part . . . . . . . . . . . . . . . . . . . . . . . . LUN report selection for an Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Database select File and Path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Report DB2 File in a Pie Chart for DB2 File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . LUN information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Profile for own File search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create new Condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Condition add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Saved Condition in new Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Listed Profiles containing Search for Tivoli Storage Manager Option File. . . . . . . . Add Profile to Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add Profiles to Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Report with number of found Tivoli Storage Manager Option Files . . . . . . . . . . . . . Create Orphaned File search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Update the Orphaned selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Update the selection with own data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enter the file search criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . File Filter selection reconfirm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . bind the Orphan search into Profiles to apply to Filesystems column . . . . . . . . . . . Scan log check. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Summary report of all Tivoli Storage Manager option files . . . . . . . . . . . . . . . . . . . File selection for computer BONNIE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Report for Tivoli Storage Manager Option file searched . . . . . . . . . . . . . . . . . . . . . File detail information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . My Reports - System Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . My Reports - Storage Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Available System Reports for databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create My Storage Capacity report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . My Storage Report saved . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Monitored Tables by RDBMS Types customized report . . . . . . . . . . . . . . . . . . . . . IBM Tivoli Storage Resource Manager: A Practical Introduction 318 318 319 319 320 320 321 321 322 322 323 323 324 325 325 326 326 327 327 328 329 330 330 330 331 332 332 333 334 334 335 336 337 338 338 339 340 340 341 341 342 342 343 343 344 344 345 346 347 348 349 350 351 6-153 6-154 6-155 6-156 6-157 6-158 6-159 6-160 6-161 6-162 6-163 6-164 6-165 6-166 6-167 6-168 6-169 6-170 7-1 7-2 7-3 7-4 7-5 7-6 7-7 7-8 7-9 7-10 7-11 7-12 7-13 7-14 7-15 7-16 7-17 7-18 7-19 7-20 7-21 8-1 8-2 8-3 8-4 8-5 8-6 8-7 8-8 8-9 8-10 8-11 8-12 8-13 8-14 Create a Batch Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Batch Report - report selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Batch Report - selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Batch Report - options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Batch Report - when to report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a Batch Report - saving the report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a database Batch Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a database Batch Report - Report tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a database Batch Report - Options tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create a database Batch Report - When to Report tab . . . . . . . . . . . . . . . . . . . . . . Create a database Batch Report - save definition . . . . . . . . . . . . . . . . . . . . . . . . . . Monitored Tables by RDBMS Type batch report output . . . . . . . . . . . . . . . . . . . . . Batch Reports listing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MS Word created Web page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting up a Virtual Directory within IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Reports available from a Web browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Chargeback parameter definition. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create the Chargeback Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Storage Resource Manager components. . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Storage Resource Manager integration with Tivoli Storage Manager . . . . . . Backup environment tor Tivoli Storage Resource Manager . . . . . . . . . . . . . . . . . . Procedures used to backup Tivoli Storage Resource Manager. . . . . . . . . . . . . . . . Tivoli Storage Resource Manager restore procedures . . . . . . . . . . . . . . . . . . . . . . Agent is connected to the server after restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Tivoli Storage Manager restore interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore completed successfully . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Agents successfully reconnected after restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . Server running again after database restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Storage Resource Manager Server Disaster Recovery procedures . . . . . . . Full system restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Full system restore result. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System Objects restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System Objects restore results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Tivoli SRM interface after DR restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Database maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SQL-Server database backup start using the GUI. . . . . . . . . . . . . . . . . . . . . . . . . . SQL-Server database backup end using the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . SQL Server database restore started using the GUI . . . . . . . . . . . . . . . . . . . . . . . . SQL Server database restore finished using the GUI . . . . . . . . . . . . . . . . . . . . . . . TEC architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Lab environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Active Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Import Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Import Class Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Compile Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Load Rule Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restart TEC Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TEC Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TEC Console Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Event Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Filter in Event Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Event Group Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add Constraint . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figures 352 352 353 354 355 356 357 357 358 359 359 360 361 362 363 364 365 366 370 371 373 379 387 389 391 391 392 395 396 397 397 398 398 400 401 405 405 406 407 413 414 415 415 416 417 417 418 419 419 420 420 421 421 xvii 8-15 8-16 8-17 8-18 8-19 8-20 8-21 8-22 8-23 8-24 8-25 9-1 9-2 9-3 9-4 9-5 9-6 9-7 9-8 9-9 9-10 9-11 9-12 9-13 9-14 9-15 9-16 9-17 9-18 9-19 9-20 9-21 9-22 9-23 9-24 9-25 9-26 9-27 9-28 9-29 9-30 9-31 9-32 9-33 9-34 9-35 9-36 9-37 9-38 9-39 9-40 10-1 10-2 xviii Event Group Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Assign Event Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Assigned Event Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configured Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TEC Console main screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TEC console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . General tab of event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Event attribute list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting the TEC server properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enabling TEC events for the default scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enable TEC events for discovery of new computers . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Data Warehouse data flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Warehouse pack structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Application installation only . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Verify the fully qualified hostname . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enter username and password of the data warehouse database . . . . . . . . . . . . . . Enter path to the Warehouse Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Additional products installation dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Start actual installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Successfully finished installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Client Configuration Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Choose how to make a connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Choose communication protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enter hostname and DB2 instance port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Name the database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Register database with ODBC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Test connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enter UID and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Test successfully . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DB2 Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Data Warehouse Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Warehouse Sources for IBM Tivoli Storage Resource Manager . . . . . . . . . . . . . . . Data Source Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . BTM_ITSRM_Source Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Target Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Enter password for DB2 CDW target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Subject Areas. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Open the Work in Progress window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Run New Step . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Selecting the steps to run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Work in Progress . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Schedule Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Schedule a Process times . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Task Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E-mail alert. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Change mode to production. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduled process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Run process manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Manually run steps. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . COMP table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CDW entries from Warehouse Pack. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Tivoli Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Policy Region tonga-region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Tivoli Storage Resource Manager: A Practical Introduction 422 422 423 423 424 424 425 426 428 429 430 432 434 436 436 437 437 438 438 439 440 440 441 442 442 443 443 444 444 445 445 446 446 447 447 448 449 450 450 451 451 452 452 453 453 454 454 455 455 456 456 459 460 10-3 10-4 10-5 10-6 10-7 10-8 10-9 10-10 10-11 10-12 10-13 10-14 10-15 10-16 10-17 10-18 10-19 10-20 10-21 10-22 10-23 10-24 10-25 10-26 10-27 10-28 10-29 10-30 10-31 10-32 10-33 10-34 10-35 11-1 11-2 11-3 11-4 11-5 11-6 11-7 11-8 11-9 11-10 11-11 Managed Resources for Inventory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Policy Region Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Profile Manager Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Inventory Profile Global Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Inventory Profile PC Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Inventory Profile UNIX Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Distribute Inventory Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Distribute Inventory Profile dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Distribution Status Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Query Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit Inventory Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Output for IBM Tivoli Storage Resource Manager Query . . . . . . . . . . . . . . . . . . . . Output for IBM Query. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Software Package Editor with new package ITSRM-Agent . . . . . . . . . . . . . . . . . . . Properties dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Agent installation directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add an execute program action to the package . . . . . . . . . . . . . . . . . . . . . . . . . . . Install dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advanced tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advanced properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add Directory dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Descend Directories. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ready-to-build software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Policy Region with Profile Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Software Package Profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Profile Manager with Profiles and Subscribers . . . . . . . . . . . . . . . . . . . . . . . . . . . . Import Software Package. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Import and build a software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install a software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install Software Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Remove a Software Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBM Tivoli Monitoring architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Policy Region tonga-region . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Profile Manager PM_DM_ITSANM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create Monitoring Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add Parametric Services Model to Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Edit Resource Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Parameters of Resource Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Indications and actions of resource models. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TEC forwarding of events from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Profilemanager for Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . TEC events from Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figures 460 461 461 462 463 464 465 466 467 467 468 469 469 470 471 471 472 472 473 474 475 476 477 477 478 478 479 479 480 481 482 483 484 486 487 488 488 489 490 491 492 492 493 494 xix xx IBM Tivoli Storage Resource Manager: A Practical Introduction Tables 1-1 1-2 1-3 5-1 5-2 5-3 5-4 5-5 Comparison of storage management environments, 1985 versus 2003 . . . . . . . . . . . 5 Current estimated open-systems efficiency rates of storage utilization . . . . . . . . . . . . 9 Backup and recovery summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Default profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Profiles/Scans versus Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189 Instance Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Instance alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Table alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 © Copyright IBM Corp. 2003. All rights reserved. xxi xxii IBM Tivoli Storage Resource Manager: A Practical Introduction Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM's application programming interfaces. © Copyright IBM Corp. 2003. All rights reserved. xxiii Trademarks The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: ibm.com® pSeries™ xSeries® AIX® Cloudscape™ Domino™ DB2® Enterprise Storage Server® IBM® NetView® Notes® OS/2® OS/390® Redbooks™ Tivoli Enterprise™ Tivoli Enterprise Console® Tivoli® TotalStorage® TME® WebSphere® 1-2-3® Redbooks(logo) ™ ™ The following terms are trademarks of other companies: ActionMedia, LANDesk, MMX, Pentium and ProShare are trademarks of Intel Corporation in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. C-bus is a trademark of Corollary, Inc. in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. SET, SET Secure Electronic Transaction, and the SET Logo are trademarks owned by SET Secure Electronic Transaction LLC. Other company, product, and service names may be trademarks or service marks of others. xxiv IBM Tivoli Storage Resource Manager: A Practical Introduction Preface Storage growth continues to accelerate, and the cost of disk can approach 80% of total system hardware costs. Yet, the storage in most businesses is typically only about 50% used. How can you take control of your storage assets to render utilization more efficient and make the most of your storage dollars? IBM® Tivoli® Storage Resource Manager helps you discover, monitor, and create enterprise policies for your filesystems and databases. You will find out where all your storage is going, and be able to act intelligently on this information. Application availability is improved because you will have early warnings when filesystems are running out of space. If you are thinking about server consolidation, you can use IBM Tivoli Storage Resource Manager to help efficiently utilize your accumulated storage resources. This IBM Redbook shows how to install, configure, and protect the IBM Tivoli Storage Resource Manager environment; how to create policies; how to define automated actions like scripts or SNMP events when policies are violated; and how to produce detailed, meaningful storage reports. This book is intended for those who want to learn more about IBM Tivoli Storage Resource Manager and those who are about to implement it. The second edition of this redbook is updated for IBM Tivoli Storage Resource Manager Version 1.2 and includes information on IBM TotalStorage® Enterprise Storage System reporting using CIM/OM, filesystem extension, as well as on how to integrate IBM Tivoli Storage Resource Manager with other Tivoli products. © Copyright IBM Corp. 2003. All rights reserved. xxv The team that wrote this redbook This redbook was produced by a team of specialists from around the world working at the International Technical Support Organization, San Jose Center. The team: Urs, Mike, Michel, Ivo, Charlotte Charlotte Brooks is an IBM Certified IT Specialist and Project Leader for Tivoli Storage Management and Open Tape Solutions at the International Technical Support Organization, San Jose Center. She has 12 years of experience with IBM in the fields of pSeries™, AIX®, and storage. She has written ten redbooks, and has developed and taught IBM classes on all areas of storage management. Before joining the ITSO in 2000, she was the Technical Support Manager for Tivoli Storage Manager in the Asia Pacific Region. Michel Baus is an IT Architect for @sys GmbH, an IBM Business Partner in Germany. He has eight years of experience in the areas of UNIX, Linux, Windows and Tivoli Storage and System Management. He holds several certifications including technical, sales, and is an IBM Tivoli Certified Instructor. He has developed and taught several storage classes for IBM Learning Services, Germany. He was a member of the team that wrote the redbook Managing Storage Management, SG24-6117. Michael Benanti is an IBM Certified IT Specialist in Tivoli Software, IBM Software Group. In his six years with IBM, he has focused on architecture, deployment, and project management in large SAN implementations. Mike also works with the Tivoli World Wide Services Planning Organization, developing services offerings for IBM Tivoli SAN Manager and IBM Tivoli xxvi IBM Tivoli Storage Resource Manager: A Practical Introduction Storage Resource Manager. He has worked in the IT field for more than 11 years, and his areas of expertise include network and systems management disciplines using Tivoli NetView® and data communications hardware research and development. He was an author of the first edition of this redbook. Ivo Gomilsek is an IT Specialist for IBM Global Services, Slovenia, supporting the Central and Eastern European Region in architecting, deploying, and supporting SAN/storage/DR solutions. His areas of expertise include SAN, storage, HA systems, xSeries® servers, network operating systems (Linux, MS Windows, OS/2®), and Lotus® Domino™ servers. He holds several certifications from various vendors (IBM, Red Hat, Microsoft). Ivo was a member of the team that wrote the redbook Designing and Optimizing an IBM Storage Area Network, SG24-6419, and contributed to various other redbooks on SAN, Linux/390, xSeries, and Linux. Ivo has been with IBM for five years and was an author of the first edition of this redbook. Urs Moser is an Advisory IT Specialist with IBM Global Services in Switzerland. He has more than 25 years of IT experience, including more than 13 years experience with Tivoli Storage Manager and other storage management products. His areas of expertise include Tivoli Storage Manager implementation projects and education at customer sites, including mainframe environments (OS/390®, VSE, and VM) and databases. Urs was a member of the team that wrote the redbook Using Tivoli Storage Manager to Back Up Lotus Notes, SG24-4534. Thanks to the following people for their contributions to this project: The authors of the first edition of this Redbook: Michael Benanti, Hamedo Bouchmal, John Duffy, Trevor Foley, and Ivo Gomilsek. Maritza M. Dubec, Deanna Polm, Emma Jacobs, Will Carney International Technical Support Organization, San Jose Center Brian Delaire, Doug Dunham, Barry Eberly, Nancy Hobbs, Sumant Padbidri, Jason Perkins IBM Tivoli Storage Resource Manager Development, San Jose Greg van Hise IBM Tivoli Storage Architecture, Tucson Jana Jamsek, Ales Leskosek, Bojan Sojer IBM Slovenia Become a published author Join us for a two- to six-week residency program! Help write an IBM Redbook dealing with specific products or solutions, while getting hands-on experience with leading-edge technologies. You'll team with IBM technical professionals, Business Partners and/or customers. Your efforts will help increase product acceptance and customer satisfaction. As a bonus, you'll develop a network of contacts in IBM development labs, and increase your productivity and marketability. Find out more about the residency program, browse the residency index, and apply online at: ibm.com/redbooks/residencies.html Preface xxvii Comments welcome Your comments are important to us! We want our Redbooks™ to be as helpful as possible. Send us your comments about this or other Redbooks in one of the following ways: Use the online Contact us review redbook form found at: ibm.com/redbooks Send your comments in an Internet note to: [email protected] Mail your comments to: IBM Corporation, International Technical Support Organization Dept. QXXE Building 80-E2 650 Harry Road San Jose, California 95120-6099 xxviii IBM Tivoli Storage Resource Manager: A Practical Introduction Summary of changes This section describes the technical changes made in this edition of the book and in previous editions. This edition may also include minor corrections and editorial changes that are not identified. Summary of changes for SG24-6886-01 for IBM Tivoli Storage Resource Manager: A Practical Introduction as created or updated on August 19, 2003. October 2003, Second Edition This revision reflects the addition, deletion, or modification of new and changed information described below. New information Release of Version 1, Release 2 of IBM Tivoli Storage Resource Manager: – – – – Automatic file system extension Enterprise Storage Server® (ESS) Subsystem Reporting LUN Provisioning for ESS Subsystem Tivoli Enterprise™ Console (TEC) and other Tivoli products Integration IBM Tivoli Storage Resource Manager Express Edition © Copyright IBM Corp. 2003. All rights reserved. xxix xxx IBM Tivoli Storage Resource Manager: A Practical Introduction Part 1 Part 1 Introduction In this part we introduce the concepts of Storage Resource Management and the benefits it can bring to an organization. Then we overview IBM Tivoli Storage Resource Manager. © Copyright IBM Corp. 2003. All rights reserved. 1 2 IBM Tivoli Storage Resource Manager: A Practical Introduction 1 Chapter 1. Introduction to Storage Resource Management Industry needs Storage Resource Management (SRM) today in open environments for the same reasons that industry needed Storage Resource Management in the mainframe environment in the early and mid 1980s. Businesses are generating data so fast that data storage and data management capabilities are being overwhelmed. If these capabilities cannot handle the growth, then at some point, the next transaction cannot be captured, and the business will stop. Two key problems which impact this situation are: Storage costs are too high Storage management costs are too high SRM tools will help companies lower their cost of storage, and of storage management. In this chapter, we: Identify the business and technology considerations, which caused the development of SRM tools in the UNIX and Windows space Discuss SRM: – Benefits of using SRM tools – Functions that SRM tools should accomplish Subsequent chapters introduce a solution for SRM - IBM Tivoli Storage Resource Manager, and discuss deployment architectures, installation and design considerations, operations, and maintenance. © Copyright IBM Corp. 2003. All rights reserved. 3 1.1 What is Storage Resource Management? Tivoli uses the following definition for Storage Resource Management: “Storage Resource Management (SRM) is an active, intelligent, business-centric management solution for storage resources across the enterprise. SRM enables administrators to visualize their distributed storage network, establish management policies, and report on resource utilization. Enterprise SRM must support heterogeneous storage environments, integrate with current and future technologies, and enable policy based automation to simplify administration. SRM is intended to reduce system costs, improve return on investment, and reduce the risk of application downtime.” Figure 1-1 provides some additional definitions as used by outside sources. SRM Definitions SRM is a collection of automated tools that enable administrators to visualize a distributed collection of storage resources, to make intelligent, informed decisions about the usage of those resources" Enterprise Storage, Storage Resource Management Update, Sep 2001 "SRM is a component of overall systems management infrastructure that improves application availability...by providing capacity and performance trending, storage and SAN device configuration, and removable media management...SRM can help synthesize a unified view of dispersed and heterogeneous storage deployments. Gartner Group, Storage Resource Management for Distributed Systems, ibm.com/redbooks Figure 1-1 Storage Resource Management definitions 1.1.1 Storage Resource Management, then and now Storage Resource Management has existed in the mainframe world since the mid-80s, however, the requirements have only comparatively recently been recognized in the open (Windows and UNIX) environment. The open environment is also dramatically different from the traditional mainframe environments of the 80s. In the first release (in 1985) of storage management software on the mainframe, a company did not go out of business (at least in the short-term) if their systems failed. Companies had paper systems to fall back on if computers failed. Today computers are typically the only vehicle for storing a company's business data. Computers and storage are now mission-critical. 4 IBM Tivoli Storage Resource Manager: A Practical Introduction Today, you need to manage storage to stay in business. You cannot manage what you cannot measure, and Storage Resource Management is a key tool for measuring and managing storage resources. Open environments today are larger and the systems are much more heterogeneous than in the last century. Table 1-1 summarizes some of the other major differences. Table 1-1 Comparison of storage management environments, 1985 versus 2003 Storage Management in 1985 Storage Management today Application Server OS 1 single OS - OS390 Many different OS Solaris AIX HP-UX Windows NT, 2000,2003, XP IRIX Linux and so on Storage Networking Channel Attach Switched Fabric FC Switches – Brocade, McData, Inrange, 3Com, Cisco IP Switches – Cisco, Nortel, Lucent, etc. Disk Storage Few manufacturers IBM Hitachi StorageTek Many Manufacturers IBM EMC Hitachi Compaq HP Sun and all the JBOD suppliers Chapter 1. Introduction to Storage Resource Management 5 1.2 Storage management issues today Storage Management Issues Today Growth (both business transactions and storage infrastructure) is overwhelming people, tools, and processes Unmanaged storage costs too much Manual Storage Management costs too much ibm.com/redbooks Figure 1-2 Storage management issues today Figure 1-2 summarizes current storage management issues: Data growth High cost of unmanaged storage High cost of manually managing storage 1.2.1 Growth The single biggest issue is growth. Growth is being driven by three general trends: Business transaction volumes are growing Businesses are now storing more information, from different formats and sources, than ever before. These include audio, graphical, and other scanned data that previously was stored only on film, paper, or other traditional media. These new data types (like music, video clips, images, graphical files, etc.) require more storage per file than older data types like flat files. The data and storage infrastructure that support this growth is itself growing dramatically. Storage growth rate is estimated to range from 50-125% annually, depending on the industry or consultant report of your choice. Rapid infrastructure growth creates a number of technology and management issues, shown in Figure 1-3. 6 IBM Tivoli Storage Resource Manager: A Practical Introduction Infrastructure Growth Issues Growth Vector Comment Server Large companies have thousands of servers - mixture of Windows and different UNIX OS Staffing Each corporate server may grow to 3TB data by 2004 - a typical open system administrator can look after 1TB Storage Average storage growth is 50 to 125% per year - largest companies may see much higher rates. ibm.com/redbooks Figure 1-3 Infrastructure growth issues Server growth Major companies have hundreds of large UNIX servers, and sometimes thousands of Microsoft Windows servers. They are deploying more servers every quarter, and most large companies have a large variety of different hardware and software platforms (often not by design) rather than standardizing on particular configurations. Staffing growth While we know that storage and data are growing rapidly, support staff numbers are not. This only exacerbates the problem. An average corporate server may be supporting in the order of 3 TB of data in the coming years, yet it is estimated that a typical systems administrator can manage only 1 TB. Since in today’s economic times, businesses are looking to cut costs, most are shrinking rather than increasing their IT departments. Clearly, more intelligent and powerful applications will be required to support this environment. Storage data growth Although companies are growing their data storage at around 50-125% per year on average, larger companies may see even higher rates. A typical large company may have as much as 150 TB of data to store installed within the next two years. Total storage reserves of 150 TB to handle the growth in storage with storage is being consolidated into SANs (Storage Area Networks). However, SANs do not solve the underlying problems of mismanaged data and its explosive growth. SANs concentrate the storage, the data, and the problems, and emphasize the need for management. Chapter 1. Introduction to Storage Resource Management 7 1.2.2 Storage costs too much, and money is not used efficiently Two of the principal issues driving storage management requirements are the costs and inefficient utilization of storage. Costs Storage is a large portion of IT budgets. Even with disk prices dropping at 30% per year (on average), if storage requirements grow at 100% per year, total costs spent on storage will grow 40% year-over-year. Storage has to be managed. The fact that storage is inefficiently used is doubly critical in today’s environment of tight budgets: 1. Storage administrators do not have the tools to answer questions like: – How much storage will I need next year, given my current growth rates? – How fast are my databases growing? – What servers are running out of storage today? – Can I compare the forecast on demand versus capacity from last year to the actual rate of growth that occurred this year? 2. Because they do not have the answers to these and other questions, they wind up: – Buying storage at the last minute (paying too much money for it) – Buying too much (better to spend too much money on storage than to not have enough when it is urgently needed) Storage Resource Management tools would help the storage administrator answer these questions, and allow corporations to buy the right amount of storage at the right time. Utilization inefficiencies Data protection schemes (RAID, mirroring, replication, etc.) are used to protect data from disk failures and other hardware errors. Allocating and using additional disk for data protection is a good business decision, and is not an inefficient use of storage. However, there are many other ways that disk is used inefficiently. Here are a few examples, and note that if the data is mirrored or RAIDed, then the problem is accordingly multiplied. 1. With direct-attached storage (whether internal or attached to a SAN) in some cases, a very small percentage of available storage is actually used for application data. 2. Applications are installed, but then are not used. No one tries to locate these unused files. Application upgrades can also leave unneeded files. 3. Many files are created once, used once, and never accessed or used again; for example, for testing purposes. This is an example of a stale or obsolete file. 4. Some files are duplicated to other directories or systems, and later the need for the duplicate file goes away. The duplicate file is no longer needed, but it is cheaper to leave the duplicate file where it is rather than spend the time to try to find it. 5. It is increasingly common to find music files (often illegally copied) video clips, and other personal data items placed onto expensive corporate storage. Current open systems storage utilization rates can range from as low as 25% (direct-attached Windows servers) to 50-60% (SAN-attached storage). What this means is that on average, if a company has 100 GB of storage in a filesystem, there is about 25 to 50 GB of actual important data on that 100 GB of storage. The rest of the disk space is being wasted. 8 IBM Tivoli Storage Resource Manager: A Practical Introduction If storage is growing at 100%, and companies are using only 25% or 50% of what they buy to hold real data, then companies are buying storage they do not need, because they cannot manage data efficiently. Table 1-2 Current estimated open-systems efficiency rates of storage utilization Environment Efficiency rate (typical) NT Direct-attached 25% UNIX Direct-attached 50% FC SAN-attached 70% Example 1-1 (for a low-end NT environment) and Example 1-2 (for a high-end UNIX environment) show how the numbers can add up. Example 1-1 Storage costs in NT environment A utility company in the Northeast has 150 NT servers with internal disk, with an average of 25GB usable per NT server. Given requirements for mirroring the OS disk, a hot spare, RAID-5 for the data, and experience that buying a server fully populated with disks is less expensive than adding disks to a partially populated server, the client bought 6 disks per server to get 1 disk for actual data per server. The average cost of the NT servers was $25,000, and the 36GB disks cost $640 each (market price), with the controller costing $1100. The client was spending about $5000 per server (disks plus controller) for storage. The client spent 6 x 150 x $640= $576,000 for 32TBs of raw disk to get 1 x 150 x $640 = $96,000 for 3.75TB of disk used for storing data, or 15.4 cents per MB usable. Vendors argue that disk costs 1.8 cents per MB ($576,000/(32.4*1000) = 1.77 cents). While true, it is misleading. Companies buy usable disk, not raw storage. Two comments: 1. The difference is partly the cost of unmanaged storage (and partly the cost of protection). 2. 15 cents per MB is close enough to the cost of enterprise disk to justify investigating storage consolidation. Example 1-2 Same examples, using enterprise storage We re-calculated the same example using enterprise storage. Typical efficiency (space used/space available) in enterprise FC SAN Storage is less than 50%. (It is more that the rate for internal storage because more attention is paid to expensive fibre channel storage.) For the purposes of this example, we are assuming a 50% ‘best case’ scenario. To get 3.75 TB of usable disk, the customer would have to buy 7.5TB of disk from a vendor. Using 72GB mirrored disks which cost over $15,000 each, the customer would buy 14 disks/TB * 3.75TBs * 2 (efficiency factor) * $15,000**/disk = $1,575,000, to get 14 * 3.75 * $15,000 = $787,500 of usable (3.75TBs) of disk, or 42 cents per MB list price usable. ** - 90% of the current list price from one well-known storage vendor for a 72GB disk Chapter 1. Introduction to Storage Resource Management 9 In the examples for 3.75 TB (Example 1-2) the amount of disk bought and not used for storing original data (excluding data protection) was: $480,000 in the NT example above (75% of storage costs) $787,000 in the enterprise disk example (50% of storage costs) If you extend the two examples above to 150 TB of data, then customers would spend either $23,000,000 (for the NT example) or $63,000,000 (for the enterprise example) for storage. Given efficiency rates on 150 TB of used disk: 75% of the $23M, or $19M, would have been wasted in the NT example 50% of the $63M, or $31.5M, would have been wasted in the enterprise disk example These costs are the price for not managing storage well. How much of this could be re-captured by using Storage Resource Management software? Storage Resource Management can help storage administrators improve the efficiency of disk utilization. It is hard to quantify exactly the efficiency rates in the UNIX/Windows space, since use of such tools is relatively new. However, in the mainframe world with DFSMS, efficiency rates of over 95% disk utilization are common. If in the UNIX/Windows space, we can conservatively assume that we could achieve rates of 80%, then Figure 1-4 shows the cost savings that might be possible in our examples above. Potential Storage Dollars Recaptured Using SRM Dollars of Storage Actually Used Original Efficiency Total $ originally spent Efficiency with SRM Total $ now available at this efficiency Increased Storage ($$) Can Be Used Months of 100% Growth Can Absorb NT Storage Enterprise FC Storage $96,000 25% $384,000 80% $307,200 $211,200 26 $787,500 50% $1,575,000 80% $1,260,000 $472,500 7 ibm.com/redbooks Figure 1-4 SRM helps you recapture dollars already spent on storage Figure 1-5 is a pictorial representation of the same information. 10 IBM Tivoli Storage Resource Manager: A Practical Introduction Increased Utilization From SRM Tools NT Example Enterprise Storage 0 500 1,000 1,500 '000s of $$ of Disk Used Current Utilization Increased Utilization ibm.com/redbooks Figure 1-5 Predicted savings from managed storage versus unmanaged storage One key piece of information is shown in Figure 1-4. By using SRM software to improve our utilization, then, using existing storage, we can absorb 27 months of growth in the Windows example, or seven months of growth in the enterprise storage example - this represents a significant cost benefit. Chapter 1. Introduction to Storage Resource Management 11 1.2.3 Unmanaged storage costs too much, and the scope is large Need for Storage Management "Most of our clients report that they can afford to buy storage, but they can't manage it." Nick Allen, Vice President, Research Director, Gartner "It's not important how much storage you have, it's how much managed storage you have. If you don't know what you've got, how do you know what you need?" Michael Karp, Enterprise Management Associates ibm.com/redbooks Figure 1-6 The need for storage management Today, when the user calls and says “my application ran out of disk space and just stopped!” administrators (storage administrators, network administrators, application administrators, or platform administrators) have to scramble to get the application running again. Administrators have to: Scan the filesystems for stale or duplicate files, and delete them Look at the application to see if some data can be archived, and try to archive it Or else, quickly order more disk for earliest delivery, paying whatever the vendor demands Meantime, the application is down, the company is losing money, and user satisfaction is very low. Not being able to track the space used against space available is very expensive. Current tools and processes The current approach to managing storage resources typically involves manual processes and custom scripts. For every platform, there might be a custom script to list the storage available on individual servers. The storage administrators who manage these scripts must run them periodically, and generally do not have the time to analyze the results, and sometimes miss critical situations. To find the stale files, duplicate files, or inappropriate files, the storage administrator would have to get write access to all the servers in the environment, write the custom scripts, debug them, run them regularly and review the resulting information manually, and then try to act on it, while trying to perform his normal duties. The scripts also have to be maintained so that they cater for new servers, new LUNs or volumes, new filesystems, new applications, new policies, and so on. Doing all this manually is very difficult, if not almost impossible. 12 IBM Tivoli Storage Resource Manager: A Practical Introduction Looking forward Based on various studies of estimated system and data growth, we proposed the following projection of the number of filesystems and amounts of storage that would have to be managed by a typical large company in 2004. Management Issue Projection for 2004, F500 Company GB / Host # Hosts Tot Stg (GB) # FS / Host Tot # FS UNIX 100 750 75,000 4 3,000 Windows 25 3000 75,000 1.5 4,500 3,750 150,000 7,500 ibm.com/redbooks Figure 1-7 Scope of the problem - total storage, total number of filesystems In this projection we used 100 GB for the size of the average UNIX host today, 25 GB for the average Windows host, and 150 TB of storage as a target for the total storage in the average large company. We also made some assumptions as to the number of filesystems per UNIX/Windows host. We believe that this is a quite conservative projection. If you use larger numbers, then the numbers are even more daunting. Nonetheless, the projection illustrates the point: by 2004, an average large company will be managing: 7,500 filesystems 150TBs of storage 3,750 servers How many people would I need to manage storage? The answer to this question depends on the tools used to manage storage. We have already described the tools that today’s administrators typically use: Custom-written scripts for different operating systems Some individual point solutions Spreadsheets and PC databases Visio diagrams Manual update processes And good memories Chapter 1. Introduction to Storage Resource Management 13 Doing some rough cut forecasting to figure out the number of administrators needed to manage storage, we developed the following estimate. Potential Number & Cost of Admins Required Based on Storage GB / Admin UNIX Windows 3000 1000 Based on # Servers # Servers/Admin UNIX Windows 15 35 # Admins Cost ($100K ea) 25 75 100 2.5M 7.5M 10.0M 50 86 136 5.0M 8.6M 13.6M ibm.com/redbooks Figure 1-8 Number and cost of storage administrators needed In trying to project the staffing cost for storage administration (and only for administering disk) we started with Figure 1-7, made some assumptions, and looked at the numbers. We made two different projections - one based on the number of Gigabytes of storage that an administrator would administer with today’s tools, and one based on the number of servers that an administrator could manage. The assumptions were conservative. For storage, we assumed that UNIX administrators could handle 3 TB, and Windows administrators could handle 1 TB, and that the weighted average cost of an administrator was $100,000 per year. Adjust your own model according to your own situation, since salary costs vary greatly among different countries and cities, as well as within industry. Even with conservative assumptions, administering disk will cost a lot of money. These numbers are significant, and in parallel the situation facing the IT service industry in 1985 before the introduction of storage management tools on the mainframe. After DFSMS was introduced to the mainframe, storage administration labor costs dropped by 90%. Fewer studies have yet been performed in the UNIX/Windows world on the impact of storage management tools on storage administration costs. If we were to use 45% (half the savings achieved in the mainframe world) as a working guideline for the savings, we could achieve in the UNIX/Windows world, given the large numbers, and the figure would be substantial. 1.2.4 Storage management functions defined So far, we have discussed only administering disk. Storage administration covers other areas as well: Platform administration Backup and recovery 14 IBM Tivoli Storage Resource Manager: A Practical Introduction Business Continuance and Disaster Recovery Platform administration A company with hundreds of UNIX and thousands of Windows servers across different business units has thousands of separate filesystems to administer. Managing that many anything is difficult. A growing percentage of companies have started consolidating storage into SANs, but they still have the same number of storage entities to manage. Filesystems are still assigned to individual application servers, and storage on the FC storage frame is logically segregated. Some companies have FC storage pools, NAS storage pools, and direct-attached storage environments. Each FC storage pool is managed by its own storage manager. Each NAS pool has its own manager. Each small group of direct-attached servers has its own platform administrator. These labor costs can be at the user department level, at the division IT level, or at the corporate IT level. The costs are hard to aggregate, but are large. Backup and recovery Whether your backup and recovery is decentralized or centralized, the same tasks have to be performed. These tasks are almost always performed manually. Table 1-3 Backup and recovery summary Tape backup architecture Tasks Decentralized backup Tape drives embedded in application servers or Small Libraries attached to backup servers that handle 5-10 application servers Centralized backup Large library handling 200-600 application servers Backup: Load tapes into library Run backup program Monitor job stream Fix Errors Recovery: Extract tapes from library, send offsite Recover tapes from offsite as needed Load those tapes into library, perform recovery In either case, the corporation is paying for IT professionals to manage the backup and recovery function. Dollars are either hidden in parts of individual’s salaries across the many different departmental budgets, or prominently displayed (i.e. a large figure) in a centralized budget. Business Continuance and Disaster Recovery The Disaster Recovery and Business Continuance function continues to be prominent. This function involves planning a recovery from a site or facility disaster, including people, processes, facilities, and IT infrastructure. With formerly two to three people, today, companies have staffed up this function to five to ten people who report (in many cases) directly to the CEO. 1.2.5 Architecture for a suite of Storage Management solutions Figure 1-9 shows the storage infrastructure functions from the low level device solutions up to the business management level. The current set of Tivoli solutions already provide many of the functions in the Business Management section (that is, Systems Management, Storage Management, and Security Management). Chapter 1. Introduction to Storage Resource Management 15 IBM Tivoli Storage Manager, IBM Tivoli Storage Resource Manager, and IBM Tivoli Storage Area Network Manager provide the functionality for the middle Storage Resource Management layer. They interoperate with and utilize the lower level Storage Infrastructure layer applications. These are often vendor-specific solutions, such as individual Element Managers or Replication Solutions. These also encompass some upcoming products from IBM, such as for Virtualization. Comprehensive Architecture for a Suite of Storage Management Solutions Business Processes Business Management Applications Systems Management Storage Management Security Management Enterprise Policy Based Automation Storage Resource Management Operations Reporting Capacity Asset Event Availability Performance Monitoring Backup & Recovery / Advanced SAN Management Storage Infrastructure Policy Based Automation File Systems Volume Mgrs Media Managers DAS Devices Element Managers Virtualization iSCSI SAN Fibre Channel Subsystem Reporting Replication NAS TAPE ibm.com /redbooks Figure 1-9 Storage Management disciplines - architecture for a suite of solutions 1.2.6 Standards and Storage Resource Management tools For the storage users community (both vendors and buyers), standards form the basis for compatibility and interpretability: Standards enable buyers to pick the solutions they want to implement with the knowledge that today’s solution will be interoperable with tomorrow’s solution, and that existing hardware investments will be protected as the environments are extended. For vendors, standards give the confidence that a wide market exists for their solutions, and lower the costs of compatibility testing. As the Storage Resource Management tools start to implement reporting based on the storage devices themselves, not just reporting from the operating systems view, the tools need to know how to get this data from various storage devices. In the past and often still today, such information was only accessible through vendor APIs as there still is no standardized way to extract data from the storage device. For example, if the Storage Resource Management tool wants to report where in the storage array particular data is located, it will need to communicate to the storage device through a custom API to get this information. This approach has several drawbacks: 16 IBM Tivoli Storage Resource Manager: A Practical Introduction When the vendor changes the API, the management application has to change also. Higher development costs, because of the diversity of storage devices. Slow time to market in case of limited development resources. Some storage vendors do not publish the APIs, resulting in either unsupported devices, or need to make special arrangements with those vendors. Management application vendor must maintain a large number of different specifications. Standards organizations and standards Today, there are at least 10 organizations involved in creating standards for storage, storage management, SAN management, and interpretability. Figure 1-10 shows the key organizations involved in developing and promoting standards relating to storage, storage management, and SAN management, and the relevant standards for which they are responsible. SAN Management Standards Bodies Marketing De-facto Standards Storage Networking Industry Association (SNIA) SAN umbrella organization IBM participation: Founding member Board, Tech Council, Project Chair Fibre Channel Industry Association (FCIA) Sponsors customer events IBM participation: Board SCSI Trade Association Technology roadmaps IBM participation: Member Jiro (StoreX) Sun consortium Fibre Alliance EMC consortium National Storage Industry Consortium Pre-competitive consortium Formal Standards Internet Engineering Task Force (IETF) Formal standards for SNMP and MIBs American National Standards Institute (ANSI) X3T11 for FC/FICON standards X3T10 for SCI standards IBM participation International Organization for Standardization (ISO) International standardization IBM Software development ISO Certified Distributed Management Task Force (DMTF) Development of CIM IBM participation Figure 1-10 Storage standards organizations and their standards Key standards for Storage Resource Management are: Distributed Management Task Force (DMTF) Common Information Model (CIM) Standards. This includes the CIM Device Model for Storage, which at the time of writing was version 2.7.2 for the CIM schema Storage Networking Industry Association (SNIA) Storage Management Initiative (SMI) Specification CIM/WEB management model CIM was developed as part of the Web-Based Enterprise Management (WBEM) initiative by the Desktop Management Task Force (DMTF) to simplify management of distributed systems. Chapter 1. Introduction to Storage Resource Management 17 It uses an object-oriented approach to describe management information, and the description (data model) is platform- and vendor-independent. CIM profiles have already been developed for some devices, such as Storage Subsystems, Fibre Channel switches, and NAS devices. IBM’s intent is to support CIM-based management as and when device manufacturers deliver CIM-based management interfaces. CIM/WBEM technology uses a powerful human and machine readable language called the managed object format (MOF) to precisely specify object models. Compilers can be developed to read MOF files and automatically generate data type definitions, interface stubs, and GUI constructs to be inserted into management applications. SMIS object models are extensible, as explained in “SMI Specification” on page 18, enabling easy addition of new devices and functionality to the model, and allowing vendor-unique extensions for added-value functionality. Figure 1-11 shows the components of the SMIS/CIM/WBEM model. CIM/WBEM management model Management Application Auto-generation of Application and Infrastructure Constructs Integration Infrastructure Object Model Mapping – Vendor Unique Features •Platform Independent •Distributed • Automated Discovery CIM/WBEM SMIS Technology Interface •Security •Locking •Object Oriented Device Types Tape Library MOF Switch MOF Array MOF Many Other MOF Standard Object Model per Device Vendor Unique Function ibm.com/redbooks Figure 1-11 SMIS/CIM/WBEM management model SMI Specification SNIA has fully adopted and enhanced CIM standard for Storage Management in its SMI Specification. The SMI Specification was launched in mid-2002 to create and develop a universal open interface for managing storage devices including storage networks. Figure 1-12 shows the SMIS architecture. 18 IBM Tivoli Storage Resource Manager: A Practical Introduction Architecture of SMI Specification Graphical User Interface Management Frameworks Users Management Tools Storage Resource Management Performance Capacity Planning Resource Allocation Container Management Data Management Volume Management Media Management Other… File System Database Manager Backup & HSM Storage Management Interface Specification Managed Objects Physical Components Logical Components Removable Media Tape Drive Disk Drive Robot Enclosure Host Bus Adapter Switch Volume Clone Snapshot Media Set Zone Other… ibm.com/redbooks Figure 1-12 SMI Specification The idea behind SMIS is to standardize the management interfaces so that management applications can utilize these and provide cross device management. This means that a newly introduced device can be immediately managed as it will conform to the standards. SMIS extends CIM/WBEM with the following: A single management transport Within the WBEM architecture, the CIM-XML over HTTP protocol was selected for this transport in SMIS A complete, unified, and rigidly specified object model. SMIS defines “profiles” and “recipes” within the CIM that enables a management client to reliably utilize a component vendor’s implementation of the standard such as the control of LUNs and Zones in the context of a SAN Consistent use of durable names As a storage network configuration evolves and is reconfigured, key long-lived resources like disk volumes must be uniquely and consistently identified over time Rigorously documented client implementation considerations SMIS provides client developers with vital information for traversing CIM classes within a device/subsystem and between devices/subsystems such that complex storage networking topologies can be successfully mapped and reliably controlled An automated discovery system SMIS compliant products when introduced in a SAN environment will automatically announce their presence and capabilities to other constituents Resource Locking Chapter 1. Introduction to Storage Resource Management 19 SMIS compliant management applications from multiple vendors can exist in the same storage device or SAN and cooperatively share resources through a lock manager The models and protocols in the SMIS implementation are platform-independent, enabling application development for any platform, and enabling them to run on different platforms. The SNIA will also provide interpretability tests which will help vendors to test their applications and devices if they conform to the standard. Integrating legacy devices into the CIM model As these standards are still evolving, we cannot expect that all devices will support the native CIM interface, and because of this, the SMIS is introducing CIM agents and CIM object managers (CIM/OM). The agents and object managers bridge proprietary device management to device management models and protocols used by SMIS. The agent is used for one device and an object manager for a set of devices. This type of operation is also called a proxy model and is shown in Figure 1-13. Proxy model (CIM Agent/Object Manager) for legacy devices Lock Manager SA 0…n Directory Server Directory Agent 0…n Client User Agent 0…n SLP TCP/IP CIMxml CIM operations over http TCP/IP SA Agent 0…n 1 1 Service Agent (SA) Agent Device or 0…n Subsystem Proprietary Device or Subsystem Embedded Model Proxy Model SA Object Manager Provider 0…n 1 Proprietary n Device or Device Subsystem Proxy Model ibm.com/redbooks Figure 1-13 CIM Agent & CIM Object Manager The CIM Agent or CIM Object Manager (CIM/OM) will translate a proprietary management interface to the CIM interface. An example of a CIM/OM is the IBM CIM Object Manager for the IBM TotalStorage Enterprise Storage Server (ESS). In the future, more and more devices will be native CIM compliant, and will therefore have a built-in Agent as shown in the “Embedded Model” in Figure 1-13. When widely adopted, SMIS will streamline the way that the entire storage industry deals with management. Management application developers will no longer have to integrate incompatible feature-poor interfaces into their products. Component developers will no longer have to “push” their unique interface functionality to applications developers. Instead, both will be better able to concentrate on developing features and functions that have value to 20 IBM Tivoli Storage Resource Manager: A Practical Introduction end-users. Ultimately, faced with reduced costs for management, end-users will be able to adopt storage-networking technology faster and build larger, more powerful networks. For more information on SMIS/CIM/WBEM, see the SNIA and DMTF Web site: http://www.snia.org http://www.dmtf.org 1.3 Objectives of Storage Resource Management Customers want to achieve the following goals (shown in Figure 1-14) with Storage Resource Management tools. Objectives of Storage Resource Management Lower the cost of storage acquisition Lower the cost of storage management use industry standards for managing storage devices (eg CIM/WBEM) manage all storage with one application manage across the boundaries of the physical devices Support business requirements as seamlessly as possible efficiently store all data monitor and predict storage utilization meet SLAs - keep applications running ibm.com/redbooks Figure 1-14 Objectives of Storage Resource Management IBM Tivoli Storage Resource Manager is enabled for CIM/WBEM based storage management and as more and more devices become CIM enabled, it will be ready to manage them, enabling a single point of management control for different storage devices. IBM Tivoli Storage Resource Manager addresses the goals identified above, and offers storage administrators the reporting tools needed to understand: How much space is allocated to each application server, and how much is being used? How fast data is growing (for a server, a filesystem, a type of data, etc.)? How much space is being wasted? How much space is available across a business unit or the enterprise? How the data is distributed inside storage device (as of time of writing this was only available for IBM ESS)? Forecast requirements And many other issues Chapter 1. Introduction to Storage Resource Management 21 Summary We have demonstrated that: Storage and data are growing rapidly. Storage inefficiencies are rife. Storage costs a lot, even as the cost of storage decreases. Storage management costs a lot. Companies cannot continue to manage storage and data the old way (managing individual components) and be successful. Companies must adopt new tools to manage storage and data. The next chapter introduces IBM Tivoli Storage Resource Manager. 22 IBM Tivoli Storage Resource Manager: A Practical Introduction 2 Chapter 2. Introduction to IBM Tivoli Storage Resource Manager This chapter introduces and positions IBM Tivoli Storage Resource Manager - its architecture, components, and functionality. Tivoli Storage Resource Manager monitors storage assets, capacity, and usage across an enterprise. Tivoli Storage Resource Manager can look at: Storage from a host perspective: Manage all the host-attached storage, capacity and consumption attributed to filesystems, users, directories, and files Storage from an application perspective: Monitor and manage the storage activity inside different database entities including instance, tablespace, and table Storage utilization and provide chargeback information. Tivoli Storage Resource Manager provides over 300 standardized reports (and the ability to customize your own reports) about filesystems, databases, and storage infrastructure. These reports provide the storage administrator information about: Assets Availability Capacity Usage Usage violation Backup With this information, the storage administrator can: Discover and monitor storage assets enterprise-wide Report on enterprise-wide assets, files and filesystems, databases, users, and applications Provide alerts (set by the user) on issues such as capacity problems, policy violations, etc. Support chargebacks by usage or capacity © Copyright IBM Corp. 2003. All rights reserved. 23 2.1 IBM Tivoli Storage Resource Manager overview This section describes the business purpose of Tivoli Storage Resource Manager, its architectures, components, and supported platforms. 2.1.1 Business purpose of Tivoli Storage Resource Manager The primary business purpose of Tivoli Storage Resource Manager is to help the storage administrator keep data available to applications so the company can produce revenue. Through monitoring and reporting, Tivoli Storage Resource Manager helps the storage administrator prevent outages in the storage infrastructure. Armed with timely information, the storage administrator can take action to keep storage and data available to the application. Tivoli Storage Resource Manager also helps to make the most efficient use of storage budgets by allowing administrators to use their existing storage more efficiently, and more accurately predict future storage growth. 2.1.2 Architecture Tivoli Storage Resource Manager architecture is shown in Figure 2-1. Tivoli Storage Resource Manager Architecture Tivoli Storage Resource Manager Server HP/ UX Web Server Managed Storage Browser Repository ibm.com/redbooks Figure 2-1 Tivoli Storage Resource Manager architecture The Server system manages a number of Agents, which can be servers with storage attached, NAS systems or database application servers. Information is collected from the Agents and stored in a database repository. The stored information can then be displayed from a native GUI client or browser interface anywhere in the network. The GUI or browser 24 IBM Tivoli Storage Resource Manager: A Practical Introduction interface gives access to the other functions of Tivoli Storage Resource Manager, including creating and customizing of a large number of different types of reports and setting up Alerts. With Tivoli Storage Resource Manager you can: Monitor virtually any host Monitor local, SAN-attached and Network Attached Storage From a browser anywhere on the network 2.1.3 IBM Tivoli Storage Resource Manager products Figure 2-2 shows the products available for Storage Resource Management. IBM Tivoli Storage Resource Manager Products IBM Tivoli Storage Resource Manager Monitoring and reporting for servers and their storage Wide OS support for Agents Includes NAS monitoring and reporting Pre-requisite for the other products IBM Tivoli Storage Resource Manager Express Edition single Server Edition IBM Tivoli Storage Resource Manager for Databases Monitoring and reporting for application databases Supports UDB / DB2 , Oracle, Sybase and MS SQL Server IBM Tivoli Storage Resource Manager for Chargeback Collects storage usage information Generates reports and invoices for chargeback ibm.com/redbooks Figure 2-2 IBM Tivoli Storage Resource Manager products IBM Tivoli Storage Resource Manager This is the basic product for the set. It is needed as a pre-requisite for the other two products. IBM Tivoli Storage Resource Manager provides monitoring, reporting, and alerting for storage on a wide variety of popular operating systems, including UNIX variants, Windows and NetWare. See 2.1.5, “Supported platforms for IBM Tivoli Storage Resource Manager” on page 28 for the complete list of currently supported platforms. IBM Tivoli Storage Resource Manager also includes monitoring and reporting for NAS devices. IBM Tivoli Storage Resource Manager Express Edition IBM Tivoli Storage Resource Manager Express Edition is for single server, single processor configurations. It can be used for small customer accounts which have a limited number of storage servers by installing it on each system. Tivoli Storage Resource Manager Express Edition contains all the functionality and features of Tivoli Storage Resource Manager except for Network Attached Storage (NAS) and Enterprise Storage Server (ESS) subsystem Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 25 reporting. Tivoli Storage Resource Express Edition supports the same server platforms as the full product. IBM Tivoli Storage Resource Manager for Databases IBM Tivoli Storage Resource Manager for Databases is an additionally priced and orderable product. It requires IBM Tivoli Storage Resource Manager as a pre-requisite. It provides monitoring and reporting for application databases - showing storage utilization by these applications, finding unused space, identifying the fastest growing databases, and many other functions. IBM Tivoli Storage Resource Manager for Chargeback IBM Tivoli Storage Resource Manager for Chargeback is an additionally priced and orderable product. It requires IBM Tivoli Storage Resource Manager as a pre-requisite. It uses the storage usage information gathered by IBM Tivoli Storage Resource Manager and IBM Tivoli Storage Resource Manager for Databases to generate invoices that charge back for storage usage. 2.1.4 Components of IBM Tivoli Storage Resource Manager All three IBM Tivoli Storage Resource Manager products use the same components different functions are enabled by licensing them individually. At a high level, the major components of Tivoli Storage Resource Manager are: Server, running on a managing server, with access to a database repository Agents, running on one or more Managed Devices Clients (using either a locally installed GUI, or a browser-based Web GUI) which users and administrators use to perform storage monitoring tasks. These components are shown in Figure 2-3 below. 26 IBM Tivoli Storage Resource Manager: A Practical Introduction Tivoli Storage Resource Manager Components ID C Direct Connect Clients SRM Server Managed Servers (Agents) WWW Server SRM Database Repository I DC Web Conect Clients ibm.com/redbooks Figure 2-3 Components of Tivoli Storage Resource Manager Tivoli Storage Resource Manager Server The Tivoli Storage Resource Manager Server: Controls the discovery, reporting, and Alert functions Stores all data in the central repository Issues commands to Agents for jobs (either scheduled or ad hoc) Receives requests from the user interface clients for information, and retrieves the requested information from the central data repository. Extends filesystems automatically Reports on the IBM TotalStorage Enterprise Storage Server (ESS) and can also provide LUN provisioning An RDBMS (either locally or remote) manages the repository of data collected from the Agents, and the reporting and monitoring capabilities defined by the users. WWW Server The Web Server is optional, and handles communications to allow remote Web access to the Server. The WWW Server can run on the same physical server as the SRM Server. SRM Agent (on a Managed System) The Agent runs Probes and Scans, collects storage-related information from the managed system, and forwards it to the Manager to be stored in the database repository, and acted on Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 27 if so defined. An Agent is required for every host system to be monitored, with the exception of NetWare and NAS devices. Novell NetWare and NAS devices do not currently support locally installed Agents - they are managed through an Agent installed on a machine that uses (accesses) the NetWare or NAS device. The Agent will discover information on the volumes or filesystems that are accessible to the Agent’s host. The Agents are quite lightweight. Agents listen for commands from the host, and then perform a Probe (against the operating system), and/or a Scan (against selected filesystems). Normal operations might see one scheduled Scan per day or week, plus various ad hoc Scans. Chapter 5, “Operations: Policy, Quotas, and Alerts” on page 159 provides details of Scans and Probes. Clients (direct-connected and Web connected) Direct-connect Clients have the GUI to the Server installed locally. They communicate directly to the Manager to perform administration, monitoring, and reporting. The Manager retrieves information requested by the Clients from the database repository. Web-connect clients use the WWW Server to access the user interface through a Web browser. The Java administrative applet is downloaded to the Web Client machine and presents the same user interface that Direct-connect Clients see. 2.1.5 Supported platforms for IBM Tivoli Storage Resource Manager Details of the hardware and software required to install and run Tivoli Storage Resource Manager components are listed in the IBM Tivoli Storage Resource Manager V1.2 Installation Guide, GC32-9066 under “System Requirements” and on the Web site: http://www-3.ibm.com/software/tivoli/products/storage-resource-mgr/platforms.html Server The following platforms are supported for Tivoli Storage Resource Manager Server at the time of writing: Windows NT 4.0 or higher with SP4.0 or above Windows 2000 Windows XP Windows Server 2003 AIX 4.3.3, 5.1 HP-UX 11.0 Solaris 2.6 or 7, 8, or 9 Red Hat Linux 6.2, 7.1, 7.2 (64-bit is not supported) The database repository can be any of: Microsoft SQL-Server 7.0 or higher (Windows only) Oracle 8i or higher Sybase SQL Server (Adaptive Enterprise Server)11.9.2 or higher IBM DB2® UDB 7.1 or higher Cloudscape™ 5.1 or higher (provided with IBM Tivoli Storage Resource Manager) The database repository on the server can be local for all the databases, and remote for IBM DB2 UDB, MS SQL-Server, Sybase, and Oracle. 28 IBM Tivoli Storage Resource Manager: A Practical Introduction Agents The following platforms are supported for Tivoli Storage Resource Manager Agents (Managed Systems) at the time of writing: Windows NT 4.0 or higher with SP4.0 or above Windows 2000 Windows XP Windows Server 2003 Windows 95/98/ME (for the client GUI only, and must be installed to a Web server) HP-UX 11.0 Solaris 2.6 or 7, 8, or 9 Red Hat Linux 6.2, 7.1, 7.2 AIX 4.3.3, 5.1 Novell NetWare 4.0 or above NetApp Data ONTAP Tivoli Storage Resource Manager for Databases Tivoli Storage Resource Manager for Databases supports the following RDBMS: Microsoft SQL-Server 7.0 and above Oracle 8i and above Sybase SQL Server (Adaptive Enterprise Server) 11.9.2 and above IBM DB2 UDB 7.1 and above 2.1.6 Security considerations Tivoli Storage Resource Manager has two security levels: non-administrative users and administrators: Non-administrator users can: – View the data collected by Tivoli Storage Resource Manager – Create, generate, and save reports Administrators can: – Create, modify, and schedule Pings, Probes, and Scans – Create, generate, and save reports – Perform administrative tasks and customize the Tivoli Storage Resource Manager environment – Create Groups, Profiles, Quotas, and Constraints – Set Alerts 2.2 Enhancements to Tivoli Storage Resource Manager V 1.2 This section describes enhancements for IBM Tivoli Storage Resource Manager Version 1.2. 2.2.1 Automated filesystem extension Filesystem extension allows you to create additional space in the local filesystems of managed hosts. You can extend filesystems manually, or set up a policy to do it automatically. Policy can be configured to extend filesystems at a specified time, or when the utilization reaches a specified threshold. Filesystem extension is supported for JFS filesystems running on AIX 5.1 and VxFS filesystems running on Sun Solaris 2.8. See 5.3.1, “Filesystem extension and LUN provisioning” on page 200. Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 29 2.2.2 Enterprise Storage Server (ESS) integration ESS Subsystem Reporting gathers and reports on IBM TotalStorage Enterprise Subsystem (ESS) devices that can be seen in the CIM/OM. IBM Tivoli Storage Resource Manager can discover ESS subsystems, and report on them. The new subsystem reports show the capacity, controllers, disks, and LUNs of an ESS, and their relationships to computers and filesystems within a network. See also 6.3.1, “ESS Reporting” on page 297. ESS LUN provisioning provides filesystem extension using the ESS Common Information Model/Object Manager (CIM/OM) to interact with ESS subsystems. CIM/OM was introduced in “CIM/WEB management model” on page 17. This function allows for the automatic provisioning of Enterprise Storage Server LUNs when there is not enough space available in a volume group to extend a filesystem. For more information on ESS LUN provisioning see 5.3.1, “Filesystem extension and LUN provisioning” on page 200. 2.2.3 TEC integration You can now choose to send Alerts to the Tivoli Enterprise Console ® (TEC) when they are triggered. The TEC administrator can write correlation and automation rules to analyze IBM Tivoli Storage Resource Manager events according to the event definitions specified in the BAROC file (provided by IBM Tivoli Storage Resource Manager). It also performs responses such as sending further notification, creating or updating trouble tickets, running programs, etc. See Chapter 8., “Integration with Tivoli Enterprise Console” on page 411. 2.2.4 Cloudscape Interbase (formerly shipped for a database repository with IBM Tivoli Storage Resource Manager) has been replaced with IBM’s Cloudscape database for use as an IBM Tivoli Storage Resource Manager repository. You can easily install this lightweight database and use it for demonstration purposes, trial licenses, test environments, and so on. See the IBM Tivoli Storage Resource Manager Installation Guide, GC32-9066, for more information about Cloudscape support. 2.2.5 UDB/DB2 support IBM Tivoli Storage Resource Manager for Databases now supports DB2 UDB 7.1 or higher, including distributed DB2 databases. 2.3 Justification for IBM Tivoli Storage Resource Manager An investment in Tivoli Storage Resource Manager is typically justified by: Reducing costs (disk, and storage administration) Enhancing revenue (keeping data available to applications all the time) When you first run Tivoli Storage Resource Manager (and Tivoli Storage Resource Manager for Databases) against your servers and disks, filesystems and databases, you find out: What space is used on what servers and storage What files are using that space Which database applications have sufficient space, and which do not Customers typically find that utilization percentage across the enterprise is low - typically less than 50%. Therefore, generally the initial focus is on housecleaning - delete stale, old, or inappropriate files. After housecleaning, storage utilization should now have reached even lower levels - maybe 40% this time. After completing this step, you can continue to more long 30 IBM Tivoli Storage Resource Manager: A Practical Introduction term goals such as planning for future growth and storage purchases, and implementing appropriate policies and reporting to ensure storage use remains efficient. 2.3.1 Improving storage return on investment Tivoli Storage Resource Manager can improve the storage return on investment by: Delaying purchases of disk - After performing housecleaning, you can satisfy the demand for more storage from existing (now freed-up) disk. Depending on your particular situation, you may not need to buy more disk for 6 to 24 months. Lowering the storage growth rate - Because you now are monitoring and keeping better control of your storage according to policies in place, it should grow at a lower rate than before. Lowering disk costs - With Tivoli Storage Resource Manager, you will know what the real quarter-to-quarter growth rates actually are, instead of approximating (best-effort basis) once per year. You can project your annual demand with a good degree of accuracy, and can negotiate an annual contract with periodic deliveries, at a price lower than you would have paid for periodic emergency purchases. Lowering storage management costs - The manual effort is greatly reduced as most functions, such as gathering the information and analyzing it, are automated. Automated Alerts can be set up so the administrator only needs to get involved in exception conditions. Enhancing revenue Before using Tivoli Storage Resource Manager to manage your storage, it was difficult to get advance warning of out-of-space conditions on critical application servers. If an application did run out of storage on a server, it would typically just stop. This means revenue generated from that application or the service provided by it also stopped, and this incurred a high cost to fix it, as fixing unplanned outages fast is usually expensive. With Tivoli Storage Resource Manager, applications will not run out of storage. You will know when they need more storage, and can get it at a reasonable cost before an outage occurs. You will avoid the loss of revenue and services, plus the additional costs associated with unplanned outages. 2.4 Functions of IBM Tivoli Storage Resource Manager Tivoli Storage Resource Manager performs the functions shown in Figure 2-4. These functions are overviewed in the rest of this chapter and explored in detail in the rest of the book. Tivoli Storage Resource Manager is designed to be easy to use, quick to install, with flexible and powerful configuration. Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 31 IBM Tivoli Storage Resource Manager Functions Automatically discover and monitor disks, partitions, shared directories, and servers Reporting to track asset usage and availability physical inventory - disks, partitions, servers logical inventory - filesystems & files, databases & tables forecasting demand versus capacity standardized and customized reports, on-demand and batched various user-defined levels of grouping from summary level down to individual file or userID granularity Alerts - execute scripts, email, SNMP traps, event log Quotas Chargeback ibm.com/redbooks Figure 2-4 Tivoli Storage Resource Manager functions 2.4.1 Basic menu displays Figure 2-5 shows the main menu for IBM Tivoli Storage Resource Manager. You can see that the Agents configured show under the Agents entry. The green dot shows that the Agent is communicating with the Server. The red crossed circle indicates that CLYDE is down. The red triangle next to the Agent SUSE82-1 indicates that the Agent on that system is not reachable. The red crossed square next to the Agent BANDA indicates that it was connected, but currently there is an update for Tivoli Storage Resource Manager agent running. This display thus shows a quick summary of the state of each Agent. 32 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 2-5 Agent summary Figure 2-6 shows the Tivoli Storage Resource Manager dashboard. This is the default right-hand pane display when you start Tivoli Storage Resource Manager and shows a quick summary of the overall health of the storage environment. It can quickly show you potential problem areas for further investigation. Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 33 Figure 2-6 Tivoli Storage Resource Manager - dashboard The dashboard contains four viewable areas, which cycle among seven pre-defined panels. To cycle, use the Cycle Panels button. Use the Refresh button to update the display. Enterprise-wide summary The Enterprise-wide Summary panel shows statistics accumulated from all the Agents. The statistics are: Total filesystem capacity available Total filesystem capacity used Total filesystem free capacity Total allocated and unallocated disk space Total disk space unallocated to filesystems Total number of monitored servers Total number of unmonitored servers Total number of users Total number of disks Total number of filesystems Total number of directories Total number of files Filesystem Used Space This panel displays a pie chart showing the distribution of used and free space in all filesystems. Different chart types can be selected here. This provides a quick snapshot of your filesystem space utilization efficiency. 34 IBM Tivoli Storage Resource Manager: A Practical Introduction Users Consuming the Most Space By default this panel displays a bar chart (different chart types can be selected) of the users who are using the largest amount of filesystem space. Monitored Server Summary This panel shows a table of total disk filesystem capacity for the monitored servers sorted by OS type. Filesystems with Least Free Space Percentage This panel shows a table of the most full filesystems, including the percent of space free, the total filesystem capacity, and the filesystem mount point. Users Consuming the Most Space Report This panel shows the same information as the Users Consuming the Most Space panel, but in a table format. Alerts Pending This panel shows active Alerts that have been triggered but are still pending. 2.4.2 Discover and monitor Agents, disks, filesystems, and databases Tivoli Storage Resource Manager uses three methods to discover information about the assets in the storage environment: Pings, Probes, and Scans. These are typically set up to run automatically as scheduled tasks. You can define different Ping, Probe, and Scan jobs to run against different Agents or groups of Agents (for example, to run a regular Probe of all Windows systems) according to your particular requirements. Pings A Ping is a standard ICMP Ping which checks registered Agents for availability. If an Agent does not respond to a Ping (or a pre-defined number of Pings) you can set up an Alert to take some action. The actions could be one, any, or all of: SNMP trap Notification at login Entry in the Windows event log Run a script Send e-mail to a specified user(s) Pings are used to generate Availability Reports, which lists the percentage of times a computer has responded to the Ping. An example of an Availability Report for Ping is shown in Figure 2-7. Availability Reports are discussed in detail in 6.2.3, “Availability Reporting” on page 262. Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 35 Figure 2-7 Availability Report - Ping Probes Probes are used to gather information about the assets and system resources of monitored servers, such as processor count and speed, memory size, disk count and size, filesystems, etc. If Tivoli Storage Resource Manager for Databases is licensed, then Probes also gather information about the files, instances, logs, and objects that makeup the monitored databases. The data collected by the Probe process is used in the Assets Reports described in 6.2.1, “Asset Reporting” on page 252. Figure 2-8 shows an Asset report for detected disks. Figure 2-8 Asset Report of discovered disks Figure 2-9 shows an Asset Report for detected database tablespaces. 36 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 2-9 Asset Report of database tablespaces Scans The Scan process is used to gather statistics about usage and trends of the server storage. If Tivoli Storage Resource Manager for Databases is licensed, then Scans also gather information about the storage usage and trends within the monitored databases. Data collected by the Scan jobs are tailored by Profiles. Results of Scan jobs are stored in the enterprise repository. This data supplies the data for the Capacity, Usage, Usage Violations, and Backup Reporting functions. These reports can be scheduled to run regularly, or they can be run ad hoc by the administrator. Profiles limit the scanning according to the parameters specified in the Profile. Profiles are used in Scan jobs to specify what file patterns will be scanned, what attributes will be gathered, what summary view will be available in reports and the retention period for the statistics. Tivoli Storage Resource Manager supplies a number of default Profiles which can be used, or additional Profiles can be defined. Table 5-1 on page 180 shows the default Profiles provided. Some of these include: Largest files - Gathers statistics on the largest files Largest directories - Gathers statistics on the largest directories Most at risk - Gathers statistics on the files that have been modified the longest time ago and have not been backed up since modified (Windows Agents only) Figure 2-10 shows a sample of a report produced from data collected in Scans. Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 37 Figure 2-10 Summary View - by filesystem, disk space used and disk space free This report shows a list of the filesystems on each Agent, the amount of space used in each, expressed in bytes and as a percentage, the amount of free space, and the total capacity available in the filesystem. 2.4.3 Reporting Reporting in Tivoli Storage Resource Manager is very rich, with over 300 pre-defined views, and the capability to customize those standard views, save the custom report, and add it to your menu for scheduled or ad hoc reports. You can also create your own individual reports according to particular needs and set them to run as needed, or in batch (regularly). Reports can be produced in table format or a variety of charting (graph) views. You can export reports to CSV or HTML formats for external usage. Reports are generated against data already in the repository. A common practice is to schedule Scans and Probes just before running reports. Reporting can be done at almost any level in the system, from the enterprise down to a specific entity and any level in between. Figure 2-6 on page 34 shows a high-level summary report. Or, you can drill down to something very specific. Figure 2-11 is an example of a 38 IBM Tivoli Storage Resource Manager: A Practical Introduction lower-level report, where the administrator has focussed on a particular Agent, BANDA, to look at a particular disk on a particular controller. Figure 2-11 Asset Report - BANDA assets Reports can be produced either system-wide or grouped into views, such as by computer, or OS type. Restriction: Currently, there is a maximum of 32,767 (216 -1) rows per report. Therefore, you cannot produce a report Tivoli Storage Resource Manager to list all the .HTM files in a directory containing a million files. However, you can (and it would be more productive to do so) produce a report of the 20 largest files in the directory, or the 20 oldest files, for example. Tivoli Storage Resource Manager allows you to group information about similar entities (disk, filesystems, etc.) from different servers or business units into a summary report, so that business and technology administrators can manage an enterprise infrastructure. Or, you can summarize information from a specific server - the flexibility and choice of configuration is entirely up to the administrator. You can report as at a point in time, or produce a historical report, showing storage growth trends over time. Tivoli Storage Resource Manager reporting lets you track actual demand for disk over time, and then use this information to forecast future demand for the next quarter, two quarters, year, etc. Figure 2-12 is an example of a historical report, showing a graph of the number of files on the C drive on the Agent WISLA. Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 39 Figure 2-12 Historical report of filesystem utilization Tivoli Storage Resource Manager has three basic types of reports: Computers and filesystems Databases (if the module is licensed) Chargeback (if the module is licensed) Reporting categories Major reporting categories for filesystems and databases are: Assets Reporting uses the data collected Probes to build a hardware inventory of the storage assets. You can then navigate through a hierarchical view of the assets by drilling down through computers, controllers, disks, filesystems, directories, and exports. For database reporting, information on instances, databases, tables, and data files is presented for reporting. Storage Subsystems Reporting provides information shows storage capacity at a computer, filesystem, storage subsystem, LUN, and disk level. These reports also enable you to view the relationships among the components of a storage subsystem. Storage Subsystem Reporting is available at the time of writing for the IBM TotalStorage Enterprise Storage Server (ESS) Availability Reporting shows responses to Ping jobs, as well as computer uptime. Capacity Reporting shows how much storage capacity is installed, how much of the installed capacity is being used, and how much is available for future growth. Reporting is done by disk and filesystem, and for databases, by database. Usage Reporting shows the usage and growth of storage consumption, grouped by filesystem, and computers, individual users, or enterprise-wide. Usage Violation Reporting shows violations to the corporate storage usage policies, as defined through Tivoli Storage Resource Manager. Violations are either of Quota (defining 40 IBM Tivoli Storage Resource Manager: A Practical Introduction how much storage a user or group of users is allowed) or Constraint (defining which file types, owners and file sizes are allowed on a computer or storage entity). You can define what action should be taken when a violation is detected - for example, SNMP trap, e-mail, or running a user-written script. Backup Reporting identifies files which are at risk because they have not been backed up. Reporting on the Web It is easy to customize Tivoli Storage Resource Manager to set up a reports Web site, so that anyone in the organization can view selected reports through their browser. Section 6.7, “Setting up a reports Web site” on page 361 explains how to do this. Figure 2-13 shows an example of a simple Web site to view Storage Resource Management reports. Figure 2-13 SRM Reports on the Web 2.4.4 Alerts An Alert defines an action to be performed if a particular event occurs or condition is found. Alerts can be set on physical objects (computers and disks) or a logical objects (filesystems, directories, users, databases, and OS user groups). Alerts can tell you, for instance, if a disk has a lot of recent defects, or if a filesystem or database is approaching capacity. Alerts on computers and disks come from the output of Probe jobs and are generated for each object that meets the triggering condition. If you have specified a triggered action (running a script, sending an e-mail, etc.) then that action will happen if the condition is met. Alerts on filesystems, directories, users, and OS user groups come from the combined output of a Probe and a Scan. Again, if you have specified an action, that action will be performed if the condition is met. Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 41 An Alert will register in the Alert log, plus you can also define one, some or all of the following actions to be performed in addition: Send an e-mail indicating the nature of the Alert. Run a specific script with relevant parameters supplied from the content of the Alert. Make an entry into the Windows event log. Pop up next time the user logs in to Tivoli Storage Resource Manager. Send an SNMP trap. Log a TEC event Figure 2-14 shows the Alert Log. The entries Alert Log, All, Computer, and Filesystem are in red, signifying that an Alert threshold has been reached. Drilling down on Computer, you can see the details of the Alert. We can see it was caused by the system VMWARE2KSRV1 being unreachable. Figure 2-14 Alert Log and details Refer to 5.2, “OS Alerts” on page 189 for details on alerts. 2.4.5 Chargeback: Charging for storage usage Through the optional Tivoli Storage Resource Manager for Chargeback product, Tivoli Storage Resource Manager provides the ability to produce Chargeback information for storage usage. The following items can have charges allocated against them: Operating system storage by user Operating system disk capacity by computer Storage usage by database user Total size by database tablespace Tivoli Storage Resource Manager can directly produce an invoice or create a file in CIMS format. CIMS is a set of resource accounting tools that allow you to track, manage, allocate, and charge for IT resources and costs. For more information on CIMS see the Web site: http://www.cims.com. Chargeback is a very powerful tool for raising the awareness within the organization of the cost of storage, and the need to have the appropriate tools and processes in place to manage storage effectively and efficiently. Example 2-1 shows a Chargeback Report based on disk usage by user. 42 IBM Tivoli Storage Resource Manager: A Practical Introduction Example 2-1 Chargeback Report based on disk usage by user Tivoli SRM for ChargeBack User Usage Invoice page 1 24-Sep-02 Administrator.hb Name 100 group total SPACE (MB) COST 0.1042/MB 5 0.52 5 0.52 Tivoli SRM for ChargeBack User Usage Invoice page 2 24-Sep-02 Tivoli.Default User Group Name [Supervisor] 1009 101 1010 1012 1084 111 1414 202 240 50 5115 8482 9727 adm admin Administrators backup bin cbres daemon guest imnadm invscout itso_hb itso_usr IUSR_LOCHNESS IWAM_LOCHNESS lotti lp nobody oracle root sys SYSTEM uucp SPACE (MB) COST 0.1042/MB 524 0 4 1 1 1 1 24 0 1 1 10 7 0 3 523 37,687 27 1,173 1 1 1 2 1 134 1 1 1 7 1 1 5 5,857 1 3 2 54.60 0.00 0.42 0.10 0.10 0.10 0.10 2.50 0.00 0.10 0.10 1.04 0.73 0.00 0.31 54.50 3,926.99 2.81 122.23 0.10 0.10 0.10 0.21 0.10 13.96 0.10 0.10 0.10 0.73 0.10 0.10 0.52 610.30 0.10 0.31 0.21 Chapter 2. Introduction to IBM Tivoli Storage Resource Manager 43 group total 46,008 Tivoli SRM for ChargeBack Run Summary User Usage Invoice 4,793.97 page 3 24-Sep-02 46,013 MB run total 4,794.49 4,794 Refer to 6.8, “Charging for storage usage” on page 364 for more details on Chargebacks. 2.5 Chapter summary In this chapter we introduced Tivoli Storage Resource Manager, whose primary business purpose is to keep the storage infrastructure running to assist revenue-generating activities. Tivoli Storage Resource Manager Business Benefits: Improve Storage ROI Reduce Storage Administration Costs Help Improve Revenue by Reducing the Risks of Application Downtime ibm.com/redbooks Figure 2-15 Business benefits of Tivoli Storage Resource Manager 44 IBM Tivoli Storage Resource Manager: A Practical Introduction Part 2 Part 2 Design considerations In this part we present some things to consider when designing an IBM Tivoli Storage Resource Manager solution, specifically covering some deployment scenarios. We present the basic architecture and describe how higher availability can be implemented. © Copyright IBM Corp. 2003. All rights reserved. 45 46 IBM Tivoli Storage Resource Manager: A Practical Introduction 3 Chapter 3. Deployment architecture In this chapter we will describe considerations for the deployment architecture of the IBM Tivoli Storage Resource Manager in the enterprise. We will discuss the design strategies and implementation infrastructure. An overview of the number of Agents and Agent placement will be covered along with various deployment scenarios. © Copyright IBM Corp. 2003. All rights reserved. 47 3.1 IBM Tivoli Storage Resource Manager architecture Figure 3-1 shows the IBM Tivoli Storage Resource Manager architecture. Tivoli Storage Resource Manager Architecture ID C Direct-connect Clients SRM Server %% 10 10 % 10 10 % 10 % 10 % 10 % 10 10 % 10 %% Scheduled Batch Reports Managed Servers WWW Server SRM Database Repository I DC Web Connect Clients ibm.com/redbooks Figure 3-1 IBM Tivoli Storage Resource Manager architecture Tivoli Storage Resource Manager consists of the following components: Server acts as the center for all management operations. All requests from clients are sent to the SRM server, and the server then retrieves data from the repository and returns it to the client. With this data, users can construct and display the reports. The Server also directs the Agent activity through its job scheduling component. Database Repository is used to store the collected data from the Agents. WWW Server is optional, and provides communications for remote Web access to the Server. The WWW Server can run on the same physical system as the Tivoli Storage Resource Manager Server. Managed Systems run the Tivoli Storage Resource Manager Agent code, which is used to gather the information about the managed server, its storage, and managed applications. Direct-connect Clients have the GUI to the Server installed locally. They communicate directly with the Server to perform administration, monitoring, and reporting. Scheduled Batch Reports are jobs which prepare reports based on collected data from the Managed Systems, which are scheduled to run automatically. The reports will be generated using the data residing in the database. 48 IBM Tivoli Storage Resource Manager: A Practical Introduction Web Connect Clients use the WWW Server to access the GUI through a Web browser. The Java administrative applet is downloaded to the Web Client machine and presents the same user interface as for the Direct Connect Clients. 3.2 IBM Tivoli Storage Resource Manager Server The Server component is the main part of IBM Tivoli Storage Resource Manager. The Server is responsible for the following roles as shown in Figure 3-2. Tivoli Storage Resource Manager Server Server roles Monitoring Discovery Probes Pings Scans Policy Management Quotas Constrains Scheduled Actions (SCRIPTS) Alerts Alerts (SCRIPTS) ibm.com/redbooks Figure 3-2 IBM Tivoli Storage Resource Manager Server roles Monitoring – Discovery - The Server searches the network to discover machines which do not have Agent code installed (that is, not yet being monitored by IBM Tivoli Storage Resource Manager). It will add them to the Unmanaged list (shown in Figure 3-3 on page 51) so they can be potentially managed later. Only Windows systems in the same domain as the IBM Tivoli Storage Resource Manager Server will be discovered. – Probes - The Server will collect the inventory of storage assets of Managed Systems (computers, controllers, disk driver, filesystems, logical units, etc.) and store it in the database repository. – Pings - The Server checks the availability of the Managed Systems by issuing TCP/IP ping commands to the system. This function is not available for NAS devices and NetWare servers. – Scans - The Server Scans the Managed Systems to gather information on usage and consumption. Chapter 3. Deployment architecture 49 Policy Management – Quotas - The Quota check is performed based on the results of the Scans. Quotas define the consumption level for filesystems, computers, and network. Quotas can be run from the GUI, or they can be scheduled to run automatically. The data used for Quota checking resides in the database. To achieve the most accurate Quota checking, you need to schedule the Scan job before performing Quota check. – Constraints - During a Scan, the Server will also perform a Constraint check on the results. Constraints can be used to define what are acceptable and unacceptable file types, file sizes, and file owners on Managed Systems. – Scheduled Actions - You can schedule execution of a script against Managed Systems. The script can be use any kind of command-shell, batch programming language of third party tool, which can be invoked through a command line interface and is valid for execution on the Agent. Alerts – Alerts - After a Scan the Server will issue Alerts related to the Alert Threshold defined. The Server roles described above are covered in more detail in Chapter 5, “Operations: Policy, Quotas, and Alerts” on page 159. All Storage Resource Management operations are controlled from the Server side. The Server communicates with the Agents (Managed Systems) when it is performing those tasks. No managed tasks are performed on the Agent itself. The Agent is just performing the Scans and script execution on behalf of the Server. Also, all the communication with the database is done on the Server side for performance reasons. The data is transmitted from the Agent to the Server and the Server then stores it in the database repository. With such an approach, there is no need for any database connectivity software on the Agents. Also, since the Direct-connect Clients and Web Connect Clients for reporting request data through the Server, rather than directly from the database, they also do not require any database connectivity software installed. As everything is controlled and run from the Server side, reliability and availability is a key consideration for the system which is running the IBM Tivoli Storage Resource Manager Server. 3.2.1 Discovery of unmanaged Windows systems After the Tivoli Storage Resource Manager Server is installed it will try to find any unmanaged Windows systems. In the process of discovery, one of the Agents installed in each Windows domain or workgroup will identify other Windows systems. This data will be then transferred to the Tivoli Storage Resource Manager Server, which will then query each system to determine if they have Tivoli Storage Resource Manager Agent installed. If the system does not have the Agent installed it will appear in the Unmanaged Systems list. To access this list, select IBM Tivoli SRM -> Reporting -> Asset -> System-wide as shown in Figure 3-3. 50 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 3-3 Unmanaged systems When you install the Tivoli Storage Resource Manager Server in a new environment, an Agent is automatically installed on the same system as the Server. In this case after the initial discovery job, all the Windows systems from the domain or workgroup of the Server system will be displayed under Unmanaged Computers. 3.2.2 Scripts Scripts are executed as a result of either of the following events: Scheduled actions - Batch Reports Alerts - An Alert can trigger an action, which can be a script How are scripts run? During the installation process of the Server and Agents, the \scripts directory under the installation directory is created. The default directory is: Windows: \Program directory\Tivoli\TSRM UNIX: /opt/Tivoli/TSRM or /usr/Tivoli/TSRM The following steps explain how scripts are run when they are triggered: The Server looks in its local \scripts directory. If the script with the required name is in that directory, the Server will load the script, and send it to the Agent where it is designated to run. The Agent receives the script, saves it into a temporary file, and runs it. After the script is finished, the temporary file on the Agent is deleted. Chapter 3. Deployment architecture 51 Note: When running a script against a NAS device or Novell NetWare servers, the script is run on the Agent assigned to the filesystem where the triggered condition occurred. There are two possible scenarios where the script may not run from the Server: The script already exists on the Agent. In this case the Agent will run the local script directly instead. The Agent is always checked first to see if it has a local copy, before running it from the Server. You did not check the Agent may run scripts sent by server option during the installation process as described in 4.3.3, “Installation of the Server code” on page 71: Without this option set, Agents will not receive scripts from the server for execution. Note: The advantage of setting the policy that Agents may run scripts from the Server is that you can then install and maintain only one repository for all scripts. This can ease the management of the scripts and it will also give you consistency. 3.3 IBM Tivoli Storage Resource Manager Agent The Tivoli Storage Resource Manager Agent is responsible for the following tasks as shown in Figure 3-4. Tivoli Storage Resource Manager Agent Agent types StorageAgent for OS (includes NAS) StorageAgent for Databases StorageAgent for Chargeback Agent roles Executing Probes and Scans on behalf of the SRM server Executing scripts in case of Scheduled Actions Alerts ibm.com/redbooks Figure 3-4 SRM Agent tasks The Agent code is required on every system you want to manage. As the Agents communicate through TCP/IP, the Managed System needs IP connectivity to the Server. 52 IBM Tivoli Storage Resource Manager: A Practical Introduction The product uses the same code base for all three Agent types (OS, Database, and Chargeback). Each of the Agents is activated by the licenses installed with the Manager code. There are two exceptions on Agent placement: NAS devices - The monitoring of NAS devices is done through the systems using NAS attached storage. Depending on the protocol used for filesystem access, those systems can be either Windows or UNIX based systems. Tip: It is recommended that you divide NAS exported filesystems among the Managed Systems, which access the NAS device. This means that the workload of scanning and probing is shared among the Agents. Novell NetWare servers - For retrieving the storage information from the servers and volumes within NDS trees, you must install the Agent code on a Windows system where a Novell NetWare client is already located. The Agent code uses native NetWare calls from these systems. The requirements for a Windows Agent to scan NetWare systems are: – Running Windows 2000 or Windows NT 4 SP4 and above – Installed a NetWare Client – Has access to the Novell NetWare servers and volumes within your environment. This means that you must have a user ID with the correct access level to be able to perform queries into the NDS trees. 3.4 Deployment considerations In this section we will outline some considerations for deploying Tivoli Storage Resource Manager installations. As Tivoli Storage Resource Manager supports various platforms for the Server and Agent installations, the choice of Server platform will usually reflect the platforms used in your environment. From the generally available information, and from our experience in the lab installations, Tivoli Storage Resource Manager can coexist with virtually any other server software. A single Server instance can theoretically support more than 1000 Agents. Of course, the load on the Server side will increase with the number of jobs defined. The load of the jobs on the Server and Agents depends of the job definition. For example, a Scan which will look for all files will run much longer, and be more CPU-intensive easier than a Scan which will look for only particular file types. The Agent should be installed on every system you want to manage. For managing NAS devices and Novell NetWare servers, you need to install Agents on the systems using the NAS and NetWare filesystems, as described in 3.3, “IBM Tivoli Storage Resource Manager Agent” on page 52. 3.4.1 Repository database All the configuration data and the data collected from Agent Scans is stored in the database repository. By using this approach, all the data can be off-loaded to a separate database server, since Tivoli Storage Resource Manager can use either a locally installed database or a remote database repository. In the current edition of Tivoli Storage Resource Manager, the repository can be local or remote using any of Microsoft SQL-Server, Oracle, and Sybase SQL, or IBM DB2 UDB. The size of the database will vary upon the number of actions you are taking in your Storage Resource Management environment. The size of the database will depend on the following parameters: Chapter 3. Deployment architecture 53 The amount of historical data you keep The number of scanned files on each Managed System - for each scanned file, if a file meets a Constraint criteria, a corresponding entry will be saved in the database. The type of jobs (for example, different type of Scans and Constraints) you are performing The number of systems you want to manage - i.e. Agents. Tip: If possible, it is recommended that you use a separate system for the database repository. 3.4.2 CIM/OM server placement IBM Tivoli Storage Resource Manager provides a filesystem extension feature that can be used to automatically increase filesystem capacity for managed hosts when utilization reaches a specified level. This function allows for the automatic provisioning of Enterprise Storage Server LUNs when there is not enough space available in a volume group to extend a filesystem. Filesystem extension uses the ESS Common Information Model/Object Manager (CIM/OM) to interact with ESS subsystems. See “SMI Specification” on page 18 for more information on CIM/OM. The IBM Tivoli Storage Resource Manager server communicates with the CIM/OM server over an IP network using the HTTPS protocol. CIM/OMs installed on the same network subnet as the IBM Tivoli Storage Resource Manager server can be automatically discovered. The Service Location Protocol (SLP) is used to discover CIM/OMs. For information about supported versions of the CIM/OM, see the IBM Tivoli Storage Resource Manager Support Website at: http://www-3.ibm.com/software/sysmgmt/products/support/IBMTivoliStorageResourceManager.html Restriction: Automatic discovery is not supported for CIM/OMs installed on Sun Solaris or HP-UX. In our lab setup (Figure 3-5), the CIM/OM server is installed on a host called W2KADVTSM, which talks to the ESS (ESSF20) through Ethernet. The IBM Tivoli Storage Resource Manager server (W2KADVTSRM) makes an HTTPS connection over the network directly to the CIM/OM server. Neither the IBM Tivoli Storage Resource Manager server, nor the CIM/OM server need to be connected through Fibre Channel to the ESS. 54 IBM Tivoli Storage Resource Manager: A Practical Introduction Win2k Srv sp3 CIM/OM server w2kadvtsm 172.31.1.135 43p AIX 5.1 ML 4 ITSRM Agent tsmsrv43p 172.31.1.155 ESSF20 172.31.1.1 2109 Win2k Srv sp3 ITSRM Server w2kadvtsrm 172.31.1.133 Intranet Figure 3-5 CIM/OM server placement If you just want ESS LUN reporting, then you do not need agents on the machines connected to the ESS through Fibre Channel. For additional information (filesystems, devices, etc.) and filesystem-extension and LUN provisioning, there must be an agent on the hosts connected to the ESS. 3.4.3 NAS Agent placement In Figure 3-6 we show an example of two Managed Systems, one on UNIX and one on Windows using filesystems from a NAS device. Chapter 3. Deployment architecture 55 IBM Tivoli SRM Agent setup for NAS devicess UNIX system NFS imported network drive(s) Tivoli SRM Agent installed IP I DC Tivoli SRM Server NFS IP CIFS NAS Device CIFS exported network drives NFS exported network drives Windows sytem CIFS imported network drive(s) Tivoli SRM Agent installed ibm.com/redbooks Figure 3-6 Setup of SRM Agent for NAS devices In this example we also divided the workload of scanning the NAS device over the two systems. Depending on the size of the NAS filesystems, it is recommended to spread the scanning workload among the systems running the Agent code. NAS discovery After you complete the installation of the Agents for the systems accessing the NAS devices, initial discovery will be performed. The discovery job is sent to every managed UNIX Agent and to one managed Windows Agent in each Windows domain: Windows - The Agent responsible for the discovery will issue an SNMP query to all the Windows systems and NAS devices in the domain. If the Vendor Identification Number matches a number defined in the file config\nas.config in the installation directory, the system will be considered as a NAS device. In Example 3-1 you can see the nas.config file from our lab installation. Example 3-1 nas.config file 36 311 789 1139 4693 6411 Digital Equipment Corporation Microsoft Network Appliance EMC Corporation Maxtor Quantum/SNAP After the initial Agent installation the entry for Microsoft is not present. We added the entry to recognize the IBM NAS 200 device in our lab. 56 IBM Tivoli Storage Resource Manager: A Practical Introduction Note: IBM NAS 200 is a Windows OS powered NAS device. The 311 entry is the generic identification number for Windows systems so all Windows machines will be discovered. You can later limit the login to the NAS devices (as shown in Figure 3-7) selecting only the NAS device(s) you want to manage, and leave all the others unselected. After discovering the NAS devices, the Agent will perform a login into each device. By default, the password supplied during installation will be used. If the NAS device requires a different password you can supply this password for each filesystem separately as shown in “Configuration: General settings” on page 108. Attention: If you decide to put the 311 entry in nas.config file, all Windows based systems with SNMP enabled will be recognized as Other NAS devices, as shown in Figure 3-7. This means that any Windows systems without installed Agents will no longer show up under unmanaged devices. This could cause potential for a confusing situation as you may think that all Windows based systems are managed, since they do not appear in the unmanaged list. Figure 3-7 After setting 311 for NAS discovery Tip: Because of the mentioned reasons, if your Windows powered NAS device allows installation of third party products, we recommend that you install the Agent on the device itself. UNIX - All the Managed Systems that have filesystems mounted from other machines will be used for discovering the NAS devices. The Agent uses the mount table (on Solaris, auto-mount config files are also used) for the imported mounts. After this, it will perform an SNMP query, and if the identification number returned is listed in the file nas.config, the Chapter 3. Deployment architecture 57 device will be qualified as a NAS device. The NAS discovery process in UNIX will not perform any logins into the NAS device. Note: If the NAS device does not report back on the SNMP query, it will appear in the Unmanaged Computers Report. 3.4.4 Novell NetWare Agent placement Figure 3-8 shows Windows systems with the Novell NetWare client installed, accessing two Novell NetWare servers. IBM Tivoli SRM Agent setup for Novell servers Windows sytem with installed Novell NetWare client and acces to the NDS data Tivoli SRM Agent installed IDC IPX/ SPX IP I DC Novell NetWare running version 4.0 or above Tivoli SRM Server IP IDC IPX/ SPX Windows sytem with installed Novell NetWare client and acces to the NDS data Tivoli SRM Agent installed Novell NetWare running version 4.0 or above ibm.com/redbooks Figure 3-8 Setup of SRM Agent for NetWare systems In this example, the data for the Novell NetWare server is extracted using Novell NDS information. More than one NetWare server can be monitored from a single Managed System with the Agent installed. Attention: The system which will manage Novell Servers should have a user ID with sufficient rights to perform queries to the NDS trees. Novell NetWare discovery The Novell NetWare servers are discovered from the Agents, which are installed on the Windows system with the Novell NetWare client installed. 58 IBM Tivoli Storage Resource Manager: A Practical Introduction 3.5 Deployment scenarios In this section we will discuss several possible deployment scenarios. 3.5.1 Standalone Server installation with local database The Tivoli Storage Resource Manager Server can be installed on a single system using a local database. In this scenario, the Tivoli Storage Resource Manager Server and database are resident on the same physical system. You can see this installation type in Figure 3-9. IBM Tivoli SRM - Installation with local database IDC Direct Connect Clients SRM Server %% 10 10 % 10 10 % 10 % 10 % 10 % 10 10 % 10 %% Scheduled Batch Reports Managed Server WWW Server SRM Database Repository IDC Web Conect Clients ibm.com/redbooks Figure 3-9 Installation with local database This type of installation can have certain scalability limitations as you need to take care of the database growth and maintenance. This type of installation is available on all supported Tivoli Storage Resource Manager Server platforms, providing the database product itself is supported on that operating system. For example, Microsoft SQL-Server is only available for Windows systems. In our lab we performed this type of installation using a Windows 2000 Server system with IBM DB2 Version 7.2 as the underlying database. The details of the installation are covered in Chapter 4, “IBM Tivoli Storage Resource Manager installation” on page 67. 3.5.2 Standalone Server installation with remote database In such a setup, the IBM Tivoli Storage Resource Manager server is installed on a supported Server platform, accessing a remote database repository. In this case you can use different platforms for the Server and the database. You can see this installation in Figure 3-10. Chapter 3. Deployment architecture 59 IBM Tivoli SRM - Installation with remote database SRM Server I DC Direct Connect Clients %% 10 10 % 10 10 % 10 % 10 % 10 % 10 10 % 10 %% Managed Server WWW Server Scheduled Batch Reports Database server I DC SRM Database Repository Web Conect Clients Remote Database ibm.com/redbooks Figure 3-10 Installation with remote database As the majority of enterprise database implementations are based on centralized management, this setup allows Tivoli Storage Resource Manager to also participate in this architecture by using a database on the centralized server. In this case, the management of the database will be done by the DBAs. 3.5.3 Standby Server installation for HA using remote database A standalone installation with a remote database can give us a certain level of high availability. Typically, enterprise database servers are already protected using high availability (HA) solutions, so we therefore only need to protect the Tivoli Storage Resource Manager Server itself. One possibility would be to have a standby server (for example, a testing server) which can be enabled in the event of a Tivoli Storage Resource Manager Server failure. This setup is shown in Figure 3-11. 60 IBM Tivoli Storage Resource Manager: A Practical Introduction IBM Tivoli SRM - possible HA setup Tivoli SRM Server ID C IDC ID C Database Server with Tivoli SRM Database Standby Tivoli SRM Server ibm.com/redbooks Figure 3-11 HA setup with remote database The standby Server has to be installed with the same settings as the primary one, and it needs to have access to the same database. Also, whenever you make changes to the primary Server you need to make the same changes to the secondary Server. In the event of a primary Server failure, you would only need to change the DNS record so that the standby Server IP address will be resolved when Agents perform queries to the Tivoli Storage Resource Manager Server. In our lab environment we performed an installation using Oracle 8.1.7 on Windows 2000 Server to use as a database repository. We installed the Tivoli Storage Resource Manager Server on another two Windows 2000 server systems. The details of installation are covered in 4.8, “Manager HA install using remote Oracle database” on page 142. 3.5.4 Windows cluster install of IBM Tivoli Storage Resource Manager Server In this case, the Tivoli Storage Resource Manager Server is installed on two Microsoft Windows Server systems set up in a Microsoft Cluster Services (MSCS) environment. The systems will use SAN attached storage for the shared disk resources. The database repository will reside on a separate server. The setup is shown in Figure 3-12. Chapter 3. Deployment architecture 61 Windows Clustered IBM Tivoli SRM Server Primary Tivoli SRM Server (Windows 2000 Adv. Server) I DC Tivoli SRM Agents IP IP FC ID C IP IP Database Server with Tivoli SRM Database (Windows 2000 Server) ID C Heartbeat IP IP FC SAN FC Standby Tivoli SRM Server (Windows 2000 Adv. Server) FAStT 700 ibm.com/redbooks Figure 3-12 Windows 2000 cluster setup In this installation, the IBM Tivoli Storage Resource Manager program files are installed on a directory on the shared storage so that they can be reachable from both servers. Doing this automatically maintains the consistency of the configuration. In our lab environment we performed this installation using a remote database repository on Oracle 8.1.7 on Windows 2000. We installed IBM Tivoli Storage Resource Manager Server on cluster of two Windows 2000 Advanced Server systems. The details of the installation are given in 4.7, “Microsoft Cluster installation” on page 123. 3.5.5 AIX cluster installation of IBM Tivoli Storage Resource Manager Server In this case the installation of the IBM Tivoli Storage Resource Manager server will be performed on two AIX server systems set up in an IBM HACMP environment. Both systems will have the Tivoli Storage Resource Manager Server installed and they will use SAN attached storage for the shared disk resources. The database repository will reside on a separate server. The setup is shown in Figure 3-13. 62 IBM Tivoli Storage Resource Manager: A Practical Introduction AIX clustered IBM Tivoli SRM Server Primary IT SRM Server (AIX 4.3.3 ML10) IT SRM Agents IDC IP IP FC IDC IP IP Database Server with ITSRM Database (Windows 2000 Server) IDC IP Heartbeat IP SAN FC FC Standby IT SRM Server (AIX 4.3.3 ML10) FAStT 700 ibm.com/redbooks Figure 3-13 AIX cluster setup In this installation, the IBM Tivoli Storage Resource Manager program files are installed on the shared storage, so they are accessible from both servers. With such installation we also maintain the consistency of the configuration. Doing this automatically maintains the consistency of the configuration. The database repository is installed on a Windows 2000 server running IBM DB2 UDB Version 7.2. Chapter 3. Deployment architecture 63 64 IBM Tivoli Storage Resource Manager: A Practical Introduction Part 3 Part 3 Installation and basic operations This part discusses how to install IBM Tivoli Storage Resource Manager Server, Agent, and Client in a number of configurations, including the basic operations of the product, as well as the setup for high availability. © Copyright IBM Corp. 2003. All rights reserved. 65 66 IBM Tivoli Storage Resource Manager: A Practical Introduction 4 Chapter 4. IBM Tivoli Storage Resource Manager installation This chapter provides information about installing IBM Tivoli Storage Resource Manager in various environments. We will discuss supported platforms, supported databases for the repository, and supported databases for database monitoring. We will outline the whole installation process up to the first startup of the application. We will also cover the CIM/OM functionality that supports ESS reporting. © Copyright IBM Corp. 2003. All rights reserved. 67 4.1 Supported operating system platforms As IBM Tivoli Storage Resource Manager is a Java-based application, it can run under a number of operating systems. On Figure 4.1, you can see the list of supported platforms for the Server and Agent applications, valid at the time of writing. The first list shows OS for which both the Server and Agent code is available. The second lists shows OS where only an Agent is available. Tivoli Storage Resource Manager platforms Supported Server & Agent platforms Windows NT 4.0 SP4 or above Windows 2000 Windows XP Windows Server 2003 HP-UX 11.0 Solaris 2.6, 7, 8 or 9 Red Hat Linux 6.2,7.1,7.2 AIX 4.3.3, AIX V5.1 Supported Agent platforms Novell Netware 4.0 or above NetApp Data ONTAP ibm.com/redbooks Figure 4-1 Supported operating system platforms 4.2 Supported databases for repository Figure 4-2 shows the supported databases which can be used as the repository for Tivoli Storage Resource Manager data. If you already have any of these installed in your enterprise, you can use an existing database server. 68 IBM Tivoli Storage Resource Manager: A Practical Introduction Tivoli Storage Resource Manager supported repository databases Supported databases for repository Microsoft SQL Server 7.0 and above Oracle 8i or higher Sybase12.5 or higher IBM UDB 7.1 or higher Cloudscape (included - not recommended for production use) ibm.com/redbooks Figure 4-2 Supported databases for repository 4.3 Tivoli Storage Resource Manager Server install In this section we will outline the installation process for the Tivoli Storage Resource Manager Server. You can see the main installation steps in Figure 4-3. Note that in all the installation screens, logging messages are displayed at the bottom of each panel. These are not displayed in the screen captures in this chapter. Chapter 4. IBM Tivoli Storage Resource Manager installation 69 Tivoli Storage Resource Manager Server install Installation Database creation Manager and Agent install Configure the web access for Manager application Start the Manager application ibm.com/redbooks Figure 4-3 Installation of Tivoli Storage Resource Manager Server 4.3.1 Lab environment In our environment we used the following software setup: Windows 2000 Server with Service Pack IBM DB2 7.2 with Fix Pack 8 IBM Tivoli Storage Resource Manager Version 1.2 4.3.2 Database creation for repository Before installing the Tivoli Storage Resource Manager Server, you need to create the database for the data collected by the Server. You can either use a local database residing on the same system as the Server itself, or a remote database residing on a different system. These databases can be used remotely at the time of writing: Oracle Microsoft SQL-Server Sybase IBM DB2 UDB A DB2 database can be created using DB2 Control Center or by using command line tools. We used the DB2 Control Center wizard to create the database, and accepted defaults for the configuration settings. In our case we created a database called ITSRMDB for this environment. For the database which will be used as the repository, you also need to provide the JDBC driver. Tivoli Storage Resource Manager uses the JDBC protocol to access the database. 70 IBM Tivoli Storage Resource Manager: A Practical Introduction 4.3.3 Installation of the Server code To install the Server code in the Windows environment, run SETUP.EXE from the Windows directory on the Tivoli Storage Resource Manager CD. Figure 4-4 shows the initial screen. Figure 4-4 Initial installation screen As this is a new install, the only possible selection is to install the IBM Tivoli SRM code. Click Next to continue and the license agreement displays. Accept the license agreement and click Next to continue. On the next window click Yes to confirm. You then select the components to install, as shown in Figure 4-5. Figure 4-5 Selecting product to install As we are installing the Server code, we selected The Tivoli SRM Server and an Agent on this machine. Note: Whenever you install the Server code, the Agent code is also installed. Chapter 4. IBM Tivoli Storage Resource Manager installation 71 After clicking Next, the license key screen in Figure 4-6 appears. Figure 4-6 Enter licenses Enter in the supplied licenses, depending on what you have bought for your organization. Click Next to continue, and the database selection screen in Figure 4-7 displays. Figure 4-7 Selecting the database engine for the repository Select the database server which is available. In our setup, we used DB2 UDB as the database repository. After selecting the database repository click Next; you will see the service account screen shown in Figure 4-8. Figure 4-8 Creating account for running the service 72 IBM Tivoli Storage Resource Manager: A Practical Introduction The installation program will create a system user ID which will be used for running the Tivoli Storage Resource Manager Server service. Click OK to display the database selection screen, as in Figure 4-9. Figure 4-9 Selecting the database for the repository The installation program will query the DB2 installation for existing databases and display them. If the database you created for Tivoli Storage Resource Manager repository is listed, you can select it by clicking on the name. Otherwise, you can type in the name under Database Alias field. You also need to provide the database user name and password under Connection information. Because the manager is accessing the database using JDBC you need to specify the path to the JDBC driver in the JDBC driver. Tip: JDBC is usually provided from the database vendor. The JDBC driver for IBM DB2 is installed automatically with the database product itself. Note: The setup for the other database engines will be slightly different, but you will still be asked for the same type of information - that is, database name, user ID, and JDBC driver. After providing all the necessary information, click Next and you will see the Repository Creation Parameters screen shown in Figure 4-10. Chapter 4. IBM Tivoli Storage Resource Manager installation 73 Figure 4-10 Repository parameters On this screen you can specify the database schema and tablespace name. Tip: We recommend that you accept the defaults for these two fields. Alternatively, you can also use the naming convention that is used in your enterprise. If you are using DB2 as the repository, you can also choose how you will manage the database space: System Managed (SMS) This option indicates that the space is managed by the OS. In this case you specify the Container Directory, which is then managed by the system, and can grow as large as the free space on the filesystem. Tip: If you do not have in house database skills the System Managed approach is recommended. Database managed (DMS) This option means that the space is managed by the database. In this case you need to specify the Container Directory, Container File and Size fields. Container file specifies a filename for the repository, and Size is the predefined space for that file. You can later change this by using the ALTER TABLESPACE command. Tip: We recommended that you use meaningful names for Container Directory and Container Filer at installation. This can help you in case you need to find the container file. The setup for other types of databases is similar. An example using Oracle is in step 9., “Install the Tivoli Storage Resource Manager Server on the primary server using the same parameters as on the standby server.’’ on page 145. An example using MS SQL-Server is in 4.3.4, “Microsoft SQL-Server as repository’’ on page 78. 74 IBM Tivoli Storage Resource Manager: A Practical Introduction After supplying all the necessary parameters click Next and you will see the parameter screen similar to Figure 4-11. Figure 4-11 Server setup In this screen you need to provide the following information: Server name: The installation program will already display the host name of the computer that you are installing on. Server port: The port on which the Server listens for the Agent requests. Agent port: The port on which the Agent listens for the requests. Note: The ports 2078 and 2077 are registered with IANA (Internet Assigned Numbers Authority), so we recommend you use them, unless they are already in use in your network, you can change them. If you change them on the Manager installation, you also need to change them on each host Agent installation. The Agent port defined here is used for the local Agent which is installed along with the Server installation. The port which is defined is registered in the database, and because of that, each individual Agent could possibly use a different port (however, this is not recommended). Agent should perform a SCAN when first brought up: With this option on, the host Agent will perform an initial scan after installation. Agent may run scripts sent by server (in addition to local scripts): If this option is selected, host Agents will accept scripts sent from the Manager, otherwise, they will only run locally stored scripts. You can get more information about scripts in 3.2.2, “Scripts’’ on page 51. Administrators Group: This is the name of the administrators users group. The default value is Administrators, and can be changed if required for your organization. The security roles are described in 4.6.1, “Security’’ on page 98. After supplying all the needed information, click Next. You will see the NAS Discovery screen shown in Figure 4-12. Chapter 4. IBM Tivoli Storage Resource Manager installation 75 Figure 4-12 NAS settings In this screen you define parameters which are used for NAS discovery: User Name - User name to login to Windows NAS devices Password - Password for Windows NAS devices Tip: If you use different user names on different NAS devices you can later specify a different user name and password combination for each device. SNMP Communities - The manager uses SNMP communities to query and identify NAS filers (for example Network Appliance NAS devices). If you do not specify the community name, the public community is used. The NAS discovery process is explained in “NAS discovery” on page 56. After specifying the required parameters click Next - you will see the Space Requirements screen as in Figure 4-13. 76 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-13 Space requirements In this screen you can choose the installation path for the Server code. Here you can also see the required space for the installation, which can help you to select a directory location. If the destination directory does not exist, you will be prompted for creation of it, after you click Next. Finally, you will see the installation summary screen in Figure 4-14. Figure 4-14 Before copying files At this stage you can still decide to go back and change settings if necessary. Click Next to start copying files. If you installed the Tivoli Storage Resource Manager repository in a DB2 UDB database, the Create Service Account window is shown in Figure 4-15. The Tivoli Storage Resource Manager creates a new Service account and the Agent will use it when running probes and scans against DB2 databases on the current machine. Chapter 4. IBM Tivoli Storage Resource Manager installation 77 Figure 4-15 User create for UDB account Click Yes to create the Service account and to continue with copying the files. After the copying is complete, you should see the messages shown in Figure 4-16. Figure 4-16 Installation completed In this case, after installation a Probe was executed. This happened because we enabled the installation option Agent should perform a SCAN when first brought up. 4.3.4 Microsoft SQL-Server as repository This section shows installing using MS SQL-Server as the repository. If you select MS SQL-Server as the database repository during the installation process, you will see a screen like Figure 4-17. 78 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-17 Selecting Microsoft SQL Server Select MS SQL Server and click Next to continue. Figure 4-18 displays. Figure 4-18 Microsoft SQL-Server parameters Type in the required parameters: Host - The system with Microsoft SQL-Server installed Port - The port number. The default number 1433 is selected by default SQL Server DBA user - The database administrator user ID Password - The password for database administrator user ID JDBC driver - The path to the JDBC driver. You can find information how to obtain Microsoft SQL driver in “Configuration: General settings” on page 108. Click Next and the Repository Creation Parameters screen displays (Figure 4-19). Chapter 4. IBM Tivoli Storage Resource Manager installation 79 Figure 4-19 Repository parameters Here you specify the name and location of the database components. Click Next and the installation process continues as in Figure 4-11 on page 75. 4.3.5 Installing Cloudscape as a test database This section shows installing using the Cloudscape database as a repository. The Cloudscape database is recommended for test and demonstration purposes only (not production) as it is limited on performance. The Cloudscape product provides a complete Java-based database. If you select Cloudscape as the database repository when installing, you will see the screen like Figure 4-20. Figure 4-20 Cloudscape selection to install Click Next and the installation process will continue. The pop-up warning in Figure 4-21 advises you not to use the database in a production environment. 80 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-21 Cloudscape warning for production use. Click OK and the installation process continues as from Figure 4-11 on page 75. 4.3.6 Configuration for Web access The client GUI for management and data collection is automatically installed with the Server code. With this GUI, you can perform all the Storage Resource Management operations from the Server system. You can also access the Server system over the network and perform administration tasks from a remote workstation. The remote administration console is a Java based applet, which can be run locally or remotely by downloading it from the Web server. Remote administration can be done in two ways: Installing the administration GUI on remote workstations as per the instructions in 4.3.7, “Installation of the GUI code’’ on page 87 Setting up the Web access for remote workstations In our example we set up remote Web access using Microsoft IIS (Internet Information Server) which is built into Windows 2000. We did the following: 1. Select Start -> Administrative Tools -> Internet Information Services. 2. Right-click Default Web Site and select New -> Virtual Directory (Figure 4-22). Chapter 4. IBM Tivoli Storage Resource Manager installation 81 Figure 4-22 Creating virtual Web directory 3. The Virtual Directory Creation Wizard displays. Click Next to display the Virtual Directory Alias screen (Figure 4-23). Figure 4-23 Defining the alias name 4. Enter an alias name which will be used as the access point for Web access (tsrm in our example). Next, the Web Site Content Directory screen displays (Figure 4-24). 82 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-24 Defining the directory for Web access files 5. Specify the directory where the Web access files for Tivoli Storage Resource Manager are located. They will be in the GUI directory under the installation directory, C:\Program Files\Tivoli\TSRM\gui in our example. Click Next and the Access Permissions screen (shown in Figure 4-25) displays. Figure 4-25 Access permissions for virtual directory 6. In this dialog you can set up access permissions for the files in the virtual Web directory. Tip: It is recommended that you use default values. Click Next and Finish to complete the setup. Chapter 4. IBM Tivoli Storage Resource Manager installation 83 Now you can run the administrative interface remotely by pointing your Web browser to the URL http://<hostname>/tsrm/TivoliSRM.html, as shown in Figure 4-26. Figure 4-26 IBM Tivoli Storage Resource Manager main Web window The applet is downloaded to your system and you need to grant the access (Figure 4-27). Figure 4-27 Granting permission for the applet After granting the session, you will see the administrator GUI main screen as in Figure 4-28. 84 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-28 Main administration GUI screen Setting the default Web page You can also set the default Web page for the directory where the Web files for Tivoli Storage Resource Manager are located. This means you need only to type in the directory name as the http address to access the IBM Tivoli Storage Resource Manager over a Web connection, in our example http://lochness/tsrm/ To do this with IIS, from the IIS administrative panel, right-click in the definition of the previously created Web directory as shown in Figure 4-29. Chapter 4. IBM Tivoli Storage Resource Manager installation 85 Figure 4-29 Opening properties for the tsrm Web directory The Properties page displays, shown in Figure 4-30. Figure 4-30 Tsrm properties 86 IBM Tivoli Storage Resource Manager: A Practical Introduction Click the Documents tab as shown in Figure 4-31. Figure 4-31 Document properties Click Add and add the TivoliSRM.html document. Click OK to save the changes. Now you can access the Tivoli Storage Resource Manager Server over Web simply by typing in the address of the Web directory: http://lochness/tsrm/ Congratulations! You have just installed, configured, and started Tivoli Storage Resource Manager. 4.3.7 Installation of the GUI code The GUI code is the same as that used for browser remote access as described in 4.3.6, “Configuration for Web access’’ on page 81. For a Windows installation, run SETUP.EXE from the Windows directory on the install CD. The main installation screen displays (Figure 4-4 on page 71). Click Next to continue. Accept the license terms, click Next to continue, and you will see the installation selection screen in Figure 4-32. Chapter 4. IBM Tivoli Storage Resource Manager installation 87 Figure 4-32 Selecting GUI to install As we are installing the GUI, select The GUI for reporting and click Next. The Parameters screen displays, as shown in Figure 4-33. Figure 4-33 Server name Enter the Server hostname or IP address and the Server port (as shown in Figure 4-11 on page 75). Click Next - you will see the Space Requirements screen, as shown in Figure 4-34. 88 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-34 Size and directory Here you can see the size of installed code and selected installation directory. We recommend you keep the default settings. Click Next to complete the installation. 4.3.8 Installing the Server code on UNIX To install the Server code on UNIX, run ./setup.sh -g from the appropriate directory on the CD. For example, for Linux, run the script from the Linux directory. The installation GUI is the same as in Windows, described in 4.3.3, “Installation of the Server code’’ on page 71. 4.4 Installing the Agent code This section covers installing the Tivoli Storage Resource Manager Agents. Windows Agent To install the Agent code for Windows, run SETUP.EXE from the Windows directory on the Tivoli Storage Resource Manager CD. The initial screen displays, as in Figure 4-4 on page 71. Click Next and accept the license. You will see the installation selection screen shown in Figure 4-35. Chapter 4. IBM Tivoli Storage Resource Manager installation 89 Figure 4-35 Agent install selection Select An Agent on this machine and click Next. You will see the Parameters screen, as shown in Figure 4-36. Figure 4-36 Agent parameters setup The Server Port should match the entry from the Server installation - 2078 in our case, as shown in Figure 4-11 on page 75, or the Agent will not be able to connect to the Server. The Server Name should be the hostname (or IP address) of the Tivoli Storage Resource Manager Server. The Agent Port can be any free port on the Agent system. You should use the same port for all Agents as this helps simplify management. If you do not want to automatically perform a Scan after the Agent is installed, deselect the option Agent should perform a SCAN when first brought up (gathers default statistics). If for some reason you do not want to allow Agents to accept scripts from the server, deselect Agent may run scripts sent by server (in addition to local scripts). 90 IBM Tivoli Storage Resource Manager: A Practical Introduction Tip: You can change how the Agent will handle scripts later by editing the config file and restarting the Agent. After supplying all the parameters click Next. The installation program will check the connection to the Server. The Space Requirements screen will display, as shown in Figure 4-37. Figure 4-37 Space requirements Here you can see the required space for installation and specify the installation directory. If the directory does not exists you need to confirm its creation. Click Next, then confirm the settings on the next screen. Select Next to start copying files. After the installation is complete, the Agent will automatically start. If you are installing on an Agent with a NetWare client, you will be prompted to create a local account for the Agent (as shown in Figure 4-38) before the Agent is started after installation. Figure 4-38 Novell logon ID creation This account can only be created if you are logged into the Novell NDS with sufficient privilege. UNIX Agent Install the UNIX Agent by running ./setup.sh from the appropriate directory. Our example is a Linux Agent. If you execute the script without parameters, the help is displayed as shown in Example 4-1. Chapter 4. IBM Tivoli Storage Resource Manager installation 91 Example 4-1 Running UNIX Agent installation script Linux-1:/tmp/SRM/linux # ./setup.sh To run the GUI install: setup.sh -g To run a quick (agent-only) install: setup.sh -s <server-host> [-d <dest-dir>] [-p <server-port>] [-q <agent-port>] [-x] [-n] [-l [o][r]] <dest-dir> defaults to /usr/Tivoli/TSRM or /opt/Tivoli/TSRM <server-port> defaults to 2078 <agent-port> defaults to 2077 -x prevents agent from running scripts sent from server -n prevents agent from running initial scan -l identifies the products that will be licensed on this agent Valid product codes are: o - Tivoli SRM r - Tivoli SRM for Databases Linux-1:/tmp/SRM/linux # ./setup.sh -s bonnie -d /opt/tivoli/TSRM -p 2078 -q 2077 -l o There are two ways to install a UNIX Agent: Graphical - using ./setup.sh -g The installation procedure is the same as for the Windows Agent, shown in “Windows Agent” on page 89. Text (quick) mode - using ./setup.sh and specifying parameters on the command line To install the Agent using the quick method, you need to supply the following parameters: -s servername - The Server name or IP address -d directory - The installation directory. The usual installation places are in /opt and /usr. Specify the full path, for example /opt/tivoli/ITSRM. -p serverport - The Server port -q agentport - The Agent port Note: The d, p, and q parameters can be omitted, if so, these defaults will be used: d - /opt/tivoli/TSRM or /usr/tivoli/TSRM, depending on the platform p - 2078 q - 2077 -l products - The products which you want to be active on this Agent: – – – – o - Base component r - Oracle Agent m - Microsoft SQL-Server Agent s - Sybase Agent In our example we executed the following command: ./setup.sh -s bonnie -d /opt/tivoli/TSRM -p 2078 -q 2077 -l During installation you will see messages similar to those shown in Example 4-2. Example 4-2 Installation of the UNIX Agent Linux-1:/tmp/SRM/linux # 06-09 10:44:04 INS0000I: 06-09 10:44:05 INS0058I: 06-09 10:44:05 INS0105I: 92 ./setup.sh -s bonnie -d /opt/tivoli/TSRM -p 2078 -q 2077 -l o IBM Tivoli SRM Install Port 2077 for the Agent is available Transmitting agent licensing data to server... IBM Tivoli Storage Resource Manager: A Practical Introduction 06-09 10:44:05 INS1020I: 06-09 10:44:05 INS1020I: 06-09 10:44:05 INS1020I: 06-09 10:44:05 INS1020I: 06-09 10:44:05 INS1020I: 06-09 10:44:05 INS2092I: 06-09 10:44:05 INS2092I: 06-09 10:44:05 INS1020I: 06-09 10:44:07 INS1020I: 06-09 10:44:07 INS1020I: 06-09 10:44:07 INS1020I: 06-09 10:44:07 INS2089I: 06-09 10:44:11 INS1070I: 06-09 10:44:11 INS1077I: 06-09 10:44:16 INS1075I: 06-09 10:44:17 INS1078I: 06-09 10:44:25 INS1079I: Linux-1:/tmp/SRM/linux # Creating directory /opt/tivoli/TSRM Creating directory /etc/Tivoli/TSRM Creating directory /etc/Tivoli/TSRM/lock Creating directory /opt/tivoli/TSRM/scripts Creating directory /opt/tivoli/TSRM/config/ /opt/tivoli/TSRM/config/agent.config config file created. /opt/tivoli/TSRM/config/../PROBE_ME config file created. Creating directory /opt/tivoli/TSRM/java Creating directory /opt/tivoli/TSRM/log Creating directory /opt/tivoli/TSRM/agent Creating directory /opt/tivoli/TSRM/install IBM Tivoli SRM Agent startup scripts created IBM Tivoli SRM Agent started Waiting for agent... Agent registered. Waiting for Probe to complete... Computer probed. For a Linux Agent, the installation process will create an auto-start entry in /etc/init.d and link to this entry in runlevel 3 and 5. Other UNIX variants will create a similar entry in the appropriate file to enable automatic start of the Agent on system start. If for some reason, the Agent no longer appears in the Agent list, or it is marked as Unreachable, and the network connection is working, you can force the registration process by creating an empty file called PROBE_ME in the Agent installation directory. For example, on Windows use C:\Program Files\Tivoli\TSRM\PROBE_ME. If the Agent showed as Unreachable, you should first delete it from the Agent list. Note: If you delete or reregister an Agent you will lose all historical data for this Agent. 4.5 Applying maintenance to Tivoli Storage Resource Manager In the current release of the product, you apply maintenance by running the installation program. Follow these steps to apply maintenance: 1. On the welcome screen (Figure 4-39) select Apply maintenance to IBM Tivoli SRM. Chapter 4. IBM Tivoli Storage Resource Manager installation 93 Figure 4-39 Selecting to apply the maintenance 2. Click Next, you will see the maintenance selection screen similar to Figure 4-40. Figure 4-40 Product maintenance selection 3. In this case, we are upgrading the Server. Select The IBM Tivoli SRM Server and all of its Agents and click Next. If the Server being upgraded uses IBM DB2 as the repository database, you will see the screen shown in Figure 4-41; otherwise, you will go directly to the confirmation screen in the next step. 94 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-41 DB2 admin user ID and password 4. Here you have to enter the DB2 administrator user ID and password. Click Next and you will see the confirmation screen. Click Next to start the maintenance. 5. After all the upgraded files are copied, the summary screen (Figure 4-42) displays. Figure 4-42 Maintenance finished Check for errors and click Done to finish the maintenance process. After performing maintenance on the Server system, the Server will automatically upgrade all the Agents. If for any reason you need to force an upgrade of the Agents with the same version currently available, you need to create an empty file with the name UPGRADE_AGENTS in the Server installation directory. For example, in Windows C:\Program Files\Tivoli\TRSM This will force an upgrade. Chapter 4. IBM Tivoli Storage Resource Manager installation 95 Maintenance can also be performed separately for the Agent and GUI installation by selecting the other options on Figure 4-40. 4.5.1 Planned upgrade installation for Agents IBM Tivoli Storage Resource Manager Version 1.2 can now update agents connected to the Server. You can define a job for these actions, as shown in Figure 4-43. We selected the Agent on BANDA to upgrade by highlighting it and clicking the circled arrow button. Figure 4-43 Select Agent to upgrade You can also choose a time to perform the upgrade (When to Upgrade tab in Figure 4-44). We chose to perform the upgrade immediately. 96 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-44 Schedule agent upgrade Under Options, (Figure 4-45) you can force a reinstall if the Agent is already on this level. Figure 4-45 Force upgrade on Agent Chapter 4. IBM Tivoli Storage Resource Manager installation 97 On the Alert tab, you can define actions in the event of an error. We selected to send an event to the TEC console by checking TEC Event. Figure 4-46 Alert selection for failed Agent upgrade. After saving the job, the scheduler will run it at the selected time (immediately in this case). Each Agent will be stopped, upgraded, and restarted. 4.6 Basic administrative tasks This section describes some basic administrative tasks for Tivoli Storage Resource Manager. 4.6.1 Security To log in to the Tivoli Storage Resource Manager Server, you can use any local user ID on the Server system. During installation you can specify the administration group (shown in Figure 4-11 on page 75). The members of this group will be able to perform all tasks using the GUI interface. We recommend creating a special group for Tivoli Storage Resource Manager administrators. The group name can be changed after installation by editing the server.config in the config directory and restarting the Server services. An example of the file is shown in Example 4-3. Example 4-3 Tivoli Storage Resource Manager server.config file [controller] name="palau" port=2078 maxConnections=500 routerThreads=1 serviceThreads=2 98 IBM Tivoli Storage Resource Manager: A Practical Introduction agentErrorLimit=3 adminGroup="Administrators" commEncrypted=0 [logging] logsKept=5 messagesPerLog=100000 [repository] driver=oracle.jdbc.driver.OracleDriver url="jdbc:oracle:thin:@gallium:1521:ITSRMREM" user=TivoliSRM connectionPool=10 [service] name=TStorm.server.svp.GuiSvp [service] name=TStorm.server.svp.AgentSvp [service] name=scheduler.Scheduler The line you need to change is adminGroup="Administrators" All other local users on the system can log in to the Server, but only with read-only access to administrative tasks. Windows domain users can also access the Server, provided they are members of local groups. 4.6.2 Administration When you start the Tivoli Storage Resource Manager GUI either locally or using the Web browser, you will see the logon window as shown in Figure 4-47. Figure 4-47 Server login Enter the user ID and password and click OK. You will see the main screen (Figure 4-48). Chapter 4. IBM Tivoli Storage Resource Manager installation 99 Figure 4-48 Main panel As shown on the left side, the interface uses a tree-oriented navigation. Under the IBM Tivoli SRM entry are four main sections: Administrative Services - Here you can administer the Tivoli Storage Resource Manager Server. We will cover these operations in this section. IBM Tivoli SRM - Here you can manage and report on Agent systems. More information on reporting is in Chapter 6, “Reporting” on page 247. IBM Tivoli SRM for Databases - Here you can manage and report on database applications on Agent systems. More information on database reporting is in Chapter 6, “Reporting” on page 247. IBM Tivoli SRM for Chargeback- Here you perform charge back functions. More information on charge back is given Chapter 6, “Reporting” on page 247. Tip: You can expand or collapse a tree or sub tree by clicking on the circle on the left side of the tree name as highlighted in red in Figure 4-48. In the following sections we will explain the functions found under Administrative Services. More detailed information is in the manual IBM Tivoli Storage Resource Manager Configuration and Getting Started Guide, SC32-9067. The sub trees available in the Administrative Services are: Services, to view and control various services that run on the Server Agents, to view and control various Agent components on the Managed Systems 100 IBM Tivoli Storage Resource Manager: A Practical Introduction Configuration, to customize operational characteristics of IBM Tivoli Storage Resource Manager. The settings are stored in the repository database and control operations for all users. Note: The options defined in Configuration under Administrative Services are different from the User Preferences accessible from the main menu (Preferences -> Edit General...). User Preferences are stored for each user separately and apply only to the logged in user, whereas the options under Configuration apply globally to all users. 4.6.3 Administration: Navigation From anywhere in the navigation tree, you can access the menu entries and tool bar icons. Menus The menus are at the top of the screen, as in Figure 4-49. Figure 4-49 Menus in GUI The following menus and submenus are available: File – – – – – – Save - Save the changes to the current object. Save as - Save current object under different name. Export data - Export data to other formats. Close - Close the current window. Print - Print current data in the content pane; you can also save as a PDF or HTML file. Print Tree - Print the expanded contents of the functions tree or save as a PDF or HTML file. – Refresh Alerts - Refresh the Alerts from repository. – Exit - End the session. View – Tree - Remove and add the tree display to the screen. – Current Page in Tree - Display the highlighted node on the tree that was responsible for displaying the data on the content pane. Connection – New Connection - Create a new connection to the Tivoli Storage Resource Manager Server. Preferences – Look and Feel - change between Windows, CDE/Motif or Metal interface. – Edit General • Panel Retention - Number of windows which can be accessed in the history • On login - If and how to show active Alerts when you log in • Initial Reporting Tab to Display - What tab will be displayed when you first generate and view a report. • Advanced Options - The unit of measurement used in reports. Chapter 4. IBM Tivoli Storage Resource Manager installation 101 Window – Close all Windows without changes - Close windows having no updates. – Show dashboard - Shown the dashboard – Show Window List - Shows window list, each name has the icon indicating: • Green circle - No changes were made. • Red circle - Changes were made, but not saved yet. • Green arrow - Current window displayed, no changes made. • Red arrow - Current windows displayed, changes were made, but not saved. Help – Help Directory - Online help system – Help for Displayed Panel - Help for the current window – About - About the product Tool Bar The Tivoli Storage Resource Manager Tool Bar is shown in Figure 4-50. Back Forward Save Print Cancel Edit Session Stop Current Server Request Figure 4-50 Tool Bar functions The available functions are: Back - Go to previous open window. Forward - Go to next open window. Save - Save current edited object. Print - Print the currently displayed data. Cancel Edit Session - Cancel the changes in the current window. Stop Current Server Request - This button becomes red when the Server is processing a request, and allows the action to be cancelled. Tip: Do not forget to save changes made to an object. The interface will warn you if you try to close a window with unsaved data. 4.6.4 Administrative Services: Services Expanding the Services tree gives the following components: Server, information about the IBM Tivoli Storage Resource Manager Server Scheduler, information about the Scheduler component TivoliSRM-Agent, about the Agent component TivoliSRM-GUI, information about the GUI component Each component indicates its status by color: 102 IBM Tivoli Storage Resource Manager: A Practical Introduction Green - Active session that is operating normally. Red - Session that is currently not active. If you right-click a service component you will get the menu shown in Figure 4-51. Figure 4-51 Right-click menu on Services tree components Except for Broadcast, which is only available on the Server node, all other options are available on all nodes: View Log - View log of the component Broadcast - Inform Agents on Server location Shutdown - Shut down the component: – Normal - Clean shutdown, allowing all processing to finish – Immediate - Quick shutdown – Abort - Shut down and stop whatever is in process 4.6.5 Administrative Services: Agents Expanding Agents under Administrative Services, shows all the registered Agents. Three Agents are shown in Figure 4-48 on page 100: Each Agent indicates its status by color: Green - Active session that is operating normally. Red - Session that is currently not active. Yellow - Agent is unreachable and not responding to the Server. Light Gray - Agent is active but needs to be upgraded. The Server will not receive any information until the Agent is upgraded. When you click on a particular Agent, you will see the screen similar to Figure 4-52. Chapter 4. IBM Tivoli Storage Resource Manager installation 103 Figure 4-52 Agent General view This shows general information about the Agent (status, port, address, last update, time zone, connection errors).The Details screen is shown in Figure 4-53. 104 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-53 Agent Details view Here you can see details about the Agent (name of the Agent and Host, date and time when it was started, uptime, disk space allocated to virtual memory size - VM, manufacturer and OS of the Agent system, number of jobs scheduled to run on the Agent). The Jobs screen is shown in Figure 4-54. Chapter 4. IBM Tivoli Storage Resource Manager installation 105 Figure 4-54 Agent Jobs view This views shows information about any jobs currently running on the Agent. The example shows that the Scan job is running. If you right-click the Agent you will get the menu shown in Figure 4-55. Figure 4-55 Right-click menu on Agent You can perform the following actions: View Log - View the log of the Agent as shown in Figure 4-56. 106 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-56 Agent log Read Config - Agent will re-read the config file. Check - Check the Agent. If the Agent needs to be upgraded, clicking this button will automatically install the required upgrades. Shutdown - Shut down the component: – Normal - Clean shutdown, letting all processing to finish – Immediate - Quick shutdown – Abort - Shut down and stop whatever is in process Disable - Disable the Agent. The Agent will still listen for connections, but will not execute any tasks except re-enabling the Agent. Delete - Erase the Agent from the Server repository and stop the Agent service. You can re-enable the Agent by re-starting the Agent service. The Agent will appear as a new install. Attention: By deleting the Agent you will lose all (including historical) data about it from the repository. 4.6.6 Administrative Services: Configuration The configuration tree provides control of the operational characteristics of Tivoli Storage Resource Manager. All these settings are stored in the database repository and are applicable for all users. After expanding the tree as shown in Figure 4-48 on page 100, you will see these sub trees: General - Define general configuration settings for the Server. IBM Tivoli SRM - Customize the settings for IBM Tivoli Storage Resource Manager main component. Chapter 4. IBM Tivoli Storage Resource Manager installation 107 IBM Tivoli SRM for Databases - Customize the settings for Tivoli Storage Resource Manager for Databases. Configuration: General settings Under general settings you can do the following: License Keys This option is for administering Tivoli Storage Resource Manager license keys. Clicking License Keys shows a screen like Figure 4-57. In Tivoli Storage Resource Manager V1.2, the license model has been simplified to only three license types. Figure 4-57 License Keys editor Licensing requirements are explained in the manual IBM Tivoli Storage Resource Manager Configuration and Getting Started Guide, SC32-9067. Here we will focus on the operations around the licenses. A new license can be added by clicking Add, and entering the appropriate license key as shown in Figure 4-58. Figure 4-58 Adding new license key To change a license, select the product name and click Edit; Figure 4-58 displays for you to enter the new license. 108 IBM Tivoli Storage Resource Manager: A Practical Introduction Licenses can be deleted by selecting the product name and clicking Delete. Click the icon on the left side of a particular product name (as circled in Figure 4-57) to perform other specific licensing actions: IBM Tivoli SRM The licensing screen for Tivoli Storage Resource Manager is shown in Figure 4-59. Figure 4-59 Licenses for IBM Tivoli SRM You can see the systems with installed Agents, which are licensed to use the product. To select an Agent, click in the square in the Licensed column as shown in Figure 4-59. If you will scan Novell NetWare servers, they have to be licensed as shown in Figure 4-60. Chapter 4. IBM Tivoli Storage Resource Manager installation 109 Figure 4-60 Licensing Novell NetWare Agent To license a discovered NAS system, select it as shown in Figure 4-61. Figure 4-61 Licenses for Tivoli Storage Resource Manager for NAS All the NAS devices are displayed, and you can select those which are to be licensed. The Filer Logins tab is shown in Figure 4-62. 110 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-62 NAS devices logins Here you can update the default login and password for NAS devices, which were defined during installation (Figure 4-12 on page 76). Also, you can define a specific login for each NAS device by selecting the row or rows, and clicking Set login per row or Set login for all selected rows. The window for entering the login and password looks similar to Figure 4-63. Figure 4-63 Login definition Here you enter the specific login ID and password for the NAS appliance. IBM Tivoli SRM for Databases The licensing process for all database components (MS SQL-Server, Oracle, Sybase, UDB) is similar. Our example shows the setup for MS SQL-Server. After opening you will see a screen similar to Figure 4-64. Chapter 4. IBM Tivoli Storage Resource Manager installation 111 Figure 4-64 Licenses for Tivoli Storage Resource Manager for Databases From the list of Agents, select those with SQL-Server databases installed, which you want to monitor, as shown for CLYDE in Figure 4-64. To successfully scan the database, you have to provide a login name and password for each instance. This can be done in the RDBMS Logins tab as in Figure 4-65. 112 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-65 RDBMS Logins You can define a new RDBMS login by clicking Add New as shown in Figure 4-66. Figure 4-66 Defining RDBMS Login Enter the necessary data: – – – – – Instance - The name of the instance User - Login ID for the instance Password - Password for the instance Port - Port where database is listening JDBC Driver - Path to the JDBC driver for the database Chapter 4. IBM Tivoli Storage Resource Manager installation 113 Tip: A free JDBC driver for Microsoft SQL-Server can be downloaded from: http://msdn.microsoft.com/library/default.asp?url=/downloads/list/sqlserver.asp Commercial drivers are also available for SQL-Server. An example is from Altanav Inc., which is available at: http://www.atinav.com/products/aveconnect/MSSQLserver/aveconnect2.htm A free copy of JDBC for Oracle is provided with the installation package, or it can be downloaded from: http://otn.oracle.com/software/tech/java/sqlj_jdbc/content.html A free copy of JDBC for Sybase can be downloaded from: http://www.sybase.com/products/middleware/jconnectforjdbc Alert Disposition This option defines how the Alerts are generated when a corresponding event is discovered. This screen is shown in Figure 4-67. Figure 4-67 Alert Disposition screen You can specify these parameters: SNMP – Community - The name of the SNMP community for sending traps – Host - The system (event manager) which will receive the traps – Port - The port on which traps will be sent (the standard port is 162) 114 IBM Tivoli Storage Resource Manager: A Practical Introduction TEC – TEC Server for sending traps to. The system (TEC) which will receive the traps – TEC Port, which traps will be sent (the standard port is 5529) E-mail – – – – – Mail Server - The mail server which will be used for sending the e-mail. Mail Port - The port used for sending the mail to the mail server. Default Domain - Default domain to be used for sending the e-mail. Return To - The return address for undeliverable e-mail. Reply To - The address to use when will replying to an Alert-triggered e-mail. Alert Log Disposition – Delete Alert Log Records older than how long the Alert Log files will be kept. Log-File Retention This option defines how long to keep the log files, as shown in Figure 4-68. Figure 4-68 Log File Retention The possible parameters are: Keep at most n runs of each schedule - The numbers of runs you want to keep for each scheduled job. Keep at most n day’s worth of log-files, regardless of schedule - The number of days you want to keep the log files. Every log file older that this will be deleted. Quota Email Address Rules - Here you specify the rules for generating the e-mail address of Quota violators based on login name, first name, and/or last name as they are registered within the OS. The Quota Email Address Rules screen is shown in Figure 4-69. Chapter 4. IBM Tivoli Storage Resource Manager installation 115 Figure 4-69 Filters for Quota Email Depending on the OS, Tivoli Storage Resource Manager obtains the user names from: Windows 2000 - Full name field, from LDAP Windows NT - Full name field, from domain-level security database NetWare - Surname and Given name fields, from LDAP UNIX - User description from the password file The name is stored in the repository database and then specific algorithms are used to extract the names for building e-mail address rules. In the example shown in Figure 4-69, the last name plus the first character of the first name will be used to create the name. When e-mail is sent the default domain defined in Alert Disposition (see “Alert Disposition” on page 114) will be appended. More explanation on setting up the rules is in the manual IBM Tivoli Storage Resource Manager Configuration and Getting Started Guide, SC32-9067. Scan/Probe Agent Administration Here you assign the Agents which will perform scanning and probing of NAS filesystems and the volumes and filesystems of an NDS tree. The Scan/Probe Agent Administration screen is shown in Figure 4-70. 116 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-70 Agent selection for NAS and NDS The following information is displayed: Licensed NetWare servers NetWare volumes discovered by discovery jobs Discovered NAS filesystems This information is gathered during the discovery process on the Agents accessing NAS devices and Novell NetWare servers. The Agent systems with access to the NAS or NetWare volumes and filesystems will be displayed here along with information on which volume or filesystem(s) they are using. Important: If the discovery jobs are not run against NDS trees and NAS devices, the volumes and filesystems will not be displayed. To change the Agent that will scan the volume and filesystem, select the desired row(s) and click Set agent per row or Set agents for all selected rows. You will see the window shown in Figure 4-71 for NAS Agents, or the window shown in Figure 4-72 for the Novell NetWare Agents. Chapter 4. IBM Tivoli Storage Resource Manager installation 117 Figure 4-71 Defining the NAS Agent for Scan/Probe Figure 4-72 Defining the Novell NetWare Agent for Scan/Probe In this window you specify which Agent will scan the selected volume or filesystem. History Aggregator This option specifies when to run the History Aggregation job as shown in Figure 4-73. This job runs within the Tivoli Storage Resource Manager Server and aggregates information in the repository for reporting purposes. 118 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-73 History Aggregator definitions Two options can be set: When to Run - The time and date to run the job Alert - Actions to perform if the job fails. More information on Alerts is in 5.2, “OS Alerts’’ on page 189. Configuration: IBM Tivoli SRM Under IBM Tivoli SRM settings you can do the following: NetWare Tree Logins Assign the login ID and password for each Novell Directory Services (NDS) tree discovered by Tivoli Storage Resource Manager Agents. The screen is shown in Figure 4-74. Figure 4-74 NetWare Tree Login Administration Select the desired Tree Name and click Edit, as shown in Figure 4-75. Chapter 4. IBM Tivoli Storage Resource Manager installation 119 Figure 4-75 Novell Tree Login Specify the login ID and the password for the NDS tree. Tip: The login ID must be specified with the full context name. Tivoli Storage Resource Manager uses this login ID to access the NDS trees and gather information about the NetWare servers and volumes in those trees. Important: The assigned login ID must have permission to enumerate the volumes within the NetWare servers on that tree. Resource History Retention This panel (Figure 4-76) defines the period that collected historical data will be kept. Figure 4-76 History retention: Tivoli Storage Resource Manager 120 IBM Tivoli Storage Resource Manager: A Practical Introduction The retention period is specified individually for the following data types: Directories Filesystems Pings Computer uptime Disks Selecting No History turns off history keeping. Removed Resource Retention This panel (Figure 4-77) specifies how long to keep information that is related to entities that have been removed or deleted from an Agent. Figure 4-77 Removed Resource Retention: Tivoli Storage Resource Manager You can define how long to retain information for these removed entities: Directories Filesystems Disks Configuration: IBM Tivoli SRM for Databases Under the IBM Tivoli SRM for Databases settings, you can do the following: Resource History Retention This panel (Figure 4-78) defines the period for which collected historical data on databases will be kept. Chapter 4. IBM Tivoli Storage Resource Manager installation 121 Figure 4-78 History retention: Tivoli Storage Resource Manager for Databases Here you define the retention period for the following data: Database-Tablespaces Tables Clicking No History turns off history keeping. Removed Resource Retention This panel (Figure 4-79) specifies how long to keep information that is related to entities that have been removed or deleted from an Agent. 122 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-79 Removed Resource Retention: Tivoli Storage Resource Manager for Databases You can define how long to retain information on these removed entities: Databases-Tablespaces Tables 4.7 Microsoft Cluster installation In this section we will outline how to install Tivoli Storage Resource Manager in a Microsoft Cluster (MSCS) environment using IBM DB2 as a local repository for the database. We will provide step by step instructions to: Install and configure Microsoft Cluster server on clustered systems Install and configure DB2 on clustered systems Install and configure the Tivoli Storage Resource Manager Server on clustered systems Our environment uses the following setup: Two Windows 2000 Advanced servers with Fix Pack 2 installed, members of the same domain. The primary system is DIOMEDE, with SENEGAL as the other cluster member. Important: The clustered systems must be members of the same domain. They can also be domain controllers. One Fibre Channel HBA in each of the systems attached to the SAN IBM FAStT Storage system with two 10GB LUNs FC-attached to the hosts. The LUNs were configured to be seen by both systems. The first LUN was used as the quorum disk and the second LUN was used as the data disk for DB2 and Tivoli Storage Resource Manager. IBM DB2 UDB Version 7.2 Service Pack 7 Chapter 4. IBM Tivoli Storage Resource Manager installation 123 IBM Tivoli Storage Resource Manager Version 1.1 The environment is shown in Figure 4-80. Tivoli Storage Resource Manager MSCS install Primary Server DIOMEDE (Windows 2000 Adv. Server) MSCS IBM DB2 7.2 fp 7 IBM Tivoli SRM 1.1 IT SRM Agents IP FC SAN IDC FC IP IDC Heartbeat Data LUN0 - Disk E: (Quorum) Data LUN1 - Disk F: (DB2 & ITSRM) IP FAStT 700 IP FC Standby Server SENEGAL (Windows 2000 Adv. Server) MSCS IBM DB2 7.2 fp 7 IBM Tivoli SRM 1.1 ibm.com/redbooks Figure 4-80 Cluster installation 4.7.1 Microsoft Cluster initial setup We followed these steps to implement the Tivoli Storage Resource Manager cluster: 1. Install Windows 2000 Advanced server on both systems. 2. Prepare two shared LUNs on storage accessible from both systems. 3. Check both systems can see the disks. Make sure that the disks are Basic type. 4. Create the partitions, format the disks using NTFS filesystem, and assign drive letters to both disks. In our example the first disk was E: and the second disk was F:. 5. Check that the disks are visible from the second system with the same drive letters. If the disks cannot be seen, restart the system. 6. Each system requires two network adapters. We recommend that one from each system is connected through a dedicated link, for example, with an Ethernet crossover cable. These adapters will be used for the heartbeat. Both adapters must use static IP addresses. Tip: We recommend using private subnet addresses for the heartbeat adapters. 7. Obtain two additional IP addresses, to be used for the cluster setup. 124 IBM Tivoli Storage Resource Manager: A Practical Introduction 8. Start the cluster installation and configuration on the first node, in our example DIOMEDE, by accessing Add/Remove Windows Components in Control Panel -> Add/Remove Programs. Select Cluster Service and click Next. Figure 4-81 displays the Configuration Wizard. Figure 4-81 Cluster Wizard Welcome panel 9. Click Next. The Hardware Configuration screen displays (Figure 4-82). Figure 4-82 HCL requirements 10.Accept the HCL (Hardware Compatibility List) requirements. Figure 4-83 displays. Chapter 4. IBM Tivoli Storage Resource Manager installation 125 Figure 4-83 Node selection 11.As we are installing on the first node, select The first node in the cluster. You will see the Cluster Name screen, shown in Figure 4-84. Figure 4-84 Cluster name 12.Enter the cluster name, in our example ITSOSRMCL, and click Next. The Account Selection screen displays (Figure 4-85). 126 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-85 Cluster user ID 13.Enter the user ID and password that will be used by the Cluster service. This account must be a domain account. Click Next. The Managed Disks screen displays (Figure 4-86). Figure 4-86 Shared disks 14.Select the shared disks to be used for the cluster. You need to select at least one for the Quorum disk. You can add more shared disks later. In our example, we chose Disk E: for the Quorum disk. Next, the Cluster File Storage window displays, as shown in Figure 4-87. Chapter 4. IBM Tivoli Storage Resource Manager installation 127 Figure 4-87 Quorum disk 15.Select which shared disk will be used for Quorum, Disk E: in our example. Click Next to display the Configure Cluster Networks screen, as in Figure 4-88. Figure 4-88 Network setup 16.The next screens define the networks to be used in the cluster setup. First is the Network Connections screen, shown in Figure 4-89. 128 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-89 Private network 17.In this panel you select roles for each network defined on the systems. At least two networks are required, they can have the following roles: – Client access - The network will be used for client access. – Internal cluster communication only - The network will be used for cluster heartbeat. – All communications - The network will be used for both communication methods mentioned above. In our example we selected our Local Area Connection network for Internal cluster communication only. Figure 4-90 shows our second Network configuration. Figure 4-90 Public network Chapter 4. IBM Tivoli Storage Resource Manager installation 129 18.In this window we selected to use Local Area Connection 2 for All communications Tip: We recommend defining the All communications mode for the second adapter if you have only two network adapters in the system. After completing the network connection setup, click Next to continue to the Internal Cluster Communication screen shown in Figure 4-91. Figure 4-91 Network priority for internal cluster communication 19.If more than one network was defined for cluster communication, the priority order for them must be specified. In our example, we specified one network for private communication and another network for all communications, therefore, we will define the private network as the top priority network used for inter-cluster communication. If this network fails, the all communications network will be used for inter-cluster communication as well as client access. The Cluster IP address screen comes next, shown in Figure 4-92. 130 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-92 Cluster IP address 20.Here you define the Cluster IP Address to be used by clients to access cluster resources. If additional networks were defined for public or all communications access, you need to also specify the network to which this address will be bound. In our example we used the Local Area Connection 2 network. After defining the address click Next to continue, and Finish to end the installation and configuration on the first node. 21.Start the cluster installation and configuration on the second node, (SENEGAL in our example) by accessing Add/Remove Windows Components in Control Panel -> Add/Remove Programs, and selecting Cluster Service. The first windows shown are identical to those for the primary cluster node (Figure 4-81 on page 125, and Figure 4-82 on page 125). Continue to the Create or Join a Cluster screen, shown in Figure 4-93. Figure 4-93 Joining the cluster Chapter 4. IBM Tivoli Storage Resource Manager installation 131 22.As we are joining the existing cluster, select The second or next node in the cluster. Next, specify the cluster name (Figure 4-94). Figure 4-94 Joining cluster name 23.Enter the name of the cluster you created on the first node (in step 12 on page 126) and supply the same user ID, password, and domain of the account you will use to connect to the cluster (in step 13 on page 127). Click Next. Figure 4-95 displays. Figure 4-95 Account for running the service 24.Specify the password for the domain account which will be used to run the cluster service on this node. Click Next and then Finish to complete the installation and configuration of the cluster. 132 IBM Tivoli Storage Resource Manager: A Practical Introduction 25.Check if the cluster service is running by starting Cluster administration from Administrative Tools. If the cluster is running all the nodes (DIOMEDE and SENEGAL in our example) should be up and all resources should be online as shown in Figure 4-96. Figure 4-96 Running cluster Tip: If you installed the cluster from media at a lower Service Pack level than the installed one, you should reapply the latest Service Pack on both nodes before continuing. 4.7.2 Adding shared disk resource for DB2 instance and SRM installation In our setup, we use a local DB2 database for the Tivoli Storage Resource Manager repository. To enable this for clustering, we need to provide a clustered instance for this database, which requires definition of an additional shared disk resource. We have already defined Disk F: to our cluster as shown in Figure 4-96 on page 133, as a member of the Cluster group, but it will be later moved to a new cluster group used for the Tivoli Storage Resource Manager Server cluster. 4.7.3 Installation of DB2 database on both nodes To cluster the DB2 instance we need to install DB2 on both nodes. The application should be installed on a local drive, in our example drive C:. Before installing, create a user ID that will be used to install DB2 (db2admin in our example). This user ID should be a member of the Windows DomainAdmins group. To start the installation, log on using this newly created user ID. When installing DB2, you only need to select the DB2 Enterprise Edition component. You can then accept all defaults - the only thing you need to change is to select Do not install the OLAP Starter Kit. After installation, restart the system and apply the appropriate Fix Pack. In our installation we used IBM DB2 Enterprise Edition 7.2 with Fix Pack 7. 4.7.4 Setting up a clustered instance in DB2 To have a clustered database we need to create a clustered instance. The DB2 installation provides the db2mscs utility, which automatically changes the existing instance to a clustered Chapter 4. IBM Tivoli Storage Resource Manager installation 133 instance, and also creates a new cluster group and all needed resources. Follow these steps to create the clustered instance: 1. Log on to the system which currently owns the shared disk for the DB2 instance, in our example Disk F:, with the user ID you created for DB2 installation. 2. Create a new instance, in our example ITSRM, using the following command: db2icrt ITSRM 3. In the DB2 installation directory create a file DB2MSCS.CFG file with the following entries: – DB2_INSTANCE - The instance to be clustered – CLUSTER_NAME - The cluster in which this instance will be clustered – GROUP_NAME - The cluster group for this instance. We recommend not using the default Cluster Group here. – IP_NAME - The IP address to be used for accessing this instance – IP_ADDRESS - The fixed IP address to be used for accessing this instance – IP_SUBNET - The subnet mask for IP_ADDRESS – IP_NETWORK - The network to be used for accessing the instance. Usually this is either the public or all communications network. – NETNAME_NAME - The network name to be used to access this instance – NETNAME_VALUE - The value for the network name to be used for accessing the instance. – NETNAME_DEPENDENCY - The IP address on which the network name will need to be available before. In our case this should be the IP address defined in this configuration file. – DISK_NAME - The shared disk to be used for this instance. This resource must exist, and should not be the quorum disk. The instance directory will be copied to this resource. – INSTPROF_DISK - If you specified more then one DISK_NAME, which will be moved into the instance cluster group, you can specify which disk will be used for the instance specified in the DB2_INSTANCE parameter. You can see the configuration file we created in Example 4-4. Example 4-4 DB2MSCS.CFG file for ITSRM instance DB2_INSTANCE=ITSRM CLUSTER_NAME=ITSOSRMCL GROUP_NAME=SRMCluster IP_NAME=SRMCluster IP Address IP_ADDRESS=9.1.38.73 IP_SUBNET=255.255.254.0 IP_NETWORK=Local Area Connection 2 NETNAME_NAME=SRMCluster Network Name NETNAME_VALUE=CLUSTER2 NETNAME_DEPENDENCY=SRMCluster IP Address DISK_NAME=Disk F: INSTPROF_DISK=Disk F: 4. Run the following command to cluster the instance you created in step 2: db2mscs -f:DB2MSCS.CFG The command will define all the necessary cluster objects and copy the database instance files to the clustered disk. 134 IBM Tivoli Storage Resource Manager: A Practical Introduction 5. After the command successfully finishes, the new cluster group with the name defined in the configuration file will appear in the cluster definition, as seen in Figure 4-97. Figure 4-97 DB2 clustered instance 6. Verify that all resources in the new cluster group, in our example SRMCluster, are online. You can verify the database instance by accessing it in the DB2 Control Center and creating a sample database. You can also try to failover the resource group and see if the instance is available. When you have verified that the clustered instance is working and is capable of failover, continue with the next installation steps. 4.7.5 Installing IBM Tivoli Storage Resource Manager Server on both nodes In our example we installed the Tivoli Storage Resource Manager Server on the same disk as the DB2 clustered instance, Disk F:. Follow these steps to install Tivoli Storage Resource Manager Server on both nodes: 1. Log on to the first node (DIOMEDE) as the Domain Administrator. 2. If required, fail over the DB2 instance cluster group, in our example SRMCluster, to the first node in the cluster. This is necessary for our configuration as the DB2 instance is installed on Disk F: in this group and this disk is required to install the Tivoli Storage Resource Manager Server on it. 3. Create the database in a non-clustered local instance. We created ITSRMDBD in the DB2 instance as shown in Figure 4-98. Chapter 4. IBM Tivoli Storage Resource Manager installation 135 Figure 4-98 Database on first node 4. Install Tivoli Storage Resource Manager Server following the instructions in 4.3.3, “Installation of the Server code’’ on page 71, using the database created in step 3 as the repository, in our example ITSRMDBD. Use the cluster NETNAME_VALUE, in our example cluster2, for the server name (Example 4-4 on page 134). We installed in the directory F:\Tivoli\TSRM. 5. After installation, stop the services for Server and Agent, and change them to manual startup mode as shown in Figure 4-99. Figure 4-99 Service mode 6. Rename the installation directory. In our example we renamed it to F:\Tivoli\TSRMD. 136 IBM Tivoli Storage Resource Manager: A Practical Introduction 7. During the installation, the TSRMsrv1 Domain account is created. This account has to be deleted before installing on the second node. 8. Failover the DB2 instance cluster group, in our example SRMCluster, to the second node in the cluster. This is necessary as we will install Tivoli Storage Resource Manager on this drive. 9. Log on to the second node as the Domain Administrator. 10.Create the database in a non clustered local instance. In our example we created ITSRMDBS in the DB2 instance as shown in Figure 4-100. Figure 4-100 Database on second node 11.Install Tivoli Storage Resource Manager Server following the instructions in 4.3.3, “Installation of the Server code’’ on page 71, using the database created in step 10 as the repository, in our example ITSRMDBS. Use the cluster NETNAME_VALUE, in our example cluster2, for server name. In our example we installed in the directory F:\Tivoli\TSRM. 12.After installation, stop the services for Server and Agent, and change them to manual startup mode as shown in Figure 4-99. 4.7.6 Copying the repository database to the clustered instance To copy the database from the local instance to the clustered instance, do the following on the second node with the clustered instance cluster group, (SRMCluster), active on this node: 1. Define the clustered instance, in our example ITSRM, in DB2 Control Center as shown in Figure 4-100. 2. Make a backup of the local database used for the Tivoli Storage Resource Manager Server, in our example ITSRMDBS, using the database backup tool from DB2 Control Center. 3. Restore the database into the clustered instance using a different name; in our example we used SRMDBCL, using the database restore tool from DB2 Control Center. 4. Failover the clustered instance to the first node. Chapter 4. IBM Tivoli Storage Resource Manager installation 137 5. Define the clustered instance, in our example ITSRM, in DB2 Control Center as shown in Figure 4-98 on page 136. 6. Define the restored database, in our example SRMDBCL, in DB2 Control Center as shown in Figure 4-98 on page 136. Check if the database can be accessed normally. Continue with the setup when you have verified that the database in the clustered instance can be accessed from both cluster nodes. 4.7.7 Editing the Server config file to reflect the database change As we will be using a database in a clustered instance, the Tivoli Storage Resource Manager Server configuration file (server.config in the config directory) needs to be changed to point to this database. Example 4-5 shows the config file we used. Example 4-5 Server config file [controller] name="cluster2" port=2078 maxConnections=500 routerThreads=1 serviceThreads=2 agentErrorLimit=3 adminGroup="Administrators" commEncrypted=0 [logging] logsKept=5 messagesPerLog=100000 [repository] driver=COM.ibm.db2.jdbc.app.DB2Driver url="jdbc:db2:SRMDBCL" user=TivoliSRM connectionPool=10 [service] name=TStorm.server.svp.GuiSvp [service] name=TStorm.server.svp.AgentSvp [service] name=scheduler.Scheduler As you can see we changed the database URL to url=”jdbc:db2:SRMDBCL” to reflect that the repository database was moved to the clustered instance. 4.7.8 Creating clustered resources for the Server and Agent Now we are ready to set up the Tivoli Storage Resource Manager Server and Agent as clustered resources so they will be able to failover. Follow these steps to define the resources for operating in a clustered environment: 1. Change the password of the TSRMsrv1 domain account to a new value. The password is randomly generated by the initial install program, and it is used to run the Tivoli Storage Resource Manager service. Since we need to synchronize this password on both systems, we must manually reset it. 2. Edit the logon properties for the Tivoli Storage Resource Manager Server service on both cluster nodes to reflect the password changes. Right-click on the service entry in the 138 IBM Tivoli Storage Resource Manager: A Practical Introduction Services applet and select Properties. You should see the window as shown in Figure 4-101. Figure 4-101 Password change Select the Log On tab and enter the new password. Attention: If you do not change the password on both nodes, the service will fail to start. 3. Using Cluster Administration, define a new Generic Service resource for the Tivoli Storage Resource Manager Server in the clustered instance group, in our example SRMCluster group. When creating the resource you should define it to be dependent on the following resources: – – – – The disk where you installed the Server The clustered database instance The clustered IP address The clustered Network Name You can see these values in our example in Figure 4-102. Chapter 4. IBM Tivoli Storage Resource Manager installation 139 Figure 4-102 Resource dependences The service name used for this resource is TrelliSrv1 as shown in Figure 4-103. Figure 4-103 Server service name Also check Use Network Name for computer name, so that the Network Name defined for this cluster group will be associated with this resource. 4. Using Cluster Administration define a new Generic Service resource for the Tivoli Storage Resource Manager Agent in the clustered instance group, in our example SRMCluster group. When creating the resource you should define it to be dependent on the following resources: – – – – The disk where you installed the Server The clustered database instance The clustered IP address The clustered Network Name You can see these values in our example in Figure 4-102. 140 IBM Tivoli Storage Resource Manager: A Practical Introduction The service name used for this resource is TrelliSrv1 as shown in Figure 4-104. Figure 4-104 Agent service name 5. After creating both resources, bring them online, as in Figure 4-105. Figure 4-105 Cluster view If all resources are online your Tivoli Storage Resource Manager Server cluster implementation is ready to use. Note: When installing the Agents point them to the name which resolves into the cluster IP address, in our example SRMCluster IP Address as shown in Figure 4-105. Chapter 4. IBM Tivoli Storage Resource Manager installation 141 4.8 Manager HA install using remote Oracle database This section shows how to install Tivoli Storage Resource Manager using a remote Oracle database. Enterprise database servers are usually already clustered for HA (high availability), so we will not discuss that further here. We will only focus on protecting the application server itself. We will set up a primary Tivoli Storage Resource Manager Server using a remote Oracle database. We will then have a standby Server which can be manually switched over in the event of failure of the primary. Note this scenario does not use automatic failover. For this installation we used Oracle 8.1.7 running on a Windows 2000 server as the repository. Before installing, you need to install a JDBC driver for the database. This driver can be downloaded from the following Web site: http://otn.oracle.com/software/tech/java/sqlj_jdbc/content.html or located in the Oracle installation directory: [install drive]:\Oracle\Ora81\jdbc\lib Put the JDBC drivers on the local drive of the systems where the Tivoli Storage Resource Manager Server will be installed. Our configuration will use the environment shown in Figure 3-11 on page 61. To set this up: 1. Create the repository database on the Oracle database server. Our database server was installed in the system GALLIUM, and created using the Oracle Database Configuration Assistant (Figure 4-106). Figure 4-106 Starting Oracle Database Configuration Assistant 2. Select Create a database and click Next. On the next screen select Typical and click Next. Select Create new database files and click Next. For the primary type of database usage, select Multipurpose and click Next. You can accept the default value for Concurrently connected users, (in our example, 15) and click Next. On the screen where you can select options to use with the database, you should deselect all options and then click Next. A screen similar to Figure 4-107 will display. 142 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-107 Selecting the database name 3. Here you define the database name, in our example ITSRMREM. The Assistant will automatically define the SID for the database, and in our example we accepted the default value ITSRMREM. After specifying the name click Next. In the next window, select No don’t register the database and click Next. In the window asking when to create the database select Create Database Now and click Finish. The assistant will create the database. 4. Install the Tivoli Storage Resource Manager Server on the standby server using this database, following the instructions in 4.3.3, “Installation of the Server code’’ on page 71. In the step for database selection, choose Oracle. The screen shown in Figure 4-108 displays. Figure 4-108 Database connection information 5. Complete the connection information as shown, and click Next. Figure 4-109 displays. Chapter 4. IBM Tivoli Storage Resource Manager installation 143 Figure 4-109 Database information 6. Click Next and continue the installation process as described in 4.3.3, “Installation of the Server code’’ on page 71. 7. Stop the Tivoli Storage Resource Manager Server service and set the startup type to manual, using the Services applet under Administrative tools (Figure 4-110). Figure 4-110 Setting services to manual 8. Clear the repository database, using the Oracle database tools. Delete and recreate the database with the same name as when you created it (ITSRMREM in our example). This is required because the installation program tries to create the repository in the database and if the repository already exists, the installation will fail. 144 IBM Tivoli Storage Resource Manager: A Practical Introduction 9. Install the Tivoli Storage Resource Manager Server on the primary server using the same parameters as on the standby server. Note: If you are using this scenario for HA, you need to maintain two directories inside the Tivoli Storage Resource Manager installation directory in a consistent state. These directories are: config - for the configuration files. After installation or changes on the primary server, you need to copy those two files to the standby server: – repository – nas.config scripts - for scripts. If you use server distribution to the Agents for the scripts, all scripts must be copied on both servers. 4.8.1 Testing the standby HA installation To test the scenario, we simulated a primary server failure. We then did the following: In the DNS server we changed the settings so that the name of the primary server pointed to the standby server IP address. Started the Tivoli Storage Resource Manager Server services on the standby server. After starting the services, the standby server connects to the remote database repository using the same settings as the primary server. As all the information except scripts and basic configuration options are in the database, the operations can resume. Tip: For the best results you should keep the clocks of the primary and standby servers synchronized. Note: The local Agent installed on the primary server will not appear. Also, all tasks related to that Agent will fail as the name of the standby server Agent is not the same as for the primary server. 4.9 CIM/OM This section describes how CIM/OM works, how to install and configure the CIM/ON server, and how to configure Tivoli Storage Resource Manager to login into the CIM/OM server. 4.9.1 What is CIM/OM? The Common Information Model (CIM) agent consists of the CIM Object Manager (CIM/OM), the Service Location Protocol (SLP), and the device provider. A device can be a storage server such as an IBM TotalStorage Enterprise Storage Server (ESS). The CIM agent registers itself with SLP to enable discovery by the Client application. The SLP is a directory service called by a client application to locate the CIM Object Manager. The client application and the CIM/OM communicate through CIM Messages. The CIM/OM and device provider communicate through method calls made from the CIM/OM to the provider. The device provider communicates with the device through proprietary calls. Figure 4-111 shows the ESS CIM/OM implementation. Chapter 4. IBM Tivoli Storage Resource Manager installation 145 CIM/OM ESS implementation Client Application ITSRM SLP CIM M essag es en cod ed w ith in XM L CIM /O M Meth od calls m ade from CIMO M to Pro vid er Device Provider Prop rietary calls Device or ESS ibm.com/redbooks Figure 4-111 CIM/OM for ESS IBM Tivoli Storage Resource Manager supports reporting from CIM compliant devices. At the present time, the only tested device is the ESS using its CIM/OM server. IBM Tivoli Storage Resource Manager gathers and reports on ESS devices defined in the CIM/OM server. It uses Probe jobs to collect information about the defined ESS devices and uses the reporting facilities to view that information. 4.9.2 CIM/OM Server installation for ESS The supported platforms for the CIM/OM server are shown in Figure 4-112. 146 IBM Tivoli Storage Resource Manager: A Practical Introduction CIM/OM Server supported platforms Windows 2000 AIX Linux ibm.com/redbooks Figure 4-112 CIM/OM server supported platforms To install and configure the ESS CIM/OM server you need: ESS 2.1.1.135 or later for model F20 and 2.1.1.136 or later for model 800 Command line Interface (CLI) Version 2.1.1.8 or later TCP/IP communication In our example we installed the CIM/OM server V1.1.0.1 on Windows 2000 Advanced Server. The CIM/OM software can be downloaded from the Web site: http://www-1.ibm.com/support/search.wss?rs=586&q=ssg1*&tc=STHUUM&dc=D400 Pre-installation task Before installing the CIM/OM server, the ESS CLI has to be installed and configured correctly. In our example we used ESS CLI Version 2.1.1.8. Verify the ESS CLI is correctly installed using the command shown in Example 4-6. Example 4-6 Checking ESS CLI installation C:\>esscli -u storwatch -p specialist -s 172.31.1.1 list server Tue Jun 10 23:10:15 CEST 2003 IBM ESSCLI 2.1.0.8 Server ---------2105.18921 C:\> Model ----F20 Mfg --075 WWN ---------------5005076300C08781 CodeEC --------2.1.1.269 Cache ----8GB NVS ----384MB Racks ----1 You should see your ESS listed, as in the example. If not, reinstall the CLI package. Chapter 4. IBM Tivoli Storage Resource Manager installation 147 CIM/OM installation After verifying the ESS CLI, we installed and configured CIM/OM server: 1. From the CIM/OM CD, or downloaded image, run launchpad.bat Figure 4-113 displays. Figure 4-113 ESS CIM/OM startup screen 2. Click on Installation wizard - you will see a Welcome screen. Click Next to display the License agreement. Click Next to accept it, and the directory selection screen (Figure 4-114) displays. 148 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-114 Installation directory 3. Choose the installation directory and click Next. The installation summary screen (Figure 4-115) displays. Figure 4-115 Installation size 4. Click Install to start copying files. After this is complete you will see a successful completion message. Click Finish to end the installation process. Chapter 4. IBM Tivoli Storage Resource Manager installation 149 Post-installation The installation process creates two system services: Service Location Protocol (SLP) IBM CIM Object Manager After installation, verify the two services are running, as they are essential to provide the CIM/OM interface to the managed ESS devices. CIM/OM configuration Now you need to configure the CIM/OM to actually access the ESS and start providing this information to the CIM enabled management application. 1. Define the users who will access the CIM/OM interface to gather data. Open a command prompt with Start -> Programs -> IBM TotalStorage CIM Agent for ESS -> Configure CIMOM Users. Use the adduser command as in Example 4-7. Example 4-7 Adding CIM/OM users Application setuser started in interactive mode To terminate the application enter: exit To get a help message enter: help >>> adduser itsrm itsrm An entry for user itsrm successfully added >>> In our example we defined user itsrm, with password itsrm. The exit command closes the window. 2. Define the ESSs which will be controlled by the CIM/OM server. Open a command prompt with Start -> Programs -> IBM TotalStorage CIM Agent for ESS -> Enable ESS Communication. Use the address command (Example 4-8) to define a managed ESS. Example 4-8 Defining ESSes to be managed by CIM/OM Application setdevice started in interactive mode To terminate the application enter: exit To get a help message enter: help >>> address 172.31.1.1 storwatch specialist An ess provider entry for IP 172.31.1.1 successfully added >>> 3. After applying these definitions, we recommend rebooting the CIM/OM server. 4. To check that the setup is correct, run the verifyconfig command in the CIM/OM installation directory as shown in Example 4-9. Example 4-9 Verifying ESS CIM/OM configuration C:\Program Files\IBM\cimagent>verifyconfig -u itsrm -p itsrm Verifying configuration of ESS CIM Agent... Communicating with SLP to find WBEM services... 1 WBEM services found host=w2kadvtsm, port=5989 Connecting to ESS CIM Agent, host=w2kadvtsm, port=5989 Found 1 IBMTSESS_StorageSystem instances Verification Successful C:\Program Files\IBM\cimagent> 150 IBM Tivoli Storage Resource Manager: A Practical Introduction Your Managed Systems should be listed as IBMTSESS_StorageSystem. If not, re-check all the setup steps. Tip: If the verification still fails, try restarting both the CIM/OM services before re-verifying. Upgrading CIM/OM At the time of writing there was a fix Version 1.1.0.2 available for CIM/OM. It is recommended to install this fix, which can be downloaded from: http://www-1.ibm.com/support/search.wss?rs=586&q=ssg1*&tc=STHUUM&dc=D400 To install the update, do the following: 1. Stop the CIM/OM related services: – Service Location Protocol (SLP) – IBM CIM Object Manager 2. Unpack the fix file to a temporary directory, and run the cimagentfix.cmd to start the update. You will see a screen similar to Figure 4-116. Figure 4-116 Welcome screen 3. Click Next to start the installation; it will check the current and new version, as shown in Figure 4-117. Chapter 4. IBM Tivoli Storage Resource Manager installation 151 Figure 4-117 Current version 4. Click Next to continue; the installation confirmation screen displays (Figure 4-118), including the location and file size. Figure 4-118 Install size 5. Click Install to begin copying files. When done, you will see the screen in Figure 4-119. 152 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-119 Installation finished 6. Click Finish to end the installation process. After the upgrade, check if the CIM/OM related services are running, and verify the configuration as shown in Example 4-9 on page 150. CIM/OM security By default CIM/OM server uses secure communication with certificates. The certificate created during installation is in the file truststore in the installation directory. You can create new certificates with the command mkcertificate The new certificate will also be stored in the truststore file. IBM Tivoli Storage Resource Manager supports secure communication with CIM/OM. If you are using an application which does not support the secure protocol, the CIM/OM server can be configured to run in insecure mode. Follow the instructions in Common Information Model Agent Installation and Configuration Guide for the IBM Enterprise Storage Server, GC35-0485. Your CIM/OM server for IBM ESS is now ready to do some serious reporting. 4.9.3 CIM/OM configuration in IBM Tivoli Storage Resource Manager Before using the storage subsystem reports with IBM Tivoli Storage Resource Manager, you need to register the CIM/OM server as follows: 1. Navigate to CIM/OM Logins node in the navigation tree as shown in Figure 4-120. Chapter 4. IBM Tivoli Storage Resource Manager installation 153 Figure 4-120 CIM/OM Logins in navigation tree 2. To create a new CIM/OM login definition, click Create. Figure 4-121 displays. Figure 4-121 Defining CIM/OM login The following fields have to be populated: – Host Name - fully resolvable name of the CIM/OM server - in our example w2kadvtsm. – Port - the CIM/OM CP/IP port. The CIM/OM server for ESS uses port 5989 for secure communication port and 5988 for insecure communication. In our example we used port 5989. 154 IBM Tivoli Storage Resource Manager: A Practical Introduction – Protocol - The ESS CIM/OM server can use either https or http for the protocol. In our example we used the secure protocol https. – User Name - the user name which is defined in the CIM/OM server. In our example we used itsrm (step 1 on page 150). – Password - the corresponding password for the user name. – Certificate File - the certificate file which was created on the CIM/OM server. Tip: The truststore file has to be copied from the CIM/OM server to the machine where IBM Tivoli Storage Resource Manager server is installed. If both are running on the same machine, you can use the original location. After entering all the required data, click Save to store the information into the repository database. The defined CIM/OM login will appear similar to Figure 4-120. Once you have defined the CIM/OM login(s) you can edit or delete them using the Edit and Delete buttons. 3. Before you can start collecting data for CIM/OM managed ESSs, you need to discover them. The discovery is done using the CIM/OM login information by the Agent on the IBM Tivoli Storage Resource Manager Server. Select Discovery under Monitoring in the IBM Tivoli SRM Tree. Right-click the Discovery tree and select Run Now as shown in Figure 4-122. Figure 4-122 Running discovery 4. Once discovery is complete, you should see two entries from the Agent installed on the IBM Tivoli Storage Resource Manager Server. If you scroll the status window correctly you can distinguish which was the CIM/OM discovery as shown in Figure 4-123. Chapter 4. IBM Tivoli Storage Resource Manager installation 155 Figure 4-123 Finding CIM/OM discovery The Log File Name for the CIM/OM will include cimom_discovery in the name, thus identifying it as the discovered CIM/OM. To see if the discovery was successful, display the job output information by double clicking the spy glass symbol circled in Figure 4-123. The output is shown in Figure 4-124. 156 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 4-124 Discovery job output Our output shows that the ESS subsystem (2105.18921, where 18921 is the ESS serial number) was discovered and configured. You can also see that CIM/OM data was queried from the host w2kadvtsm which is the CIM/OM server. 5. Once the ESS is discovered, it can be configured for monitoring. Navigate to CIM/OM Storage Subsystem Administration in the Navigation Tree as shown in Figure 4-125. Figure 4-125 Storage Subsystem Administration All discovered ESS’s will be displayed. To enable reporting on particular ESS, check the Monitored square as shown in Figure 4-125. Chapter 4. IBM Tivoli Storage Resource Manager installation 157 You can also set an alias, which will be then used in reports, by selecting the ESS entry and clicking on Set disk alias. In our example we specified ESSF20 as an alias. We give details of ESS subsystem reporting in 6.3, “Tivoli Storage Resource Manager ESS Reporting’’ on page 297. 158 IBM Tivoli Storage Resource Manager: A Practical Introduction 5 Chapter 5. Operations: Policy, Quotas, and Alerts In this chapter we describe how to setup the Tivoli Storage Resource Manager functions related to monitoring, alerting, and policy management of your storage environment. We will discuss the following: Discovery Probes for asset reporting Pings for availability reporting Scans for capacity and usage reporting Policy Management including ESS LUN provisioning © Copyright IBM Corp. 2003. All rights reserved. 159 5.1 OS Monitoring Tivoli Storage Resource Manager Monitoring Scheduled and ad hoc data collection Discovery Probes for asset reporting Pings for availability reporting Scans for capacity and usage reporting Policy Management ESS LUN provisioning ibm.com/redbooks Figure 5-1 Tivoli Storage Resource Manager Monitoring features The Monitoring features of Tivoli Storage Resource Manager enable you to run regularly scheduled or on-the-flight data collection jobs. These jobs gather statistics about the storage assets and their availability and their usage within your enterprise, and make the collected data available for reporting. We will now give a quick overview of the monitoring jobs, and explain how they work through practical examples. Reporting on the collected data is explained in Chapter 6, “Reporting” on page 247. 5.1.1 Navigation tree Figure 5-2 shows the complete navigation tree for OS Monitoring which includes Groups, Discovery, Pings, Probes, Scans, and Profiles. 160 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-2 OS Monitoring tree Except for Discovery, you can create multiple definitions for each of those monitoring features of Tivoli Storage Resource Manager. To create a new definition, right-click on the feature and select New <feature>. Figure 5-3 shows how to create a new Scan job. Figure 5-3 New Scan job creation Once saved, any definition within Tivoli Storage Resource Manager can be updated by right-clicking on the object and selecting Edit. This will put you in Edit mode. Save your changes by clicking the floppy disk icon in the top menu bar. Chapter 5. Operations: Policy, Quotas, and Alerts 161 Discovery, Pings, Probes, and Scan menus contain jobs that can run on a scheduled basis or ad hoc. To execute a job immediately, right-click the job then select Run now (see Figure 5-4). Each execution of a job creates a time-stamped output that can be displayed by expanding the tree under the job. Figure 5-4 OS Monitoring - Jobs list The color of the job output represents the job status: Green - Successful run Brown - Warnings occurred during the run Red - Errors occurred during the run Blue - Running jobs To view the output of a job, double click the job. Groups and Profiles are definitions that may be used by other jobs - they do not produce an output in themselves. As shown in Figure 5-4, all objects created within Tivoli Storage Resource Manager are prefixed with the user ID of the creator. Default definitions, created during product installation, are prefixed with Tivoli.Default. Groups, Discovery, Probes, Scans, and Profiles are explained in the following sections. 5.1.2 Groups Before defining monitoring and management jobs, it may be useful to group your resources so that you can limit the scope of monitoring or data collection. Figure 5-5 shows the groups you can create with Tivoli Storage Resource Manager. 162 IBM Tivoli Storage Resource Manager: A Practical Introduction Tivoli Storage Resource Manager Groups Used for targeted monitoring and policy management Allows grouping by Computers Filesystems Directories User ids OS user groups ibm.com/redbooks Figure 5-5 Tivoli Storage Resource Manager Groups Computer Groups Computer Groups allow you to target management jobs on specific computers based on your own criteria. Some criteria you might consider for grouping computers are platform type, application type, database type, and environment type (for example, test or production). Our lab environment contains: UNIX servers Windows 2000 servers MS SQL-Server databases Oracle databases NAS200 server In order to target specific servers for monitoring based on OS and/or database type, we will define these four groups: Windows Systems UNIX System Windows DB Systems NAS Devices To create the first group, expand Groups -> Computer, right-click Computer and select New Computer Group. Our first group will contain all UNIX systems as shown in Figure 5-6. To add or remove a host from the group, highlight it in either the Available or Current Selections panel and use the arrow buttons. You can also enter a meaningful description in the field. Chapter 5. Operations: Policy, Quotas, and Alerts 163 Figure 5-6 Computer Group definition To save the new Group, click the floppy disk icon in the menu bar, and enter the Group name in the confirmation box shown in Figure 5-7. Figure 5-7 Save a new Computer Group We created the other groups using the same process, and named them Windows Systems, Windows DB Systems, and NAS Devices. Important: To avoid redundant data collection, a computer can belong to only one Group at a time. If you add a system which is already in a Group, to a second Group, it will automatically be removed from the first Group. Figure 5-8 shows the final Group configuration, with the members of the Windows Systems group. 164 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-8 Final Computers Group definitions Note: The default group Tivoli.DefaultComputerGroup contains all servers that have been discovered, but not yet assigned to a Group. Filesystem Groups Filesystem Groups are used to associate together filesystems from different computers that have some commonality. You can then use this group definition to focus the Scan and the Alert processes to those filesystems. To create a Filesystem Group, you have to select explicitly each filesystem for each computer you want to include in the group. There is no way to do a grouped selection, e.g. / (root) filesystem for all UNIX servers or C:\ for all Windows platforms. Figure 5-9 shows the Filesystem Group definition screen. Chapter 5. Operations: Policy, Quotas, and Alerts 165 Figure 5-9 Filesystem Group definition Note: As for computers, a filesystem can belong to only one Group. Directory GROUPS Use Directory Groups to group together directories to which you want to apply the same storage management rules. Figure 5-10 shows the Directory Group definition screen. 166 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-10 Directory group definition The Directory Group definition has two views for directory selection: Use directories by computer to specify several directories for one computer. Use computers by directory to specify one directory for several computers. The button on the bottom of the screen toggles between New computer and New directory depending on the view you select. We will define one Directory Group with /tmp for all computers, and another with the Oracle log directory for a specific computer (DIOMEDE). To define the first Group: 1. Select computers by directory. 2. Click on New directory. 3. Enter /tmp in the Directory field and select All computers (see Figure 5-11). Chapter 5. Operations: Policy, Quotas, and Alerts 167 Figure 5-11 Computers by directory definition 4. Click on OK and save the group as /tmp. For the second group: 1. 2. 3. 4. Select directories by computer. Click New computer. Select diomede from the pull-down Computer field (see Figure 5-12). Enter C:\oracle\oradata\itsrm\archive in the Directories field (see Figure 5-12) Figure 5-12 Directories by computer configuration 5. Click Add, then OK. 6. Save the group as OracleArchive. Figure 5-13 shows our final Groups configuration and details of the OracleArchive Group. 168 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-13 Final Directories Group definition User Groups You can define Groups made up of selected user IDs. These groupings will enable you to easily define and focus storage management rules such as scanning and Constraints on the defined IDs. Note: You can include in a User Group only user IDs defined on the discovered hosts, which have files belonging to them. Figure 5-14 shows the list of available users at a specific point in time. Chapter 5. Operations: Policy, Quotas, and Alerts 169 Figure 5-14 List of available users As shown in Example 5-1, we added a new user on the Agent DIOMEDE and created some files for the user. We than ran a new Scan. Example 5-1 Create user and files root@brazil> mkgroup -'A' itso_grp root@brazil> mkuser pgrp=itso_grp home=/home/itso_usr itso_usr root@brazil> chown itso_usr:itso_grp /home/itso_usr root@brazil> su - itso_usr $ pwd /home/itso_usr $ echo "hello" > myfile $ ls -l myfile -rw-r--r-1 itso_usr itso_grp 6 Sep 13 11:46 myfile Now, Figure 5-15 shows that this user ID (itso_usr) is listed in the Available user’s list. 170 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-15 List of available user after Scan Note: As for computers, a user can be defined in only one Group. OS User Group Groups You can define Groups consisting of operating system user groups such as Administrators for Windows or adm for UNIX. To define a Group consisting of user groups, select OS User Group from the Groups entry on the left hand panel. Note: As for users, an OS User Group will be added to the list of available Groups only when a Scan job finds at least one file owned by a user belonging to that Group. Note: As for users, an OS User Group can belong to only one Group at a time. Chapter 5. Operations: Policy, Quotas, and Alerts 171 5.1.3 Discovery The discovery process is used to discover new computers within your enterprise that have not yet been monitored by Tivoli Storage Resource Manager, as shown in Figure 5-16. Tivoli Storage Resource Manager Discovery process The Discovery process will discover Windows servers in the same domain NAS filers NetWare servers ibm.com/redbooks Figure 5-16 Discovery process The discovery process will: Request a list of Windows systems from the Windows Domain Controller Contact, through SNMP, all NAS filers and check if they are registered in the nas.config file Discover all NetWare servers in the NetWare trees reported by Agents Search UNIX Agents’ mount tables, looking for remote filesystems and discover NAS filers More details of NAS and NetWare discovery are given in “NAS discovery” on page 56, and in “Novell NetWare discovery” on page 58. Use IBM Tivoli SRM -> Monitoring -> Discovery to change the settings of the Discovery job. The following options are available. When to run tab The initial tab When to Run, (Figure 5-17) is used to modify the scheduling settings. You can specify to execute the discovery: Now - Run once when the job is saved. Once - at a specified time in the future Repeatedly - Choose the frequency in minutes, hours, days, weeks, or months. You can limit the run to specific days of the week. 172 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-17 Discovery When to Run options Alert tab The second tab, Alert, enables you to be notified when a new computer is discovered. See 5.2, “OS Alerts” on page 189 for more details on the Alerting process. Options tab The third tab, Options (Figure 5-18) sets the discovery runtime properties. Figure 5-18 Discovery job options Uncheck the Skip Workstations field if you want to discover the Windows workstations reported by the Windows Domain Controller. Chapter 5. Operations: Policy, Quotas, and Alerts 173 5.1.4 Pings Figure 5-19 summarizes the Ping process. Tivoli Storage Resource Manager Ping process The Ping process will launch TCP/IP pings against monitored computers generate statistics on computer Availability in the central repository generate an Alert if the process fails because of an unavailable host ibm.com/redbooks Figure 5-19 Ping process Pings gather statistics about the availability of monitored servers. The scheduled job will Ping your servers and consider them active if it gets an answer. This is purely ICMP-protocol based - there is no measurement of individual application availability. When you create a new Ping job, you can set the following options. Computers tab Figure 5-20 shows the Computers tab, which is used to limit the scope of the computers that are to be Pinged. 174 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-20 Ping job configuration - Computers When to Ping tab The tab, When to PING, sets the frequency used for checking. We selected a frequency of 10 minutes as shown in Figure 5-21. Figure 5-21 Ping job configuration - When to Ping Options tab On the Options tab, you specify how often the Ping statistics are saved in the database repository. By default, Tivoli Storage Resource Manager keeps its Ping statistics in memory for one hour before flushing them to the database and calculating an average availability. You can change the flushing interval to another time amount, or a number of Pings (for example, to calculate availability after every 10 Pings). The system availability is calculated as: (Count of successful pings) / (Count of pings) Chapter 5. Operations: Policy, Quotas, and Alerts 175 A lower interval can increase database size, but gives you more accuracy on the availability history. We selected to save to the database at each Ping, which means we will have an availability of 100% or of 0%, but we have a more granular view of the availability of our servers. Alerts tab The Alerts tab (shown in Figure 5-22) is used to generate Alerts for each host that is unavailable. Alert mechanisms are explained in more detail in 5.2, “OS Alerts” on page 189. You can choose any Alert type from the following: SNMP trap to send a trap to the Event manager defined in Administrative services —> Configuration —> General —> Alert Disposition Login Notification to direct the Alert to the specified user in the Alert Log (see 5.2, “OS Alerts” on page 189) Windows Event Log to generate an event to the Windows event log Run Script to run a script on the specified server Email to send a mail to the specified user through the Mail server defined in Administrative services -> Configuration -> General -> Alert Disposition Figure 5-22 Ping job configuration - Alert We selected to: Send e-mail to two users Run a script that will send popup messages to selected administrators. The script is listed in Example 5-2. Optimally, you would send an event to a central console such as the Tivoli Enterprise Console. Note that certain parameters are passed to the script - more information is given in “Alerts tab” on page 195. Example 5-2 Script PINGFAILED.BAT net send /DOMAIN:a23blvag Computer %1 did not respond to last %2 ping(s). Please check it 176 IBM Tivoli Storage Resource Manager: A Practical Introduction We then saved the Ping job as PingHosts, and tested it by right-clicking and selecting Run now. As the hosts GALLIUM and CRETE did not respond, we received: One popup for GALLIUM (Figure 5-23) Figure 5-23 Ping failed popup for GALLIUM A similar popup for CRETE One e-mail for GALLIUM (Figure 5-24) Figure 5-24 Mail message for GALLIUM A similar e-mail for CRETE More details about the related reporting features of Tivoli Storage Resource Manager are in 6.2.3, “Availability Reporting” on page 262. 5.1.5 Probes Figure 5-25 summarizes the Probe process. Chapter 5. Operations: Policy, Quotas, and Alerts 177 Tivoli Storage Resource Manager Probe process The Probe process will gather Assets data on monitored computers Memory Processors Hard disks Filesystems store data in the central repository generate an Alert if the process fails ibm.com/redbooks Figure 5-25 Probe process The Probe process gathers data about the assets and system resources of Agents such as: Memory size Processor count and speed Hard disks Filesystems The data collected by the Probe process is used by the Assets Reports described in 6.2.1, “Asset Reporting” on page 252. Computers tab Figure 5-26 shows that we included the Tivoli.Default Computer Group in the Probe so that all computers, including those not yet assigned to an existing Group, will be Probed. We saved the Probe as ProbeHosts. 178 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-26 New Probe configuration Important: Only the filesystems that have been returned by a Probe job will be available for further use by Scan, Alerts, and policy management within Tivoli Storage Resource Manager. When to Probe tab This tab has the same configuration as for the Ping process. We set up a weekly Probe to run on Sunday for all computers. We recommend running the Probe job at a time where all the production data you want to monitor is available to the system. Alert tab As this is not a business-critical process, we asked to be alerted by mail for any failed Probe. Figure 5-27 shows the default mail text configuration for a Probe failure. Figure 5-27 Probe alert - mail configuration Chapter 5. Operations: Policy, Quotas, and Alerts 179 5.1.6 Profiles The main functionality of Profiles is explained in Figure 5-28. Tivoli Storage Resource Manager Profiles Profiles are used in Scan jobs to limit files to be scanned to specify files attibutes to be scanned to select the summary view directories and filesystems user ids OS user groups to set statistics retention period Tivoli Storage Resource Manager provides default profiles that provide data for all the default reports ibm.com/redbooks Figure 5-28 Profiles Profiles are used in Scan jobs to specify: The pattern of files to be scanned The attributes of files to be gathered The summary view that will be available in reports The statistics retention period Specifying correct profiles avoids gathering unneeded information that may lead to space problems within the Tivoli Storage Resource Manager repository. However, you will not be able to report on or check Quotas on files that are not used by the Profile. Tivoli Storage Resource Manager comes with several default profiles, (shown in Table 5-1) prefixed with Tivoli.Default, which can be reused in any Scan jobs you define. Table 5-1 Default profiles 180 Default profile name Description BY_ACCESS Gathers statistics by length of time since last access of files BY_CREATION Gathers statistics by length of time since creation of files BY_MOD_NOT_BACKED_UP Gathers statistics by length of time since last modification (only for files not backed up since modification). Windows only BY_MODIFICATION Gathers statistics by length of time since last modification of files IBM Tivoli Storage Resource Manager: A Practical Introduction Default profile name Description LARGEST_DIRECTORIES Gathers statistics on the n largest directories. (20 is the default amount.) LARGEST_FILES Gathers statistics on the n largest files. (20 is the default amount.) LARGEST_ORPHANS Gathers statistics on the n largest orphan files. (20 is the default amount.) MOST_AT_RISK Gathers statistics on the n files that have been modified the longest time ago and have not yet been backed up since they were modified. Windows only. (20 is the default amount.) OLDEST_ORPHANS Gathers statistics on the n oldest orphan files. (20 is the default amount.) SIZE_DISTRIBUTION Gathers information on the size distribution of files MOST_OBSOLETE_FILES Gathers statistics on the n “most obsolete” files (i.e., files that have not been accessed or modified for the longest period of time). (20 is the default amount.) SUMMARY_BY_FILESYSTEM /DIRECTORY Summarizes space usage by Filesystem or Directory SUMMARY_BY_GROUP Summarizes space usage by OS Group SUMMARY_BY_OWNER Summarizes space usage by Owner Those default profiles, when set in a Scan job, gather data needed for all the default Tivoli Storage Resource Manager reports. As an example, we will define an additional Profile to limit a Scan job to the 500 largest Postscript or PDF files unused in the last six months. We also want to keep weekly statistics at a filesystem and directory level for two weeks. Statistics tab On the Statistics tab (shown in Figure 5-29), we specified: Retain filesystem summary for two weeks Gather data based on creation data Select the 500 largest files The Statistics tab is used to specify the type of data that is gathered, and has a direct impact on the type of reports that will be available. In our specific case, the Scan associated with this profile will not create data for reports based on user IDs and users groups. Neither will it create data for reports on directory size. Chapter 5. Operations: Policy, Quotas, and Alerts 181 Figure 5-29 New Profile - Statistics tab The Summarize space usage by section of the Statistics tab specifies how the space usage data must be summarized. If no summary level is checked, the data will not be summarized, and therefore will not be available for reporting in the corresponding level of Usage Reporting section of Tivoli Storage Resource Manager. In our particular case, because we select to summarize by filesystem and directory, we will see space used by PDF and Postscript files at those levels, providing we set up the Scan profile correctly. See 5.1.7, “Scans” on page 185 for information on this. We will not see which users or groups have allocated those PDF and Postscript files. Restriction: For Windows servers, users and groups statistics will not be created for FAT filesystems. The Accumulate history section sets the retention period of the collected data. In this case, we will see a weekly summary for the last two weeks. The Gather statistics by length of time since section sets the base date used to calculate the file load. It determines if data will be gathered and summarized for the IBM Tivoli SRM -> Reporting -> Usage -> Files reporting view. The Gather information on the section sets the amount of files to retrieve for each of the report views available under IBM Tivoli SRM -> Reporting -> Usage -> Access Load. Files filter tab The Files filter tab is used to limit the scope of files that are returned by the Scan job. To create a selection, right-click on the All files selected context-menu option as shown in Figure 5-30. 182 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-30 New Profile - File filter With the New Condition menu, you can create a single filter on the files while the New Group enables you to combine several conditions with: All of Any of None of Not all of The file is The file is The file is The file is selected if all conditions are met (AND) selected if at least one condition is met (OR) NOT selected if at least one condition is met (NOT OR) selected if none of the conditions are met (NOT AND) The Condition Group can contain individual conditions or other condition groups. Each individual condition will filter files based on one of the listed items: Name Last access time Last modified Creation time Owner user ID Owner group Windows files attributes Size Type Length We want to select files that meet our conditions: (name is *.ps or name is *.pdf) and unused since six months. The AND between our two conditions will be translated to All of, while the OR within our first condition will be translated to Any of. On the screen shown in Figure 5-30, we selected New Group. From the popup screen, Figure 5-31, we selected All of and clicked OK. Chapter 5. Operations: Policy, Quotas, and Alerts 183 Figure 5-31 New Condition Group Now, within our All of group we will create one dependant Any of group using the same sequence. The result is shown in Figure 5-32. Figure 5-32 New Profile - Conditions Groups Now, we create individual conditions within each group by right-clicking on New Condition on the group where the conditions must be created. Figure 5-33 shows the creation of our first condition for the Any of group. We enter in our file specifications (*.ps and *.pdf) here. Figure 5-33 New Profile - New condition We repeated the operation for the second condition (All of). The final result is shown in Figure 5-34. 184 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-34 New Profile - Conditions The bottom of the right pane shows the textual form of the created condition. You can see that it corresponds to our initial condition. We saved the profile as PS_PDF_FILES (Figure 5-35). Figure 5-35 Profile save 5.1.7 Scans We explain in Figure 5-36 the main objectives of the Scan jobs. Chapter 5. Operations: Policy, Quotas, and Alerts 185 Tivoli Storage Resource Manager Scan process The Scan process is used to gather data about files to summarize Usage statistics as specified in the associated profiles Mandatory for Quotas and Constraints management ibm.com/redbooks Figure 5-36 Scans The Scan process gathers statistics about the usage and trends of the server storage. Scan jobs results are stored in the repository and supply the data necessary for the Capacity, Usage, Usage Violations, and Backup Reporting facilities. To create a new scan job, IBM Tivoli SRM -> Monitoring -> Scans, right-click and select New scan. The scope of each Scan job is set by five different tabs on the right pane. Filesystems tab You can specify a specific filesystem for one computer, a filesystem Group (see “Filesystem Groups” on page 165) or all filesystems for a specific computer. Only the filesystems you have selected will be scanned. Figure 5-37 shows how to configure the Scan to gather data on all our servers. Note: Only filesystems found by the Probe process will be available for Scan. 186 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-37 New Scan configuration - Filesystem tab Directory Groups tab Use this tab to extend the scope of the Scan and also summarize data for the selected directories. Only directories in the previously selected filesystems will be scanned. Profiles tab As explained in 5.1.6, “Profiles” on page 180, the Profiles are used to select the files that are scanned for information gathering. A Scan job scans and gathers data only for files that are scoped by selected Profiles. You can specify Profiles at two levels: Filesystems: All selected filesystems will be scanned and data summarized for each filesystem. Directory: All selected directories (if included in the filesystem) will be scanned and data summarized for each directory. Figure 5-38 shows how to configure a Scan to have data summarized at both the filesystem and directory level. Chapter 5. Operations: Policy, Quotas, and Alerts 187 . Figure 5-38 New Scan configuration - Profiles tab When to Scan tab As for the Probe and Ping jobs, the scheduling of the job is specified on the When to Scan tab. Alert tab You can be alerted through mail, script, Windows Event Log, SNMP trap, or Login notification if the Scan job fails. The Scan job may fail if an Agent is unreachable. Click on the floppy icon to save your new Scan job, shown in Figure 5-39. Figure 5-39 New Scan - Save Putting it all together Table 5-2 summarizes the reports views for filesystems and directories that will be available depending on the settings of the Profiles and the Scan jobs. We assume the Profiles have been defined with the Summarize space by Filesystem/Directory option. Note that in order to get reports by filesystem or directory, you need to select either or both in the Scan Profile. 188 IBM Tivoli Storage Resource Manager: A Practical Introduction Table 5-2 Profiles/Scans versus Reports Scan Jobs settings Available reports Filesystem /Computer Directory Filesystem profile Directory profile What is scanned By Filesystem Reports By Directory Reports x - - - FS - - x x - - FS Dir if in specified FS - - x x x - FS Dir if in specified FS x - x x x x FS Dir if in specified FS x x x x x FS Dir scanned if in specified FS x - x x FS x - x - - x FS - - x 5.2 OS Alerts Tivoli Storage Resource Manager enables you to define Alerts on computers, filesystems, and directories. Once the Alerts are defined, it will monitor the results of the Probe and Scan jobs, and will trigger an Alert when the threshold or the condition is met. Tivoli Storage Resource Manager provides a number options for Alert mechanisms from which you can choose depending on the severity you assign to the Alert. Figure 5-40 shows the Alert mechanisms provided by Tivoli Storage Resource Manager. Chapter 5. Operations: Policy, Quotas, and Alerts 189 Tivoli Storage Resource Manager Alert mechanisms Triggers on Computers Filesystems Directories Alert mechanisms SNMP traps TEC events Tivoli SRM GUI alerts Windows Event Logger Scripts Email ibm.com/redbooks Figure 5-40 Alerts mechanisms Depending on the severity of the triggered event or the functions available in your environment, you may want to be alerted with: An SNMP trap to an event manager. Figure 5-41 shows a Filesystem space low Alert as displayed in our SNMP application, IBM Tivoli NetView. Defining the event manager is explained in “Alert Disposition” on page 114. Figure 5-41 Alert - SNMP trap sample A TEC event. See Chapter 5., “Operations: Policy, Quotas, and Alerts” on page 159. 190 IBM Tivoli Storage Resource Manager: A Practical Introduction An entry in the Alert Log (see Figure 5-42). You can configure Tivoli Storage Resource Manager, so that the Alert Log will be automatically displayed when you log on to the GUI by using Preferences -> Edit General (see Figure 5-43). Figure 5-42 Alert - Logged alerts sample Figure 5-43 Alert - Preferences An entry in the Windows Event log, as shown in Figure 5-44. This is useful for lower severity alerts or when you are monitoring your Windows event logs with an automated tool such as IBM Tivoli Distributed Monitoring. Chapter 5. Operations: Policy, Quotas, and Alerts 191 Figure 5-44 Alerts - Windows Event viewer sample Running a specified script - The script runs on the specified computer with the authority of the Agent (root or Administrator). See 5.3.5, “Scheduled actions” on page 229 for special considerations with scripts execution. An e-mail - Tivoli Storage Resource Manager must be configured with a valid SMTP server and port as explained in “Alert Disposition” on page 114. Figure 5-45 shows an example of e-mail notification. Figure 5-45 Alerts - Mail sample 5.2.1 Alerting navigation tree Figure 5-46 shows the complete navigation tree for OS Alerting which includes Computer Alerts, Filesystem Alerts, Directory Alerts, and Alert Log. 192 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-46 OS Alerting tree Except for the Alert Log, you can create multiple definitions for each of those Alert features of Tivoli Storage Resource Manager. To create a new definition, right-click on the feature and select New <feature>. Figure 5-47 shows how to create a new Filesystem Alert. Chapter 5. Operations: Policy, Quotas, and Alerts 193 Figure 5-47 Filesystem alert creation 5.2.2 Computer Alerts Computer Alerts act on the output of Probe jobs (see 5.1.5, “Probes” on page 177) and generate an Alert for each computer that meets the triggering condition. Figure 5-48 shows the configuration screen for a Computer Alert. 194 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-48 Computer alerts - Alerts Alerts tab The Alerts tab contains two parts: Triggering condition to specify the computer component you want to be monitored. You can monitor a computer for: – – – – – – – – – – RAM increased RAM decreased Virtual Memory increased Virtual Memory decreased New disk detected Disk not found New disk defect found Total disk defects exceed. You will have to specify a threshold. Disk failure predicted New filesystem detected Information about disk failures is gathered through commands against disks with the following exceptions: – IDE disks do support only Disk failure predicted queries – AIX SCSI disks do not support failures and predicted failures queries Triggered action where you specify the action that must be executed. Available actions are described in Figure 5-40. If you choose to run a script, it will receive several positional parameters that depends on the triggering condition. The parameters display on the Specify Script panel, which is accessed by checking Run Script and clicking the Define button. Figure 5-49 shows the parameters passed to the script for a RAM decreased condition. Chapter 5. Operations: Policy, Quotas, and Alerts 195 Figure 5-49 Computer alerts - RAM decreased script parameters Figure 5-50 shows the parameters passed to the script for a Disk not found condition. Figure 5-50 Computer alerts - Disk not found script parameters Computers tab This limits the Alert process to specific computers or computer Groups (Figure 5-51). Figure 5-51 Computer alerts - Computers tab 196 IBM Tivoli Storage Resource Manager: A Practical Introduction 5.2.3 Filesystem Alerts Filesystem Alerts will act on the output of Probe and Scan jobs and generate an Alert for each filesystem that meets the specified threshold. Figure 5-52 shows the configuration screen for a Filesystem Alert. Figure 5-52 Filesystem Alerts - Alert Alerts tab As for Computer Alerts, the Alerts tab contains two parts. In the Triggering condition section you can specify to be alerted if a: Filesystem is not found, which means the filesystem was not mounted during the most recent Probe or Scan. Filesystem is reconfigured. Filesystem free space is less than a threshold specified in percent, KB, MB, or GB. Free UNIX filesystem inode count is less than a threshold (either percent or inodes count). You can choose to run a script (click the Define button next to Run Script), or you can also change the content of the default generated mail by clicking on Edit Email. You will see a popup with the default mail skeleton which is editable. Figure 5-53 shows the default e-mail message. Chapter 5. Operations: Policy, Quotas, and Alerts 197 Figure 5-53 Filesystem alert - Freespace default mail 5.2.4 Directory Alerts Directory Alerts will act on the output of Scan jobs. Alerts tab Directory Alerts configuration is similar to Filesystem alerts. The supported triggers are: Directory not found Directory consumes more than the specified threshold set in percent, KB, MB or GB. Directories tab Since Probe jobs do not report on directories and Scan jobs report only on directories. if a directory Profile has been assigned (See “Putting it all together” on page 188) you can only choose to be alerted for any directory that has already been included in a Scan and actually scanned. 5.2.5 Alert logs The IBM Tivoli SRM -> Alerting -> Alert log menu (Figure 5-54) lists all Alerts that have been generated. 198 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-54 Alerts log There are eight different views. Each of them will show only the Alerts related to the selected view except: All view - Shows all Alerts Alerts Directed to <logged user> - Shows all Alerts where the current logged user has been specified in the Login notification field When you click on the icon on the left of a listed Alert, you will see detailed information on the selected Alert as shown in Figure 5-55. Chapter 5. Operations: Policy, Quotas, and Alerts 199 Figure 5-55 Detailed Alert information 5.3 Policy management The Policy Management functions of Tivoli Storage Resource Manager enable you to: Define a filesystem extension policy can be used to automatically increase filesystem capacity for managed hosts when utilization reaches a specified level. The LUN provisioning option can be enabled to extend filesystems within an ESS. Define space limits (Quotas) on storage resources used by user IDs and user groups. This limits can be set at a network (whole environment) at a computer and at a filesystem level. To define space limits (Quotas) on NAS resources used by user IDs and user groups To perform checks (Constraints) on specific files owned by the users and perform any action on those files To schedule scripts against your storage resources 5.3.1 Filesystem extension and LUN provisioning The main functions of Filesystem Extension are shown in Figure 5-56. 200 IBM Tivoli Storage Resource Manager: A Practical Introduction Tivoli Storage Resource Manager Filesystem Extension Automates filesystem extension Supported platforms AIX using JFS SUN using VxFS Support for automatic LUN provisioning with IBM ESS Storage Subsystem Actions triggered through standard Alerting mechanism when a filesystem is performed ibm.com/redbooks Figure 5-56 Filesystem Extension We use filesystem extension policy to automatically extend filesystems when utilization reaches a specified threshold. We can also enable LUN provisioning to extend filesystems within an ESS. To setup filesystem extension policy, select IBM Tivoli SRM -> Policy Management -> Filesystem Extension. Right click on Filesystem Extension and select Create Filesystem Extension Rules. The screen in Figure 5-57 displays. Chapter 5. Operations: Policy, Quotas, and Alerts 201 Figure 5-57 Filesystem tab In the Filesystems tab, select the filesystems which will use filesystem extension policy by moving them to the Current Selections panel. In Figure 5-57 we selected the /opt filesystem. Note the Enabled checkbox - the default is to check it, meaning the rule will be active. If you uncheck the box, it will toggle to Disabled - you can still save the rule, but the job will not run. To specify the extension parameters, select the Extension tab (Figure 5-58). Figure 5-58 Extension tab This tab specifies how a filesystem will be extended. Here are the fields. Amount to Extend We have the following options: 202 IBM Tivoli Storage Resource Manager: A Practical Introduction Add - the amount of space used for extension in MB or GB, or as a percentage of filesystem capacity. Make Freespace - the amount of freespace that will be maintained in the filesystems by this policy. If freespace falls below the amount that is specified, the difference will be added. Freespace can be specified in MB or GB increments, or by a percentage of filesystem capacity. Make Capacity - the total capacity that will be maintained in the selected filesystems. If the capacity falls below the amount specified, the difference will be added. Limit Maximum Filesystem Capacity? When this option is enabled, the Filesystem Maximum Capacity is used in conjunction with the Add or Make Freespace under Amount to Extend. If you enter a maximum capacity for a filesystem in the Filesystem Maximum Capacity field, if a filesystem reaches the specified size, the filesystem will be removed from the policy and an Alert will be triggered. Condition for Filesystem Extension The options are: Extend filesystems regardless of remaining freespace - the filesystem will be expanded regardless of the available free space. Extend filesystems when freespace is less than - defines the threshold for the freespace which will be used to trigger the filesystem expansion. If freespace falls below this value, the policy will be executed. Freespace can be specified in MB or GB increments, or by a percentage of filesystem capacity. Note: If you select Make Capacity under Amount to Extend, the Extend filesystems when freespace is less than option is not available. Use LOG ONLY Mode Enable Do Not Extend Filesystems - Log Only when you want the policy to log the filesystem extension. The extension actions that would have taken place are written to the log file, but no extension takes place. In the Provisioning tab (Figure 5-59) we define LUN provision parameters. Note that LUN provisioning is available at the time of writing for filesystems on an ESS only. Chapter 5. Operations: Policy, Quotas, and Alerts 203 Figure 5-59 LUN provisioning tab LUN Provisioning is an optional feature for filesystem extension. When the Enable Automatic LUN Provisioning is selected, LUN provisioning is enabled. In the Create LUNs that are at least field, you can specify a minimum size for new LUNs. If you select this option, LUNs of at least the size specified will be created. If no size is specified, then the Amount to Extend option specified for the filesystem (in “Amount to Extend” on page 202) will be used. For more information on LUN provisioning, see IBM Tivoli Storage Resource Manager 1.2 User’s Guide. The Model for New LUNs feature means that new LUNs will be created similar to existing LUNs in your setup. At least one ESS LUN must be currently assigned to the Tivoli Storage Resource Manager Agent associated with the filesystem you want to extend. There are two options for LUN modeling: Model new LUNs on others in the volume group of the filesystem being extended provisioned LUNS are modeled on existing LUNs in the extended filesystem’s volume group. Model new LUNs on others on the same host as the filesystem being extended provisioned LUNS are modeled on existing LUNs in the extended filesystem’s volume group. If the corresponding LUN model cannot satisfy the requirements. it will look for other LUNs on the same host. The LUN Source option defines the location of the new LUN in the ESS, and has two options: Same Storage Pool - provisioned LUNs will be created using space in an existing Storage Pool. In ESS terminology this is called the Logical Sub System or LSS. Same Storage Subsystem - provisioned LUNs can be created in any Storage Pool or ESS LSS. The When to Enforce Policy tab (Figure 5-60) specifies when to apply the filesystem extension policy to the selected filesystems. 204 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-60 When to Enforce Policy tab The options are: Enforce Policy after every Probe or Scan automatically enforces the policy after every Probe or Scan job. The policy will stay in effect until you either change this setting or disable the policy. Enforce Policy Now enforces the policy immediately for a single instance. Enforce Policy Once at enforces the policy once at the specified time, specifying the month, day, year, hour, minute, and AM/PM The Alert tab (Figure 5-61) can define an Alert that will be triggered by the filesystem extension job. Chapter 5. Operations: Policy, Quotas, and Alerts 205 Figure 5-61 Alert tab Currently the only available condition is A filesystem extension action started automatically. Refer to “Alerts tab” on page 176 for an explanation of the definitions. Important: After making configuration changes to any of the above filesystem extension options, you must save the policy, as shown in Figure 5-62. If you selected Enforce Policy Now, the policy will be executed after saving. 206 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-62 Save filesystem changes The following sections show examples of the filesystem expansion function. Expanding the filesystem in rootvg (no LUN provisioning) This example shows expanding the /opt filesystem in the root volume group. The current filesystem contents are shown in Example 5-3. Example 5-3 Status of the filesystems before expansion # df -k Filesystem /dev/hd4 /dev/hd2 /dev/hd9var /dev/hd3 /dev/hd1 /proc /dev/hd10opt /dev/lv00 1024-blocks 32768 1277952 49152 344064 16384 65536 524288 Free %Used 17468 47% 339112 74% 40184 19% 167648 52% 15820 4% 55904 15% 63472 88% Iused %Iused Mounted on 1594 10% / 29161 10% /usr 468 4% /var 7018 9% /tmp 18 1% /home - /proc 387 3% /opt 38169 30% /essfs1 # /opt has 64 MB and 15% used space. We created a new Filesystem Expansion rule - IBM Tivoli SRM -> Policy Management -> Filesystem Extension. Right click on Filesystem Extension and select Create Filesystem Extension Rules. We selected the /opt filesystem as shown in Figure 5-63. Chapter 5. Operations: Policy, Quotas, and Alerts 207 Figure 5-63 Selected filesystem In the Extension tab we specified the following values as shown in Figure 5-64: Extend the filesystem by 64MB Extend filesystem regardless of remaining freespace Figure 5-64 Extension parameters We do not need to define anything in the Provisioning tab as the rootvg is not on an ESS. In When to Enforce Policy we specified Enforce policy: Now, this means that the policy will be executed only once. Under Alert, we chose to send an SNMP trap and TEC event when a filesystem extension action was triggered as shown in Figure 5-65. 208 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-65 Alert definition After all the data is entered we save the rule, calling it opt extension. The new definition is now shown in the menu tree as in Figure 5-66. Figure 5-66 Rule for /opt extension We now execute the rule by right clicking on it and selecting Run Now. In Figure 5-67 you can see the successful extension of the /opt filesystem. Chapter 5. Operations: Policy, Quotas, and Alerts 209 Figure 5-67 Successful extension By clicking on the spyglass, you can examine the log of the action, as shown in Figure 5-68. Figure 5-68 Extension log file In Example 5-4 we show the filesystem information after expansion. Example 5-4 Status of the FSes after expansion # df -k Filesystem /dev/hd4 /dev/hd2 /dev/hd9var 210 1024-blocks 32768 1277952 49152 Free %Used 17468 47% 339100 74% 40180 19% Iused %Iused Mounted on 1594 10% / 29164 10% /usr 468 4% /var IBM Tivoli Storage Resource Manager: A Practical Introduction /dev/hd3 /dev/hd1 /proc /dev/hd10opt /dev/lv00 # 344064 16384 262144 2686976 167648 15820 246248 2158280 52% 4% 7% 20% 7018 18 387 38169 9% 1% 1% 6% /tmp /home /proc /opt /essfs1 As you can see from Figure 5-68 the policy was executed three times so the new filesystem size should be 64 MB (original size) + 3 x 64 MB (the increment defined in extension policy) = 256 MB and this is the size which is displayed in Example 5-4. Expanding the filesystem in volume group on ESS (LUN provisioning) For this example we used a filesystem defined on a volume group, essvg1 using an ESS LUN. Example 5-5 shows the volume group definition. Example 5-5 essvg1 volume group definition # lsdev -Cc disk hdisk0 Available hdisk1 Available hdisk2 Available vpath0 Available # lsvpcfg vpath0 (Avail pv # 10-80-00-4,0 16 Bit SCSI Disk Drive 1P-18-01 IBM FC 2105F20 1P-18-01 IBM FC 2105F20 Data Path Optimizer Pseudo Device Driver essvg1) 30918921 = hdisk1 (Avail ) hdisk2 (Avail ) The volume group is defined on the vpath0 device which represents an ESS LUN with serial number 30918921. The vpath device is used as we have two paths to the physical LUN. See the Subsystem Device Driver documentation for explanation of vpath device functionality. The filesystem is mounted on /essfs1 and is defined on logical volume /dev/lv00 as shown in Example 5-4. The command lslv lv00 shows the information about the logical volume, including its containing volume group. See Example 5-6. Example 5-6 Logical volume information for /dev/lv00 # lslv lv00 LOGICAL VOLUME: lv00 VOLUME GROUP: essvg1 LV IDENTIFIER: 0041f12b00004c00000000f5a9cf986f.1 PERMISSION: read/write VG STATE: active/complete LV STATE: opened/syncd TYPE: jfs WRITE VERIFY: off MAX LPs: 512 PP SIZE: 64 megabyte(s) COPIES: 1 SCHED POLICY: parallel LPs: 96 PPs: 96 STALE PPs: 0 BB POLICY: relocatable INTER-POLICY: minimum RELOCATABLE: yes INTRA-POLICY: middle UPPER BOUND: 32 MOUNT POINT: /essfs1 LABEL: /essfs1 MIRROR WRITE CONSISTENCY: on/ACTIVE EACH LP COPY ON A SEPARATE PV ?: yes # In Example 5-4 you can see the current /essfs1 filesystem size which is 2.56GB. We will now define the Filesystem Expansion Rule following the steps in “Expanding the filesystem in rootvg (no LUN provisioning)” on page 207. Chapter 5. Operations: Policy, Quotas, and Alerts 211 We selected /essfs1 as the filesystem for expansion as shown in Figure 5-69. Figure 5-69 /essfs1 filesystem expansion definition The Extension parameters are shown in Figure 5-70. Figure 5-70 Extension parameters for /essfs1 FS We defined to add 2GB on each expansion, which will trigger when the filesystem has less than 75% free space. As the volume group is on an ESS, we defined Provisioning parameters (Figure 5-71). 212 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-71 Provisioning parameters We defined to model the LUNs on LUNs which are already in the volume group, and to create them anywhere in the ESS. In When to Enforce Policy we specified Enforce policy: Now, this means that the policy will be executed only once or when we will manually run it. In the Alert tab we defined to send an SNMP trap and TEC event when a filesystem extension action was triggered. We saved the rule and called it essfs1 extension. Now we create some data to fill the disk. Example 5-7 shows /essfs1 at 80% utilization. Example 5-7 essfs1 filled up # df -k Filesystem /dev/hd4 /dev/hd2 /dev/hd9var /dev/hd3 /dev/hd1 /proc /dev/hd10opt /dev/lv00 # 1024-blocks 32768 1277952 49152 344064 16384 262144 2686976 Free %Used 17468 47% 339100 74% 40180 19% 167648 52% 15820 4% 246248 7% 556704 80% Iused %Iused Mounted on 1594 10% / 29164 10% /usr 468 4% /var 7018 9% /tmp 18 1% /home - /proc 387 1% /opt 38171 6% /essfs1 Now we run the filesystem extension policy. Figure 5-72 shows the filesystem extension was successfully completed, extending /essfs1 by 2GB. Chapter 5. Operations: Policy, Quotas, and Alerts 213 Figure 5-72 Filesystem extension on /essfs1 filesystem The df -k output also shows the difference as in Example 5-8. The new size is 4.56GB. Example 5-8 /essfs1 filesystem after expansion # df -k Filesystem /dev/hd4 /dev/hd2 /dev/hd9var /dev/hd3 /dev/hd1 /proc /dev/hd10opt /dev/lv00 # 1024-blocks 32768 1277952 49152 344064 16384 262144 4784128 Free %Used 17468 47% 339100 74% 40180 19% 167648 52% 15820 4% 246248 7% 2588024 46% Iused %Iused Mounted on 1594 10% / 29164 10% /usr 468 4% /var 7018 9% /tmp 18 1% /home - /proc 387 1% /opt 38171 4% /essfs1 As the /essfs1 free space is still below 75%, we ran the rule again and the filesystem was expanded again. The result can be seen in Example 5-9. Example 5-9 /essfs1 after second expansion # df -k Filesystem /dev/hd4 /dev/hd2 /dev/hd9var /dev/hd3 /dev/hd1 /proc /dev/hd10opt 214 1024-blocks 32768 1277952 49152 344064 16384 262144 Free %Used 17468 47% 339100 74% 40180 19% 167648 52% 15820 4% 246248 7% Iused %Iused Mounted on 1594 10% / 29164 10% /usr 468 4% /var 7018 9% /tmp 18 1% /home - /proc 387 1% /opt IBM Tivoli Storage Resource Manager: A Practical Introduction /dev/lv00 # 6881280 4619352 33% 38171 3% /essfs1 The new size is 6.56GB. Until now, the filesystem expansion did not require a new LUN as the existing LUN for the essvg1 volume group was 8GB, as shown with the command lspv vpath0 in Example 5-10. Example 5-10 vpath0 LUN size # lspv vpath0 PHYSICAL VOLUME: PV IDENTIFIER: PV STATE: STALE PARTITIONS: PP SIZE: TOTAL PPs: FREE PPs: USED PPs: FREE DISTRIBUTION: USED DISTRIBUTION: # vpath0 VOLUME GROUP: essvg1 0041f12ba9cf89ec VG IDENTIFIER 0041f12b00004c00000000f5a9cf986f active 0 ALLOCATABLE: yes 64 megabyte(s) LOGICAL VOLUMES: 2 126 (8064 megabytes) VG DESCRIPTORS: 2 20 (1280 megabytes) HOT SPARE: no 106 (6784 megabytes) 00..00..00..00..20 26..25..25..25..05 As the /essfs1 free space is still below 75% we ran the rule again and the filesystem was expanded again. The result can be seen in Example 5-11. Example 5-11 /essfs1 after third expansion # df -k Filesystem /dev/hd4 /dev/hd2 /dev/hd9var /dev/hd3 /dev/hd1 /proc /dev/hd10opt /dev/lv00 # 1024-blocks 32768 1277952 49152 344064 16384 262144 8978432 Free %Used 17460 47% 339084 74% 40072 19% 167648 52% 15820 4% 246248 7% 6650672 26% Iused %Iused Mounted on 1601 10% / 29166 10% /usr 468 4% /var 7018 9% /tmp 18 1% /home - /proc 387 1% /opt 38171 2% /essfs1 The partial log file for the third expansion is shown in Figure 5-73. Chapter 5. Operations: Policy, Quotas, and Alerts 215 Figure 5-73 LUN provisioning for /essfs1 filesystem As shown in the log, a new LUN of 2GB was required to accommodate another filesystem expansion. After the provisioning the ESS LUN, it was added to the essvg1 volume group and the filesystem was expanded as shown in Example 5-11 on page 215. The lsvpcfg command shows the new LUN in the essvg1 volume group (Example 5-12). Example 5-12 New LUN in essvg1 volume group # lsvpcfg vpath0 (Avail pv essvg1) 30918921 = hdisk1 (Avail ) hdisk2 (Avail ) vpath1 (Avail pv essvg1) 20018921 = hdisk3 (Avail ) hdisk4 (Avail ) # the lspv vpath1 command shows the physical attributes of the new LUN (Example 5-13). Example 5-13 New LUN attributes # lspv vpath1 PHYSICAL VOLUME: PV IDENTIFIER: PV STATE: STALE PARTITIONS: PP SIZE: TOTAL PPs: FREE PPs: USED PPs: FREE DISTRIBUTION: USED DISTRIBUTION: # 216 vpath1 VOLUME GROUP: essvg1 0041f12bc3650604 VG IDENTIFIER 0041f12b00004c00000000f5a9cf986f active 0 ALLOCATABLE: yes 64 megabyte(s) LOGICAL VOLUMES: 1 32 (2048 megabytes) VG DESCRIPTORS: 1 20 (1280 megabytes) HOT SPARE: no 12 (768 megabytes) 07..00..00..06..07 00..06..06..00..00 IBM Tivoli Storage Resource Manager: A Practical Introduction The size of the newly created LUN was as specified in the filesystem expansion rule. Even though we selected to model LUNs after existing LUNs in the volume group, the size was defined by the filesystem expansion as it is not part of the modeling algorithm. Tip: If you wish to maintain the same LUN size in the volume group, it is recommended to match the filesystem expansion size to the size of the LUNs used in volume group. From the new LUN serial number 20018921 as shown in Example 5-12 we can see that it was created in a different Storage Pool or LSS inside the ESS. The original LUN was in LSS 0x13 (as identified by serial number which starts with 3xx) and the new one is in LSS 0x12 (as identified by serial number starting with 2xx). The reason for the new LUN being created in another LSS is that the original LSS is full, therefore there is no space for new LUNs. We selected the option to create new LUNs anywhere in the ESS in our expansion rule. You can see the physical representation of LUNs from the ESS Specialist in Figure 5-74. LSS 0x12 LSS 0x12 LSS 0x13 Figure 5-74 ESS LUNs for filesystem expansion On this screen, the selected icon with label 43P_0 represents the host definition in the ESS for the server which was used in the LUN provisioning example in this section. 5.3.2 Quotas The main functionality of Quotas are displayed in Figure 5-75. Chapter 5. Operations: Policy, Quotas, and Alerts 217 Tivoli Storage Resource Manager User Quotas Help monitor space used by users and user groups Quotas can be set for the whole network specific computers specific filesystems Actions triggered through standard Alerting mechanism when a quota is exceeded ibm.com/redbooks Figure 5-75 Quotas Quotas can be set at either a user or at an OS User Group level. For the OS User Group level, this could be either an OS User Group, (see “OS User Group Groups” on page 171), or a standard OS group (such as system on UNIX, or Administrators on Windows). The User Quotas trigger an action when one of the monitored users has reached the limit while the OS User group Quotas trigger the action when the sum of space used by all users of monitored groups has reached the limit. The Quotas definition mechanism is the same for both except for: The menu tree to use: – IBM Tivoli SRM -> Policy Management -> Quotas -> User – IBM Tivoli SRM -> Policy Management -> Quotas -> OS User group The monitored elements you can specify: – User and user groups for User Quotas – OS User Group and OS User Group Groups for OS User Group Quota We will show how to configure User Quotas. User Group Quotas are configured similarly. Note that the Quota enforcement is soft - that is, users are not automatically prevented from exceeding their defined Quota, but the defined actions will trigger if that happens. There are three sub-entries for Quotas: Network Quotas, Computer Quotas, and Filesystem Quotas Network Quotas A Network Quota defines the maximum cumulated space a user can occupy on all the scanned servers. An Alert will be triggered for each user that exceeds the limit specified in the Quota definition. 218 IBM Tivoli Storage Resource Manager: A Practical Introduction Use IBM Tivoli SRM -> Policy Management -> Quotas -> User -> Network, right-click and select New Quota to create a new Quota. The right pane displays the Quota configuration screen with four tabs. Users tab Figure 5-76 shows the Users tab for Network Quotas. Figure 5-76 User Network Quotas - Users tab From the Available column, select any user ID or OS User Group you want to monitor for space usage. The Profile pull-down menu is used to specify the file types that will be subject to the Quota. The list will display all Profiles that create summaries by user (by file owner). Select the Profile you want to use from the pull-down. The default Profile Summary by Owner collects information about all files and summarizes them on the user level. The ALLGIFFILES profile collects information about GIF files and creates a summary at a user level as displayed in Figure 5-77. This (non-default) profile was created using the process shown in 5.1.6, “Profiles” on page 180. Chapter 5. Operations: Policy, Quotas, and Alerts 219 Figure 5-77 Profile with user summary Using this profile option, we can define general Quotas for all files and more restrictive Quotas for some multimedia files such as GIF and MP3. Filesystem tab On the Filesystem tab shown Figure 5-78, select the filesystems or computers you want to be included in the space usage for Quota management. Figure 5-78 User Network Quotas - Filesystem tab In this configuration, for each user, his cumulated space usage on all servers will be calculated and checked against the Quota limit. 220 IBM Tivoli Storage Resource Manager: A Practical Introduction When to check The Quota management is based on the output of the Scan jobs. Therefore, each Quota definition must be scheduled to run after the Scan jobs that collect the adequate information. The When to CHECK tab is standard, and allows you to define a one off or a recurring job. Alert tab On the Alert tab, specify the Quota limit in: KB, MB or GB, and the action to run when the Quota is exceeded. Figure 5-79 User Network Quotas - Alert tab You can choose from the standard Alerts type available with Tivoli Storage Resource Manager. Each Alert will be fired once for each user exceeding their Quota. We have selected to run a script that we wrote, QUOTAUSERNET.BAT, listed in Example 5-14. Example 5-14 QUOTAUSERNET.BAT script echo NETWORK quota exceeded - %1 %2 uses %3 - Limit set to %4 >>quotausernet.txt Example 5-15 shows the output file created by QUOTAUSERNET.BAT. Example 5-15 Content of quotausernet.txt NETWORK quota exceeded - user root uses 8.22GB - Limit set to 5.0GB NETWORK quota exceeded - user Administrators@BUILTIN uses 9.61GB - Limit set to 5.0GB The Alert has fired for user root and Administrators. This clearly shows that administrative users such as root and Administrators should not normally be included in standard Quotas monitoring. Chapter 5. Operations: Policy, Quotas, and Alerts 221 Computer Quotas Computer Quotas enable you to fire Alerts when a user exceeds their space Quota on a specific computer. Multiple Alerts are generated if a user violates the Quota on separate computers as shown in Figure 5-80. Figure 5-80 Computer Quota - Alerts log Here, we received an Alert that the root user exceeded the Quota on the computers CRETE, SOL-E, BRAZIL, and EASTER. Another Alert was generated for user itso_hb, because it exceeded the Quota on the system BRAZIL. Filesystem Quotas A Filesystem Quota defines a space usage limit at the filesystem level. An Alert will be fired for each filesystem where a user exceeds the limit specified in the Quota definition. Use IBM Tivoli SRM -> Policy Management -> Quotas -> User -> Filesystem, right-click, and select New quota to create a new Quota. After setting up and running a Quota for selected filesystems, we received the following entries in the Alert History, shown in Figure 5-81. 222 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-81 Filesystem Quota - Alerts log We see that four Alerts have been fired for CRETE: User bin on /usr User root on / User root on /tmp User root on /user We also see down to the filesystem level on BRAZIL for the user itso_hb, who generated an Alert in “Computer Quotas” on page 222. 5.3.3 Network Appliance Quotas Using IBM Tivoli SRM -> Policy Management -> Network Appliance Quotas -> Schedules, you can compare the space used by users against Quotas defined inside Network Appliance filers, using the appropriate software, and raise an Alert whenever a user is close to reaching the NetApp Quota. When you run a Network Appliance Quota job, the NetApp Quota definitions will be imported into Tivoli Storage Resource Manager for read-only purposes. Note: Network Appliance Quotas jobs must be scheduled after the Scan jobs, since they use the statistics gathered by the latest Scan to trigger any NetApp Quota violation. With IBM Tivoli SRM -> Policy Management -> Network Appliance Quotas -> Imported User Quotas and Imported OS User Group Quotas, you can view the definitions of the Quotas defined on your NetApp filers. Chapter 5. Operations: Policy, Quotas, and Alerts 223 5.3.4 Constraints The main features of Constraints are displayed in Figure 5-75. Tivoli Storage Resource Manager Constraints Reports and triggers actions based on specific files which use too much space on monitored servers Files can be selected based on server and filesystem name pattern (eg: *.mp3, *.avi) owner age size attributes Actions triggered through standard Alerting mechanism when total space used by files exceeds a threshold ibm.com/redbooks Figure 5-82 Constraints Constraints are used to generate Alerts when files matching specified criteria are consuming too much space on the monitored servers. Constraints provide a deeper level of Storage Resource Management. Quotas will allow reporting on users who have exceeded their space limitations. With Constraints, we can get more detailed information to specify limits on particular file types or other attributes, such as owner, age, and so on. The output of a Constraint when applied to a Scan will return a list of the files that are consuming too much space. Note: Unlike Quotas, Constraints are automatically checked during Scan jobs and do not need to be scheduled. Also, the Scan does not need to be associated with Profiles that will cause data to be stored for reporting. Filesystems tab This Filesystems tab helps you to select the computers and filesystems you want to be checked for the current Constraint. The selection method for computers and filesystems is the same as for Scan jobs (see 5.1.7, “Scans” on page 185). File Types tab On the File Types tab, you can explicitly allow or disallow certain file patterns (Figure 5-83). 224 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-83 Constraint - File Types Use the buttons on the top of the screen, to allow or forbid files depending on their name. The left column shows some default file patterns, or you can use the bottom field to create your own pattern. Click >> to add your pattern to the allowed/forbidden files. Users tab The Users tab (figured in Figure 5-84) is used to allow or restrict the selected users in the Constraint. Figure 5-84 Constraint - Users Chapter 5. Operations: Policy, Quotas, and Alerts 225 Important: The file condition is logically ORed with the User condition. A file will be selected for Constraint processing if it meets at least one of the conditions. Options tab The Options tab provides additional conditions for file selection, and limits the number of selected files to store in the central repository. Once again, the conditions added in the tab will be logically ORed with the previous set in the File Types and Users tab. The bottom part of the tab, shown in Figure 5-85, contains the textual form of the Condition, taking into account all the entries made in the Filesystems, File Types, Users and Options tabs. Figure 5-85 Constraints - Options You can change this condition or add additional conditions, by using the Edit Filter button. It displays the file filter popup (Figure 5-86) to change, add, and remove conditions or conditions groups as previously explained in 5.1.6, “Profiles” on page 180. 226 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-86 Constraints - File filter We changed the file filter to a more appropriate one by changing the OR operator to AND. Figure 5-87 Constraints - File filter changed Alert tab After selecting the files, you may want to generate an Alert only if the total used space meeting the Constraint conditions exceeds a predefined limit. Use the Alert tab to specify the triggering condition and action. Chapter 5. Operations: Policy, Quotas, and Alerts 227 Figure 5-88 Constraints - Alert In our Constraint definition, a script is triggered for each filesystem where the selected files exceed one Gigabyte. We select the script by checking the Run Script option and selecting Define ... as shown in Figure 5-89. The script will be passed several parameters including a path to a file that contains the list of files meeting the Constraint. You can use this list to execute any action including delete or archive commands. Figure 5-89 Constraints - Script parameters 228 IBM Tivoli Storage Resource Manager: A Practical Introduction Our example uses a sample script (tsm_arch_del.vbs) which is shipped with Tivoli Storage Resource Manager, which archives all the files in the produced list to a Tivoli Storage Manager server, and then deletes them from local storage. This script is installed with the Tivoli Storage Resource Manager server, and stored in the scripts subdirectory of the server installation. It can be edited or customized if required - we recommend that you save the original files first. Versions for Windows (tsm_arch_del.vbs) and UNIX (tsm_arch_del) are provided. If you will run this Constraint on a UNIX agent, then PERL is required to be installed on the agent. A Tivoli Storage Manager server must be available and configured for this script to work. For more information on the sample scripts, see Appendix A of the IBM Tivoli Storage Resource Manager User’s Guide, SC32-9069. 5.3.5 Scheduled actions Figure 5-90 shows the main functionality of Scheduled actions. Tivoli Storage Resource Manager Scheduled actions Scheduling tool Allow automated script execution on selected computers on selected computer groups Alert raised when a script fails ibm.com/redbooks Figure 5-90 Scheduled actions Tivoli Storage Resource Manager comes with an integrated tool to schedule script execution on any of the Agents. If a script fails due to an unreachable Agent, the standard Alert processes can be used. To create a Scheduled action, select Scheduled Actions -> Scripts, and right-click on New Script. Computers tab On the Computers tab, select the computers or computer groups to execute the script. Script Options tab From the pull-down field, select a script that exists on the server. You can also enter the name of a script not yet existing on the server or that only resides on the Agents. Chapter 5. Operations: Policy, Quotas, and Alerts 229 See 3.2.2, “Scripts” on page 51 for an explanation of server/Agent scripts execution rules. The Script options tab is shown in Figure 5-91. Figure 5-91 Scheduled action - Script options The Script Name pull-down field lists all files (including non-script files) in the servers’ script directory. Attention: For Windows Agents, the script must have an extension that has an associated script engine on the computer running the script (for example: .BAT, .CMD, or .VBS). For UNIX Agents: The extension is removed from the specified script name The path to the shell (for example, /bin/bsh, /bin/ksh) must be specified in the first line of the script If the script is located in a Windows Tivoli Storage Resource Manager Server scripts directory, the script must have been created on a UNIX platform, and then transferred in binary mode to the Server or you can use UNIX OS tools such as dos2unix to convert the scripts. This will ensure that the CR/LF characters are correctly inserted for execution under UNIX. When to Run tab As for other Tivoli Storage Resource Manager jobs, you can choose to run a script once or repeatedly at a predefined interval. Alerts tab With the Alert tab you can choose to be notified when a script fails due to an unreachable Agent or a script not found condition. The standard Alert Mechanism described in 5.2, “OS Alerts” on page 189 is used. 5.4 Database monitoring The Monitoring functions of Tivoli Storage Resource Manager are extended to databases when the license key for Tivoli Storage Resource Manager for Databases is enabled. Currently, MS SQL-Server, Oracle, DB2, and Sybase are supported. 230 IBM Tivoli Storage Resource Manager: A Practical Introduction We will now review the Groups, Probes, Scans, and Profiles definitions for Tivoli Storage Resource Manager for Databases, and show the main differences compared to the core Tivoli Storage Resource Manager monitoring functions. Figure 5-92 shows the navigation tree for Tivoli Storage Resource Manager for Databases. Figure 5-92 Databases - Navigation Tree 5.4.1 Groups To get targeted monitoring of your database assets, you can create Groups consisting of: Computers Databases-Tablespaces Tables Users Computer Groups All databases residing on the selected computers will be probed, scanned, and managed for Quotas. The groups you have created using Tivoli Storage Resource Manager remain available for Tivoli Storage Resource Manager for Databases. If you create a new Group, the computers you put in it will be removed from the Group they currently belong to. To create a Computer Group, use IBM Tivoli SRM for Databases -> Monitoring -> Groups -> Computer, right-click, and select New Group. “Computer Groups” on page 163 gives more information on creating Computer Groups. Databases-Tablespaces Groups Creating Groups with specific databases and tablespaces may be useful for applying identical management rules for databases with the same functional role within your enterprise. Chapter 5. Operations: Policy, Quotas, and Alerts 231 An example could be to create a group with all the SQL-Server system databases, as you will probably apply the same rules for space and alerting on those databases. This is shown in Figure 5-93. Figure 5-93 Database group definition Table Groups You can use Table Groups to create Groups of the same set of tables for selected or all database instances. You can use two different views to create a table group: Tables by instance selects several tables for one instance. Instances by table selects several instances for one table. You can combine both views as each entry you add will be added to the group. User Groups As for core Tivoli Storage Resource Manager, you can put user IDs in groups. The user groups you create will be available for the whole Tivoli Storage Resource Manager product set. Tip: The Oracle and MS SQL-Server user IDs (SYSTEM, sa, ...) are also included in the available users list after the first database Probe. 5.4.2 Probes The Probe process is used to gather data about the files, instances, logs, and objects that make up monitored databases. The results of Probe jobs are stored in the repository and are used to supply the data necessary for Asset Reporting. Use IBM Tivoli SRM for Databases -> Monitoring -> Probe, right-click, and select New probe to define a new Probe job. In the Instance tab of the Probe configuration, you can select specific instances, computers, and computer groups. 232 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 5-94 Database Probe definition The Computers list contains only computers that have been licensed for Tivoli Storage Resource Manager for Databases. The product licensing procedure is described in “License Keys” on page 108. 5.4.3 Profiles As for Tivoli Storage Resource Manager, Profiles in Tivoli Storage Resource Manager for Databases are used to determine the databases attributes that are to be scanned. They also determine the summary level and retention time to keep in the repository. Use IBM Tivoli SRM for Databases - Monitoring - Profile, right-click, and select New profile to define a new profile. Figure 5-95 shows the Profile definition screen. Figure 5-95 Database profile definition Chapter 5. Operations: Policy, Quotas, and Alerts 233 You can choose to gather data on tables size, database extents, or database free space and summarize the results at the database or user level. 5.4.4 Scans Scan jobs in Tivoli Storage Resource Manager for Databases collect statistics about the storage usage and trends within your databases. The gathered data is used as input to the usage reporting and Quota analysis. Defining a Scan job requires defining: The database, computer, and instances to Scan The tables to monitor for detailed information such as size, used space, indexes, rows count The profile that will determine the data that is gathered and the report views that will be made available by the Scan The job scheduling frequency Oracle-only additional options to gather information about pages allocated to a segment that has enough free space for additional rows The alerting mechanism to use should the Scan fail All this information is set through the Scan definition screen that contains one tab for each previously listed item. To define a new Scan, select IBM Tivoli SRM for Databases -> Monitoring -> Scan, right-click and select New scan as in Figure 5-96. Figure 5-96 Database Scan definition Note: If you request detailed scanning of tables, the tables will only be scanned if their respective databases have also been selected for scanning. 234 IBM Tivoli Storage Resource Manager: A Practical Introduction 5.5 Database Alerts Tivoli Storage Resource Manager for Databases enables you to define Alerts on instances, databases, and tables. The Probe and Scan jobs output are processed and compared to the defined alerts. If a threshold is reached, an Alert will be triggered. Tivoli Storage Resource Manage for Databases uses the standard Alert mechanisms described in 5.2, “OS Alerts” on page 189. 5.5.1 Instance Alerts IBM Tivoli SRM for Databases -> Alerting -> Instance Alerts, right-click and select New alert lets you define some alerts as shown in Table 5-3. Those Alerts are triggered during the Probe process. Table 5-3 Instance Alerts Alert type Oracle New database discovered New tablespace discovered x Archive log contains more than X units x Sybase MSSQL x x New device discovered x Device dropped x Device free space greater than X units x Device free space less than X units x An interesting Alert is the Archive log contains more than for Oracle, since the Oracle application can hang if there is no more space available for its archive log. This Alert can be used to monitor the space used by in this specific directory and trigger a script that will archive the files to an external manager such as Tivoli Storage Manager once the predefined threshold is reached. Here is the procedure: 1. We defined an Instance Alert and selected the Archive log contains more than condition. We also specified that the script ARCHORA.BAT must be executed when the Alert is fired. Note the parameters passed to the script. Chapter 5. Operations: Policy, Quotas, and Alerts 235 Figure 5-97 Instance Alert definition 2. As the archive command must run on the server where Oracle resides, we set Triggering Computer in the Where to run pull-down field. This does not means that the script must be physically copied on the monitored server. 3. On the Instance tab, we selected our Oracle server (GALLIUM) and we saved the Alert as ArchiveOracleLog. Example 5-16 shows a sample script which we have written, ARCHORA.BAT, which will archive the Oracle logs to a Tivoli Storage Manager server, and then delete them after archive. It assumes you already have a Tivoli Storage Manager Server and client defined and configured for your environment. Note this is a sample only, and should be customized and tested for your environment. Example 5-16 ARCHORA.BAT - Archive to TSM script @ECHO OFF REM Display starting messages REM ------------------------echo ARCHORA.BAT starting ... echo on server %2 echo to archive %3 logs for instance %4 echo Directory to process : %1 echo Expecting %5 files to be archived for a total size of %6 REM Perform basic checks on db type and directory REM --------------------------------------------if not %3 == Oracle GOTO NOTORACLE if not exist %1 GOTO DIRNOTEXIST REM Execute archive TSM command REM --------------------------set logfile=ARCHORA.LOG CD C:\Program files\Tivoli\tsm\baclient 236 IBM Tivoli Storage Resource Manager: A Practical Introduction @echo on dir %1\ARC*.* dsmc archive %1\ARC*.* -subdir=no -delete -descr="%2 %3 %4 ArchiveLogs" -verbose @echo off if not %errorlevel% == 0 GOTO DSMCERROR @echo on dir %1\ARC*.* echo ARCHORA.BAT ended successfully ... exit 0 :NOTORACLE echo Error - Not Oracle database exit 4 :DIRNOTEXIST echo Error - Directory does not exist exit 4 :DSMCERROR echo Error while running DSMC command dir %1\ARC*.* type dsmerror.log When the Probe job is run against the GALLIUM server, an Alert is fired. You can see its output in Figure 5-98. Figure 5-98 Instance Alert output 5.5.2 Database-Tablespace Alerts To define a Database-Tablespace Alert, select IBM Tivoli SRM for Databases -> Alerting -> Database-Tablespace Alerts, right-click, and select New alert. You can define various monitoring options on your databases as shown in Table 5-3. Those Alerts are triggered during the Probe process. Chapter 5. Operations: Policy, Quotas, and Alerts 237 Table 5-4 Instance alerts Alert type Oracle Sybase MSSQL Database/Tablespace freespace lower than x x x Database/Tablespace offline x x x Database/Tablespace dropped x x x Freespace fragmented in more than n extents x Largest free extent lower than x Database Log freespace lower than x x Last dump time previous to n days x To avoid a Log Full condition, we will define an Alert to monitor log usage on our MS SQL-Server database. When the log reaches 70% utilization, the Alert will trigger and perform a backup of the transaction log. Figure 5-99 Database alert definition The script specified is SQLBKPLOG.BAT, listed in Example 5-17. Example 5-17 MSSQL Log backup utility @ECHO OFF REM Display starting messages REM ------------------------echo SQLBKPLOG.BAT starting ... echo on server %2 echo Transaction log of %3 database %4/%1 reaches %7 of its capacity echo Performing transaction log backup REM 238 Perform basic checks on db type and directory IBM Tivoli Storage Resource Manager: A Practical Introduction REM --------------------------------------------if not %3 == "MicroSoft SQL/Server" GOTO NOTSQL REM Execute backup command REM ---------------------CD C:\Program Files\Microsoft SQL Server\MSSQL\Backup echo Current Log backups echo ------------------dir %1_Tlog* cd ..\binn @echo on sqlmaint -D %1 -BkUpLog -BkUpMedia DISK -UseDefDir if not %errorlevel% == 0 GOTO SQLERROR @echo off echo New Log backups echo --------------cd ..\Backup dir %1_Tlog* echo SQLBKPLOG.BAT ended successfully ... exit 0 :NOTSQL echo Error - Not MSSQL database exit 4 :SQLERROR echo Error while running SQLMAINT command exit 4 Example 5-18 shows the output of the Alert log. Example 5-18 Alert log output 09-18 16:36:25 AGT0133I: Running Command: BKPSQLLOG.BAT Northwind gallium "MicroSoft SQL/Server" gallium 525.0KB 80% 51.27% --------------------- BEGIN OUTPUT --------------------SQLBKPLOG.BAT starting ... on server gallium Transaction log of "MicroSoft SQL/Server" database gallium/Northwind reaches 51.27% of its capacity Performing transaction log backup Current Log backups ------------------Volume in drive C has no label. Volume Serial Number is 3C32-1025 Directory of C:\Program Files\Microsoft SQL Server\MSSQL\BACKUP 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 02:28p 82,432 northwind_tlog_200209181428.BAK 02:47p 345,600 northwind_tlog_200209181447.BAK 03:21p 82,432 Northwind_tlog_200209181521.BAK 03:24p 15,872 Northwind_tlog_200209181524.BAK 03:28p 15,872 Northwind_tlog_200209181528.BAK 03:29p 15,872 Northwind_tlog_200209181529.BAK 04:25p 82,432 Northwind_tlog_200209181625.BAK 04:26p 15,872 Northwind_tlog_200209181626.BAK 8 File(s) 656,384 bytes 0 Dir(s) 10,313,953,280 bytes free C:\Program Files\Microsoft SQL Server\MSSQL\Binn>sqlmaint -D Northwind -BkUpLog -BkUpMedia DISK -UseDefDir Chapter 5. Operations: Policy, Quotas, and Alerts 239 C:\Program Files\Microsoft SQL Server\MSSQL\Binn>if not 0 == 0 GOTO SQLERROR New Log backups --------------Volume in drive C has no label. Volume Serial Number is 3C32-1025 Directory of C:\Program Files\Microsoft SQL Server\MSSQL\BACKUP 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 09/18/2002 02:28p 82,432 northwind_tlog_200209181428.BAK 02:47p 345,600 northwind_tlog_200209181447.BAK 03:21p 82,432 Northwind_tlog_200209181521.BAK 03:24p 15,872 Northwind_tlog_200209181524.BAK 03:28p 15,872 Northwind_tlog_200209181528.BAK 03:29p 15,872 Northwind_tlog_200209181529.BAK 04:25p 82,432 Northwind_tlog_200209181625.BAK 04:26p 15,872 Northwind_tlog_200209181626.BAK 04:36p 15,872 Northwind_tlog_200209181636.BAK 9 File(s) 672,256 bytes 0 Dir(s) 10,313,867,264 bytes free SQLBKPLOG.BAT ended successfully ... ---------------------- END OUTPUT ---------------------09-18 16:36:26 AGT0131I: Exit Status = 0 5.5.3 Table Alerts To define a new Table Alert, use IBM Tivoli SRM for Databases -> Alerting -> Table Alerts, right-click, and select New alert. With this option you can set up monitoring on database tables. The Alerts that can be triggered for a table are shown below. Those Alerts are triggered during the Scan processes and only if the Scan includes a Table Group. Table 5-5 Table alerts Alert type Oracle Sybase MsSQL Total Table Size Greater Than x x x Table Dropped x x x (Max Extents - Allocated) < x Segment Has More Than x Chained Row Count Greater Than x Empty Used Segment Space Exceeds x Forwarded Row Count Greater Than x 5.5.4 Alert log The IBM Tivoli SRM for Database - Alerting - Alert log menu lists all Alerts that have been fired by the Probe jobs, the Scan jobs, the defined Alerts, and the violated Quotas. Tip: Please refer to 5.2.5, “Alert logs” on page 198 for more information about using the Alert log tree. 240 IBM Tivoli Storage Resource Manager: A Practical Introduction 5.6 Databases policy management The Policy Management functions of Tivoli Storage Resource Manager for Databases enable you to: Define space limits (Quotas) on database space used by tables owners. Those limits can be set at a network (whole environment), at an instance or at a database level. Schedule scripts against your database resources 5.6.1 Network Quotas A Network Quota will define the maximum cumulated space a user can occupy on all the scanned databases. An Alert will be fired for each user that exceeds the limit specified in the Quota definition. We used IBM Tivoli SRM for Databases - Policy Management - Quotas - Network, right-click and select New quota to create a new Quota. The right pane will switch to a Quota configuration screen with four tabs. Users tab On the Users tab, specify the database users you want to be monitored for Quotas. You can also select a profile in the Profile pull-down field on the top right of the tab. In this field, you can select any Profile that stores summary data on a user level. The Quota will only be fired for databases that have been scanned using this Profile. Figure 5-100 Database Quota - Users tab Database-Tablespace tab Use this tab to restrict Quota checking to certain databases. You can choose several databases or computers. If you choose a computer, all the databases running on it will be included for Quota management. When to run tab As for Tivoli Storage Resource Manager, you can select the time to run from: Immediate Chapter 5. Operations: Policy, Quotas, and Alerts 241 Once at a schedule date and time Repetitive at predefined intervals Alert tab On the Alert tab you can specify the space limit allowed for each user and the action to run. If no action is selected, the Quota violation will only be logged in the Alert log. 5.6.2 Instance Quota The Instance Quota mechanism is similar to the Network Quota, except that it is set at the instance level. Whenever a user reaches the Quota on one instance, an Alert will be fired. 5.6.3 Database Quota With Database Quota, the Quota is set at the database level. Each monitored user will be reported back as soon as he reaches the limit on at least one of the monitored database. 5.7 Database administration samples We now list some typical checks done regularly by Oracle database administrators and show how they can be automated using Tivoli Storage Resource Manager for Databases. 5.7.1 Database up Tivoli Storage Resource Manager for Databases can be used to test for database availability using Probe and Scan jobs since they will fail and trigger an Alert if either the database or the listener is not available. Since those jobs use system resources to execute, you may instead choose scheduled scripts to test for database availability. Due to limited scheduling options and the need for user-written scripts, we recommend using dedicated monitoring products such as Tivoli Monitoring for Databases. 5.7.2 Database utilization There are a number of different levels where system utilization can be monitored and checked in a database environment. Tablespace space usage This is a standard Alert provided by Tivoli Storage Resource Manager for Databases. This Alert will be triggered by the Probe jobs. Archive log directory space usage This is a standard alert provided by Tivoli Storage Resource Manager for Databases. This Alert will be triggered by the Probe jobs as shown in 5.5.1, “Instance Alerts” on page 235. Maximum extents used Your application may become unavailable if a table reaches its maximum allowed number of extents. This is an indicator that can be monitored using the (Max Events - Allocated Extents) < Table Alert. 242 IBM Tivoli Storage Resource Manager: A Practical Introduction 5.7.3 Need for reorganization To ensure good application performance, it is important to be notified promptly if a database reorganization is required. Count of Used table extents You can monitor for table reorganization need using the table Alert trigger Segment has more than n extents. Count of chained rows Chained rows can have an impact on database access performance. This issue can be monitored using the Chained Row Count Greater than table Alert trigger. Count of Used table extents You can monitor the need for table reorganization using the table Alert trigger Segment has more than n extents. Freelist count You cannot monitor the count of freelists in an Oracle table using Tivoli Storage Resource Manager for Databases. Chapter 5. Operations: Policy, Quotas, and Alerts 243 244 IBM Tivoli Storage Resource Manager: A Practical Introduction Part 4 Part 4 Customizing and advanced operations This book part gives detailed procedures for using the reporting facilities of IBM Tivoli Storage Resource Manager, plus information on backing up, restoring, and maintaining your IBM Tivoli Storage Resource Manager environment. © Copyright IBM Corp. 2003. All rights reserved. 245 246 IBM Tivoli Storage Resource Manager: A Practical Introduction 6 Chapter 6. Reporting This chapter discusses the following: An overview of IBM Tivoli Storage Resource Manager’s reporting options Using the supplied report definitions Enterprise Storage Subsystem (ESS) reporting – Prerequisite checking – Creating a Probe – Asset Reports • By Storage Subsystems – Storage Subsystem Reports • Computer Views • Storage Subsystem Views Backup Reporting Suggested list of Top 10 Reports Customizing standard reports and saving the changes for later use Setting up processes for generating daily reports © Copyright IBM Corp. 2003. All rights reserved. 247 6.1 Tivoli Storage Resource Manager reporting capabilities Tivoli Storage Resource Manager Reporting Capabilities Powerful and flexible Over 300 predefined views Commonly used report criteria can be save for reuse Reports can be scheduled to run regularly Reporting categories Asset Storage Subsystems Availability Capacity Usage Usage Violations Backup Chargeback ibm.com/redbooks Figure 6-1 Reporting capabilities The reporting capabilities of Tivoli Storage Resource Manager are very rich, with over 300 predefined views. You can see the data from a very high-level; for example, the total amount of free space available over the enterprise; or from a low-level, for example, the amount of free space available on a particular volume or a table in a database. The data can be displayed in tabular or graphical format, or can be exported as HTML, Comma Separated Variable (CSV), or formatted report files. The reporting function uses the data stored in the Tivoli Storage Resource Manager repository. Therefore, in order for reporting to be accurate in terms of using current data, regular discovery, Ping, Probe, and Scan jobs must be scheduled. These jobs are discussed in 5.1, “OS Monitoring” on page 160. Figure 6-2 shows the Tivoli Storage Resource Manager main screen with the reporting options highlighted. The Reporting sections are used for interactive reporting. They can be used to answer ad hoc questions such as, “How much free space is available on my UNIX systems?” Typically, you will start looking at data at a high-level and drill down to find specific detail. Much of the information can also be displayed in graphical form as well as in the default table form. The My Reports sections give you access to predefined reports. Some of these reports are pre-defined by Tivoli Storage Resource Manager, others can be created by individual users 248 IBM Tivoli Storage Resource Manager: A Practical Introduction saving reporting criteria in the Reporting options. You can also set up Batch Reports to create reports automatically on a schedule. My Reports will be covered in more detail in 6.5, “Creating customized reports” on page 345, and 6.6, “Setting up a schedule for daily reports” on page 360. The additional product, Tivoli Storage Resource Manager for Chargeback produces storage usage Chargeback data, as described in 6.8, “Charging for storage usage” on page 364. Predefined reports provided by Tivoli Storage Resource Manager Reports customized and saved by user db2admin Schedule reports to run in batch mode Interactive reporting options Database reporting options Figure 6-2 IBM Tivoli Storage Resource Manager main screen showing reporting options 6.1.1 Major reporting categories Tivoli Storage Resource Manager collects data for reporting purposes in seven major categories. These will be covered in the following sections. Within each major category there are a number of sub-categories. Most categories are available for both operating system level reporting and database reporting. However, a few are for operating system reporting only. The description of each category specifies which applies, and in the more detailed following sections for each category, we present the capabilities separately for both Tivoli Storage Resource Manager and Tivoli Storage Resource Manager for Database as appropriate. Chapter 6. Reporting 249 Asset Reporting Asset data is collected by Probe processes and reports on physical components such as systems, disk drives, and controllers. Currently, Asset Reporting down to the disk level is only available for locally attached devices. Asset Reporting is available for both operating system and database reporting. Storage Subsystems Reporting Storage Subsystem data is collected by Probe processes. It provides a mechanism for viewing storage capacity at a computer, filesystem, storage subsystem, LUN, and disk level. These reports also enable you to view the relationships among the components of a storage subsystem. Storage Subsystem reporting is currently only available for IBM TotalStorage Enterprise Storage Servers (ESS). Storage Subsystems Reporting is available for operating system only. Availability Reporting Availability data is collected by Ping processes and allows you to report on the availability of your storage resources and computer systems. Availability Reporting is provided for operating system reporting only. Capacity Reporting Capacity Reporting shows how much storage you have and how much of it is being used. You can report at anywhere from an entire network level down to an individual filesystem. Capacity Reporting is provided for both operating system and database reporting. Usage Reporting Usage Reporting goes down a level from Capacity Reporting. It is concerned not so much with how much space is in use, but rather with how the space is actually being used for. For example, you can create a report that shows usage by user, or a wasted space report. You define what wasted space means, but it could be for example files of a particular type or files within a certain directory, which are more than 30 days old. Usage Reporting is provided for both operating system and database reporting. Usage Violation Reporting Usage Violation Reporting allows you to set up rules for the type and/or amount of data that can be stored, and then report on exceptions to those rules. For example, you could have a rule that says that MP3 and AVI files are not allowed to be stored on file servers. You can also set Quotas for how much space an individual user can consume. Not that usage violations are only softly enforced - IBM Tivoli Storage Resource Manager will not enforce the rules in real time, but will generate an exception report after the fact. Usage Violation Reporting is provided for both operating system and database reporting. Backup Reporting Backup Reporting identifies files that have not been backed up. Backup Reporting is provided for operating system reporting only. 250 IBM Tivoli Storage Resource Manager: A Practical Introduction 6.2 Using the standard reporting functions Tivoli Storage Resource Manager: Standard Reporting Predefined reports or views of the data Available for both operating system and database reporting Can report at a high level or drill down for specific detail ibm.com/redbooks Figure 6-3 Tivoli Storage Resource Manager standard reporting This section discusses Tivoli Storage Resource Manager’s standard reporting capabilities. Customized reporting is covered in 6.5, “Creating customized reports” on page 345. This section is not intended to cover exhaustively all of the reporting options available, as these are very numerous, and are covered in detail in the Reporting section of the manual IBM Tivoli Storage Resource Manager V1.1 Reference Guide SC32-9069. Instead, this section provides a basic overview of Tivoli Storage Resource Manager reporting, with some examples of what types of reports can be produced, and additional information on some of the less straightforward reporting options. To demonstrate the reporting capabilities of Tivoli Storage Resource Manager, we installed the Server code on a Windows 2000 system called LOCHNESS, and deployed these Agents: A Windows NT workstation called A23BLTZM AIX systems called BRAZIL and CRETE An HP-UX system called EASTER A Solaris system called SOL-E Windows 2000 servers called GALLIUM, LEAD and VMWAREW2KSR1. LOCHNESS is also an Agent as well as being the Server. The host GALLIUM has both Microsoft SQL-Server and Oracle database installed to demonstrate database reporting. The Agent on LOCHNESS also provides data for a NAS device call NAS200. The Agent on VMWAREW2KSRV1 also provides data for a NetWare server called ITSOSJNW6. The lab setup is shown in Figure 6-4. Chapter 6. Reporting 251 Tivoli Storage Resource Manager: Lab Environment ITSRM Scan ITSRM Database A23BLTZM WNT ITSRM Agent & GUI LOCHNESS W2K ITSRM Server Ethernet NetWare VMWAREW2KSRV1 W2K (Vmware) ITSRM Agent EASTER HP-UX ITSRM Agent SOL-E Solaris ITSRM Agent GALLIUM W2K ITSRM Agent ITSRM Scan CRETE AIX ITSRM Agent BRAZIL AIX ITSRM Agent IBM NAS200 ibm.com/redbooks VMWAREW2KSRV1 W2K (Vmware) ITSRM A t Figure 6-4 Tivoli Storage Resource Manager Lab Environment 6.2.1 Asset Reporting Asset Reporting provides configuration information for the Tivoli Storage Resource Manager Agents. The information available includes typical asset details such as disk system name and disk capacities, but provides a large amount of additional detail. IBM Tivoli Storage Resource Manager Figure 6-5 shows the major subtypes within Asset Reporting. Note that unlike the other reporting categories where most of the drill-down functions are chosen from the right-hand panel, in Asset Reporting the drill-down functions are mostly available on the left-hand pane. 252 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-5 Reporting - Asset By Computer view Click By Computer to see a list of all of the monitored systems (Figure 6-6.) Figure 6-6 Reporting - Asset - By Computer From there we can drill down on the assets associated with each system. We will take a look at node GALLIUM. In Figure 6-7 we have shown most of the items for GALLIUM expanded, with the details for Disk 0 displayed in the right-hand bottom pane. Chapter 6. Reporting 253 You will see a detailed level of information, both in terms of the type of objects for which data is collected (for example, Exports/Sshares), and the specific detail for a given device. Figure 6-7 Report - GALLIUM assets By OS Type view This view of the Asset data provides the same information as the By Computer view, with the difference that the Agent systems are displayed sorted by operating system platform. System-wide view The System-wide view however does provide additional capability, as it can give a System-wide view rather than a node-by-node view of some of the data. A graphical view of some of the data is also available. Figure 6-8 shows the options available from the System-wide view and in the main panel, the report of all exports/shares available. 254 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-8 Reporting - Assets - System-wide view Each of the options available under the System-wide view are self explanatory with the possible exception of Monitored Directories. Tivoli Storage Resource Manager can monitor utilization at a directory level as well as a device or filesystem level. However, by default, directory level monitoring is disabled. To enable directory monitoring, define a Directory Group by selecting Tivoli Storage Resource Manager -> Monitoring -> Groups -> Directory, right-click Directory and choose New Directory Group. The process of setting up Directory Groups is discussed in more detail in 5.1.2, “Groups” on page 162. Once the Directory Group is created it must be assigned to a Scan job, and that job must be run on the systems where the directories to be monitored exist. By setting up a monitored directory you will get additional information for that directory. Note that the information collected includes any subdirectories. Information collected about the directory tree includes the number of files, number of subdirectories, total space used, and average file size. This can be graphed over time to determine space usage patterns. Figure 6-9 shows the directories that we are monitoring. Chapter 6. Reporting 255 Figure 6-9 Monitored directories report IBM Tivoli Storage Resource Manager for Databases Asset Reporting for databases is similar to that for filesystems; however, filesystem entities like controllers, disks, filesystems, and shares are replaced with database instances, databases, tables, and data files. Very specific information regarding an individual database is available as shown in Figure 6-10 for the database Northwind on node GALLIUM. Or you can see rollup information for all databases on a given system (using the System-wide view) as shown in Figure 6-11. 256 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-10 Northwind database asset details Figure 6-11 System-wide view of database assets All of the database Asset Reporting options are quite straightforward with the exception of one. In order to receive table level asset information, one or more Table Groups needs to be Chapter 6. Reporting 257 defined. This is a similar process to that for Directory Groups as described in “System-wide view” on page 254. You would not typically include all database tables within Table Groups, but perhaps either critical or rapidly growing tables. We will set up two groups, one for each database type. To set up a Table Group, Tivoli Storage Resource Manager for Databases -> Monitoring -> Groups -> Table, right-click Table and choose New Table Group (Figure 6-12). Figure 6-12 Create a new database table group We have entered a description of GALLIUM Table Group. Now we click New Instance to enter the details of the database and tables that we want to monitor. From the drop down box, we select the database instance, in this case the SQL-Server instance on GALLIUM. We then enter three tables in turn. For each table, we entered the database name (Northwind ), the creator name (dbo) and a table name. After entering the values, click Add to enter more tables or finish. We entered the table names of Customers, Employees and Suppliers, as shown in Figure 6-13. Once all of the tables have been entered click OK. Figure 6-13 Add SQL Server tables to table group 258 IBM Tivoli Storage Resource Manager: A Practical Introduction We then entered details for a single table called DR$OBJECT for the Oracle database ITSRM as shown in Figure 6-14. Figure 6-14 Add Oracle tables to table group Now we return to the Create Table Group panel, and we see in Figure 6-15 the information about the newly entered tables. Figure 6-15 Tables added to table group Now we chose File -> Save and when prompted, we entered the Table Group name of GALLIUM Table Group. In order for the information for our tables to be collected, the Table Group needs to be assigned to a Scan job. We will assign it to the default database scan job called Tivoli.Default DB Scan by choosing IBM Tivoli SRM for Databases -> Monitoring -> Scans -> Tivoli.Default DB Scan. The definition for this scan job is shown in Figure 6-16 and in particular we see the Table Groups tab. Our new Table Group is shown initially in the left hand pane. We moved it to the right hand pane by selecting it and clicking >>. We then save the updates to the Scan job by choosing File -> Save (or with the floppy disk icon from the tool Chapter 6. Reporting 259 bar). Finally, we can execute the Scan job by right-clicking it and choosing Run Now. Figure 6-16 shows the Scan job definition after the Table Group had been assigned to it. Figure 6-16 Table group added to scan job Example 6-1 on page 261 is an extract from the Scan job log showing that the table information is now being collected. You can view the Scan job log through the Tivoli Storage Resource Manager GUI by first expanding the particular Scan job definition. A list of Scan execution reports will be shown; select the one of interest. You may need to right-click on the Scan job definition and choose Refresh. The list of Scan executions for the Tivoli.Default DB Scan is shown in Figure 6-17. Figure 6-17 Displaying Scan job logs Once you have the actual job chosen you can click the detail icon for the system that you are interested in to display the job log. The actual file specification of the log file on the Agent 260 IBM Tivoli Storage Resource Manager: A Practical Introduction system will be displayed at the top of the output when viewed through the GUI. Example 6-1 shows the actual file output. Example 6-1 Database scan job showing table monitoring 09-19 18:01:01 DBA0036I: The following databases-tablespaces will be scanned: MS SQLServer gallium/gallium Databases: master model msdb Northwind pubs tempdb Oracle itsrm Tablespaces: ITSRM.DRSYS ITSRM.INDX ITSRM.RBS ITSRM.SYSTEM ITSRM.TEMP ITSRM.TOOLS ITSRM.USERS 09-19 18:01:01 DBA0041I: Monitored Tables: .CTXSYS.DR$OBJECT Northwind.dbo.Employees Northwind.dbo.Customers Northwind.dbo.Suppliers Finally, we can produce table level asset reports by choosing for example, IBM Tivoli SRM for Databases -> Reporting -> Asset-> System-wide-> All DBMSs -> Tables -> By Total Size. This is shown in Figure 6-18. Figure 6-18 Tables by total size asset report Chapter 6. Reporting 261 6.2.2 Storage Subsystems Reporting Storage Subsystems Reporting is covered in detail in 6.3, “Tivoli Storage Resource Manager ESS Reporting” on page 297. 6.2.3 Availability Reporting Availability Reporting is quite simple. Two different sets of numbers are reported - Ping and Computer Uptime. Ping is only concerned with whether or not the system is up and responding to the ICMP requires - it does not care whether the Tivoli Storage Resource Manager Agent is running or not. Ping results are collected by a Ping job, so this must be scheduled to run on a regular basis. See 5.1.4, “Pings” on page 174. Computer Uptime detects whether or not the Tivoli Storage Resource Manager Agent is running. Computer Uptime statistics are gathered by a Probe job so this must be scheduled to run on a regular basis. See 5.1.5, “Probes” on page 177. Figure 6-19 shows the Ping report for our Tivoli Storage Resource Manager environment, and Figure 6-20 shows the Computer Uptime report. To generate these reports, we had to select the computers of interest and select Generate Report. Figure 6-19 Reports - Availability - Ping 262 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-20 Reports - Availability - Computer Uptime 6.2.4 Capacity Reporting Capacity Reporting shows how much storage capacity is installed, and of that capacity, how much is being used and how much is available for future growth. IBM Tivoli Storage Resource Manager There are four capacity report views within Tivoli Storage Resource Manager: Disk Capacity Filesystem Capacity Filesystem Used Space Filesystem Free Space However, in reality there are really only two views, or perhaps three. The Filesystem Capacity and Filesystem Used Space views are nearly identical - the only differences being in the order of the columns and the row sort order. And there is relatively little difference between these two views and the Filesystem Free Space view. The Filesystem Capacity and Filesystem Used Space views report on used space, so include columns like percent used space whereas Filesystem Free Space includes columns like percent free space. All other data is identical. Therefore, there are really only two views: a Disk Capacity view and a Filesystem Capacity view. The Disk Capacity view provides information about physical or logical disk devices and what proportion of them has been allocated. Figure 6-21 shows the Disk Capacity by Disk selection window. Chapter 6. Reporting 263 Figure 6-21 Disk capacity report selection window Often there is a one-to-one relationship between devices and filesystems, particularly on Windows systems. One of our Windows systems, A23BLTZM, has a single physical disk which has two partitions. We will select that system to report on by choosing Clear All, clicking the check box beside the system name, and then choosing Generate Report. This system has only one disk (Disk 0) which is displayed on the next screen, so we clicked the detail icon and the report in Figure 6-22 is produced. Note the two partitions show at the bottom of the right-hand pane. 264 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-22 Capacity report - A23BLTZM Disk 0 IBM Tivoli Storage Resource Manager for Databases Capacity Reporting for databases is very straightforward. You can report on: All databases of any type All databases of a given type on a particular system or group of systems On a specific database Example 6-23 shows a Capacity Report by Computer Group. We actually have databases in just one Computer Group, WindowsDBServers. We then drilled down to see all systems within the WindowsDBServers group, then specifically to node GALLIUM, so that we could see all databases on GALLIUM. Chapter 6. Reporting 265 Figure 6-23 Database Capacity report by Computer Group 6.2.5 Usage Reporting The reporting categories covered so far have been mostly concerned with reporting at the system or device level. Usage Reporting goes down one more step to report at a level lower than the filesystem. You can produce reports that answer questions such as: How old is my data? When was it created, last accessed, or modified? What are my largest files? What are my largest directories? Do I have any orphan files? IBM Tivoli Storage Resource Manager With Usage Reporting, you will be able to: Identify orphan files and either update their ownership or delete them to free up space Identify the largest files and determine whether they are needed or whether parts of the data could be archived Identify obsolete files so that they can be either deleted or archived There are a few restrictions on Usage Reporting: In order to report by directory or by Directory Group you will need to set them up in IBM Tivoli SRM -> Monitoring -> Groups -> Directory UNIX systems do not record file create dates, so no reporting by creation time is available for these systems. IBM Tivoli Storage Resource Manager for Databases Like database Asset Reporting, all of the database Usage Reporting options are quite straightforward with the exception of table level reporting. From a usage perspective there are two types of table report available: Largest tables Monitored tables 266 IBM Tivoli Storage Resource Manager: A Practical Introduction We can report on database largest tables by choosing for example, Tivoli Storage Resource Manager for Databases-> Reporting -> Usage -> All DBMSs -> Tables -> Largest Tables -> By RDBMS Type. This report is shown in Figure 6-24. Figure 6-24 Largest tables by RDBMS type A Monitored Tables by RDBMS Type report is shown in Figure 6-25. In this case, only tables which are part of a Table Group, which is included in a Scan job will be reported on. Chapter 6. Reporting 267 Figure 6-25 Monitored tables by RDBMS type 6.2.6 Usage Violation Reporting Usage Violation Reporting enforces Tivoli Storage Resource Manager Constraints and Quotas. A Constraint is a limit, by file name syntax, on the type of data that can be stored on a system. A Quota is a storage usage limit placed on a user or operating system User Group, and can be defined at the network, computer, or filesystem level. Constraints and Quotas were described in 5.3, “Policy management” on page 200. It is important to remember that Quotas and Constraints are not hard limits - users will not be stopped from working if a Quota or Constraint is violated, but this event will trigger an exception, which will be reported. IBM Tivoli Storage Resource Manager Constraint Violation Reporting There are a number of predefined Constraints in Tivoli Storage Resource Manager. Before we produce a Constraint violation report, we need to set up a new Constraint called forbidden files. Setting up Constraints was described in 5.3.4, “Constraints” on page 224. First navigate Tivoli Storage Resource Manager -> Policy Management -> Constraints. Existing Constraints will be listed. Right-click Constraints and choose New Constraint. On the Filesystems tab we entered a description of forbidden files, chose Computer Groups, then selected db2admin.Windows Systems and clicked >>. The completed Filesystems tab is shown in Figure 6-26. 268 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-26 Create a Constraint - Filesystems tab We then need to specify in the File Types tab, what a forbidden file is. You can define the criteria as either inclusive or exclusive; that is, you can specify just those files types that will violate the Constraint, or you can specify that all files will violate the Constraint except those specified. There are a number of predefined file types included; you can also chose additional files by entering appropriate values in the “Or enter a pattern field” at the bottom of the form. We have chosen MP3 and AVI files. The completed File Types tab is shown in Figure 6-27. Chapter 6. Reporting 269 Figure 6-27 Create a Constraint - file types tab The Users tab is very similar to the File Types tab - you can specify which users should be included or excluded from the selection criteria. We have taken the default, which is to include all users. In the Options tab, we nominate a maximum number of rows to be returned. We can also apply some more specific selection criteria here such as only including files that are larger than a defined size. Note, however that these criteria are added to the file list. For example, if we specified here that we only wanted to include files greater than 1 MB, the search criteria would be changed to ((NAME matches any of ('*.AVI', '*.mp3') AND TYPE <> DIRECTORY) OR SIZE > 1 MB). So the returned list of files would be any file greater than 1 MB in size plus any *.MP3 or *.AVI files. If you wish to change the selection criteria so that instead you select any *.MP3 or *.AVI files that are larger than 1 MB, you can enter 1 MB against the bigger than option, and then click the Edit Filter button shown in Figure 6-30. You will then see the file filter as shown in Figure 6-28. To add the size criteria to the file type criteria, click on the Size > 1MB entry and drag it up to the All of tag. The changed filter is shown in Figure 6-29. You can also see the Boolean expression for the filter has changed to reflect this condition. 270 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-28 Edit a Constraint file filter - before change Figure 6-29 Edit a Constraint file filter - after change In this case we did not want to apply a size criteria, so we left the Option tab entries at their defaults as shown in Figure 6-30. Chapter 6. Reporting 271 Figure 6-30 Create a Constraint - Options tab Finally, we can specify that we want an Alert generated if a triggering condition is met. The only choice here is to specify a maximum amount of space consumed by the files that meet our selection criteria. We left all of the Alert tab options at their defaults other than specifying an upper limit of 100 MB for files that have met our selection criteria. The Alert tab is shown in Figure 6-31. Alerting is covered in more detail in 5.2, “OS Alerts” on page 189. We then clicked the Save button and entered a name of Forbidden Files as shown in Figure 6-32. 272 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-31 Create a Constraint - Alert tab Figure 6-32 Create a Constraint - save Chapter 6. Reporting 273 Before we can report against the Constraint, we need to ensure that a Scan job has been run to collect the appropriate information. Once the Scan has completed successfully, you can go ahead and produce Constraint Violation Reports. Note that you cannot produce a report of violations of a particular Constraint - the report will include entries for any Constraint violation. However, once the report is generated, you can drill down into specific Constraint violations. We produced the report by choosing Tivoli Storage Resource Manager -> Reporting -> Usage Violations -> Constraint Violation -> By Computer. You will see a screen like Figure 6-33 where you can select a subset of the clients if appropriate - after selecting, click Generate Report. Figure 6-33 Constraint violation report selection screen You will then see a list of all of those instances of Constraint violations as shown in Figure 6-34. The report shows multiple types of Constraints. Some of these Constraints were predefined (Orphaned File Constraint and Obsolete File Constraint) and others (ALLFILES and forbidden files) we defined. An orphaned file is any file that does not have an owner. This allows you to easily identify files that belonged to users who have left your organization or have had an incorrect ownership set. 274 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-34 Constraint violations by computer From there you can drill down on a specific Constraint, then filesystems within the Constraint, and finally to a list of files that violated the Constraint on that filesystem by selecting the magnifying glass icon next to the entry of interest. Or, as shown in Figure 6-35, by clicking the pie chart icon next to the entry for forbidden files, you can produce a graph indicating what proportion of capacity is being utilized by files violating the Constraint. Position the cursor over any segment of the pie chart to show the percentage and number of bytes consumed by that segment. We can see that 13% or 7.7 Gigabytes of capacity is being consumed by files violating the forbidden files Constraint on this filesystem. Figure 6-35 Graph of capacity used by Constraint violating files Chapter 6. Reporting 275 Constraint violations are also written to the Tivoli Storage Resource Manager Alert Log. Figure 6-36 shows the same list of violations as if you had produced a Constraint Violations by computer report. Figure 6-36 Alert log showing Constraint violations Quota Violation Reporting The process of producing a Quota violation report is very similar to producing a Constraint violation report, but with some key differences. One difference between Quotas and Constraints is the process of collecting data. For Constraints, the data is collected as part of a standard Scan job in a similar way to adding an additional Profile to a Scan. Quota data collections are performed in a separately scheduled job. So, when you set up a Quota you need to specify scheduling parameters. We set up a Quota rule called Big Windows Users by choosing Tivoli Storage Resource Manager -> Policy Management -> Quotas -> Users -> Computer, right-clicking Computer and selecting New Quota. On the Users screen we entered a description of Big Windows Users and then selected User Groups and then Tivoli.Default User Group as show in Figure 6-37. 276 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-37 Create Quota - Users tab On the Computers tab we chose our Windows group: db2admin.Windows Systems (Figure 6-38). Figure 6-38 Create Quota - Computers tab Chapter 6. Reporting 277 We when had to specify when and how often we wanted the Quota job to run. We chose to run the job weekly under the When to CHECK tab as shown in Figure 6-39. Figure 6-39 Create Quota - When to Check On the Alert tab, shown in Figure 6-40, we accepted all of the defaults other than to specify the limit under User Consumes More Than, in this case, 1 GB. No Alerts will be generated other than to log any exceptions in the Tivoli Storage Resource Manager Alert Log. 278 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-40 Create Quota - Alert Finally, we save the Quota definition, calling it Big Windows Users as shown in Figure 6-41. Figure 6-41 Create Quota - save Chapter 6. Reporting 279 The new Quota now appears under IBM Tivoli SRM -> Policy Management -> Quotas -> Users > Computer as db2admin.Big Windows Users (where db2admin is our Tivoli Storage Resource Manager username). We right-clicked the Quota and chose Run Now as in Figure 6-42. Figure 6-42 Run new Quota job This job will collect data related to the Quota, and add any Quota Violations to the Alert Log as shown in Figure 6-43. Figure 6-43 Alert Log - Quota violations 280 IBM Tivoli Storage Resource Manager: A Practical Introduction We then drilled down on one of the Alerts to see the details (Figure 6-44). Figure 6-44 Alert Log - Quota violation detail And finally we can create a Quota Violation report by choosing IBM Tivoli SRM -> Reporting -> Usage Violations -> Quota Violations -> Computer Quotas -> By Computer. The high-level report is shown in Figure 6-45. Figure 6-45 Quota violations by computer We can then drill down further for additional detail or to produce a graphical representation of the data behind the violation. The graph in Figure 6-46 shows a breakdown of the users’ data by file size. Chapter 6. Reporting 281 Figure 6-46 Quota violation graphical breakdown by file size IBM Tivoli Storage Resource Manager for Databases Filesystem Usage Violation Reporting includes both Quota and Constraint violations. However, for databases, only Quota violations are available. You can place a Quota on users, user groups, or all users and you can limit the Quota by computer, computer group, database instance, database tablespace group or tablespace. We will set up an Instance Quota that limits any individual user to 100 MB of space per instance for any database on any server in the db2admin.WindowsDBServers computer group. To do this, navigate to IBM Tivoli SRM for Databases -> Policy Management -> Quotas -> Instance. Right-click Instance and choose New Quota. Figure 6-47 shows the Quota definition screen. We entered a description of Big DB Users and selected the Tivoli.Default User Group by expanding User Groups, clicking Tivoli.Default User Group, and then clicking >>. 282 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-47 Create database Quota - Users tab On the Instances tab, expand Computer Groups, select db2admin.WindowsDBServers and then click >> to add it to the Current Selections as shown in Figure 6-48. Figure 6-48 Create database Quota - Instances tab On the When to Run tab shown in Figure 6-49, we chose to run the Quota job weekly and nominated a time of day for the job to run. Other values were left at the defaults. Chapter 6. Reporting 283 Figure 6-49 Create a database Quota - When to Run tab On the Alert tab (shown in Figure 6-50) we specified the actual Quota that we wanted enforced, which was a 100 MB per user Quota. Other values were left as defaults. Figure 6-50 Create a database Quota - Alert tab We saved the new Quota definition with a name of Big DB Users as shown Figure 6-51. 284 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-51 Create a database Quota - Save We now run the Quota by right-clicking it and choosing Run Now as seen in Figure 6-52. Figure 6-52 Run the database Quota To check if any user has violated the Quota, navigate IBM Tivoli SRM for Databases -> Alerting -> Alert Log -> All DBMSs -> All. We see one violation as shown in Figure 6-53. Chapter 6. Reporting 285 Figure 6-53 DB Quota violation We can also now run a database Quota violation report by choosing IBM Tivoli SRM for Databases -> Reporting -> Usage Violations -> Quota Violations -> All Quotas -> By User Quota. This report can be seen in Figure 6-54. Figure 6-54 Database Quota violation report 286 IBM Tivoli Storage Resource Manager: A Practical Introduction 6.2.7 Backup Reporting Backup Reporting is designed to do two things: It can alert you to situations where files have been modified but not backed up, and it can provide data on the volume of data that will be backed up. Figure 6-55 shows the options that are available for Backup Reporting. Figure 6-55 Backup Reporting options Most at Risk Files Tivoli Storage Resource Manager defines most at risk files as those that are least-recently modified, but have not been backed up. There are some points worth noting about this report: Since the report relies on the archive bit being set to determine whether the file has changed, this report will only work on Windows systems as UNIX systems have no equivalent to the archive bit When using most backup products, once a file has been backed up the archive bit is cleared. Before Version 5.2, IBM Tivoli Storage Manager did not do this, therefore if this level of Tivoli Storage Manager was used, this report would list files that actually may have been backed up. IBM Tivoli Storage Manager Version 5.2 has the ability to reset the Windows archive bit after a successful backup of a file. See “Backup reporting for Tivoli Storage Manager V5.2” on page 295 for more information on the reset archive bit available for the Tivoli Storage Manager Windows client. By default, information on only 20 files will be returned. Figure 6-56 shows the selection screen for the report. You will notice that the report uses the Profile Tivoli.Most at Risk. It is in this Profile that the 20 file limit is set, although the value can be changed. You can override the value on the selection screen, but you can only reduce the value here, not increase it. By updating the Profile you can also exclude files from the report. By default, any file in the \WINNT\system* directory tree on any device will be excluded. You can add entries to the exclusion list if appropriate. Ideally, the exclusion list should be the same as that in your backup product. Chapter 6. Reporting 287 Figure 6-56 Files most at risk report - selection Modified Files Not Backed up The report provides an aging analysis of your data that has been modified but not backed up. It will show what proportion of the data has been modified within the past 24 hours, between one and seven days, between one week and one month, and so on. Figure 6-57 shows the selection taken in our Windows environment. Like the Most at Risk Files report, this report also relies on the archive bit, so check to see if your backup application uses this. 288 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-57 Modified Files not backed up selection To view the report, click Generate report. We choose to view it as a graphic by then clicking on the pie icon and selecting Chart: Space Distribution for All. This is shown in Figure 6-58. This chart tells you the amount of space consumed by files have not been backed up since the last backup was run for this server. Figure 6-58 Modified Files not backed up chart overall view Chapter 6. Reporting 289 We can also select Chart: Count Distribution for All as shown in Figure 6-59 to show the number of files in each category. Figure 6-59 Files need backed up chart in detail view The different charts can be viewed in different ways. To select another type of chart, right-click in the chart area and select another type - e.g. bar chart, as shown in Figure 6-60. Figure 6-60 Files not backed up bar chart detail view 290 IBM Tivoli Storage Resource Manager: A Practical Introduction Backup Storage Requirements Reporting This option allows you determine how much data would be backed up if you were to perform either a full or an incremental backup. The Full Backup Size option can be used regardless of the OS type and the backup application in use. In Figure 6-61, the report is run against Windows systems by filesystem. Figure 6-61 Backup storage requirements per filesystem The selection can also run by computer, as shown in Figure 6-62. Chapter 6. Reporting 291 Figure 6-62 Backup storage requirement per computer and per filesystem The Incremental Backup Size option makes use of the archive bit, so it can only be used on Windows systems, and if Tivoli Storage Manager is the backup application, the resetarchiveattribute option must be used (for Version 5.2). A sample report is shown in Figure 6-63. 292 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-63 Incremental reporting per Node and Filesystem based on files The third report type here is Incremental Range Sizes Reporting. This does not rely on the archive bit (instead, it uses the modification date) so is more generically applicable. It is possible to show through the use of this report the actual difference between a traditional weekly full/daily incremental backup process versus Tivoli Storage Manager’s progressive incremental approach. To generate this report, select Backup -> Backup Storage Requirements -> Incremental Range Size -> By Computer as shown in Figure 6-64. Chapter 6. Reporting 293 Figure 6-64 Incremental Range Size select By Computer After you select the Computers of interest, click Generate Report. Figure 6-65 shows the output from this report, with the amount of data changed for different time ranges. Note that the values are cumulative, so for each time range; the values shown include the smaller time periods. If we take the results for system BONNIE as an example, it shows that 390 files (1.02% of all files) and 41.66 MB (1.82% of total storage) changed within the previous 24 hours and 2831 files (7.45% of all files) and 2.33 GB (53.42% of total storage) changed within the last week. Using the report for IBM Tivoli Storage Manager planning Tivoli Storage Manager’s progressive incremental capability avoids the necessity of performing regular full backups by keeping a record in its own relational database of what files have been backed up, and then only backing up those files that have changed. A typical metric when doing Tivoli Storage Manager planning is to estimate the amount of data that changes each day in a file server environment as typically about 5-10%. With Tivoli Storage Resource Manager, we can replace this estimate with actual numbers. The 1.02% change rate here is outside the typical range because the system is in a lab environment, and is not performing production work. But, to demonstrate the calculations we will use those figures. 294 IBM Tivoli Storage Resource Manager: A Practical Introduction If we assume that 1.02% is the average for each day, that gives a weekly change rate of 7.14%. Seven times the daily rate of change will almost always be greater than the reported weekly change rate as some files will be updated on multiple days throughout the week. With Tivoli Storage Manager’s progressive incremental approach in this example we will only backup approximately 291.62 MB (7 * 41.66 GB) per week compared to 4738 MB (4.38 GB * 1024 = 4485 MB + (6 * 41.66 MB)) for a traditional weekly full plus daily incremental approach. Figure 6-65 Incremental Range Sizes Report Backup reporting for Tivoli Storage Manager V5.2 With IBM Tivoli Storage Manager Version 5.2 and IBM Tivoli Storage Resource Manager V1.2, we have now the possibility to get more accurate statistics than in previous IBM Tivoli Storage Resource Manager Versions. To set this up we use a new option, resetarchiveattribute, in the DSM.OPT file for Windows clients, as shown in Example 6-2. The use of this option determines whether Tivoli Storage Manager resets the Windows archive attribute on files that have been successfully backed up to a Tivoli Storage Manager server. Tivoli Storage Manager will also reset the archive attribute during incremental backups if it is determined that there is already an active object on the Tivoli Storage Manager server. The resetarchiveattribute option is useful in conjunction with applications, such as IBM Tivoli Storage Resource Manager, as a simple way to report on the backup status of files. The Windows archive attribute is used to indicate that a file has changed since the last backup. If it has been set to OFF, the Windows operating system will turn the attribute back to ON after the file has been modified. Tivoli Storage Manager does not use the Windows archive Chapter 6. Reporting 295 attribute to determine if a file is a candidate for incremental backup, (it uses its own algorithms to determine this) but only for the purposes of reporting. Example 6-2 Tivoli Storage Manager Option RESETARCHIVEATTRIBUTE ********************************************************************* * Tivoli Storage Manager LOCHNESS * * Sample dsm.opt for the Microsoft Windows Backup-Archive Client ********************************************************************* . . RESETARCHIVEATTRIBUTE YES . You can also use the Tivoli Storage Manager Preferences editor, as shown in Figure 6-66 to set the Reset archive attribute. In any case, you need to start the Tivoli Storage Manager client (including the Windows Scheduler Service) to make the changes active. Figure 6-66 Tivoli Storage Manager preference settings for archive attribute The next Tivoli Storage Resource Manager Scan will then be able to identify files backed up with Tivoli Storage Manager, and include them in reporting functions. 296 IBM Tivoli Storage Resource Manager: A Practical Introduction 6.3 Tivoli Storage Resource Manager ESS Reporting IBM Tivoli Storage Resource Manager ESS Reporting New Reporting Features Capacity Controllers Disks and LUNs within an ESS Reporting Categories Asset Reporting By Storage Subsystem Disk Groups...Volume Spaces... Disk ... LUNs. Storage Subsystem Computer Views By computer... By File Systems/Logical Volumes. Storage Subsystem Views...By Storage Subsystem... By LUN... By Disk. ibm.com/redbooks Figure 6-67 ESS Reporting capabilities The reporting capabilities in Tivoli Storage Resource Manager are expanded in Version 1.2 to include Enterprise Storage Subsystem (ESS) reporting. IBM Tivoli Storage Resource Manager uses Probe jobs to collect information about the ESS. We can then use the reporting facility to view that information. The new subsystem reports show the capacity, controllers, disks, and LUNs of an ESS and their relationships to computers and filesystems within a network. Figure 6-67 summarizes the functionality. 6.3.1 ESS Reporting For this section we discuss ESS asset and storage subsystem reporting, making refererences to the ESS lab environment in Figure 6-68 below. Note that the host which accesses the ESS had a Tivoli Storage Resource Manager Agent installed. This provides the fullest combination of reporting ability for the ESS. If an ESS-attached host does not have a Tivoli Storage Resource Manager Agent installed, items such as filesystem, logical volume, and device logical names will not be displayed. Chapter 6. Reporting 297 Win2k Srv sp3 CIM/OM server w2kadvtsm 172.31.1.135 43p AIX 5.1 ML 4 ITSRM Agent tsmsrv43p 172.31.1.155 ESSF20 172.31.1.1 2109 Win2k Srv sp3 ITSRM Server w2kadvtsrm 172.31.1.133 Intranet Figure 6-68 ESS reporting lab Prerequisites to ESS reporting Before doing ESS reporting with Tivoli Storage Resource Manager, the following are required: CIM/OM server successfully installed. IBM Tivoli Storage Resource Manager successfully logs into CIM/OM server. IBM Tivoli Storage Resource Manager successfully runs a discovery and probes the ESS. Important: Refer to 4.9, “CIM/OM” on page 145 for additional details on confirming these prerequisites. The IBM Tivoli Storage Resource Manager will run a discovery to locate the CIM/OM server in our environment, which in turn discovers the ESSs. See 4.9.3, “CIM/OM configuration in IBM Tivoli Storage Resource Manager” on page 153. Creating the ESS Probe IBM Tivoli Storage Resource Manager will then run a Probe to query the discovered ESS. The Probe collects detailed statistics about the storage assets in our enterprise, such as computers, storage subsystems, disk controllers, hard disks, and filesystems. Next, we show how to create a Probe for an ESS-F20. Select Probe -> Select new probe, then under the Computers tab, choose Storage Subsystems. See Figure 6-69. 298 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-69 Creating ESS probe On the When to PROBE tab, we selected PROBE Now because we need to populate the backend repository. See Figure 6-70. Figure 6-70 ESS - When to probe Chapter 6. Reporting 299 Next is the Alert tab, shown in Figure 6-71. This defines the type of notification for a Probe. Figure 6-71 ESS - Alert tab After all parameters are defined, save the Probe definition. At this point the Probe is submitted and will run immediately. Note: For additional information on creating Probes, see 5.1.5, “Probes” on page 177. There are several ways to check the status of the Probe job. First, we can check the color of the Probe job entry in the navigation tree, then in the content panel. There are two colors that represent job status. They are: GREEN - Job successfully complete with no errors RED - Job completed with errors The status of the Probe job is displayed in text and in color, as shown in Figure 6-72, after selecting the Probe job output in the navigation tree. The job at 8:44 am is in green, indicating success. The job at 6:32 pm is in red, indicating errors. 300 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-72 ESS - probe job status We open the Probe job by selecting it and double clicking on the spy glass icon next to the job in the content window. We see the contents of the job, including detailed information on the status, as in Figure 6-73. Here, we have selected the successful Probe on June 9 at 8:44. Figure 6-73 Probe job log Asset Reports - By Storage Subsystem With Asset reporting by storage subsystem, you can view the centralized asset repository that IBM Tivoli Storage Resource Manager constructs during a Probe. The Probe itemizes the information about computers, disks, controllers, and filesystems, and builds a hardware inventory of ESS assets. With the backend repository now populated with ESS-F20 asset information, we will show how to view reports to display the storage resources. We choose Reporting -> Asset -> By Storage Subsystem -> ESSF20. This report provides specific resource information of the ESS and allows us to view storage capacity by a computer, filesystem, storage subsystem, LUN, and disk level. We can also view the relationships between the components of a storage subsystem. Notice that the navigation tree is hierarchical, and shows ESSF20 as active (green). See Figure 6-74. Chapter 6. Reporting 301 Figure 6-74 Asset by storage subsystem We drill down to the Disk Groups. The disk group contains information related to the ESS, as well as the volume spaces and disks associated with those Disk Groups. Expanding the Disk Group node, a list of all Disk Groups on the ESS displays (Figure 6-75). Figure 6-75 ESS disk group Continuing, we expand the disk group DG1 to view the disks and volume spaces within it. We open Volume Space VS3, which shows the disks and LUNs associated with it. The Disks subsection shows the individual disks associated with the Volume Space (see Figure 6-76). 302 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-76 Disks in volume spaces Notice the LUNs subsection for disk DD0105 (Figure 6-77). This shows the LUN to disk relationship. The LUNs shown here are just a subset of all the LUNs. You can see that the LUN is spread across all the displayed disks in the content window. Chapter 6. Reporting 303 Figure 6-77 Disk and LUN association with volume space Figure 6-78 shows the discovery of a disk with no LUN associations. This is known as a hot spare. It can be used when one of the other seven disks in the disk group fails. 304 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-78 Hot spare LUN We now show a high level view of all disks in ESSF20. There are 32 disks in the ESS, as shown in Figure 6-74 on page 302 in the Number of Disks field. Figure 6-79 shows a partial listing of the disks. Chapter 6. Reporting 305 Figure 6-79 ESS all disks We can also display a report of all the LUNs in the ESS. This report provides the physical disk association with each LUN. We have a total of 56 LUNs in the ESSF20 as shown in Figure 6-74 on page 302 (number of LUNS). A partial listing is shown in Figure 6-80. 306 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-80 ESS all LUNs Storage Subsystem Reporting We now open Reporting -> Storage subsystems. Storage Subsystems Reporting allows viewing storage capacity at a computer, filesystem, storage subsystem, LUN, and disk level. By Computer We drill down Computers Views -> By Computer. The report displays the association of filesystems to the storage subsystem, LUNS, and disks on ESSF20. These reports are useful for relating computers and filesystems to different storage subsystem components. There are three options available in the Relate Computers to: pull down, as shown in Figure 6-81. Chapter 6. Reporting 307 Figure 6-81 By Computer - Relate Computer to We select Storage Subsystems from the pull down, select the desired computer and click Generate. Figure 6-82 shows that the generated report TSMSRV43P uses 9.24 GB in the ESS. Figure 6-82 By Computer - storage subsystem Returning to the selection screen tab (Figure 6-81) we select LUNs. We choose the same host, and click Generate. Figure 6-83 shows the generated report; the relationship between TSMSRV43P and its assigned LUNs. TSMSRV43P has one LUN created on the ESS. 308 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-83 By Computer - LUNs Finally, from the Selection tab (Figure 6-81), we select Disks, our host TSMSRV43P, and click Generate. Figure 6-84 shows the report: the ESS disks assigned to the LUN on the host. Figure 6-84 By Computer - disk By Filesystem/Logical Volume We will now drill to Computer Views -> By Filesystem/Logical Volume. The report displays the association of filesystems to the storage subsystem, LUNS, and disks on ESSF20. These reports are useful for relating computers and filesystems to different storage subsystem components. There are three options available in the Relate Filesystem/Logical Volumes to pull down, shown in Figure 6-85. Chapter 6. Reporting 309 Figure 6-85 By filesystem/logical volume Select Storage Subsystem, the host (TSMSRV43P), and click Generate. Figure 6-86 shows the filesystems on the host, which are located on the ESS. Figure 6-86 By filesystem/logical volumes - storage subsystem From the Selection tab (Figure 6-85) we now choose LUNs, the host (TSMSRV43P), and click Generate. Figure 6-87 shows the LUN location of each filesystem on the host. 310 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-87 By filesystem/logical volume - LUN From the Selection tab (Figure 6-85) we now choose Disks, the host (TSMSRV43P), and click Generate. Figure 6-88 shows which disks are comprising each filesystem and logical volume. Figure 6-88 By filesystem/logical volume - Disk By Storage Subsystem We will now drill down Storage Subsystem Views -> By Storage Subsystem. These reports display the relationships of the ESS components (storage subsystems, LUNs, and disks) to the computers and filesystems and logical volumes. There are two options available in the Relate Storage Subsystems to: the pull down, shown in Figure 6-89. Chapter 6. Reporting 311 Figure 6-89 By Storage Subsytems Select Computers from the pull down, the subsystem ESSF20, and click Generate. Figure 6-90 shows the space used by each host on the storage subsystem. Figure 6-90 By Storage subsystem - Computer Now, select Filesystem/logical Volumes from Figure 6-89, the ESSF20 subsystem, and click Generate. Figure 6-91 shows each host’s filesystems and logical volumes, with their capacity and free space. 312 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-91 By storage subsystem - filesystem/logical volume By LUN Continuing, we drill down Storage Subsystem Views -> By LUNs, (Figure 6-92). Figure 6-92 By LUNs Select Computer from the Relate LUNs to: pull down, select the subsystem (ESSF20) with the associated disks (default is all), and click Generate Report. Figure 6-93 shows the LUNs Chapter 6. Reporting 313 assigned to each host, with the host’s logical name for the LUN (/dev/hdisk1 in this case). Figure 6-93 By LUN - computer Now select Filesystem/Logical Volumes from the Relate LUNS to pull down, the ESSF20 subsystem with associated logical disks (default is all), and click. Next, we clicked Generate Report. Figure 6-93 shows the relationships between the LUNs, computers, and filesystems/logical volumes, including free space and host device logical names. Figure 6-94 By LUNS - filesystem/logical volumes Disks Now we drill to Storage Subsystem Views -> Disks. There are two options available in the Relate Disks to: pull down, shown in Figure 6-95. 314 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-95 Disks Select Computer from the pull down, the ESSF20 subsystem with related disks (default is all), and click Generate Report. Figure 6-96 shows the relationships of the disks to the hosts. Figure 6-96 Disks - computer Now select Filesystem/Logical Volumes from the pull down (Figure 6-95), the ESSF20 subsystem with related disks (default is all), and click Generate Report. Figure 6-97 shows the relationship between the ESS disks and the filesystems and logical volumes. Chapter 6. Reporting 315 Figure 6-97 Disks - filesystem/logical volumes Note: For demonstration purposes, we have reduced some of the fields in the reports. 6.4 IBM Tivoli Storage Resource Manager top 10 reports After analyzing typical customer scenarios, we have compiled the following list of “Top 10 reports” which we recommend running regularly for best practices: ESS used and free storage ESS attached hosts report Computer Uptime Growth in storage used and number of files Incremental backup trends Database reports against DBMS size Database Instance storage report Database reports size by instance and by computer Locate the LUN on which a database is allocated Finding important files on your systems 6.4.1 ESS used and free storage This report shows the free and used storage on an ESS system. To generate this filesystem logical view report, navigate IBM Tivoli SRM -> Reporting -> Storage Subsystem -> Computer Views -> By Filesystem/Logical Volumes. Select the computers to report on, and select Disks from the pull-down Relate Filesystems/Logical Volumes To as in Figure 6-98. 316 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-98 ESS relation to computer selected by disk Click Generate Report. The report is shown in Figure 6-99. Various columns are displayed: Storage Subsystem Storage Subsystem Type Manufacturer Model Serial Number Computer Filesystem/Logical Volume Path Capacity Free Space Physical Allocation Figure 6-99 Report for Filesystem/Logical Volumes Part 1 Figure 6-100 shows the right hand columns of the same report. Chapter 6. Reporting 317 Figure 6-100 Report for Filesystem/Logical Volumes Part 2 This report provides quick answers to how much space on the ESS is allocated to each filesystem. Select LUNs this time from the pull-down in Figure 6-98. The report in Figure 6-101 shows the LUN to host mapping for the ESS, which filesystem is associated with each LUN, and the free space. Figure 6-101 Computer view to the filesystem with capacity and free space 6.4.2 ESS attached hosts report This report shows which systems are using storage on an ESS. This is useful when ESS maintenance is applied so that the administrators of affected systems can be informed. To generate this report, select IBM Tivoli SRM -> Reporting -> Storage Subsystem -> Computer Views -> By Computer tree. We have selected all computers as in Figure 6-102. 318 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-102 ESS selection per computer Click the Generate Report field - the report is shown in Figure 6-103. Figure 6-103 ESS connections to computer report Note you can sort the report on a different column heading by clicking on it. The current sort field is indicated by the small pointer next to the field name. Clicking again in the same column reverses the sort order. 6.4.3 Computer Uptime reporting Uptime is an important IT metric in the enterprise. To generate a Computer Uptime report, select IBM Tivoli SRM -> Reporting -> Availability -> Computer Uptime -> by Computer. Select the computers of interest, and a date range (optional), and click Generate Report, as shown in Figure 6-104. Chapter 6. Reporting 319 Figure 6-104 Computer Uptime report selection For each computer, percent availability, number of reboots, total down time, and average downtime is given, as in Figure 6-105 shows the selection. The default sort order is by descending Total Down Time. Figure 6-105 Computer Uptime report part 1 You can also display this information graphically, by selecting the pie chart icon at the top of the report, as shown in Figure 6-106. 320 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-106 Computer Uptime report graphical combined (stacked bar) Figure 6-107 shows an unstacked bar chart of the same information (right-click and select Bar Chart). Figure 6-107 Computer Uptime report graphical (bar chart) 6.4.4 Growth in storage used and number of files The Backup Reporting features of Tivoli Storage Resource Manager also give a convenient way to track the total storage used by files in each computer, as well as the number of files stored. It can be presented graphically, to show historical numbers and future trends. This information helps you plan future storage requirements, be alerted to potential problems, and also (if using a traditional full and incremental backup product), plan your backup server storage requirements, since this report shows the size of a full backup on each computer. Select IBM Tivoli SRM -> Reporting -> Backup -> Backup Storage Requirements -> Full Backups Size -> by Computer. We used the Profile: Tivoli.Summary By Chapter 6. Reporting 321 Filesystem/Directory and selected all computers, as in Figure 6-108. Click Generate Report. Figure 6-108 Generate Full Backup Size report Figure 6-109 shows the total disk space used by all the files, and the number of files on each computer. The top column shows the totals for all Agents. Figure 6-109 Select History chart for File count To drill down, select all the computers (using the Shift key) so they are highlighted, then click on the pie icon, and select History Chart: Space Usage for Selected. The generated report (Figure 6-110), shows how the total full backup size has fluctuated, and is predicted to change in the future (dotted lines - to disable this, click Hide Trends). 322 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-110 History chart space used by a computer To display the file count graph, select History Chart: File count from the pie icon in Figure 6-109. The output report is shown in Figure 6-111, which shows trends in the number of files on each computer. Figure 6-111 History chart: File count Chapter 6. Reporting 323 These reports will help you find potential problems (e.g. a computer system that shows an unexpected sudden upward or downward spike) and also predicts disk and backup requirements for the future. 6.4.5 Incremental backup trends This report shows the rate of modification of files, which is very useful for incremental backup planning. Select IBM Tivoli SRM -> Reporting -> Backup -> Backup Storage Requirements -> Incremental Range Size -> by Filesystem. Select Profile: Tivoli.by Modification as shown in Figure 6-112. Figure 6-112 Incremental Range selection based on filespace The generated report shows all the filesystems on the selected computers as in Figure 6-113. 324 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-113 Summary of all filespace The third column shows the total number and total size of files (for all the systems, then broken down by filesystem). Then there are “Last Modified” columns for one day, one week, one month, two months, three, six, nine, and one year selections. Each of these gives the number and size of the modified files. To generate charts, highlight all the systems, and click the pie icon. Select Chart: Count Distribution for Selected, as shown in Figure 6-114. Figure 6-114 Selection for Filesystem and computer to generate a graphic The chart is shown in Figure 6-115. Note that when your cursor passes over a bar, a pop-up shows the number of files associated with that bar. Chapter 6. Reporting 325 Figure 6-115 Bar chart for Incremental Range Size by Filesystem You can display other filesystems using the Next 2 and Prev 2 buttons. Change the chart format by right-clicking and selecting a different layout. Figure 6-116 is a pie chart of the same data. The pop-ups work here also as circled. Figure 6-116 Pie chart selected with number of files which have modified 326 IBM Tivoli Storage Resource Manager: A Practical Introduction With these reports you can track and forecast your backups. You can also display backup behavior for the last one, three, nine, or 12 months. 6.4.6 Database reports against DBMS size This report shows an enterprise wide view of storage usage by all RDBMS. Select IBM Tivoli SRM for Databases -> Reporting -> Capacity -> All DBMSs -> Total Instance Storage -> Network-wide and click Generate Report. Figure 6-117 shows a sample output. Figure 6-117 Total Instance storage used network wide This is a quick overview database space consumption across the network. To drill down on a particular RDBMS type, select the appropriate magnifying glass icon as in Figure 6-118. Figure 6-118 DBMS drill down to the computer reports The report (Figure 6-119) displays. Chapter 6. Reporting 327 Figure 6-119 DBMS drill down to the computer result It shows the following fields for each Agent running DB2: Computer name Total size Container capacity Container free space Log file space Tablespace count Container count Log file count 6.4.7 Database instance storage report This report shows storage utilization by database instance. Go to IBM Tivoli SRM for Databases -> Reporting -> Capacity -> UDB -> Total Instance Storage -> by Instance, 328 IBM Tivoli Storage Resource Manager: A Practical Introduction select the computer(s) of interest, and click Generate Report. Figure 6-118 shows the result. Figure 6-120 DBMS report Total Instance Storage by Instance Note you could select any RDBMS which is installed in your network. The report shows the following information for each Agent with DB2, plus a total (summary): Computer name RDBMS instance Total size Container Capacity Container free space Log file capacity Tablespace count Container count Log file count 6.4.8 Database reports size by instance and by computer The next report is based on the previous report (database Instance storage report), but in more detail. From the report in Figure 6-120, click the magnifying glass next to a computer of interest. Then do a further drill down on the generated report as in Figure 6-121. Chapter 6. Reporting 329 Figure 6-121 Instance report RDBMS overview Select the computer again, and click the magnifying glass. The report shows the entire DB2 environment running on computer TONGA. We have 3 DB2 UDB databases, shown in Figure 6-122 and Figure 6-123. Figure 6-122 Instance running on computer TONGA first part Scroll to the right side of the panel. Figure 6-123 Instance running on computer TONGA second part Here we can see which databases are running in ARCHIVELOG mode. 330 IBM Tivoli Storage Resource Manager: A Practical Introduction 6.4.9 Locate the LUN on which a database is allocated This report shows you which disk or LUN is used by a database. Go to IBM Tivoli SRM for Databases -> Reporting -> Capacity -> UDB -> Total Instance Storage -> by Instance, select the Agent(s) of interest, then click Generate Report. Figure 6-124 shows the result. Figure 6-124 LUN report selection for an Database Select an Agent, and click the magnifying glass to drill down. Figure 6-125 displays. The report shows the following columns: File Type Path File Size Free Space Auto Extend of an File Chapter 6. Reporting 331 Figure 6-125 Database select File and Path Select now a particular data file, and click the magnifying glass. The generated pie chart is shown in Figure 6-126. We can see this data file is allocated on the C: drive. Figure 6-126 Report DB2 File in a Pie Chart for DB2 File Click the View Logical Volume button at the bottom to display the LUN report (Figure 6-127). 332 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-127 LUN information Using this procedure, we can find the LUNs where all the database data files are stored. This information is useful for a variety of purposes, e.g. for performance planning, availability planning, and assessing the impact of a LUN failure. 6.4.10 Finding important files on your systems This report generates a search for specific files over all computers managed by an IBM Tivoli Storage Resource Manager Server. As an example, we will look for the IBM Tivoli Storage Manager server and client options files. We have chosen this search for all machines because it will return a relatively small number of results; however, any search criteria could be used. The task requires a number of steps: 1. 2. 3. 4. 5. 6. Define new Profile Bind new Profile into a Scan Generate a Report with your Profile Define new Constraint Bind new Constraint into your Scan Generate a Report to find defined Constraint 1. Define the new Profile First create the Profile - IBM Tivoli SRM -> Monitoring -> Profiles, right-click, and select Create Profile. Fill out the description field accordingly, and check the Summarize space usage by, Accumulate history, and Gather information on the fields as desired. In the bottom half click size distribution of files, as shown in Figure 6-128. Chapter 6. Reporting 333 Figure 6-128 Create Profile for own File search Now select the File Filter tab. Click in the All files selected area and right-click to create a new condition, as shown in Figure 6-129. Figure 6-129 Create new Condition 334 IBM Tivoli Storage Resource Manager: A Practical Introduction Enter the desired file pattern into the Match field, and click Add to bring the condition to the display window below, as in Figure 6-130. You can select from different conditions like: – – – – Matches any of Matches none of Matches Does not match When you have finished the condition, click OK. In our case we are matching Tivoli Storage Manager option files. Figure 6-130 Create Condition add Figure 6-131 shows our newly created Condition. Chapter 6. Reporting 335 Figure 6-131 Saved Condition in new Profile Now save the new Profile with an appropriate name, (in this instance, Search for TSM Options Files). The saved Profile now appears in the Profiles list, see Figure 6-132. Tip: We recommend choosing meaningful Profile names, which reflect the content or function of the profile. 336 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-132 Listed Profiles containing Search for Tivoli Storage Manager Option File 2. Bind new Profile into a Scan First, create a new Scan - IBM Tivoli SRM -> Monitoring -> Scans. We chose Tivoli.Default Scan as shown in Figure 6-133. Fill in a description for this Scan and select the Filesystems and Computers on which the Scan will run. Chapter 6. Reporting 337 Figure 6-133 Add Profile to Scan On the Profiles tab, select the newly created Profile and add it to the Profiles to apply to Filesystems column, as shown in Figure 6-134. Figure 6-134 Add Profiles to Scan 338 IBM Tivoli Storage Resource Manager: A Practical Introduction Now select the schedule time when the schedule should run, save the Scan, then check the result. 3. Generate Report with your Profile To view the results, select IBM Tivoli SRM -> Reporting -> Usage -> File Size Distribution -> by Filesystem. Select all filesystems, select the Profile: administrator. Search for Tivoli Storage Manager Option Files and click Generate Report. The report contains all the option files discovered by the Scan as in Figure 6-135. Figure 6-135 Report with number of found Tivoli Storage Manager Option Files Note that on BONNIE’s C drive we found 13 files. 4. Define new Constraint We would like to know where specifically these files are located. To set up this search, select IBM Tivoli SRM -> Policy Management -> Constraints -> Tivoli.Orphaned File Constraint, as shown in Figure 6-136. Enter a description, and select the Filesystem Groups and Computers where you want to locate the files. Chapter 6. Reporting 339 Figure 6-136 Create Orphaned File search Select the Options tab, then select Edit Filter as shown in Figure 6-137. Figure 6-137 Update the Orphaned selection On the Edit Filter pop-up, double click the ATTRIBUTES Filter. Here we will replace the ORPHANED condition with our own filter, since we want to actually search for Tivoli Storage Manager option files, not orphaned files (Figure 6-138). 340 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-138 Update the selection with own data Use the Del button to delete the ORPHANED condition, then select NAME from the Attributes pull-down, and the Add button to add another Attributes condition. We will specify to search for Tivoli Storage Manager option files (including with an .smp extension for sample files), as in Figure 6-139. Figure 6-139 Enter the file search criteria After each file pattern entry, click Add to save it. When all search arguments are entered, click OK to save the search. The selection is now complete as in Figure 6-139. Chapter 6. Reporting 341 Figure 6-140 File Filter selection reconfirm Click OK again. Save the search with a new description and name (File -> Save As), so that you do not overwrite the original Tivoli.Orphaned File Constraint. We called the search “TSM Option File search.” Now we have to embed the new Constraint into our Scan. 5. Bind the new Constraint into your Scan To create or add this entry, go to IBM Tivoli SRM -> Monitoring -> Scans -> Tivoli.Default.Scan. In the Profiles tab, add administrator.TSM Opt File search to the right hand panel as in Figure 6-141. This will bind the Tivoli Storage Manager Option file search to the filesystem search. Figure 6-141 bind the Orphan search into Profiles to apply to Filesystems column Finally, save and run the Scan. Check the Scan Job log for correct execution, as shown in Figure 6-142. 342 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-142 Scan log check 6. Generate Report to find defined Constraint Now look for the results of the file name search. Select IBM Tivoli SRM -> Reporting -> Usage Violations -> Constraint Violations -> By Computer, select all computers and generate the report. The report will present a summary as in Figure 6-143. Figure 6-143 Summary report of all Tivoli Storage Manager option files Chapter 6. Reporting 343 To drill down, click the magnifying glass on BONNIE as in Figure 6-144. This shows all the filesystems on BONNIE where matching files were found. Figure 6-144 File selection for computer BONNIE Click the magnifying class on a filesystem (e.g. C drive). This will show all the files found which matched the pattern, as in Figure 6-145. Note there are 13 files reported, which matches the summary view given in Figure 6-135 on page 339. Figure 6-145 Report for Tivoli Storage Manager Option file searched 344 IBM Tivoli Storage Resource Manager: A Practical Introduction You can also drill down to individual files, for detailed information as in Figure 6-146. Figure 6-146 File detail information 6.5 Creating customized reports Customized Reporting within Tivoli Storage Resource Manager is done through the My Reports option, which is available for both Tivoli Storage Resource Manager and Tivoli Storage Resource Manager for Databases. There are three main options available within My Reports: System Reports Reports owned by username Batch Reports System Reports, while included here in the customized reporting section, is in fact not customizable currently. We will still discuss it in this section as it is part of the My Reports group. Reports owned by username’s Reports, where username is the currently logged in Tivoli Storage Resource Manager username, are modified versions of standard reports from the Reporting option. You will only see reports here that you have modified and saved. Batch Reports are reports that are typically set up to run on a schedule, although they can be run interactively. The key difference between Batch Reports and other reporting options is that with Batch Reports, the output will always be written to an output file rather than displayed on the screen. 6.5.1 System Reports These reports can, at this point in time at least, only be run as is. You cannot modify the parameters in any way, nor can you add additional reports to the list. Chapter 6. Reporting 345 These reports provide the same information than is available from running reports from the Reporting option. The intent of these reports is to provide frequently needed information, which can be provided quickly and repetitively without having to reenter parameters. IBM Tivoli Storage Resource Manager Figure 6-147 shows the available System Reports for Tivoli Storage Resource Manager. Figure 6-147 My Reports - System Reports Figure 6-148 shows the output from running the Storage Capacity system report. We could have generated exactly the same output by selecting IBM Tivoli SRM -> Reporting -> Capacity -> Disk Capacity -> By Computer -> Generate Report. Obviously, selecting IBM Tivoli SRM -> My Reports -> Storage Capacity is a lot simpler. 346 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-148 My Reports - Storage Capacity IBM Tivoli Storage Resource Manager for Databases The System Reports available for Tivoli Storage Resource Manager for Databases are shown in Figure 6-149. While there are quite a few reports available, they fall into three main categories: Database storage by database Database storage by user Database freespace The only report that does not fall into one of those categories is a usage violation report. Figure 6-149 shows the output from the All Dbms - User Database Space Usage report. We are not so much interested in the report contents as such here, but rather in the fact that when the report was run it produced a report for all users. You can go back to the selection tab and select specific users if required. This capability exists for all of the System Reports. Chapter 6. Reporting 347 Figure 6-149 Available System Reports for databases 6.5.2 Reports owned by a specific username In concept this option is very similar to System Reports. You can include here those reports that you need to run regularly, consistently and easily. The difference, compared to System Reports, is that you get to decide what reports are included and what they look like. However, it is important to remember that you will only see those reports that have been created by the currently logged in Tivoli Storage Resource Manager username. IBM Tivoli Storage Resource Manager We will define a report here for db2admin, the username that we are currently logged in as. We will create a report that is exactly the same as the Storage Capacity system report as shown in Figure 6-148. In practice this is not something you would normally do as a report already exists. However, this will demonstrate more clearly how the options relate to each other. We select IBM Tivoli SRM -> Reporting -> Capacity -> Disk Capacity -> By Computer -> Generate Report. Once the report is produced, we save the report definition, using the name My Storage Capacity. This is shown in Figure 6-150. 348 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-150 Create My Storage Capacity report Once the report is saved you will see it available under username’s Reports for db2admin as shown in Figure 6-151. There are a few features of saved reports worth mentioning here. Firstly, characteristics such as sort order are not saved with the report definition; however, selection criteria are saved. Secondly, you can override the selection criteria when running your report. By default the objects selected at the time of the save only will be reported. However, you can use the Selection tab when running the saved report to include or exclude objects from the report. If you change selection criteria you can resave the report, or save it under another name to update the definition or create a new definition respectively. Chapter 6. Reporting 349 Figure 6-151 My Storage Report saved IBM Tivoli Storage Resource Manager for Databases Database Reports created for specific users, in this case db2admin, are set up the same as in Tivoli Storage Resource Manager. We will show one brief example here. We will take one of the reports that we created earlier in our discussion on Reporting (in this case Figure 6-25 on page 268) the Monitored Tables by RDBMS Type report and set it up to be able to run more easily. First we run the report by choosing IBM Tivoli SRM for Databases -> Reporting -> Usage -> All DBMSs -> Tables -> Monitored Tables -> By RDBMS Type. We then saved the report definition, naming it Monitored Tables by RDBMS Type. This is shown in Figure 6-152. 350 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-152 Monitored Tables by RDBMS Types customized report The report is more easily run now by choosing IBM Tivoli SRM for Databases -> My Reports -> username’s Reports -> Monitored Tables by RDBMS Type. 6.5.3 Batch Reports In this section we will show how we set up some Batch Reports. All of the reports were set up in the same way so we will use only one as an example. The process is the same whether the report is for Tivoli Storage Resource Manager or Tivoli Storage Resource Manager for Databases. IBM Tivoli Storage Resource Manager To set up a new report right-click on Batch Reports and select New Batch Report. You will then see the screen shown in Figure 6-153. Chapter 6. Reporting 351 Figure 6-153 Create a Batch Report Now, it is a simply a matter of specifying what has to be reported, plus when and what the output should be. In this case we are going to create a system uptime report. As shown in Figure 6-154, we entered our report description of System Uptime and have then selected Availability ->Computer Uptime ->By Computer and clicked >>. Our selection is then moved into the right hand panel, Current Selections. Figure 6-154 Create a Batch Report - report selection We then selected the Selection tab, which is shown in Figure 6-155. Here we are able to select a subset of available data by either reporting for a specified time range or a subset of available systems. We took the defaults here. 352 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-155 Create a Batch Report - selection On the Options tab, we specified that the report should be executed and generated on the Agent called LOCHNESS, which is our Tivoli Storage Resource Manager server. We selected HTML for Report Type Specification and then changed the rules for the naming of the output file under Output File Specification. By default the name will be {Report creator}.{Report name}.{Report run number}. In this case we do not really care who created the report and having a variable like report run number, which changes every time a new version of the report is created and makes it difficult to access the file from a static Web page. So we changed the report name to be {Report name}.html. The report will be created in <install-directory>Tivoli Storage Resource Manager\log\Tivoli Storage Resource Manager-agent-name\reports on the Agent system where the report job is executed. There is no ability to override the directory name. For example, c:\program files\tivoli\tsrm\log\lochness\reports on our Windows 2000 Tivoli Storage Resource Manager server LOCHNESS or /usr/tivoli/tsrm/log/brazil/reports on our AIX Tivoli Storage Resource Manager Agent BRAZIL. The Option tab is shown in Figure 6-156. Note here that it possible to run a script after the report is created to perform some type of post-processing. For example, you might need to copy the output file to another system if your Web server is on a system that is not running an Tivoli Storage Resource Manager Agent. Chapter 6. Reporting 353 Figure 6-156 Create a Batch Report - options On the When to REPORT tab we specified when the report should be generated. We chose REPORT Repeatedly and then selected a time early in the morning (3:15 AM) and specified that the report should be generated every day. This is shown in Figure 6-157. 354 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-157 Create a Batch Report - when to report We left the Alert tab options as default, but it is possible to generate an Alert through several mechanisms including e-mail, an SNMP trap, or the Windows event log should the generation of the report fail. Finally, we saved the report, calling it System Uptime, as shown in Figure 6-158. Chapter 6. Reporting 355 Figure 6-158 Create a Batch Report - saving the report IBM Tivoli Storage Resource Manager for Databases We will use the same example here as we used in 6.5.2, “Reports owned by a specific username” on page 348, that is a Monitored Tables by RDBMS Type, but here we will save it in HTML format. We choose IBM Tivoli SRM for Databases -> My Reports -> Batch Reports, right-click Batch Reports and select New Batch Report as shown in Figure 6-159. 356 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-159 Create a database Batch Report Figure 6-160 shows the Report tab. We expanded in turn Usage -> All DBMSs -> Tables -> Monitored Tables -> By RDBMS Type and clicked >>. We also entered a Description of Monitored Tables by RDBMS Type. Figure 6-160 Create a database Batch Report - Report tab We accepted the defaults on the Selection tab, which is to report on all RDBMS types and then went to the Options tab, shown in Figure 6-161. We set the Agent computer, which will run the report to GALLIUM. Note that the system that you run the report on must be licensed for each type of database that you are reporting on. If we were to run the report on LOCHNESS, the Tivoli Storage Chapter 6. Reporting 357 Resource Manager server system, we would need to have the Tivoli Storage Resource Manager for Databases licences for Oracle and SQL-Server licences loaded there even though LOCHNESS does not run these databases. We also set the report type to HTML and changed the output file name to be {Report name}.html. This is shown in Figure 6-161. Figure 6-161 Create a database Batch Report - Options tab On the When to Report tab, shown in Figure 6-162, we chose REPORT Repeatedly and set a start time. 358 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-162 Create a database Batch Report - When to Report tab We did not change anything in the Alert tab. We saved the definition with the name Monitored Tables by RDBMS Type as shown in Figure 6-163. Figure 6-163 Create a database Batch Report - save definition We can now run the report by choosing IBM Tivoli SRM -> My Reports-> Batch Reports and then right-clicking on db2admin.Monitored Tables by RDBMS Type and choosing Run Now. Figure 6-164 shows the output from the report execution. Chapter 6. Reporting 359 Figure 6-164 Monitored Tables by RDBMS Type batch report output 6.6 Setting up a schedule for daily reports Tivoli Storage Resource Manager can produce reports according to a schedule. In our lab environment, we set up a number of Batch Reports as shown in Figure 6-165. Note that the name of each of the reports is prefixed by db2admin. This is the Windows username that we used to log into Tivoli Storage Resource Manager. Even though the reports were created by a particular user, other Tivoli Storage Resource Manager administrative users still have access to the reports (Tivoli Storage Resource Manager non-administrative users can only look at the results). It is possible to generate output from Batch Reports in various formats including HTML,CSV, (comma separated values) and formatted reports. For all of the reports that we set up, we specified HTML as the output type, and also set them to run on a daily schedule. That way it is very easy to use a browser to quickly look at the state of the organization’s storage. It also means that anyone can look at the reported data through their browser, without having access to, or indeed, knowing how to use Tivoli Storage Resource Manager. Obviously, if unrestricted access to this data was not desirable some sort of password based security could be included within the Web page. Currently, all of the HTML output from Batch Reports is in table format - graphs cannot be produced. There is also no ability to affect the layout of the reports in terms of sort order, nominating the columns to be displayed or the column size. Using the interactive reporting capability of the product does allow graphs to be produced and gives you some additional capability in determining what the output looks like. To go further than that you can export to a CSV file, and then use a tool such as Lotus 1-2-3® or Microsoft Excel to manipulate the output. The next section shows how to develop the Web site. 360 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-165 Batch Reports listing 6.7 Setting up a reports Web site Since Tivoli Storage Resource Manager can easily generate reports in HTML format, it is a logical extension to set up a Web site where the reports can be easily viewed. Since Tivoli Storage Resource Manager itself is easy to install and use, we likewise took a fairly simplistic view to creating the Web site. We used the Microsoft Word Web Page Wizard to create the basic layout of the page as shown in Figure 6-166. The main page has two frames. In the left hand frame we have created links to each of the report files. The right hand frame is where the reports are displayed. As additional Batch Reports are needed, it is a relatively simple process of editing the HTML source and including another hot link. Obviously, this could be made more sophisticated. An example would be to have the browser list all HTML files within the report directory. Chapter 6. Reporting 361 Figure 6-166 MS Word created Web page We then used the Virtual Directory Creation Wizard within Microsoft Internet Information Server (IIS) to set up access to the reports as shown in Figure 6-167. 362 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 6-167 Setting up a Virtual Directory within IIS We could then access the reports through a Web browser as shown in Figure 6-168. Chapter 6. Reporting 363 Figure 6-168 Reports available from a Web browser 6.8 Charging for storage usage Through the optional IBM Tivoli Storage Resource Manager for Chargeback product, IBM Tivoli Storage Resource Manager provides the ability to produce Chargeback information for storage usage. The following items can have charges allocated against them: Operating system storage by user Operating system disk capacity by computer Storage usage by database user Total size by database-tablespace For each of the Chargeback by user options, a Profile needs to be specified. Profiles are covered in 5.1.6, “Profiles” on page 180. IBM Tivoli Storage Resource Manager can directly produce an invoice or create a file in CIMS format. CIMS is a set of resource accounting tools that allow you to track, manage, allocate, and charge for IT resources and costs. For more information on CIMS see: http://www.cims.com. Figure 6-169 shows the Parameter Definition screen. The costs allocated here do not represent any real environment, but represent an example, based on these assumptions: 364 Disk hardware costs, including controllers and switches. is $0.50 per MB Hardware costs are only 20% of the total cost over the life of the storage = $2.50 /MB On average only 50% of the capacity is used = $5.00 /MB used The expected life of the storage is 4 years - $5.00 /48 = 0.1042 /MB /month IBM Tivoli Storage Resource Manager: A Practical Introduction The figures used are for monthly Chargeback Chargeback is for cost recovery only, no profit Figure 6-169 Chargeback parameter definition In this example we have chosen to perform Chargeback by computer. It is possible to separately charge for database usage and use a different rate from the computer rate. To do this you would need to set up a Profile that excluded the database data, otherwise, it would be counted twice. Chargeback is useful, even if you do not actually collect revenue from your users for the resources consumes. It is a very powerful tool for raising the awareness within the organization of the cost of storage, and the need to have the appropriate tools and processes in place to manage storage effectively and efficiently. Figure 6-170 shows the Chargeback Report being created. Currently, it is not possible to have the Chargeback Report created automatically (that is, scheduled). Chapter 6. Reporting 365 Figure 6-170 Create the Chargeback Report Example 6-3 shows the Chargeback Report that was produced. Example 6-3 Chargeback Report Tivoli SRM for ChargeBack User Usage Invoice page 1 24-Sep-02 Administrator.hb Name 100 group total SPACE (MB) COST 0.1042/MB 5 0.52 5 0.52 Tivoli SRM for ChargeBack User Usage Invoice page 2 24-Sep-02 Tivoli.Default User Group Name [Supervisor] 1009 101 1010 1012 1084 111 1414 202 240 50 5115 8482 9727 adm admin Administrators 366 IBM Tivoli Storage Resource Manager: A Practical Introduction SPACE (MB) COST 0.1042/MB 524 0 4 1 1 1 1 24 0 1 1 10 7 0 3 523 37,687 54.60 0.00 0.42 0.10 0.10 0.10 0.10 2.50 0.00 0.10 0.10 1.04 0.73 0.00 0.31 54.50 3,926.99 backup bin cbres daemon guest imnadm invscout itso_hb itso_usr IUSR_LOCHNESS IWAM_LOCHNESS lotti lp nobody oracle root sys SYSTEM uucp group total 27 1,173 1 1 1 2 1 134 1 1 1 7 1 1 5 5,857 1 3 2 2.81 122.23 0.10 0.10 0.10 0.21 0.10 13.96 0.10 0.10 0.10 0.73 0.10 0.10 0.52 610.30 0.10 0.31 0.21 46,008 4,793.97 Tivoli SRM for ChargeBack Run Summary User Usage Invoice page 3 24-Sep-02 46,013 MB run total 4,794.49 4,794 Example 6-4 shows the Chargeback Report in CIMS format. Example 6-4 Chargeback Report in CIMS format TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Administrator,hb,100,1,4230 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,[Supervisor],1,536328 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,1009,1,0 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,101,1,3924 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,1010,1,3 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,1012,1,1 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,1084,1,1 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,111,1,1 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,1414,1,23640 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,202,1,0 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,240,1,68 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,50,1,46 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,5115,1,9740 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,8482,1,6328 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,9727,1,0 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,adm,1,2820 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,admin,1,535384 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,Administrators,1,38591436 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,backup,1,27102 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,bin,1,1200421 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,cbres,1,2 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,daemon,1,413 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,guest,1,1 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default User Group,imnadm,1,1257 Chapter 6. Reporting 367 TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default TSAOU1,20020924,20020924,13:25:00,13:25:59,,3,Tivoli,Default 368 IBM Tivoli Storage Resource Manager: A Practical Introduction User User User User User User User User User User User User User Group,invscout,1,1 Group,itso_hb,1,137157 Group,itso_usr,1,2 Group,IUSR_LOCHNESS,1,3 Group,IWAM_LOCHNESS,1,5 Group,lotti,1,6497 Group,lp,1,339 Group,nobody,1,2 Group,oracle,1,4389 Group,root,1,5996617 Group,sys,1,26 Group,SYSTEM,1,2092 Group,uucp,1,1185 7 Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager This chapter discusses backup and restore strategies to protect the IBM Tivoli Storage Resource Manager environment. While there are many different backup products available, we will focus on IBM Tivoli Storage Manager. We assume that you have knowledge of IBM Tivoli Storage Manager, which can be obtained from the following Redbooks: IBM Tivoli Storage Management Concepts, SG24-4877 IBM Tivoli Storage Manager Implementation Guide, SG24-5416 Deploying the Tivoli Storage Manager Client in a Windows 2000 Environment, SG24-6141 Backing Up DB2 Using Tivoli Storage Manager, SG24-6147 Using Data Protection for Microsoft SQL Server, SG24-6148 We will discuss backup scenarios using both IBM DB2 UDB and Microsoft SQL-Server. Note that the database included as standard with Tivoli Storage Resource Manager, Cloudscape, is not recommended for a production environment, hence we do not discuss its backup here. © Copyright IBM Corp. 2003. All rights reserved. 369 7.1 IBM Tivoli Storage Resource Manager environment Tivoli Storage Resource Manager Components Tivoli Storage Resource Manager Server A repository - can be DB2/UDB, Oracle, Sybase or MS SQL-Server Cloudscape not recommended for production use Configuration, log and report files Tivoli Storage Resource Manager Agent Configuration, log and report files ibm.com/redbooks Figure 7-1 Tivoli Storage Resource Manager components Tivoli Storage Resource Manager relies on two main components: a Server and one or more Agents. Each of them stores configuration data in text files and/or in databases. We describe now each component and explain where they store their configuration information. 7.1.1 IBM Tivoli Storage Resource Manager Server The Tivoli Storage Resource Manager Server stores its configuration: In flat files in the directories (for Windows platforms - similar for UNIX): – \Program Files\tivoli\tsrm\config\ – \Program Files\tivoli\tsrm\scripts\ In a DB2, SQL-Server, Oracle, Sybase, or Cloudscape database The configuration files contain information including the TCP/IP ports to be used by the Server and Agents, database name, and username. The Tivoli Storage Resource Manager database contains information about the configured Agents, policies, schedules, and the actual storage resource data. Our Tivoli Storage Resource Manager database is called ITSRMDB. 370 IBM Tivoli Storage Resource Manager: A Practical Introduction 7.1.2 Tivoli Storage Resource Manager Agents All Agents store their configuration in flat files located in the directory \Program Files\tivoli\tsrm\config. 7.2 Integration with IBM Tivoli Storage Manager Integration with Tivoli Storage Manager Tivoli Storage Resource Manager config files Database TSM B/A client DB utility or TSM for DB TSM API TSM storage pools ibm.com/redbooks Figure 7-2 Tivoli Storage Resource Manager integration with Tivoli Storage Manager The IBM Tivoli Storage Resource Manager Web site is: http://www-3.ibm.com/software/tivoli/products/storage-resource-mgr/ 7.2.1 IBM Tivoli Storage Manager IBM Tivoli Storage Manager is an enterprise-wide storage management application for the network. It provides automated storage management services (including backup and restore, archive and retrieve, hierarchical space management and Disaster Recovery) to multi-vendor workstations, personal computers, mobile laptops, and servers of all sizes and operating systems, which are connected through WAN, LAN, and SAN. IBM Tivoli Storage Manager includes these components: Server - The repository for all backups and maintains the backup policies and schedules Clients - Backup data to the Tivoli Storage Manager Server API - Available to allow other applications to interface to Tivoli Storage Manager Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 371 The IBM Tivoli Storage Manager solution set also includes the following optional products: IBM Tivoli Storage Manager for Databases IBM Tivoli Storage Manager for ERP IBM Tivoli Storage Manager for Application Servers IBM Tivoli Storage Manager for Mail IBM Tivoli Space Manager (HSM client) Each of these products provide the interface between the IBM Tivoli Storage Manager API and an application or database API. The Tivoli Storage Manager Web site is: http://www-3.ibm.com/software/tivoli/products/storage-mgr/ IBM DB2/UDB databases can be backed up to IBM Tivoli Storage Manager as DB2/UDB has built in IBM Tivoli Storage Manager API support. Normal flat files (configuration, log and report files) on the Tivoli Storage Resource Manager Server can be backed up using the IBM Tivoli Storage Manager Backup/Archive client. Therefore, the two client types (Backup/Archive client for flat files, API client for DB2 backup) work together to provide full data protection for your Tivoli Storage Resource Manager environment. The DB2/UDB API client and the IBM Tivoli Storage Manager Backup/Archive client can run simultaneously on the same DB2 server, however, they are totally separate clients as far as the Tivoli Storage Manager server is concerned and we will configure them separately. 7.2.2 Setup for backing up Tivoli Storage Resource Manager We will use the following environment for backing up our Tivoli Storage Resource Manager Server to a Tivoli Storage Manager Server: Tivoli Storage Manager Server for AIX, V5.2.0.0, running on BANDA Tivoli Storage Manager Backup/Archive client for Windows 2000, V5.2.0.0 running on the Tivoli Storage Resource Manager Server BONNIE Tivoli Storage Manager DB2/UDB API client for Windows 2000, V5.2.0.0 running on the Tivoli Storage Resource Manager Server BONNIE Tivoli Storage Manager Backup/Archive client for LINUX, V5.2.0.0 running on the Tivoli Storage Resource Manager Agent SUSE82-1. 372 IBM Tivoli Storage Resource Manager: A Practical Introduction Backup environment for Tivoli Storage Resource Manager Ethernet Tivoli SRM Server DB2 V7.1 TSM Client 5.2.0.0 TSM API 5.2.0.0 TSM Server 5.2.0.0 Tivoli SRM Agent TSM Client 5.2.0.0 SuSE82-1 TSM Client 5.2.0.0 BANDA AIX 5.1.0 ML4 BONNIE Windows2000 SP3 ibm.com/redbooks © 2002 IBM Corporation Figure 7-3 Backup environment tor Tivoli Storage Resource Manager The summary of the setup steps is: 1. Configure the Tivoli Storage Manager Server to receive backups from the Tivoli Storage Resource Manager Server. 2. Configure the DB2/UDB API and Tivoli Storage Manager Backup/Archive clients on the Tivoli Storage Resource Manager Server. 7.2.3 Tivoli Storage Manager Server configuration We assume that: The Tivoli Storage Manager Server is installed and configured with sufficient storage. The Tivoli Storage Manager Backup/Archive and API code is installed on the Tivoli Storage Resource Manager Server. Appropriate backup policies (policy domain, management classes, copy groups) for non-DB2 backups (that is, flat files) have been implemented. You should be doing OS-level backups of the Windows 2000 Server, which runs the Tivoli Storage Resource Manager code. We need to specify a management class and copy group within a policy domain for DB2 backups. We recommend defining a separate policy domain for the DB2 backups. We will define a domain called DB2_DOMAIN and register the nodename assigned to the DB2 backup client (in our case, BONNIE_DB2) to it. DB2 places special requirements on the management class. Each DB2 database backup is stored as a unique object in the Tivoli Storage Manager Server, by specifying a time stamp as Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 373 part of the low-level qualifier (LL_NAME). This means that the DB2 backups must be manually deactivated. This also means that the management class that the backup objects are bound to should have retention settings that change the deactivated backup objects to be expired immediately. The retention settings for a backup copy group that would provide this is RETONLY=0 and VERDELETED=0. Example 7-1 shows typical Tivoli Storage Manager commands to define an adequate environment for DB2 backups. We define a policy domain, policy set, management class, and copy groups for the DB2 environment. We activate the policy set and register our client node to the policy domain. We are using a storage pool called BACK_LTO as the destination for our DB2 backups. Example 7-1 Tivoli Storage Manager setup for Tivoli Storage Resource Manager DB2 backups DEFINE DOMAIN DB2_DOMAIN DESCRIPTION="Domain for DB2 backups" BACKRETENTION=30 ARCHRETENTION=365 DEFINE POLICYSET DB2_DOMAIN DB2_POLICY DESCRIPTION="DB2 BACKUPS Policyset" DEFINE MGMTCLASS DB2_DOMAIN DB2_POLICY DB2_MGMTCLASS DESCRIPTION="Mgmtclass for DB2 databases" SPACEMGTECHNIQUE=NONE AUTOMIGNONUSE=0 MIGREQUIRESBKUP=YES DEFINE COPYGROUP DB2_DOMAIN DB2_POLICY DB2_MGMTCLASS DESTINATION=BACK_LTO FREQUENCY=0 VEREXISTS=1 VERDELETED=0 RETEXTRA=0 RETONLY=0 MODE=MODIFIED SERIALIZATION=SHRSTATIC DEFINE COPYGROUP DB2_DOMAIN DB2_POLICY DB2_MGMTCLASS TYPE=ARCHIVE DESTINATION=ARCHIVEPOOL RETVER=NOLIMIT SERIALIZATION=SHRSTATIC ASSIGN DEFMGMTCLASS DB2_DOMAIN DB2_POLICY DB2_MGMTCLASS ACTIVATE POLICYSET DB2_DOMAIN DB2_POLICY REGISTER NODE BONNIE_DB2 BONNIEDB2 DOMAIN=DB2_DOMAIN ARCHDELETE=YES BACKDELETE=YES USERID=NONE The following parameters for the backup copy group were set: VEREXISTS=1 to keep only one version of the backup file as the name of each DB2 backup is unique. (There will never be a newer version of the backup image with the same name.) VERDELETED=0 so that if the backup file has been deleted (through db2adutl), then Tivoli Storage Manager should not keep an inactive version of this file. RETEXTRA=0 (the same value as RETONLY) parameter will never be used as you will never have more than one version of the backup file. To prevent confusion set this parameter to the same value as RETONLY. RETONLY=0 so that when a backup image file becomes inactive it will be purged from the Tivoli Storage Manager Server at the next expiration. 7.2.4 Client configuration The client configuration takes place on BONNIE, the Tivoli Storage Resource Manager Server, since this will be the Tivoli Storage Manager client. For Tivoli Storage Resource Manager Agents, you should perform regular backups using the Tivoli Storage Manager Backup/Archive client. No special considerations for Tivoli Storage Resource Manager should be necessary. We will focus primarily on the setup for backing up the DB2 repository. 374 IBM Tivoli Storage Resource Manager: A Practical Introduction Tivoli Storage Manager nodenames The Tivoli Storage Resource Manager Server will use two different Tivoli Storage Manager client names, for DB2 and non-DB2 backups. We will assume the client named BONNIE (for the Tivoli Storage Manager Backup/Archive client) is already defined to the STANDARD policy domain. The client name BONNIE_DB2 will be used for DB2 backups, which was defined to the Tivoli Storage Manager Server in Example 7-1. Figure 7-2 shows the server QUERY NODE command to display currently configured clients. Example 7-2 Tivoli Storage Manager clients list tsm: BANDA>q node *bonnie* Node Name Platform Policy Domain Name Days Since Days Since Locked? Last AccePassword ss Set ------------------------- -------- -------------- ---------- ---------- ------BONNIE WinNT STANDARD <1 <1 No BONNIE_DB2 WinNT DB2_DOMAIN <1 <1 No DB2 configuration Now, you must configure DB2 so that it uses the correct Tivoli Storage Manager node name, password, and management class. This can be done in two different ways. Either you define these parameters within DB2 as shown in Example 7-4, or you can rely on information taken from the Tivoli Storage Manager client options file, in association with the default Tivoli Storage Manager settings defined in 7.2.3, “Tivoli Storage Manager Server configuration” on page 373. In both cases you will need to set some OS environment variables so that the Tivoli Storage Manager API is able to find the Tivoli Storage Manager options file and knows where to write log files. These environment variables are shown in Example 7-3. Tip: We used a different DSM.OPT (DB2_DSM.OPT) file to save our DB2 environment. To “inform” our DB2 environment, you have to define all the DSMI_ variables to the system. If you should choose this simple way, you do not have to add the Tivoli Storage Manager entries into the DB2 configuration of the database ITSRMDB as shown in Example 7-4, TSM_MGMTCLASS, TSM_NODENAME, TSM_OWNER, TSM_PASSWORD. If you have these entries in the DB2 configuration, you can remove them with the following commands: update db cfg for ITSRMDB using TSM_MGMTCLASS ‘’ update db cfg for ITSRMDB using TSM_OWNER ‘’ update db cfg for ITSRMDB using TSM_NODENAME ‘’ update db cfg for ITSRMDB using TSM_PASSWORD ‘’ Otherwise, define them into the system variables as shown in Example 7-3. Example 7-3 IBM Tivoli Storage Manager environment variables for API client DSMI_CONFIG=c:\tivoli\tsm\api\db2_dsm.opt DSMI_DIR=c:\tivoli\tsm\api DSMI_LOG=c:\tivoli\tsm\api Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 375 There are four Tivoli Storage Manager parameters that can be defined within DB2: Management class Owner Nodename Password Example 7-4 shows the setup of these parameters, however, our recommendation is not to set any of these parameters, but to rely on the Tivoli Storage Manager options file and default settings. If you rely on the Tivoli Storage Manager options file and default settings, then for the above four settings: the management class should be the default management class for the node, the owner is not required to be set, the nodename comes from the Tivoli Storage Manager options file and the password, when used with the Tivoli Storage Manager options file setting passwordaccess generate, is stored in encrypted form in the Windows registry or in a file on UNIX platforms. Being able to set these options within DB2 does offer some flexibility when you have multiple databases on the one system, which has different backup requirements. For example, you can set different management classes for each database. Example 7-4 DB2 configuration db2 => update db cfg for ITSRMDB using TSM_MGMTCLASS DB2_MGMTCLASS DB20000I The UPDATE DATABASE CONFIGURATION command completed successfully. DB21026I For most configuration parameters, all applications must disconnect from this database before the changes become effective. db2 => update db cfg for ITSRMDB using TSM_OWNER BONNIE_DB2 DB20000I The UPDATE DATABASE CONFIGURATION command completed successfully. DB21026I For most configuration parameters, all applications must disconnect from this database before the changes become effective. db2 => update db cfg for ITSRMDB using TSM_NODENAME BONNIE_DB2 DB20000I The UPDATE DATABASE CONFIGURATION command completed successfully. DB21026I For most configuration parameters, all applications must disconnect from this database before the changes become effective. db2 => update db cfg for ITSRMDB using TSM_PASSWORD BONNIEDB2 DB20000I The UPDATE DATABASE CONFIGURATION command completed successfully. DB21026I For most configuration parameters, all applications must disconnect from this database before the changes become effective. db2 => get db cfg for ITSRMDB . . . Number of database backups to retain Recovery history retention (days) TSM management class TSM node name TSM owner TSM password (NUM_DB_BACKUPS) (REC_HIS_RETENTN) (TSM_MGMTCLASS) (TSM_NODENAME) (TSM_OWNER) (TSM_PASSWORD) = = = = = = 12 366 DB2_MGMTCLASS BONNIE_DB2 BONNIE_DB2 ********* db2 => quit Now, you must configure DB2 for using online backups if you plan to run online backups of your database. The recovery mode is set by the LOGRETAIN parameter. 376 IBM Tivoli Storage Resource Manager: A Practical Introduction Example 7-5 Configure for online backup db2 => get db cfg for ITSRMDB . . Log retain for recovery enabled (LOGRETAIN) = OFF . . db2 => update db cfg for ITSRMDB using LOGRETAIN RECOVERY DB20000I The UPDATE DATABASE CONFIGURATION command completed successfully. DB21026I For most configuration parameters, all applications must disconnect from this database before the changes become effective. db2 => quit DB20000I The QUIT command completed successfully. C:\PROGRA~1\SQLLIB\BIN>db2stop force SQL1064N DB2STOP processing was successful. C:\PROGRA~1\SQLLIB\BIN>db2start SQL1063N DB2START processing was successful. Storing the API password Example 7-6 shows how to configure these parameters into the Tivoli Storage Manager API client, using the dsmapipw command. Example 7-6 Configuring DB2 backup password to Tivoli Storage Manager API client C:\Program Files\SQLLIB\adsm>dsmapipw.exe ************************************************************* * Tivoli Storage Manager * * API Version = 5.2.0 * ************************************************************* Enter your current password:bonniedb2 Enter your new password:bonniedb2 Enter your new password again:bonniedb2 Your new password has been accepted and updated. Stop and re-start DB2 to allow the changes to take effect. Example 7-7 Stop and start DB2 C:\PROGRA~1\SQLLIB\BIN>db2stop SQL1064N DB2STOP processing was successful. C:\PROGRA~1\SQLLIB\BIN>db2start SQL1063N DB2START processing was successful. Client option files Now configure the Tivoli Storage Manager API client option file, dsm.opt located in C:\Tivoli\tsm\api\ so that DB2 will point to the correct Tivoli Storage Manager Server, BANDA. Example 7-8 API dsm.opt file sample NODENAME PASSWORDACCESS BONNIE_DB2 GENERATE Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 377 TCPSERVERADDRESS banda.almaden.ibm.com As the DB2 database files are backed up using DB2, they must be excluded from backup by the normal Backup/Archive client. We excluded all DB2 files except the recovery log files. You must update the dsm.opt file located in c:\tivoli\tsm\baclient\ directory. Example 7-9 baclient dsm.opt file sample NODENAME PASSWORDACCESS TCPSERVERADDRESS EXCLUDE INCLUDE BONNIE GENERATE banda.almaden.ibm.com C:\DB2\...\* C:\DB2\...\*.LOG 7.2.5 Additional considerations The previous explanation shows you how to perform a basic configuration for Tivoli Storage Manager, so that you can send DB2 backups directly to Tivoli Storage Manager storage. However, you should note the following considerations: DB2 archives are generated on local disk. They must be protected against loss through mirroring or archival. You can also activate an exit to automatically archive DB2 logs. Old database backups must be manually deleted from the Tivoli Storage Manager Server once they are not needed using the db2adutl utility. Depending on your recovery requirements, you may have to configure additional DB2 parameters (such as NUM_DB_BACKUPS and REC_HIS_RETENTN). See the redbook Backing Up DB2 Using Tivoli Storage Manager, SG24-6147 for detailed information on setting up DB2 backups with Tivoli Storage Manager. 7.3 Backup procedures We describe now the procedures used to backup the major components of Tivoli Storage Resource Manager. 378 IBM Tivoli Storage Resource Manager: A Practical Introduction Tivoli Storage Resource Manager backup procedures Tivoli Storage Resource Manager Agents Incremental backup of files Tivoli Storage Resource Manager Server Incremental backup of files Tivoli Storage Resource Manager database Online backup ibm.com/redbooks Figure 7-4 Procedures used to backup Tivoli Storage Resource Manager 7.3.1 Agent files The configuration files contain relatively static information. Therefore, we recommend using a traditional incremental backup policy to backup the files. In addition, there will be report and log files to be backed up. Again a traditional incremental backup method is appropriate here. We show backup of a Linux Agent, SUSE82-1 using the Tivoli Storage Manager Backup/Archive client in Example 7-10. Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 379 Example 7-10 Backup of Agent’s files linux:/opt/tivoli/tsm/client/ba/bin # dsmc i /opt/ IBM Tivoli Storage Manager Command Line Backup/Archive Client Interface - Version 5, Release 2, Level 0.0 (c) Copyright by IBM Corporation and other(s) 1990, 2003. All Rights Reserved. Node Name: SUSE82-1 Please enter your user id <SUSE82-1>: Please enter password for user id "SUSE82-1": Incremental backup of volume '/opt/’ . . Normal File--> 668,678 /opt/tivoli/TSRM/agent/lib/ibmpkcs.jar [Sent] Normal File--> 1,928 /opt/tivoli/TSRM/agent/lib/local_policy.jar [Sent] Normal File--> 168 /opt/tivoli/TSRM/config/agent.config [Sent] Normal File--> 233,710 /opt/tivoli/TSRM/install/TSRMRequest.jar [Sent] Normal File--> 1,831,100 /opt/tivoli/TSRM/install/TSRMins.jar [Sent] . . Normal File--> 7,365 /opt/tivoli/TSRM/java/lib/security/cacerts [Sent] Normal File--> 2,224 /opt/tivoli/TSRM/java/lib/security/java.policy [Sent] Normal File--> 4,083 /opt/tivoli/TSRM/java/lib/security/java.security [Sent] Directory--> 720 /opt/tivoli/TSRM/log/suse82-1 [Sent] Directory--> 48 /opt/tivoli/TSRM/log/suse82-1/restart [Sent] Normal File--> 542 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Probe.0005_probe.00000362.log [Sent] Normal File--> 542 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Probe.0006_probe.00000367.log [Sent] Normal File--> 542 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Probe.0007_probe.00000376.log [Sent] Normal File--> 542 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Probe.0009_probe.00000420.log [Sent] Normal File--> 542 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Probe.0010_probe.00000510.log [Sent] Normal File--> 1,025 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Scan.0009_scan.00000407.log [Sent] Normal File--> 1,025 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Scan.0010_scan.00000413.log [Sent] Normal File--> 199 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Discovery.0004_discovery.00000371.log [Sent] Normal File--> 1,930 /opt/tivoli/TSRM/log/suse82-1/agent_000001.log [Sent] Normal File--> 163 /opt/tivoli/TSRM/log/suse82-1/agent_000002.log [Sent] Normal File--> 1,069 . . Successful incremental backup of '/opt/*' Total number of objects inspected: Total number of objects backed up: Total number of objects updated: Total number of objects rebound: Total number of objects deleted: Total number of objects expired: Total number of objects failed: Total number of bytes transferred: Data transfer time: 380 20,633 20,352 0 0 0 0 0 416.44 MB 20.84 sec IBM Tivoli Storage Resource Manager: A Practical Introduction Network data transfer rate: Aggregate data transfer rate: Objects compressed by: Elapsed processing time: 20,454.91 KB/sec 2,280.36 KB/sec 0% 00:03:07 7.3.2 Server files We used the standard Tivoli Storage Manager Backup/Archive Windows 2000 client to execute a daily incremental backup of all the files excluding the database. The operating system components, such as the Windows registry, are also backed up. Running the backup The output of the backup procedure is shown in Example 7-11. Example 7-11 Backup of server files C:\tivoli\tsm\baclient>dsmc inc IBM Tivoli Storage Manager Command Line Backup/Archive Client Interface - Version 5, Release 2, Level 0.0 (c) Copyright by IBM Corporation and other(s) 1990, 2003. All Rights Reserved. Node Name: BONNIE Session established with server BANDA: AIX-RS/6000 Server Version 5, Release 2, Level 0.0 Server date/time: 06/11/2003 14:03:34 Last access: 06/11/2003 11:52:18 Incremental backup of volume '\\BONNIE\C$' Incremental backup of volume '\\BONNIE\F$' Incremental backup of volume 'SYSTEMOBJECT' Backup System Object: 'COM+ Database'. Backup System Object: 'Event Log'. Backup System Object: 'System and Boot Files'. Backup System Object: 'Registry'. Backup System Object: 'RSM Database'. Backup System Object: 'WMI Database'. . . . Directory--> 0 \\bonnie\c$\Program Files\Tivoli\TSRM\log [Sent] Files\Tivoli\TSRM\log\Scheduler_000001.log [Sent] Normal File--> 279 \\bonnie\c$\Program Files\Tivoli\TSRM\log\Scheduler_000005.log [Sent] Normal File--> 925 \\bonnie\c$\Program Files\Tivoli\TSRM\log\Scheduler_000006.log [Sent] Files\Tivoli\TSRM\log\server_000002.log [Sent] Files\Tivoli\TSRM\log\server_000003.log [Sent] Files\Tivoli\TSRM\log\server_000004.log [Sent] Normal File--> 5,537 \\bonnie\c$\Program Files\Tivoli\TSRM\log\server_000007.log [Sent] Normal File--> 993 \\bonnie\c$\Program Files\Tivoli\TSRM\log\server_000008.log [Sent] Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 381 Normal File--> 533 \\bonnie\c$\Program Files\Tivoli\TSRM\log\server_000009.log [Sent] Files\Tivoli\TSRM\log\TivoliSRM_000001.log [Sent] Normal File--> 275 \\bonnie\c$\Program Files\Tivoli\TSRM\log\TivoliSRM_000005.log [Sent] Normal File--> 129 \\bonnie\c$\Program Files\Tivoli\TSRM\log\TivoliSRM_000006.log [Sent] Normal File--> 42 \\bonnie\c$\Program Files\Tivoli\TSRM\log\TSRMsrv1.out [Sent] Normal File--> 54 \\bonnie\c$\Program Files\Tivoli\TSRM\tec\cache [Sent] . . . Total number of objects inspected: 25,379 Total number of objects backed up: 1,933 Total number of objects updated: 1 Total number of objects rebound: 0 Total number of objects deleted: 0 Total number of objects expired: 7 Total number of objects failed: 8 Total number of bytes transferred: 239.33 MB Data transfer time: 20.05 sec Network data transfer rate: 12,219.79 KB/sec Aggregate data transfer rate: 3,355.79 KB/sec Objects compressed by: 0% Elapsed processing time: 00:01:13 7.3.3 IBM Tivoli Storage Resource Manager database Depending on the availability you require from the Tivoli Storage Resource Manager Server, you can choose between online and offline backups of the DB2 database. Offline backups will require a shutdown of the DB2 database, which implies a shutdown of the Tivoli Storage Resource Manager application. We explain here how to perform both an online and offline backup of the Tivoli Storage Resource Manager DB2 database. Note: Please refer to this documentation for detailed information about DB2 protection and Tivoli Storage Manager integration: Backing Up DB2 Using Tivoli Storage Manager, SG24-6147 IBM DB2 Universal Database - Administration Guide: Implementation - Version 7, SC09-2944 IBM DB2 Universal Database - Command Reference - Version 7, SC09-2951 Offline backup An offline backup will run only if the database is not currently in use. You must stop the database or at least close all connections. In our case, we do not have to stop the database since Tivoli Storage Resource Manager is the application using it. Check this using the DB2 command shown in Example 7-12. We then stopped the Tivoli Storage Resource Manager Server - this will close all active connections to the Tivoli Storage Resource Manager database. Example 7-12 Active connections to IBM Tivoli SRM database C:\PROGRA~1\SQLLIB\BIN>db2 list applications for database itsrmdb Auth Id 382 Application Name Appl. Handle Application Id IBM Tivoli Storage Resource Manager: A Practical Introduction DB Name # of Agents -------- -------------- ---------- ------------------------------ -------- ----TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 java.exe java.exe java.exe java.exe java.exe java.exe java.exe java.exe java.exe java.exe 21 22 23 24 25 26 31 32 33 34 *LOCAL.DB2.030611201922 *LOCAL.DB2.030611201923 *LOCAL.DB2.030611201924 *LOCAL.DB2.030611201925 *LOCAL.DB2.030611201926 *LOCAL.DB2.030611201927 *LOCAL.DB2.030611202834 *LOCAL.DB2.030611204425 *LOCAL.DB2.030611204435 *LOCAL.DB2.030611204522 ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB 1 1 1 1 1 1 1 1 1 1 C:\bkupscripts>net stop "IBM Tivoli SRM Server" The IBM Tivoli SRM Server service is stopping. The IBM Tivoli SRM Server service was stopped successfully. C:\bkupscripts>db2 list applications for database itsrmdb SQL1611W No data was returned by Database System Monitor. SQLSTATE=00000 You can see that after stopping the application, message SQL1611W is returned by db2 list applications for database itsrmdb, which means that no connections are active on the database. The backup script, ITSRMBackupOffline (displayed in Example 7-13) performs the following operations: 1. Stop Tivoli Storage Resource Manager application. 2. Run backup of ITSRMDB database. 3. Start Tivoli Storage Resource Manager application. Example 7-13 ITSRMBackupOffline - offline backup script for ITSRMDB database @ECHO ON @REM Stop the IBM Tivoli SRM server @REM -----------------------------net stop "IBM Tivoli SRM Server" @ECHO ON @REM Get Status and check if Stopped @REM ------------------------------net start | findstr /i "IBM Tivoli SRM Server" @if %errorlevel% EQU 0 GOTO BACKUPDB :NOTSTOPPED @ECHO ON @REM IBM Tivoli SRM server not stopped - Backup cannot run @REM ----------------------------------------------------@echo "IBM Tivoli SRM Not Stopped !!!" @echo "Backup process cancelled " exit 1 :BACKUPDB @ECHO ON @REM IBM Tivoli ITSRM server is stopped - Backup can run @REM ------------------------------------------------@echo "Backup of ITSRMDB starting ..." C:\PROGRA~1\SQLLIB\BIN\db2cmd.exe /c /w /i db2 backup database ITSRMDB USE TSM @if %errorlevel% NEQ 0 echo "Backup failed - Please check error messages" Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 383 @REM Backup completed - Start IBM Tivoli SRM @REM --------------------------------------:STARTITSRM net start "IBM Tivoli SRM Server" @ECHO ON @REM Get Status and check if Started @REM ------------------------------net start | findstr /i "IBM Tivoli SRM Server" @if %errorlevel% EQU 0 GOTO STARTOK @REM IBM Tivoli SRM not started @REM -------------------------@echo "IBM Tivoli SRM Server Not Started !!!" exit 1 @REM IBM Tivoli SRM started @REM ---------------------:STARTOK @echo "IBM Tivoli SRM started successfully" The output of the backup script execution is shown in Example 7-14. Example 7-14 Offline backup of ITSRMDB output C:\bkupscripts>ITSRMBackupOffline.cmd C:\bkupscripts>net stop "IBM Tivoli SRM Server" The IBM Tivoli SRM Server service is stopping. The IBM Tivoli SRM Server service was stopped successfully. C:\bkupscripts>net start | findstr /i "IBM Tivoli SRM Server" DB2 JDBC Applet Server DB2 License Server DB2 Security Server Server VNC Server "Backup of ITSRMDB starting ..." C:\bkupscripts>C:\PROGRA~1\SQLLIB\BIN\db2cmd.exe /c /w /i db2 backup database IT SRMDB USE TSM Backup successful. The timestamp for this backup image is : 20030611131856 C:\bkupscripts>net start "IBM Tivoli SRM Server" The IBM Tivoli SRM Server service is starting. The IBM Tivoli SRM Server service was started successfully. C:\bkupscripts>net start | findstr /i "IBM Tivoli SRM Server" DB2 JDBC Applet Server DB2 License Server DB2 Security Server IBM Tivoli SRM Server Server VNC Server "IBM Tivoli SRM started successfully" 384 IBM Tivoli Storage Resource Manager: A Practical Introduction C:\bkupscripts> Online backup An online backup can run while applications are still accessing the data. DB2 will manage the enqueue process and will use its recovery log to track all changes made to the database while the backup is running. Your database must be configured for online backups (see Example 7-5 on page 377). The database backup procedure, ITSRMBackupOnline, displayed in Example 7-15, includes: 1. List current connections. 2. Run backup of ITSRMDB database. 3. List current connections. Example 7-15 ITSRMBackupOnline script @ECHO ON @REM List active connections for information @REM --------------------------------------db2cmd.exe /c /w /i db2 list applications for database ITSRMDB | findstr /i SQL1032N @if %errorlevel% NEQ 0 GOTO BACKUPDB @REM SQL1032N found - DB is not started @REM ---------------------------------@echo "SQL1032N return - DB2 is not active - Backup cancelled !!!" exit 1 :BACKUPDB @ECHO ON @REM DB2 is active - Backup can run @REM -----------------------------@echo "Backup of ITSRMDB starting ..." C:\PROGRA~1\SQLLIB\BIN\db2cmd.exe /c /w /i db2 backup database ITSRMDB ONLINE USE TSM @if %errorlevel% NEQ 0 echo "Backup failed - Please check error messages" @REM Backup completed - List connections @REM ----------------------------------db2cmd.exe /c /w /i db2 list applications for database ITSRMDB The output of this script execution is shown in Example 7-16. Example 7-16 Online Backup of ITSRMDB output C:\bkupscripts>ITSRMBackupOnline.cmd C:\bkupscripts>db2cmd.exe /c /w /i db2 list applications for database ITSRMDB | findstr /i SQL1032N "Backup of ITSRMDB starting ..." C:\bkupscripts>C:\PROGRA~1\SQLLIB\BIN\db2cmd.exe /c /w /i db2 backup database IT SRMDB ONLINE USE TSM Backup successful. The timestamp for this backup image is : 20030611132049 C:\bkupscripts>db2cmd.exe /c /w /i db2 list applications for database ITSRMDB Auth Id Application Name Appl. Handle Application Id DB Name # of Agents Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 385 -------TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 TSRMSRV1 -------------java.exe java.exe java.exe java.exe java.exe java.exe ---------21 22 23 24 25 26 -----------------------------*LOCAL.DB2.030611201922 *LOCAL.DB2.030611201923 *LOCAL.DB2.030611201924 *LOCAL.DB2.030611201925 *LOCAL.DB2.030611201926 *LOCAL.DB2.030611201927 -------ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB ITSRMDB ----1 1 1 1 1 1 C:\bkupscripts> You can check the status of your backups using the db2adutl command, which is only valid for backups done using Tivoli Storage Manager. Example 7-17 db2adutl output C:\PROGRA~1\SQLLIB\BIN>db2adutl query database ITSRMDB Query for database ITSRMDB Retrieving FULL DATABASE BACKUP information. 1 Time: 20030611142057 Oldest log: S0000001.LOG 2 Time: 20030611132049 Oldest log: S0000000.LOG 3 Time: 20030611131856 Oldest log: S0000000.LOG 4 Time: 20030611131342 Oldest log: S0000000.LOG Node: Node: Node: Node: 0 0 0 0 Sessions: Sessions: Sessions: Sessions: 1 1 1 1 Retrieving INCREMENTAL DATABASE BACKUP information. No INCREMENTAL DATABASE BACKUP images found for ITSRMDB Retrieving DELTA DATABASE BACKUP information. No DELTA DATABASE BACKUP images found for ITSRMDB Retrieving TABLESPACE BACKUP information. No TABLESPACE BACKUP images found for ITSRMDB Retrieving INCREMENTAL TABLESPACE BACKUP information. No INCREMENTAL TABLESPACE BACKUP images found for ITSRMDB Retrieving DELTA TABLESPACE BACKUP information. No DELTA TABLESPACE BACKUP images found for ITSRMDB Retrieving LOAD COPY information. No LOAD COPY images found for ITSRMDB Retrieving LOG ARCHIVE information. No LOG ARCHIVE images found for ITSRMDB We see our two latest backups with timestamps 20030611142057 and 20030611132049. 386 IBM Tivoli Storage Resource Manager: A Practical Introduction 7.4 Restore procedures Tivoli Storage Resource Manager restore procedures Tivoli Storage Resource Manager Agents Restore of lost files Tivoli Storage Resource Manager Server Restore of lost files Tivoli Storage Resource Manager database Database restore command ibm.com/redbooks Figure 7-5 Tivoli Storage Resource Manager restore procedures We describe now the procedures we have used to recover from: A loss of major Agent files A loss of major Manager files A loss of the Tivoli Storage Resource Manager database 7.4.1 Restore Agent files In this restore procedure, we have: Stopped the Agent Deleted some files including the Agent executable and configuration file Tried to start the Agent, which failed Restored all of the deleted files Successfully started the Agent You can see in Example 7-18, all the steps executed to destroy and recover the Agent files. Example 7-18 Agent restore procedure output linux:/etc/init.d # ps -ef | grep java root 4367 4350 0 08:11 pts/0 00:10:04 /opt/tivoli/TSRM/java/bin/exe/java -cp /opt/tivoli/TSRM/agent/lib/TSRMagt.zip:/opt/tivoli/TSRM/agent/lib/Sprinta2000.jar:/opt/tivo li/TSRM/agent/lib/ibmjcefw.jar:/opt/tivoli/TSRM/agent/lib/TSRMRequest.jar:/opt/tivoli/TSRM/ agent/lib/ibmpkcs.jar:/opt/tivoli/TSRM/agent/lib/ibmjceprovider.jar:/opt/tivoli/TSRM/agent/ Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 387 lib/US_export_policy.jar:/opt/tivoli/TSRM/agent/lib/local_policy.jar com.tivoli.itsrm.agent.svp.Agent . . root 4367 4380 0 08:11 pts/0 00:10:00 /opt/tivoli/TSRM/java/bin/exe/java -cp /opt/tivoli/TSRM/agent/lib/TSRMagt.zip:/opt/tivoli/TSRM/agent/lib/Sprinta2000.jar:/opt/tivo li/TSRM/agent/lib/ibmjcefw.jar:/opt/tivoli/TSRM/agent/lib/TSRMRequest.jar:/opt/tivoli/TSRM/ agent/lib/ibmpkcs.jar:/opt/tivoli/TSRM/agent/lib/ibmjceprovider.jar:/opt/tivoli/TSRM/agent/ lib/US_export_policy.jar:/opt/tivoli/TSRM/agent/lib/local_policy.jar com.tivoli.itsrm.agent.svp.Agent linux:/etc/init.d # ./tsrmagt1 stop linux:/etc/init.d # linux:/etc/init.d # ps -ef | grep TSRMagt1 linux:/etc/init.d # linux:/etc/init.d # cd /opt/tivoli/TSRM linux:/opt/tivoli/TSRM # linux:/opt/tivoli/TSRM # rm config/* linux:/opt/tivoli/TSRM # rm agent/bin/linux_i386/* linux:/opt/tivoli/TSRM # cd /etc/init.d linux:/etc/init.d # ./tsrmagt1 start linux:/etc/init.d # 06-11 08:49:09 GEN0198I: Agent starting Exception in thread "main" linux:/etc/init.d # dsmc restore /opt/tivoli/TSRM/ -subdir=yes -replace=yes IBM Tivoli Storage Manager Command Line Backup/Archive Client Interface - Version 5, Release 2, Level 0.0 (c) Copyright by IBM Corporation and other(s) 1990, 2003. All Rights Reserved. Restore function invoked. Node Name: SUSE82-1 Session established with server BANDA: AIX-RS/6000 Server Version 5, Release 2, Level 0.0 Server date/time: 06/11/03 16:05:10 Last access: 06/11/03 16:03:04 ANS1247I Waiting for files from the server... Restoring 176 /opt/tivoli/TSRM/agent [Done] Restoring 80 /opt/tivoli/TSRM/config [Done] Restoring 432 /opt/tivoli/TSRM/install [Done] Restoring 160 /opt/tivoli/TSRM/java [Done] Restoring 72 /opt/tivoli/TSRM/log [Done] Restoring 48 /opt/tivoli/TSRM/scripts [Done] Restoring 80 /opt/tivoli/TSRM/agent/bin [Done] Restoring 112 /opt/tivoli/TSRM/agent/guid [Done] Restoring 320 /opt/tivoli/TSRM/agent/lib [Done] Restoring 168 /opt/tivoli/TSRM/agent/bin/linux_i386 [Done] ... Restoring 1,025 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Default Scan.0010_scan.00000413.log [Done] Restoring 199 /opt/tivoli/TSRM/log/suse82-1/Tivoli.Discovery.0004_discovery.00000371.log [Done] Restoring 1,930 /opt/tivoli/TSRM/log/suse82-1/agent_000001.log [Done] Restoring 163 /opt/tivoli/TSRM/log/suse82-1/agent_000002.log [Done] Restoring 1,069 /opt/tivoli/TSRM/log/suse82-1/db2admin.filling_the_DB_with_scan.0011_scan.00000503.log [Done] Restore processing finished. 388 IBM Tivoli Storage Resource Manager: A Practical Introduction Total number of objects restored: 281 Total number of objects failed: 0 Total number of bytes transferred: 41.70 MB Data transfer time: 3.11 sec Network data transfer rate: 13,716.17 KB/sec Aggregate data transfer rate: 4,730.41 KB/sec Elapsed processing time: 00:00:09 linux:/etc/init.d # ./tsrmagt1 start linux:/etc/init.d # 06-11 09:05:31 GEN0198I: Agent starting linux:/etc/init.d # ps -ef | grep java root 4366 1 13 09:10 pts/0 00:00:04 /opt/tivoli/TSRM/java/bin/exe/java -cp /opt/tivoli/TSRM/agent/lib/TSRMagt.zip:/opt/tivoli/TSRM/agent/lib/Sprinta2000.jar:/opt/tivo li/TSRM/agent/lib/ibmjcefw.jar:/opt/tivoli/TSRM/agent/lib/TSRMRequest.jar:/opt/tivoli/TSRM/ agent/lib/ibmpkcs.jar:/opt/tivoli/TSRM/agent/lib/ibmjceprovider.jar:/opt/tivoli/TSRM/agent/ lib/US_export_policy.jar:/opt/tivoli/TSRM/agent/lib/local_policy.jar com.tivoli.itsrm.agent.svp.Agent . . root 4387 4380 0 09:11 pts/0 00:00:00 /opt/tivoli/TSRM/java/bin/exe/java -cp /opt/tivoli/TSRM/agent/lib/TSRMagt.zip:/opt/tivoli/TSRM/agent/lib/Sprinta2000.jar:/opt/tivo li/TSRM/agent/lib/ibmjcefw.jar:/opt/tivoli/TSRM/agent/lib/TSRMRequest.jar:/opt/tivoli/TSRM/ agent/lib/ibmpkcs.jar:/opt/tivoli/TSRM/agent/lib/ibmjceprovider.jar:/opt/tivoli/TSRM/agent/ lib/US_export_policy.jar:/opt/tivoli/TSRM/agent/lib/local_policy.jar com.tivoli.itsrm.agent.svp.Agent root 4389 4050 0 09:11 pts/0 00:00:00 grep java From the Tivoli Storage Resource Manager: Administrative GUI we checked to ensure that the Agent had started successfully (IBM Tivoli SRM -> Administrative Services -> Agents), right-click SUSE82-1 and chose Check. Figure 7-5 shows that the Agent on SUSE82-1 did start. Figure 7-6 Agent is connected to the server after restore Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 389 7.4.2 IBM Tivoli Storage Resource Manager Server files Since our Tivoli Storage Resource Manager Server system also has an Agent running on it, and the Server and Agent files are stored in the same directory structure, in this restore test we will be recovering both the Server and Agent. The restore procedure has the following steps: 1. 2. 3. 4. 5. Stop the Tivoli Storage Resource Manager Server and Agent. Delete Tivoli Storage Resource Manager directories. Try to start the Server - fails. Restore all deleted directories. Successfully start the Tivoli Storage Resource Manager Server and Agent. Example 7-19 shows the Server and Agent being stopped, the files being deleted, and the Server and Agent failing to start. Example 7-19 Stop server and Agent and delete commands C:\Program Files\Tivoli\TSRM>net stop "IBM Tivoli SRM Server" The IBM Tivoli SRM Server service is stopping. The IBM Tivoli SRM Server service was stopped successfully. C:\Program Files\Tivoli\TSRM>del *.* /s /q > Deleted file - C:\Program Files\Tivoli\TSRM\autorun.inf Deleted file - C:\Program Files\Tivoli\TSRM\ibmchanges.txt Deleted file - C:\Program Files\Tivoli\TSRM\ibmchanges.zip Deleted file - C:\Program Files\Tivoli\TSRM\INSTANCE1.DAT Deleted file - C:\Program Files\Tivoli\TSRM\ITSRM_1.2.2.07_windows.zip Deleted file - C:\Program Files\Tivoli\TSRM\license_key.txt Deleted file - C:\Program Files\Tivoli\TSRM\license_srm.txt Deleted file - C:\Program Files\Tivoli\TSRM\SERVER.ID Deleted file - C:\Program Files\Tivoli\TSRM\setup.exe Deleted file - C:\Program Files\Tivoli\TSRM\UPTIME.bonnie Deleted file - C:\Program Files\Tivoli\TSRM\version.txt Deleted file - C:\Program Files\Tivoli\TSRM\agent\bin\WIN32_I386\TSRMagt.dll ... C:\Program Files\Tivoli\TSRM>cd .. C:\Program Files\Tivoli>rmdir tsrm /s tsrm, Are you sure (Y/N)? y C:\Program Files\Tivoli>net start "IBM Tivoli SRM Server" System error 2 has occurred. The system cannot find the file specified. C:\Program Files\Tivoli>net start "IBM Tivoli SRM Agent" System error 2 has occurred. The system cannot find the file specified. We launched the Tivoli Storage Manager Backup/Archive client interface and started the restore of the deleted directories, shown in Figure 7-7. 390 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 7-7 IBM Tivoli Storage Manager restore interface Figure 7-8 shows the successful restore of the Tivoli Storage Resource Manager files. Figure 7-8 Restore completed successfully We were then able to successfully restart the Server and Agent as shown in Example 7-20. Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 391 Example 7-20 Server and Agent started successfully after restore C:\Program Files\Tivoli>net start "IBM Tivoli SRM Server" The IBM Tivoli SRM Server service is starting. The IBM Tivoli SRM Server service was started successfully. C:\Program Files\Tivoli>net start "IBM Tivoli SRM Agent" The IBM Tivoli SRM Agent service is starting. The IBM Tivoli SRM Agent service was started successfully. Figure 7-9 shows the Tivoli Storage Manager Administrative GUI, where all of the Agents have successfully reconnected to the Server after the restore. Figure 7-9 Agents successfully reconnected after restore 7.4.3 Tivoli Storage Resource Manager database We will now test restoring the Tivoli Storage Resource Manager DB2 repository. In this restore procedure, we: Stop the Tivoli Storage Resource Manager Server Delete all rows in the ITSRMDB tables Restore an old ITSRMDB database backup Reapply the log up till the delete row commands Successfully start the server Figure 7-21 shows stopping the Server and the SQL DELETE commands used to delete the contents of the ITSRMDB tables. Example 7-21 ITSRMDB corruption through DELETE commands C:\PROGRA~1\SQLLIB\BIN>net stop "IBM Tivoli SRM Server" The IBM Tivoli SRM Server service is stopping. 392 IBM Tivoli Storage Resource Manager: A Practical Introduction The IBM Tivoli SRM Server service was stopped successfully. C:\PROGRA~1\SQLLIB\BIN>cd C:\bkupscripts C:\bkupscripts>db2 connect to ITSRMDB user db2admin Enter current password for db2admin: Database Connection Information Database server SQL authorization ID Local database alias = DB2/NT 7.2.6 = DB2ADMIN = ITSRMDB C:\bkupscripts>db2 "select 'DROP TABLE TIVOLISRM.'||tabname||';' from syscat.tab les where tabschema = 'TIVOLISRM'" > drop_SRM.sql C:\bkupscripts>db2 -tf drop_SRM.sql . . DB20000I The SQL command completed DB20000I The SQL command completed . . DB20000I The SQL command completed DB20000I The SQL command completed DB20000I The SQL command completed successfully. successfully. successfully. successfully. successfully. We then restored the database as shown in Example 7-22. We selected the most recent backup image to restore. Example 7-22 ITSRMDB restore procedure C:\PROGRA~1\SQLLIB\bin>db2adutl query db ITSRMDB Query for database ITSRMDB Retrieving FULL DATABASE BACKUP information. 1 Time: 20030612104416 Oldest log: S0000008.LOG 2 Time: 20030611142057 Oldest log: S0000001.LOG 3 Time: 20030611132049 Oldest log: S0000000.LOG 4 Time: 20030611131856 Oldest log: S0000000.LOG 5 Time: 20030611131342 Oldest log: S0000000.LOG Node: Node: Node: Node: Node: 0 0 0 0 0 Sessions: Sessions: Sessions: Sessions: Sessions: 1 1 1 1 1 Retrieving INCREMENTAL DATABASE BACKUP information. No INCREMENTAL DATABASE BACKUP images found for ITSRMDB Retrieving DELTA DATABASE BACKUP information. No DELTA DATABASE BACKUP images found for ITSRMDB Retrieving TABLESPACE BACKUP information. No TABLESPACE BACKUP images found for ITSRMDB Retrieving INCREMENTAL TABLESPACE BACKUP information. No INCREMENTAL TABLESPACE BACKUP images found for ITSRMDB Retrieving DELTA TABLESPACE BACKUP information. No DELTA TABLESPACE BACKUP images found for ITSRMDB Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 393 Retrieving LOAD COPY information. No LOAD COPY images found for ITSRMDB Retrieving LOG ARCHIVE information. No LOG ARCHIVE images found for ITSRMDB C:\bkupscripts>db2 restore database ITSRMDB use tsm taken at 20030612104416 SQL2539W Warning! Restoring to an existing database that is the same as the ba ckup image database. The database files will be deleted. Do you want to continue ? (y/n) y DB20000I The RESTORE DATABASE command completed successfully. C:\PROGRA~1\SQLLIB\bin>db2 rollforward db ITSRMDB to 2003-06-12-20.02.00.000000 and STOP Rollforward Status Input database alias Number of nodes have returned status = ITSRMDB = 1 Node number Rollforward status Next log file to be read Log files processed Last committed transaction = = = = = DB20000I 0 not pending S0000008.LOG - S0000011.LOG 2003-06-12-18.03.53.000000 The ROLLFORWARD command completed successfully. C:\PROGRA~1\SQLLIB\bin>net start "IBM Tivoli SRM Server" The IBM Tivoli SRM Server service is starting. The IBM Tivoli SRM Server service was started successfully. In the ROLLFORWARD command, we specified to which point we want to restore the database. 2003-06-12-18.03.53.000000 is expressed in Coordinated Universal Time (UTC) and is the time just before we started our SQL DROP commands. Figure 7-10 shows that Tivoli Storage Resource Manager restarted after the database restore. 394 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 7-10 Server running again after database restore Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 395 7.5 Disaster Recovery procedures Tivoli Storage Resource Manager Disaster Recovery Tivoli Storage Resource Manager server Install basic Windows 2000 server Install Windows Service Pack Install Tivoli Storage Manager client Restore of files Restore of System Objects Restore of ITSRMDB database Start of application ibm.com/redbooks Figure 7-11 Tivoli Storage Resource Manager Server Disaster Recovery procedures We describe now the procedures we have used to recover from a complete loss of our Tivoli Storage Resource Manager Server. 7.5.1 Windows 2000 restore To restore our Tivoli Storage Resource Manager Server, we followed the procedure described in Deploying the Tivoli Storage Manager Client in a Windows 2000 Environment, SG24-6141. We have: 1. Installed Windows 2000 on the server using BONNIE as hostname 2. Installed Windows 2000 Service Pack 3 3. Installed the Tivoli Storage Manager Backup/Archive client and configured it to use our Tivoli Storage Manager Server located on BANDA. Example 7-23 shows the minimal client options file required for this. Example 7-23 Minimal dsm.opt file tcpserveraddress nodename banda.almaden.ibm.com bonnie 4. Restored all the files on the boot partition (disk C:\) as displayed in Figure 7-13. 396 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 7-12 Full system restore Note that after the restore of the boot partition you will be prompted that a reboot of the system is required. Do not reboot at this time. You need to wait until after the System Objects have been restored. Figure 7-13 Full system restore result Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 397 5. Restore the System Objects. Figure 7-14 System Objects restore The restore of System Objects finished successfully as you can see in Figure 7-15. Figure 7-15 System Objects restore results 6. Reboot the system. 398 IBM Tivoli Storage Resource Manager: A Practical Introduction At this stage, we are in the situation where all our software and configuration files have been restored. We must now restore the ITSRMDB database to its latest available status. 7.5.2 ITSRMDB database restore We used the procedure described in 7.3.3, “IBM Tivoli Storage Resource Manager database” on page 382 to restore the ITSRMDB database. We were able to do a rollforward restore since the DB2 logs were backed up to Tivoli Storage Manager before the crash. They were restored during step 4 on page 396. Example 7-24 shows the output of the restore process. Example 7-24 Rollforward restore of database C:\Program Files\SQLLIB>db2adutl query db ITSRMDB Query for database ITSRMDB Retrieving FULL DATABASE BACKUP information. 1 Time: 20030612133931 Oldest log: S0000001.LOG 2 Time: 20030612104416 Oldest log: S0000008.LOG 3 Time: 20030611142057 Oldest log: S0000001.LOG 4 Time: 20030611132049 Oldest log: S0000000.LOG 5 Time: 20030611131856 Oldest log: S0000000.LOG 6 Time: 20030611131342 Oldest log: S0000000.LOG . . Node: Node: Node: Node: Node: Node: 0 0 0 0 0 0 Sessions: Sessions: Sessions: Sessions: Sessions: Sessions: 1 1 1 1 1 1 C:\Program Files\SQLLIB>db2 restore db ITSRMDB use TSM taken at 20030612133931 SQL2539W Warning! Restoring to an existing database that is the same as the ba ckup image database. The database files will be deleted. Do you want to continue ? (y/n) y DB20000I The RESTORE DATABASE command completed successfully. C:\Program Files\SQLLIB>db2 rollforward db ITSRMDB to end of logs Rollforward Status Input database alias Number of nodes have returned status = ITSRMDB = 1 Node number Rollforward status Next log file to be read Log files processed Last committed transaction = = = = = DB20000I 0 DB working S0000001.LOG 2003-06-12-19.18.19.000000 The ROLLFORWARD command completed successfully. C:\Program Files\SQLLIB>db2 rollforward db ITSRMDB stop Rollforward Status Input database alias Number of nodes have returned status = ITSRMDB = 1 Node number Rollforward status Next log file to be read Log files processed Last committed transaction = 0 = not pending = = = 2003-06-12-19.18.19.000000 Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 399 DB20000I The ROLLFORWARD command completed successfully. C:\PROGRA~1\SQLLIB\bin>net start “IBM Tivoli SRM Server” The IBM Tivoli SRM Server service is starting. The IBM Tivoli SRM Server service was started successfully. The Tivoli Storage Resource Manager Server is now successfully restarted as shown in Figure 7-16. Figure 7-16 IBM Tivoli SRM interface after DR restore Note that if your DB2 files and directories were never backed up using the standard Backup/Archive client, your DB2 local and system directory will not be synchronized. You will have to uncatalog the ITSRMDB database, and recreate the database during the restore as briefly shown in Example 7-25. Example 7-25 Database restore into C:\Program Files\SQLLIB>db2 restore db ITSRMDB use TSM taken at 20030612133931 to C into ITSRMDB SQL1005N The database alias "ITSRMDB" already exists in either the local database directory or system database directory. SQLSTATE=00000 C:\Program Files\SQLLIB>db2 uncatalog db ITSRMDB DB20000I The UNCATALOG DATABASE command completed successfully. DB21056W Directory changes may not be effective until the directory cache is refreshed. 400 IBM Tivoli Storage Resource Manager: A Practical Introduction C:\Program Files\SQLLIB>db2stop SQL1064N DB2STOP processing was successful. C:\Program Files\SQLLIB>db2start SQL1063N DB2START processing was successful. C:\Program Files\SQLLIB>db2 restore db ITSRMDB use TSM taken at 20030612133931 SQL1036C An I/O error occurred while accessing the database. SQLSTATE=58030 C:\Program Files\SQLLIB>db2 restore db ITSRMDB use TSM taken at 20030612133931 to C into ITSRMDB DB20000I The RESTORE DATABASE command completed successfully. 7.6 Database maintenance As with every database, basic maintenance should be applied to the Tivoli Storage Resource Manager repository to avoid space and performance problems. Tivoli Storage Resource Manager: database maintenance Database should be checked for performance using runstats reorgchk reorg table db2rbind ibm.com/redbooks Figure 7-17 DB2 Database maintenance Basic DB2 maintenance should include: runstats to update tables statistics reorgchk to check need for tables reorganization reorg to rebuild unordered tables and indexes db2rbind to rebuild packages Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 401 The runstats command is not mandatory since the statistics can be updated by the reorgchk command. Also, you need to run a runstats command for each table while reorgchk executes over all tables. Example 7-26 shows the output of the reorgchk command on our ITSRMDB database. Example 7-26 Output of reorgchk db2 => connect to itsrmdb Database Connection Information Database server SQL authorization ID Local database alias = DB2/NT 7.2.6 = ADMINIST... = ITSRMDB db2 => reorgchk on table all Doing RUNSTATS .... Table statistics: F1: 100 * OVERFLOW / CARD < 5 F2: 100 * TSIZE / ((FPAGES-1) * (TABLEPAGESIZE-76)) > 70 F3: 100 * NPAGES / FPAGES > 80 CREATOR NAME CARD OV NP FP TSIZE F1 F2 F3 REORG -------------------------------------------------------------------------------SYSIBM SYSATTRIBUTES - --. . . TIVOLISRM T_STAT_FILE 137397 0 4836 7808 18960786 0 60 61 -** TIVOLISRM T_STAT_FS_HIST 944 0 15 15 51920 0 92 100 --TIVOLISRM T_STAT_GROUP 89 0 6 9 12371 0 38 66 -** TIVOLISRM T_STAT_GROUP_HIST 2911 0 37 37 142639 0 98 100 --TIVOLISRM T_STAT_LARGE_DIR 650 0 38 64 134550 0 53 59 -** TIVOLISRM T_STAT_PING_HIST 194 0 4 4 12028 0 99 100 --TIVOLISRM T_STAT_SCAN_SPOOR 2714 0 21 21 70564 0 87 100 --TIVOLISRM T_STAT_SEGMENT 91 0 4 22 10738 0 12 18 -** TIVOLISRM T_STAT_SIZE_DIST 49 0 3 3 5194 0 64 100 -*TIVOLISRM T_STAT_SPACE_HIST 1462 0 21 21 65790 0 81 100 --TIVOLISRM T_STAT_SUMMARY 264 0 3 4 8712 0 72 75 --* TIVOLISRM T_STAT_TABLE 162 0 7 32 25758 0 20 21 -** TIVOLISRM T_STAT_TIME_DIST 124 0 7 7 18228 0 75 100 --TIVOLISRM T_STAT_TIME_HIST 2122 0 78 78 301324 0 97 100 --TIVOLISRM T_STAT_TOTALS 31 0 2 4 4247 0 35 50 -** TIVOLISRM T_STAT_USER 291 0 13 13 43650 0 90 100 --. . . -------------------------------------------------------------------------------Index statistics: F4: CLUSTERRATIO or normalized CLUSTERFACTOR > 80 F5: 100 * (KEYS * (ISIZE+8) + (CARD-KEYS) * 4) / (NLEAF * INDEXPAGESIZE) > 50 F6: (100-PCTFREE) * (INDEXPAGESIZE-96) / (ISIZE+12) ** (NLEVELS-2) * (INDEXPAGES IZE-96) / (KEYS * (ISIZE+8) + (CARD-KEYS) * 4) < 100 402 IBM Tivoli Storage Resource Manager: A Practical Introduction CREATOR NAME CARD LEAF LVLS ISIZE KEYS F4 F5 F6 REORG -------------------------------------------------------------------------------. . . Table: TIVOLISRM.T_STAT_FILE TIVOLISRMT_STAT_FILE_IX 137397 313 3 9 161 99 43 124 -** Table: TIVOLISRM.T_STAT_FS_HIST TIVOLISRMT_STAT_FS_HIST_IX 944 5 2 5 343 31 33 52 **Table: TIVOLISRM.T_STAT_GROUP TIVOLISRMT_STAT_GROUP_IX 89 2 2 12 89 100 21 202 -** Table: TIVOLISRM.T_STAT_GROUP_HIST TIVOLISRMT_STAT_GRP_HIST_IX 2911 16 2 13 1636 37 60 9 *-Table: TIVOLISRM.T_STAT_LARGE_DIR TIVOLISRMT_STAT_LDIR_IX 650 1 1 8 49 98 - --Table: TIVOLISRM.T_STAT_SCAN_SPOOR TIVOLISRMT_SCAN_SPOOR_IX1 2714 8 2 8 343 89 45 24 -*Table: TIVOLISRM.T_STAT_SEGMENT TIVOLISRMT_STAT_SEG_IX 91 1 1 9 7 96 - --Table: TIVOLISRM.T_STAT_SPACE_HIST TIVOLISRMT_STAT_SP_HIST_IX 1462 6 2 9 484 25 49 29 **. . . -------------------------------------------------------------------------------CLUSTERRATIO or normalized CLUSTERFACTOR (F4) will indicate REORG is necessary for indexes that are not in the same sequence as the base table. When multiple indexes are defined on a table, one or more indexes may be flagged as needing REORG. Specify the most important index for REORG sequencing. The reorgchk command calculates three formulas (F1, F2, F3) for the tables and three formulas (F4, F5, F6) for the indexes to determine if the table or index must be reorganized. Each hyphen displayed in the REORG column indicates that the calculated results were within the set bounds of the corresponding formula, and each asterisk indicates that the calculated result exceeded the set bounds of its corresponding formula. Table reorganization is suggested when the results of the calculations exceed the bounds set by the formula. Attention: Refer to the appropriate administration guide for your DB2 platform. If a reorganization is recommended for a table or an index, this can only be done when no activity is running against the database. This means that IBM Tivoli SAN Manager must be stopped in order to reorganize the tables. Example 7-27 shows an output of the reorg for the ITSRMDB DB2 TIVOLISRM.T_STAT_FILE table followed by a reorgchk on this table. Example 7-27 REORGANIZE output db2 => reorg table TIVOLISRM.T_STAT_FILE DB20000I The REORG TABLE command completed successfully. db2 => reorgchk on table TIVOLISRM.T_STAT_FILE Doing RUNSTATS .... Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 403 Table statistics: F1: 100 * OVERFLOW / CARD < 5 F2: 100 * TSIZE / ((FPAGES-1) * (TABLEPAGESIZE-76)) > 70 F3: 100 * NPAGES / FPAGES > 80 CREATOR NAME CARD OV NP FP TSIZE F1 F2 F3 REORG -------------------------------------------------------------------------------TIVOLISRM T_STAT_FILE 137397 0 4788 4788 18960786 0 98 100 --- -------------------------------------------------------------------------------Index statistics: F4: CLUSTERRATIO or normalized CLUSTERFACTOR > 80 F5: 100 * (KEYS * (ISIZE+8) + (CARD-KEYS) * 4) / (NLEAF * INDEXPAGESIZE) > 50 F6: (100-PCTFREE) * (INDEXPAGESIZE-96) / (ISIZE+12) ** (NLEVELS-2) * (INDEXPAGES IZE-96) / (KEYS * (ISIZE+8) + (CARD-KEYS) * 4) < 100 CREATOR NAME CARD LEAF LVLS ISIZE KEYS F4 F5 F6 REORG -------------------------------------------------------------------------------Table: TIVOLISRM.T_STAT_FILE TIVOLISRMT_STAT_FILE_IX 137397 175 2 9 161 99 76 0 ---------------------------------------------------------------------------------CLUSTERRATIO or normalized CLUSTERFACTOR (F4) will indicate REORG is necessary for indexes that are not in the same sequence as the base table. When multiple indexes are defined on a table, one or more indexes may be flagged as needing REORG. Specify the most important index for REORG sequencing. Important: Note that it is preferable to reorganize a table according its most used index. Refer to the appropriate DB2 administration guide for tables and indices reorganization. Finally, rebuild the packages (if any) that are associated with ITSRMDB using the db2rbind command. No log file was created from our db2rbind command, which indicates that there are currently no packages defined for our ITSRMDB database. Example 7-28 DB2 rebind C:\PROGRA~1\SQLLIB\BIN>db2rbind ITSRMDB -l c:\temp\ITSRMDB_RBIND.txt all Rebind done successfully for database 'ITSRMDB'. 7.7 IBM Tivoli Storage Resource Manager with SQL-Server All of the examples so far have shown DB2 as the database being used. Here we show some examples using Microsoft SQL-Server instead. The database name is TivoliSRM. We installed SQL Server 2000 and a new Tivoli Storage Resource Manager instance on server GALLIUM. From an installation point of view, the process was very similar to when DB2 was used. Other than a local Agent, this new server had no Agents, and no significant amount of data was collected so the database was extremely small. 404 IBM Tivoli Storage Resource Manager: A Practical Introduction We used the IBM Tivoli Storage Manager for Databases product to perform the backups for the database. Since even in a production implementation of Tivoli Storage Resource Manager the database will be reasonably small, we came to the conclusion that it would likely not be necessary to use the incremental backup capability of Tivoli Storage Manager for Databases, so all of our examples are using full backups and restores. Figure 7-18 displays using the Tivoli Storage Manager for Database GUI to start the backup, and Figure 7-19 shows that the backup completed successfully. Figure 7-18 SQL-Server database backup start using the GUI Figure 7-19 SQL-Server database backup end using the GUI In Example 7-29 we show the command line interface for Tivoli Storage Manager for Databases being used to backup the database. Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 405 Example 7-29 SQL Server database backup using the command line C:\Program Files\Tivoli\TSM\TDPSql>tdpsqlc backup TivoliSRM Tivoli Storage Manager Tivoli Data Protection for Microsoft SQL Server Version 2, Release 2, Level 1.0 (C) Copyright IBM Corporation 1997, 2002. All rights reserved. Starting SQL database backup... Beginning full backup for database TivoliSRM, 1 of 1. Full: 0 Read: 2445072 Written: 2445072 Rate: 1,582.35 Kb/Sec Backup of TivoliSRM completed successfully. Total Total Total Total Total SQL SQL SQL SQL SQL backups backups backups backups backups selected: attempted: completed: excluded: inactivated: Throughput rate: Total bytes transferred: Elapsed processing time: 1 1 1 0 0 1,581.30 Kb/Sec 2,445,072 1.51 Secs Figure 7-20 shows a restore of the database being started using the GUI, and Figure 7-21 shows the restore complete. Figure 7-20 SQL Server database restore started using the GUI 406 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 7-21 SQL Server database restore finished using the GUI And finally, Example 7-30 shows the restore being run using the command line interface. Example 7-30 SQL Server database restore using the command line C:\Program Files\Tivoli\TSM\TDPSql>tdpsqlc restore TivoliSRM /REPLACE Tivoli Storage Manager Tivoli Data Protection for Microsoft SQL Server Version 2, Release 2, Level 1.0 (C) Copyright IBM Corporation 1997, 2002. All rights reserved. Starting Sql database restore... Querying Tivoli Storage Manager server for a list of database backups, please wait... Beginning full restore of backup object TivoliSRM, 1 of 1, to database TivoliSRM Full: 0 Read: 2443776 Written: 2443776 Rate: 1,190.27 Kb/Sec Restore of TivoliSRM completed successfully. Total Total Total Total database database database database backups inspected: backups requested for restore: backups restored: skipped: Throughput rate: Total bytes transferred: Elapsed processing time: 1 1 1 0 1,189.68 Kb/Sec 2,443,776 2.01 Secs Both the backups and restores were quite straightforward. No special setup was required for either Tivoli Storage Manager for Databases or Tivoli Storage Resource Manager. More information on using Tivoli Storage Manager for Databases is available in the redbook Using Tivoli Data Protection for Microsoft SQL Server, SG24-6148. One small issue that we came across is that we received an error when performing the restore when we had the SQL-Server Enterprise Console running. The error was reporting that the restore process was unable to open the database in exclusive mode. It would appear Chapter 7. Protecting and maintaining Tivoli Storage Resource Manager 407 that this kept a connection option with the database. We shut down the Enterprise Console and the restore completed successfully. 7.7.1 Using Oracle for the IBM Tivoli Storage Resource Manager database We have not tested backing up and restoring an Oracle database used with Tivoli Storage Resource Manager, however, the same principles apply as already shown for DB2 and MS SQL-Server. If you have a Tivoli Storage Manager Server, you can use the extra product IBM Tivoli Storage Manager for Databases to backup and restore Oracle. More information on backing up Oracle is available in the redbook Backing Up Oracle Using Tivoli Storage Management, SG24-6249. 408 IBM Tivoli Storage Resource Manager: A Practical Introduction Part 5 Part 5 Tivoli Systems Management integration This section discusses how to integrate IBM Tivoli Storage Resource Manager with other Tivoli Systems Management products. © Copyright IBM Corp. 2003. All rights reserved. 409 410 IBM Tivoli Storage Resource Manager: A Practical Introduction 8 Chapter 8. Integration with Tivoli Enterprise Console In this chapter, we show how you can enhance an IBM Tivoli Storage Resource Manager installation using IBM Tivoli Enterprise Console (TEC). We assume a basic understanding of TEC technology and the examples are based on a standard pre-existing TEC installation. To learn more about TEC installation and procedures, see the Redbook Early Experiences with Tivoli Enterprise Console, SG24-6015. This chapter covers the following topics: Introduction to Tivoli Enterprise Console (TEC) Configuring Rule Base Event format Configuring TEC Event Console Configuring IBM Tivoli Storage Resource Manager to forward events © Copyright IBM Corp. 2003. All rights reserved. 411 8.1 Introduction to Tivoli Enterprise Console The IBM Tivoli Enterprise Console (TEC) is a tool for receiving and processing formatted events. It uses a database to store the actual events. This database is divided into two separate tables: one to store the reception log and one to store the processed and probably reformatted events. TEC depends on the Tivoli Enterprise Framework. There are five processes which make up a TEC server (see Figure 8-1): 1. tec_reception - Receives events, places them in a reception buffer, and writes them into the database using a Framework RDBMS Interface Module (RIM). After successfully placing the event into the reception log in the database, the status of the event is WAITING. 2. tec_rule - When an event becomes WAITING, this will cause the tec_rule process to pull in the event and place it into its Event Cache. The tec_rule process is configured using a so-called Rule Base. This can be programmed using a Prolog based language. These Prolog files are compiled and loaded into the tec_rule process. Based on the defined rules, the events are treated accordingly. They can be reformatted, matched, related, time-triggered, and actions can be executed. 3. tec_dispatch - When the tec_rule process finishes processing an event, it hands it over to the tec_dispatch process. This process stores the events in to the database event repository table using RIM. It then informs the tec_server process about successfully processing the event, and if there are any tasks or actions to be executed, it informs the tec_task process to do it. 4. tec_server - This is the master process of the TEC server. It monitors all the other processes and stops and starts these. Additionally, it receives a PROCESSED signal from the tec_dispatch and informs the tec_reception process to change the reception log of an event to PROCESSED. This is stored in the database accordingly. 5. tec_task - This process executes any tasks or actions requested by the rule engine, and optionally gives a return code back to it. 412 IBM Tivoli Storage Resource Manager: A Practical Introduction Master (tec_server) EV Communication ServerENV2 R10 tec_task T tec_reception tec_rule Reception Buffer Event Cache Status = PROCESSED RIM tec_t_evt_rec_log RDBMS tec_dispatch tec_t_evt_rep Figure 8-1 TEC architecture A Rule base is divided into event class definitions, which define the attributes of an event; and rules, which define what should be done with an event. IBM Tivoli Storage Resource Manager ships only a class definition file (so called baroc file) but no rule file. Events can be received either through Tivoli Enterprise Framework mechanisms (which requires some software to be installed on each event sender) or through a socket connection (which only requires that events are sent according to TEC formats). IBM Tivoli Storage Resource Manager sends its events through a socket connection directly to the TEC server. In order to view the events and assign them to administrators to be treated, there is a Java based program called the TEC Console. This connects to the event repository using Framework mechanisms (RIM) and a helper process called tec_ui_server. It can be configured to show different views for different administrators. Events can be modified graphically. 8.2 Lab environment The setup in our lab environment is shown in Figure 8-2. Chapter 8. Integration with Tivoli Enterprise Console 413 Component placement Tivoli Managed Region Server (TMR) Tivoli Enterprise Data Warehouse DB2 Tivoli Enterprise Console Tivoli Configuration Manager Tivoli Monitoring Ethernet Tivoli Desktop Tivoli Enterprise Console Console Tivoli SAN Manager Agent Win2k Tivoli Light Client Framework (LCF) Tivoli SAN Manager Agent AIX Tivoli Light Client Framework (LCF) Tivoli SAN Manager Agent Win2k Tivoli Light Client Framework (LCF) ibm.com/redbooks Figure 8-2 Tivoli Lab environment The machines used in the setup are: Tonga – Windows 2000 SP3 – Tivoli Management Framework 4.1 – Tivoli Enterprise Console 3.8 FP1 – Tivoli Configuration Manager 4.2 – Tivoli Monitoring 5.1.1 FP3 Palau – Windows 200 SP3 – Tivoli Enterprise Data Warehouse 1.1 FP2 All the other machines in the lab are running the Tivoli Light Client Framework (LCF) code, which is the basis for all Tivoli Management activities. 8.3 Configuring the Rule Base In order to receive events from IBM Tivoli Storage Resource Manager in a TEC server, the event class definitions which IBM Tivoli Storage Resource Manager uses must be imported to the TEC server. If you do not import them, events will not show up on your TEC console and parsing errors will appear in the TEC reception log. You can determine if your events are received by the TEC server (but the definitions are not there) by issuing the wtdumprl command on your TEC server. If you see any parsing errors (Example 8-1) on IBM Tivoli Storage Resource Manager events, then you have not imported the class definitions. 414 IBM Tivoli Storage Resource Manager: A Practical Introduction Example 8-1 Output of wtdumprl when baroc has not been imported 1~3467~1~1054831782(Jun 05 09:49:42 2003) ### EVENT ### JobFailure;adapter_host=wisla;messageID=ALR1339W;scheduleRun='9';scheduleName='T ivoli.Default Probe';alertType='Scheduled Job Failed';scheduleType='Probe';msg=' A scheduled job has failed.';END ### END EVENT ### PARSING FAILED To import the event class definitions, open the Tivoli Desktop and double click the Event Server icon. In the window (Figure 8-3) you see the defined rule bases, with the active one highlighted by an arrow. Figure 8-3 Active Rule Base Choose the active rule base and right-click it. Select Import (Figure 8-4). Figure 8-4 Import Rule Base Select the check-box Import Class Definitions and enter the fully qualified path to the definitions file. This file is on the IBM Tivoli Storage Resource Manager CD and is called tivoliSRM.baroc. (Our example uses a copy of this file on disk.) Chapter 8. Integration with Tivoli Enterprise Console 415 The Position to insert depends on how many events you expect to receive from IBM Tivoli Storage Resource Manager, and on the hierarchical dependencies inside the class structure. Since the IBM Tivoli Storage Resource Manager classes depend only on the root EVENT, you can put it right after that event class. However, since classes are matched from the top to bottom, put the busiest event classes higher in the hierarchy rather than the less busy classes. For example, we put it at the very bottom, because we do not expect very many events (Figure 8-5). Figure 8-5 Import Class Definitions After the class definitions are imported, we must compile the rule base to incorporate the changes (as shown in Figure 8-6). To compile, right-click the active rule base icon and select Compile. 416 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 8-6 Compile Rule Base Carefully check the output for any compilation errors. If there were none, load the rule base (Figure 8-7). You must recycle the event server whenever you make any changes to the class definitions. If you only changed rules, then recycling the event server is not necessary. Figure 8-7 Load Rule Base Stop and start the Event Server by right-clicking the icon on your Tivoli Desktop (Figure 8-8). Chapter 8. Integration with Tivoli Enterprise Console 417 Figure 8-8 Restart TEC Server 8.4 Configuring TEC Event Console The TEC Event Console allows you to view the events the TEC server has received and processed. This is an installable Java GUI to install on desktop machines. You must be assigned as an operator to an Event Console to view events. A Console can be divided into multiple Event Groups, which sort the events in meaningful groups. Each Event Group contains one or more Event Filters to separate events. This example assumes you are working with a Tivoli administrative user ID, which is authorized to do TEC configurations. In the Console in Figure 8-9, there is an Event Group named All which shows all the events. 418 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 8-9 TEC Console To make the changes click the Windows menu and then Configuration (Figure 8-10). Figure 8-10 TEC Console Configuration In the Configuration dialog there are three folders: Event Groups Consoles Operators First we have to create an Event Group to specify filters to sort out the IBM Tivoli Storage Resource Manager events. Right-click Event Groups and select Create Event Group (Figure 8-11). Chapter 8. Integration with Tivoli Enterprise Console 419 Figure 8-11 Create Event Group Name the Event Group (for example, ITSRM) and right-click it. Select Create Filter (Figure 8-12). Figure 8-12 Create Filter in Event Group When the dialog opens up, enter a description to the filter and select Add Constraint (Figure 8-13). 420 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 8-13 Event Group Filter Choose Class as an Attribute and Operator In, then select SRMAlert in the Value window (Figure 8-14). Figure 8-14 Add Constraint This will add a Constraint to our filter ITSRM. If you add multiple Constraints, they behave as a boolean AND. If you add more filters to an Event Group they behave as a boolean OR. You can test if your filter matches any events by clicking the Test SQL button on Figure 8-13. If there are no events in the TEC repository, then you will get zero matching events. You can view the Constraint in plain SQL by clicking the little arrow above the Help button on Figure 8-13. It will display similar to Figure 8-15. Chapter 8. Integration with Tivoli Enterprise Console 421 Figure 8-15 Event Group Filter After creating the Event Group, we must assign it to a Console. We assume that you already have a Console defined, so right-click it and select Assign Event Group. The menu in Figure 8-16 appears. Figure 8-16 Assign Event Group Select the appropriate roles and click OK. You will see output similar to Figure 8-17. 422 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 8-17 Assigned Event Groups Your Console should now have the ITSRM Event Group assigned to it (Figure 8-18). Figure 8-18 Configured Console After configuring the Event Console, you can look at the results by changing the view in the Windows menu and choose Summary Chart View. The window that appears is the actual event viewer, which shows all configured event groups (Figure 8-19). Chapter 8. Integration with Tivoli Enterprise Console 423 Figure 8-19 TEC Console main screen If you click the bar of a particular event group, the event viewer for this event group opens (Figure 8-20). In the upper window space, you can see the events which you can modify and are assigned for you to solve. You can acknowledge, close, and run tasks, or view the details of the selected event. Figure 8-20 TEC console If you select an event and click the Details button, the window in Figure 8-21 opens. It describes in plain text the most important details of the selected event. 424 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 8-21 General tab of event You get a complete listing of all event attributes by selecting the Attribute List tab (Figure 8-22). There you can get additional information on where the event originated, when it has occurred, when it has been received by the TEC server and other fields. Chapter 8. Integration with Tivoli Enterprise Console 425 Figure 8-22 Event attribute list 8.5 Event format The event classes IBM Tivoli Storage Resource Manager uses and the format of these are described in the following paragraphs. The possible event attributes (slots) IBM Tivoli Storage Resource Manager uses are the following: adaptor_host: Name of the Tivoli SRM server generating the event hostname: Name of the alerting computer origin: IP address of the alerting computer source: The name of the application generating the event i.e. IBM Tivoli Storage Resource Manager msg: Text description which gives the summary of the event. messageID: ID that is assigned to the associated message by the TSRM product. 426 IBM Tivoli Storage Resource Manager: A Practical Introduction Severity: severity level of the event. Possible values in order of decreasing severity are FATAL, CRITICAL, MINOR, WARNING, HARMLESS, and UNKNOWN. alertName: name of the triggered alert. alertType: type of the triggered alert. resourceName: name of the alerting resource. resourceType: type of the alerting resource. threshold: The alert’s triggering threshold. currentValue: alerting resource’s current value. previousValue: alerting resource’s previous value. freespace: free space of the alerting resource. violatorName: name of the over quota user or OS/Group. violatorType: type of the storage consumer – user or OS/Group. filerName: filer triggering the alert. currentCapacity: current capacity of the alerting resource. targetCapacity: target capacity of the alerting resource. scheduleName: name of the failed job schedule. scheduleType: type of schedule that failed. scheduleRun: schedule run number that failed. rdbmsName: name of the alerting RDBMS. rdbmsType: type of RDBMS that triggered the alert. databaseName: name of the alerting database. segmentName: creator and name of the alerting Oracle segment. segmentType: type of Oracle segment that triggered the alert. The event classes IBM Tivoli Storage Resource Manager uses are: Ram_Changed: the amount of RAM on an Agent has changed VirtualMemory_Changed: the amount of virtual memory on an Agent has changed. Disk_New: a new disk has been discovered on an Agent Disk_Missing: a disk has been removed from an Agent Disk_Failure: a managed disk has predicted that a disk failure is imminent. Disk_Defect: a new defect has been detected on a managed disk. Filesystem_New: a new filesystem has been discovered on a managed computer. Filesystem _Missing: a filesystem has been removed or unmounted from an Agent Filesystem_Reconfigured: the physical space definition of an Agent filesystem has been reconfigured. Filesystem _FreeSpace_Low: a managed filesystem is low on free space. Filesystem _Inode_Low: a managed UNIX filesystem is low on free inodes. Filesystem_Constraint_Violated: a Constraint on a managed filesystem has been violated. Filesystem_Auto_Extend: a managed filesystem will be extended. Filesystem_Stopped_Auto_Extend: extension of a managed filesystem is prevented. Directory_Missing: a monitored directory has been removed from a managed computer. Directory_Quota_Exceeded: a user or directory storage quota has been exceeded. Computer_Offline: an Agent is offline. Computer_Discovered: a new unmanaged computer has been discovered. NasComputer_Discovered: a new filer has been discovered. Filer_Missing: a filer is no longer accessible through the specified resource. DiskArray_Missing: a disk array is no longer visible to a managed computer. DiskArray_New: a new Disk Array has been discovered. Job_Failure: a scheduled job has failed 8.6 Tivoli Storage Resource Manager event forwarding After we have prepared the Tivoli Event Console Server (TEC) to receive events from IBM Tivoli Storage Resource Manager, we must enable IBM Tivoli Storage Resource Manager Chapter 8. Integration with Tivoli Enterprise Console 427 itself to forward events to TEC. Open the IBM Tivoli Storage Resource Manager Desktop and navigate to Administrative Services -> Configuration -> Alert Disposition and enter the hostname of your TEC server and the port (Windows 5529, UNIX 0) in the TEC section on the right (Figure 8-23). Figure 8-23 Setting the TEC server properties Save your changes by clicking on the Save button under the top menu. This configuration only defines where TEC events should be sent to - we have not yet actually enabled any events. To enable events for a specific topic in IBM Tivoli Storage Resource Manager, you have to select the TEC check box on every Alert properties tab that you want ti activate. For example, if you want a TEC event sent when the Default Scan fails, navigate to its properties page and enable it (Figure 8-24). 428 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 8-24 Enabling TEC events for the default scan You can configure IBM Tivoli Storage Resource Manager to send a TEC event for any Alerts. Another example is to send an event when a new computer is discovered, as shown in Figure 8-25. Chapter 8. Integration with Tivoli Enterprise Console 429 Figure 8-25 Enable TEC events for discovery of new computers 430 IBM Tivoli Storage Resource Manager: A Practical Introduction 9 Chapter 9. Integration with Tivoli Enterprise Data Warehouse This chapter provides an overview of Tivoli Enterprise Data Warehouse and the Tivoli Storage Resource Manager Warehouse Pack. It covers the following topics: Introduction to Tivoli Data Warehouse Overview of the IBM Tivoli Storage Resource Manager Warehouse Pack Tivoli GUID and Data Warehouse Configuring Data Warehouse - importing Warehouse Pack You can learn about the Tivoli Enterprise Data Warehouse in the following manuals and redbook: Tivoli Enterprise Data Warehouse Release Notes, GI11-0857 Installing and Configuring Tivoli Enterprise Data Warehouse, GC32-0744 Enabling an Application for Tivoli Enterprise Data Warehouse, GC32-0745 Introduction to Tivoli Enterprise Data Warehouse, SG24-6607 © Copyright IBM Corp. 2003. All rights reserved. 431 9.1 Introduction to Tivoli Enterprise Data Warehouse The Tivoli Enterprise Data Warehouse (TEDW) is an application used to collect and manage data from various Tivoli and non-Tivoli system management applications. The data is imported from the source applications, stored centrally, and further processed to fit the needs of the end users. Figure 9-1 shows the basic components of the TEDW in the logical order of the data flow. Tivoli Warehouse Control Server: IBM DB2® DWC Warehouse Metadata Tivoli Reporting Services Source Apps ITM ETL Inventory ETL Tivoli Reporting Interface Data Marts Data Marts ETL TEC ETL Central Data Warehouse Data Marts Data Marts Business Intelligence Tools Data Marts Data Marts Source App ETL IBM Cognos Brio Business Objects Figure 9-1 Tivoli Data Warehouse data flow The first step to introducing TEDW is enabling the source applications. This means to provide all tools and customizations necessary to import the source operational data into the central data warehouse. All components needed for that task are collected in Warehouse Packs for each source application. An important part of the Warehouse Packs is the ETL programs (Extract, Transform, and Load). ETL programs process data in three steps. First they extract the data from a data source. Then the data is validated, transformed, aggregated, and cleansed so that it fits the format and needs of the data target. Finally, the data is loaded into the target database. In TEDW there are two types of ETLs. The central data warehouse ETL pulls the data from the source applications and loads it into the central data warehouse. The central data warehouse ETL is also known as source ETL or ETL1. The second type of ETL is the data mart ETL. The central data warehouse (CDW) is the database that contains all enterprise-wide historical data (with hour as the lowest granularity). This data store is optimized for the efficient storage of large amounts of data and has a documented format that makes the data accessible to many analysis solutions. The database is organized in a very flexible way, and you can store data from new applications without adding or changing tables. The data mart ETL extracts a subset of historical data from the central data warehouse that contains data tailored to and optimized for a specific reporting or analysis task. This subset of data is used to create data marts. Data mart ETL is also known as target ETL or ETL2 . 432 IBM Tivoli Storage Resource Manager: A Practical Introduction A data mart satisfies the needs of a specific department, team, or customer. The format of a data mart is specific to the reporting or analysis tool you plan to use. Each application that provides a data mart ETL creates its data marts in the appropriate format. TEDW provides a Report Interface (RI) that creates static two-dimensional reports of your data using the data marts. The RI is a role-based Web interface that can be accessed with a Web browser without any additional software installed on the client. You can also use other tools to perform OLAP analysis, business intelligence reporting, or data mining. The Control server is the system that contains the control database, which contains metadata for Tivoli Enterprise Data Warehouse and from which you manage your data warehouse. The Control server controls communication between the Control server, the central data warehouse, the data marts, and the Report Interface. The Control server uses the Data Warehouse Center to define the ETL processes and the star schemas used by the data marts. You use the Data Warehouse Center to schedule, maintain, and monitor these processes. For more information about Tivoli Enterprise Data Warehouse, refer to Introduction to Tivoli Enterprise Data Warehouse, SG24-6607. 9.2 Tivoli Storage Resource Manager Warehouse Pack Tivoli Storage Resource Manager has a three-tier architecture: a user interface (UI) component, a Server component, and an Agent component. Agents collect statistics about accessible storage and send that information to the centralized Server. The Agent must be installed on all of the machines where the user wants to monitor storage and storage activity. The Server receives information from the Agent(s) and saves that information in the Enterprise Repository (Figure 9-2). The Tivoli Storage Resource Manager Warehouse Pack provides the steps that extract data from the Tivoli Storage Resource Manager Enterprise Repository database. The central data warehouse ETL transforms that data so it conforms to the central data warehouse format and then loads it into the central data warehouse of Tivoli Enterprise Data Warehouse. Other products, like Tivoli Service Level Advisor, pull data into data marts they provide to use with service level agreement reports. Collection of data from IBM Tivoli products into one central repository provides the user with the opportunity to see trends in operation, resource usage and cross product interoperability. Tivoli Storage Resource Manager historical data is available for use by Tivoli Service Level Advisor (SLA) and Tivoli Storage Manager. Consult the Tivoli Service Level Advisor documentation for information about its installation, configuration, and use. Tivoli Enterprise Data Warehouse and IBM DB2 Data Warehouse Center ETL processes are designed to perform data collection at least once a day. Chapter 9. Integration with Tivoli Enterprise Data Warehouse 433 ITSRM Server Server DB ETL1 Central Data Warehouse SLA ETL2 ITSRM Client/Agent SLA Data marts ITSRM History Aggregator panel Figure 9-2 Warehouse pack structure 9.3 Tivoli GUID and Data Warehouse Some Tivoli products have adopted the use of a globally unique identifier (GUID) that is permanently assigned to computer systems running storage products. Tivoli Storage Resource Manager Version 1.2 implements this feature as a software identifier and the GUID package is automatically installed on the Server and Agents . The GUID allows these products to coordinate computer system data in the central data warehouse. The GUID is recorded as an attribute in the central data warehouse for each Tivoli Storage Resource Manager Server and Agent when available. A STORAGE_GUID attribute will not be available for the monitored systems until all Agents are updated to Tivoli Storage Resource Manager Version 1.2. Consult the Tivoli Storage Resource Manager Version 1.2 documentation for a list of platforms that support GUID. 9.4 Configuring TEDW: Importing Warehouse Pack In this section we will describe how to import the Tivoli Storage Resource Manager Warehouse Pack. 434 IBM Tivoli Storage Resource Manager: A Practical Introduction 9.4.1 Prerequisites Before installing the IBM Tivoli Storage Resource Manager Warehouse Pack, you need to install the following products and patches: Tivoli Storage Resource Manager, Version 1.2 IBM DB2 UDB Enterprise Edition, Version 7.2 with Fix Pack 6 Tivoli Enterprise Data Warehouse required e-fixes to IBM DB2 UDB v7 Fix Pack 6 (1.1-TDW-0002) Tivoli Enterprise Data Warehouse, Version 1.1 Tivoli Enterprise Data Warehouse 1.1 Fix Pack 2 (1.1-TDW-FP02) You can get the TEDW Fix Packs at the Web site: http://www.ibm.com/software/sysmgmt/products/support/TivoliDataWarehouse.html The TEDW required fixes for DB2 are at the Web site: http://www-1.ibm.com/support/entdocview.wss?uid=swg24001636 Refer to the manual Installing and Configuring Tivoli Enterprise Data Warehouse, GC32-0744 and the redbook Introduction to Tivoli Enterprise Data Warehouse, SG24-6607 for information on installing TEDW. We do not provide the detailed installation steps here - simply follow the given instructions. 9.4.2 Installing the Warehouse Enablement Pack You will first need to download the latest Warehouse Pack from: http://www.ibm.com/software/sysmgmt/products/support/TivoliDataWarehouse.html Select Downloads and then Warehouse Packs. Download the Storage Resource Manager Warehouse Pack and unzip it to a directory. We used: C:\Tivoli-Software\wep\ITSRM_WEP1.2. 1. To import the Warehouse Pack, start the setup program from the Tivoli Enterprise Data Warehouse installation media. Click Next and on the next screen choose Application Installation only (Figure 9-3). (Note that when you installed TEDW, the selection was Custom/Distributed.) Chapter 9. Integration with Tivoli Enterprise Data Warehouse 435 Figure 9-3 Application installation only 2. Verify that the fully qualified local hostname appears on the next screen (Figure 9-4). Figure 9-4 Verify the fully qualified hostname 3. Enter the DB2 username and password of the data warehouse database (Figure 9-5), which you configured when installing TEDW. 436 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 9-5 Enter username and password of the data warehouse database 4. Next, you need the path to the Warehouse Pack. The directory entered should contain the file twh_app_install_list.cfg (Figure 9-6), which was part of the zip package downloaded at the beginning of this section. Figure 9-6 Enter path to the Warehouse Pack 5. Choose whether to install additional Warehouse Packs (Figure 9-7) for other Tivoli products. Chapter 9. Integration with Tivoli Enterprise Data Warehouse 437 Figure 9-7 Additional products installation dialog 6. Click Install to actually install the Warehouse Pack (Figure 9-8). Figure 9-8 Start actual installation 7. Depending on what type of machine you have, this can take some time to complete. If everything went well, the summary screen appears (Figure 9-9). 438 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 9-9 Successfully finished installation This step imported the IBM Tivoli Storage Resource Manager Warehouse Pack into Tivoli Enterprise Data Warehouse. 9.4.3 Register the Tivoli Storage Resource Manager database with ODBC Next, register the IBM Tivoli Storage Resource Manager repository database with the ODBC interface on the warehouse manager server. 1. If it is a DB2 database, as in our case, start the Client Configuration Assistant from the DB2 Program Folder. It shows the ODBC data source that is already configured. To add the repository DB, click Add in the upper right corner of the window (Figure 9-10). Note: If you are running IBM Tivoli Storage Resource Manager repository on the Cloudscape database, you cannot use the Warehouse Enablement Pack. Chapter 9. Integration with Tivoli Enterprise Data Warehouse 439 Figure 9-10 DB2 Client Configuration Assistant 2. There are three different ways to register a database, we chose to Manually configure a connection to a database (Figure 9-11). Figure 9-11 Choose how to make a connection 440 IBM Tivoli Storage Resource Manager: A Practical Introduction 3. Choose the connection protocol. We used TCP/IP (Figure 9-12). Figure 9-12 Choose communication protocol 4. Next, enter the hostname and the port that the remote DB2 instance uses (Figure 9-13). You can determine the port by listing the /etc/services (or %SystemRoot%\system32\drivers\etc\services on Windows) file on the Tivoli Storage Resource Manager Server (or remote database server). Chapter 9. Integration with Tivoli Enterprise Data Warehouse 441 Figure 9-13 Enter hostname and DB2 instance port 5. Then, enter the database name (ITSRMDB in our example); see Figure 9-14. Figure 9-14 Name the database 442 IBM Tivoli Storage Resource Manager: A Practical Introduction 6. The last relevant screen lets you choose whether to make this database available to ODBC or not. We accepted this value and clicked Finish (Figure 9-15). Figure 9-15 Register database with ODBC 7. A Confirmation screen appears (Figure 9-16). Click Test Connection. Figure 9-16 Test connection 8. Enter the database user ID and password (Figure 9-17). Chapter 9. Integration with Tivoli Enterprise Data Warehouse 443 Figure 9-17 Enter UID and password 9. If the connection worked, you will see the following screen (Figure 9-18). Figure 9-18 Test successfully 9.4.4 Configuring Tivoli Enterprise Data Warehouse After installing the enablement pack and registering the repository database as an ODBC data source, we must configure the Tivoli Enterprise Data Warehouse to receive IBM Tivoli Storage Resource Manager data: 1. First open the DB2 control center: Start -> Programs -> DB2 -> Control Center (Figure 9-19). 444 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 9-19 DB2 Control Center From the menu bar, choose Tools -> Data Warehouse Center. This is the main application for configuring the Central Data Warehouse (CDW), the Data Marts and the ETLs (Figure 9-20). Figure 9-20 Data Warehouse Center 2. It consists of five different topics: – – – – – Subject Areas - The ETLs are configured here Warehouse Sources - All the ODBC application data sources are in here Warehouse Targets - All the ODBC data targets (CDW, Marts) Warehouse Schemas - Contains information about data structures Administration - Contains information about users, etc. Open the Warehouse Sources folder, right-click BTM_ITSRM_Source and select Properties (Figure 9-21). Chapter 9. Integration with Tivoli Enterprise Data Warehouse 445 Figure 9-21 Warehouse Sources for IBM Tivoli Storage Resource Manager 3. Click the Data Source tab and enter the name for your ODBC connection in the data source name field (Figure 9-22). The default name is TIVOLISR, which we accepted. Figure 9-22 Data Source Properties Enter also the appropriate user name and password (Figure 9-23) and click OK. 446 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 9-23 BTM_ITSRM_Source Properties 4. Open the Warehouse Targets folder, right-click BTM_TWH_CDW_Target and select Properties (Figure 9-24). Figure 9-24 Target Properties 5. Do not change the database name, just enter the password for the CDW DB2 user (Figure 9-25). Click OK to complete. Chapter 9. Integration with Tivoli Enterprise Data Warehouse 447 Figure 9-25 Enter password for DB2 CDW target 9.4.5 Configure ETLs After we have successfully configured the ODBC database connections, we opened the Subject Area folder and selected the BTM_Tivoli_Storage_Resource_Manager folder (from Figure 9-21 on page 446) to configure the ETLs. You will see three ETL processes: BTM_C05_Initialize - Run this process only once as part of the installation of the Warehouse Pack. It modifies the repository database of IBM Tivoli Storage Resource Manager to incorporate the changes necessary to run Tivoli Data Warehouse. BTM_C10_ETL1 - The actual ETL process that gathers the data from the IBM Tivoli Storage Resource Manager repository database into the CDW database. This should be run daily. BTM_C15_Expire_Server - This process should only be run to remove all information and statistics from the CDW. A process can have different types of objects. The first process has only one actual “executable” step, which you can see at the top position in the right window of Figure 9-26, called Create Archive. These steps can have three different states: Development - Used for modifications Test - You can execute, but changes are rolled back after completion Production - You can execute and changes persist, but no configurations can take place To run the process, right-click the process and select Mode -> Production (Figure 9-26). 448 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 9-26 Subject Areas To run the initialization process, select the Warehouse menu and select Work in Progress (Figure 9-27). Chapter 9. Integration with Tivoli Enterprise Data Warehouse 449 Figure 9-27 Open the Work in Progress window In the new window, select Work in Progress -> Run New Step (Figure 9-28). Figure 9-28 Run New Step 450 IBM Tivoli Storage Resource Manager: A Practical Introduction A new dialog appears, listing all processes that are in the production state. Select BTM_c05_s010_Create_Archive and click the > button in the middle of the screen. Run this step by clicking OK (Figure 9-29). Figure 9-29 Selecting the steps to run In the main window, you can see the progress of the step. If it finished successfully the status shows Successful (Figure 9-30). Figure 9-30 Work in Progress This created some additional configurations inside the IBM Tivoli Storage Resource Manager repository database. To schedule the actual ETL to extract data, right-click the BTM_C10_ETL1_Process and select Schedule (Figure 9-31). Chapter 9. Integration with Tivoli Enterprise Data Warehouse 451 Figure 9-31 Schedule Process This will open the Schedule properties. Enter suitable parameters (Figure 9-32). Figure 9-32 Schedule a Process times 452 IBM Tivoli Storage Resource Manager: A Practical Introduction The Task Flow tab shows which steps are associated with the process. The ETL1 process incorporates four different steps, which are run sequentially (Figure 9-33). Figure 9-33 Task Flow In the last tab, Notification, you can send an e-mail, if a step fails to run (Figure 9-34). Figure 9-34 E-mail alert The schedule is not enabled until you change the mode on the associated steps to Production. You can select multiple steps (Figure 9-35). Chapter 9. Integration with Tivoli Enterprise Data Warehouse 453 Figure 9-35 Change mode to production When you now look at the Work in Progress window, you should see the scheduled ETL process with a status of Scheduled, Figure 9-36. Figure 9-36 Scheduled process This process will now run at the specified time. To run it manually, right-click the process and select Run Now (Figure 9-37). 454 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 9-37 Run process manually You should see the progress of each single step in the window. If everything worked well, you should see the status as Successful for each step (Figure 9-38). Figure 9-38 Manually run steps This process retrieved the information from the IBM Tivoli Storage Resource Manager repository database and loaded it into the Tivoli Enterprise Central Data Warehouse. 9.4.6 Verifying data in DB2 You can view the loaded data manually in the DB2 Control Center. Open the TWH_CDW database, right-click the COMP table and choose sample-contents (Figure 9-39). Chapter 9. Integration with Tivoli Enterprise Data Warehouse 455 Figure 9-39 COMP table Look for entries in the COMPTYP_CD row saying BTM_Server, BTM_Client or File_System. These are entries generated by the Warehouse Pack for IBM Tivoli Storage Resource Manager (Figure 9-40). Figure 9-40 CDW entries from Warehouse Pack. The structure of the Warehouse Pack generated entries is described in the PDF document shipped in the doc directory of the Warehouse Pack. This document provides in-depth information about the ETL process and the database structure. The Warehouse Pack for IBM Tivoli Storage Resource Manager currently contains only the ETL 1 process. To use the collected data, you can use Tivoli Service Level Advisor (TSLA). The redbook Introducing IBM Tivoli Service Level Advisor, SG24-6611 explains how to incorporate different Warehouse Pack data into the TSLA. It also explains how to extract data and build reports with popular third-party Business Intelligence applications. Alternatively, you can extract the data and use third party reporting tools as described in Introduction to Tivoli Enterprise Data Warehouse, SG24-6607. A future version of the Warehouse Pack for IBM Tivoli Storage Resource Manager will have predefined reports and the data mart ETL 2. 456 IBM Tivoli Storage Resource Manager: A Practical Introduction 10 Chapter 10. Integration with Tivoli Configuration Manager This chapter shows you can use IBM Tivoli Configuration Manager to distribute IBM Tivoli Storage Resource Manager agent code. We assume you have basic understanding of IBM Tivoli Configuration Manager and a running installation of Tivoli Enterprise Framework V3.7.1 or 4.1 and IBM Tivoli Configuration Manager V4.2. For more information about these products see the redbook All About IBM Tivoli Configuration Manager V4.2, SG24-6612. This chapter covers the following topics Introduction to IBM Tivoli Configuration Manager Inventory - determine who has got which version Software Distribution - Distributing IBM Tivoli Storage Resource Manager Agents and GUI (silent installation) © Copyright IBM Corp. 2003. All rights reserved. 457 10.1 Introduction to IBM Tivoli Configuration Manager IBM Tivoli Configuration Manager, Version 4.2, is a solution for controlling software distribution and asset management inventory in a multiplatform environment. It focuses on deploying and managing software in complex, distributed enterprise environments. IBM Tivoli Configuration Manager is a key solution to rapidly and efficiently deploying complex mission-critical or desktop productivity applications to multiple locations from a central point and to gather and maintain the inventory information about hardware and software assets, easily, quickly, and accurately. Tivoli Configuration Manager consists of the following main components: Inventory Software Distribution Software Distribution enables you to install, configure, and update software remotely within your network. Inventory enables you to gather and maintain up-to-date inventory asset management information in a distributed environment. This helps system administrators and accounting personnel to manage complex, distributed enterprises. Tivoli Configuration Manager also provides the following services: Activity Planner Change Manager Resource Manager Web Interface Enterprise Directory Query Facility Activity Planner enables you to define a group of activities that originate from different applications in an activity plan, submit or schedule the plan for running, and monitor the plan while it runs. Change Manager functions with Activity Planner to support software distribution, inventory, and change management in large networks. It uses reference models to simplify the management of the network environment. You can use Resource Manager, together with Software Distribution and Inventory, to perform the management operations for pervasive devices. You can use the Web Interface to install and manage various Tivoli Configuration Manager Web objects. The Web Interface has a server component that pushes software packages, inventory profiles, and reference models from the Tivoli region to the Web Gateway where they are stored until they are pulled by the Web Interface endpoint. With enterprise directory integration, you can exploit organizational information that is stored in enterprise directories in order to determine a set of targets for a software distribution or an inventory scan. The Enterprise Directory Query Facility enables you to select a specific directory object, or container of directory objects, as subscribers for a reference model or an activity plan. 458 IBM Tivoli Storage Resource Manager: A Practical Introduction 10.2 Inventory - determine who has got which version In order to determine which machine in your environment has got which product installed and which version, you can use the Inventory part of IBM Tivoli Configuration Manager. The process to query inventory information from your nodes includes four steps: 1. 2. 3. 4. Create an inventory profile in Tivoli Framework Distribute profile to endpoints Build a query Run the query 10.2.1 Create an inventory profile in Tivoli Framework Open the Tivoli Desktop and navigate to your Inventory Policy Region. In our environment this is done by opening the tonga-region Policy Region (Figure 10-1). Figure 10-1 Tivoli Desktop We created separate Policy Regions for each Tivoli product. Double click Inventory Policy Region (Figure 10-2). Chapter 10. Integration with Tivoli Configuration Manager 459 Figure 10-2 Policy Region tonga-region Make sure that the Inventory Policy Region contains the InventoryConfig resource as a Managed Resource. To determine if it has been set, right-click the Policy Region and select Managed Resources. The dialog in Figure 10-3 appears. Figure 10-3 Managed Resources for Inventory For our environment we created the default Query Libraries with the script inventory_query.sh in the bin/generic/inv/SCRIPTS/QUERIES directory of the Tivoli installation directory and created a Profile Manager called Inventory_default_PM. (Figure 10-4). To create a Profile Manager select Create in the top menu and select Profile 460 IBM Tivoli Storage Resource Manager: A Practical Introduction Manager. Figure 10-4 Policy Region Inventory Double click the Profile Manager and the dialog in Figure 10-5 appears. Figure 10-5 Profile Manager Inventory Chapter 10. Integration with Tivoli Configuration Manager 461 Create an Inventory Profile by clicking Create in the top menu and select Profile. Enter the name and select InventoryConfig as the Profile type. Right-click the newly created Profile and select Edit. The screen that appears shows you the global properties of the Inventory Profile (Figure 10-6). Figure 10-6 Inventory Profile Global Properties Since we want to create a software only inventory scan, you should deselect all hardware related check boxes. The only ones we need is the PC Software section (Figure 10-7) and the UNIX Software section (Figure 10-8). 462 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-7 Inventory Profile PC Software There are two possible ways to collect software information from endpoints. One is to scan all the files on your machine and compare them to a predefined list, thus determining an installed product by filename and size of a significant file in the software package. IBM Tivoli Storage Resource Manager ships these so called Inventory Signature files with the product. They can be found in the installation directory in the TIVINV subdirectory. The signature files are zero bytes in length and are recognized by filename (TSRM01_02.SIG for the IBM Tivoli Storage Resource Manager - Manager Version 1.2). The signatures for IBM Tivoli Storage Resource Manager are already incorporated in the latest inventory signature files, which you can download from the IBM Software support Web site. Another way to determine installed software is to query the native software repository of the OS. This gives you very fast scans, but relies on the fact that the software has registered itself in the OS during installation, rather than just copying files. For IBM Tivoli Storage Resource Manager you can do both - the choice for your environment depends on the practices of your IBM Tivoli Configuration Manager environment. In our examples we chose to use the native software query, so we check just the Scan Registry for Product Information boxes in the dialog (Figure 10-8), not the Scan for File Information Chapter 10. Integration with Tivoli Configuration Manager 463 Figure 10-8 Inventory Profile UNIX Software Click OK to close the dialog and distribute the Inventory Profile to your Endpoints. Right-click on the Profile and select Distribute (Figure 10-9). 464 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-9 Distribute Inventory Profile This opens a dialog where you can choose the machines which will run the inventory scan. After selecting, click on the Distribute & Close button (Figure 10-10). Chapter 10. Integration with Tivoli Configuration Manager 465 Figure 10-10 Distribute Inventory Profile dialog You can determine the status of the inventory scan with a tool called Distribution Status console. If it is installed, you find it on the main screen of your Tivoli Desktop (Figure 10-1 on page 459). Double click on the icon and a console opens (Figure 10-11). 466 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-11 Distribution Status Console In the upper window, double click on the Inventory Scan distribution and in the lower window select All Nodes. You can see which scans are successfully completed, pending, failed etc. When the scans are all finished, you can query the collected information. There are many standard queries, but we want to gather only the data for IBM Tivoli Storage Resource Manager. Therefore we create a new query by selecting Create -> Query (Figure 10-12). Figure 10-12 Create Query Library Name the Query and select inv_query as the repository. This is the Inventory Database RIM object. The table containing the native software information is NATIVE_SWARE_VIEW. Select the columns you want and add a filter: Column name PACKAGE_NAME = ‘IBM Tivoli SRM’ (Figure 10-13). Chapter 10. Integration with Tivoli Configuration Manager 467 Figure 10-13 Edit Inventory Query Click Run Query to execute the query while it is being edited. The output shows all the installed IBM Tivoli Storage Resource Manager products including Agents, Manager and Consoles (Figure 10-14). 468 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-14 Output for IBM Tivoli Storage Resource Manager Query You can also query the Inventory database with a native DB2 client. That enables you to connect to Business Intelligence tools or script based applications. Play around with the queries and you will find that there is much additional information which can be obtained from them. In combination with the hardware inventory scans, you can determine which Fibre Channel cards are in your systems, and which firmware levels and drivers they are using. In the following query output we queried all the IBM software which was on the endpoints (Figure 10-15). Figure 10-15 Output for IBM Query Chapter 10. Integration with Tivoli Configuration Manager 469 10.3 Software distribution To automatically deploy a large number of IBM Tivoli Storage Resource Manager Agents, you can use the Software Distribution component of IBM Tivoli Configuration Manager. The distribution process has four steps: 1. 2. 3. 4. build software package with the Software Package Editor create software distribution profile in Tivoli Framework import and build software package perform installation/uninstall tasks 10.3.1 Build software package with Software Package Editor Before you can use the Software Package Editor you have to install it from the Configuration Manager CD. It must be either installed on a managed node or a Tivoli endpoint so that the software packages, once built, can be automatically fetched from the host. Figure 10-16 shows the Software Package Editor with a new package which we called ITSRM-Agent. Figure 10-16 Software Package Editor with new package ITSRM-Agent You can build one package for each platform or all platforms in one. The benefit of separating the packages by operating system is that you prevent having to download all the code to all the endpoints before installation occurs. If temporary space is an issue, you should split into multiple packages. This in turn makes it slightly more complicated in installation tasks, because you have to group the endpoints by operating system. We will give some simple examples here, but if you already have a production ready installation of Configuration Manager, then the design rules will be in place, and you should build the packages according to them. Right-click the package name and select Properties. The dialog in Figure 10-17 displays. Enter the package version and a title for your package. Leave all the other parameters at their default values. 470 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-17 Properties dialog For the actual installation we use the command line procedure. First copy the installation media to the hard drive. We only need the setup.exe and the directories install, java and agent (Figure 10-18). Figure 10-18 Agent installation directories After setting the package properties, we add objects to the package. From the screen in Figure 10-16, click the tab Execute program as shown in Figure 10-19. Chapter 10. Integration with Tivoli Configuration Manager 471 Figure 10-19 Add an execute program action to the package With this type of action you can distribute files to the endpoint, run the provided script and delete the temporary files. During the Tivoli Storage Resource Manager installation, the setup program ends at once and additional processes are spawned. For this reason, we cannot use software distribution for corequisite files since these file would be deleted, when they are still needed. Therefore, we need additional actions to distribute the installation media. After selecting the the action, the Execute Program Properties dialog appears (Figure 10-20). Figure 10-20 Install dialog Enter the full path to the installation setup program. The example shows the installation of the Windows agent. This must be the path as it appears after transferring the files to the endpoint, 472 IBM Tivoli Storage Resource Manager: A Practical Introduction which could be different from the directory structure on the node where you are building the filepack. Do not include any arguments, then select the Advanced dialog (Figure 10-21). Figure 10-21 Advanced tab In the arguments field, enter the parameters for silent installation. The syntax is: setup.exe -s servername -d installdir -p serverport -q agentport -x (no scripts from server) -n (no initial scan) For example, the only non-default parameters are to specify server name (WISLA) and no initial scan of the Agent. The full installation command is: setup.exe -s wisla -n The Working Directory entry points to the installation directory. Optionally, you can redirect standard out and standard error to files. Click OK to end the dialog. This should be sufficient for the installation process. Configuration Manager can also do deinstallation, so to configure the deinstallation process select the Remove tab from Figure 10-20 on page 472, as shown in Figure 10-22. Chapter 10. Integration with Tivoli Configuration Manager 473 Figure 10-22 Remove dialog A single command is sufficient to remove the software. The path to the deinstallation program is in the installation directory of the IBM Tivoli Storage Resource Manager agent. We need an argument for the uninstallation program. To open the dialog, click Advanced (Figure 10-23). 474 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-23 Advanced properties The parameters to specify are java -uq. This procedure is not documented in the manual, but is derived from the script to remove the UNIX agents and proved to work well. Be sure to add the working directory for the process. We chose to make just one software package for Windows and AIX machines. To prevent execution on an AIX machine, you can specify a condition when to run that action, using the Condition button at the top right hand corner of Figure 10-22. Figure 10-24 displays. Chapter 10. Integration with Tivoli Configuration Manager 475 Figure 10-24 Condition Choose os_name from the list box, add an == operator, and enter Windows_NT. This will ensure execution only on the desired platform. Using the same procedure, we added an extra action for the AIX installation, starting from the Execute Program Properties dialog shown in Figure 10-20 on page 472. The actions to define are mainly the same except for the paths and the setup.aix program. Also, we added a condition that allows execution only on AIX machines. Since we can not download the installation media with the Execute Program action, we have to distribute it with an extra step. In the main screen of the Software Package editor (Figure 10-16 on page 470), choose the Add Object tab and click the Add Directory icon. The dialog in Figure 10-25. 476 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-25 Add Directory dialog To ensure all subdirectories are getting copied, choose the Advanced button on the lower left corner, and select the Descend Directories check box (Figure 10-26). Figure 10-26 Descend Directories The ready-to-build software package is shown in Figure 10-27. Chapter 10. Integration with Tivoli Configuration Manager 477 Figure 10-27 Ready-to-build software package Save this package to an .sp file on your server and exit the Software Package Editor. 10.3.2 Create software distribution profile in Tivoli Framework Open your Tivoli Desktop and navigate to the Software Distribution policy region. Make sure it has the Software Distribution package as a managed resource in the properties menu. To determine if it has been enabled, click on Properties -> Managed Resources and check if the SoftwarePackage resource is on the left side. Then create a Profile Manager for use by IBM Tivoli Storage Resource Manager packages (Figure 10-28). Figure 10-28 Policy Region with Profile Managers Double-click the object PM_SD_ITSRM to open the Profile Manager, and create a Profile with the name of your file package including the version (Figure 10-29). 478 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-29 Create Software Package Profile After you have created the Profile, an empty package icon appears in the Profile Manager. Add any subscribers for the distribution of the package. Figure 10-30 Profile Manager with Profiles and Subscribers Chapter 10. Integration with Tivoli Configuration Manager 479 Next we need to import the previously defined Software package to the Profile we just created. Right-click the Profile and choose Import (Figure 10-31). Figure 10-31 Import Software Package A dialog appears, where you can select the node on which you have previously created the Package and the path to the .sp file. Checking Build, will include all the source files and programs and actions into one single file (.spb) to be distributed to the target endpoint. Enter the location where you want to store the .spb file. You might want to store it on your software distribution server or on any of your software depot servers. If your are rebuilding it, check Overwrite (Figure 10-32). 480 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-32 Import and build a software package The package icon of the should now be a sealed package, ready to ship to your targets. For installation to occur, right-click the package and choose Install (Figure 10-33). Chapter 10. Integration with Tivoli Configuration Manager 481 Figure 10-33 Install a software package The install dialog, which is shown in Figure 10-34, lets you select on which endpoints to install the software. Our package will work on Windows and AIX servers. Additional checks can be made, eg. whether the software is already installed or with the Change Manager feature, if you are allowed to install the software due to licensing issues. For additional information see the redbook All About IBM Tivoli Configuration Manager Version 4.2, SG24-6612. 482 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 10-34 Install Software Package You can also schedule the installation and query inventory to look for hardware or software Constraints. To ensure that every host in your environment has an IBM Tivoli Storage Resource Manager agent, you can use the strategies described in Implementing Automated Inventory Scanning and Software Distribution After Auto Discovery, SG24-6626, to discover new nodes through Tivoli NetView, install an endpoint, perform an inventory query, and automatically deploy the S agent on them. Another method of identifying hosts to install software on, is querying an LDAP directory like Microsoft Active Directory or IBM Directory with the Enterprise Directory Query facility. Then you would be able to create a machine group for IBM Tivoli Storage Resource Manager, and automatically deploy the software once a machine belongs to the group. Configuration Manager enables you to remove the software as well. For this function, right-click the package and select Remove (Figure 10-35). Chapter 10. Integration with Tivoli Configuration Manager 483 Figure 10-35 Remove a Software Package All the other options like verify, clean, etc., are not defined and will not work. 484 IBM Tivoli Storage Resource Manager: A Practical Introduction 11 Chapter 11. Integration with Tivoli Monitoring This chapter describes some possibilities for using IBM Tivoli Monitoring to ensure a proper operation of the IBM Tivoli Storage Resource Manager Server. We assume basic understanding and a fully running installation of the following products: Tivoli Framework 3.7.1 or 4.1 IBM Tivoli Monitoring 5.1.1 IBM Tivoli Enterprise Console 3.8 The following topics are covered: Introduction to IBM Tivoli Monitoring Using Tivoli Monitoring to maintain ITSRM Daemons to monitor and restart actions © Copyright IBM Corp. 2003. All rights reserved. 485 11.1 Introduction to IBM Tivoli Monitoring Figure 11-1 presents a high-level overview of the interaction between various components of IBM Tivoli Monitoring 5.1. The IBM Tivoli Monitoring 5.1 profile contains, among other information, a resource model. The resource model is a collection of monitors that correlate amongst themselves before attempting to perform a notification action. The IBM Tivoli Monitoring 5.1 profile is distributed to the endpoints to monitor one or more resources (examples of typical resources are hard disk space, paging space, and process/service). Based on configuration settings in the IBM Tivoli Monitoring 5.1 profile, the engine runs on the endpoint and performs the necessary monitoring on the resources that are specified in the distributed resource model(s). The Web Health Console obtains logged data from selected endpoints and displays the “health” of the endpoints for their resources. Trend Analysis us C m to e iz p llu Ro e ut De fa ul ts ib tr is /D Profile Data warehouse lay sp Di TMR Web health console G et D at ITM Heartbeat a l tal Ins Resource Model Distribute Design Create Debug Endpoint NT/W2K ITM Engine Endpoint UNIX/Linux ITM Engine Workbench Figure 11-1 IBM Tivoli Monitoring architecture 11.2 Tivoli Monitoring with Tivoli Storage Resource Manager There are many possibilities to use IBM Tivoli Monitoring to help securing a productive installation of IBM Tivoli Storage Resource Manager. The base product ships with a wealth of predefined resource models: 486 Filesystems CPU Memory TCP/IP Network interface Event log IBM Tivoli Storage Resource Manager: A Practical Introduction You can use any of these to monitor basic functions of your OS. Additionally, there are numerous modules that provide special monitoring capabilities for additional software products. There are modules for: DB2 WebSphere® Application Server Oracle Microsoft Active Directory Apache/IIS If you want in depth monitoring for your IBM Tivoli Storage Resource Manager DB2 instance, you can use these additional modules. In our examples here, we use the shipped monitor Parametric Services to watch the status of the Windows services, which are required to run IBM Tivoli Storage Resource Manager. Additionally, there is a default action to restart stopped services. 11.3 Daemons to monitor and restart actions This section describes how to configure IBM Tivoli Monitoring to monitor the IBM Tivoli Storage Resource Manager Windows services. Open the Tivoli Desktop and navigate to your Monitoring Policy Region (Figure 11-2). Figure 11-2 Policy Region tonga-region Create a profile manager to contain the monitoring profiles. Select Create -> Profile Manager and create a dataless Profile manager, called PM_DM_ITSRM in our example (Figure 11-3). Chapter 11. Integration with Tivoli Monitoring 487 Figure 11-3 Profile Manager PM_DM_ITSANM Open the Profile Manager, select Create -> Profile and choose a Tmw2kProfile (which is the Monitoring profile resource). If this entry does not show up in the list, make sure the Tmw2kProfile is in the managed resources list of the Policy Region. Figure 11-4 shows a Profile called P_DM_ITSRM in . Figure 11-4 Create Monitoring Profile Double click on the newly created profile and in the screen that appears, click Add with Defaults. This opens a chooser window, where you can select the resource model you want to add to your profile. In the Category list box, choose Windows and select the Parametric Services entry (Figure 11-5). 488 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 11-5 Add Parametric Services Model to Profile After adding the resource model, we have to edit the model to include the services we want to monitor. For that, click Edit (Figure 11-6). Chapter 11. Integration with Tivoli Monitoring 489 Figure 11-6 Edit Resource Models In this window, we can adjust all attributes belonging to that resource model. To specify the services to monitor open the Parameters window (Figure 11-7). You must enter the names of the services exactly as they appear in the Windows Registry under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services. The services which IBM Tivoli Storage Area Network Manager needs to run are: DB2 TSRMagt1 TSRMsrv1 490 IBM Tivoli Storage Resource Manager: A Practical Introduction Figure 11-7 Parameters of Resource Model Click Apply Changes and Close to close the window, bring up the next dialog with the Indications button. As you can see from the definitions, the default action, when a service is stopped or failed, is to restart the service automatically. Additionally a CRITICAL TEC event is generated (Figure 11-8). Chapter 11. Integration with Tivoli Monitoring 491 Figure 11-8 Indications and actions of resource models To enable the TEC events globally for this Profile and to specify to which TEC server the events are sent, click on the Properties menu in the Profiles main window (Figure 11-4 on page 488) and the following screen will open (Figure 11-9). Figure 11-9 TEC forwarding of events from Monitoring 492 IBM Tivoli Storage Resource Manager: A Practical Introduction Select the Send TEC Events check box and choose the event delivery method and TEC server. The TME® (Secure) Delivery is (in most cases) the better choice, because it caches events if the Event Server is temporarily unavailable. Close the windows with the OK button until you are back in the Profile Manager main window. (Figure 11-10). Subscribe the endpoints running the IBM Tivoli Storage Resource Manager Manager with Profile manager -> Subscriber and distribute the Profile using Profile Manager -> Distribute -> Distribute Now. Figure 11-10 Profilemanager for Monitoring You can determine if your resource models are running on a particular endpoint by issuing the wdmlseng command at thecommand line on your Tivoli Managed Region (TMR) server. Example 11-1 shows typical output. Example 11-1 Determining if resource models are running bash$ wdmlseng -e wisla Forwarding the request to the engine... The following profiles are running: P_DM_Basic_Win#tonga-region TMW_EventLog :Running Chapter 11. Integration with Tivoli Monitoring 493 TMW_PhysicalDiskModel TMW_Services TMW_TCPIP TMW_MemoryModel TMW_Process TMW_Processor P_DM_ITSRM#tonga-region TMW_ParamServices bash$ :Running :Running :Running :Running :Running :Running :Running For demonstration purposes, we stopped the TSRMsrv1 service on our Server. After a few seconds the following TEC events appear in the TEC console (Figure 11-11). Figure 11-11 TEC events from Monitoring IBM Tivoli Monitoring detected the service that has been stopped and restarted it accordingly. 494 IBM Tivoli Storage Resource Manager: A Practical Introduction Part 6 Part 6 Appendices © Copyright IBM Corp. 2003. All rights reserved. 495 496 IBM Tivoli Storage Resource Manager: A Practical Introduction A Appendix A. Example scripts In this appendix we provide several scripts we used as examples in the main text of the redbook. The first group of scripts shows how to use IBM Tivoli Storage Resource Manager for Databases together with IBM Tivoli Storage Manager to manage database space. The second group consists of backup and restore scripts for the IBM Tivoli Storage Resource Manager repository are provided. Those scripts are intended to provide basic samples only of the functionality described. They must be modified, customized, and tested according to the operating system, the volume manager, the database manager, the backup software, or any other software used in your environment. These scripts can be downloaded as described in “Locating the Web material” on page 503. Tivoli Storage Resource Manager for Databases scripts Example A-1 shows the ARCHORA.bat script, which can be used to archive an Oracle database log (using Tivoli Storage Manager) on a Windows platform. Example: A-1 ARCHORA.bat @ECHO OFF REM Display starting messages REM ------------------------echo ARCHORA.BAT starting ... echo on server %2 echo to archive %3 logs for instance %4 echo Directory to process : %1 echo Expecting %5 files to be archived for a total size of %6 REM Perform basic checks on db type and directory REM --------------------------------------------if not %3 == Oracle GOTO NOTORACLE if not exist %1 GOTO DIRNOTEXIST REM Execute archive TSM command REM --------------------------set logfile=ARCHORA.LOG CD C:\Program files\Tivoli\tsm\baclient © Copyright IBM Corp. 2003. All rights reserved. 497 @echo on dir %1\ARC*.* dsmc archive %1\ARC*.* -subdir=no -delete -descr="%2 %3 %4 ArchiveLogs" -verbose @echo off if not %errorlevel% == 0 GOTO DSMCERROR @echo on dir %1\ARC*.* echo ARCHORA.BAT ended successfully ... exit 0 :NOTORACLE echo Error - Not Oracle database exit 4 :DIRNOTEXIST echo Error - Directory does not exist exit 4 :DSMCERROR echo Error while running DSMC command dir %1\ARC*.* type dsmerror.log Example A-2 shows the BKPSQLLOG.bat script, which can be used to backup the MSSQL transaction log should this log reaches a high usage percentage. Example: A-2 BKPSQLLOG.BAT script @ECHO OFF REM Display starting messages REM ------------------------echo SQLBKPLOG.BAT starting ... echo on server %2 echo Transaction log of %3 database %4/%1 reaches %7 of its capacity echo Performing transaction log backup REM Perform basic checks on db type and directory REM --------------------------------------------if not %3 == "MicroSoft SQL/Server" GOTO NOTSQL REM Execute backup command REM ---------------------CD C:\Program Files\Microsoft SQL Server\MSSQL\Backup echo Current Log backups echo ------------------dir %1_Tlog* cd ..\binn @echo on sqlmaint -D %1 -BkUpLog -BkUpMedia DISK -UseDefDir if not %errorlevel% == 0 GOTO SQLERROR @echo off echo New Log backups echo --------------cd ..\Backup dir %1_Tlog* echo SQLBKPLOG.BAT ended successfully ... exit 0 :NOTSQL echo Error - Not MSSQL database exit 4 498 IBM Tivoli Storage Resource Manager: A Practical Introduction :SQLERROR echo Error while running SQLMAINT command exit 4 Appendix A. Example scripts 499 Backup and restore scripts Example A-3 shows the script that we used to perform an offline backup of the IBM Tivoli Storage Resource Manager DB2 database in 7.3, “Backup procedures” on page 378. Example: A-3 ITSRMBackupOffline script @ECHO ON @REM Stop the IBM Tivoli SRM server @REM -----------------------------net stop "IBM Tivoli SRM Server" @ECHO ON @REM Get Status and check if Stopped @REM ------------------------------net start | findstr /i "IBM Tivoli SRM Server" @if %errorlevel% EQU 0 GOTO BACKUPDB :NOTSTOPPED @ECHO ON @REM IBM Tivoli SRM server not stopped - Backup cannot run @REM ----------------------------------------------------@echo "IBM Tivoli SRM Not Stopped !!!" @echo "Backup process cancelled " exit 1 :BACKUPDB @ECHO ON @REM IBM Tivoli ITSRM server is stopped - Backup can run @REM ------------------------------------------------@echo "Backup of ITSRMDB starting ..." C:\PROGRA~1\SQLLIB\BIN\db2cmd.exe /c /w /i db2 backup database ITSRMDB USE TSM @if %errorlevel% NEQ 0 echo "Backup failed - Please check error messages" @REM Backup completed - Start IBM Tivoli SRM @REM --------------------------------------:STARTITSRM net start "IBM Tivoli SRM Server" @ECHO ON @REM Get Status and check if Started @REM ------------------------------net start | findstr /i "IBM Tivoli SRM Server" @if %errorlevel% EQU 0 GOTO STARTOK @REM IBM Tivoli SRM not started @REM -------------------------@echo "IBM Tivoli SRM Server Not Started !!!" exit 1 @REM IBM Tivoli SRM started @REM ---------------------:STARTOK @echo "IBM Tivoli SRM started successfully" Example A-4 shows the script that we used to an online backup of the IBM Tivoli Storage Resource Manager DB2 database in 7.3, “Backup procedures” on page 378. 500 IBM Tivoli Storage Resource Manager: A Practical Introduction Example: A-4 ITSRMBackupOnline script @ECHO ON @REM List active connections for information @REM --------------------------------------db2cmd.exe /c /w /i db2 list applications for database ITSRMDB | findstr /i SQL1032N @if %errorlevel% NEQ 0 GOTO BACKUPDB @REM SQL1032N found - DB is not started @REM ---------------------------------@echo "SQL1032N return - DB2 is not active - Backup cancelled !!!" exit 1 :BACKUPDB @ECHO ON @REM DB2 is active - Backup can run @REM -----------------------------@echo "Backup of ITSRMDB starting ..." C:\PROGRA~1\SQLLIB\BIN\db2cmd.exe /c /w /i db2 backup database ITSRMDB ONLINE USE TSM @if %errorlevel% NEQ 0 echo "Backup failed - Please check error messages" @REM Backup completed - List connections @REM ----------------------------------db2cmd.exe /c /w /i db2 list applications for database ITSRMDB Appendix A. Example scripts 501 502 IBM Tivoli Storage Resource Manager: A Practical Introduction B Appendix B. Additional material This redbook refers to additional material that can be downloaded from the Internet as described below. Locating the Web material The Web material associated with this redbook is available in softcopy on the Internet from the IBM Redbooks Web server. Point your Web browser to: ftp://www.redbooks.ibm.com/redbooks/SG246886 Alternatively, you can go to the IBM Redbooks Web site at: ibm.com/redbooks Select the Additional materials and open the directory that corresponds with the redbook form number, SG246886. Using the Web material The additional Web material that accompanies this redbook includes the following file: File name SG246886.zip Description Zipped Sample Scripts System requirements for downloading the Web material The following system configuration is recommended: Hard disk space: Operating system: Processor: Memory: 1 MB Windows 2000 Pentium or higher 128 MB © Copyright IBM Corp. 2003. All rights reserved. 503 How to use the Web material Create a subdirectory (folder) on your workstation, and unzip the contents of the Web material zip file into this folder. 504 IBM Tivoli Storage Resource Manager: A Practical Introduction Abbreviations and acronyms API Application Programming Interface NAS Network Attached Storage CDE Common Desktop Environment NDS NetWare Directory Services CDW Central Data Warehouse NTFS NT Filesystem CIM Common Information Model ODBC Open Database Connectivity CIM/OM Common Information Model Object Manager RAID Redundant Array of Independent Disk CR/LF Carriage Return/Line Feed RDBMS CSV Comma Separated Values Relational Database Management Server DBA Database Administrator RI Report Interface DFSMS Data Facility Systems Managed Storage RIM RDBMS Interface Module ROI Return on Investment DMS Database Managed Storage SAN Storage Area Network DR Disaster Recovery SDD Subsystem Device Driver ESS Enterprise Storage Server SID System Identifier ETL Extract, Transform and Load SLA Service Level Agreement GUI Graphical User Interface SLP Service Location Protocol GUID Globally Unique Identifier SMIS HA High Availability or Highly Available Storage Management Interface Specification HACMP High Availability Clustered Multiprocessing SMS System Managed Storage SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SRM Storage Resource Management TEC Tivoli Enterprise Console TEDW Tivoli Enterprise Data Warehouse TSLA Tivoli Service Level Advisor UDB Universal Database URL Uniform Resource Locator VM Virtual Memory WWN World-Wide Name WWPN World-Wide Port Name HCL Hardware Compatibility List HTML Hypertext Markup Language IANA Internet Assigned Numbers Authority IBM International Business Machines Corporation ICMP Internet Control Message Protocol IDE Integrated Device Electronics IIS Internet Information Server ITSO International Technical Support Organization JDBC Java Database Connectivity JFS Journaled Filesystem JVM Java Virtual Machine LAN Local Area Network LCF Light Client Framework LDAP Lightweight Directory Access Protocol LSS Logical Sub System LUN Logical Unit Number MOF Managed Object Format MSCS Microsoft Cluster Services © Copyright IBM Corp. 2003. All rights reserved. 505 506 IBM Tivoli Storage Resource Manager: A Practical Introduction Related publications IBM Redbooks The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this redbook. For information on ordering these publications, see “How to get IBM Redbooks” on page 508. Tivoli Storage Management Concepts, SG24-4877 Getting Started with Tivoli Storage Manager: Implementation Guide, SG24-5416 Deploying the Tivoli Storage Manager Client in a Windows 2000 Environment, SG24-6141 Backing Up DB2 Using Tivoli Storage Manager, SG24-6147 Using Data Protection for Microsoft SQL Server, SG24-6148 Backing Up Oracle Using Tivoli Storage Management, SG24-6249 Early Experiences with Tivoli Enterprise Console, SG24-6015 Introducing IBM Tivoli Service Level Advisor, SG24-6611 Introduction to Tivoli Enterprise Data Warehouse, SG24-6607 All About IBM Tivoli Configuration Manager V4.2, SG24-6612 Implementing Automated Inventory Scanning and Software Distribution After Auto Discovery, SG24-6626 Other resources These publications are also relevant as further information sources: IBM Tivoli Storage Resource Manager V1.1 Configuration and Getting Started Guide, SC32-9067 IBM Tivoli Storage Resource Manager V1.1 Installation Guide, GC32-9066 IBM Tivoli Storage Resource Manager V1.1 Reference Guide, SC32-9069 Tivoli Enterprise Data Warehouse Release Notes, GI11-0857 Installing and Configuring Tivoli Enterprise Data Warehouse, GC32-0744 Enabling an Application for Tivoli Enterprise Data Warehouse, GC32-0745 Referenced Web sites These Web sites are also relevant as further information sources: IBM Tivoli Storage Resource Manager home page http://www-3.ibm.com/software/tivoli/products/storage-resource-mgr/ IBM Tivoli Storage Resource Manager supported platforms http://www.ibm.com/software/tivoli/products/storage-resource-mgr/platforms.html IBM Tivoli Storage Manager home page: http://www.ibm.com/software/tivoli/products/storage-mgr/ © Copyright IBM Corp. 2003. All rights reserved. 507 CIMS home page http://www.cims.com/ Perl home page http://www.perl.org Sybase JDBC http://www.sybase.com/products/middleware/jconnectforjdbc Oracle JDBC http://otn.oracle.com/software/tech/java/sqlj_jdbc/content.html Microsoft SQL-Server JDBC http://msdn.microsoft.com/downloads/default.asp?URL=/downloads/sample.asp?url=/MSDN-FILE Other Microsoft SQL-Server JDBC http://www.atinav.com/products/aveconnect/MSSQLserver/aveconnect2.htm How to get IBM Redbooks You can order hardcopy Redbooks, as well as view, download, or search for Redbooks at the following Web site: ibm.com/redbooks You can also download additional materials (code samples or diskette/CD-ROM images) from that site. IBM Redbooks collections Redbooks are also available on CD-ROMs. Click the CD-ROMs button on the Redbooks Web site for information about all the CD-ROMs offered, as well as updates and formats. 508 IBM Tivoli Storage Resource Manager: A Practical Introduction Index A Agent 50 AIX clustering 62 volume group 211 AIX commands lslv 211 lspv 215–216 lsvpcfg 216 Alert 23, 25, 27, 35, 41, 50–51, 101, 119, 173, 176, 189, 203, 205, 208, 227, 428–429 and Tivoli Storage Resource Manager 433 API 16 applet 49, 81, 84 application availability 24, 31 archive 12 archive bit 287–288, 295 asset management 458 asset reporting 36, 40, 178, 250, 252, 256 at risk files 181 audio data 6 automount 57 availability reporting 35, 40, 174, 250, 262 B backup 15 Tivoli Storage Resource Manager 369 volume calculation 294 backup reporting 41, 250, 287, 321 backup storage requirements 324 backup storage requirements reporting 291 baroc file 30, 413, 415 batch reporting 345, 351 batch reports 360 Business Continuance 3, 15 business intelligence reporting 433 C capacity reporting 40, 186, 250, 263, 265 CDE 101 CDW 445 See central data warehouse certificates 153 Chargeback 23, 26, 40, 42, 249 chargeback 42, 364–365 CIM 17, 145 agent 20, 145 device provider 145 discovery 145 messages 145 object manager 20 Object Manager see CIM/OM profiles 18 © Copyright IBM Corp. 2003. All rights reserved. proxy model 20 reporting 146 schema 17 CIM Device Model for Storage 17 CIM/OM 20, 30, 54, 67, 145, 298 certificates 153 configuration 150 discovery 298 installation 148 registration with Tivoli Storage Resource Manager 153 secure communication 153 security 153 services 150 users 150 CIM/OM server supported platforms 146 CIMOM 20 CIMS 42, 364 CIM-XML 19 class definition file 413 CLI 147 client options file 396 Cloudscape 30, 80 clustered resources 138 clustering 61–62 Cluster Administration 140 cluster group 134 cluster IP address 131 cluster name 126, 132, 134 cluster service 132 database clustered instance 137 failover 135, 137 HCL 125 heartbeat 124 installation 124 internal cluster communication 130 network connections 128 shared disk 124, 127 user ID 127, 132 computer uptime 262, 319 Constraint 50, 54, 200, 224–225, 268, 274 Constraint violation report 268 context name 120 Control server 433 cross device management 19 CSV 360 CSV output 38, 248, 360 customized reporting 345 D dashboard 33 data archiving 12 data growth 3, 6, 13, 21 509 data management 3 data mart 433 data mining 433 Data Warehouse Pack 433 database Alert 235 application servers 24 asset reporting 36, 232, 256 availability 242 backup expiration 373 batch reporting 356 capacity reporting 265 chained rows 243 chargeback 365 clustering 133 connectivity 50 growth 26 instance 113 Instance Alert 235 Instance Quota 242 monitoring 230 policy management 241 port 113 Quota 241–242 Quota violation reporting 282 recovery 387 Scan 259 schema 74 space usage report 347 Storage Resource Management 26 storage utilization 26 system reports 347 Table Alert 240 tablespace 74 Tivoli Storage Resource Manager 53 trend reporting 37 usage reporting 266 usage violation report 347 used table extents 243 user specific reporting 350 utilization 242 database instance storage report 328 database LUN assignment 331 database size report 329 database storage usage 327 DB2 28, 53, 59, 63, 70, 94, 123, 133, 230, 370, 469 administrator id 95, 133 archive log 378 backup 137, 373, 382 Client Configuration Assistant 439 cluster installation 133 clustered instance 133, 137 clustering 133 connection information 73 container directory 74 Control Center 70, 135, 137, 455 database maintenance 401 JDBC driver 73 LOGRETAIN 376 offline backup 382 510 online backup 376, 385 restore 137, 392, 399 rollforward 394 DB2 commands ALTER TABLESPACE 74 db2adutl 386 db2icrt 134 db2mscs 133–134 db2rbind 404 list applications 383 reorg 403 reorgchk 402–403 ROLLFORWARD 394 runstats 401 DB2 UDB 29, 70, 111 db2adutl 378 default profiles 180–181 device discovery 155 device provider 145 DFSMS 10, 14 direct-attached storage 15 Disaster Recovery 15, 396 discovery 49–50, 298 disk allocated space 34 capacity 252, 263 costs 8 mirroring 8 RAID 8 replication 8 utilization 8, 30 Distribution Status console 466 DMTF 17 DNS 61, 145 dsm.opt 295 dsmapipw 377 DTMF 17 duplicate files 8, 12 E element managers 16 Email 35, 176, 192 enable TEC events 428 engine 486 Enterprise Directory Query 458, 483 ESS 40, 145, 147, 250 attached hosts report 318 automatic provisioning 30 CIM/OM 20, 30, 54, 298 CIM/OM installation 148 CIM/OM supported platforms 146 CLI 147 filesystem extension 211 Logical Sub System 204, 217, 505 LUN provisioning 54–55, 200–201, 203, 211 LUN reporting 55 provisioning 54 reporting 297–298, 316, 318 SDD 211 Specialist 217 IBM Tivoli Storage Resource Manager: A Practical Introduction storage subsystem reporting 54 subsystem reporting 27, 30 Tivoli Storage Resource Manager Probe 298 used and free storage report 316 ESS CIM/OM 153, 155 add managed devices 150 add users 150 communication port 154 serious reporting 153 upgrading 151 ESS CIM/OM commands address 150 adduser 150 mkcertificate 153 verifyconfig 150 Ethernet 124 ETL programs 432 Event 418 event manager 190 F FAT 182 files at risk 181 filtering 182 forbidden 269 modified since backup 289–290 most at risk 37, 287 obsolete 181, 274 orphaned 181, 274 statistics 37 filesystem 13 automatic extension 27 extension 29 Quota 222 filesystem capacity 34, 50, 263 filesystem extension 27, 29, 54, 200–201 Alert 205 log only 203 filesystem utiliization 201 filesystems NAS 53 forecasting 21, 24, 31 free space 34–35 G graphical data 6 group 165 growth data 3, 6, 13, 21 H HACMP 62 HCL 125 heterogeneity 5 Hierarchical Space Management 371 high availability 60–62, 142 historical data 54 historical reporting 39 hot link 361 HSM. See Hierarchical Space Management HTML 248, 360 HTML output 38, 360 HTTP 19 HTTPS 54, 155 I IANA 75 IBM Directory 483 IBM Storage Management solutions 16 IBM Tivoli Configuration Manager see Tivoli Configuration Manager IBM Tivoli Enterprise Console see TEC IBM Tivoli Monitoring see Tivoli Monitoring IBM Tivoli Storage Area Network Manager. See Tivoli SAN Manager IBM Tivoli Storage Manager. See Tivoli Storage Manager IBM Tivoli Storage Resource Manager for Chargeback. See Tivoli Storage Resource Manager for Chargeback IBM Tivoli Storage Resource Manager for Databases. See Tivoli Storage Resource Manager for Databases IBM Tivoli Storage Resource Manager. See Tivoli Storage Resource Manager IBM TotalStorage Enterprise Storage Server see ESS ICMP 35, 174, 262 IDE 195 IIS 362 incremental backup planning 324 inode 197 Interbase 30 interoperability 16 inventory 458 Inventory Profile 464 Inventory Signature files 463 invoices 42 J Java 28, 49, 68, 80–81, 413, 418 JDBC 70, 73, 79, 113, 142 L LDAP 116, 483 lightweight 28 Linux 89, 91 backup 379 Load 432 logging 203 Logical Sub System 204, 505 look and feel 101 Lotus 1-2-3 360 LSS 217 LUN 12, 124 LUN modeling 204 LUN provisioning 54–55, 200–201, 203, 211 LUN reporting 55 Index 511 M P mainframe Storage Resource Management 4 manual storage management 12 measuring storage resources 5 Microsoft Excel 360 Internet Information Server 81, 362 Microsoft Active Directory 483 Microsoft Cluster Services 61 modified since backup files 289–290 MOF 18 monitoring 49, 160 monitoring storage 23 most at risk files 37, 287 Motif 101 MSCS 61, 123 Parametric Services monitor 487 people costs 13 PERL 229 Ping 35, 40, 49, 121, 174, 248, 250, 262 platform administration 14 policy based automation 4 policy management 200 pre-defined views 38 Probe 27–28, 36, 38, 40–41, 49, 78, 146, 177, 186, 194, 232, 248, 250, 262, 297–298 Profile 37, 180, 187, 219, 276, 287, 333, 364 profile manager 487 profile overview 486 progressive incremental backup 293 Prolog 412 provisioning 54 proxy model 20 N NAS 24–25, 28, 49, 52–53, 55–57, 76, 172 exported filesystems 53 login id 76, 110–111 password 76 Quota 200 SNMP 76 Storage Resource Management 25, 116 native software repository 463 NDS 53, 58, 91, 116–117, 119–120 NetView 190 event forwarding to TEC 427 NetWare 28, 49, 52–53, 58, 91, 109, 117, 172 login 119 Storage Resource Management 25 Network Appliance quota 223 Network Attached Storage. See NAS network discovery 49 non-Tivoli applications 432 NTFS 124 O object-oriented 18 obsolete files 8, 181, 274 ODBC 439 offline backup 382 OLAP analysis 433 online backup 385 Oracle 29, 53, 61, 70, 74, 92, 111, 142, 230, 259, 370 archive log 235 Database Configuration Assistant 142 JDBC driver 114, 142 regular administration 242 SID 143 orphaned files 181, 274 out-of-space condition 31 512 Q Quorum disk 127 Quota 50, 115, 180, 200, 218, 250, 268 violation report 276 R RDBMS 27 Redbooks Web site 508 Contact us xxviii replication solutions 16 reporting 38, 48 assets 40, 250, 252 availability 40, 174, 250, 262 backup 41, 250 backup storage requirements 291 backups 287 batch 345, 351, 360 by userID 41, 345 capacity 40, 186, 250, 263 computer uptime 319 Constraint violation 274 customized 345 database assets 256 database batch 356 database capacity 265 database Quota violations 282 database space usage 347 database usage 266 disk capacity 263 filesystem capacity 263 owned by a username 348 Quota violation 276 saved reports 349 scheduling 345, 360 storage capacity 263, 346 storage subsystems 40, 250 top 10 reports 316 uptime 319 usage 40, 182, 250, 266 usage violation 40, 250, 268 IBM Tivoli Storage Resource Manager: A Practical Introduction wasted space 250 Web publishing 361 Web site 41 reporting categories 249 Tivoli Storage Resource Manager 249 reports HTML output 360 resetarchiveattribute 292, 295 resource accounting 364 resource model 486 RI 433 RIM 467 ROI 31 Rule Base 412–413 S sample script 229 SAN 7, 15, 61 Scan 27–28, 37–38, 41, 49, 53–54, 75, 90, 106, 161, 165, 180, 185–186, 198, 248, 259, 274, 276, 337 Scan job log 260 scanned data 6 scheduled reports 249 scheduled tasks 35 scheduler 102 scheduling 50–51, 360 scripts 12, 27, 50–51, 75 SCSI 195 SDD 211 server growth 7 shared storage 62–63 SLP 54, 145 SMI 17–18 SMIS 20 architecture 19 discovery 19 proxy model 20 SMTP 192 SNIA 17–18, 21 SNMP 35, 56–57, 76, 172, 208 port 114 trap 42, 176, 190, 355 socket 413 software deployment 458 software distribution 470 software distribution profile 478 software inventory 458 Solaris 57 spreadsheets 360 SQL-Server 28–29, 53, 59, 70, 74, 78, 92, 111, 230, 258, 370, 404 administrator id 79 backup 404 Enterprise Console 407 restore 406 transaction log 238 SRM standards 16 SRM. See Storage Resource Management staffing growth 7 stale files 12 standard reporting 251 standards organizations 17 standby server 60 static IP address 124 storage administration 14 asset discovery 23, 36, 49 asset reporting 178 capacity 7, 40, 50, 263, 346 Chargeback 26 consolidation 7 consumption 49 costs 8, 22, 31 forecasting 8, 21, 24, 31 growth 6, 31, 39–40 infrastructure 6, 24 inventory 49 management standards 16 monitoring 23, 25, 160 reporting 38 return on investment 31 standards organizations 17 unused space 26 usage trends 37, 49 utilization 8, 23, 26, 30, 181 virtualization 16 Storage Area Network. See SAN storage management costs 3, 31 environments 5 functions 14 issues 6, 8 people costs 13 storage management standards 16 storage reports 23 Storage Resource Management 3, 8, 10, 53 definition 4 justification 30 ROI 31 storage resources measuring 5 Storage Subsystems reporting 40, 250, 297 Subsystem Device Driver 211 Sybase 29, 53, 70, 92, 111, 230, 370 JDBC driver 114 system availability 49 system reports 347 T Table 258–259 tablespace 74 TEC 115, 208, 213, 412, 491 Assign Event Group 422 baroc file 30, 413, 415 class definition file 413 compile rule base 416 Console 413 Constraint 420 Event Console 418 Index 513 Event Filters 418 event format 426 Event Groups 418 event processing 412 events from Tivoli Storage Resource Manager 427 import class definitions 414–415 load rule base 417 RIM 412 Rule Base 412–414 stop or start event server 417 Test SQL 421 TEC commnds wtdumprl 414 tec_dispatch 412 tec_reception 412 tec_rule 412 tec_server 412 tec_task 412 tec_ui_server 413 Tivoli Configuration Manager 414, 458 create Profile Manager 460 Distribution Status console 466 inventory 459 Inventory Profile 464 Inventory Signature files 463 software distribution 470 software distribution profile 478 Web interface 458 Tivoli Desktop 459, 466, 478, 487 Tivoli Distributed Monitoring 191 Tivoli Enterprise Console 176 Tivoli Enterprise Console see TEC Tivoli Enterprise Data Warehouse 414, 432–433 Administration 445 configuration 444 data mart 432 database 436 ETL processes 433 ETL programs 432 ODBC 439 source applications 432 Subject Areas 445 Warehouse Packs 432 Warehouse Schemas 445 Warehouse Sources 445 Warehouse Targets 445 Tivoli Enterprise Framework 413 Tivoli Light Client Framework 414 Tivoli Managed Region 493 Tivoli Management Framework 414 Tivoli Monitoring 414, 486 Parametric Services monitor 487 profile manager 487 resource model 486 TEC events 491 wdmlseng command 493 Tivoli Monitoring for Databases 242 Tivoli NetView 190 Tivoli SAN Manager 16 Tivoli Service Level Advisor 433 514 Tivoli Storage Manage resetarchiveattribute 292 Tivoli Storage Manager 16, 229, 235, 287, 295, 371, 433 API 371 archive bit 287 backup reporting 295 backup volume prediction 294 Backup/Archive client 374 client options file 295, 377, 396 Constraint violation report 268 copy group 373 dsm.opt 295, 377 management class 373 nodename 375 policy domain 373 progressive incremental backup 293 resetarchiveattribute 295 RETEXTRA 374 RETONLY 374 VERDELETED 374 VEREXISTS 374 Tivoli Storage Manager capabilities Backup-Restore 251 Disaster preparation and recovery 399 Tivoli Storage Manager commands db2adutl 378 dsmapipw 377 QUERY NODE 375 Tivoli Storage Manager for Databases 405 Tivoli Storage Resource Manager 16, 23, 25–26, 62, 266, 274, 360, 428, 433 ad hoc jobs 162 administration 99, 102 administration group 98 administration GUI 81 administrative tasks 98 Agent 24, 26–27, 32, 48, 50, 52, 91, 100, 102 Agent administration 103 Agent automatic upgrade 107 Agent auto-start 93 Agent backup 379 Agent configuration file 107 Agent details 104 Agent health 107 Agent id 91 Agent installation 89, 91 Agent license 109 Agent log 106 Agent platforms 29, 68 Agent Port 90 Agent port 75, 92, 104 Agent quick installation 92 Agent restore 387 Agent shutdown 107 Agent statistics 34 Agent status 32, 103 Agent tasks 52 agent upgrade 96 Alert 23, 25, 27, 35, 41, 50–51, 101, 119, 173, 176, 189, 203, 205, 208, 227, 272, 428–429 IBM Tivoli Storage Resource Manager: A Practical Introduction Alert Disposition 114, 176 Alert log 42, 115, 176, 191, 198, 276, 278 alerting 25 allocated disk space 34 apply maintenance 93 architecture 24, 48 archive bit 295 asset reporting 36, 40, 178, 250, 252 at risk files 181 automatic filesystem extension 27, 29 automatic provisioning 30 availability reporting 35, 174, 250, 262 backup 369 backup reporting 41, 250, 287, 321 backup storage requirements 291, 324 backup volume prediction 294 baroc file 413, 415 batch reports 51, 249, 345, 351, 360 biggest users 35 broadcast 103 browser interface 24, 26, 28, 49, 84 capacity reporting 40, 186, 250, 263 Chargeback 40, 42 chargeback 42, 364 CIM reporting 146 CIM/OM 54, 145 CIM/OM discovery 155 CIM/OM registration 153 CIMS 42 class definition file 413 Client 26, 28 Cloudscape 30, 80 clustered database 133 clustered installation 135–136 clustering 61, 123 co-existence 53 components 26 Computer Alert 194 Computer Group 163, 196 Computer Quota 222 Computer Uptime 319 computer uptime 319 configuration 101, 107, 119 configuration file 98, 107, 138, 145, 370 connection information 73 Constraint 50, 54, 200, 224–225, 268, 274 Constraint Violation report 274 create Group 163 create Probe 178 create Quota 222 CSV output 38, 248, 360 customized reporting 345 Cycle Panels 34 dashboard 33, 102 data retention 120–121 database 30, 53, 67, 370 database alias 73 database asset reporting 256 database backup 382 database clustering 133 database id 73 database maintenance 401 database platforms 28 database port 79 database repository 24, 48, 50, 72–73, 78, 101, 248 database restore 392, 399 database schema 74 database selection 73 database size 53 database tablespace 74 default profiles 180–181 default Web page 85 define Alert 193 deleted Agent history 121–122 deployment architecture 47 deployment considerations 53 deployment scenarios 59 destination directory 77 direct-connect Client 28, 48, 50 Directory Alert 198 Directory Group 166, 187, 255 directory monitoring 255 Disaster Recovery 396 discovery 23, 27, 35, 49–50, 56, 117, 172 discovery scheduling 172 disk capacity 263 email notification 115, 176, 192 Enterprise-wide Summary 34 ESS discovery 155 ESS reporting 297–298, 316, 318 ESS subsystem reporting 27, 30 event forwarding 428 event forwarding to TEC 427 Express Edition 25 file statistics 37, 49 filer logins 110 files filter 182 Filesystem Alert 197 filesystem capacity 34, 263 filesystem extension 54, 200–201, 211 filesystem extension logging 203 filesystem free space 35 Filesystem Group 165 Filesystem Quota 222 filesystem used space 34 forbidden file 269 free space 34 functions 31 graphical reporting 275 Group 162 Group definition 167 GUI client 24, 26, 81, 99, 102 GUI client installation 87 GUID 434 help 102 high availability 60–62 historical data 54 historical reporting 39 History Aggregation 118 HTML output 38, 248, 356, 360 Index 515 Import Class Definitions 415 install Warehouse Pack 435 installation 67, 143 installation directory 77, 83, 89, 91–92, 136, 145 interactive reporting 248 interface look and feel 101 inventory 49 Inventory Signature files 463 invoices 42 JDBC driver 73 job output 162 job scheduling 188 job status 162 jobs 105 license key 72 licensing 26, 53, 71, 89, 108 local database 59 log retention 115 logging 103, 106, 115 login 98 logon properties 138 LUN modeling 204 LUN provisioning 200–201, 203, 211 mail port 115 maintenance 93 Managed Devices 26 Managed Systems 48 maximum report size 39 modified since backup files 289–290 monitored directories 255 monitored server summary 35 monitoring 24–25, 49, 160 monitoring services 490 most at risk files 37, 287 MSCS 123 My Reports 248, 345 NAS 25, 53, 55–57, 76, 172, 200 NAS probe 116 native client 24, 26 navigation 101 NDS 116, 119 NetWare 53, 58, 91, 109, 172 NetWare login 119 NetWare reporting 251 Network Appliance Quota 223 network discovery 49 Network Quota 218 obsolete files 181, 274 orphaned files 181 OS User Group Group 171, 218 OS User Groups 41 overview 24 Panel Retention 101 Ping 35, 40, 49, 121, 174, 248, 250, 262 policy management 200 ports 75, 79, 88, 90, 92 pre-defined reports 248 Probe 27, 36, 38, 40–41, 49, 78, 146, 177, 186, 194, 248, 250, 262, 297–298 PROBE_ME 93 516 products 25 Profile 37, 162, 180, 187, 219, 276, 287, 333, 364 quick installation 92 Quota 50, 115, 180, 200, 218, 250, 268 Quota scheduling 221 Quota violation report 276 read-only access 99 remote access 81 remote administration 81 remote database 53, 59, 70, 142, 145 remote execution 27 report scheduling 345, 360 reporting 23, 25, 27, 38, 48, 247 Reporting Tab 101 reports on the Web 361 repository 24, 27–28, 48, 50, 73, 78, 101, 248 repository database 53 retention period 120–121 roles 49 sample script 229 sample scripts 497 saved reports 349 scalability 53, 59 Scan 27, 37–38, 41, 49, 53–54, 75, 90, 106, 161, 180, 185–186, 198, 248, 274, 276, 337 Scan job log 260 scanned files 54 scheduled actions 229 scheduled jobs 27, 35, 48, 50–51, 105, 162 scheduled reports 48, 249 scheduler 102 script 41, 50–51, 75, 176, 192, 200 script parameters 195, 228 scripts 145 security 98–99 security levels 29 Server 24, 26–27, 32, 48–49, 102 Server backup 381 server configuration file 98 Server installation 69 Server log 103 Server name 75 Server platforms 28, 68 Server port 75, 88, 90, 92 Server restore 390 Server shutdown 103 Server status 102 server.config 138 service 73, 100, 102, 136, 138 services monitoring 490 shared database 62 shared disk 124 shutdown 103, 107 SNMP 208 software distribution 470 space requirements 77, 89, 91 standard reporting 251 standby server 60 storage inventory 49 storage statistics 160 IBM Tivoli Storage Resource Manager: A Practical Introduction Storage Subsystem Reporting 40, 250, 316, 318 summary reporting 39 supported platforms 28, 67 system availability 49 system id 73 System Reports 345 system-wide view 254 TEC configuration 115 TEC event 208, 213 TEC event format 426 tool bar 102, 259 top 10 reports 316 trend reporting 37 Triggered Action 41, 52, 190, 195 Triggering condition 195, 197 UNIX Agent 91 UNIX Server 89 unmanaged list 49 unmanaged systems 50, 57 unreachable 103 Unreachable Agent 93 upgrade agents 96 UPGRADE_AGENTS 95 upgrading 93 uptime 105 uptime reporting 262, 319 usage reporting 40, 182, 250 usage violation reporting 250, 268 User Group 169 user names 116 user preferences 101 user space summary 35 username reporting 41, 345 view log 103, 106 Warehouse Pack 434 Warehouse Pack prerequisites 435 wasted space report 250 Web access 81 Web Connect Clients 49–50 Web reporting 41 Windows Agent 89 WWW server 27, 48 Tivoli Storage Resource Manager Express Edition 25 Tivoli Storage Resource Manager for Chargeback 26, 42, 100, 249, 364 Tivoli Storage Resource Manager for Databases 36, 100 Alert 235 Alert log 239–240 asset reporting 36, 232, 256 availability check 242 batch reports 356 capacity reporting 265 Computer Groups 231, 265 configuration 108, 121 create Group 231 create Table Group 259 database instance report 328 database LUN reporting 331 Database Quota 242 database Scan 259 Databases-Tablespaces Groups 231 Database-Tablespace Alert 237 Groups 231 Instance Alert 235 Instance Quota 242, 282 licensing 111, 233 monitoring 230 My Reports 345 Network Quota 241 policy management 241 Probe 232 Profile 233 Quota 241 Quota violations 282 RDBMS Login 112 Scan 112, 234, 259 script 241–242 script parameters 235 storage usage 327 supported platforms 29 system reports 347 Table Alert 240 Table Group 232, 240, 257–258 trend reporting 37 usage reporting 266 User Group 232 user specific reports 350 top 10 reports 316 transactions 6 Transform 432 trend reporting 37 Triggered Action 41, 52 truststore 153 TSM. See Tivoli Storage Manager Types of ETLs Central Data Warehouse 432 data mart 432 U UNIX 57 automount 57 inode 197 password file 116 Storage Resource Management 4, 25 unmanaged storage 6 unreachable agent 93 unused files 8 uptime 262, 319 usage reporting 40, 182, 250, 266 usage violation reporting 250, 268 user space summary 35 usiness Intelligence tools 469 UTC 394 utilization 201 utilization rates 8 V Vendor Identification Number 56–57 virtual directory 82 Index 517 virtualization 16 Visio 13 volume group 54 W warehouse pack 432 wasted space 21 wasted space report 250 WBEM 17 wdmlseng 493 Web browser 24, 26, 49, 361 Web Health Console 486 Web reporting 41 Windows 56 archive bit 287, 292, 295 backup 381 clustering 61, 123 domain 49–50, 56 Domain Controller 172 domain users 99 event log 35, 176, 191 MSCS 123 Service Pack 133 Storage Resource Management 4, 25 workgroup 50 Windows 2000 LDAP 116 restore 396 System Objects 397–398 WWW Server 27 518 IBM Tivoli Storage Resource Manager: A Practical Introduction IBM Tivoli Storage Resource Manager: A Practical Introduction (1.0” spine) 0.875”<->1.498” 460 <-> 788 pages Back cover ® IBM Tivoli Storage Resource Manager: A Practical Introduction Take control of storage resources in your enterprise Receive early alerts of storage problems New! ESS reporting and Tivoli integration Storage growth continues to accelerate, and the cost of disk can approach 80% of total system hardware costs. Yet, the storage in most businesses is typically only about 50% used. How can you take control of your storage assets to render utilization more efficient, and make the most of your storage dollars? IBM Tivoli Storage Resource Manager helps you discover, monitor, and create enterprise policies for your filesystems and databases. You will find out where all your storage is going, and be able to act intelligently on this information. Application availability is improved because you will have early warnings when filesystems are running out of space. If you are thinking about server consolidation, you can use IBM Tivoli Storage Resource Manager to help efficiently utilize your accumulated storage resources. This IBM Redbook shows how to install, configure, and protect the IBM Tivoli Storage Resource Manager environment; how to create policies; how to define automated actions like scripts or SNMP events when policies are violated; and how to produce detailed, meaningful storage reports. This book is intended for those who want to learn more about IBM Tivoli Storage Resource Manager, and for those who are about to implement it. The second edition of this redbook is updated for IBM Tivoli Storage Resource Manager Version 1.2. INTERNATIONAL TECHNICAL SUPPORT ORGANIZATION BUILDING TECHNICAL INFORMATION BASED ON PRACTICAL EXPERIENCE IBM Redbooks are developed by the IBM International Technical Support Organization. Experts from IBM, Customers and Partners from around the world create timely technical information based on realistic scenarios. Specific recommendations are provided to help you implement IT solutions more effectively in your environment. For more information: ibm.com/redbooks SG24-6886-01 ISBN 073849979X