Installation and User's Guide: IBM Spectrum Protect Plus
Installation and User's Guide: IBM Spectrum Protect Plus
Version 10.1.0
IBM
IBM Spectrum Protect Plus
Version 10.1.0
IBM
Note:
Before you use this information and the product it supports, read the information in "Notices" at the end of this publication.
This edition applies to version 10, release 1, modification 0 of IBM Spectrum Protect Plus (product number
5737-F11) and to all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright IBM Corporation 2017.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Installation and User's Guide
Table of Contents
IBM Spectrum Protect Plus Overview 5
Dashboard 6
Installation and Setup 7
System Requirements 8
Virtual Machine Privileges 14
File Indexing and Restore Requirements 21
Install IBM Spectrum Protect Plus as a VMware Virtual Appliance 25
Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance 28
Start IBM Spectrum Protect Plus 31
Configure SLA Policies 32
Offloading to IBM Spectrum Protect by Using IBM Spectrum Protect Plus 34
vSnap Installation and Setup 37
Install vSnap Server 38
Add a Backup Storage Provider 45
vSnap Server Administration Reference 47
Operations 50
Operations Overview 51
VMware 52
VMware Overview 53
Add a VMware Provider 54
Create a VMware Backup Job Definition 56
Create a VMware Restore Job Definition 59
Create a Fenced Network Through a VMware Restore Job 63
Hyper-V 66
Hyper-V Overview 67
Add a Hyper-V Provider 68
Create a Hyper-V Backup Job Definition 70
Create a Hyper-V Restore Job Definition 73
3
Installation and User's Guide
Restore a File 76
Report 79
Reports Overview 80
Run, Save, and Schedule a Report 81
Backup Storage Utilization Reports 83
Protection Reports 84
System Reports 86
VM Environment Reports 87
System 89
System Overview 90
Job Monitoring 91
Audit Logs 92
VADP Proxy 93
Account 96
User Access 98
LDAP / SMTP 101
Maintenance 104
Maintenance Overview 105
Manage the Administrative Console 106
Upload an SSL Certificate 107
Update IBM Spectrum Protect Plus 108
Maintenance Job 112
Log On to the Virtual Appliance 113
Collect Logs for Troubleshooting 114
Backup and Restore the Catalog 115
Data Disk Expansion 116
Acronyms 121
4
Installation and User's Guide IBM Spectrum Protect Plus Overview
Getting Started
For IBM Spectrum Protect Plus system requirements, see System Requirements on page 8.
For IBM Spectrum Protect Plus installation procedures, see Install IBM Spectrum Protect Plus as a VMware
Virtual Appliance on page 25 and Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance on page 28.
To install additional virtual or physical vSnap backup destinations, see Install vSnap Server on page 38.
To configure VADP Proxies, which enable load sharing and load balancing for jobs in Linux environments, see
VADP Proxy on page 93.
5
Installation and User's Guide Dashboard
Dashboard
The dashboard displays an overview of your IBM Spectrum Protect Plus environment. Use the dashboard to
quickly review the status of your jobs, backup storage utilization and restore points.
The dashboard overview displays the number of Protected VMs, Unprotected VMs, Failed Jobs, and Running
Jobs. Additional widgets include:
The Backup Storage Utilization widget displays the usage of your available vSnap servers as well as their
capacity. Additional vSnap servers can be added to the IBM Spectrum Protect Plus environment through the
Backup Storage window.
The Backup Storage Summary widget displays your data utilization and the total capacity of your backup
storage. Additionally it displays these data reduction ratios:
l Data Deduplication Ratio: The ratio of the amount of data that is protected compared with the physical space
required to store it, due to removal of duplicates.
l Data Compression Ratio: The ratio of the amount of data that is protected compared with the physical space
required to store it, due to data compression.
The Protection by Policy widget displays the total number of protected VMs per SLA Policy. Use this widget to
see an overview of your SLA Policy usage. The display includes SLA Policies that have been deleted but for
which recovery points still exist.
The System Information widget displays system resource utilization, including CPU, memory, Configuration,
Recovery, and File Catalogs.
RELATED TOPICS:
l System Requirements on page 8
l IBM Spectrum Protect Plus Overview on page 5
l Install IBM Spectrum Protect Plus as a VMware Virtual Appliance on page 25
l Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance on page 28
l Start IBM Spectrum Protect Plus on page 31
l Operations Overview on page 51
l System Overview on page 90
l Reports Overview on page 80
l Add a Backup Storage Provider on page 45
6
Installation and User's Guide Installation and Setup
7
Installation and User's Guide System Requirements
System Requirements
Ensure that you have the required system configuration and browser to deploy and run IBM Spectrum Protect
Plus.
For initial deployment, configure your virtual appliance to meet the following recommended minimum
requirements:
l 64-bit dual core machine
l 16 GB memory
The IBM Spectrum Protect Plus appliance has five virtual disks that total 370 GB of storage.
Use an NTP server to synchronize the time zones across IBM Spectrum Protect Plus resources in your
environment, such as the IBM Spectrum Protect Plus appliance, storage arrays, hypervisors and application
servers . If the clocks on the various systems are significantly out of sync, you may experience errors during
application registration, metadata cataloging, Inventory, Backup, or Restore/File Restore jobs. For more
information about identifying and resolving timer drift, see the following VMware knowledge base article: Time in
virtual machine drifts due to hardware timer drift.
Browser Support
Run IBM Spectrum Protect Plus from a computer that has access to the installed virtual appliance.
IBM Spectrum Protect Plus was tested and certified against the following web browsers. Note that newer
versions may be supported.
l Firefox 55.0.3
l Google Chrome 60.0.3112
l Microsoft Edge 40.15063
If your resolution is below 1024 x 768, some items may not fit on the window. Pop-up windows must be enabled
in your browser to access the Help system and some IBM Spectrum Protect Plus operations.
8
Installation and User's Guide System Requirements
Hyper-V Requirements
l Microsoft Hyper-V Server 2016
l 150 GB+ of drive space if Disk Type is set to Fixed Size during the installation procedure
l 16 GB memory
All Hyper-V servers, including cluster nodes, must have the Microsoft iSCSI initiator Service running in their
Services list. Set the service to Automatic so that it is available when the machine boots.
Before registering the Hyper-V server in IBM Spectrum Protect Plus, the server must be added to the /etc/hosts
file on the IBM Spectrum Protect Plus appliance via command line. If more than one Hyper-V server is set up in a
cluster environment, all of the servers must be added to /etc/hosts. When registering the cluster in IBM Spectrum
Protect Plus, register the Failover Cluster Manager.
VMware Requirements
l vSphere 5.5 and later
l vSphere 6.0 and later
l vSphere 6.5 and later
Ensure the latest version of VMware Tools is installed in your environment. IBM Spectrum Protect Plus was
tested against VMware Tools 9.10.0.
In some cases, VMware Backup jobs fail with “failed to mount” errors. To resolve, increase the maximum number
of NFS mounts to at least 64 through the NFS.MaxVolumes (vSphere 5.5 and later) and NFS41.MaxVolumes
(vSphere 6.0 and later) values, as described in the following procedure:
https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2239.
vSnap Requirements
A vSnap server serves as the primary backup destination for IBM Spectrum Protect Plus. In either a VMware or
Hyper-V environment, one vSnap server with the name localhost is automatically installed at the time that the
IBM Spectrum Protect Plus appliance is initially deployed. In larger backup enterprise environments, additional
vSnap servers might be desired.
vSnap Server Virtual Machine Installation Requirements
Before deploying to the host, ensure you have the following:
l The correct VMware or Microsoft Hyper-V template
l vSphere 5.5, 6.0, or 6.5 or Microsoft Hyper-V Server 2016
9
Installation and User's Guide System Requirements
Note:For later versions of vSphere, the vSphere Web Client may be required to deploy IBM Spectrum
Protect Plus appliances.
l Network information and VMware host information
l Either an available static IP address to use or access to DHCP
For initial deployment, configure your virtual appliance to meet the following recommended minimum
requirements:
l 64-bit dual core machine
l 16 GB memory
Note: Memory should be adjusted based on backup capacity for more efficient deduplication. General Rule of
thumb is 1GB for every 1TB of backup data.
The vSnap appliance has two virtual disks that total 150 GB storage
vSnap Server Physical Installation Requirements
For initial deployment, configure your physical server to meet the following recommended minimum
requirements:
l CentOS Linux7.3.1611(x86_64) or CentOSLinux7.4.1708(x86_64)
l 64-bit quad core machine
l 32 GB memory
l 8GB free space in root partition
Note: Memory should be adjusted based on backup capacity for more efficient deduplication. General Rule of
thumb is 1GB for every 1TB of backup data.
Optionally, an SSD improves backup and restore performance.
l To improve backup performance, configure the pool to use one or more log devices backed by SSD. Specify
at least two log devices to create a mirrored log for better redundancy.
l To improve restore performance, configure the pool to use a cache device backed by SSD
10
Installation and User's Guide System Requirements
Port 8080 on the VADP proxy server must be open when the proxy server firewall is enabled. If the port is not
open, VADP Backups will run on local vmdkbackup instead of the VADP proxy server.
Ports
The following ports are used by IBM Spectrum Protect Plus and associated services. Note that ports marked as
Open use a secure connection (https/ssl).
Ports
Port Service Comment Firewall
IBM Spectrum 22 OpenSSH 5.3 Used for troubleshooting IBM Spectrum Open
Protect Plus (protocol 2.0) Protect Plus.
443 User interface and A microservice running a Zuul reverse- Open
Zuul reverse proxy proxy listens on 443.
5432 PostgreSQL SQL RDBMS - Supports job Blocked
management and some security related
data and transactions.
5671 RabbitMQ Message framework used to manage Open
messages produced and consumed by
the VADP proxy and VMware job
management workers. Also facilitates job
log management.
5672 RabbitMQ Message framework used to manage Blocked
messages produced and consumed
within the IBM Spectrum Protect Plus
appliance.
8082 Virgo Modular Java application server. Serves Blocked
core functions for IBM Spectrum Protect
Plus including the REST APIs.
8083 NodeJs JavaScript server. Provides higher level Blocked
APIs to the user interface leveraging the
REST APIs running in Virgo.
8090 Administrative Extensible framework for system Open
Console Framework administration functions. Supports
(ACF) plugins that perform operations such as
system updates and catalog
backup/restore.
8092 ACF Plugin EMI Supports system update, certificate and Blocked
license management.
8093 ACF Plugin Catalog Performs backup and restore of the IBM Blocked
Backup/Recovery Spectrum Protect Plus catalog data.
8761 Discovery Server Automatically discovers VADP proxies Open
and is used by IBM Spectrum Protect
11
Installation and User's Guide System Requirements
Use the following diagram as guidance for understanding the communication paths managed by IBM Spectrum
Protect Plus. It can be leveraged to provide assistance for troubleshooting and network configuration for
deployment scenarios.
The labeled resources within the gray background represent the core services of the IBM Spectrum Protect
Plus virtual appliance. The curved lines represent implicit communications.
The colors of the various modules represent different types of services as defined by the key in the upper right.
The red rectangle represents the network firewall. Services that appear on the red rectangle are indicative of
the ports that are open on the firewall.
Dashed arrows represent communication among resources and services. The arrow flows TOWARD the
listening port. The port numbers that need to be open are indicated by the LISTENING port.
For example, the vSnap service near the bottom of the diagram is represented as being external to the IBM
Spectrum Protect Plus virtual appliance. It is listening on port 8900 as well as other ports. As represented by the
dashed line, a component within the virtual appliance establishes a communication path by way of a connection
to the vSnap service at port 8900.
12
Installation and User's Guide System Requirements
RELATED TOPICS:
l File Indexing and Restore Requirements on page 21
l Install IBM Spectrum Protect Plus as a VMware Virtual Appliance on page 25
l Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance on page 28
13
Installation and User's Guide Virtual Machine Privileges
Datastore
l Allocate space
l Browse datastore
l Configure datastore
l Low level file operations
l Remove file
l Update virtual machine files
Datastore Cluster
l Configure a datastore cluster
Distributed switch
l Create
l Delete
l Host operation
l Modify
l Move
l Network I/O Control operation
l Policy operation
l Port configuration option
l Port setting operation
l VSPAN operation
ESX Agent Manager
14
Installation and User's Guide Virtual Machine Privileges
l Config
l Modify
l View
Extension
l Register extension
Folder
l Create folder
l Delete folder
l Move folder
l Rename folder
Global
l Cancel task
l Diagnostics (used for troubleshooting, not required for operations)
l Disable methods
l Enable methods
l Licenses
l Log event
l Manage custom attributes
l Set custom attribute
l Settings
Host
l Configuration
l Advanced settings
l Storage partition configuration
Network
l Assign network
l Configure
l Move network
l Remove
Resource
15
Installation and User's Guide Virtual Machine Privileges
l Apply recommendation
l Assign a vApp to resource pool
l Assign virtual machine to resource pool
l Create resource pool
l Migrate powered off VM
l Migrate powered on VM
l Modify resource pool
l Move resource pool
l Query vMotion
l Remove resource pool
l Rename resource pool
Sessions
l View and stop sessions
Storage views
l Configure service
l View
Tasks
l Create task
l Update task
Virtual Machine > Configuration
l Add existing disk
l Add new disk
l Add or remove device
l Advanced
l Change CPU count
l Change resource
l Configure managedBy
l Disk change tracking
l Disk lease
l Display connection settings
l Extend virtual disk
16
Installation and User's Guide Virtual Machine Privileges
l Host USB device
l Memory
l Modify device settings
l Query Fault Tolerance compatibility
l Query unowned files
l Raw device
l Reload from path
l Remove disk (detach and remove virtual disk)
l Rename
l Reset guest information
l Set annotation
l Settings
l Swapfile placement
l Unlock virtual machine
l Upgrade virtual machine compatibility
Virtual Machine > Guest Operations
l Guest Operation Modifications
l Guest Operation Program Execution
l Guest Operation Queries
Virtual Machine > Interaction
l Answer question
l Backup operation on virtual machine
l Configure CD media
l Configure floppy media
l Console interaction
l Create screenshot
l Defragment all disks
l Device connection
l Disable Fault Tolerance
l Enable Fault Tolerance
l Guest operating system management by VIX API
l Inject USB HID scan codes
17
Installation and User's Guide Virtual Machine Privileges
l Perform wipe or shrink operations
l Power Off
l Power On
l Record session on VM
l Replay session on VM
l Reset
l Resume Fault Tolerance
l Suspend
l Suspend Fault Tolerance
l Test failover
l Test restart Secondary VM
l Turn Off Fault Tolerance
l Turn On Fault Tolerance
l VMware Tools install
Virtual Machine > Inventory
l Create from existing
l Create new
l Move
l Register
l Remove
l Unregister
Virtual Machine > Provisioning
l Allow disk access
l Allow read-only disk access
l Allow virtual machine download
l Allow virtual machine files upload
l Clone template
l Clone virtual machine
l Create template from virtual machine
l Customize
l Deploy template
l Mark as template
18
Installation and User's Guide Virtual Machine Privileges
l Mark as virtual machine
l Modify customization specification
l Promote disks
l Read customization specifications
Virtual Machine > Service configuration
l Allow notifications
l Allow polling of global event notifications
l Manage service configurations
l Modify service configurations
l Query service configurations
l Read service configurations
Virtual Machine > Snapshot management
l Create snapshot
l Remove snapshot
l Rename snapshot
l Revert to snapshot
Virtual Machine > vSphere Replication
l Configure replication
l Manage replication
l Monitor replication
vApp
l Add VM (to vApp)
l Assign resource pool to vApp
l Assign vApp (to another vApp)
l Clone
l Create
l Delete
l Export
l Import
l Move
l Power Off
19
Installation and User's Guide Virtual Machine Privileges
l Power On
l Rename
l Suspend
l Unregister
l View OVF Environment
l vApp application configuration
l vApp instance configuration
l vApp managedBy configuration
l vApp resource configuration
In the All Privileges section located below the permissions selection window, ensure Propagate to children is
selected.
20
Installation and User's Guide File Indexing and Restore Requirements
Windows Requirements
l Supported operating systems: Windows Server 2008 R2, Windows Server 2012 R2, Windows Server 2016
l Supported file systems: NTFS, ReFS, CsvFS
IBM Spectrum Protect Plus supports only the operating systems available to your hypervisors. Review your
hypervisor's documentation for information about supported operating systems.
File indexing and restore operations support SCSI disks in a Hyper-V environment. IDE disks are not supported.
Note that Generation 1 virtual machines require IDE boot disks, however if additional SCSI disks are available,
file indexing and restore operations will be supported on those disks.
Windows Remote Shell (WinRM) must be enabled. By default, WinRM is not enabled in a Windows Server 2008
R2 or Windows 10 Server environments. To ensure services are able to receive connections, perform the
following procedure: Run winrm quickconfig, then select Yes to make changes. This adds a listener for
port 5985. To ensure the listener is available, enter the following command: winrm e
winrm/config/listener.
Note: IBM Spectrum Protect Plus can protect and restore virtual machines with other file systems, but only the
file systems listed above are eligible for file indexing and restore.
When file indexing is performed in a Windows environment, the following directories on the resource are
skipped: /Drivers, /Program Files, /Program Files (x86), /Windows, and /winnt. Files within these directories are
not added to the IBM Spectrum Protect Plus Inventory and are not available for file recovery.
Ensure the latest version of VMware Tools is installed on VMware virtual machines, and Hyper-V Integration
Services is installed on your Hyper-V virtual machines.
Space Requirements
The C drive must have sufficient temporary space to save the file indexing results.
Connectivity Requirements
l The hostname of the IBM Spectrum Protect Plus appliance should be resolvable from the Windows virtual
machine. If the hostname of the IBM Spectrum Protect Plus appliance is not resolvable, add the IP address
of the appliance in the ecxAddress field in the IBM Spectrum Protect Plus configuration file, which can be
found in the following location on the appliance:
/opt/virgo/repository/ecx-usr/com.catalogic.ecx.deploy.vmware.ecxvmdeployer.json
21
Installation and User's Guide File Indexing and Restore Requirements
l The IP address of the virtual machine selected for indexing must be visible to the vSphere client or Hyper-V
Manager.
l The Windows virtual machine selected for indexing must allow outgoing connections to port 22 (ssh) on the
IBM Spectrum Protect Plus appliance.
l All firewalls must be configured to allow IBM Spectrum Protect Plus to connect to the server through WinRM.
Kerberos Requirements
l Kerberos-based authentication can be enabled through a configuration file on the IBM Spectrum Protect
Plus appliance. This will override the default Windows NTLM protocol. Note that Kerberos does not allow
local user accounts to be used and is only suitable for environments in which all machines are on a single
domain.
l For Kerberos-based authentication only, the user identity must be specified in the username@FQDN format.
The username must be able to authenticate using the registered password to obtain a ticket-granting ticket
(TGT) from the key distribution center (KDC) on the domain specified by the fully qualified domain name.
l Kerberos authentication also requires that the clock skew between the Domain Controller and the IBM
Spectrum Protect Plus appliance is less than 5 minutes. Note that the default Windows NTLM protocol is not
time dependent.
Linux Requirements
l Supported operating systems: Red Hat Enterprise Linux 6.4+, CentOS 6.4+, Red Hat Enterprise Linux 7.0+,
CentOS 7.0+, SUSE Linux Enterprise Server 12.0+
l Supported file systems: ext2, ext3, ext4, XFS.
IBM Spectrum Protect Plus supports only the operating systems available to your hypervisors. Review your
hypervisor's documentation for information about supported operating systems.
22
Installation and User's Guide File Indexing and Restore Requirements
Note: IBM Spectrum Protect Plus can protect and restore virtual machines with other file systems, but only the
file systems listed above are eligible for file indexing and restore.
When file indexing is performed in a Linux environment, the following directories on the resource are
skipped: /tmp, /usr/bin, /Drivers, /bin, and /sbin. Files within these directories are not added to the IBM Spectrum
Protect Plus Inventory and are not available for file recovery.
Software Requirements
l Python version 2.6.x or 2.7.x must be installed.
l When file systems are indexed, temporary metadata files are generated under the /tmp directory and then
deleted as soon as the indexing is complete. The amount of free space required for the metadata depends on
the total number of files present on the system. Ensure that there is approximately 350 MB of free space per
1 million files.
l Red Hat Enterprise Linux / Oracle Enterprise Linux / CentOS 6.x only: Ensure the util-linux-ng package is up-
to-date by running yum update util-linux-ng. Depending on your version or distribution, the
package may be named util-linux.
l If data resides on LVM volumes, ensure the LVM version is 2.02.118 or later. Run lvm version to check
the version and run yum update lvm2 to update the package if necessary.
l If data resides on LVM volumes, the lvm2-lvmetad service must be disabled as it can interfere with IBM
Spectrum Protect Plus's ability to mount and resignature volume group snapshots/clones. To disable:
o systemctl stop lvm2-lvmetad
o systemctl disable lvm2-lvmetad
o Edit the file /etc/lvm/lvm.conf and set use_lvmetad = 0
For a discussion of the lvmetad service, see
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Logical_Volume_
Manager_Administration/metadatadaemon.html.
l If data resides on XFS file systems and the version of xfsprogs is between 3.2.0 and 4.1.9, the file restore can
fail due to a known issue in xfsprogs that causes corruption of a clone/snapshot file system when its UUID is
modified. To resolve this issue, update xfsprogs to version 4.2.0 or above. For more information, see
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782012.
Connectivity Requirements
The SSH service must be running on port 22 on the server, and any firewalls must be configured to allow IBM
Spectrum Protect Plus to connect to the server through SSH. The SFTP subsystem for SSH must also be
enabled. For SFTP configuration information, see https://en.wikibooks.org/wiki/OpenSSH/Cookbook/File_
Transfer_with_SFTP.
Authentication and Privilege Requirements
The credentials specified for the virtual machine must specify a user that has the following sudo privileges:
23
Installation and User's Guide File Indexing and Restore Requirements
l The sudoers configuration must allow the user to run commands without a password.
l The !requiretty setting must be set.
The recommended approach is to create a dedicated IBM Spectrum Protect Plus Agent user with the following
privileges. Sample configuration:
l Create user: useradd -m sppagent
l Set a password: passwd sppagent
l Place the following lines at the end of your sudoers configuration file, typically /etc/sudoers. If your existing
sudoers file is configured to import configurations from another directory (for example, /etc/sudoers.d), you
can also place the lines in a new file in that directory:
o Defaults:sppagent !requiretty
o sppagent ALL=(root) NOPASSWD:ALL
RELATED TOPICS:
l Restore a File on page 76
l System Requirements on page 8
24
Installation and User's Guide Install IBM Spectrum Protect Plus as a VMware Virtual Appliance
25
Installation and User's Guide Install IBM Spectrum Protect Plus as a VMware Virtual Appliance
2. Specify the location of the IBM Spectrum Protect Plus OVA template file and select it. Click Next.
3. Review the template details and accept the End User License Agreement. Click Next.
4. Provide a meaningful name for the template, which becomes the name of your virtual machine. Identify an
appropriate location to deploy the virtual machine. Click Next.
5. Identify the datacenter, server, and resource pool for deployment. When prompted to select storage, select
from datastores already configured on the destination host. The virtual machine configuration file and virtual
disk files are stored on the datastore. Select a datastore large enough to accommodate the virtual machine
and all of its virtual disk files. Click Next.
6. Select a disk format to store the virtual disks. It is recommended that you select thick provisioning, which is
preselected for optimized performance. Thin provisioning requires less disk space, but may impact
performance. Click Next.
7. Select networks for the deployed template to use. Several available networks on the ESX server may be
available by clicking Destination Networks. Select a destination network that allows you to define the
appropriate IP address allocation for the virtual machine deployment. Click Next.
8. Enter network properties for the virtual machine's default gateway, DNS, IP address, and network prefix. It
is recommended to work with your network administrator when configuring network properties.
If you are using DHCP instead of static IP address, bypass the fields in this dialog, and click Next. If you
don't have access to a DHCP server and wish to use a static IP address, assign a static IP with the
NetworkManager Text User Interface (nmtui). See To assign a static IP with NetworkManager Text User
Interface (nmtui) on page 26.
Note that a default gateway must be configured properly before deployment. Multiple DNS strings are
supported, and must be separated by commas without the use of spaces.
The network prefix should be specified by a network administrator. The network prefix must be entered
using CIDR notation; valid values are between 1 and 32.
9. Click Next.
10. Review your template selections. Click Finish to exit the wizard and to start deployment of the OVF
template. Deployment might take significant time.
11. After OVF template deployment completes, power on your newly created virtual machine. This can be done
from vSphere Client.
Note: The virtual machine must remain powered on for the IBM Spectrum Protect Plus application to be
accessible.
12. Make a note of the IP address of the newly created virtual machine. This is needed to log on to the
application. Find the IP address in vSphere Client by clicking your newly created virtual machine and looking
in the Summary tab.
Note: You must allow several minutes for IBM Spectrum Protect Plus to initialize completely.
26
Installation and User's Guide Install IBM Spectrum Protect Plus as a VMware Virtual Appliance
A network administrator can assign static IP addresses with the NetworkManager Text User Interface (nmtui),
which is a CentOS tool used to configure networking options. Sudo privileges are required to run nmtui.
1. Ensure the newly imported IBM Spectrum Protect Plus virtual machine is powered on. From a
CentOS command line, enter nmtui to open the NetworkManager Text User Interface. Navigate the
interface with arrow keys and press Enter to make a selection.
2. From the main menu, select Edit a connection.
3. Select the network connection, then select Edit.
4. On the Edit Connection screen, enter an available static IP address that is not already in use.
5. Select OK to save the static IP configuration.
NEXT STEPS:
l Reboot the newly create virtual appliance if you are using a static IP address instead of
DHCP.
l Start IBM Spectrum Protect Plus and begin using it from any supported web browser. See
Start IBM Spectrum Protect Plus on page 31.
RELATED TOPICS:
l Start IBM Spectrum Protect Plus on page 31
27
Installation and User's Guide Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance
l All Hyper-V servers, including cluster nodes, must have the Microsoft iSCSI initiator
Service running in their Services list. Set the service to Automatic so that it is available
when the machine boots.
28
Installation and User's Guide Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance
9. Select SPP-{release}, then click Next. The Choose Import Type dialog opens.
10. Choose the following import type: Register the virtual machine in place. Click Next.
11. If the Connect Network dialog opens, specify the virtual switch to use, then click Next. The Completing
Import dialog opens.
12. Review the description, then click Finish to complete the import process and close the Import Virtual
Machine wizard. The virtual machine is imported.
13. Right-click the newly deployed VM, then click Settings...
14. Under the section named IDE Controller 0, select Hard Drive.
15. Click Edit, then click Next.
16. In the Choose Action screen, choose Convert then click Next.
17. For the Disk Format, choose VHDX.
18. For the Disk Type, choose Fixed Size.
19. For the Configure Disk option, give the disk a new name and optionally, a new location.
20. Review the description, then click Finish to complete the conversion.
21. Once the conversion completes, click Browse, then locate and select the newly created VHDX.
22. Repeat steps 15 through 21 for each disk under the SCSI Controller section.
23. Power on the virtual machine from the Hyper-V Manager.
24. Use Hyper-V Manager to identify the IP address of the new virtual machine if automatically assigned. To
assign a static IP to the virtual machine using NetworkManager Text User Interface, see the following
section.
29
Installation and User's Guide Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance
1. Save the product key to a computer with Internet access. Make a note of the location on your computer.
2. From a supported browser, enter the following URL to access the Administrative Console of the virtual
machine where IBM Spectrum Protect Plus is deployed:
https://<HOSTNAME>:8090/
where <HOSTNAME> is the IP address of the virtual machine where the application is deployed.
3. In the login window, select System from the Authentication Type drop-down menu. Enter your password
to access the Administrative Console. The default password is sppadLG235.
4. Click Manage your licenses. Click Choose File, then browse for the product key on your computer, then
click Upload new license.
5. Click Logout.
Note: When uninstalling IBM Spectrum Protect Plus in a Hyper-V environment, it is recommended to delete the
IBM Spectrum Protect Plus appliance from Hyper-V first before running the uninstaller.
NEXT STEPS:
l Start IBM Spectrum Protect Plus and begin using it from any supported web browser. See
Start IBM Spectrum Protect Plus on page 31.
RELATED TOPICS:
l Start IBM Spectrum Protect Plus on page 31
30
Installation and User's Guide Start IBM Spectrum Protect Plus
A vSnap server serves as a backup target, and is required to perform backup and restore jobs. By default, a
vSnap installation is present on the IBM Spectrum Protect Plus appliance. Before the storage can be used,
additional software components will be initialized and a storage pool will be created. You will be prompted to start
the vSnap initialization process upon first login to the user interface. For more information about vSnap
installations, see Install vSnap Server on page 38.
RELATED TOPICS:
l Install IBM Spectrum Protect Plus as a VMware Virtual Appliance on page 25
l Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance on page 28
l System Requirements on page 8
l Account on page 96
31
Installation and User's Guide Configure SLA Policies
3. In the Name field, enter a name that will provide a meaningful description of the SLA Policy.
4. In the Backup Target section, define the recovery point objective to determine the frequency and interval
with which backups must be made. In the Retention field, enter the number of copies to keep either by
number of days or number of copies. In the Every field, set the backup frequency and interval.
5. In the Target Site field, select a primary or secondary vSnap backup destination. Target sites are
designated as primary or secondary through the Backup Storage pane. If more than one Primary or
Secondary Backup Storage is available to IBM Spectrum Protect Plus, the vSnap backup destination with
the largest amount of available storage will be used first.
6. Expand the IBM Spectrum Protect Offload section to display IBM Spectrum Protect Offload options.
Offloading essentially creates two backups of your data – one on the vSnap server for short term protection,
and one on the IBM Spectrum Protect server for longer term protection. Select Offload to IBM Spectrum
Protect to enable offloading. Enter the backup frequency and interval through the associated pulldown
menus.
If Leverage most recent backup is selected, the offload occurs from the ESX original host or cluster
directly, and the latest backup image on the vSnap server is mounted. Note that incremental backups are
not supported if selected.
Note: Microsoft Hyper-V is not currently supported for offloading.
7. When you are satisfied that the SLA Policy-specific information is correct, click Save. The SLA Policy can
now be applied to Backup job definitions.
NEXT STEPS:
l Assign user permissions to the SLA policy. See User Access on page 98.
l Create a Backup job definition that utilizes an SLA Policy.
RELATED TOPICS:
32
Installation and User's Guide Configure SLA Policies
l Offloading to IBM Spectrum Protect by Using IBM Spectrum Protect Plus on page 34
l Create a VMware Backup Job Definition on page 56
l Create a Hyper-V Backup Job Definition on page 70
33
Installation and User's Guide Offloading to IBM Spectrum Protect by Using IBM Spectrum Protect Plus
The decision regarding which offload method to choose is based upon use case and environment. Factors to
consider include speed, impact on production hypervisor servers, and storage needs. Note that Microsoft Hyper-
V is not currently supported for offload for either method.
To indicate that a backup snapshot is to be offloaded, select the “Offload to IBM Spectrum Protect” method on
the IBM Spectrum Protect Plus SLA Policy screen. A dialog requesting details about the offload method, the
offload backup schedule, and retention parameters opens.
CONSIDERATIONS:
34
Installation and User's Guide Offloading to IBM Spectrum Protect by Using IBM Spectrum Protect Plus
l Your IBM Spectrum Protect server and data mover should be configured with the same
time zone.
l Offloading requires that vCenters and IBM Spectrum Protect for Virtual Environments are
registered in IBM Spectrum Protect Plus as a pair, or configured so that all datacenters in
vCenter are registered in IBM Spectrum Protect for Virtual Environments. The scope for
offloaded backups is limited to the vCenter configured with the IBM Spectrum Protect for
Virtual Environments server. Backups and restores are limited to the same vCenter.
Alternatively, virtual machines selected for backup should be restricted to the datacenters
configured in IBM Spectrum Protect for Virtual Environments.
l A single data mover supports one command at a time. If a data mover is performing a
backup operation, it cannot perform a restore operation until the backup operation
completes.
l A single data mover supports one command at a time, but can support multiple virtual
machines. When selecting multiple virtual machines for offloading, select the virtual
machines from a single datacenter per policy. The virtual machines will be distributed
among the available datamovers, and will offload in a parallel sequence. If creating
multiple offload jobs for virtual machines on the same datacenter, schedule the jobs so
that they do not overlap.
l For Linux-based IBM Spectrum Protect for Virtual Environments servers, the user must
have sufficient permissions to run a shell as the tdpvmware user. Typically, root is used as
the user when registering a Linux-based IBM Spectrum Protect for Virtual Environments
server.
l To enable backup and offloading of virtual machine templates, you must specify
VMENABLETEMPLATEBACKUPS in the data mover options file. Note that a backup of
a templates can only be performed as a Full type backup. For more information about
configuring your environment for backing up virtual machine templates, see
https://www.ibm.com/support/knowledgecenter/en/SSEQVQ_8.1.2/client/r_opt_
vmenabletemplatebkup.html.
l Instant Disk Restore jobs utilizing offloading are not supported.
The following concepts summarize the salient points about the IBM Spectrum Protect Plus offload operation:
Backup
l The vSnap server is the primary target for IBM Spectrum Protect Plus backups.
l An IBM Spectrum Protect server is the target for offloaded IBM Spectrum Protect Plus backups.
35
Installation and User's Guide Offloading to IBM Spectrum Protect by Using IBM Spectrum Protect Plus
l IBM Spectrum Protect Plus triggers the offload operation. If you select offload method 1, the offload happens
from the hypervisor directly. If you select offload method 2, the offload happens from the vSnap server.
Method 1 is the default.
l The offload operation uses data movers from IBM Spectrum Protect for Virtual Environments configured
nodes, not VADP proxies.
l IBM Spectrum Protect Plus records the offloaded backup in its catalog.
l For primary backups and for backups using offload method 1, block level incremental backups are
supported. For offloaded backups using method 2, all backups are full backups.
Restore
l Both restores from vSnap and recoveries of offloaded data are triggered from IBM Spectrum Protect Plus.
l IBM Spectrum Protect Plus is used to restore the snapshots from vSnap to the original or alternate
hypervisor.
l IBM Spectrum Protect for Virtual Environments is used to recover snapshots from IBM Spectrum Protect
servers to the original or alternate hypervisor.
RELATED TOPICS:
l VMware Overview on page 53
l Configure SLA Policies on page 32
36
Installation and User's Guide vSnap Installation and Setup
37
Installation and User's Guide Install vSnap Server
vSnap servers can be deployed through the following formats:
l IBM Spectrum Protect Plus default installation, which includes a pre-registered vSnap server with the name
localhost. Before the storage can be used, additional software components will be initialized and a storage
pool will be created. Refer to Initial Configuration on page 41 for next steps.
l Physical vSnap server, installed on a physical machine
l Virtual vSnap server, installed in a VMware or Hyper-V environment
Note: If performing a custom (non-OVA) installation to a VMware virtual machine, the virtual disk UUIDs must be
visible to the operating system in order for vSnap to detect the disks and use them in a storage pool. Edit the VM
settings, add the advanced configuration parameter disk.enableUUID and set its value to TRUE.
To install a vSnap Server in a Physical environment.:
1. Install CentOS Linux 7.3.1611 (x86_64) or CentOS Linux 7.4.1708 (x86_64). The "Minimal Install"
configuration is sufficient, but you can also install additional packages including a graphical user interface if
desired. The root partition must have at least 8GB of free space after installation.
2. Edit the file /etc/selinux/config, change the SELINUX setting to permissive, then reboot the
system for the changes to take effect.
38
Installation and User's Guide Install vSnap Server
3. Download the vSnap installation package, which is a self-extracting archive named vsnap-dist-
<version>.run.
4. Make the file executable through the following command: chmod +x vsnap-dist-<version>.run,
then execute it. The vSnap packages are installed, plus all of its dependencies.
5. Refer to Initial Configuration on page 41 for next steps.
39
Installation and User's Guide Install vSnap Server
11. Review your template selections. Click Finish to exit the wizard and to start deployment of the OVF
template. Deployment might take significant time.
12. After OVF template deployment completes, power on your newly created virtual machine. This can be done
from vSphere Client.
Note: The virtual machine must remain powered on for the vSnap server to be accessible.
13. Make a note of the IP address of the newly created virtual machine. This is needed to access and register
the vSnap server. Find the IP address in vSphere Client by clicking your newly created virtual machine and
looking in the Summary tab.
14. Refer to Initial Configuration on page 41 for next steps.
40
Installation and User's Guide Install vSnap Server
14. In the Choose Action screen, choose Convert then click Next.
15. For the Disk Format, choose VHDX.
16. For the Disk Type, choose Fixed Size.
17. For the Configure Disk option, give the disk a new name and optionally, a new location.
18. Review the description, then click Finish to complete the conversion.
19. Once the conversion completes, click Browse, then locate and select the newly created VHDX.
20. Repeat steps 13 through 19 for each disk under the SCSI Controller section.
21. Power on the virtual machine from the Hyper-V Manager. If prompted, select the option where the kernel
boots in rescue mode.
22. Use Hyper-V Manager to identify the IP address of the new virtual machine if automatically assigned. To
assign a static IP to the virtual machine using NetworkManager Text User Interface, see the following
section.
23. Refer to Initial Configuration on page 41 for next steps.
Note: When uninstalling IBM Spectrum Protect Plus in a Hyper-V environment, it is recommended to delete
the IBM Spectrum Protect Plus appliance from Hyper-V first before running the uninstaller.
Initial Configuration
Before using a new installation of vSnap, you must perform the following initial configuration tasks:
l Register the vSnap server as a backup storage target in IBM Spectrum Protect Plus
l Initialize the system and create a storage pool
41
Installation and User's Guide Install vSnap Server
Note: If deploying an IBM Spectrum Protect Plus appliance, a vSnap installation is present on the same
appliance, and the following section can be skipped. The default, or on-board, vSnap is registered in IBM
Spectrum Protect Plus with the name localhost when the appliance is deployed.
1. Log in to the vSnap server console as the root user and run vsnap user create. The initial root
password is sppDP758.
2. Enter a username and password when prompted.
3. Log in to the IBM Spectrum Protect Plus user interface. From the navigation menu select Backup Storage,
then register the vSnap server using the credentials of this new user. See Add a Backup Storage Provider
on page 45.
Simple Initialization
The following is the recommended procedure for initializing virtual deployments of vSnap.
1. Log in to the IBM Spectrum Protect Plus user interface.
2. For the default on-board vSnap installation that is registered as part of an IBM Spectrum Protect Plus
installation, you are prompted to start the initialization process the first time you log in to the user interface.
No further steps are required.
3. For any other vSnap servers, register them into IBM Spectrum Protect Plus as described in Register the
vSnap server as a backup storage target on page 41, then from the Actions menu, select Initialize for each
server. The initialization process runs in the background and requires no further user interaction. Note that
the process may take 5 to 10 minutes to complete.
Advanced Initialization
The following is the recommended procedure for initializing physical deployments of vSnap. It gives you the
flexibility of creating a storage pool using advanced redundancy options and a specific list of disks.
1. Log in to the vSnap server console as the root user (or alternatively, as the user you created previously
using the vsnap user create command). The initial root password is sppDP758.
42
Installation and User's Guide Install vSnap Server
NEXT STEPS:
l Configure advanced vSnap features such as network configuration or storage pool
management. See vSnap Server Administration Reference on page 47.
l Start IBM Spectrum Protect Plus and begin using it from any supported web browser. See
Start IBM Spectrum Protect Plus on page 31.
l Register the newly added vSnap server in IBM Spectrum Protect Plus. See Add a Backup
Storage Provider on page 45.
RELATED TOPICS:
43
Installation and User's Guide Install vSnap Server
l Add a Backup Storage Provider on page 45
l vSnap Server Administration Reference on page 47
44
Installation and User's Guide Add a Backup Storage Provider
3. Populate the fields in the Storage Properties pane:
Hostname/IP
Enter the resolvable IP address or hostname of the backup storage.
Site
Select a site for the backup storage. Available options include Primary and Secondary. If more than one
Primary or Secondary Backup Storage is available to IBM Spectrum Protect Plus, the Backup Storage
with the largest amount of available storage will be used first.
Username
Enter your username for the backup storage device.
Password
Enter your password for the backup storage device.
4. Click Save. IBM Spectrum Protect Plus confirms a network connection and adds the backup storage device
to the database.
5. From the Actions menu associated with the newly added backup storage device, select Initialize. The
initialization process runs in the background and requires no further user interaction. Note that the process
may take 5 to 10 minutes to complete.
45
Installation and User's Guide Add a Backup Storage Provider
Note: Pool expansion must be performed by adding new, unused disks to the pool. Expanding existing disks that
are already part of the pool is not supported.
1. From the navigation menu, click Backup Storage.
2. From the Actions menu associated with an existing vSnap server you wish to expand, select Rescan.
3. Click the Manage icon associated with the vSnap server you wish to expand, then expand the Add New
Disks vSnap Storage section. The Manage vSnap Server section displays.
4. Add and save the newly added disks. The vSnap pool expands by the size of the added disks.
RELATED TOPICS:
l Install vSnap Server on page 38
l vSnap Server Administration Reference on page 47
l Create a VMware Backup Job Definition on page 56
l Create a Hyper-V Backup Job Definition on page 70
46
Installation and User's Guide vSnap Server Administration Reference
Storage Management
Managing Disks
vSnap creates a storage pool using disks provisioned to the vSnap server. In the case of virtual deployments, the
disks can be RDM or virtual disks provisioned from datastores on any backing storage. In the case of physical
deployments, the disks can be local or SAN storage attached to the physical server. The local disks may already
have external redundancy enabled via a hardware RAID controller, but if not, vSnap can also create RAID-
based storage pools for internal redundancy.
If vSnap was deployed as part of a virtual appliance, it already contains a 100GB starter virtual disk that can be
used to create a pool. You can add more disks before or after creating a pool and accordingly use them to create
a larger pool or expand an existing pool.
Once you have added disks to a vSnap server, you can rescan to detect newly attached disks.
47
Installation and User's Guide vSnap Server Administration Reference
l To rescan using the IBM Spectrum Protect Plus user interface: From the navigation menu select Backup
Storage, then click the Actions menu next to the relevant vSnap server and select Rescan.
l To rescan using the vSnap command line interface: Run vsnap disk rescan.
48
Installation and User's Guide vSnap Server Administration Reference
Before expanding a pool, ensure one or more unused disks are available as described in Managing Disks on
page 47.
To expand a storage pool from the IBM Spectrum Protect Plus user interface, from the navigation menu select
Backup Storage. Click the Manage icon next to a vSnap server to manage it, then expand the tab titled Add
New Disks. The tab displays all unused disks discovered on the system. Select one or more disks and click Save
to add them to the storage pool.
To expand a storage pool from the command line interface, use the vsnap pool expand command. For
information about available options, pass the --help flag to any command or subcommand to view usage
help.
Network Management
RELATED TOPICS:
l Install vSnap Server on page 38
l Add a Backup Storage Provider on page 45
49
Installation and User's Guide Operations
Operations
The topics in the following section cover backing up and restoring resources.
50
Installation and User's Guide Operations Overview
Operations Overview
IBM Spectrum Protect Plus is a high-performance data protection and recovery solution for virtual server
environments. IBM Spectrum Protect Plus ensures that an organization’s virtual machines and their contents are
protected quickly, completely, and safely.
Resources that IBM Spectrum Protect Plus needs to recognize are registered in the IBM Spectrum Protect Plus
user interface with a one-time operation when defining a backup job. Items that are registered include:
l The hypervisor(s) that contain the components to be backed up. VMware vCenters and Microsoft Hyper-V
servers are both supported hypervisors.
l The vSnap Storage Appliance(s) that serve as the primary target for the backup.
l The IBM Spectrum Protect server, which serves as the secondary target for the backup.
Related features of IBM Spectrum Protect Plus include auto-discovery and the product’s catalog. Auto-discovery
recognizes when new virtual machines on a registered hypervisor are added to the environment. The feature
ensures that all data in your virtualized environment is protected.
The IBM Spectrum Protect Plus catalog, which inventories and indexes all virtual machine snapshots, enables
an administrator to easily see what is and is not protected. When the need to recover arises, this global catalog
allows the administrator to quickly search and identify what objects they want to recover, and from which
recovery point.
The catalog is stored and maintained on the IBM Spectrum Protect Plus appliance. Periodic maintenance jobs
are run to cleanse the catalog of metadata for snapshots that have passed the retention period or are otherwise
expired.
RELATED TOPICS:
l VMware Overview on page 53
l Hyper-V Overview on page 67
l Restore a File on page 76
51
Installation and User's Guide VMware
VMware
The topics in the following section cover backing up and restoring VMware resources.
52
Installation and User's Guide VMware Overview
VMware Overview
In order to protect content on a VMware server, first register the server so that IBM Spectrum Protect Plus
recognizes it. Then create backup and restore job definitions, including SLA requirements such as job schedule
and retention policies.
RELATED TOPICS:
l Add a VMware Provider on page 54
l Create a VMware Backup Job Definition on page 56
l Create a VMware Restore Job Definition on page 59
53
Installation and User's Guide Add a VMware Provider
4. Populate the fields in the vCenter Properties pane:
Hostname/IP
Enter the resolvable IP address or a resolvable path and machine name.
Use existing user
Enable to select a previously entered username and password for the provider.
Username
Enter your username for the provider.
Password
Enter your password for the provider.
Port
Enter the communications port of the provider you are adding. Select the Use SSL check box to enable
an encrypted Secure Socket Layer connection. The typical default port is 80 for non SSL connections or
443 for SSL connections.
5. Expand Options to configure additional options:
54
Installation and User's Guide Add a VMware Provider
If a message appears indicating that the connection is unsuccessful, review your entries. If your entries are
correct and the connection is unsuccessful, contact a system administrator to review the connections.
Providers are automatically cataloged after registration. IBM Spectrum Protect Plus creates a high-level
Inventory job and catalogs the objects on the provider. To manually run an Inventory job, click Run Inventory
from the Backup pane.
NEXT STEPS:
l Assign user permissions to the hypervisor. See User Access on page 98.
RELATED TOPICS:
l Create a VMware Backup Job Definition on page 56
l Create a VMware Restore Job Definition on page 59
55
Installation and User's Guide Create a VMware Backup Job Definition
CONSIDERATIONS:
l If your vCenter is a virtual machine, it is recommended to have the vCenter on a dedicated
datastore and backed up in a separate backup job.
l In some cases, VMware Backup jobs fail with “failed to mount” errors. To resolve,
increase the maximum number of NFS mounts to at least 64 through the
NFS.MaxVolumes (vSphere 5.5 and later) and NFS41.MaxVolumes (vSphere 6.0 and
later) values, as described in the following procedure:
https://kb.vmware.com/selfservice/microsites/search.do?language=en_
US&cmd=displayKC&externalId=2239.
56
Installation and User's Guide Create a VMware Backup Job Definition
57
Installation and User's Guide Create a VMware Backup Job Definition
virtual machine can be accessed from the IBM Spectrum Protect Plus appliance either through DNS or
host-name.
6. When you are satisfied that the job-specific information is correct, click Save. The job runs as defined by
your SLA Policy, or can be run manually from the Jobs Monitoring pane.
NEXT STEPS:
l If in a Linux environment, consider creating VADP proxies to enable load sharing. See
VADP Proxy on page 93.
l Create a VMware Restore job definition. See Create a VMware Restore Job Definition on
page 59.
RELATED TOPICS:
l Create a VMware Restore Job Definition on page 59
l Add a VMware Provider on page 54
58
Installation and User's Guide Create a VMware Restore Job Definition
CONSIDERATIONS:
59
Installation and User's Guide Create a VMware Restore Job Definition
l When selecting virtual machines for recovery, recovery points offloaded to IBM Spectrum
Protect storage cannot be recovered in Test Mode.
l The size of the virtual machine restored from a vSnap offload to a Spectrum Protect
recovery point will be equal to the thick provisioned size of the virtual machine, regardless
of source provisioning due to the use of NFS datastores during the offload. The full size of
the data must be transferred even if it is unallocated in the source virtual machine.
l Recovery points that were offloaded to IBM Spectrum Protect storage cannot be used to
recover VMDKs.
l When selecting a destination for a Restore job definition, note that the destination must be
registered in IBM Spectrum Protect Plus. This includes Restore jobs that restore data to
original hosts or clusters.
4. To run the job now using default options, click Restore. To schedule the job to run using default options,
click Manage Job(s) and define a trigger for the job definition.
5. To edit options before creating the job definition, click Options. Set the job definition options.
Destination
Set the VMware destination.
Original ESX Host or Cluster - Select to restore to the original host or cluster.
Alternate ESX Host or Cluster - Select to restore to a local destination different from the original host
or cluster, then select the alternate location from available resources. Test and Production networks can
be configured on the alternate location to create a fenced network, which keeps virtual machines used for
testing from interfering with virtual machines used for production. From the vCenter section, select an
alternate location. Selections can be filtered by either hosts or clusters.
Restore Type
Set the VMware Restore job to run in Test, Production, or Clone mode by default. Once the job is created,
it can be run in Production or Clone mode through the Job Sessions or Active Clones sections of the
Restore pane.
60
Installation and User's Guide Create a VMware Restore Job Definition
Network Settings
Set the network settings for a restore to an original ESX host or cluster:
Allow system to define IP configuration - Select to allow your operating system to define the
destination IP address. During a Test Mode restore, the destination virtual machine receives a new MAC
address along with an associated NIC. Depending on your operating system, a new IP address can be
assigned based on the original NIC of the virtual machine, or assigned through DHCP. During a
Production Mode restore the MAC address does not change, therefore the IP address should be
retained.
Use original IP configuration - Select to restore to the original host or cluster using your predefined
IP address configuration. During a restore, the destination virtual machine receives a new MAC address,
but the IP address is retained.
Set the network settings for a restore to an alternate ESX host or cluster:
From the Production and Test fields, set virtual networks for production and test restore job runs.
Destination network settings for production and test environments should be different locations to create
a fenced network, which keeps virtual machines used for testing from interfering with virtual machines
used for production. The networks associated with Test and Production will be utilized when the restore
job is run in the associated mode.
Set an IP address or subnet mask for virtual machines to be re-purposed for development/testing or
disaster recovery use cases. Supported mapping types include IP to IP, IP to DHCP, and subnet to
subnet. Virtual machines containing multiple NICs are supported.
By default, the Use system defined subnets and IP addresses for VM guest OS on destination
option is enabled. To use your predefined subnets and IP addresses, select Use original subnets and
IP addresses for VM guest OS on destination.
To create a new mapping configuration, select Add mappings for subnets and IP addresses for VM
guest OS on destination, then click Add Mapping. Enter a subnet or IP address in the Source field. In
the destination field, select DHCP to automatically select an IP and related configuration information if
DHCP is available on the selected client. Select Static to enter a specific subnet or IP address, subnet
mask, gateway, and DNS. Note that Subnet / IP Address, Subnet Mask, and Gateway are required
fields. If a subnet is entered as a source, a subnet must also be entered as a destination.
IP reconfiguration is skipped for virtual machines if a static IP is used but no suitable subnet mapping is
found, or if the source machine is powered off and there is more than one associated NIC. In a Windows
environment, if a virtual machine is DHCP only, then IP reconfiguration is skipped for that virtual machine.
In a Linux environment all addresses are assumed to be static, and only IP mapping will be available.
Destination Datastore - Set the destination datastore for a restore to an alternate ESX host or cluster.
VM Folder Destination - Enter the VM folder path on the destination datastore. Note that the directory
will be created if it does not exist. Use "/" as the root VM folder of the targeted datastore.
Advanced Options
61
Installation and User's Guide Create a VMware Restore Job Definition
Set the advanced job definition options:
Power on after recovery - Toggle the power state of a virtual machine after a recovery is performed.
Virtual machines are powered on in the order they are recovered, as set in the Source step. Note that
restored VM templates cannot be powered on after recovery.
Overwrite virtual machine - Enable to allow the restore job to overwrite the selected virtual machine. By
default this option is disabled.
Continue with restore even if it fails - Toggle the recovery of a resource in a series if the previous
resource recovery fails. If disabled, the Restore job stops if the recovery of a resource fails.
Rollback all the changes on failure - Enable to automatically clean up allocated resources as part of a
restore if the virtual machine recovery fails.
Allow to overwrite and force clean up of pending old sessions - Enable this option to allow a
scheduled session of a recovery job to force an existing pending session to clean up associated resources
so the new session can run. Disable this option to keep an existing test environment running without being
cleaned up.
Click Save to save the policy options.
6. To run the job now, click Restore. To schedule the job click Manage Job(s) and define a trigger for the job
definition.
7. Once the job completes successfully, select one of the following options from the Actions menu on the Jobs
Sessions or Active Clones sections on the Restore pane:
Cleanup destroys the virtual machine and cleans up all associated resources. Since this is a
temporary/testing virtual machine, all data is lost when the virtual machine is destroyed.
Move to Production (vMotion) migrates the virtual machine through vMotion to the Datastore and the
Virtual Network defined as the "Production" Network.
Clone (vMotion) migrates the virtual machine through vMotion to the Datastore and Virtual Network
defined as the "Test" network.
RELATED TOPICS:
l Create a Fenced Network Through a VMware Restore Job on page 63
l Create a VMware Backup Job Definition on page 56
l Add a VMware Provider on page 54
62
Installation and User's Guide Create a Fenced Network Through a VMware Restore Job
CONSIDERATIONS:
l When selecting virtual machines for recovery, recovery points offloaded to IBM Spectrum
Protect storage cannot be recovered in Test Mode.
l Recovery points that were offloaded to IBM Spectrum Protect storage cannot be used to
recover VMDKs.
4. Click Options. Set the job definition options.
5. Select Alternate ESX Host or Cluster, then select an alternate host or cluster from the vCenter list.
63
Installation and User's Guide Create a Fenced Network Through a VMware Restore Job
64
Installation and User's Guide Create a Fenced Network Through a VMware Restore Job
RELATED TOPICS:
l Create a VMware Backup Job Definition on page 56
l Add a VMware Provider on page 54
65
Installation and User's Guide Hyper-V
Hyper-V
The topics in the following section cover backing up and restoring Hyper-V resources.
66
Installation and User's Guide Hyper-V Overview
Hyper-V Overview
In order to protect content on a Hyper-V server, first register the server so that IBM Spectrum Protect Plus
recognizes it. Then create backup and restore job definitions, including SLA requirements such as job schedule
and retention policies.
RELATED TOPICS:
l Add a Hyper-V Provider on page 68
l Create a Hyper-V Backup Job Definition on page 70
l Create a Hyper-V Restore Job Definition on page 73
67
Installation and User's Guide Add a Hyper-V Provider
CONSIDERATIONS:
l Before registering the Hyper-V server in IBM Spectrum Protect Plus, the server must be
added to the /etc/hosts file on the IBM Spectrum Protect Plus appliance via command line.
If more than one Hyper-V server is set up in a cluster environment, all of the servers must
be added to /etc/hosts. When registering the cluster in IBM Spectrum Protect Plus,
register the Failover Cluster Manager.
l All Hyper-V servers, including cluster nodes, must have the Microsoft iSCSI initiator
Service running in their Services list. Set the service to Automatic so that it is available
when the machine boots.
l Add the user to the local administrator group on the Hyper-V server.
l Run the following command through a command prompt with "run as
administrator" enabled:
winrm s winrm/config/service @{AllowUnencrypted="true"}
l Verify that the AllowUnencrypted option is set to true through the following command:
winrm g winrm/config/service
4. Populate the fields in the Server Properties pane:
Hostname/IP
Enter the resolvable IP address or a resolvable path and machine name.
Use existing user
Enable to select a previously entered username and password for the provider.
Username
Enter your username for the provider.
Password
Enter your password for the provider.
68
Installation and User's Guide Add a Hyper-V Provider
Port
Enter the communications port of the provider you are adding. The typical default port is 5985.
5. Click Save. IBM Spectrum Protect Plus confirms a network connection, adds the provider to the database,
then catalogs the provider.
If a message appears indicating that the connection is unsuccessful, review your entries. If your entries are
correct and the connection is unsuccessful, contact a system administrator to review the connections.
Providers are automatically cataloged after registration. IBM Spectrum Protect Plus creates a high-level
Inventory job and catalogs the objects on the provider. To manually run an Inventory job, click Run Inventory
from the Backup pane.
NEXT STEPS:
l Assign user permissions to the hypervisor. See User Access on page 98.
RELATED TOPICS:
l Create a Hyper-V Backup Job Definition on page 70
l Create a Hyper-V Restore Job Definition on page 73
69
Installation and User's Guide Create a Hyper-V Backup Job Definition
l All Hyper-V servers, including cluster nodes, must have the Microsoft iSCSI initiator
Service running in their Services list. Set the service to Automatic so that it is available
when the machine boots.
l Before an IBM Spectrum Protect Plus user can perform backup and restore operations,
roles must be assigned to the user. Grant users access to hypervisors and backup and
restore operations through the User Access feature. Roles and associated permissions
are assigned during user account creation. See User Access on page 98 and Account on
page 96.
70
Installation and User's Guide Create a Hyper-V Backup Job Definition
71
Installation and User's Guide Create a Hyper-V Backup Job Definition
RELATED TOPICS:
l Create a Hyper-V Restore Job Definition on page 73
l Add a Hyper-V Provider on page 68
72
Installation and User's Guide Create a Hyper-V Restore Job Definition
73
Installation and User's Guide Create a Hyper-V Restore Job Definition
are assigned during user account creation. See User Access on page 98 and Account on
page 96.
CONSIDERATIONS:
l When selecting a destination for a Restore job definition, note that the destination must be
registered in IBM Spectrum Protect Plus. This includes Restore jobs that restore data to
original hosts or clusters.
4. To run the job now using default options, click Restore. To schedule the job to run using default options,
click Manage Job(s) and define a trigger for the job definition.
5. To edit options before creating the job definition, click Options. Set the job definition options.
Destination
Set the Hyper-V destination.
Original Hyper-V Host or Cluster - Select to restore to the original host or cluster.
Alternate Hyper-V Host or Cluster - Select to restore to a local destination different from the original
host or cluster, then select the alternate location from available resources.
Restore Type
Set the Hyper-V Restore job to run in Test, Production, or Clone mode by default. Once the job is created,
it can be run in Test, Production, or Clone mode through the Job Sessions pane.
Network Settings
Set the network settings for a restore to an alternate Hyper-V host or cluster:
From the Production and Test fields, set virtual networks for production and test restore job runs.
Destination network settings for production and test environments should be different locations to create
a fenced network, which keeps virtual machines used for testing from interfering with virtual machines
used for production. The networks associated with Test and Production will be utilized when the restore
job is run in the associated mode.
74
Installation and User's Guide Create a Hyper-V Restore Job Definition
Set an IP address or subnet mask for virtual machines to be re-purposed for development/testing or
disaster recovery use cases. Supported mapping types include IP to IP, IP to DHCP, and subnet to
subnet. Virtual machines containing multiple NICs are supported.
Destination Datastore
Set the destination datastore for a restore to an alternate Hyper-V host or cluster.
Advanced Options
Set the advanced job definition options:
Power on after recovery - Toggle the power state of a virtual machine after a recovery is performed.
Virtual machines are powered on in the order they are recovered, as set in the Source step. Note that
restored VM templates cannot be powered on after recovery.
Overwrite virtual machine - Enable to allow the restore job to overwrite the selected virtual machine. By
default this option is disabled.
Continue with restore even if it fails - Toggle the recovery of a resource in a series if the previous
resource recovery fails. If disabled, the Restore job stops if the recovery of a resource fails.
Rollback all the changes on failure - Enable to automatically clean up allocated resources as part of a
restore if the virtual machine recovery fails.
Allow to overwrite and force clean up of pending old sessions - Enable this option to allow a
scheduled session of a recovery job to force an existing pending session to clean up associated resources
so the new session can run. Disable this option to keep an existing test environment running without being
cleaned up.
Click Save to save the policy options.
6. To run the job now, click Restore. To schedule the job click Manage Job(s) and define a trigger for the job
definition.
7. Once the job completes successfully, select one of the following options from the Actions menu on the Jobs
Sessions or Active Clones sections on the Restore pane:
Cleanup destroys the virtual machine and cleans up all associated resources. Since this is a
temporary/testing virtual machine, all data is lost when the virtual machine is destroyed.
Clone (migrate) migrates the virtual machine to the Datastore and Virtual Network defined as the "Test"
network.
RELATED TOPICS:
l Create a Hyper-V Backup Job Definition on page 70
l Add a Hyper-V Provider on page 68
75
Installation and User's Guide Restore a File
Restore a File
Recover files from a snapshot created through IBM Spectrum Protect Plus Backup jobs. Files can be restored to
their original or alternate location.
GENERAL CONSIDERATIONS:
l Encrypted Windows file systems are not supported for file indexing or file restore.
l For a file restore to complete successfully, ensure that the user on the target machine has
the necessary ownership permissions of the file being restored. If a file was created by a
user that differs from the user restoring the file based on their Windows security
credentials, the file restore will fail.
l File indexing and file restore are not supported from recovery points that were offloaded to
IBM Spectrum Protect storage.
l When restoring files in a Resilient File System (ReFS) environment, restores from newer
versions of Windows Server to earlier versions are not supported. For example, restoring
a file from Windows Server 2016 to Windows Server 2012 R2.
l Use an NTP server to synchronize the time zones across IBM Spectrum Protect Plus
resources in your environment, such as the IBM Spectrum Protect Plus appliance,
storage arrays, hypervisors and application servers . If the clocks on the various systems
are significantly out of sync, you may experience errors during application registration,
metadata cataloging, Inventory, Backup, or Restore/File Restore jobs. For more
information about identifying and resolving timer drift, see the following VMware
knowledge base article: Time in virtual machine drifts due to hardware timer drift.
HYPER-V CONSIDERATIONS:
l Only volumes on SCSI disks are eligible for file cataloging and file restore.
76
Installation and User's Guide Restore a File
LINUX CONSIDERATIONS:
l If data resides on LVM volumes, the lvm2-lvmetad service must be disabled as it can
interfere with IBM Spectrum Protect Plus's ability to mount and resignature volume group
snapshots/clones. To disable:
o systemctl stop lvm2-lvmetad
o systemctl disable lvm2-lvmetad
o Edit the file /etc/lvm/lvm.conf and set use_lvmetad = 0
l If data resides on XFS file systems and the version of xfsprogs is between 3.2.0 and 4.1.9,
the file restore can fail due to a known issue in xfsprogs that causes corruption of a
clone/snapshot file system when its UUID is modified. To resolve this issue, update
xfsprogs to version 4.2.0 or above. For more information, see https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=782012.
To restore a file:
1. From the navigation menu, click File Restore.
2. Search for a file to restore. Use filters to fine-tune your selection across specific virtual machines. See
Search Guidelines on page 77.
3. To restore the file using default options, click Restore. The file is restored to its original location.
4. To edit options before restoring the file, click Options. Set the file restore options.
Overwrite existing files/folder
Select to replace the existing file or folder with the restored file or folder.
Destination
Restore the file to its original location by selecting Restore file(s) to original location. Select Restore
file(s) to alternative location to restore to a local destination different from the original location, then
select the alternate location from available resources through the navigation tree or through the search
function.
Note: If restoring to an alternate location, credentials must be established for the alternate virtual
machine through the Guest OS Username and Guest OS Password option within the backup job
definition.
Enter the VM folder path on the alternate destination in the Destination Folder field. Note that the
directory will be created if it does not exist.
Click Save to save the options.
5. To restore the file using defined options, click Restore.
Search Guidelines
77
Installation and User's Guide Restore a File
l Enter a character string to find objects with a name that exactly matches the character string. Searching for
the term string.txt will return the exact match, string.txt.
l Apply wildcards as needed.
l Regular Expression search entries are supported. For more information see https://docs.microsoft.com/en-
us/sql/relational-databases/scripting/search-text-with-regular-expressions.
A wildcard is a character that you can substitute for zero or more unspecified characters when searching text.
Position wildcards at the beginning, middle, or end of a string, and combine them within a string.
l Match a character string with an asterisk, which represents a variable string of zero or more characters:
string* searches for terms like string, strings, or stringency
str*ing searches for terms like string, straying, or straightening
*string searches for terms like string or shoestring
l Match a single character with a question mark:
string? searches for terms like strings, stringy, or string1
st??ring searches for terms like starring or steering
???string searches for terms like hamstring or bowstring
You can use multiple asterisk wildcards in a single text string, though this might considerably slow down a large
search.
The search functionality supports special characters, which must be escaped with a \ before the character. The
following special characters are supported: + - & | ! ( ) { } [ ] ^ " ~ * ? : \
To search for a file named string[2].txt, enter the following: string\[2\].txt.
RELATED TOPICS:
l File Indexing and Restore Requirements on page 21
l Create a VMware Backup Job Definition on page 56
l Create a VMware Restore Job Definition on page 59
78
Installation and User's Guide Report
Report
The topics in the following section cover running and customizing reports, as well as individual report details.
79
Installation and User's Guide Reports Overview
Reports Overview
IBM Spectrum Protect Plus provides a number of predefined reports, which you can tailor to meet your specific
reporting requirements. Reports are based on the data collected by the most recently run Inventory job, and you
can generate reports after all cataloging jobs and subsequent database condense jobs complete. Click Report
from the navigation menu to display the Report pane. You can run reports with predefined default parameters or
run and save customized reports driven by custom parameters.
Reports include interactive elements, such as searching for individual values within a report, vertical scrolling,
and column sorting.
RELATED TOPICS:
l Run, Save, and Schedule a Report on page 81
l User Access on page 98
l Backup Storage Utilization Reports on page 83
l Protection Reports on page 84
l System Reports on page 86
l VM Environment Reports on page 87
80
Installation and User's Guide Run, Save, and Schedule a Report
To run a report:
1. From the navigation menu, click Report.
2. From the Report pane, expand a report type, then select a report to run.
3. To run the report using default parameters, click Run. The report runs and displays on the Report pane.
4. To edit parameters before running the report, click Options . Parameters are unique to each report. Set
the report parameters, then click Run.
Perform the following steps to create a report with customized parameters. Select a predefined report, set
custom parameters, and save the report with a customized name to run on demand or create a schedule to run
the report as defined by the parameters of the schedule.
4. Enter a Name and a Description for the customized report, then set the associated report parameters.
5. Click Save. The customized reports display nested under the source report on the Report pane.
Perform the following steps to schedule a report to run at a determined interval and time.
To schedule a report:
1. From the navigation menu, click Report.
2. From the Report pane, expand a report type, then select a report to schedule.
81
Installation and User's Guide Run, Save, and Schedule a Report
4. Enter a Name and a Description for the report, then set the associated report parameters.
5. Click Schedule Report to expand the schedule editor. Define a trigger for the report.
RELATED TOPICS:
l Reports Overview on page 80
l Backup Storage Utilization Reports on page 83
l Protection Reports on page 84
l System Reports on page 86
l VM Environment Reports on page 87
82
Installation and User's Guide Backup Storage Utilization Reports
To view Backup Storage Utilization reports, click Report from the navigation menu, then expand the Backup
Storage Utilization heading in the Report pane. The following reports are available:
RELATED TOPICS:
l Run, Save, and Schedule a Report on page 81
l Reports Overview on page 80
83
Installation and User's Guide Protection Reports
Protection Reports
Protection reports display the protection status of your resources, and help ensure your data is protected through
user-defined recovery point objective parameters.
To view Protection reports, click Report from the navigation menu, then expand the Protection heading in the
Report pane. The following reports are available:
84
Installation and User's Guide Protection Reports
RELATED TOPICS:
l Run, Save, and Schedule a Report on page 81
l Reports Overview on page 80
85
Installation and User's Guide System Reports
System Reports
System reports offer an in-depth view of the status of your IBM Spectrum Protect Plus configuration, including
storage system information, jobs, and their status.
To view System reports, click Report from the navigation menu, then expand the System heading in the Report
pane. The following reports are available:
Configuration Report
Review the configuration of the Hypervisor providers and Backup Storage available to IBM Spectrum Protect
Plus.
Use the report options to filter the configuration types to display including Backup Storage, Hypervisors, or all.
The report displays the name of the resource, its type, associated site, and the SSL connection status.
Job Report
Review the available jobs in your IBM Spectrum Protect Plus configuration. Run the Job report to view jobs by
type, their average runtime, and their successful run percentage.
Use the report options to filter the job types to display, as well as display jobs that have been successfully run
over a period of time. The Summary View lists jobs by type along with the number of times a job session was run,
completed, or failed. Job sessions listed as Other are jobs that have been aborted, partially run, are currently
running, skipped, or stopped.
In the Detail View of the report, click the plus icon next to an associated job to view further job details such as
virtual machines protected by a Backup job, the average runtime, and the next scheduled runtime if the job is
scheduled.
RELATED TOPICS:
l Run, Save, and Schedule a Report on page 81
l Reports Overview on page 80
86
Installation and User's Guide VM Environment Reports
VM Environment Reports
VM Environment reports display the storage utilization and status of your virtual machines and datastores.
To view VM Environment reports, click Report from the navigation menu, then expand the VM Environment
heading in the Report pane. The following reports are available:
VM Datastores Report
Review the storage utilization of your datastores, including the total free space, provisioned space, and
capacities. Run the VM Datastores report to view your datastores, the number of virtual machines on the
datastores, and the percentage of space available.
Use the report options to filter by Hypervisor type and specific Hypervisors to display. The Detail View Filter
controls the datastores to display in the Detail View based on the percentage of space used. Use the Show Only
Orphaned Datastores filter to view datastores that do not have any virtual machines assigned to them, or virtual
machines that are in an inaccessible state. The reason for a datastores orphaned state displays in the Datastore
field in the Detail View.
VM LUNs Report
Review the storage utilization of your VM LUNs. Run the VM LUNs report to view your LUNs, associated
datastores, capacities, and storage vendors.
Use the report options to filter by Hypervisor type and specific Hypervisors to display. Use the Show Only
Orphaned Datastores filter to view datastores that do not have any virtual machines assigned to them, or virtual
machines that are in an inaccessible state.
VM Sprawl Report
87
Installation and User's Guide VM Environment Reports
Review the status of your virtual machines, including virtual machines that are powered off, powered on, or
suspended. Run the VM Sprawl report to view unused virtual machines, the date and time they were powered
off, and virtual machine templates.
Use the report options to filter by Hypervisor type and specific Hypervisors to display. The report can be further
filtered by power state over time, including Days Since Last Powered Off and Days Since Last Suspended.
The Quick View section displays a pie chart of used and free space on your virtual machines based on their
power state. Use the Hypervisor parameter to display virtual machines on all hosts or a specific host. The Detail
Views are categorized by power state, as well as a separate table for VM templates.
VM Storage Report
Review your virtual machines and associated datastores through the VM Storage report. View associated
datastores and provisioned space of the datastores.
Use the report options to filter by Hypervisor type and specific Hypervisors to display. The Detail View displays
associated datastores and the amount of space on the datastore allocated for virtual disk files.
RELATED TOPICS:
l Run, Save, and Schedule a Report on page 81
l Reports Overview on page 80
88
Installation and User's Guide System
System
The topics in the following section cover creating and configuring accounts, viewing scheduled jobs and audit
logs, and monitoring the status of your VADP proxies.
89
Installation and User's Guide System Overview
System Overview
Configure and monitor your IBM Spectrum Protect Plus environment through the System menu. Create and
configure accounts, view scheduled jobs and audit logs, and monitor the status of your VADP proxies.
RELATED TOPICS:
l Job Monitoring on page 91
l Audit Logs on page 92
l VADP Proxy on page 93
l Account on page 96
l LDAP / SMTP on page 101
90
Installation and User's Guide Job Monitoring
Job Monitoring
From the Job Monitoring pane you can run a job session on demand, pause or cancel a running job, and hold all
future scheduled instances of a job from running until you are ready for the job to proceed.
91
Installation and User's Guide Audit Logs
Audit Logs
Audit logs can be viewed through the System menu. The Audit Log window displays a log of actions performed in
IBM Spectrum Protect Plus, along with the user performing the action and a description of the action. Audit logs
are searchable by user.
92
Installation and User's Guide VADP Proxy
VADP Proxy
In IBM Spectrum Protect Plus, running VMware Backup jobs through VADP can be taxing on your system
resources. By creating VMware Backup job proxies, you enable load sharing and load balancing for those jobs in
Linux environments.
Note that the first time a given job is run, the proxies do not take effect because VM clone technology is used. But
the second and subsequent times the job is run, change block tracking technology is used and the proxies are
employed.
If proxies exist, the entire processing load is shifted off the IBM Spectrum Protect Plus host machine and onto the
proxies, else the entire load stays on the IBM Spectrum Protect Plus host. Within a Backup job, the processing
load for any single VM is shifted to a single proxy machine; multiple VMs are shifted to multiple proxies if
available.
If a proxy server goes down or is otherwise disabled before the start of the job, the other proxies (or if there are
no other proxies, the IBM Spectrum Protect Plus host) take over and the job completes. If a proxy server
becomes disabled during the running of a job, there is a possibility that the job will fail.
Review the following for more information about creating VADP proxies.
System Requirements:
This feature has been tested only for SUSE Linux Enterprise Server and Red Hat environments. It is supported
only in 64-bit quad core configurations with a minimum kernel of 2.6.32.
A minimum of 8 GB of RAM is required (16 GB recommended), along with 60 GB of disk space.
Each proxy must have a fully qualified domain name.
Port 8080 on the VADP proxy server must be open when the proxy server firewall is enabled. If the port is not
open, VADP Backups will run on local vmdkbackup instead of the VADP proxy server.
Installer Notes:
93
Installation and User's Guide VADP Proxy
The IBM Spectrum Protect Plus version of the VADP Proxy installer includes Virtual Disk Development Kit
(VDDK) version 5.5.5. This version of the VADP proxy installer provides the following functionality:
l External VADP Proxy support with vSphere 6.5
l External VADP Proxy support for Hot Add operations, which provides higher performance for VADP
Backups.
To create a proxy:
For each proxy:
1. Power up a physical or virtual Linux machine that meets the system requirements defined above, and is on
the same network as the host IBM Spectrum Protect Plus machine.
2. Copy the VADP Proxy installation program to the local proxy machine.
3. Log in to the proxy machine as root, or as a user capable of running “sudo” commands. The initial root
password is sppDP758.
4. On the proxy machine, open a terminal. Enter the following command to install the proxy server software:
./vmdkbackup-x.x-installer.bin
The Setup wizard opens.
Note: Alternatively you can run the installer using command line protocol by entering the following
command: ./vmdkbackup-x.x-installer.bin --mode text
5. Follow the steps in the Setup wizard to configure your proxy server and connect to the IBM Spectrum
Protect Plus host.
a. When prompted for the installation directory, select /opt/IBM/SPP.
b. When prompted for the IBM Spectrum Protect Plus Discovery Server IP, enter the IP Address of the
IBM Spectrum Protect Plus host.
6. Click Finish when the Setup wizard indicates it has completed. After installation, note that your new
installation directory includes a subdirectory called /log, which is the job log location.
After successful installation, the service ecxvadp is started on the proxy machine. A log file
ecxvadp.log is generated in /opt/IBM/SPP/logs directory.
Repeat the previous steps for each proxy you want to create.
NEXT STEPS:
l Run the VMware Backup job. The use of the proxies are indicated in the job log by a log
message similar to the following:
94
Installation and User's Guide VADP Proxy
RELATED TOPICS:
l Create a VMware Backup Job Definition on page 56
95
Installation and User's Guide Account
Account
To enable a user to log on to IBM Spectrum Protect Plus and use its functions, an administrator must first add the
user to IBM Spectrum Protect Plus. From the Account pane, add new users, delete existing users, change user
passwords, and assign user roles.
Role-based access control allows you to set the resources and permissions available to IBM Spectrum Protect
Plus accounts. Through role-based access control, administrators can tailor IBM Spectrum Protect Plus for
individual users, giving them access to the features and providers they need. Roles contain pre-defined sets of
permissions, and are assigned during user account creation. Users are then associated with hypervisors,
SLA policies, and reports through the User Access option, which is available throughout the IBM Spectrum
Protect Plus interface. Resources and providers assigned to users through permissions will be available upon
their next log in.
The following roles are available:
Administrator - The Administrator role provides access to all resources and privileges, which is comparable to
the native administrator, or Super User role. No additional resource-specific privileges need to be granted for an
Administrator. An Administrator can create new users, as well as edit, delete, and change the passwords of
other users, with the exception of the Super User. The Administrator role can only be assigned to native users.
VM Administrator - The VM Administrator role allows a user to register and modify hypervisor resources and
modify hypervisor resources delegated by an Administrator, as well as associate hypervisors to assigned SLA
policies, perform backup and restore operations, and run and schedule reports delegated by an Administrator.
Access to resources available to a VM Administrator must be manually applied by an Administrator through the
User Access option on associated resource screens.
96
Installation and User's Guide Account
1. From the navigation menu, expand System, then click Account.
2. Click Add . The Account Properties pane displays.
3. Confirm the deletion. The user is deleted.
RELATED TOPICS:
l User Access on page 98
l LDAP / SMTP on page 101
l Start IBM Spectrum Protect Plus on page 31
97
Installation and User's Guide User Access
User Access
Role-based access control allows you to set the resources and permissions available to IBM Spectrum Protect
Plus accounts. Through role-based access control, administrators can tailor IBM Spectrum Protect Plus for
individual users, giving them access to the features and providers they need. Roles contain pre-defined sets of
permissions, and are assigned during user account creation. Users are then associated with hypervisors,
SLA policies, and reports through the User Access option, which is available throughout the IBM Spectrum
Protect Plus interface. Resources and providers assigned to users through permissions will be available upon
their next log in.
The following roles are available:
Administrator - The Administrator role provides access to all resources and privileges, which is comparable to
the native administrator, or Super User role. No additional resource-specific privileges need to be granted for an
Administrator. An Administrator can create new users, as well as edit, delete, and change the passwords of
other users, with the exception of the Super User. The Administrator role can only be assigned to native users.
VM Administrator - The VM Administrator role allows a user to register and modify hypervisor resources and
modify hypervisor resources delegated by an Administrator, as well as associate hypervisors to assigned SLA
policies, perform backup and restore operations, and run and schedule reports delegated by an Administrator.
Access to resources available to a VM Administrator must be manually applied by an Administrator through the
User Access option on associated resource screens.
3. Select the user Type. If assigning privileges to a Native User, create the user's name and password. If
assigning privileges to an LDAP Group, select the LDAP group.
98
Installation and User's Guide User Access
4. Select a user from the Add User section. Click Add.
Upon next login, the user will have access to the assigned hypervisor resources.
4. Select a user from the Add User section. Click Add.
Upon next login, the user will have access to the assigned SLA Policy.
4. Select a user from the Account column, then select roles to apply to the user from the Roles column.
5. Click Add. The permissions are assigned to the user.
Upon next login, the user will have access to the assigned report.
99
Installation and User's Guide User Access
RELATED TOPICS:
l Account on page 96
l LDAP / SMTP on page 101
l Start IBM Spectrum Protect Plus on page 31
100
Installation and User's Guide LDAP / SMTP
LDAP / SMTP
System Administrators can add LDAP and SMTP providers to IBM Spectrum Protect Plus through the LDAP /
SMTP pane. Adding an LDAP provider enables LDAP users to be provisioned and access IBM Spectrum
Protect Plus using LDAP usernames and passwords. Adding an SMTP server enables email communications to
be sent from IBM Spectrum Protect Plus. Note that only one SMTP server can be associated with IBM Spectrum
Protect Plus.
To register an LDAP provider:
1. From the navigation menu, expand System, then click LDAP / SMTP.
2. From the LDAP table, click Add . The LDAP Settings pane displays.
3. Populate the fields:
Host Address
The IP address or resolvable logical node name of the LDAP server.
Port
The port on which the LDAP server is listening. The typical default port is 389 for non SSL connections or
636 for SSL connections.
SSL
Enable to establish a secure connection to the LDAP server.
Username
The Bind Distinguished Name used for authenticating the connection to the LDAP server. IBM Spectrum
Protect Plus supports simple bind.
Password
The password associated with the Bind Distinguished Name.
Base DN
The location where users and groups can be found.
User Filter
A filter to select only those users under the Base DN that match certain criteria. An example of a valid
default user filter is cn={0}.
To enable authentication using the sAMAccountName Windows user naming attribute, set the User Filter
to samaccountname={0}.
To enable authentication using an e-mail address associated with LDAP, set the User Filter to mail={0}.
Note that this entry also controls the type of user name that appears in IBM Spectrum Protect Plus display
of users.
User RDN
101
Installation and User's Guide LDAP / SMTP
The relative distinguished path for the user. Specify the path where user records can be found. An
example of a valid default RDN is:
cn=Users
Group RDN
The relative distinguished path for the group. Specify the path where group records can be found if the
group is at a different level than the user path.
4. Click Save. IBM Spectrum Protect Plus first confirms a network connection and then adds the provider to
the database.
If a message appears indicating that the connection is unsuccessful, review your entries. If your entries are
correct and the connection is unsuccessful, contact a system administrator to review the connections.
3. Populate the fields:
Host Address
A resolvable IP address or a resolvable path and machine name.
Port
The communications port of the provider you are adding. The typical default port is 25 for non SSL
connections or 443 for SSL connections.
Username
The name used to access the provider.
Password
The password associated with the username.
Timeout
Set the email timeout value in milliseconds.
From Address
Set the address to be associated with email communications from IBM Spectrum Protect Plus.
Subject Prefix
Set a prefix to add to the email subject lines sent from IBM Spectrum Protect Plus.
4. Click Save. IBM Spectrum Protect Plus first confirms a network connection and then adds the provider to
the database.
If a message appears indicating that the connection is unsuccessful, review your entries. If your entries are
correct and the connection is unsuccessful, contact a system administrator to review the connections.
102
Installation and User's Guide LDAP / SMTP
RELATED TOPICS:
l Account on page 96
103
Installation and User's Guide Maintenance
Maintenance
The topics in the following section cover maintenance information including logging on to the virtual appliance
and collecting logs for troubleshooting.
104
Installation and User's Guide Maintenance Overview
Maintenance Overview
In most cases, IBM Spectrum Protect Plus is installed on a virtual appliance. The virtual appliance contains the
application and the Inventory.
System Administrators can perform maintenance tasks on the IBM Spectrum Protect Plus application. Note that
a System Administrator is usually a senior-level user who designed or implemented the vSphere and ESX
infrastructure, or a user with an understanding of IBM Spectrum Protect Plus, VMware, and Linux command-line
usage. Maintenance tasks are performed in vSphere Client, through the IBM Spectrum Protect Plus command-
line, or through a web-base management console.
Maintenance tasks include collecting logs, updating the application, and reviewing the configuration of the virtual
appliance.
Note: Customers of IBM Spectrum Protect Plus are not encouraged to update any of the underlying
components of IBM Spectrum Protect Plus themselves. Customers should not update the operating system,
ZFS, or any other infrastructure component outside of the IBM Spectrum Protect Plus update packages.
Infrastructure updates are managed by IBM’s update facilities. The Administrator Console serves as the primary
means for updatingIBM Spectrum Protect Plus features and underlying infrastructure components including the
operating system and filesystem. ZFS update packages are also provided for vSnap standalone instances.
RELATED TOPICS:
l Manage the Administrative Console on page 106
l Maintenance Job on page 112
l Log On to the Virtual Appliance on page 113
l Collect Logs for Troubleshooting on page 114
l Backup and Restore the Catalog on page 115
l Data Disk Expansion on page 116
105
Installation and User's Guide Manage the Administrative Console
RELATED TOPICS:
l Update IBM Spectrum Protect Plus on page 108
l Upload an SSL Certificate on page 107
l Backup and Restore the Catalog on page 115
106
Installation and User's Guide Upload an SSL Certificate
To upload a certificate:
1. Contact your network administrator for the name of the certificate to export.
2. From a supported browser, export the certificate to your computer. Make note of the location of the
certificate on your computer. The process of exporting certificates varies based on your browser. See
Related Topics.
3. From a supported browser, enter the following URL:
https://<HOSTNAME>:8090/
where <HOSTNAME> is the IP address of the virtual machine where the application is deployed.
4. In the login window, select System from the Authentication Type drop-down menu. Enter your password
to access the Administration Console. The default password is sppadLG235.
5. Click Manage your certificates. Click Browse, browse for the certificate file on your computer, then click
Upload SSL Certificate.
6. Reboot the virtual machine where the application is deployed.
RELATED TOPICS:
l Microsoft Knowledge Base Article 179380: How to Remove, Import, and Export Digital
Certificates
l Firefox Knowledge Base Article: Advanced settings for accessibility, browsing, system
defaults, network, updates, and encryption
l Google Chrome Knowledge Base Article: Advanced security settings
107
Installation and User's Guide Update IBM Spectrum Protect Plus
l Customers of IBM Spectrum Protect Plus are not encouraged to update any of the
underlying components of IBM Spectrum Protect Plus themselves. Customers should not
update the operating system or any other infrastructure component outside of the IBM
Spectrum Protect Plus update packages. Infrastructure updates are managed by IBM’s
update facilities. The Administrator Console serves as the primary means for updating
IBM Spectrum Protect Plus features and underlying infrastructure components including
the operating system and filesystem.
108
Installation and User's Guide Update IBM Spectrum Protect Plus
1. From a machine with internet access, download the necessary update file. IBM Spectrum Protect Plus
updates are delivered as ISO files.
2. From a supported web browser, access the Administrative Console at the following address:
https://<HOSTNAME>:8090/
where <HOSTNAME> is the IP address of the virtual machine where the application is deployed.
3. In the login window, select System from the Authentication Type drop-down menu. Enter your password
to access the Administration Console. The default password is sppadLG235.
4. Click Manage updates.
5. Click Browse to browse for the spp_10.1.0_patch.iso file to upload to the appliance, then click Upload
Update Image. The update process begins once the update image has been uploaded to the appliance.
6. After the update completes, navigate to the Perform System Actions page on the Administrative Console
to restart the appliance.
HTML content from previous versions of IBM Spectrum Protect Plus may be stored in your browser's cache.
Clear your browser's cache before logging in to an updated version of IBM Spectrum Protect Plus to ensure
you are viewing the latest content changes.
109
Installation and User's Guide Update IBM Spectrum Protect Plus
./vmdkbackup-x.x-installer.bin
The Setup wizard opens.
Note: Alternatively you can run the installer using command line protocol by entering the following
command from the directory where the file was downloaded: ./vmdkbackup-x.x-
installer.bin --mode text
8. Follow the steps in the Setup wizard to configure your proxy server and connect to the IBM Spectrum
Protect Plus host.
a. When prompted for the installation directory, select /opt/IBM/SPP.
b. When prompted for the IBM Spectrum Protect Plus Discovery Server IP, enter the IP Address of the
IBM Spectrum Protect Plus host.
110
Installation and User's Guide Update IBM Spectrum Protect Plus
9. Click Finish when the Setup wizard indicates it has completed.
10. On the Job Monitoring page in IBM Spectrum Protect Plus, select Release Schedule from the Actions list
for the jobs that are utilizing the VADP proxy.
RELATED TOPICS:
l Install IBM Spectrum Protect Plus as a VMware Virtual Appliance on page 25
l Install IBM Spectrum Protect Plus as a Hyper-V Virtual Appliance on page 28
l Manage the Administrative Console on page 106
111
Installation and User's Guide Maintenance Job
Maintenance Job
The Maintenance job removes resources and associated objects created by IBM Spectrum Protect Plus when a
job in a pending state is deleted. The cleanup procedure reclaims space on your storage devices, cleans up your
IBM Spectrum Protect Plus catalog, and removes related snapshots.The Maintenance job also removes
cataloged data associated with deleted jobs. By default, the Maintenance job runs once a day. The job cannot be
deleted.
The Maintenance job only performs cleanup operations once a job in a pending state is deleted. All logs
associated with the deleted job are removed from IBM Spectrum Protect Plus, so it is advised to download job
logs before the Maintenance job's next run. The job can be stopped and resumed; all pending operations set to
occur before the job was stopped will resume upon the next job run.
After deleting a pending job, all associated copy data, including recovery points, are deleted. The Maintenance
job removes all VM Copies and Primary copies associated with deleted VMware Backup and Restore jobs. Once
the Maintenance job completes, data that was copied as part of the backup job cannot be recovered. Any data
related to the deleted job will not be recoverable.
RELATED TOPICS:
l Operations Overview on page 51
l Maintenance Overview on page 105
112
Installation and User's Guide Log On to the Virtual Appliance
To log off, enter exit.
To log off, enter exit.
113
Installation and User's Guide Collect Logs for Troubleshooting
To collect logs for troubleshooting:
1. Click the User icon, then select Download Logs.
2. Select a location to save the zip file.
Note: The following logs are added to the zip file and saved to your local machine: mongo, rabbitmq, and
virgo.
NEXT STEPS:
l Contact Technical Support to inform them that you have created a log collection file for
troubleshooting. Send the zipped log collection file to Technical Support.
RELATED TOPICS:
l Manage the Administrative Console on page 106
114
Installation and User's Guide Backup and Restore the Catalog
To manage your IBM Spectrum Protect Plus catalog through the Catalog Manager:
1. From a supported browser, enter the following URL:
https://<HOSTNAME>:8090/
where <HOSTNAME> is the IP address of the virtual machine where the application is deployed.
2. In the login window, select System from the Authentication Type drop-down menu. Enter your password
to access the Administration Console. The default password is sppadLG235.
3. Click Get Started. Click Menu, then select Catalog Manager.
4. Select Backup Catalog or Restore Catalog.
l Backup Catalog: In the Directory field, enter the backup destination on the IBM Spectrum Protect Plus
host. Ensure the destination volume exists and that there is enough room on the destination volume for the
Catalog backup. Click Backup to begin the Catalog backup.
Backup Catalog considerations: IBM Spectrum Protect Plus will be stopped while the Catalog is being backed
up. The IBM Spectrum Protect Plus user interface will not be accessible, and all running jobs will be aborted.
l Restore Catalog: From the list provided, determine the Restore Point associated with the Catalog Backup
you want to recover. Click Restore to begin the Catalog restore.
Restore Catalog considerations: IBM Spectrum Protect Plus will be stopped while the Catalog is being
restore. The IBM Spectrum Protect Plus user interface will not be accessible, and all running jobs will be
aborted. All IBM Spectrum Protect Plus snapshots created after the Catalog backup was run will be lost.
RELATED TOPICS:
l Manage the Administrative Console on page 106
115
Installation and User's Guide Data Disk Expansion
Add the storage capacity from the new disk to an existing IBM Spectrum Protect Plus volume:
This section will guide you through adding storage capacity from the new disk to an existing IBM Spectrum
Protect Plus volume. For users that are simply adding an additional volume to their appliance, this section does
not need to be completed. First, set up the filesystem for the new disk to be LVM type.
1. Follow the commands below on the console. The commands set up a partition for the new disk and set the
partition to be of type Linux LVM. The output of fdisk shows you the same.
116
Installation and User's Guide Data Disk Expansion
Device contains neither a valid DOS partition table, nor Sun, SGI or
OSF disklabel
Building a new DOS disklabel with disk identifier 0xb1b293df.
Changes will remain in memory only, until you decide to write them.
After that, of course, the previous content won't be recoverable.
Warning: invalid flag 0x0000 of partition table 4 will be corrected by
w(rite)
WARNING: DOS-compatible mode is deprecated. It's strongly recommended
to
switch off the mode (command 'c') and change display units to
sectors (command 'u').
p [Selects the primary partition]
117
Installation and User's Guide Data Disk Expansion
118
Installation and User's Guide Data Disk Expansion
11. After running the above, the size of the /data volume displays as the following:
[root@localhost ~]# df -h
Filesystem Size Used Avail Use% Mounted on
/dev/sda3 14G 2.6G 11G 20% /
tmpfs 16G 0 16G 0% /dev/shm
/dev/sda1 240M 40M 188M 18% /boot
/dev/mapper/data_vg-data
118G 6.4G 104G 6% /data
/dev/mapper/data2_vg-data2
246G 428M 234G 1% /data2
119
Installation and User's Guide Data Disk Expansion
The data disks have quotas in place to ensure disks are not filled to capacity. When a data disk is expanded, set a
new disk quota hard limit, which is generally 90% of the total capacity. Through the edquota –u mongod
command, change the values under “blocks hard” to your desired quota.
RELATED TOPICS:
l Log On to the Virtual Appliance on page 113
l Manage the Administrative Console on page 106
120
Installation and User's Guide Acronyms
Distinguished Name
Acronyms DNS
Domain Name Server
A E
AD
EULA
Active Directory
End User License Agreement
API
Application Programming Interface F
FCM
B
FlashCopy Manager
B
FQDN
Bytes
Fully Qualified Domain Name
C G
CBT
GB
Changed Block Tracking
Gigabytes
CIDR
GUI
Classless Inter-Domain Routing
Graphical User Interface
CIFS
Common Internet File System H
CPU HTTP
Central Processing Unit Hypertext Transfer Protocol
CSV I
Comma-Separated Values
IP
CsvFS
Internet Protocol
Clustered Shared Volume File System
IDE
D Integrated Development Environment
DHCP iSCSI
Dynamic Host Configuration Protocol Internet Small Computer System Interface
DN K
121
Installation and User's Guide Acronyms
KB OS
Kilobytes Operating System
KDC OVA
Key Distribution Center Open Virtual Appliance
OVF
L
Open Virtualization Format
LDAP
Lightweight Directory Access Protocol P
LUN PDF
Logical Unit Number Portable Document Format
LVM
R
Logical Volume Manager
RAID
M Redundant Array of Independent Disks
MB RAM
Megabytes Random Access Memory
RBAC
N
Role-based access control
NFS
RDBMS
Network File System
Relational Database Management System
NMTUI
RDM
NetworkManager Text User Interface
Raw Device Mapping
NTFS
RDN
New Technology File System
Relative Distinguished Name
NTLM
ReFS
NT LAN Manager
Resilient File System
NTP
REST
Network Time Protocol
Representational State Transfer
O
S
OSSV
SAN
Open Systems SnapVault
122
Installation and User's Guide Acronyms
Storage Area Network Uniform Resource Locator
SCSI UUID
Small Computer System Interface Universally Unique Identifier
SFTP
V
Secure File Transfer Protocol
VADP
SMTP
VMware vStorage API for Data Protection
Simple Mail Transfer Protocol
VASA
SNMP
vSphere API for Storage Awareness
Simple Network Management Protocol
VDDK
SQL
Virtual Disk Development Kit
Structured Query Language
VHDX
SSD
Hyper-V virtual hard disk
Solid State Drive
VM
SSH
Virtual Machine
Secure Shell
VMCLI
SSL
VMware vSphere Power Command Line Interface
Secure Sockets Layer
VMDK
SVC
Virtual Machine Disk
SAN Volume Controller
VMFS
SVM
Virtual Machine File System
Storage Virtual Machine
VVOL
T Virtual Volume
TB
W
Terabytes
WinRM
U Windows Remote Management
UI
X
User Interface
XFS
URL
X File System
123
Notices
This information was developed for products and services offered in the US. This
material might be available from IBM in other languages. However, you may be
required to own a copy of the product or product version in that language in order
to access it.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at www.ibm.com/legal/copytrade.shtml.
Linear Tape-Open, LTO, and Ultrium are trademarks of HP, IBM Corp. and
Quantum in the U.S. and other countries.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
VMware, VMware vCenter Server, and VMware vSphere are registered trademarks
or trademarks of VMware, Inc. or its subsidiaries in the United States and/or other
jurisdictions.
Permissions for the use of these publications are granted subject to the following
terms and conditions.
Applicability
These terms and conditions are in addition to any terms of use for the IBM
website.
Personal use
You may reproduce these publications for your personal, noncommercial
use provided that all proprietary notices are preserved. You may not
distribute, display or make derivative work of these publications, or any
portion thereof, without the express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within
your enterprise provided that all proprietary notices are preserved. You
may not make derivative works of these publications, or reproduce,
distribute or display these publications or any portion thereof outside your
enterprise, without the express consent of IBM.
Rights Except as expressly granted in this permission, no other permissions,
licenses or rights are granted, either express or implied, to the publications
or any information, data, software or other intellectual property contained
therein.
IBM reserves the right to withdraw the permissions granted herein
whenever, in its discretion, the use of the publications is detrimental to its
interest or, as determined by IBM, the above instructions are not being
properly followed.
You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United
States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE
PUBLICATIONS. THE PUBLICATIONS ARE PROVIDED "AS-IS" AND
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR
IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES
OF MERCHANTABILITY, NON-INFRINGEMENT, AND FITNESS FOR A
PARTICULAR PURPOSE.
This Software Offering does not use cookies or other technologies to collect
personally identifiable information.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, see IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details in the
section entitled “Cookies, Web Beacons and Other Technologies,” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
IBM®
Printed in USA