Data Protection For SAP HANA Installation and User's Guide: IBM Tivoli Storage Manager For Enterprise Resource Planning
Data Protection For SAP HANA Installation and User's Guide: IBM Tivoli Storage Manager For Enterprise Resource Planning
Data Protection For SAP HANA Installation and User's Guide: IBM Tivoli Storage Manager For Enterprise Resource Planning
Planning
Version 6.4.1
IBM Tivoli Storage Manager for Enterprise Resource
Planning
Version 6.4.1
Note:
Before using this information and the product it supports, read the information in “Notices” on page 65.
iv Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Tables
1. Password handling for UNIX or Linux . . . 20 3. Installation parameters for Data Protection for
2. SERVER statement and appropriate profile and SAP HANA . . . . . . . . . . . . 55
option file settings. . . . . . . . . . . 26
Publications
The Tivoli Storage Manager product family includes IBM Tivoli Storage
FlashCopy® Manager, IBM Tivoli Storage Manager for Space Management, IBM
Tivoli Storage Manager for Databases, and several other storage management
products from IBM Tivoli.
Data Protection for SAP HANA is optimized for SAP databases to manage large
volumes of data. It is integrated with SAP HANA backup and recovery utilities,
the SAP HANA Studio, and hdbsql, and uses SAP backup and recovery
procedures.
The Data Protection for SAP HANA hdbbackint process is used by SAP HANA for
backing up full databases and redo log files. The configuration of the hdbbackint
process is stored in the initSID.utl profile file. This file contains information that
describes how to run backup and restore operations, and can be customized for
your SAP HANA environment.
The hdbbackint process communicates with the Tivoli Storage Manager server
through an API that is shared with other IBM data protection products. It requires
that the Data Protection for SAP HANA ProLE process is running. The ProLE
process coordinates multiple hdbbackint instances in a full database backup. The
process ensures that all backup objects that belong to the same full database
backup get assigned to the same backup id. The full database backup is handled as
a single entity even it consists of numerous single objects.
Storage hierarchy
Figure 1. An example of how Data Protection for SAP HANA, Tivoli Storage Manager and SAP HANA are integrated.
Data Protection
for SAP HANA
ProLE
1 3
2 Tivoli Storage
SAP HANA Data Protection Tivoli Manager server
Storage
database 4 for SAP HANA Manager
hdbbackint API
5
Data
Control
Figure 2. The interactions between SAP HANA and the Tivoli Storage Manager through the Data Protection for SAP
HANA hdbbackint interface.
2 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
A Data Protection for SAP HANA backup operation proceeds in the following
order:
1. You start a backup operation using the SAP HANA Studio or through the
hdbsql command-line interface.
2. A number of SAP HANA hdbbackint processes are started.
3. The hdbbackint processes connect to the ProLE to get the configuration
information.
4. SAP HANA sends data to the hdbbackint processes.
5. The data is sent to the Tivoli Storage Manager server through the Tivoli Storage
Manager API.
All the database and redo log backup information is stored by SAP HANA. The
backup history can be viewed in the SAP HANA Studio in the backup tab or by
querying the database view M_BACKUP_CATALOG. For more information about
hdbbackint, see the SAP HANA Administration Guide.
The full SAP HANA database is backed up to Tivoli Storage Manager for
Enterprise Resource Planning. If needed, the database can be restored without
extra redo log files. The frequency of full backups is controlled by the Tivoli
Storage Manager recovery time objective (RTO) and recovery point objective (RPO).
For more information about full backups, see the SAP HANA Administration Guide.
Back up redo log files so that if data is lost in between two full backups, the data
can be restored to a particular point in time. Set the SAP HANA
LOG_BACKUP_USING_BACKINT parameter to TRUE to enable backing up redo log files.
Edit the frequency of the backup operations with the LOG_BACKUP_TIMEOUT_S. The
default value is for a backup every 15 minutes. For more information about redo
log file backups, see the SAP HANA Administration Guide.
If you experience a total loss of the SAP HANA appliance, use the SAP HANA
recovery procedure to recover the system. For information about hardware
recovery, see the SAP documentation.
When you are planning to store data in a disk storage pool and then migrate it to
tape, be aware that SAP HANA data is restored in the order that is determined by
HANA. Use either disk storage pools or tapes with enough mount points to
optimize the restore by reducing the number of tape-seeks and mounts. If the data
to be restored for all nodes is on a single tape drive, it can lead to increased restore
times or deadlocks.
Consider these items when you set up the Tivoli Storage Manager server. Data
Protection for SAP HANA uses the Tivoli Storage Manager archive function for all
backup activities:
Dedicated backup server
A dedicated backup server allows sharing of resources and provides an
efficient resource usage.
CPU power
For a specific data throughput, the CPU load on the backup server is
6 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
approximately 60% of the load on the database server. Therefore, backup
server CPU power is not as critical as the CPU power of the database
server. However, demands on the Tivoli Storage Manager server CPU do
increase when several clients access a single Tivoli Storage Manager server.
Storage hierarchy
Backup of large data files is to be directed to tape to achieve the highest
transfer rates. If disks must be used, use one disk pool per session. Small
files such as log files, are to be directed to disk storage first and then
moved to tape collectively to avoid excessive tape mounts.
Parallel sessions
The Tivoli Storage Manager server allows the use of several tape drives in
parallel to store data. This setup can increase overall data throughput. To
fully use this feature, two conditions must exist. The corresponding Tivoli
Storage Manager node must be allowed the appropriate number of mount
points and the device class must be allowed the appropriate mount limits.
Tape storage is the preferred media for storing database contents as it provides the
best data throughput for backup and restore operations. For a large scale-out
system, the number of required tape drives might become too large. In this case,
use a virtual tape library (VTL). A disk-tape storage hierarchy is used for backing
up redo log files. This action provides the best protection against data loss, and
eliminates the need to mount a tape for each redo log file.
Data Protection for SAP transfers data to and from the backup server through
single or multiple (parallel) sessions to the Tivoli Storage Manager server. Each
session must have a storage device that is associated with it. The SAP backup ID is
persistently linked with each backup file. This backup ID can be used later to
determine all files that are required for a complete restore.
Database backups are retained for a specified period and then become obsolete.
Manage backup storage space by deleting obsolete backups and automating
archive retention period with Tivoli Storage Manager options. Alternatively the
obsolete backups can be deleted manually in the SAP HANA Studio.
Chapter 2. Planning 7
Planning for space required for SAP HANA backups
Before Data Protection for SAP HANA sends data to Tivoli Storage Manager, it
notifies the Tivoli Storage Manager server of the amount of data that is going to be
sent. This enables the Tivoli Storage Manager server to select the appropriate
storage pool that accommodates this specific amount of data.
Through the backint SAP HANA interface, Data Protection for SAP HANA does
not know the amount of data that is due to be sent by SAP HANA. It is assumed
that half of the memory size is to be transferred. If the system has 1 TB RAM, then
the estimated size for the backup object is assumed to be 512 GB. For the data that
is stored by the SAP HANA indexserver this number is close to the value for a
fully used system. For other SAP HANA services like nameserver or
statisticserver, the value is much smaller. Typically the backups of these services
are several MB only, and a backup can result in a storage pool that is intended for
large objects being used.
Procedure
v To avoid backing up small items to the next storage pool in line, the required
size of the first storage pool should be at least half the size of the appliance
memory multiplied with the number of sessions (SESSIONS, MAX_SESSIONS)
that are simultaneously sending files. If you use the maxsize parameter for the
first storage pool, make sure it is at least half the size of the appliance memory.
v Another option is to use Virtual Tape Library for backups.
Each path in the initSID.utl profile is defined by a server statement and the
corresponding definitions in the Tivoli Storage Manager client system option file
dsm.sys. The SERVER <server 1..n> statement denotes Tivoli Storage Manager
servers that are defined in the Data Protection for SAP profile. This definition
corresponds to the statement SERVERNAME server 1..n in the Tivoli Storage
Manager client option file or files. These servers are identified by their
TCPSERVERADDRESS and can be on one system (multiple paths) or several systems
(multiple servers). SESSIONS denotes the number of parallel sessions that Data
Protection for SAP schedules for the path. If only one path is used, SESSIONS must
be equal to MAX_SESSIONS, which specifies the total number of parallel sessions to
be used (equivalent to number of tape drives/management classes). Data
Protection for SAP attempts to communicate with the Tivoli Storage Manager
server by using the first path in the profile. If this attempt is successful, Data
Protection for SAP starts the number of parallel sessions as specified for this path.
If the attempt was unsuccessful, this path is skipped and Data Protection for SAP
continues to the next path. This process continues until as many sessions are active
as were specified in the total session number (MAX_SESSIONS). If this number is
never reached (for example, because several paths were inactive), Data Protection
for SAP ends the backup job.
8 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Backup backint processes
When SAP HANA runs a database backup operation through Data Protection for
SAP HANA, a dedicated backint process for each backup object is started. It is
possible to use multiple sessions in a single backint process, and each backint
process transfers a single object.
You do not need to configure multiple sessions for database backup operations.
Multiple backint processes run in parallel, and all objects are backed up in
parallel. The number of objects depends on the number of SAP HANA nodes in
the environment. All nodes host an index server that holds the payload of the
database. The backup objects from the index servers are typically the largest
objects. The master node hosts a name server, a statistic server, and other services.
Backup objects from these additional services are typically smaller than the index
server. If the backups must go directly to tape, then the number of mount points
must include the additional services.
To restore an outdated backup, you must restore it into the same environment it
was originally taken from. This process requires you to maintain older versions of
SAP, the operating system, database, and Tivoli Storage Manager data to enable a
rebuild of the original environment. SAP provides archiving functions that can
display business documents that are designated with long-term retention
requirements. These business documents are format-independent and can be used
for auditing and other legal purposes. Archived data can then be removed from
the operational database to reduce the database size and improve backup and
restore processing time.
Changes that support a fast backup while you are using resources can be
considered applicable to the restore operation. Tune the backup operation and then
run a restore to verify that the restore operation works in a satisfactory manner.
Chapter 2. Planning 9
Create multiple redo log copies
Data Protection for SAP HANA can save a number of copies of each redo log by
using different Tivoli Storage Manager server management classes. By creating
multiple redo-log copies on separate physical media, the administrator can restore
and recover a database even if a backup tape becomes corrupted.
The Data Protection for SAP profile file keywords important for creating multiple
redo log copies:
v Keyword BRARCHIVEMGTCLASS denotes the Tivoli Storage Manager server
management classes to be used when it saves redo logs. With the use of different
management classes, the backup media that is targeted for redo logs is separated
from the backup media that is targeted for the database objects. Different redo
log copies can also be saved to different backup media.
v Keyword REDOLOG_COPIES allows the administrator to initiate the creation of
multiple backup copies of each redo log. By creating multiple copies on separate
physical media, the database administrator is able to restore and recover
databases in an SAP environment. The restore and recover can occur even if a
backup tape becomes corrupted or lost.
v Keyword MAX_SESSIONS specifies the maximum number of sessions that a single
Data Protection for SAP instance is allowed to access to the Tivoli Storage
Manager server.
These rules describe how Data Protection for SAP satisfies a request to back up
redo log files:
v Data Protection for SAP creates as many backup copies of each redo log as are
specified by the REDOLOG_COPIES keyword.
v Data Protection for SAP requires as many archive management classes that are
defined by BRARCHIVEMGTCLASS as there are redo-log copies requested. To best
protect against the loss of data, it is important that the different management
classes are linked to different storage pools within Tivoli Storage Manager
storage. This way, various redo log copies are on different backup media.
v When SAP HANA is used, Data Protection for SAP HANA requires that the
maximum number of sessions that are defined by MAX_SESSIONS is greater than
or equal to the number of redo log copies that are requested. A setup with a
smaller number of sessions is not advised with the backint interface.
v Data Protection for SAP cannot control the order in which Tivoli Storage
Manager processes the requests. Therefore, an administrator cannot rely on
sessions to be processed in the order they were started by Data Protection for
SAP.
10 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Chapter 3. Installing
Install Data Protection for SAP HANA using the install wizard, through the
console, or in silent mode using a response file.
Requirements for Data Protection for SAP HANA are available in the hardware
and software requirements technote for each release. For requirements, review the
Hardware and Software Requirements technote for your version. See the technote at
http://www.ibm.com/support/docview.wss?uid=swg21219410. From the page,
follow the link to the technote for your release or update level.
Before you install Data Protection for SAP HANA, verify that your system meets
the following prerequisites:
v SAP HANA SPS 05 revision 45 is installed.
v IBM Tivoli Storage Manager API Version 5.5 or later is installed and configured
on all SAP HANA nodes where you are going to install and configure Data
Protection for SAP HANA.
v The SAP HANA database is configured on the system where you are going to
install and configure Data Protection for SAP HANA.
v The SAP HANA HDB client is installed on the system.
v During the installation and configuration of Data Protection for SAP HANA,
root access to the appliance host operating system is required.
Data Protection for SAP HANA is not integrated with the Tivoli Storage Manager
for ERP Administration Assistant. The Administration Assistant cannot be used to
configure and monitor Data Protection for SAP HANA.
Procedure
1. Log in to the SAP HANA host with the root user ID, and choose where you
want to install the package.
2. Mount the DVD and navigate to the Data Protection for SAP HANA
installation package. If you are installing from a file share, to ensure that the
installer file has adequate permissions to run, enter the following command:
chmod +x 6.4.1.0-TIV-TSMERP-HANA-Linux.bin
3. To start the installation process, enter the following command:
./6.4.1.0-TIV-TSMERP-HANA-Linux.bin
If you are logged on to the SAP HANA host with an X Window System or X
terminal, follow the instructions to complete the installation.
If you are installing the product from the command line, a console mode
installation is started.
4. After you accept the license agreement, click Next and read the pre-installation
summary that lists details about the installation folder, and the required disk
space. Click Install to begin the installation, and click Done when the process
finishes.
To install Data Protection for SAP HANA in silent mode, you must first create a
response file.
Procedure
1. Create a response file for Data Protection for SAP HANA with the following
command:
./6.4.1.0–TIV–TSMERP-HANA-Linux.bin -i console -r responsefile
This command runs the installation process in console mode and all user input
is recorded in the response file.
2. Run the following command to install Data Protection for SAP HANA in silent
mode:
./6.4.1.0–TIV–TSMERP-HANA–Linux.bin -i silent -f responsefile
This command runs the installation process automatically without requiring
any user input, Values for options are read from the response file.
Replication environments
An environment that has a number of SAP HANA database instances that are
synchronized with a primary database instance is a replication environment.
Replication is possible on the database level, for example with SAP HANA system
replication, or on the storage level, for example with GPFS™ storage replication.
The replicated database instances are typically not online.
When you are setting up a replication environment and you are running a
takeover test, the primary system is shut down. Install Data Protection for SAP
HANA when the SAP HANA database instance in the replicated environment is
online.
12 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Procedure
v Install Data Protection for SAP HANA by following the procedure at this link
Chapter 3, “Installing,” on page 11.
v Configure Data Protection for SAP HANA by following the procedure at this
link “Configuring Data Protection for SAP HANA” on page 23.
For more information about installing Data Protection for SAP HANA in silent
mode, see “Installing Data Protection for SAP HANA in silent mode” on page 12.
Procedure
v Install Data Protection for SAP HANA on each SAP HANA node in a database
instance.
v Install the Tivoli Storage Manager client API on each of the SAP HANA nodes.
v Copy the Data Protection for SAP HANA profile from the primary database
instance, and use this profile in the replicated environment.
v Configure the Tivoli Storage Manager password.
– If automatic password handling is used, edit NODENAME in the server stanza of
the dsm.sys file so that each SAP HANA node uses a unique Tivoli Storage
Manager node name.
– If manual password handling is used, the Tivoli Storage Manager node
password must be stored locally by entering the following command for each
SAP HANA node: /opt/tivoli/tsm/tdp_hana/hdbbackint -p full path to
profile/initSID.utl -f password
If you are using .rpm files to uninstall Data Protection for SAP HANA, the
uninstallation program remains on the disk. The .rpm packages that were installed
during the setup on other SAP HANA nodes remain on these nodes.
Procedure
1. Change directory to the uninstall subdirectory in the install folder.
2. Enter the following command: /opt/tivoli/tsm/tdp_hana/uninstall/
uninstaller.bin
3. To remove.rpm packages that were installed during the setup, enter the
following command:
rpm –e TIV–TSMERP–HANA
Chapter 3. Installing 13
Results
The uninstallation program removes Data Protection for SAP HANA from your
system. Services that were installed and used by Data Protection for SAP HANA
are stopped and removed.
14 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Chapter 4. Configuring
In addition to configuring Data Protection for SAP HANA you need to configure
other applications, for example, the Tivoli Storage Manager backup-archive client.
Data Protection for SAP requires certain configuration tasks to be run for these
applications:
v Data Protection for SAP base product
v Tivoli Storage Manager backup-archive client
v Tivoli Storage Manager server
Although the task examples use Tivoli Storage Manager commands, these tasks can
also be run using the Tivoli Storage Manager web client GUI.
Consider the following performance-related guidelines before you install the Tivoli
Storage Manager server.
Tivoli Storage Manager server host system
The Tivoli Storage Manager server must be installed on an exclusive
system. The tasks that are presented here avoid concurrent processes and
disk I/O access with other applications. A single Tivoli Storage Manager
server is sufficient for a single SAP system landscape. If the Tivoli Storage
Manager server is used to back up and restore other clients, consider
installing the server on a large system or by using several Tivoli Storage
Manager servers.
Network topology
Network topologies such as Fast Ethernet and Gigabit Ethernet work well
with the Tivoli Storage Manager server. Use fast network topologies to
prevent bottlenecks during backup and restore operations. The Tivoli
Storage Manager server supports multiple network adapters. This support
increases server throughput by providing multiple connections to the same
network or by providing several physically distinct networks for the same
server.
These steps are considered complete when the Tivoli Storage Manager server is
successfully installed:
v Recovery log volume is allocated and initialized.
v Recovery log mirror volume is allocated and initialized.
v Database volume is allocated and initialized.
The latest code fixes for Tivoli Storage Manager can be found at:
ftp://public.dhe.ibm.com/storage/tivoli-storage-management/maintenance
Procedure
1. Add a server statement to the Data Protection for SAP profile.
2. Adapt the Tivoli Storage Manager options files as described in “Verifying the
Tivoli Storage Manager server name” on page 21.
3. Set and save the Tivoli Storage Manager password for the new server as
described in “Setting the Tivoli Storage Manager password” on page 19.
Verify that the following items are established within the Tivoli Storage Manager
server after installation.
v Query the defined library:
q library
16 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Defining a storage pool
A storage pool needs to be added when you are configuring. A storage pool is a
named collection of storage volumes that are associated with one device class. Each
storage pool represents a collection of volumes that are the same media type. The
storage pool setup defines the storage hierarchy for the appropriate environment.
Procedure
1. Define a storage pool for the SAP system data: define stgpool sap_incr
device_class_name maxscr=5
2. Define a storage pool for the : define stgpool sap_db device_class_name
maxscr=20
3. Define a storage pool for the : define stgpool sap_log1 device_class_name
maxscr=3
Results
When a library tape device is associated, the maximum scratch volumes (labeled
volumes that are empty or contain no valid data) that this storage pool is allowed
to use (parameter maxscr) must be defined. The maximum number of scratch tapes
depends on the size of the database, the capacity of the tapes, the number of
scratch volumes available, and how many versions of the backup must be retained.
Replace these values with appropriate estimates.
Defining a policy
A server policy needs to be specified when you are configuring Tivoli Storage
Manager policies. Specify how files are backed up, archived, moved from client
node storage, and how they are managed in server storage. A policy definition
includes the definition of a policy domain, a policy set, management classes, and copy
groups.
After you set definitions, a default policy set must be assigned, validated, and
activated. For the policy definition, log on as a Tivoli Storage Manager
Administrator by using the Admin Command Line or the Web Admin and run the
following commands.
Procedure
1. Define a policy domain and policy set:
define domain sap_c21
define policyset sap_c21 p_c21
2. Define a management class for file system backups, data files, offline redo log
files and copies of offline redo logs:
define mgmtclass sap_c21 p_c21 mdefault
define mgmtclass sap_c21 p_c21 mdb
define mgmtclass sap_c21 p_c21 mlog1
define mgmtclass sap_c21 p_c21 mlog2
If you are planning to use this Tivoli Storage Manager server with multiple
SAP systems, use a set of different management classes for each system.
3. Define a copy group:
Chapter 4. Configuring 17
define copygroup sap_c21 p_c21 mdefault type=backup destination=sap_incr
define copygroup sap_c21 p_c21 mdefault type=archive destination=archivepool
define copygroup sap_c21 p_c21 mdb type=archive destination=sap_db retver=90
define copygroup sap_c21 p_c21 mlog1 type=archive destination=sap_log1 retver=90
define copygroup sap_c21 p_c21 mlog2 type=archive destination=sap_log2 retver=90
Data Protection for SAP HANA stores data in the archive copy group of the
management classes. This data expires after a defined number of days. In the
example, a retver value of 90 days is used. When no backup is being done
within this timeframe, all backup data expires and is no longer available for
restore. As an alternative the copy group parameter retver, which specifies the
number of days a file is to be kept, can be set to unlimited (9999 or nolimit).
Obsolete backups can be deleted manually using the SAP HANA Studio.
4. Assign the default management class:
assign defmgmtclass sap_c21 p_c21 mdefault
Registering a node
The node must be registered when you are configuring The Tivoli Storage Manager
server views its registered clients, application clients, host servers, and source
servers as nodes.
To register a node, log on as the Tivoli Storage Manager administrator by using the
Admin Command Line or the Web Admin, run the command,
register node C21 passwd domain=sap_c21 maxnummp=8
When you use two or more tape drives, the maxnummp parameter settings can affect
the nodes. It defines the maximum number of mount points that one node can use.
The default value is 1. If one node must use more than one mount point, the
parameter must be set to the wanted number of mount points. This parameter is
not to be set higher than the total number of drives available on the Tivoli Storage
Manager server.
To avoid sessions timing out, set the parameter IdleTimeOut to a value higher than
the time required for sending the largest table space file to the Tivoli Storage
Manager. For example:
setopt IdleTimeOut 60
18 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Determining the Tivoli Storage Manager password method
Specify how Data Protection for SAP manages the Tivoli Storage Manager
password. There are three options.
Note:
1. The interactive password prompt is omitted only if the passwords for
all server stanzas in the.utl file are specified.
2. There is a potential security risk when you record Tivoli Storage
Manager passwords in a script.
Automatic handling of password
A password is required for each connection to the Tivoli Storage Manager
server. After the first connection, the password is managed by Tivoli
Storage Manager. The Tivoli Storage Manager client stores the current
password locally. When the password expires, the password is changed
and stored automatically.
Data Protection for SAP HANA is to be installed after the Tivoli Storage Manager
installation is completed. Tivoli Storage Manager provides different password
methods to protect data. Data Protection for SAP HANA must use the same
method as specified in Tivoli Storage Manager.
The default password method during Data Protection for SAP HANA installation
is PASSWORDACCESS prompt. The default parameters for Data Protection for
SAP HANA are set according to this default value. If a different password method
is set in Tivoli Storage Manager, adjust the Data Protection for SAP HANA
Chapter 4. Configuring 19
parameters.
Once you have decided on a password handling method, you can set keywords
and profile parameters.
After you select the suitable password-handling method, follow this configuration
matrix to set the keywords and parameters. Proceed as indicated by the step
number.
Table 1. Password handling for UNIX or Linux. Password handling parameters and profile actions.
Step Profile/Action Parameter Password
No Manual Set by Tivoli
Storage
Manager
1 Tivoli Storage AUTHENTICATION OFF ON n days (see ON n days
Manager admin EXPIRATION PERIOD (see note note 2)
1)
2 dsm.sys PASSWORDACCESS Unavailable PROMPT GENERATE
Note:
1. See appropriate Tivoli Storage Manager documentation.
2. If you are using manual password generation during testing, make sure that
the expiration period is set to an appropriate time.
3. This password must be the one that is effective on the Tivoli Storage Manager
server for the node.
4. ADSMNODE must not be set when PASSWORDACCESS generate is set.
5. The users SIDadm and must have read and write permission for the path
specified.
6. This step is only necessary if the password is expired (manual-handling only)
or must be changed on the Tivoli Storage Manager server.
7. A password must be entered for each server statement in the Data Protection
for SAP profile.
20 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Verifying the Tivoli Storage Manager server name
Procedure
v Review the Tivoli Storage Manager client options files to make sure that the
server name matches the name that is specified in the server statement of the
initSID.utl file.
v Review that other parameters are set correctly. These settings depend on the
password method selected.
v (UNIX or Linux) Define the Tivoli Storage Manager server in the Tivoli Storage
Manager client system options file (dsm.sys). The server stanza that is specified
in dsm.sys must match the entry in initSID.utl.
Control Data Protection for SAP HANA backup file expiration with the RETVER
parameter. RETVER is the parameter of the archive copy group that is used to store
the backup data on the Tivoli Storage Manager server.
Tip: Backups are expired even if no backups are run on that day.
The clients must be installed on all nodes that interface with the Tivoli Storage
Manager server. In a SAP® system landscape, the backup-archive client must be
installed on every system that is scheduled for a file system backup. Examples of
these systems are SAP application servers and the SAP database server. The Tivoli
Storage Manager API client must be installed only on the SAP database server
system to enable backup and restore operations of the SAP database by using Data
Protection for SAP.
Chapter 4. Configuring 21
Setting Tivoli Storage Manager client options on UNIX or
Linux
Tivoli Storage Manager clients on UNIX or Linux are configured by setting options
in the dsm.opt and dsm.sys files. The include/exclude file is used to define which
files are included or excluded during backup, archive, or hierarchical storage
processing.
Procedure
1. Install the Tivoli Storage Manager client software on the SAP database server
system.
2. Edit the client system options file dsm.sys and set these values as appropriate
for your installation:
Servername server_a
TCPPort 1500
TCPServeraddress xxx.xxx.xxx.xxx or servername
InclExcl /usr/tivoli/tsm/client/ba/bin/inclexcl.list
Compression OFF
3. Specify TCPServeraddress 127.0.0.1. If the server and client are on the same
system, select loopback. This selection improves TCP/IP communication speed.
4. Specify InclExcl if you want Tivoli Storage Manager to include or exclude the
files that are listed in inclexcl.list.
5. Throughput improves when tape drives attached to the Tivoli Storage Manager
server provide hardware compression. However, combining hardware
compression and Tivoli Storage Manager client software compression
(Compression ON) is not advised.
6. Edit the client user options file dsm.opt and set these values as appropriate for
your installation:
LANGUAGE AMENG (this is the default value)
NUMBERFormat 1 (this is the default value)
TAPEPROMPT NO
TIMEFORMAT 1 (this is the default value)
Results
When the Tivoli Storage Manager API client is installed on a UNIX or Linux
system, ensure that a link exists that points to the Tivoli Storage Manager API
installation directory, /usr/tivoli/tsm/client/api/bin64.
/usr/lib/libApiDS.so
The Tivoli Storage Manager provides two features for specifying the location of the
Tivoli Storage Manager API Client error log: the environment variable DSMI_LOG
and the Tivoli Storage Manager system client option ERRORLOGName in dsm.sys. For
DSMI_LOG, a directory is specified to which a file named dsierror.log is written.
For ERRORLOGName a path and user-defined file name are defined.
22 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
To achieve conclusive logical linking of the environment, configuration and log
files in your SAP backup-archive system, you must use the Tivoli Storage Manager
system client option ERRORLOGName rather than the environment variable DSMI_LOG.
When you use ERRORLOGName, you can include the SID in the file name. This
information can speed up problem determination by simplifying identification
of the correct error log file. You can match logfile names to the active user client
options file name, which must also contain the SID and be stored in
environment variable DSMI_CONFIG. This information is especially useful on
systems with several SIDs.
Ensure that the Tivoli Storage Manager node name is specified in the server stanza
of the dsm.sys file.
The Data Protection for SAP HANA configuration files are stored in the
configuration directory, /usr/sap/SystemID/SYS/global/hdb/opt/hdbconfig.
Procedure
1. Log in to Data Protection for SAP HANA using the root user ID, and change to
the installation directory, /opt/tivoli/tsm/tdp_hana.
2. Run the Data Protection for SAP HANA setup.sh script, by entering the
following command:
./setup.sh
Chapter 4. Configuring 23
3. When prompted, enter the SAP HANA system ID, or accept the proposed
value.
4. Enter the instance number or accept the default value of 00.
5. Enter the password for the SYSTEM user.
6. Choose to configure the Tivoli Storage Manager server, or defer the server
configuration. For information about manually configuring the Tivoli Storage
Manager server, see “Manually configuring the Tivoli Storage Manager for Data
Protection for SAP HANA” on page 25.
7. Choose one of the following Tivoli Storage Manager server password handling
methods:
v Automatic password handing: to store the Tivoli Storage Manager node
password in the Tivoli Storage Manager API. When the password expires on
the server, the Tivoli Storage Manager client and server generates a new
password. The API updates the password on the client.
v Manual password handling: to store the node password in the Tivoli Storage
Manager for ERP configuration file. When the password expires, you must
update it by using the hdbbackint -f password command.
8. Enter the Tivoli Storage Manager server name as defined in the dsm.sys file.
The following parameters must be entered to enable backup and restore of
databases and redo log files to the Tivoli Storage Manager
a. Enter the Tivoli Storage Manager node name for the ADSMNODE parameter.
b. Enter the Tivoli Storage Manager management class for the
BRBACKUPMGTCLASS parameter.
c. Enter the Tivoli Storage Manager management class for the
BRARCHIVEMGTCLASS parameter.
9. Enter a password for the Tivoli Storage Manager node. After you enter the
password, it is verified. For a scale-out system with automatic password
handling, this step is repeated for each SAP HANA node that belongs to the
scale-out system.
Run the setup script on each database to ensure that each is protected, and has a
dedicated initSID.utl file.
Procedure
Log in with the root user ID. For each SAP HANA database instance, run the
setup.sh. For more information about the setup process, see “Configuring Data
Protection for SAP HANA with the setup script” on page 23.
Results
Running the setup script on each database creates a dedicated profile initSID.utl
file for each instance. Parameters are adapted to each database.
When you are deleting a database, all corresponding backup data that includes
stored objects for the Tivoli Storage Manager node, is deleted.
24 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Manually configuring the Tivoli Storage Manager for Data
Protection for SAP HANA
If you chose to defer the configuration of the Tivoli Storage Manager during the
setup script for Data Protection for SAP HANA, you must configure it manually.
Configure the Tivoli Storage Manager by manually editing the Data Protection for
SAP HANA initSID.utl file.
You must create the server stanza for Tivoli Storage Manager in the dsm.sys file
before you proceed to the Data Protection for SAP HANA configuration tasks.
Procedure
1. After the setup.sh script finishes, open the Data Protection for SAP HANA
initSID.utl file that is in the configuration directory.
/usr/sap/SID/SYS/global/hdb/opt/hdbconfig/SIDinit.utl
2. With details listed in the dsm.sys file, update the following Tivoli Storage
Manager parameters in the server section of the initSID.utl file.
SERVER server # Servername Tivoli Storage Manager server name
ADSMNODE NODE Tivoli Storage Manager node name
BRBACKUPMGTCLASS MDB Management classes for database backups
BRARCHIVEMGTCLASS MLOG Management classes for redo log backups
3. From the command line, enter the following command
/opt/tivoli/tsm/tdp_hana/hdbbackint -p full path to profile/initSID.utl
-f password
4. If the password for the Tivoli Storage Manager node is not set, you are
prompted to enter the password.
The Data Protection for SAP HANA profile file is named initSID.utl, where the
system identifier for the SAP HANA database instance is stored. During the
configuration of Data Protection for SAP HANA, the profile file is created in the
following directory, /usr/sap/SID/SYS/global/hdb/opt/hdbconfig. The SAP HANA
configuration is adjusted to use the profile file for backup and recovery operations.
Chapter 4. Configuring 25
Set the SERVER statement in the Data Protection for SAP HANA profile:
The SERVER statement is specified in the Data Protection for SAP HANA profile,
and in the Tivoli Storage Manager client option file.
There are corresponding keywords in the Tivoli Storage Manager client option file.
Depending on the choice of password handling, some parameters are ignored. The
corresponding sections in the Data Protection for SAP HANA profile and the Tivoli
Storage Manager client option file are established by using the logical server name.
This logical server name is defined by the keywords SERVER or SERVERNAME.
Table 2. SERVER statement and appropriate profile and option file settings.
Configuration possibilities Data Protection for SAP HANA Tivoli Storage Manager client option
profile initSID.utl file dsm.sys or server.opt [2]
single path; no password or manual SERVER server SERVERNAME server
password ADSMNODE node[1] TCPSERVERADDRESS address
NODENAME do not specify
single path; automatic password by SERVER server SERVERNAME server
Tivoli Storage Manager ADSMNODE do not specify NODENAME node
TCPSERVERADDRESS address
several paths/servers; no password SERVER server 1 SERVERNAME server 1
or manual password ADSMNODE node 1 NODENAME do not specify
TCPSERVERADDRESS address 1
SERVER server 1
ADSMNODE node n SERVERNAME server n
NODENAME do not specify
TCPSERVERADDRESS address n
several paths/servers; automatic SERVER server 1 SERVERNAME server 1
password by Tivoli Storage ADSMNODE do not specify NODENAME do not specify
Manager[3] TCPSERVERADDRESS address 1
SERVER server n
ADSMNODE do not specify SERVERNAME server n
NODENAME do not specify
TCPSERVERADDRESS address n
several paths/servers; automatic SERVER server SERVERNAME server
password by Tivoli Storage Manager ADSMNODE do not specify NODENAME node
[4]
TCP_ADDRESS address 1 TCPSERVERADDRESS address
SERVER server n
ADSMNODE do not specify
TCP_ADDRESS address n
Notes:
[1] If ADSMNODE is not specified, the host name is used.
[2] On UNIX or Linux, dsm.sys is the single client option file for all Tivoli
Storage Manager servers.
[3] If two different physical systems have the same Tivoli Storage Manager
node name or if multiple paths are defined on one node by using several
server stanzas, passwordaccess generate might work only for the first
stanza that is used after password expiration. During the first client/server
contact, the user is prompted for the same password for each server stanza
separately. A copy of the password is stored for each stanza. When the
password expires, a new password is generated for the stanza that
connects the first client/server contact. All subsequent attempts to connect
26 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
through other server stanzas fail because there is no logical link between
their copies of the old password and the updated copy. The updated copy
is generated by the first stanza that is used after password expiration. To
avoid this situation, update the passwords before they expire. When the
passwords are expired, run these tasks to update the password:
1. Run dsmadmc and update the password on the server.
2. Run dsmc -servername=stanza1 and use the new password to generate
a valid entry.
3. Run dsmc -servername=stanza2 and use the new password to generate
a valid entry.
[4] You must use Tivoli Storage Manager API 5.5 (or later), you can use the
TCP_ADDRESS parameter in the Data Protection for SAP HANA profile. This
parameter eliminates the requirement to set multiple stanzas in the Tivoli
Storage Manager client option file for multiple paths. The parameter also
eliminates the problem when it updates the password (see [3]).
Data Protection for SAP profile is used in certain disaster recovery configurations.
This example assumes the following configuration for two servers a and b:
v Two Tivoli Storage Manager servers:
– server_a uses TCP/IP address xxx.xxx.xxx.xxx and uses four tape drives
(MAX_SESSIONS 4)
– server_b uses TCP/IP address yyy.yyy.yyy.yyy and uses four tape drives
(MAX_SESSIONS 4)
v An SAP database server that is connected to this FDDI network.
v Normal backups are processed with server a, which is local to the SAP database
server.
v A disaster recovery backup is stored on remote server b every Friday.
The following is an example of the Data Protection for SAP profile that is used in
this disaster recovery configuration:
Chapter 4. Configuring 27
Example of SERVER statement with alternate paths:
This example assumes that the Tivoli Storage Manager server is configured with
two tape drives and two LAN connections. A backup is typically processed
through network path 1 (SERVER statement 1). If network path 1 is unavailable, the
backup is processed by using network path 2 (SERVER statement 2). If path 1 is
active, Data Protection for SAP begins the two sessions as defined in the SERVER
statement for path 1. Since MAX_SESSIONS also specifies 2, no more sessions are
started. If path 1 is inactive, Data Protection for SAP starts two sessions on path 2.
Since MAX_SESSIONS specifies 2, the backup is processed by using path 2.
The Data Protection for SAP profile that is used in this alternate path configuration
is shown in the following example:
Even if the logical names server_a and server_b actually point to the same Tivoli
Storage Manager server, the Administration Assistant still considers them to be two
different servers.
For manual password handling, all SAP HANA nodes must have identical Tivoli
Storage Manager configurations. Ensure that the stanzas in the dsm.sys file that are
referenced by the Tivoli Storage Manager for ERP profile are identical. When you
are manually handling passwords, the parameter nodename in the dsm.sys file is
commented out.
28 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
SAP HANA instance PRD
Figure 3. An example of a Data Protection for SAP HANA scale-out solution with manual password handling selected.
If automatic password handling is used, the stanzas in the dsm.sys file that are
referenced by the Tivoli Storage Manager for ERP profile must have unique Tivoli
Storage Manager node names for each SAP HANA node. Otherwise, the stanzas
must be identical. The nodes are used for authentication purposes. By using the
Tivoli Storage Manager proxy node feature, the nodes gain access to a single Tivoli
Storage ManagerTivoli Storage Manager node that holds the data for the entire
SAP HANA instance.
In the following example, the Tivoli Storage Manager node SAP–PRD is used to store
the backup of the entire SAP HANA database. The Tivoli Storage Manager nodes
SAP–PRD–01, SAP–PRD–04, and SAP–PRD–07 are used by SAP HANA nodes 01, 04, and
07 to authenticate with the Tivoli Storage Manager server. These Tivoli Storage
Manager nodes must have proxy authority to theTivoli Storage Manager node
SAP–PRD. Similar configurations must be applied to all other nodes within the SAP
HANA scale-out system.
Chapter 4. Configuring 29
30 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Chapter 5. Protect data with Data Protection for SAP HANA
Use Data Protection for SAP HANA to back up and restore SAP HANA data to the
Tivoli Storage Manager server.
Perform the tasks that are required for your operating system.
The frequency of backups can be adjusted with the SAP HANA configuration
parameter log_backup_timeout_s that is stored in the persistence section of the
global.ini file. For more information about how to adjust this parameter, see the
SAP HANA documentation.
Procedure
1. In the SAP HANA Studio, select the database instance to be backed up.
2. Right-click the database, and select Back Up. Alternatively, in the Specify
Backup Settings window, select Backint for the destination type.
3. Optional: On the command line, use the SAP HANA SQL client hdbsql. For
example,
hdbsql –i 53 –n vhana06 –u system –p manager "backup data using backint (DAILY)"
connects to the instance with number 53, on host vhana06, as user system with
password manager and runs a complete database backup.
This figure illustrates the sequence of backup operations to consider for a daily
backup schedule.
The automated backup example shown in the graphic displays these common
tasks:
v A full database backup (offline or without application load) runs each night.
v The Tivoli Storage Manager server moves archived log files from disk to tape
after the full database backup.
v SAP system files are backed up incrementally with the Tivoli Storage Manager
backup-archive client.
v The last backup in the daily cycle is the backup of the Tivoli Storage Manager
database. This backup must always be done.
Backups can be moved to disk storage and to tape media. The Tivoli Storage
Manager server manages the data regardless of the storage media. However,
backing up the SAP database directly to tape is the preferred media.
32 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Multiple log file copies
Backing up multiple copies of a log file in a single archive operation helps protect
against this data in the event of a storage hardware failure or disaster recovery
situation. These copies can be on different physical Tivoli Storage Manager
volumes or on different Tivoli Storage Manager servers.
When a log file copy is unavailable at restore time, the software switches to
another copy. The software continues to restore the log file from that copy.
Follow the restoring tasks that are required for your operating system.
Determine the health of the SAP HANA application before you proceed to
restoring your SAP HANA data. If you have an SAP HANA hardware failure that
cannot be recovered with hardware components, you must restore SAP HANA
with the application recovery DVD. Ensure that the SAP HANA operating system
and software are running before you restore any SAP HANA databases.
When a logical error arises, SAP HANA data can be restored with Data Protection
for SAP HANA.
Procedure
v Recover the SAP HANA configuration files from the Tivoli Storage Manager if
they are backed up with the backup-archive client.
v Create the dsm.sys and dsm.opt configuration files from the backed up copies
that are obtained from the Tivoli Storage Manager.
Procedure
1. In the SAP HANA Studio Navigator tab, right-click to select the instance. Select
Recovery. If the database instance is still running, a message might be
displayed. The message states that the system must be shut down. When you
confirm the message, SAP HANA Studio automatically shuts down the
instance.
2. In the Specify Recovery Type window, choose the type of recovery that you
want to run.
3. In the Locate Log Backups panel the default location can be used.
4. Choose the backup to restore in the Select Data Backups panel. The list of
backups is generated from the SAP HANA recovery catalog. This catalog
What to do next
For more information about restoring and recovering data, see the SAP HANA
documentation.
34 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Chapter 6. Tuning performance
Information needed to tune Data Protection for SAP HANA performance is
provided. A system is considered balanced when the threads on the disk and the
network sides are similarly busy throughout the backup, and when resource usage
is good. To improve overall throughput, consider adding more resources to create a
balanced system.
Procedure
v Maintain an optimum setup by ensuring tapes are maintained in streaming
mode.
Options
Use Tivoli Storage Manager for ERP options to tune performance.
Performance tuning for Data Protection for SAP HANA can be addressed by
reviewing buffer size and copies, compression of backup data, and automation of
backup options.
Buffer copies
You can change the Data Protection for SAP options to prevent copying data
buffers, the original data buffers are sent between Tivoli Storage Manager
components. This change can improve performance.
Data Protection for SAP HANA uses internal buffers to store and exchange data
with the Tivoli Storage Manager Server. When data is sent from one component to
another, data buffers are copied by default. Data Protection for SAP HANA can
prevent copying data buffers by sending the original data buffers. This process
reduces the CPU load of the database server.
Buffer size
Adjust buffer size disk I/O to improve transfer rates.
The internal data buffer size can be adjusted for Data Protection for SAP HANA.
These buffers are used for reading the disk and sending data to the Tivoli Storage
Manager client API. The default values typically produce acceptable performance.
Optimize the buffer size for disk I/O to improve transfer rates. For disk
subsystems, the best transfer rates are achieved when the buffer size is set equal to
the stripe size. Before you increase the size of internal buffers, however, ensure that
sufficient storage is available for the number of buffers that are specified by Data
Protection for SAP. This number correlates to the number of sessions requested.
The number of buffers doubles when compression is specified. For more
information, see the description of BUFFSIZE keyword on page “Profile parameter
descriptions” on page 46.
36 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Figure 6. Null Block Compression
Data Protection for SAP HANA can decrease the amount of data that is sent to the
Tivoli Storage Manager server by compressing zero-byte blocks. Compression can
increase the CPU load on the database server and can improve performance in
situations when the network is at the point of constraint. Compression is most
effective with database files that contain large portions of null blocks. See the
description of the RL_COMPRESSION keyword on page “Profile parameter
descriptions” on page 46 for details on how to activate Data Protection for SAP
HANA compression.
Specify different Tivoli Storage Manager management classes for backup data and
archive data. Configure Data Protection for SAP to back up directly to a tape
storage pool and to archive HANA log files to a disk storage pool. Multiple
management classes can also be specified to use with multiple redo log files. The
profile keywords BRARCHIVEMGTCLASS and BRBACKUPMGTCLASS in “Profile
parameter descriptions” on page 46 provide information about specifying
management classes.
Backing up multiple copies of a log file in a single archive operation helps protect
against this data in the event of tape defects or disaster recovery situation. These
copies can be on different physical Tivoli Storage Manager volumes or on different
Tivoli Storage Manager servers. When a log file copy is unavailable at restore time,
Data Protection for SAP automatically switches to another copy. It continues
restoring the log file from that copy. The description of the profile keyword
REDOLOG_COPIES in “Profile parameter descriptions” on page 46 provides
detailed information about creating and by using multiple redo log copies.
Policies can be created that enable Data Protection for SAP to send different classes
of log messages to the Tivoli Storage Manager server.
Frontend and backend processing calls programs at specified times during backup
processing. See the description of the profile keywords BACKEND and
FRONTEND in “Profile parameter descriptions” on page 46.
Data transfer
When you use Data Protection for SAP HANA data is passed from disk through to
the network and finally to tape. A balanced configuration can help to prevent
bottlenecks and to ensure optimized performance.
From a high-level view, the data packages must send these elements when it does
a backup with Data Protection for SAP HANA: Data is read from disk that is
processed by Data Protection for SAP, and sent through the network to tape or
disk storage media. If the system is not balanced, the disk I/O, network
bandwidth, and storage media rates might create a bottleneck. This situation can
cause other resources to remain idle. Overall data throughput is typically measured
per file or per entire backup operation. The results are documented as an average
throughput rate in the logfile backint.log as the average transmission rate.
However, identifying bottlenecks that are derived from log file messages is
difficult. For this analysis effort, Data Protection for SAP provides performance
sensors that indicate a bottleneck. These bottlenecks are located either in the
38 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
elements that are represented in blue (for disk) or in yellow (for network and tape
respectively) in the graphic.
Investigate the log files for the SAP HANA application, the Tivoli Storage Manager
server activity log, and the backint log files to find out the differences between
successful and unsuccessful operations. Look for one of these patterns when the
problem occurs:
v The problem always occurs at the same time. If this condition is true, view the
appropriate log files to determine whether there are any scheduled processes
that occur simultaneously. Examples of such processes are virus checker,
automatic updates, or batch jobs.
v The problem always occurs after another operation is done or the same
operation is done.
v The problem occurs when another application or process is processed in parallel.
Reproducing problems
Use the checklist to check what caused the problem, and then attempt to reproduce
the problem.
When you encounter a problem that occurs during an operation that previously
ran successfully, review this list to determine the root cause of the problem.
v The setup has changed.
v A component changed such as the SAP HANA, Tivoli Storage Manager,
operating system, network, or hardware components.
v Patches or updates to one or more of the components were applied.
v Changes occurred that originated from the system:
– Check whether the disks are running full with the Linux df command.
– If network performance decreases, check whether there are new hosts, or new
applications. Check whether defects in software or hardware have occurred.
– If Tivoli Storage Manager server processing decreases, check whether more
clients or more operations were added. Information is also available in the
Tivoli Storage Manager server activity log.
If none of these changes caused the problem, view the last modified time stamp of
the configuration files backint.log and backup.logdsm.sysdsm.opt. Run the
following command to list all files in the /etc directory, that have been modified in
the previous five days:
find /etc -type f -ctime 5 -print
If you are able to identify changes that are made to the system, roll them back one
at a time and try to reproduce the problem. This method frequently reveals which
Data Protection for SAP HANA runs in IPv4, IPv6, and mixed environments on
Linux. In a mixed environment, the communication depends on the adapter
network settings. There is no option to enforce the use of a specific protocol other
than by network configuration. Specifically, the ProLE service listens for both IPv4
and IPv6 connection requests if the system is configured accordingly. Connection
requests to ProLE are made for the addresses that are returned by the system for
the respective port on the local host. Connection requests are made for the
addresses that are specified by the user. IPv6 addresses are supported when
TCP/IP addresses are specified in a command line or in a profile parameter such
as TCP_ADDRESS. However, when the IP address and port are specified in the IPv4
address:service or port format, then the format must be changed to service or
port@<IP address> if the IP address is specified in the IPv6 notation. If a dotted
decimal IPv4 address, the traditional format can still be used.
The specification of IPv6 addresses assumes that Data Protection for SAP HANA is
used in an environment in which IPv6 is supported by all hardware and software
components.
How to find files that contain message output and log files
Data Protection for SAP processes are recorded in log files. Information about
backup operations can be used to determine which backup should be used to
restore your data.
Data Protection for SAP HANA records data in 2 log files that can be used during
troubleshooting.
backup.log
backint.log
Both log files can be opened through the SAP HANA Studio menu options Open
Perspectives > Administration Console.
The backup.log log file records the start and finish of backup and restore
operations. The success or failure of the operations is also recorded. All SAP
HANA node details in a scale-out environment are stored in a single backup.log
log file.
The backint.log log file contains the Tivoli Storage Manager for ERP data for all
database and redo log file backup and restore operations that complete successfully
or fail.
42 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Setup requirements
When you are troubleshooting issues while using Data Protection for SAP HANA
there are items that you can check to ensure that the setup completed correctly.
Ensure that the Data Protection for SAP HANA installation setup is correct by
reviewing the following list:
v Make sure an entry similar to this example is defined in the /etc/inittab file:
tdph:2345:respawn:/opt/tivoli/tsm/tdp_hana/prole -p tdphana
The purpose of this entry is to start a daemon process for ProLE, and to verify
that the process is running. This process listens to activity on the Data Protection
for SAP HANA port. The name of the port must match the name in the
/etc/services file as shown in this example:
tdphana 57321/tcp #TDP for SAP HANA
The lines are added to the /etc/services file during the installation process. If
there are conflicts with existing entries, the port number must be changed to any
unused number.
v Make sure that all the files are installed by running this command:
rpm -V TIV-TSMERP-HANA
If the command returns no output, all files are found. Otherwise, a list of
missing files is returned in the output.
v On one host, make sure that the Data Protection for SAP HANA profile
initSID.utl and configuration file initSID.bki are in the /usr/sap/SID/SYS/
global/hdb/opt/hdbconfig/ directory.
v Make sure that /usr/sap/SID/SYS/global/hdb/opt/hdbbackint link exists and
points to /opt/tivoli/tsm/tdp_hana/hdbbackint.
The names of the Tivoli Storage Manager servers that are specified in initSID.utl
must match the names in the dsm.sys file. If the Tivoli Storage Manager API or
Tivoli Storage Manager backup archive client are installed into their default
locations, then it is not necessary to set the DSMI_* variables. If the variables are
set, however, make sure that they specify the correct directories and files. The user
ID that runs the backups must have the correct permissions to access all of files
and directories that are specified by these variables. Also, verify that write
permissions exist for the initSID.bki file as this file is the only one to which Data
Protection for SAP HANA writes persistent information.
Chapter 7. Troubleshooting 43
v The change history of the system components (if the process worked
previously).
More information might also be requested from the service representative.
44 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Chapter 8. Reference information
Data Protection for SAP HANA reference information such as versioning and
profile information is provided.
Versioning
When Tivoli Storage Manager for ERP versioning is active (as defined by the
MAX_VERSIONS keyword), version information is stored on the Tivoli Storage
Manager Server. The version number is increased only after successful backups.
46 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Manager server. This keyword must not be set when automated password
handling is selected. It is to be set for manual password-handling.
BACKUPIDPREFIX 6-charstring | SAP___
Specifies a six-character prefix that is used to create a backup identifier for
each archived object. If not specified, the default value is SAP___.
BRARCHIVEMGTCLASS management_class [management_class...]
Specifies the Tivoli Storage Manager management classes that Tivoli
Storage Manager for ERP uses when called from BRARCHIVE. Each
parameter string can consist of up to 30 characters. Specify a separate
BRARCHIVEMGTCLASS for each log file copy requested. As a result, make sure
the number of different BRARCHIVE management classes that are
specified must be greater than or equal to the number of redo log copies .
This parameter must be defined with the respective SERVER statement, as
shown in the sample profile.
To use different Tivoli Storage Manager servers for backup and archive
data, the value “:SKIP:” can be used to define a server stanza with no
archive management classes. This value is allowed for the parameter
BRARCHIVEMGTCLASS only.
BRBACKUPMGTCLASS management_class [management_class...]
Specifies the Tivoli Storage Manager management classes Tivoli Storage
Manager for ERP uses The parameter string can consist of up to 30
characters. This parameter must be defined with the respective SERVER
statement, as shown in the sample profile.
BUFFCOPY SIMPLE|PREVENT|AUTO
This optional parameter controls how Tivoli Storage Manager for ERP uses
the internal buffers for transferring data during a backup. If set to SIMPLE,
data buffers are copied when they are sent between Tivoli Storage Manager
components. This option is the default. If set to PREVENT, the original data
buffers are sent between Tivoli Storage Manager components. For this
mode, BUFFSIZE is restricted to a maximum of 896 KB. Furthermore, it
cannot be selected when the Tivoli Storage Manager client encryption or
client compression features are activated. If set to AUTO, Tivoli Storage
Manager for ERP runs in PREVENT mode whenever the configuration
supports it. Otherwise, SIMPLE mode is automatically selected. This
parameter has no effect on restore operations.
BUFFSIZE n|131072
The size of the buffers sent to the Tivoli Storage Manager API is the value
of BUFFSIZE increased by approximately 20 bytes. The valid range is 4096
(4 KB) - 32 MB. Inappropriate values are adjusted automatically. If
BUFFCOPY is set to PREVENT, the value of BUFFSIZE must not exceed 896 KB.
CONFIG_FILE path/initSID.bki
Specifies the configuration file initSID.bki for Tivoli Storage Manager for
ERP to store all variable parameters such as passwords and the date of the
last password change. This parameter is required.
END Specifies the end of the parameter definitions. Tivoli Storage Manager for
ERP stops searching the file for keywords when END is encountered.
FRONTEND pgmname [parameterlist]
Specifies a program pgmname that is called by Tivoli Storage Manager for
ERP in a backup run before the connection to the Tivoli Storage Manager
48 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
not specified, the default value is NO meaning null block compression is not
done. RL_COMPRESSION is only performed if a full database backup was
started. The offline log files are not compressed.
SERVER servername
This keyword specifies the name of the Tivoli Storage Manager server to
which Tivoli Storage Manager for ERP backups are to be stored. This
statement begins a server section in the Tivoli Storage Manager for ERP
profile. At least one server section is required. Server sections are at the
end of the profile. A server section ends before a following SERVER
keyword, before the END keyword, or at the end of the profile. These
dependent keywords are applicable in a server section:
v ADSMNODE
v BRARCHIVEMGTCLASS
v BRBACKUPMGTCLASS
v PASSWORDREQUIRED
v SESSIONS
v TCP_ADDRESS
v USE_AT
The server name must be defined in the Tivoli Storage Manager profile
dsm.sys. To set up alternate or parallel paths, each path is denoted by its
own logical server name and corresponding server section, although these
logical names refer to the same server. In this case, the Tivoli Storage
Manager profiles specify the same TCP/IP address for these server names.
To set up alternate or parallel servers, each server is represented by one or
more server statements and the corresponding server sections (depending
on the number of paths to the server). In this case, the Tivoli Storage
Manager profiles specify different TCP/IP addresses for the different
servers.
SESSIONS n|1
The n value specifies the number of parallel sessions Tivoli Storage
Manager for ERP uses for the server. This keyword is required in every
server section. This parameter must be defined with the respective SERVER
statement, as shown in the sample profile.
TRACE FILEIO_MIN | FILEIO_MAX | COMPR_MIN | COMPR_MAX |
MUX_MIN | MUX_MAX | TSM_MIN | TSM_MAX | ASYNC_MIN |
ASYNC_MAX | APPLICATION_MIN | APPLICATION_MAX | SYSCALL_MIN
| SYSCALL_MAX | COMM_MIN | COMM_MAX | DEADLOCK_MIN |
DEADLOCK_MAX | PROLE_MIN | PROLE_MAX | BLAPI_MIN |
BLAPI_MAX | SOCKET_DATA | ALL | OFF
This parameter writes trace information to the file specified with the
TRACEFILE parameter. Arguments to TRACE can be any combination of the
possible components and levels that are separated by spaces. A trace is
written only if both TRACE and TRACEFILE are specified. Do not use this
parameter unless instructed to use it by Tivoli Storage Manager for ERP
support. Using it can significantly deteriorate the performance of Tivoli
Storage Manager for ERP.
TRACEFILE path
Specifies the name and location of the trace file for Tivoli Storage Manager
for ERP to store all trace information. When TRACE is used, path specifies
the full path and the name of file. If the value of TRACEFILE contains the
string %BID, this string is replaced by the backup ID to get the path and
name of the trace file used. For example, specifying /tmp/%BID.trace yields
Sample Tivoli Storage Manager for ERP SAP HANA profile for
UNIX or Linux
The sample profile file (initSID.utl) is included in the Tivoli Storage Manager for
ERP SAP HANA installation package.
#--------------------------------------------------------------------------
#
# IBM Tivoli Storage Manager for Enterprise Resource Planning
#
# Data Protection for SAP HANA (R)
#
# Sample profile for Data Protection for SAP HANA (R)
#
#--------------------------------------------------------------------------
#
# See the ’Data Protection for SAP HANA (R) Installation &
# User’s Guide’ for a full description.
#
# For a comment symbol the character ’#’ can be used.
# Everything following this character will be interpreted as comment.
#
# Data Protection for SAP HANA (R) accesses its profile
# in "read only" mode. All variable parameters will be written into the file
# specified with the CONFIG_FILE parameter. The passwords will be encrypted.
#--------------------------------------------------------------------------
# Prefix of the ’Backup ID’ which will be stored in the description field
# of the Tivoli Storage Manager archive function.
# If this parameter is not specified then the SID of the SAP HANA (R)
# instance will be used to prefix the backup ID by default. The value of
# this parameter does overrule the default behaviour.
# Must be exactly 6 characters.
# Default: none.
#--------------------------------------------------------------------------
#BACKUPIDPREFIX SID___
#--------------------------------------------------------------------------
# Number of parallel sessions to be established.
# Note: This number must not exceed the number of tape drives simultaneously
# available to the node on the Tivoli Storage Manager servers to be accessed.
# The valid range of MAX_SESSIONS is from 1 and 32.
# Default: none.
#--------------------------------------------------------------------------
MAX_SESSIONS 1 # Tivoli Storage Manager client sessions
#--------------------------------------------------------------------------
# Number of parallel sessions to be established for the database backup.
50 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
# Note: This number must not exceed the number of tape drives simultaneously
# available to the node for a database backup on the Tivoli Storage Manager
# servers to be accessed.
# The valid range of MAX_BACK_SESSIONS is from 1 to 32.
# Default: MAX_SESSIONS.
#--------------------------------------------------------------------------
#MAX_BACK_SESSIONS 1 # Tivoli Storage Manager client sessions for backup
#--------------------------------------------------------------------------
# Number of parallel sessions to be established for the redo log backup.
# Note: This number must not exceed the number of tape drives simultaneously
# available to the node for a redo log backup on the Tivoli Storage Manager
# servers to be accessed.
# The valid range of MAX_ARCH_SESSIONS is from 1 to 32.
# Default: MAX_SESSIONS.
#--------------------------------------------------------------------------
#MAX_ARCH_SESSIONS 1 # Tivoli Storage Manager client sessions for archive
#--------------------------------------------------------------------------
# Number of parallel sessions to be established for the restore of files.
# Note: This number must not exceed the number of tape drives simultaneously
# available to the node for restore processing backup on the Tivoli Storage
# Manager servers to be accessed.
# The valid range of MAX_RESTORE_SESSIONS is from 1 to 32.
# Default: MAX_SESSIONS.
#--------------------------------------------------------------------------
#MAX_RESTORE_SESSIONS 1 # Tivoli Storage Manager client sessions for restore
#--------------------------------------------------------------------------
# Number of backup copies of redo logs.
# The valid range of REDOLOG_COPIES is from 1 to 9.
# Default: 1.
#--------------------------------------------------------------------------
#REDOLOG_COPIES 2
#--------------------------------------------------------------------------
# Specifies whether a null block compression of the data is to be performed
# before transmission to Tivoli Storage Manager.
# Although RL compression introduces additional CPU load, throughput can be
# improved when the network is the bottleneck. RL compression in Data
# Protection for SAP HANA (R) should not be used together with
# Tivoli Storage Manager API compression.
# Default: NO
#--------------------------------------------------------------------------
#RL_COMPRESSION YES
#--------------------------------------------------------------------------
# Specifies how many files are read simultaneously and are multiplexed into
# one data stream to a Tivoli Storage Manager server. Multiplexing is usefull
# when the data rate to a Tivoli Storage Manager server is higher (fast
# tapes, fast network) than the I/O rate of a single disk.
# The valid range of MULTIPLEXING is from 1 to 8.
# Default: 1 (meaning no multiplexing)
#--------------------------------------------------------------------------
#MULTIPLEXING 2
#--------------------------------------------------------------------------
# Specifies the block size for disk I/O (in bytes).
# The default values have been chosen from our performance experiments in
# standard hardware environments.
# The valid range of BUFFSIZE is from 4KB to 32MB.
#--------------------------------------------------------------------------
# This optional parameter controls how Data Protection for SAP (R) HANA uses
# the internal buffers for transferring data during a backup.
# Valid values: SIMPLE | PREVENT | AUTO
# Default: SIMPLE
#--------------------------------------------------------------------------
#BUFFCOPY AUTO
#--------------------------------------------------------------------------
# Name of a program to be called before the backup task is started.
# Default: none.
#--------------------------------------------------------------------------
#FRONTEND pgmname parameterlist
#--------------------------------------------------------------------------
# Name of a program to be called after the backup task is completed.
# Default: none.
#--------------------------------------------------------------------------
#BACKEND pgmname parameterlist
#--------------------------------------------------------------------------
# Control of information for reporting purposes, e.g. messages, statistics.
# Default: NO (no additional data will be reported).
#--------------------------------------------------------------------------
#REPORT NO # no additional messages
#REPORT YES # all additional messages
#REPORT 2 # all additional messages + summary
#--------------------------------------------------------------------------
# Controls generation of a trace file.
# Note: we recommend using the trace function only in cooperation with
# Data Protection for SAP (R) HANA support.
# Default: OFF.
#--------------------------------------------------------------------------
#TRACE OFF
#--------------------------------------------------------------------------
# The full path of the trace file.
# Note: for an actual trace the string ’%BID’ will be replaced by
# the current backupid. Furthermore the current hostname, a time stamp and
# the process name will be appended. (.../backup_%BID.trace changes to
# .../backup_SAP___9809182300.trace.mizar.20130731134735.4226.backint).
# Default: none.
#--------------------------------------------------------------------------
#TRACEFILE /usr/sap/SID/home/backup.trace
#TRACEFILE /usr/sap/SID/home/backup_%BID.trace
#--------------------------------------------------------------------------
# Denotes the maximum size of the trace file in KB.
# If not specified, the trace file size is unlimited.
#--------------------------------------------------------------------------
#TRACEMAX max size # trace file size in KB
#--------------------------------------------------------------------------
# Specify the full path of the configuration file.
# Default: none.
52 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
#--------------------------------------------------------------------------
CONFIG_FILE CONFIGDIR/initSID.bki
#--------------------------------------------------------------------------
# Denotes if Data Protection for SAP (R) HANA shall send error/status
# information to a Tivoli Storage Manager server.
# The servername must match one of the servers listed in a SERVER statement.
# Valid values for verbosity are ERROR | WARNING | DETAIL.
# Default: none.
#--------------------------------------------------------------------------
#LOG_SERVER servername [verbosity]
#LOG_SERVER server_a ERROR
#--------------------------------------------------------------------------
#**************************************************************************
# Statement for servers and paths.
# Multiple servers may be defined.
#**************************************************************************
#--------------------------------------------------------------------------
# End of profile
END
Procedure
v Review the out put samples for dsm.opt, the include/exclude statement, and
dsm.sys.
v Use the planning sheet to help you plan the installation parameters for Data for
SAP HANA.
SErvername server_a
COMMmethod TCPip
TCPPort 1500
TCPServeraddress 192.168.1.1
TCPBuffsize 32
TCPWindowsize 24
Compression Yes
InclExcl /opt/tivoli/tsm/client/ba/bin/hana_inclexcl.list
SErvername server_b
COMMmethod TCPip
TCPPort 1500
TCPServeraddress 192.168.1.2
TCPBuffsize 32
TCPWindowsize 24
Compression Yes
InclExcl /opt/tivoli/tsm/client/ba/bin/hana_inclexcl.list
54 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Client user options file sample (dsm.opt) UNIX or Linux
************************************************************************
* IBM Tivoli Storage Manager *
* *
* Sample Client User Options file for Unix platforms *
************************************************************************
SErvername server_a
Data Protection for SAP planning sheet for the base product
Use the planning sheet to assist you when you are installing and configuring Data
Protection for SAP HANA.
Collect the information in this planning sheet before you install Data Protection for
SAP HANA.
Table 3. Installation parameters for Data Protection for SAP HANA
Linux Installation parameter
X Database SID.
X Database instance number.
X Password of database user SYSTEM.
X Tivoli Storage Manager server name or IP address.
Tivoli Storage Manager node name: Tivoli Storage Manager node that is configured on the Tivoli Storage
X Manager server that is named for the backup of the SID previously listed. In a scale-out environment,
there can be multiple Tivoli Storage Manager node names required.
Tivoli Storage Manager management classes for database and redo log backups. Management classes that
X
are configured for the database backup and for the backup of redo logs.
Path where the Tivoli Storage Manager API are in (contents of environment variable DSMI_DIR):
X
Default: C:\Program Files\Common Files\tivoli\TSM\api64
X Path to client option file of Tivoli Storage Manager (contents of environment variable DSMI_CONFIG).
Path to Tivoli Storage Manager log files (contents of environment variable DSMI_LOG): The Tivoli Storage
X Manager API creates the file dsierror.log in this path.
Default: C:\temp
You can use forums, wikis, and other social media tools to ask questions, talk to
experts, and learn from others.
User groups
Tivoli Global Storage Virtual User Group
Access this user group at http://www.tivoli-ug.org/storage.
This group makes it possible for individuals from many different industries
and types of organizations to share information and work directly with the
IBM product experts. Local chapters also exist where members meet in
person to share experiences and hear from guest speakers.
ADSM.ORG
Access this mailing list at http://adsm.org.
This independently managed Storage Management discussion forum
started when Tivoli Storage Manager was known as ADSTAR Distributed
Storage Manager (ADSM). The members of this forum have many years of
experience with Tivoli Storage Manager in almost every type of IT
environment.
To subscribe to the forum, send an email to listserv@vm.marist.edu. The
body of the message must contain the following text: SUBSCRIBE ADSM-L
your_first_name your_family_name.
Find the latest best practices, white papers, and links to videos and other
resources. When you log on, you can comment on content, or contribute your own
content.
Learn from technical experts who share their knowledge and then answer your
questions. The sessions are designed to address specific technical issues and
provide in-depth but narrowly focused training.
Use these education resources to help you increase your Tivoli Storage Manager
skills:
Tivoli Education and Certification website
View available education at http://www.ibm.com/software/tivoli/
education.
Use the Search for Training link to find local and online offerings of
instructor-led courses for Tivoli Storage Manager.
Education Assistant
Access resources at http://www.ibm.com/support/knowledgecenter/
tivoli_iea.
Scroll to view the list of available training videos. Recorded product
demonstrations are also available on a YouTube channel.
58 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Searching knowledge bases
If a problem occurs while you are using one of the Tivoli Storage Manager family
of products, you can search several knowledge bases.
Sign in using your IBM ID and password if you want to customize the site based
on your product usage and information needs. If you do not already have an IBM
ID and password, click Sign in at the top of the page and follow the instructions
to register.
IBM Support Assistant helps you gather support information when you must open
a problem management record (PMR), which you can then use to track the
problem. The product-specific plug-in modules provide you with the following
resources:
v Support links
v Education links
v Ability to submit problem management reports
You can find more information and download the IBM Support Assistant web page
at http://www.ibm.com/software/support/isa.
You can also install the stand-alone IBM Support Assistant application on any
workstation. You can then enhance the application by installing product-specific
plug-in modules for the IBM products that you use. Find add-ons for specific
products at http://www.ibm.com/support/docview.wss?uid=swg27012689.
Procedure
Determine what fixes are available by checking the IBM software support website
at http://www.ibm.com/support/entry/portal/.
If you previously customized the site based on your product usage:
1. Click the link for the product, or a component for which you want to
find a fix.
2. Click Downloads, and then click Search for recommended fixes.
If you have not previously customized the site:
Click Downloads and search for the product.
Procedure
1. From the support page at http://www.ibm.com/support/entry/portal/, click
Sign in and sign in using your IBM ID and password. If you do not have an
ID and password, click register now and complete the registration process.
2. Click Manage all my subscriptions in the Notifications pane.
3. Click the Subscribe tab, and then click Tivoli.
4. Select the products for which you want to receive notifications and click
Continue.
5. Specify your notification preferences and click Submit.
Procedure
1. Ensure that you have completed the following prerequisites:
a. Set up a subscription and support contract.
b. Determine the business impact of the problem.
c. Describe the problem and gather background information.
2. Follow the instructions in “Submitting the problem to IBM Software Support”
on page 62.
60 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Setting up and managing support contracts
You can set up and manage your Tivoli support contracts by enrolling in IBM
Passport Advantage®. The type of support contract that you need depends on the
type of product you have.
Procedure
62 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Appendix B. Accessibility features for the Tivoli Storage
Manager product family
Accessibility features help users who have a disability, such as restricted mobility
or limited vision to use information technology products successfully.
Accessibility features
The IBM Tivoli Storage Manager family of products includes the following
accessibility features:
v Keyboard-only operation using standard operating-system conventions
v Interfaces that support assistive technology such as screen readers
The command-line interfaces of all products in the product family are accessible.
The Operations Center and the Tivoli Storage Manager Server can be installed in
console mode, which is accessible.
The IBM Knowledge Center is enabled for accessibility. Read about the accessibility
features online at http://www.ibm.com/support/knowledgecenter/doc/
kc_help.html#accessibility.
Vendor software
The Tivoli Storage Manager product family includes certain vendor software that is
not covered under the IBM license agreement. IBM makes no representation about
the accessibility features of these products. Contact the vendor for the accessibility
information about its products.
This material may be available from IBM in other languages. However, you may be
required to own a copy of the product or product version in that language in order
to access it.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who want to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758
U.S.A.
The licensed program described in this information and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement, or any equivalent agreement
between us.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
66 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or
imply reliability, serviceability, or function of these programs. The sample
programs are provided "AS IS", without warranty of any kind. IBM shall not be
liable for any damages arising out of your use of the sample programs.
Each copy or any portion of these sample programs or any derivative work, must
include a copyright notice as follows: © (your company name) (year). Portions of
this code are derived from IBM Corp. Sample Programs. © Copyright IBM Corp.
_enter the year or years_.
If you are viewing this information in softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the web at "Copyright and
trademark information" at http://www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
and/or other countries.
Java™ and all Java based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
This Software Offering does not use cookies or other technologies to collect
personally identifiable information.
Notices 67
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, see IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details in the
section entitled “Cookies, Web Beacons and Other Technologies,” and the “IBM
Software Products and Software-as-a-Service Privacy Statement” at
http://www.ibm.com/software/info/product-privacy.
68 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Glossary
This glossary provides terms and definitions for backup data. See also server storage,
Tivoli Storage Manager, Tivoli Storage FlashCopy storage pool, storage pool volume.
Manager, and associated products.
active file system
A file system to which space management
The following cross-references are used in this
has been added. With space management,
glossary:
tasks for an active file system include
v See refers you from a nonpreferred term to the automatic migration, reconciliation,
preferred term or from an abbreviation to the selective migration, and recall. See also
spelled-out form. inactive file system.
v See also refers you to a related or contrasting
active policy set
term.
The activated policy set that contains the
policy rules currently in use by all client
For other terms and definitions, see the IBM
nodes assigned to the policy domain. See
Terminology website at www.ibm.com/software/
also policy domain, policy set.
globalization/terminology.
active version
The most recent backup copy of a file
A stored. The active version of a file cannot
absolute mode be deleted until a backup process detects
In storage management, a backup that the user has either replaced the file
copy-group mode that specifies that a file with a newer version or has deleted the
is considered for incremental backup even file from the file server or workstation.
if the file has not changed since the last See also backup version, inactive version.
backup. See also mode, modified mode. activity log
access control list (ACL) A log that records normal activity
In computer security, a list associated messages that are generated by the server.
with an object that identifies all the These messages include information about
subjects that can access the object and server and client operations, such as the
their access rights. start time of sessions or device I/O errors.
70 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
automounter daemon. The automounter
daemon monitors a specified directory
path, and automatically mounts the file
system to access data.
B
backup-archive client
A program that runs on a workstation or
file server and provides a means for users
to back up, archive, restore, and retrieve
files. See also administrative client.
backup copy group
A policy object containing attributes that
control the generation, destination, and
expiration of backup versions of files. A
backup copy group belongs to a
management class. See also copy group.
backup retention grace period
The number of days the storage manager
retains a backup version after the server
is unable to rebind the file to an
appropriate management class.
backup set
A portable, consolidated group of active
versions of backup files that are generated
for a backup-archive client.
backup set collection
A group of backup sets that are created at
the same time and which have the same
backup set name, volume names,
description, and device classes. The server
identifies each backup set in the collection
by its node name, backup set name, and
file type.
backup version
A file or directory that a client node
backed up to storage. More than one
backup version can exist in storage, but
only one backup version is the active
version. See also active version, copy
group, inactive version.
bind To associate a file with a management
class name. See also archive-retention
grace period, management class, rebind.
Glossary 71
the server and used on client nodes in
C conjunction with client options files.
cache To place a duplicate copy of a file on client options file
random access media when the server An editable file that identifies the server
migrates a file to another storage pool in and communication method, and
the hierarchy. provides the configuration for backup,
cache file archive, hierarchical storage management,
A snapshot of a logical volume created by and scheduling.
Logical Volume Snapshot Agent. Blocks client-polling scheduling mode
are saved immediately before they are A method of operation in which the client
modified during the image backup and queries the server for work. See also
their logical extents are saved in the cache server-prompted scheduling mode.
files.
client schedule
CAD See client acceptor daemon. A database record that describes the
central scheduler planned processing of a client operation
A function that permits an administrator during a specific time period. The client
to schedule client operations and operation can be a backup, archive,
administrative commands. The operations restore, or retrieve operation, a client
can be scheduled to occur periodically or operating system command, or a macro.
on a specific date. See also administrative See also administrative command
command schedule, client schedule. schedule, central scheduler, schedule.
72 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
closed registration copy backup
A registration process in which only an A full backup in which the transaction log
administrator can register workstations as files are not deleted so that backup
client nodes with the server. See also open procedures that use incremental or
registration. differential backups are not disrupted.
collocation copy group
The process of keeping all data belonging A policy object containing attributes that
to a single-client file space, a single client control how backup versions or archive
node, or a group of client nodes on a copies are generated, where backup
minimal number of sequential-access versions or archive copies are initially
volumes within a storage pool. located, and when backup versions or
Collocation can reduce the number of archive copies expire. A copy group
volumes that must be accessed when a belongs to a management class. See also
large amount of data must be restored. archive copy group, backup copy group,
backup version,management class.
collocation group
A user-defined group of client nodes copy storage pool
whose data is stored on a minimal A named set of volumes that contain
number of volumes through the process copies of files that reside in primary
of collocation. storage pools. Copy storage pools are
used only to back up the data that is
commit point
stored in primary storage pools. A copy
A point in time when data is considered
storage pool cannot be a destination for a
to be consistent.
backup copy group, an archive copy
communication method group, or a management class (for
The method by which a client and server space-managed files). See also destination,
exchange information. See also primary storage pool, server storage,
Transmission Control Protocol/Internet storage pool, storage pool volume.
Protocol.
communication protocol D
A set of defined interfaces that permit
computers to communicate with each daemon
other. A program that runs unattended to
perform continuous or periodic functions,
compression such as network control.
A function that removes repetitive
characters, spaces, strings of characters, or damaged file
binary data from the data being processed A physical file in which read errors have
and replaces characters with control been detected.
characters. Compression reduces the database backup series
amount of storage space that is required One full backup of the database, plus up
for data. to 32 incremental backups made since
configuration manager that full backup. Each full backup that is
A server that distributes configuration run starts a new database backup series.
information, such as policies and A number identifies each backup series.
schedules, to managed servers according See also database snapshot, full backup.
to their profiles. Configuration database snapshot
information can include policy and A complete backup of the entire database
schedules. See also enterprise to media that can be taken off-site. When
configuration, managed server, profile. a database snapshot is created, the current
conversation database backup series is not interrupted.
A connection between two programs over A database snapshot cannot have
a session that allows them to incremental database backups associated
communicate with each other while with it. See also database backup series,
processing a transaction. See also session. full backup.
Glossary 73
data center out-of-space condition on a file system for
In a virtualized environment, a container which hierarchical storage management
that holds hosts, clusters, networks, and (HSM) is active. Files are migrated to
data stores. server storage until space usage drops to
the low threshold that was set for the file
data deduplication
system. If the high threshold and low
A method of reducing storage needs by
threshold are the same, one file is
eliminating redundant data. Only one
migrated. See also automatic migration,
instance of the data is retained on storage
selective migration, threshold migration.
media. Other instances of the same data
are replaced with a pointer to the retained desktop client
instance. The group of backup-archive clients that
includes clients on Microsoft Windows,
data manager server
Apple, and Novell NetWare operating
A server that collects metadata
systems.
information for client inventory and
manages transactions for the storage destination
agent over the local area network. The A copy group or management class
data manager server informs the storage attribute that specifies the primary storage
agent with applicable library attributes pool to which a client file will be backed
and the target volume identifier. up, archived, or migrated. See also copy
storage pool.
data mover
A device that moves data on behalf of the device class
server. A network-attached storage (NAS) A named set of characteristics that are
file server is a data mover. applied to a group of storage devices.
Each device class has a unique name and
data storage-management application-
represents a device type of disk, file,
programming interface (DSMAPI)
optical disk, or tape.
A set of functions and semantics that can
monitor events on files, and manage and device configuration file
maintain the data in a file. In an HSM 1. For a storage agent, a file that contains
environment, a DSMAPI uses events to the name and password of the storage
notify data management applications agent, and information about the
about operations on files, stores arbitrary server that is managing the
attribute information with a file, supports SAN-attached libraries and drives that
managed regions in a file, and uses the storage agent uses.
DSMAPI access rights to control access to
2. For a server, a file that contains
a file object.
information about defined device
data store classes, and, on some servers, defined
In a virtualized environment, the location libraries and drives. The information
where virtual machine data is stored. is a copy of the device configuration
information in the database.
deduplication
The process of creating representative disaster recovery manager (DRM)
records from a set of records that have A function that assists in preparing and
been identified as representing the same using a disaster recovery plan file for the
entities. server.
default management class disaster recovery plan
A management class that is assigned to a A file that is created by the disaster
policy set. This class is used to govern recover manager (DRM) that contains
backed up or archived files when a file is information about how to recover
not explicitly associated with a specific computer systems if a disaster occurs and
management class through the scripts that can be run to perform some
include-exclude list. recovery tasks. The file includes
information about the software and
demand migration
The process that is used to respond to an
74 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
hardware that is used by the server, and failure of an operation, a user action, or
the location of recovery media. the change in state of a process. See also
enterprise logging, receiver.
domain
A grouping of client nodes with one or event record
more policy sets, which manage data or A database record that describes actual
storage resources for the client nodes. See status and results for events.
also policy domain.
event server
DRM See disaster recovery manager. A server to which other servers can send
events for logging. The event server
DSMAPI
routes the events to any receivers that are
See data storage-management
enabled for the sending server's events.
application-programming interface.
exabyte (EB)
dynamic serialization
For processor, real and virtual storage
Copy serialization in which a file or
capacities and channel volume, 2 to the
folder is backed up or archived on the
power of 60 or 1 152 921 504 606 846 976
first attempt regardless of whether it
bytes. For disk storage capacity and
changes during a backup or archive. See
communications volume, 1 000 000 000
also shared dynamic serialization, shared
000 000 000 bytes.
static serialization, static serialization.
exclude
The process of identifying files in an
E include-exclude list. This process prevents
EA See extended attribute. the files from being backed up or
migrated whenever a user or schedule
EB See exabyte. enters an incremental or selective backup
EFS See Encrypted File System. operation. A file can be excluded from
backup, from space management, or from
Encrypted File System (EFS) both backup and space management.
A file system that uses file system-level
encryption. exclude-include list
See include-exclude list.
enterprise configuration
A method of setting up servers so that the expiration
administrator can distribute the The process by which files, data sets, or
configuration of one of the servers to the objects are identified for deletion because
other servers, using server-to-server their expiration date or retention period
communication. See also configuration has passed.
manager, managed server, profile, expiring file
subscription. A migrated or premigrated file that has
enterprise logging been marked for expiration and removal
The process of sending events from a from storage. If a stub file or an original
server to a designated event server. The copy of a premigrated file is deleted from
event server routes the events to a local file system, or if the original copy
designated receivers, such as to a user of a premigrated file is updated, the
exit. See also event. corresponding migrated or premigrated
file is marked for expiration the next time
error log reconciliation is run.
A data set or file that is used to record
error information about a product or extend
system. To increase the portion of available space
that can be used to store database or
estimated capacity recovery log information.
The available space, in megabytes, of a
storage pool. extended attribute (EA)
Names or value pairs that are associated
event An occurrence of significance to a task or with files or directories. There are three
system. Events can include completion or
Glossary 75
classes of extended attributes: user management support that is required. If
attributes, system attributes, and trusted no space management support is
attributes. required, the operation is passed to the
operating system, which performs its
external library
normal functions. The file system
A collection of drives that is managed by
migrator is mounted over a file system
the media-management system other than
when space management is added to the
the storage management server.
file system.
file system state
F The storage management mode of a file
file access time system that resides on a workstation on
On AIX, UNIX, or Linux systems, the which the hierarchical storage
time when the file was last accessed. management (HSM) client is installed. A
file system can be in one of these states:
file age native, active, inactive, or global inactive.
For migration prioritization purposes, the
number of days since a file was last frequency
accessed. A copy group attribute that specifies the
minimum interval, in days, between
file device type incremental backups.
A device type that specifies the use of
sequential access files on disk storage as FSID See file space ID.
volumes. FSM See file system migrator.
file server full backup
A dedicated computer and its peripheral The process of backing up the entire
storage devices that are connected to a server database. A full backup begins a
local area network that stores programs new database backup series. See also
and files that are shared by users on the database backup series, database
network. snapshot, incremental backup.
file space fuzzy backup
A logical space in server storage that A backup version of a file that might not
contains a group of files that have been accurately reflect what is currently in the
backed up or archived by a client node, file because the file was backed up at the
from a single logical partition, file system, same time as it was being modified.
or virtual mount point. Client nodes can
restore, retrieve, or delete their file spaces fuzzy copy
from server storage. In server storage, A backup version or archive copy of a file
files belonging to a single file space are that might not accurately reflect the
not necessarily stored together. original contents of the file because it was
backed up or archived the file while the
file space ID (FSID) file was being modified.
A unique numeric identifier that the
server assigns to a file space when it is
stored in server storage. G
file state GB See gigabyte.
The space management mode of a file
General Parallel File System (GPFS)
that resides in a file system to which
A high-performance shared-disk file
space management has been added. A file
system that can provide data access from
can be in one of three states: resident,
nodes in a clustered system environment.
premigrated, or migrated. See also
See also information lifecycle
migrated file, premigrated file, resident
management.
file.
gigabyte (GB)
file system migrator (FSM)
For processor storage, real and virtual
A kernel extension that intercepts all file
storage, and channel volume, 10 to the
system operations and provides any space
76 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
power of nine or 1,073,741,824 bytes. For
disk storage capacity and communications
volume, 1,000,000,000 bytes.
global inactive state
The state of all file systems to which
space management has been added when
space management is globally deactivated
for a client node.
Globally Unique Identifier (GUID)
An algorithmically determined number
that uniquely identifies an entity within a
system. See also Universally Unique
Identifier.
GPFS See General Parallel File System.
GPFS node set
A mounted, defined group of GPFS file
systems.
group backup
The backup of a group containing a list of
files from one or more file space origins.
GUID See Globally Unique Identifier.
H
hierarchical storage management (HSM)
A function that automatically distributes
and manages data on disk, tape, or both
by regarding devices of these types and
potentially others as levels in a storage
hierarchy that range from fast, expensive
devices to slower, cheaper, and possibly
removable devices. The objectives are to
minimize access time to data and
maximize available media capacity. See
also hierarchical storage management
client, recall, storage hierarchy.
hierarchical storage management client (HSM
client) A client program that works with the
server to provide hierarchical storage
management (HSM) for a system. See also
hierarchical storage management,
management class.
HSM See hierarchical storage management.
HSM client
See hierarchical storage management
client.
Glossary 77
systems. An inode contains the node,
I type, owner, and location of a file.
ILM See information lifecycle management. inode number
image A file system or raw logical volume that A number specifying a particular inode
is backed up as a single object. file in the file system.
image backup IP address
A backup of a full file system or raw A unique address for a device or logical
logical volume as a single object. unit on a network that uses the Internet
Protocol standard.
inactive file system
A file system for which space
management has been deactivated. See J
also active file system.
job file
inactive version A generated file that contains
A backup version of a file that is either configuration information for a migration
not the most recent backup version, or job. The file is XML format and can be
that is a backup version of a file that no created and edited in the hierarchical
longer exists on the client system. Inactive storage management (HSM) client for
backup versions are eligible for expiration Windows client graphical user interface.
processing according to the management See also migration job.
class assigned to the file. See also active
journal-based backup
version, backup version.
A method for backing up Windows clients
include-exclude file and AIX clients that exploits the change
A file containing statements to determine notification mechanism in a file to
the files to back up and the associated improve incremental backup performance
management classes to use for backup or by reducing the need to fully scan the file
archive. See also include-exclude list. system.
include-exclude list journal daemon
A list of options that include or exclude On AIX, UNIX, or Linux systems, a
selected files for backup. An exclude program that tracks change activity for
option identifies files that should not be files residing in file systems.
backed up. An include option identifies
journal service
files that are exempt from the exclusion
In Microsoft Windows, a program that
rules or assigns a management class to a
tracks change activity for files residing in
file or a group of files for backup or
file systems.
archive services. See also include-exclude
file.
incremental backup
K
The process of backing up files or KB See kilobyte.
directories, or copying pages in the
database, that are new or changed since kilobyte (KB)
the last full or incremental backup. See For processor storage, real and virtual
also selective backup. storage, and channel volume, 2 to the
power of 10 or 1,024 bytes. For disk
individual mailbox restore storage capacity and communications
See mailbox restore. volume, 1,000 bytes.
information lifecycle management (ILM)
A policy-based file-management system
for storage pools and file sets. See also
General Parallel File System.
inode The internal structure that describes the
individual files on AIX, UNIX, or Linux
78 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
local shadow volume
L Data that is stored on shadow volumes
LAN See local area network. localized to a disk storage subsystem.
LAN-free data movement LOFS See loopback virtual file system.
The movement of client data between a logical file
client system and a storage device on a A file that is stored in one or more server
storage area network (SAN), bypassing storage pools, either by itself or as part of
the local area network. an aggregate. See also aggregate, physical
LAN-free data transfer file, physical occupancy.
See LAN-free data movement. logical occupancy
leader data The space that is used by logical files in a
Bytes of data, from the beginning of a storage pool. This space does not include
migrated file, that are stored in the file's the unused space created when logical
corresponding stub file on the local file files are deleted from aggregate files, so it
system. The amount of leader data that is might be less than the physical
stored in a stub file depends on the stub occupancy. See also physical occupancy.
size that is specified. logical unit number (LUN)
library In the Small Computer System Interface
1. A repository for demountable (SCSI) standard, a unique identifier used
recorded media, such as magnetic to differentiate devices, each of which is a
disks and magnetic tapes. logical unit (LU).
2. A collection of one or more drives, logical volume
and possibly robotic devices A portion of a physical volume that
(depending on the library type), which contains a file system.
can be used to access storage volumes. logical volume backup
library client A back up of a file system or logical
A server that uses server-to-server volume as a single object.
communication to access a library that is Logical Volume Snapshot Agent (LVSA)
managed by another storage management Software that can act as the snapshot
server. See also library manager. provider for creating a snapshot of a
library manager logical volume during an online image
A server that controls device operations backup.
when multiple storage management loopback virtual file system (LOFS)
servers share a storage device. See also A file system that is created by mounting
library client. a directory over another local directory,
local also known as mount-over-mount. A
1. Pertaining to a device, file, or system LOFS can also be generated using an
that is accessed directly from a user automounter.
system, without the use of a LUN See logical unit number.
communication line. See also remote.
LVSA See Logical Volume Snapshot Agent.
2. For hierarchical storage management
products, pertaining to the destination
of migrated files that are being
moved. See also remote.
local area network (LAN)
A network that connects several devices
in a limited area (such as a single
building or campus) and that can be
connected to a larger network.
Glossary 79
storage for Tivoli Storage Manager servers
M that run on operating systems other than
macro file z/OS.
A file that contains one or more storage megabyte (MB)
manager administrative commands, For processor storage, real and virtual
which can be run only from an storage, and channel volume, 2 to the
administrative client using the MACRO 20th power or 1,048,576 bytes. For disk
command. See also Tivoli Storage storage capacity and communications
Manager command script. volume, 1,000,000 bytes.
mailbox restore metadata
A function that restores Microsoft Data that describes the characteristics of
Exchange Server data (from IBM Data data; descriptive data.
Protection for Microsoft Exchange
backups) at the mailbox level or migrate
mailbox-item level. To move data to another location, or an
application to another computer system.
managed object
A definition in the database of a managed migrated file
server that was distributed to the A file that has been copied from a local
managed server by a configuration file system to storage. For HSM clients on
manager. When a managed server UNIX or Linux systems, the file is
subscribes to a profile, all objects that are replaced with a stub file on the local file
associated with that profile become system. On Windows systems, creation of
managed objects in the database of the the stub file is optional. See also file state,
managed server. premigrated file, resident file, stub file.
80 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
is considered for incremental backup only storage (NAS) file server. Data for the
if it has changed since the last backup. A NAS node is transferred by a NAS file
file is considered a changed file if the server that is controlled by the network
date, size, owner, or permissions of the data management protocol (NDMP). A
file have changed. See also absolute NAS node is also called a NAS file server
mode, mode. node.
mount limit native file system
The maximum number of volumes that A file system that is locally added to the
can be simultaneously accessed from the file server and is not added for space
same device class. The mount limit management. The hierarchical storage
determines the maximum number of manager (HSM) client does not provide
mount points. See also mount point. space management services to the file
system.
mount point
A logical drive through which volumes native format
are accessed in a sequential access device A format of data that is written to a
class. For removable media device types, storage pool directly by the server. See
such as tape, a mount point is a logical also non-native data format.
drive associated with a physical drive. For
NDMP
the file device type, a mount point is a
See Network Data Management Protocol.
logical drive associated with an I/O
stream. See also mount limit. NetBIOS (Network Basic Input/Output System)
A standard interface to networks and
mount retention period
personal computers that is used on local
The maximum number of minutes that
area networks to provide message,
the server retains a mounted
print-server, and file-server functions.
sequential-access media volume that is
Application programs that use NetBIOS
not being used before it dismounts the
do not have to handle the details of LAN
sequential-access media volume.
data link control (DLC) protocols.
mount wait period
network-attached storage file server (NAS file
The maximum number of minutes that
server)
the server waits for a sequential-access
A dedicated storage device with an
volume mount request to be satisfied
operating system that is optimized for
before canceling the request.
file-serving functions. A NAS file server
MTU See maximum transmission unit. can have the characteristics of both a
node and a data mover.
N Network Basic Input/Output System
See NetBIOS.
Nagle algorithm
An algorithm that reduces congestion of Network Data Management Protocol (NDMP)
TCP/IP networks by combining smaller A protocol that allows a network
packets and sending them together. storage-management application to
control the backup and recovery of an
named pipe NDMP-compliant file server, without
A type of interprocess communication installing vendor-acquired software on
that permits message data streams to pass that file server.
between peer processes, such as between
a client and a server. network data-transfer rate
A rate that is calculated by dividing the
NAS file server total number of bytes that are transferred
See network-attached storage file server. by the data transfer time. For example,
NAS file server node this rate can be the time that is spent
See NAS node. transferring data over a network.
NAS node node A file server or workstation on which the
A client node that is a network-attached
Glossary 81
backup-archive client program has been contacting for space management services.
installed, and which has been registered For example, a stub file can be orphaned
to the server. when the client system-options file is
modified to contact a server that is
node name
different than the one to which the file
A unique name that is used to identify a
was migrated.
workstation, file server, or PC to the
server.
node privilege class
P
A privilege class that gives an packet In data communication, a sequence of
administrator the authority to remotely binary digits, including data and control
access backup-archive clients for a specific signals, that are transmitted and switched
client node or for all clients in a policy as a composite whole.
domain. See also privilege class.
page A defined unit of space on a storage
non-native data format medium or within a database volume.
A format of data that is written to a
storage pool that differs from the format partial-file recall mode
that the server uses for operations. See A recall mode that causes the hierarchical
also native format. storage management (HSM) function to
read just a portion of a migrated file from
storage, as requested by the application
O accessing the file.
offline volume backup password generation
A backup in which the volume is locked A process that creates and stores a new
so that no other system applications can password in an encrypted password file
access it during the backup operation. when the old password expires.
Automatic generation of a password
online volume backup
prevents password prompting.
A backup in which the volume is
available to other system applications path An object that defines a one-to-one
during the backup operation. relationship between a source and a
destination. Using the path, the source
open registration
accesses the destination. Data can flow
A registration process in which users can
from the source to the destination, and
register their workstations as client nodes
back. An example of a source is a data
with the server. See also closed
mover (such as a network-attached
registration.
storage [NAS] file server), and an
operator privilege class example of a destination is a tape drive.
A privilege class that gives an
pattern-matching character
administrator the authority to disable or
See wildcard character.
halt the server, enable the server, cancel
server processes, and manage removable physical file
media. See also privilege class. A file that is stored in one or more
storage pools, consisting of either a single
options file
logical file, or a group of logical files that
A file that contains processing options.
are packaged together as an aggregate.
See also client system-options file, client
See also aggregate, logical file, physical
user-options file.
occupancy.
originating file system
physical occupancy
The file system from which a file was
The amount of space that is used by
migrated. When a file is recalled, it is
physical files in a storage pool. This space
returned to its originating file system.
includes the unused space that is created
orphaned stub file when logical files are deleted from
A file for which no migrated file can be aggregates. See also logical file, logical
found on the server that the client node is occupancy, physical file.
82 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
plug-in primary storage pool
A separately installable software module A named set of volumes that the server
that adds function to an existing program, uses to store backup versions of files,
application, or interface. archive copies of files, and files migrated
from client nodes. See also copy storage
policy domain
pool, server storage, storage pool, storage
A grouping of policy users with one or
pool volume.
more policy sets, which manage data or
storage resources for the users. The users privilege class
are client nodes that are associated with A level of authority that is granted to an
the policy domain. See also active policy administrator. The privilege class
set, domain. determines which administrative tasks the
administrator can perform. See also
policy privilege class
authority, node privilege class, operator
A privilege class that gives an
privilege class, policy privilege class,
administrator the authority to manage
storage privilege class, system privilege
policy objects, register client nodes, and
class.
schedule client operations for client
nodes. Authority can be restricted to profile
certain policy domains. See also privilege A named group of configuration
class. information that can be distributed from a
configuration manager when a managed
policy set
server subscribes. Configuration
A group of rules in a policy domain. The
information can include registered
rules specify how data or storage
administrator IDs, policies, client
resources are automatically managed for
schedules, client option sets,
client nodes in the policy domain. Rules
administrative schedules, storage manager
can be contained in management classes.
command scripts, server definitions, and
See also active policy set, management
server group definitions. See also
class.
configuration manager, enterprise
premigrated file configuration, managed server.
A file that has been copied to server
profile association
storage, but has not been replaced with a
On a configuration manager, the defined
stub file on the local file system. An
relationship between a profile and an
identical copy of the file resides both on
object such as a policy domain. Profile
the local file system and in server storage.
associations define the configuration
Premigrated files occur on UNIX and
information that is distributed to a
Linux file systems to which space
managed server when it subscribes to the
management has been added. See also file
profile.
state, migrated file, resident file.
premigrated files database
A database that contains information
Q
about each file that has been premigrated quota
to server storage. 1. For HSM on AIX, UNIX, or Linux
premigration systems, the limit (in megabytes) on
The process of copying files that are the amount of data that can be
eligible for migration to server storage, migrated and premigrated from a file
but leaving the original file intact on the system to server storage.
local file system. 2. For HSM on Windows systems, a
premigration percentage user-defined limit to the space that is
A space management setting that controls occupied by recalled files.
whether the next eligible candidates in a
file system are premigrated following
threshold or demand migration.
Glossary 83
During the reconciliation process, data
R that is identified as no longer needed is
randomization removed.
The process of distributing schedule start recovery log
times for different clients within a A log of updates that are about to be
specified percentage of the schedule's written to the database. The log can be
startup window. used to recover from system and media
raw logical volume failures. The recovery log consists of the
A portion of a physical volume that is active log (including the log mirror) and
comprised of unallocated blocks and has archive logs.
no journaled file system (JFS) definition. register
A logical volume is read/write accessible To define a client node or administrator
only through low-level I/O functions. ID that can access the server.
rebind registry
To associate all backed-up versions of a A repository that contains access and
file with a new management class name. configuration information for users,
For example, a file that has an active systems, and software.
backup version is rebound when a later
version of the file is backed up with a remote
different management class association. For hierarchical storage management
See also bind, management class. products, pertaining to the origin of
migrated files that are being moved. See
recall To copy a migrated file from server also local.
storage back to its originating file system
using the hierarchical storage resident file
management client. See also selective On a Windows system, a complete file on
recall. a local file system that might also be a
migrated file because a migrated copy can
receiver exist in server storage. On a UNIX or
A server repository that contains a log of Linux system, a complete file on a local
server and client messages as events. For file system that has not been migrated or
example, a receiver can be a file exit, a premigrated, or that has been recalled
user exit, or the server console and from server storage and modified. See
activity log. See also event. also file state.
reclamation restore
The process of consolidating the To copy information from its backup
remaining data from many location to the active storage location for
sequential-access volumes onto fewer, use. For example, to copy information
new sequential-access volumes. from server storage to a client
reclamation threshold workstation.
The percentage of space that a retention
sequential-access media volume must The amount of time, in days, that inactive
have before the server can reclaim the backed-up or archived files are kept in the
volume. Space becomes reclaimable when storage pool before they are deleted.
files are expired or are deleted. Copy group attributes and default
reconciliation retention grace periods for the domain
The process of ensuring consistency define retention.
between the original data repository and retrieve
the larger system where the data is stored To copy archived information from the
for backup. Examples of larger systems storage pool to the workstation for use.
where the data is stored for backup are The retrieve operation does not affect the
storage servers or other storage systems. archive version in the storage pool. See
also archive.
84 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
root user selective recall
A system user who operates without The process of copying user-selected files
restrictions. A root user has the special from server storage to a local file system.
rights and privileges needed to perform See also recall, transparent recall.
administrative tasks.
serialization
The process of handling files that are
S modified during backup or archive
processing. See also shared dynamic
SAN See storage area network. serialization, shared static serialization,
schedule static serialization.
A database record that describes client server A software program or a computer that
operations or administrative commands to provides services to other software
be processed. See also administrative programs or other computers. See also
command schedule, client schedule. client.
scheduling mode server options file
The type of scheduling operation for the A file that contains settings that control
server and client node that supports two various server operations. These settings
scheduling modes: client-polling and affect such things as communications,
server-prompted. devices, and performance.
scratch volume server-prompted scheduling mode
A labeled volume that is either blank or A client/server communication technique
contains no valid data, that is not defined, where the server contacts the client node
and that is available for use. See also when tasks must be done. See also
volume. client-polling scheduling mode.
script A series of commands, combined in a file, server storage
that carry out a particular function when The primary, copy, and active-data storage
the file is run. Scripts are interpreted as pools that are used by the server to store
they are run. See also Tivoli Storage user files such as backup versions, archive
Manager command script. copies, and files migrated from
Secure Sockets Layer (SSL) hierarchical storage management client
A security protocol that provides nodes (space-managed files). See also
communication privacy. With SSL, active-data pool, copy storage pool,
client/server applications can primary storage pool, storage pool
communicate in a way that is designed to volume, volume.
prevent eavesdropping, tampering, and session
message forgery. A logical or virtual connection between
selective backup two stations, software programs, or
The process of backing up certain files or devices on a network that allows the two
directories from a client domain. The files elements to communicate and exchange
that are backed up are those that are not data for the duration of the session. See
excluded in the include-exclude list. The also administrative session.
files must meet the requirement for session resource usage
serialization in the backup copy group of The amount of wait time, processor time,
the management class that is assigned to and space that is used or retrieved during
each file. See also incremental backup. a client session.
selective migration shadow copy
The process of copying user-selected files A snapshot of a volume. The snapshot
from a local file system to server storage can be taken while applications on the
and replacing the files with stub files on system continue to write data to the
the local file system. See also demand volumes.
migration, threshold migration.
Glossary 85
shadow volume special file
The data stored from a snapshot of a On AIX, UNIX, or Linux systems, a file
volume. The snapshot can be taken while that defines devices for the system, or
applications on the system continue to temporary files that are created by
write data to the volumes. processes. There are three basic types of
special files: first-in, first-out (FIFO);
shared dynamic serialization
block; and character.
A value for serialization that specifies that
a file must not be backed up or archived SSL See Secure Sockets Layer.
if it is being modified during the
stabilized file space
operation. The backup-archive client
A file space that exists on the server but
retries the backup or archive operation a
not on the client.
number of times; if the file is being
modified during each attempt, the stanza A group of lines in a file that together
backup-archive client will back up or have a common function or define a part
archive the file on its last try. See also of the system. Stanzas are usually
dynamic serialization, serialization, shared separated by blank lines or colons, and
static serialization, static serialization. each stanza has a name.
shared library startup window
A library device that is used by multiple A time period during which a schedule
storage manager servers. See also library. must be initiated.
shared static serialization static serialization
A copy-group serialization value that A copy-group serialization value that
specifies that a file must not be modified specifies that a file must not be modified
during a backup or archive operation. The during a backup or archive operation. If
client attempts to retry the operation a the file is in use during the first attempt,
number of times. If the file is in use the backup-archive client cannot back up
during each attempt, the file is not backed or archive the file. See also dynamic
up or archived. See also dynamic serialization, serialization, shared dynamic
serialization, serialization, shared dynamic serialization, shared static serialization.
serialization, static serialization.
storage agent
snapshot A program that enables the backup and
An image backup type that consists of a restoration of client data directly to and
point-in-time view of a volume. from storage attached to a storage area
network (SAN).
space-managed file
A file that is migrated from a client node storage area network (SAN)
by the hierarchical storage management A dedicated storage network tailored to a
(HSM) client. The HSM client recalls the specific environment, combining servers,
file to the client node on demand. systems, storage products, networking
products, software, and services.
space management
See hierarchical storage management. storage hierarchy
A logical order of primary storage pools,
space monitor daemon
as defined by an administrator. The order
A daemon that checks space usage on all
is typically based on the speed and
file systems for which space management
capacity of the devices that the storage
is active, and automatically starts
pools use. The storage hierarchy is
threshold migration when space usage on
defined by identifying the next storage
a file system equals or exceeds its high
pool in a storage pool definition. See also
threshold.
storage pool.
sparse file
storage pool
A file that is created with a length greater
A named set of storage volumes that is
than the data it contains, leaving empty
the destination that is used to store client
spaces for the future addition of data.
86 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
data. See also active-data pool, copy
storage pool, primary storage pool,
storage hierarchy.
storage pool volume
A volume that has been assigned to a
storage pool. See also active-data pool,
copy storage pool, primary storage pool,
server storage, volume.
storage privilege class
A privilege class that gives an
administrator the authority to control how
storage resources for the server are
allocated and used, such as monitoring
the database, the recovery log, and server
storage. See also privilege class.
stub A shortcut on the Windows file system
that is generated by the hierarchical
storage management (HSM) client for a
migrated file that allows transparent user
access. A stub is the sparse file
representation of a migrated file, with a
reparse point attached.
stub file
A file that replaces the original file on a
local file system when the file is migrated
to storage. A stub file contains the
information that is necessary to recall a
migrated file from server storage. It also
contains additional information that can
be used to eliminate the need to recall a
migrated file. See also migrated file,
resident file.
stub file size
The size of a file that replaces the original
file on a local file system when the file is
migrated to server storage. The size that
is specified for stub files determines how
much leader data can be stored in the
stub file. The default for stub file size is
the block size defined for a file system
minus 1 byte.
subscription
In a storage environment, the process of
identifying the subscribers to which the
profiles are distributed. See also
enterprise configuration, managed server.
system privilege class
A privilege class that gives an
administrator the authority to issue all
server commands. See also privilege class.
Glossary 87
tombstone object
T A small subset of attributes of a deleted
tape library object. The tombstone object is retained
A set of equipment and facilities that for a specified period, and at the end of
support an installation's tape the specified period, the tombstone object
environment. The tape library can include is permanently deleted.
tape storage racks, mechanisms for Transmission Control Protocol/Internet Protocol
automatic tape mounting, a set of tape (TCP/IP)
drives, and a set of related tape volumes An industry-standard, nonproprietary set
mounted on those drives. of communication protocols that provides
tape volume prefix reliable end-to-end connections between
The high-level-qualifier of the file name applications over interconnected networks
or the data set name in the standard tape of different types. See also communication
label. method.
target node transparent recall
A client node for which other client nodes The process that is used to automatically
(called agent nodes) have been granted recall a migrated file to a workstation or
proxy authority. The proxy authority file server when the file is accessed. See
allows the agent nodes to perform also selective recall.
operations such as backup and restore on trusted communications agent (TCA)
behalf of the target node, which owns the A program that handles the sign-on
data. password protocol when clients use
TCA See trusted communications agent. password generation.
TCP/IP
See Transmission Control U
Protocol/Internet Protocol.
UCS-2 A 2-byte (16-bit) encoding scheme based
threshold migration on ISO/IEC specification 10646-1. UCS-2
The process of moving files from a local defines three levels of implementation:
file system to server storage based on the Level 1-No combining of encoded
high and low thresholds that are defined elements allowed; Level 2-Combining of
for the file system. See also automatic encoded elements is allowed only for
migration, demand migration, migration Thai, Indic, Hebrew, and Arabic; Level
job, selective migration. 3-Any combination of encoded elements
are allowed.
throughput
In storage management, the total bytes in UNC See Universal Naming Convention.
the workload, excluding overhead, that
Unicode
are backed up or restored, divided by
A character encoding standard that
elapsed time.
supports the interchange, processing, and
timeout display of text that is written in the
A time interval that is allotted for an common languages around the world,
event to occur or complete before plus many classical and historical texts.
operation is interrupted.
Unicode-enabled file space
Tivoli Storage Manager command script Unicode file space names provide support
A sequence of Tivoli Storage Manager for multilingual workstations without
administrative commands that are stored regard for the current locale.
in the database of the Tivoli Storage
Universally Unique Identifier (UUID)
Manager server. The script can run from
The 128-bit numeric identifier that is used
any interface to the server. The script can
to ensure that two components do not
include substitution for command
have the same identifier. See also Globally
parameters and conditional logic. See also
Unique Identifier.
macro file, script.
88 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Universal Naming Convention (UNC) volume history file
The server name and network name A file that contains information about
combined. These names together identify volumes that have been used by the
the resource on the domain. server for database backups and for
export of administrator, node, policy, or
UTF-8 Unicode Transformation Format, 8-bit
server data. The file also has information
encoding form, which is designed for ease
about sequential-access storage pool
of use with existing ASCII-based systems.
volumes that have been added, reused, or
The CCSID value for data in UTF-8
deleted. The information is a copy of
format is 1208. See also UCS-2.
volume information that is recorded in
UUID See Universally Unique Identifier. the server database.
Volume Shadow Copy Service (VSS)
V A set of Microsoft application-
programming interfaces (APIs) that are
validate used to create shadow copy backups of
To check a policy set for conditions that volumes, exact copies of files, including
can cause problems if that policy set all open files, and so on.
becomes the active policy set. For
example, the validation process checks VSS See Volume Shadow Copy Service.
whether the policy set contains a default VSS Backup
management class. A backup operation that uses Microsoft
version Volume Shadow Copy Service (VSS)
A backup copy of a file stored in server technology. The backup operation
storage. The most recent backup copy of a produces an online snapshot
file is the active version. Earlier copies of (point-in-time consistent copy) of
the same file are inactive versions. The Microsoft Exchange data. This copy can
number of versions retained by the server be stored on local shadow volumes or on
is determined by the copy group Tivoli Storage Manager server storage.
attributes in the management class. VSS Fast Restore
virtual file space An operation that restores data from a
A representation of a directory on a local snapshot. The snapshot is the VSS
network-attached storage (NAS) file backup that resides on a local shadow
system as a path to that directory. volume. The restore operation retrieves
the data by using a file-level copy
virtual mount point method.
A directory branch of a file system that is
defined as a virtual file system. The VSS Instant Restore
virtual file system is backed up to its own An operation that restores data from a
file space on the server. The server local snapshot. The snapshot is the VSS
processes the virtual mount point as a backup that resides on a local shadow
separate file system, but the client volume. The restore operation retrieves
operating system does not. the data by using a hardware assisted
restore method (for example, a FlashCopy
virtual volume operation).
An archive file on a target server that
represents a sequential media volume to a VSS offloaded backup
source server. A backup operation that uses a Microsoft
Volume Shadow Copy Service (VSS)
volume hardware provider (installed on an
A discrete unit of storage on disk, tape or alternate system) to move IBM Data
other data recording medium that Protection for Microsoft Exchange data to
supports some form of identifier and the Tivoli Storage Manager server. This
parameter list, such as a volume label or type of backup operation shifts the
input/output control. See also scratch backup load from the production system
volume, server storage, storage pool, to another system.
storage pool volume.
Glossary 89
VSS Restore
A function that uses a Microsoft Volume
Shadow Copy Service (VSS) software
provider to restore VSS Backups (IBM
Data Protection for Microsoft Exchange
database files and log files) that reside on
Tivoli Storage Manager server storage to
their original location.
W
wildcard character
A special character such as an asterisk (*)
or a question mark (?) that can be used to
represent one or more characters. Any
character or set of characters can replace
the wildcard character.
workload partition (WPAR)
A partition within a single operating
system instance.
workstation
A terminal or personal computer at which
a user can run applications and that is
usually connected to a mainframe or a
network.
worldwide name (WWN)
A 64-bit, unsigned name identifier that is
unique.
WPAR See workload partition.
WWN See worldwide name.
90 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Index
A copies of log files 33
copy group 17
accessibility features 63 crontab
activate policy set 17 file example 45
alternate path 37 customer support
alternate paths 28 contacting 60
alternate/parallel backup paths
example for availability 28
alternate/parallel backup servers 27, 37
archiving D
inactive data 9 data compression
automation options null block 36
backup version control 37 Tivoli Storage Manager 36
frontend/backend processing 37 data protection 1
multiple DB2 log file copies 33 Data Protection for SAP 15
selectable management classes 37 installation planning sheets 55
availability improvements profile
with alternate/parallel paths and servers 37 keyword descriptions 46
with multiple DB2 Log Files 33 Data Protection for SAP HANA ix, 1, 23
with multiple redo log copies 37 getting started 1
Data Protection for SAP profile 46
data throughput 38
B DB2 log files
creating multiple copies 33
backint 1 deleting backups 21
BACKINT device class 6, 16, 17
interaction with Data Protection for SAP HANA disability 63
backint 2 disaster recovery 27
hdbbackint 2 dsm.opt 25
backup data 31 dsm.sys 25
backup log file 31
backup paths 8
backup server
performance optimization 6 E
backup strategy environment variable
planning 5 TDP_DIR 42
sample 31 example 27
backups 8 examples
balanced configuration 35 alternate/parallel paths for availability 28
BRARCHIVE 45 alternate/parallel paths for disaster recovery 27
BRBACKUP 45 client system options file (UNIX and Linux) 54
buffer copies 36 client user options file (UNIX) 55
buffer size 36 crontab file 45
include/exclude list (UNIX and Linux) 54
Tivoli Storage Manager profiles for UNIX and Linux 55
C
client system options file
UNIX and Linux example 54 F
client user options file fixes, obtaining 60
UNIX and Linux example 55
compression 6
null block 36 G
Tivoli Storage Manager 36 glossary 69
configuration 21
Configuration 25
configuration matrix for Tivoli Storage Manager password
settings 20 H
configuring 26 hdbbackint 1
Configuring 15, 23, 25
Configuring Data Protection for SAP HANA
setup script 23
setup.sh 23
O
optimization 6
92 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
S V
sample Data Protection for SAP profile validate
UNIX or Linux 50 policy set 17
SAP 1 versioning 45
configuration of Tivoli Storage Manager server 18 volume 15, 16, 17, 33
SAP HANA 28, 33
scale-out environment 28
SERVER 26
SERVER statement 27, 28
SERVERNAME 26
sessions
multiple (parallel) 6, 7, 8, 27, 28, 48
single 7
setting up 23
setup requirements 43
SID 26, 42, 46, 55
single host 24
sizing 8
software support
describing problem for IBM Software Support 61
determining business impact for IBM Software Support 61
submitting a problem 62
Software Support
contacting 60
space required 8
storage device setup
Tivoli Storage Manager server 16
storage pool 16
definition 17
storage pools 8
support contract 61
support information 57
support subscription 61
T
Tivoli Storage Manager 25
data compression 36
options files 21
passwords 19
profile example for UNIX and Linux 55
sessions 45
Tivoli Storage Manager client 21
configuration 21
configuration on UNIX or Linux 22
Tivoli Storage Manager passwords
configuration matrix to set keywords 20
Tivoli Storage Manager server
adding 16
configuration 15
configuration for SAP 18
configuration, prerequisites 15
management classes 17
node definition 18
performance considerations 15
policy definition 17
storage device setup 16
storage pool definition 17
storing data on 7
troubleshooting 41, 43
IBM support 43
reproducible problems 41
Index 93
94 Tivoli Storage Manager for ERP: Data Protection for SAP HANA: Installation and User's Guide
Printed in USA