Beruflich Dokumente
Kultur Dokumente
Version 7.1.1
Installation Cookbook
Linux vStorage Backup Server
VMware Environment
November 4, 2014
Art Roy
IBM Cloud & Smarter Infrastructure SW Advanced Technology/SWAT
ajroy@us.ibm.com
IBM Confidential
2
Installation Step Summary
1. Verify Prerequisites
2. Install the TSM for VE software on the Linux vStorage Backup Server.
3. Configuration using the TSM for VE Web Browser GUI.
4. Install and Configure the datamover on the vStorage Backup Server.
5. Configure the Linux (Partner) Mount Proxy.
6. Install and Configure the Windows (Primary) Mount Proxy.
7. Configure and use the vSphere Web Client Extension.
IBM Confidential
3
Prerequisites
IBM Confidential
4
Communication Port Requirements
Before beginning installation, please verify that the following ports are
open on the vStorage Backup Server and not blocked by a firewall.
IBM Confidential
5
Communication Port Requirements – Firewall Configuration
IBM Confidential
6
Communication Port Requirements – Firewall Configuration
IBM Confidential
7
Communication Port Requirements – Firewall Configuration
IBM Confidential
8
TSM Server Requirements
Ensure that there is an available Policy Domain and Storage Pool set up
to hold the TSM for VE backups.
TSM for VE Control files should be stored in a disk based storage pool.
See the VMCTLMC parameter in the BA Client Installation and User’s
Guide.
IBM Confidential
9
Linux Server Software Requirements
IBM Confidential
10
Mount Proxy Server Requirements
IBM Confidential
11
Tivoli Data Protection for VMware
Installation - Linux
IBM Confidential
12
TSM for VE Installation - Linux
The installation screen prints in this document are captured from an X-Windows Linux
interface. The installation can also be completed in a Linux command line environment. Both
installation options will require the same inputs.
IBM Confidential
13
TSM for VE Installation - Linux
Change directory to the DataProtectionForVMware directory in the TSM for VE Media.
Run install-Linux.bin.
IBM Confidential
14
TSM for VE Installation - Linux
Click OK.
Click Next.
IBM Confidential
15
TSM for VE Installation - Linux
Click Next.
IBM Confidential
16
TSM for VE Installation - Linux
Click Next.
Click Next.
IBM Confidential
17
TSM for VE Installation - Linux
Uncheck the box for the Data Protection for VMware Recovery Agent.
Check the box for the Data Protection for Vmware GUI.
Leave the Documentation and DP for Vmware Enablement File options checked.
Click Next.
IBM Confidential
18
TSM for VE Installation - Linux
http://www-
01.ibm.com/support/docview.wss?uid=swg21
659544
IBM Confidential
19
TSM for VE Installation - Linux
Click Next.
IBM Confidential
20
TSM for VE Installation - Linux
Click OK.
IBM Confidential
21
TSM for VE Installation - Linux
Click Install.
IBM Confidential
22
TSM for VE Installation - Linux
Click Next.
Click Done.
IBM Confidential
23
TSM for VE Configuration
Run via the TDP for VMware Web Browser GUI
IBM Confidential
24
TSM for VE Configuration
Access the GUI via web browser to URL https://hostname:9081/TsmVMwareUI/ .
Log in using vCenter Server credentials.
IBM Confidential
25
TSM for VE Configuration
If you chose to Register the GUI as a vCenter Plug-in, you can also access the
GUI via the plug-in in the vSphere Client or vSphere Web Client. Whether you
use the stand-alone web browser, vSphere Client plug-in, or vSphere Web
Client access, the interface will look the same.
IBM Confidential
26
TSM for VE Configuration
If you chose to Register the GUI as a vCenter Plug-in, you can access the GUI
via the plug-in in the vSphere Web Client.
IBM Confidential
27
TSM for VE Configuration
Launching the GUI for the first time will automatically launch the Configuration
Wizard.
Click Next
IBM Confidential
28
TSM for VE Configuration
Click Next.
IBM Confidential
29
TSM for VE Configuration
TDP for VMware requires several nodes to be defined on the TSM server. The
configuration wizard will create the nodes. This screen gives the option to
assign a common prefix to these nodes as well as to select a TSM policy
domain.
Click Next.
IBM Confidential
30
TSM for VE Configuration
Click Next.
IBM Confidential
31
TSM for VE Configuration
Click Next.
IBM Confidential
32
TSM for VE Configuration
Click Next.
IBM Confidential
33
TSM for VE Configuration
Create the Datacenter Node and Initial TSM Data Mover Node
IBM Confidential
34
TSM for VE Configuration
Set the TSM node passwords for the Datacenter and Data Mover nodes
IBM Confidential
35
TSM for VE Configuration
Set the TSM node passwords for the Datacenter and Data Mover nodes
IBM Confidential
36
TSM for VE Configuration
Set the TSM node passwords for the Datacenter and Data Mover nodes
Click Next.
IBM Confidential
37
TSM for VE Configuration
New as of TSM for VE 7.1.1 is the creation of Mount Proxy Node Pairs to be used for file level recovery
as well as Full Guest Instant Access and Full Guest Instant Recovery. Two nodes are created, one for
Windows and one for Linux. For Linux file level restores, both nodes are used in conjunction.
IBM Confidential
38
TSM for VE Configuration
By default, the node names are generated with the prefix entered earlier, followed by _’REMOTE_’
followed by ‘MP_WIN’ (for the Windows node) and ‘MP_LNX’ (for the Linux node).
IBM Confidential
39
TSM for VE Configuration
Click on ‘View Settings’ for the Mount Proxy Node pair to view the suggested option settings for each
node. A node password is automatically generated for each. You can click on ‘Show’ to display the
password or on ‘Change’ to enter your own password choice. Remember the password for later
configuration. The Primary Node tab is for the Windows Mount Proxy node.
IBM Confidential
40
TSM for VE Configuration
The Linux Partner Node tab is for the Linux Mount Proxy node. As with the Primary Node, you can
show the generated node password or change it to your preference. Remember the password for later
configuration steps.
Click Close
IBM Confidential
41
TSM for VE Configuration
Click Next.
IBM Confidential
42
TSM for VE Configuration
The Summary page shows the Node Names that will be created in TSM.
IBM Confidential
43
TSM for VE Configuration
The Wizard Tasks should all show a state of Successful. Click Close.
IBM Confidential
44
TSM for VE Configuration
The Configuration Status screen shows the TSM node names. Notice the yellow warning symbol on
the datacenter.
IBM Confidential
45
TSM for VE Configuration
Click on the virtual datacenter to view the status of the datamover and mount proxy nodes for that
datacenter. Notice the yellow warning symbol on the datamover and mount proxy nodes. The next
steps in the configuration are to install and configure the datamovers and mount proxies.
IBM Confidential
46
TSM for VE Configuration
TSM Operations Center shows the nodes that were created on the TSM server.
IBM Confidential
47
TSM for VE Configuration
The configuration wizard automatically creates the required proxy relationships for the Datacenter
and vCenter nodes.
IBM Confidential
48
Installing and Configuring the Datamover
IBM Confidential
49
Installing and Configuring the Datamover
Install the Datamover (TSM BA Client) on the Linux vStorage Backup Server per the “IBM Tivoli
Storage Manager for Virtual Environments Installation Guide”. Notice that the GSKit packages and
the TSM API indicate they are already installed. This is normal since they were installed as part of
the TSM for VE installation. Install the BA Client to complete the software requirements.
IBM Confidential
50
Installing and Configuring the Datamover
IBM Confidential
51
Installing and Configuring the Datamover
Edit the new file. The only non-comment entry should be the Servername parameter and
the datamover node name. This will point to the datamover stanza in the dsm.sys file.
IBM Confidential
52
Installing and Configuring the Datamover
IBM Confidential
53
Installing and Configuring the Datamover
Edit the new file to include the parameters shown below. (see next page)
IBM Confidential
54
Installing and Configuring the Datamover
More information on these parameters can be found in the BA Client Installation and
User’s Guide.
IBM Confidential
55
Installing and Configuring the Datamover
Copy the file rc.dsmcad file to a new file by appending the datamover node name,
rc.dsmcad.<datamover node name>
IBM Confidential
56
Installing and Configuring the Datamover
Edit the new file and insert two lines as shown. Use the newly created option file for the
DSM_CONFIG export.
export LD_LIBRARY_PATH=/opt/tivoli/tsm/client/ba/bin
export DSM_CONFIG=/opt/tivoli/tsm/client/ba/bin/dsm.<datamover node name>.opt
IBM Confidential
57
Installing and Configuring the Datamover
Create a symbolic link in the /etc/init.d directory for the datamover DSMCAD service.
IBM Confidential
58
Installing and Configuring the Datamover
IBM Confidential
59
Installing and Configuring the Datamover
dsmc set password –type=VM <vcenter server address> <vCenter admin> <vCenter
admin password> -optfile=dsm.<datamover node name>.opt -serv=<datamover node
name>
The vCenter admin ID must have the role permissions as specified in this Technote:
http://www-01.ibm.com/support/docview.wss?uid=swg21659544
IBM Confidential
60
Installing and Configuring the Datamover
IBM Confidential
61
Installing and Configuring the Datamover
IBM Confidential
62
Installing and Configuring the Datamover
Verify in the Status Details for the datamover node that the datamover is working properly. The TSM
for VE plug-in/GUI attempts to communicate with the datamover CAD service. If successful, then the
datamover will show as working properly.
IBM Confidential
63
Installing and Configuring the Windows (Primary)
Mount Proxy
IBM Confidential
64
Installing and Configuring the Windows (Primary) Mount Proxy
As shown during the initial configuration, the Mount Proxy Nodes are always created in pairs, with the
Primary Node always being on Windows. The Windows Mount Proxy Node is required for all file level
restores, whether they are from Windows guests or Linux guests.
IBM Confidential
65
Installing and Configuring the Windows (Primary) Mount Proxy
The status of the Windows (Primary) and Linux (Partner) nodes are currently unknown. The Primary
mount proxy node must be configured correctly in order for the Partner node to validate.
IBM Confidential
66
Installing and Configuring the Windows (Primary) Mount Proxy
Start the installation of the software from the TSM for VE media.
IBM Confidential
67
Installing and Configuring the Windows (Primary) Mount Proxy
Note that the Windows Mount Proxy Node server must have the BA Client installed as well as
the Recovery Agent and VMware Enablement File from the TSM for VE installation media.
This can be accomplished by selecting ‘Advanced Installation’ and then ‘Install Tivoli Storage
Manager Instant Restore only’. This server could also be an existing or future datamover
server.
IBM Confidential
68
Installing and Configuring the Windows (Primary) Mount Proxy
Click Next
Click Next
Click Next
Click Install
IBM Confidential
69
Installing and Configuring the Windows (Primary) Mount Proxy
Complete the software installation
and reboot.
Click Install
Click OK
Click Finish
Click OK
Click Yes
IBM Confidential
70
Installing and Configuring the Windows (Primary) Mount Proxy
IBM Confidential
71
Installing and Configuring the Windows (Primary) Mount Proxy
From the Configuration Status screen of the TSM for VE GUI, select ‘Edit TSM Configuration’ from the
Tasks pulldown to display the Configuration Settings page.
IBM Confidential
72
Installing and Configuring the Windows (Primary) Mount Proxy
IBM Confidential
73
Installing and Configuring the Windows (Primary) Mount Proxy
IBM Confidential
74
Installing and Configuring the Windows (Primary) Mount Proxy
Enter the TSM password for the node. This is the password
from the installation wizard that was generated or that you set.
IBM Confidential
75
Installing and Configuring the Windows (Primary) Mount Proxy
IBM Confidential
76
Creating Additional Mount Proxy Node Pairs
Wait until the information in the Preferences Editor is refreshed. Click on the VM Backup tab. The
VMware Virtual Center address should already be filled in. Enter the User, and Password. Click OK.
IBM Confidential
77
Installing and Configuring the Windows (Primary) Mount Proxy
IBM Confidential
78
Installing and Configuring the Windows (Primary) Mount Proxy
Check the box to ‘Help me configure the TSM Web Client’. Click Next.
IBM Confidential
79
Installing and Configuring the Windows (Primary) Mount Proxy
Click Next.
IBM Confidential
80
Installing and Configuring the Windows (Primary) Mount Proxy
IBM Confidential
81
Installing and Configuring the Windows (Primary) Mount Proxy
Click Next.
IBM Confidential
82
Installing and Configuring the Windows (Primary) Mount Proxy
Click Next.
Click Next.
IBM Confidential
83
Installing and Configuring the Windows (Primary) Mount Proxy
Click Next.
IBM Confidential
84
Installing and Configuring the Windows (Primary) Mount Proxy
Click Apply.
Click Finish.
IBM Confidential
85
Installing and Configuring the Windows (Primary) Mount Proxy
IBM Confidential
86
Installing and Configuring the Windows (Primary) Mount Proxy
Mount proxy nodes are always created in pairs, one for Windows and one for Linux. The Windows node is
the primary node and is the only node from the pair that will listed. By selecting the Windows mount proxy
node, the status for both nodes will be checked. The status details for the Windows mount proxy node
shows the node working properly but the Linux proxy node shows a TCP/IP communications failure. We
have not set up the Linux proxy node yet. If the site does not have any Linux file level restore
requirements, the Linux proxy node status can be ignored.
IBM Confidential
87
Completing the Linux Mount Proxy
Installation and Configuration
IBM Confidential
88
Completing the Linux Mount Proxy Installation and Configuration
The Linux Mount Proxy is a Linux server (likely a VM guest) that will be used to mount backup
images via iSCSI that have been mounted and presented as iSCSI targets by the Windows Mount
Proxy. It is only required if the site has Linux guests where file level recovery may be necessary.
The Linux Mount Proxy server is only required to have the Linux BA Client installed as well as the
Linux iSCSI utilities (iscsiadm). The BA Client should be at the same level as the BA Client running
on the Windows Mount Proxy and can also be installed from the equivalent release level of the Linux
TSM for VE media.
For a Linux file level restore, the Windows Mount Proxy is chosen in the GUI. The Windows mount
proxy will mount the VMDK backup images from the TSM server and present them as iSCSI targets.
The Windows Mount proxy will then communicate with the Linux Mount proxy via the DSMCAD
running on the Linux Mount proxy. The Linux Mount proxy will invoke the iSCSI utilities to attach to
the presented iSCSI targets, and mount those targets as filesystems from which the required files
can be copied. Optionally the Linux mount proxy can be instructed to export an NFS mount which
can be connected to the original guest to allow for file copy.
The Linux mount proxy server can be a physical machine or a VM guest and should only be used for
mount operations and not for backup or restore operations (should not be used as a datamover
server).
IBM Confidential
89
Completing the Linux Mount Proxy Installation and Configuration
Install the TSM BA Client on the Linux mount proxy server per the “IBM Tivoli Storage Manager for
UNIX and Linux Backup-Archive Clients Installation and User’s Guide”. In this example, the Linux
TSM for VE media is being used to install the BA Client (datamover).
IBM Confidential
90
Configuring the Linux (Partner) Mount Proxy
The parameters for the dsm.sys file on the Linux Mount Proxy server can be found in
the TSM for VE GUI.
IBM Confidential
91
Configuring the Linux (Partner) Mount Proxy
IBM Confidential
92
Configuring the Linux (Partner) Mount Proxy
IBM Confidential
93
Completing the Linux Mount Proxy Installation and Configuration
On the Linux Mount Proxy server, change directory to /opt/tivoli/tsm/client/ba/bin. Copy the
dsm.sys.smp file to dsm.sys and edit the file. Replace the sample stanza with the information copied
from the GUI. If you plan to run a firewall on the Linux proxy, then add the webports parameter as
shown.
IBM Confidential
94
Configuring the Linux (Partner) Mount Proxy
Copy the dsm.opt.smp file to a new file, dsm.<mount proxy node name>.opt.
Edit the new file and set the SERVERName parameter to match the SERVERName entry in the
Mount Proxy Node stanza of the dsm.sys file. (Note the ‘MPNODE_’ prefix.)
IBM Confidential
95
Configuring the Linux (Partner) Mount Proxy
Invoke the BA Command line, ‘dsmc’, using the –optfile= option to specify the Mount Proxy Node
option file. Verify the ‘user id’ is the mount proxy node name. Enter the password for the node which
was created during the configuration wizard. If you do not know the password, update the node
password on the TSM server and then enter that password here. Quit from the BA Client command
line.
IBM Confidential
96
Configuring the Linux (Partner) Mount Proxy
Copy the ‘rc.dsmcad’ file to a new file by appending the mount proxy node name,
cp rc.dsmcad rc.dsmcad.<mount proxy node name>.
Edit the new file and insert two lines as shown. Specify the newly created option file for the DSM_CONFIG
export. Save the exit the file.
export LD_LIBRARY_PATH=/opt/tivoli/tsm/client/ba/bin
export DSM_CONFIG=/opt/tivoli/tsm/client/ba/bin/dsm.<mount proxy node name>.opt
IBM Confidential
97
Configuring the Linux (Partner) Mount Proxy
Create a symbolic link in /etc/init.d for the mount proxy DSMCAD service.
Start the service as specified in the link command: service dsmcad.<mount proxy node name> start
Set the service to autostart upon reboot: ‘chkconfig --add dsmcad.<mount proxy node name>
IBM Confidential
98
Configuring the Linux (Partner) Mount Proxy
Return to the Configuration Status screen in the TSM for VE GUI. Click on the datacenter name,
highlight the windows mount proxy node and click ‘Validate Selected Node’.
IBM Confidential
99
Configuring the Linux (Partner) Mount Proxy
The status of the Linux Mount Proxy node should now be ‘Running’, and should be reported as working
properly.
Note that the Linux Mount Proxy status may show a warning message:
ANS3144W The ISCSI service is not running. File level restore mount operations will not work.
The iSCSI utilities do not normally run if there are no connections. You can force the iscsi daemon to start
on the Linux server by issuing the command “service iscsid force-start”, however the service will normally
start automatically when a file level restore is attempted.
IBM Confidential
100
Configuring the Linux (Partner) Mount Proxy
When using the File Level Restore feature of the TSM for VE GUI, the user is presented the option of
creating an NFS share on the mount proxy server. The specified server can then connect to the NFS share
in order to copy files.
If you plan to use this option, start the NFS service and set it to start automatically upon reboot.
IBM Confidential
101
Creating Additional Mount Proxy Node Pairs
IBM Confidential
102
Creating Additional Mount Proxy Node Pairs
Additional Mount Proxy Node Pairs may be created by first using the TSM for VE GUI to add the nodes to
TSM. Rename the nodes appropriately to create unique names. Follow the instructions earlier in this
document to complete the Linux and Windows Installation and configuration steps.
IBM Confidential
103
Adding a Data Mover
IBM Confidential
104
Adding a Datamover
Additional Datamovers may be created by first using the GUI to add the nodes to TSM. Rename the nodes
appropriately to create unique names.
IBM Confidential
105
Adding a Datamover to an Existing vStorage Backup Server
Adding a second datamover to a vStorage Backup Server does not require any additional software
installation.
Simply follow the steps to create an option file for the new datamover node, add a stanza to the dsm.sys
file, create the rc.dsmcad.<datamover node name> file, create the link in /etc/init.d, start the dsmcad
service, and set the service to start automatically after reboot.
Instructions for each of these steps can be found earlier in this document.
IBM Confidential
106
Adding a Datamover to a New vStorage Backup Server
Follow the instructions earlier in this document to complete the Linux Installation and configuration steps.
1) Install TSM for VE as shown earlier. On the ‘Select Install Features’ page, do not check the Data
Protection for Vmware Recovery Agent or Data Protection for Vmware GUI options. This will install the
VMware Enablement File required to run the datamover.
2) Install the datamover (BA Client) software as shown earlier.
3) Validate the datamover node in the TSM for VE GUI.
IBM Confidential
107
Schedule a Backup
IBM Confidential
108
Schedule a Backup
Click the Backup tab in the web GUI or vCenter Plug-in to start scheduling backups.
IBM Confidential
109
TSM for VE vSphere Web Client Extension
IBM Confidential
110
TSM for VE vSphere Web Client Extension
If you checked the option ‘Register as an Extension in vSphere Web Client’ during the installation
process, the TSM for VE integration with the vSphere Web Client will be installed. This is the initial
offering of this integration which allows authorized users to invoke full guest restores via the vSphere
Web Client.
IBM Confidential
111
TSM for VE vSphere Web Client Extension
Two new VMware administrator role privileges are installed. The first is under the Global privilege group
and is called ‘Configure IBM Data Protection’. This privilege is required for the administrator to be able to
create a connection to a vStorage Backup Server.
IBM Confidential
112
TSM for VE vSphere Web Client Extension
The second is under the Datacenter privilege group and is called ‘IBM Data Protection’.
This privilege is required for the administrator to be able to use the TSM for VE integration
features.
IBM Confidential
113
TSM for VE vSphere Web Client Extension
To create a connection from the vSphere Web Client to the vStorage Backup Server, click
on ‘IBM Data Protection’.
IBM Confidential
114
TSM for VE vSphere Web Client Extension
Click on ‘Set up a connection’ or on the ‘Connections’ tab.
IBM Confidential
115
TSM for VE vSphere Web Client Extension
Highlight the vCenter name and click ‘Edit’.
IBM Confidential
116
TSM for VE vSphere Web Client Extension
Enter the DNS name or IP Address for the vStorage Backup Server where the TSM for VE
GUI is installed. Click Save.
IBM Confidential
117
TSM for VE vSphere Web Client Extension
A message should be displayed indicating a successful update. Click Close.
IBM Confidential
118
TSM for VE vSphere Web Client Extension
Note that the ‘Connection Status’ column should indicate ‘Verified Connection’.
IBM Confidential
119
TSM for VE vSphere Web Client Extension
The current integration allows full guest restores. To restore a guest to a new name, right
click on the guest name, select ‘All IBM Data Protection Actions’, then select ‘Restore’.
IBM Confidential
120
TSM for VE vSphere Web Client Extension
The restore sequence will then begin.
IBM Confidential
121
TSM for VE vSphere Web Client Extension
IBM Confidential
122
TSM for VE vSphere Web Client Extension
IBM Confidential
123
TSM for VE vSphere Web Client Extension
Restores can also be initiated from the ‘IBM Data Protection’ tab of the Datacenter ‘Manage’ tab.
The restore of a guest that no longer exists would be invoked using this method.
IBM Confidential
124