Ispplus Guide
Ispplus Guide
Version 10.1.5
IBM
Note:
Before you use this information and the product it supports, read the information in “Notices” on page
395.
iii
Adding a vSnap server as a backup storage provider............................................................................... 73
Editing settings for a vSnap server...................................................................................................... 74
Configuring backup storage options.................................................................................................... 75
Initializing the vSnap server...................................................................................................................... 80
Completing a simple initialization........................................................................................................80
Completing an advanced initialization.................................................................................................81
Expanding a vSnap storage pool............................................................................................................... 81
Establishing a replication partnership for vSnap servers......................................................................... 82
Changing the throughput rate................................................................................................................... 82
Replacing a failed vSnap server................................................................................................................ 83
vSnap server administration reference .................................................................................................... 83
Storage management........................................................................................................................... 84
Network management..........................................................................................................................86
Synchronizing the vSnap Password..................................................................................................... 87
Kernel headers and tools..................................................................................................................... 88
iv
Testing network connectivity.................................................................................................................. 138
Running the Service Tool from a command line............................................................................... 138
Running the Service Tool remotely....................................................................................................139
Adding virtual disks................................................................................................................................. 139
Adding a disk to the virtual appliance............................................................................................... 140
Adding storage capacity from a new disk to the appliance volume................................................. 140
v
Chapter 11. Protecting containers...................................................................... 309
Overview.................................................................................................................................................. 309
Backup and restore types.................................................................................................................. 310
SLA policies........................................................................................................................................ 311
User roles........................................................................................................................................... 311
Kubernetes Backup Support requests.............................................................................................. 312
Security features................................................................................................................................ 313
Installing Kubernetes Backup Support...................................................................................................315
Prerequisites...................................................................................................................................... 315
Installing and deploying Kubernetes Backup Support..................................................................... 317
Uninstalling Kubernetes Backup Support......................................................................................... 322
Completely uninstalling Kubernetes Backup Support...................................................................... 323
Backing up container data.......................................................................................................................324
Scheduling backups of persistent volumes.......................................................................................324
Backing up a persistent volume on demand..................................................................................... 327
Restoring container data......................................................................................................................... 328
Managing container backup and restore jobs.........................................................................................331
Viewing the status of backup and restore jobs................................................................................. 331
Pausing scheduled backups.............................................................................................................. 335
Resuming scheduled backups........................................................................................................... 336
Deleting container backups............................................................................................................... 336
Viewing jobs and running reports............................................................................................................338
Viewing job logs..................................................................................................................................338
Creating backup history reports........................................................................................................ 339
vi
Creating a custom report................................................................................................................... 362
Scheduling a report............................................................................................................................ 362
Collecting and reviewing audit logs for actions...................................................................................... 363
Appendix B. Accessibility...................................................................................393
Notices..............................................................................................................395
Glossary............................................................................................................ 399
Index................................................................................................................ 401
vii
viii
About this publication
This publication provides overview, planning, installation, and user instructions for IBM Spectrum Protect
Plus.
Publications
The IBM Spectrum Protect product family includes IBM Spectrum Protect Plus, IBM Spectrum Protect for
Virtual Environments, IBM Spectrum Protect for Databases, and several other storage management
products from IBM®.
To view IBM product documentation, see IBM Knowledge Center.
Beta program
The IBM Spectrum Protect Plus beta program gives you a first glance at upcoming product features and a
chance to influence design changes. You can test new software in your environment and have a direct
voice in the product development process.
The beta program attracts a broad range of participants, including customers, IBM Business Partners, and
IBM employees.
The program offers the following benefits:
Gain access to early code and evaluate new product features and enhancements
You get access to the beta code before general availability of the product release to determine
whether the new features and enhancements are a good fit for your organization. After the code is
downloaded, you can run and validate the new software in your environment. You can then identify
and resolve any concerns before the code is available, thus saving time and helping to prevent
production issues later. When the code becomes available, you are ready to install it and take
advantage of the new capabilities.
Interact with design and development teams
The product designers, architects, developers, and testers help to plan the beta release and support
its participants. These experts can assist you with resolving any issues.
Become an IBM reference customer
After your positive beta experience, IBM invites you to participate in the reference program. The IBM
marketing team helps you craft a message to let other potential beta testers know about your success
in adopting and using early code.
Product components
The IBM Spectrum Protect Plus solution is provided as a self-contained virtual appliance that includes
storage and data movement components.
Sizing component requirements: Some environments might require more instances of these
components to support greater workloads. For guidance about sizing, building, and integrating
components in your IBM Spectrum Protect Plus environment, see the IBM Spectrum Protect Plus
Blueprints.
The following are the base components of IBM Spectrum Protect Plus:
IBM Spectrum Protect Plus server
This component manages the entire system. The server consists of several catalogs that track various
system aspects such as restore points, configuration, permissions, and customizations. Typically,
there is one IBM Spectrum Protect Plus service in a deployment, even if the deployment is spread
across multiple locations.
The IBM Spectrum Protect Plus server contains an onboard vSnap server and VMware vStorage API
for Data Protection (VADP) proxy server. For smaller backup environments, these servers might be
sufficient. However, for larger environments, more servers might be required.
The onboard vSnap server can be used to back up and restore a small number of virtual machines and
evaluate IBM Spectrum Protect Plus operations. As your requirements for backing up and restoring
data grow, your vSnap storage can be expanded by adding external vSnap servers. By adding external
vSnap servers to your environment, you can reduce the load on the IBM Spectrum Protect Plus
appliance.
Site
This component is an IBM Spectrum Protect Plus policy construct that is used to manage data
placement in the environment. A site can be physical, such as a data center, or logical, such as a
department or organization. IBM Spectrum Protect Plus components are assigned to sites to localize
and optimize data paths. A deployment always has at least one site per physical location. The
preferred method is to localize data movement to sites by placing vSnap servers and VADP proxies
together at a single site. The placement of backup data to a site is governed by service level
agreement (SLA) policies.
vSnap server
This component is a pool of disk storage that receives data from production systems for the purposes
of data protection or reuse. The vSnap server consists of one or more disks and can be scaled up
(adding disks to increase capacity) or scaled out (introducing multiple vSnap servers to increase
overall performance). Each site can include one or more vSnap servers.
vSnap pool
This component is the logical organization of disks into a pool of storage space, which is used by the
vSnap server component. This component is also referred to as a storage pool.
VADP proxy
This component is responsible for moving data from vSphere data stores to provide protection for
VMware virtual machines and is required only for protection of VMware resources. Each site can
include one or more VADP proxies.
Item Description
Alerts icon This icon opens the Alerts window. For more
information about alerts, see “Alerts” on page
4.
Help icon This icon opens the online help system.
User menu This menu shows the name of the user who is
logged on. The menu provides access to product
information and documentation, logs, and the
user sign out option.
Example deployment
The following figure shows IBM Spectrum Protect Plus deployed in two active locations. Each location has
inventory that requires protection. Location 1 has a vCenter server and two vSphere datacenters (and an
inventory of virtual machines) and Location 2 has a single datacenter (and a smaller inventory of virtual
machines).
The IBM Spectrum Protect Plus server is deployed in only one of the sites. VADP proxies and vSnap
servers (with their corresponding disks) are deployed in each site to localize data movement in the
context of the protected vSphere resources.
Bidirectional replication is configured to take place between the vSnap servers at the two sites.
Product dashboard
The IBM Spectrum Protect Plus dashboard summarizes the health of your virtual environment in three
sections: Jobs and Operations, Destinations, and Coverage.
Destinations
The Destination section shows a summary of the devices that are used for backup operations. The
following information is shown in this section:
Coverage
The Coverage section shows a summary of the resources that are inventoried by IBM Spectrum Protect
Plus and the service level agreement (SLA) policies that are assigned to the resources. The following
information is shown in this section:
Source Protection
The Source Protection section shows the total number of source resources, such as virtual machines
and application servers, that are inventoried in the IBM Spectrum Protect Plus catalog. The number of
protected and unprotected resources are shown.
This section also shows the ratio of resources that are protected in IBM Spectrum Protect Plus to the
total resources, expressed as a percent.
Policies
The Policies section shows the total number of SLA policies with associated protection jobs.
This section also shows the three SLA policies that have the highest count assigned resources.
To view detailed information about all SLA policies, click View.
Alerts
The Alerts menu displays current and recent warnings and errors in the IBM Spectrum Protect Plus
environment. The number of alerts is displayed in a red circle, indicating that alerts are available to view.
Click the Alerts menu to view the alerts list. Each item in the list includes a status icon, a summary of the
alert, the time the associated warning or error occurred, and a link to view associated logs.
The alert list can include the following alert types:
Alert types
Job failed
Is displayed when a job fails.
Job partially succeeded
Is displayed when a job partially succeeds.
System disk space low
Is displayed when the amount of free disk space is 10% or less.
vSnap storage space low
Is displayed when the amount of free disk space is 10% or less.
System memory low
Is displayed when memory usage exceeds 95%.
System CPU usage high
Is displayed when processor usage exceeds 95%.
Action How to
To copy snapshots to a repository server See “Configuration overview” on page 117 and
“Adding a repository server as a backup storage
• Set up IBM Spectrum Protect Plus as an object
provider” on page 119.
client in the IBM Spectrum Protect server
environment.
• Add the storage to IBM Spectrum Protect Plus.
To copy snapshots to cloud storage, add the Follow the instructions for your selected storage
storage to IBM Spectrum Protect Plus. type:
• “Adding Amazon S3 Object Storage” on page 111
• “Adding IBM Cloud Object Storage as a backup
storage provider” on page 112
• “Adding Microsoft Azure cloud storage as a
backup storage provider” on page 114
• “Adding a repository server as a backup storage
provider” on page 119
Create a backup policy that includes the storage. See “Create backup policies” on page 93.
Example deployments
The following figure shows IBM Spectrum Protect Plus deployed in two active locations. Each location has
inventory that requires protection. Location 1 has a vCenter server and two vSphere datacenters (and an
inventory of virtual machines) and Location 2 has a single datacenter (and a smaller inventory of virtual
machines).
The IBM Spectrum Protect Plus server is deployed in only one of the sites. VADP proxies and vSnap
servers (with their corresponding disks) are deployed in each site to localize data movement in the
context of the protected vSphere resources.
Bi-directional replication is configured to take place between the vSnap servers at the two sites.
Snapshots are copied from the vSnap server at the secondary site to cloud storage for long-term data
protection.
The following figure shows the same deployment as the previous figure.
However, in this deployment, snapshots are copied from the vSnap server at the secondary site to IBM
Spectrum Protect for long-term data protection.
Figure 3. IBM Spectrum Protect Plus deployment across two geographical locations with copy to IBM
Spectrum Protect
Action How to
Ensure that your system environment meets the See “System requirements ” on page 11.
hardware and software requirements.
Determine how to size, build, and place the See the IBM Spectrum Protect Plus Blueprints.
components in your IBM Spectrum Protect Plus
environment.
Install IBM Spectrum Protect Plus. See Chapter 2, “Installing IBM Spectrum Protect
Plus,” on page 11.
If additional vSnap servers are required to support See Chapter 3, “Installing vSnap servers,” on page
your environment, install and configure the 67.
servers.
If additional VMware vStorage API for Data See “Managing VADP backup proxies” on page
Protection (VADP) proxies are required to support 161.
your environment, create and configure the
proxies.
Complete the basic steps to set up and start using See Chapter 5, “Getting off to a quick start,” on
IBM Spectrum Protect Plus. page 89.
System requirements
Before you install IBM Spectrum Protect Plus, review the hardware and software requirements for the
product and other components that you plan to install in the storage environment.
To help ensure that backup and restore operations can be run successfully, your system must meet the
hardware and software requirements. Use the following requirements as a starting point. For the most
current requirements, which might include updates, see technote 2013790.
To determine how to size, build, and place the components that are listed in the specifications in your
IBM Spectrum Protect Plus environment, see the IBM Spectrum Protect Plus Blueprints.
Component requirements
Ensure that you have the required system configuration and a supported browser to deploy and run IBM
Spectrum Protect Plus.
To help ensure that backup and restore operations can be run successfully, your system must meet the
hardware and software requirements. Use the following requirements as a starting point. For the most
current requirements, which might include updates, see technote 2013790.
IBM Spectrum Protect Plus support for third-party platforms, applications, services, and hardware
depend on the third-party vendors. When a third-party vendor product or version enters extended
support, self-serve support, or end of life, IBM Spectrum Protect Plus supports the product or version at
the same level as the vendor.
Browser support
Run IBM Spectrum Protect Plus from a computer that has access to the installed virtual appliance. IBM
Spectrum Protect Plus was tested and certified with the following web browsers:
• Firefox 55.0.3 and later
• Google Chrome 60.0.3112 and later
• Microsoft Edge 40.15063 or Microsoft EdgeHTML 15.15063 and later
If your screen resolution is lower than 1024 x 768, some items might not fit in the window. Enable pop-up
windows in your browser to access the help system and some IBM Spectrum Protect Plus operations.
Table 1. Communication ports when the target is an IBM Spectrum Protect Plus appliance
Port Protocol Initiator Target Description
22 Transmission vSnap server IBM Spectrum Provides access to
Control Protocol Protect Plus troubleshoot and
(TCP) appliance maintain tasks on
the IBM Spectrum
Protect Plus
appliance by using
the Secure Shell
(SSH) protocol.
Table 2. Communication ports when the initiator is an IBM Spectrum Protect Plus appliance
Port Protocol Initiator Target Description
22 TCP IBM Spectrum vSnap server or Provides access to
Protect Plus VADP proxy host troubleshoot and
appliance maintain tasks on
remote vSnap
servers and the
VADP proxy by
using Secure Shell
(SSH) protocol.
25 TCP IBM Spectrum Email server that Provides access to
Protect Plus can be accessed by an email service.
appliance using the Simple
Mail Transfer
Protocol (SMTP)
389 TCP IBM Spectrum Lightweight Provides access to
Protect Plus Directory Access Active Directory
appliance Protocol (LDAP) Services.
server
443 TCP IBM Spectrum Hypervisor: Provides access to
Protect Plus VMware ESXi host ESXi and vCenter
appliance and vCenter for managing
operations.
1. The following agents use an iSCSI initiator: Microsoft SQL Server and Microsoft Exchange.
2. The following agents use an NFS client: VMware, Microsoft Hyper-V, Db2®, Oracle, MongoDB,
Kubernetes, and Office 365.
Note: The IBM Spectrum Protect Plus virtual appliance contains the base components: IBM Spectrum
Protect Plus server, site, vSnap server, vSnap pool, and VADP proxy. In the diagram, "Open source server"
refers to theIBM Spectrum Protect Plus server.
Tip: VADP proxies can be pushed and installed on Linux-based servers over SSH port 22.
If the firewall command script is not available on your system, edit the firewall manually to add necessary
ports, and restart the firewall. For instructions about editing firewall ports, see “Editing firewall ports” on
page 64.
Cloud requirements
To copy data to cloud storage, ensure that your IBM Spectrum Protect Plus and cloud environments meet
the following requirements.
Disk cache area
For all functions related to data copy and restore operations to and from cloud and archival targets,
the vSnap server requires a disk cache area to be present on the vSnap server.
• During copy operations, this cache is used as a temporary staging area for objects that are pending
upload to the cloud endpoint.
3. To incorporate the newly added custom certificate and update the system certificate bundle, run
the following command:
$ sudo update-ca-trust
• Certificates signed by public Certificate Authority: If the cloud endpoint uses a public CA-signed
certificate, no special action is required. The vSnap server validates the certificate by using the
default system certificate store.
Network requirements
The following ports are used for communication between the vSnap servers and cloud or repository
server endpoints.
Table 6. Communication ports when the target is a cloud server or repository server endpoint
Port Protocol Initiator Target Description
443 TCP vSnap server Cloud server Allows the vSnap
endpoints to communicate
with Amazon
Simple Storage
Service (S3),
Microsoft Azure,
or IBM Cloud
Object Storage
endpoints.
9000 TCP vSnap server Repository server Allows the vSnap
endpoints to communicate
with IBM
Spectrum Protect
(repository server)
endpoints.
Any firewalls or network proxies that perform SSL Interception or Deep Packet Inspection for traffic
between the vSnap servers and cloud endpoints might interfere with SSL certificate validation on
vSnap servers. This interference can also cause cloud copy job failures. To prevent this interference,
For more information about how to set up and copy data to specific cloud providers, see Data offload
to cloud object storage with IBM Spectrum Protect Plus.
Hypervisor requirements
Review the hypervisor requirements for IBM Spectrum Protect Plus.
To help ensure that backup and restore operations can be run successfully, your system must meet the
hardware and software requirements. Use the following requirements as a starting point. For the most
current requirements, which might include updates, see technote 2013790.
Hyper-V requirements
The Microsoft Hyper-V server must meet the following minimum requirements:
• Hyper-V Server 2016 or Microsoft Hyper-V on Windows Server 2016
• Hyper-V Server 2019 or Microsoft Hyper-V on Windows Server 2019
Backup and restore operations are only supported on virtual hard disks (VHDX). For more information, see
Known Issues and Limitations: IBM Spectrum Protect Plus V10.1.5.x
IBM Spectrum Protect Plus protects virtual machines that are enabled to use the Hyper-V Replica feature.
Depending on your Hyper-V environment, you might be required to update some SLA policies when you
upgrade to IBM Spectrum Protect Plus V10.1.5. For more information about the upgrade requirements for
VMware requirements
The following VMware vSphere versions are supported:
• vSphere 6.0, including all updates and patch levels
• vSphere 6.5, including all updates and patch levels
• vSphere 6.7, including all updates and patch levels
Ensure that the latest version of VMware Tools is installed in your environment.
Physical RDM (pRDM) volumes do not support snapshots. Virtual machines that contain one or more raw
device-mapping (RDM) volumes that are provisioned in physical-compatibility mode (pRDM) are backed
up. However, the pRDM volumes are not processed as part of the virtual machine backup operation.
IBM Spectrum Protect Plus V10.1.5 protect virtual machines managed by a VMware Cloud (VMC) on AWS
Software-Defined Data Center (SDDC). For more information about this new capability, see IBM Spectrum
Protect Plus for VMware Cloud on AWS .
Install 64-bit Microsoft Visual C++ 2008 SP1 Redistributable Package on Windows-based guest virtual
machines. This is required when restoring the guest virtual machine with a different IP address.
VMware requirements
In the virtual machine settings under Advanced Configuration, the disk.enableUUID parameter must
be set to true.
Item Description
Supported operating systems • Windows Server 2008 R2
• Windows Server 2012 R2 and Windows Server
2012 R2 core
• Windows Server 2016 and Windows Server 2016
Core
• Windows Server 2019 and Windows Server 2019
core
Supported disk storage types Basic disks with the following partitions:
• MBR (Master boot record)
• GPT (GUID partition table)
Restriction: You cannot back up or restore files on
dynamic disks.
• IBM Spectrum Protect Plus supports only the operating systems that are available to your hypervisors.
Review your hypervisor documentation for information about supported operating systems.
• File indexing and restore operations support SCSI disks in a Hyper-V environment. Integrated Drive
Electronics (IDE) disks are not supported. Generation 1 virtual machines require IDE boot disks;
however, if more SCSI disks are available, file indexing and restore operations are supported on those
disks.
• Windows Remote Shell (WinRM) must be enabled.
Important: IBM Spectrum Protect Plus can protect and restore virtual machines with other file
systems, but only the previously listed file systems are eligible for file indexing and restore.
• When files are indexed in a Windows environment, the following directories on the resource are
skipped:
\Program Files
\Program Files (x86)
\Windows
\winnt
Files within these directories are not added to the IBM Spectrum Protect Plus inventory and are not
available for file recovery.
• Ensure that the latest version of VMware Tools is installed on VMware virtual machines, and Hyper-V
Integration Services is installed on your Hyper-V virtual machines.
• File indexing and file restore of a Windows VM require that the Windows Powershell binary path is set in
the %PATH% environment variable.
• Encrypted Windows file systems are not supported for file cataloging or file restore.
• File indexing and file restore are not supported from restore points that were offloaded to cloud
resources or repository servers.
• When restoring files in a Resilient File System (ReFS) environment, restores from newer versions of
Windows Server to earlier versions are not supported. For example, restoring a file from Windows
Server 2016 to Windows Server 2012.
Linux requirements
Item Description
Supported operating systems • Red Hat Enterprise Linux (RHEL) 6.4 and later
maintenance and modification levels
• CentOS 6.4 and later maintenance and
modification levels
• RHEL 7.0 and later maintenance and
modification levels
• CentOS 7.0 and later maintenance and
modification levels
• SUSE Linux Enterprise Server 12.0 and later
maintenance and modification levels
• A file system created on a newer kernel version might not be mountable on a system with an older
kernel, in which case restoring files from the newer to the older system is not supported.
IBM Spectrum Protect Plus supports only the operating systems available to your hypervisors. Review
your hypervisor documentation for information about supported operating systems.
IBM Spectrum Protect Plus can protect and restore virtual machines with other file systems, but only
the previously listed file systems are eligible for file indexing and restore operations.
• When file indexing is performed in a Linux environment, the following directories on the resource are
skipped:
/tmp
/usr/bin
use_lvmetad = 0
For details of the lvmetad service, see The Metadata Daemon (lvmetad).
• If data resides on XFS file systems and the version of xfsprogs is between 3.2.0 and 4.1.9, the file
restore operation can fail due to a known issue in xfsprogs that causes corruption of a clone or
snapshot file system when its UUID is modified. To resolve this issue, update xfsprogs to version
4.2.0 or later.
For more information, see Debian Bug report logs.
Connectivity requirements
The SSH service must be running on port 22 on the server, and any firewalls must be configured to
allow IBM Spectrum Protect Plus to connect to the server through Secure Shell (SSH). The secure file
transfer protocol (SFTP) subsystem for SSH must also be enabled.
Authentication and privilege requirements
The credentials specified for the virtual machine must specify a user that has the following sudo
privileges:
• The sudoers configuration must allow the user to run commands without a password.
• The !requiretty setting must be specified.
The recommended approach is to create a dedicated IBM Spectrum Protect Plus agent user with the
following privileges. Sample configuration:
• Create user: useradd -m sppagent
where sppagent specifies the IBM Spectrum Protect Plus agent user.
• Set a password by using the command: passwd <sppagent>
Configuration
Make sure that the Microsoft Exchange Server version that you are using is supported on your operating
system.
Application Versions
• Microsoft Exchange Server 2013 CU16 and later CU and maintenance levels: Standard or Enterprise
editions.
• Microsoft Exchange Server 2016 CU5 and later CU and maintenance levels: Standard and Enterprise
editions.
• Microsoft Exchange Server 2019 and later maintenance levels: Standard and Enterprise editions.
Note: Microsoft Exchange database availability groups (DAG) are supported.
Operating Systems
• Windows Server 2012R2 and later maintenance levels (64-bit kernel): Standard and Datacenter
editions
• Windows Server 2016 and later maintenance levels (64-bit kernel): Standard and Datacenter editions
• Windows Server 2019 and later maintenance levels (64-bit kernel): Standard and Datacenter editions
Note: Windows Server 2019 with the Server Core option is supported. However, the granular restore
feature is not supported by the Server Core installation option.
Additional Notes
Install the latest Microsoft Exchange Server patches and updates in your environment.
IBM Spectrum Protect Plus supports Microsoft Exchange Server running on a physical (bare metal) server,
also in a virtualization environment. The following virtualization environments are supported:
• VMware ESX guest operating system
• Microsoft Windows Hyper-V guest operating system
Incremental backups
IBM Spectrum Protect Plus uses update sequence number (USN) change journal technology to perform
incremental backups in a Microsoft Exchange Server environment. The USN change journal provides write
range tracking for a volume when the file size meets the minimum file size threshold requirement. The
changed bytes offset and length extent information can be queried against a specific file.
To enable write range tracking, the system environment must meet the following requirements:
• Windows Server 2012 R2 or later
• New Technology File System (NTFS) Version 3.0 or later
Software
Ensure that a supported version of a Windows 64-bit operating system is installed.
The following prerequisites from Microsoft are required and must be installed before you use IBM
Spectrum Protect Plus:
• Windows PowerShell 4 or later
• Windows Management Framework 4 or later
When you use Microsoft Exchange Server 2013 and the granular restore feature, the minimum level that
is supported for Microsoft Exchange Messaging API (MAPI) Client and Collaboration Data Objects (MAPI/
CDO) is version 6.5.8320.0.
Note: MAPI and CDO are required for Microsoft Exchange Server 2013 only.
When you use the granular restore feature with Microsoft Exchange Server 2016 or 2019, Microsoft 32-bit
Outlook 2013, Outlook 2016, or Outlook 2019 is required.
The following prerequisites from Microsoft are required, and are installed automatically by the IBM
Spectrum Protect Plus granular restore feature, if not already present on your virtual machine.
• 32-bit Microsoft Visual C++ 2012 Redistributable Package
• 64-bit Microsoft Visual C++ 2012 Redistributable Package
• 32-bit Microsoft Visual C++ 2017 Redistributable Package
• 64-bit Microsoft Visual C++ 2017 Redistributable Package
• Microsoft .NET Framework 4.5
• Microsoft ReportViewer 2012 SP1 Redistributable Package
• Microsoft SQL Server 2012 System CLR Types
• Microsoft SQL Server 2014 System CLR Types
• Microsoft SQL Server 2016 System CLR Types
Tip: Installation of these prerequisites might require a system restart. To avoid a system restart, ensure
that these prerequisites are installed before you start the IBM Spectrum Protect Plus granular restore
feature.
Registration
Register each Microsoft Exchange Server with IBM Spectrum Protect Plus by name or IP address.
Privileges
To use an Exchange database, an IBM Spectrum Protect Plus agent user must have the following
permissions:
• Microsoft Exchange Server is protected by role-based authentication. For the Microsoft Exchange agent
to work in your IBM Spectrum Protect Plus environment, you must set up the appropriate privileges.
• The Encrypting File System (EFS) must be enabled in the local or group domain policy, and a valid
Domain Data Recovery Agent (DRA) certificate must be available.
• Exchange digital certificates must be installed and configured for the mailbox browser to function
during a granular restore operation. Ensure that the current Exchange certificates are installed and
configured correctly in your environment.
Note: With Microsoft Exchange Server 2016 and 2019, the Exchange Server is configured to use
Transport Layer Security (TLS) by default. This TLS security encrypts communication between internal
Exchange servers, and between Exchange services on the local server.
For more information, see “Privileges ” on page 214.
Group Policy Object
For the Network security: LAN Manager authentication level policy setting at Computer Configuration
> Windows Settings > Security Settings > Local Policies > Security Options, specify one of the
following options:
• Not Defined.
• Send NTLMv2 response only.
• Send NTLMv2 response only. Refuse LM.
• Send NTLMv2 response only. Refuse LM & NTLM.
The Send NTLM response only option is not compatible with the vSnap Common Internet File System
(CIFS) and Server Message Block (SMB) version and can cause CIFS authentication problems.
You can specify the Group Policy Object (GPO) setting by navigating to:
• Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies >
Security Options > Network security: Restrict NTLM: Incoming NTLM traffic
Or
• Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies >
Security Options > Network security: Restrict NTLM: Outgoing NTLM traffic
Then, choose one of the following options:
• Allow all
• Allow all accounts
Ports
The following ports are used by IBM Spectrum Protect Plus agents users. The ports use secure
connections (HTTPS or SSL).
Table 9. Communication ports when the initiator is an IBM Spectrum Protect Plus agent user
Port Protocol Initiator Target Description
3260¹ TCP Microsoft Exchange vSnap server The Microsoft
Server iSCSI Initiator
service vSnap
target port that is
used for mounting
LUNS for backup
and recovery
operations
137 User Datagram Microsoft Exchange vSnap server vSnap Server
Protocol (UDP) Server Message Block
(SMB) or Common
Internet File
System (CIFS)
target port that is
used for mounting
file system shares
for transaction log
backup and
recovery
operations
138 UDP Microsoft Exchange vSnap server vSnap SMB or CIFS
Server target port that is
used for mounting
file system shares
for transaction log
backup and
recovery
operations
Hardware
Db2 requirements
Before you register Db2 with IBM Spectrum Protect Plus, ensure that your system environment meets the
outlined requirements.
To help ensure that backup and restore operations can be run successfully, your system must meet the
hardware and software requirements. Use the following requirements as a starting point. For the most
current requirements, which might include updates, see technote 2013790.
The IBM Db2 database backup and restore requirements for IBM Spectrum Protect Plus are as follows.
Configuration requirements
The following IBM Db2 databases are supported:
• IBM Db2 Version 10.5 and later maintenance levels and modification levels: Enterprise Server Edition.
Operating systems
The following operating systems are supported:
• On PowerPC®:
– AIX® 7.1 and later modification and fix pack levels (64-bit kernel).
– AIX 7.2 and later modification and fix pack levels (64-bit kernel).
• On Linux x86_x64:
– Red Hat Enterprise Linux 6.8 and later maintenance levels and modification levels.
– Red Hat Enterprise Linux 7 and later maintenance levels and modification levels.
– SUSE Linux Enterprise Server 11.0 SP4 and later maintenance levels and modification levels.
– SUSE Linux Enterprise Server 12.0 SP1 and later maintenance levels and modification levels.
• On Linux on Power® System (little endian)
– Red Hat Enterprise Linux 7.1 and later maintenance and modification levels.
– SUSE Linux Enterprise Server 12.0 SP1 and later maintenance and modification levels.
Additional notes
Install the latest IBM Db2 patches and updates in your environment.
IBM Db2 pureScale® is not supported
Ensure that your Db2 environment is configured to meet the following criteria:
• Db2 archive logging is activated and Db2 is in recoverable mode.
• Logical volumes holding Db2 table spaces (data and temporary table spaces), the local database
directory, and Db2 log files are managed by Logical Volume Manager (LVM2) on Linux and by JFS2 on
AIX. LVM2 on Linux and JFS2 on AIX are used for creating temporary volume snapshots. The logical
volume grows in size with data as it changes on the source volume while the snapshot exists. For more
information, see “LVM2 and JFS2” on page 191.
• Db2 must be in parallel backup mode if multiple partitions are to be protected. Parallel backup mode
can be enabled by using Db2 registry variables. For more information, see “Prerequisites for Db2” on
page 189.
Software
Review the following software requirements:
• The bash and sudo packages must be installed. Sudo must be version 1.7.6p2 or above. Run sudo -V to
check the version.
Tip: The required bash and sudo packages are included in the supported Linux86_64 and Linux Power
Systems (little endian) operating systems.
• Ensure that the supported version of Linux x86_64, Linux Power Systems (little endian), or AIX is
installed.
Connectivity
Ensure that the following connectivity criteria are in place:
• The SSH service is running on port 22 on the server.
• Firewalls must be configured to allow IBM Spectrum Protect Plus to connect to the server using SSH.
• The Secure Shell (SSH) subsystem for SSH is enabled.
Ports
The following ports are used by IBM Spectrum Protect Plus agents. Ports that are marked as Accept use a
secure connection (HTTPS/SSL).
Table 11. Communication ports when the target is an IBM Spectrum Protect Plus agent
Port Protocol Initiator Target Description
22 Transmission IBM Spectrum Db2 database Provides access to
Control Protocol Protect Plus virtual troubleshoot and
(TCP) appliance. maintain vSnap
IBM Spectrum servers by using
Protect Plus virtual the Secure Shell
appliance contains (SSH) protocol
the following base
components:
• IBM Spectrum
Protect Plus
server
• site
• vSnap server
• vSnap pool
• VADP proxy
Hardware
MongoDB requirements
Before you register a MongoDB application server with IBM Spectrum Protect Plus, ensure that the
system environment meets the following requirements.
To help ensure that backup and restore operations can be run successfully, your system must meet the
hardware and software requirements. Use the following requirements as a starting point. For the most
current requirements, which might include updates, see technote 2013790.
Configuration
Database versions:
• MongoDB Version 3.6 and later maintenance and modification levels: Community Server and Enterprise
Server Editions.
• MongoDB Version 4.0 and later maintenance levels and modification levels: Community Server and
Enterprise Server Editions.
Operating systems:
• On Linux x86_64:
– Red Hat Enterprise Linux (RHEL) 6.8 and later maintenance and modification levels
– CentOS 6.8 and later maintenance and modification levels
– RHEL 7 and later maintenance and modification levels
Software
• When the MongoDB application server runs RHEL 6 or CentOS 6, ensure that the openssl package is at
version 1.0.1e-57 or later. To update the version, run the following command: yum update openssl.
• Ensure that the supported version of Linux x86_64 or Linux on Power Systems (little endian) is installed.
Connectivity
Ensure that the following connectivity criteria are in place:
• The Secure Shell (SSH) service is running on port 22 on the server.
• Firewalls must be configured to allow IBM Spectrum Protect Plus to connect to the server by using SSH.
• The secure file transfer protocol (SFTP) subsystem for SSH is enabled.
• The application server can be registered in IBM Spectrum Protect Plus by using a Domain Name System
(DNS) name or Internet Protocol (IP) address. DNS names must be resolvable by IBM Spectrum Protect
Plus.
Ports
The following ports are used by IBM Spectrum Protect Plus agent users. The ports use secure
connections (HTTPS or SSL).
Table 13. Communication ports when the target is an IBM Spectrum Protect Plus agent
Port Protocol Initiator Target Description
22 Transmission IBM Spectrum MongoDB Provides access to
Control Protocol Protect Plus virtual troubleshoot and
(TCP) appliance1 maintain remote
proxy host servers
running guest
applications
components by
using the Secure
Shell (SSH)
protocol.
Table 14. Communication ports when the initiator is the IBM Spectrum Protect Plus agent
Port Protocol Initiator Target Description
111 TCP MongoDB vSnap server Allows Open
Network
Computing (ONC)
clients to discover
ports for
communications
with ONC servers.
2049 TCP MongoDB vSnap server Used for Network
File System (NFS)
data transfer to
and from vSnap
servers.
1 The IBM Spectrum Protect Plus virtual appliance contains the base components: IBM Spectrum Protect
Plus server, site, vSnap server, vSnap pool, and VADP proxy.
Application versions
The following Microsoft Office applications are supported:
• Microsoft Office 365 Business
• Microsoft Office 365 Business Premium
• Microsoft Office 365 Business Essentials
• Microsoft Office 365 Education
Note: The Microsoft Office 365 tenant must be in a global region as defined by Microsoft. National regions
are not supported. For more information about regions, see https://docs.microsoft.com/en-us/graph/
deployments.
Additional notes
IBM Spectrum Protect Plus supports the proxy host server running on a physical (bare metal) server and
in a virtualization environment.
Software
Ensure that the supported version of Linux x86_64 is installed. In addition, the following software must
be installed:
• Java™ 8
• The International Components for Unicode (libicu) rpm-package that corresponds to the installed
operating system.
Connectivity
• The Secure Shell (SSH) service must be running on port 22 on the proxy host server. Any firewalls must
be configured to allow IBM Spectrum Protect Plus to connect to the proxy host server by using SSH. The
secure file transfer protocol (SFTP) subsystem for SSH must also be enabled.
• The server can be registered by using a Domain Name System (DNS) name or Internet Protocol (IP)
address. DNS names must be resolvable by IBM Spectrum Protect Plus.
• If DNS is not available, you must add the server to the /etc/hosts file on the IBM Spectrum Protect Plus
virtual appliance by using the command prompt.
Ports
The following ports are used by IBM Spectrum Protect Plus agents users. The ports use secure
connections (HTTPS or SSL).
Table 17. Required communication ports when the initiator is an IBM Spectrum Protect Plus agent user.
Port Protocol Initiator Target Description
111 TCP Proxy host server vSnap server Allows Open
Network
Computing (ONC)
clients to discover
ports for
communications
with ONC servers
443 TCP Proxy host server vSnap server Allows agents to
communicate with
IBM Spectrum
Protect Plus for
sending alerts if log
backup failures
2049 TCP Proxy host server vSnap server Used for NFS data
transfer to and
from vSnap servers
20048 TCP Proxy host server vSnap server Mounts vSnap file
systems on clients
such as the
VMware vStorage
API for Data
Protection (VADP)
proxy, application
servers, and
virtualization data
stores
Configuration
Database versions
• Oracle 11g R2 Enterprise Edition
• Oracle 12c R1 Enterprise Edition
• Oracle 12c R2 Enterprise Edition
• Oracle 18c Enterprise Edition
• Oracle 19c Enterprise Edition
Note: For multitenant databases in Oracle 12c and later, IBM Spectrum Protect Plus supports protection
and recovery of the container database, including all pluggable databases (PDBs) under it. Granular
recovery of specific PDBs can be performed by using an Instant Disk Restore recovery combined with the
Recovery Manager (RMAN).
Operating systems
On IBM PowerPC:
• AIX 6.1 TL9 and later maintenance and modification levels
• AIX 7.1 and later maintenance and modification levels
On Linux x86_64:
• Red Hat Enterprise Linux (RHEL) 6.5 and later maintenance and modification levels
• RHEL 7.0 and later maintenance and modification levels
• Cent OS 6.5 and later maintenance and modification levels
• Cent OS 7.0 and later maintenance and modification levels
• SUSE Linux Enterprise Server 11.0 SP4 and later maintenance and modification levels
• SUSE Linux Enterprise Server 12.0 SP1 and later maintenance and modification levels
• SUSE Linux Enterprise Server 15.0 and later maintenance and modification levels
Restrictions:
• Oracle DataGuard is not supported.
• Databases must be in ARCHIVELOG mode. IBM Spectrum Protect Plus cannot protect databases
running in NOARCHIVELOG mode.
• Real Application Cluster (RAC) database recovery operations are not server pool-aware. IBM Spectrum
Protect Plus can recover databases to an RAC, but not to specific server pools.
• RAC databases must be configured such that the RMAN Snapshot Control File location points to shared
storage that is accessible to all cluster instances.
Software
• The bash and sudo packages must be installed. The sudo package must be version 1.7.6p2 or later.
Run sudo -V to check the version.
Tip: The required bash and sudo packages are included in the supported Linux86_64 operating
systems.
• RHEL and CentOS 6 users only:
To ensure that the util-linux-ng package is current, run the following command:
Connectivity
• The Secure Shell (SSH) service must be running on port 22 on the server and any firewalls must be
configured to allow IBM Spectrum Protect Plus to connect to the server by using SSH. The subsystem
for SSH must also be enabled.
• The server can be registered by using a Domain Name System (DNS) name or Internet Protocol (IP)
address. DNS names must be resolvable by IBM Spectrum Protect Plus.
• If DNS is not available, you must add the server to the /etc/hosts file on the IBM Spectrum Protect
Plus appliance by using the command line.
• When you register Oracle RAC nodes, register each node by using its physical IP or name. Do not use a
virtual name or Single Client Access Name (SCAN).
Database discovery
IBM Spectrum Protect Plus discovers Oracle installations and databases by searching the /etc/
oraInst.loc and /etc/oratab files and the list of running Oracle processes. If the files are not
present in their default location, the locate utility must be installed on the system so that IBM Spectrum
Protect Plus can search for the files.
IBM Spectrum Protect Plus discovers databases and their storage layouts by connecting to running
instances and querying the locations of their data files, log files, and other files. In order for IBM
Spectrum Protect Plus to correctly discover databases during cataloging and copy operations, databases
must be in MOUNTED, READ ONLY, or READ WRITE mode. IBM Spectrum Protect Plus cannot discover or
protect database instances that are shut down.
Log backup
• The cron daemon must be enabled on the application server.
• The IBM Spectrum Protect Plus agent user must have the necessary privileges to use the crontab
command and create cron jobs. Privileges can be granted through the cron.allow configuration file.
useradd -m sppagent
• Set a password:
passwd sppagent
• If you plan to use ASM, also add the user to the OSASM group:
• Place the following lines at the end of the sudoers configuration file, typically /etc/sudoers. If the
existing sudoers file is configured to import a configuration from another directory (for
example, /etc/sudoers.d), you can also place the lines in a new file in that directory:
Defaults:sppagent !requiretty
Defaults:sppagent env_keep+="ORACLE_HOME"
Defaults:sppagent env_keep+="ORACLE_SID"
sppagent ALL=(ALL) NOPASSWD:ALL
Ports
The following ports are used by IBM Spectrum Protect Plus agent users. The ports use secure
connections (HTTPS or SSL).
Table 19. Communication ports when the target is an IBM Spectrum Protect Plus agent
Port Protocol Initiator Target Description
22 Transmission IBM Spectrum Oracle Server Provides access to
Control Protocol Protect Plus virtual troubleshoot and
(TCP) appliance2 maintain remote
proxy host servers
running guest
applications
components by
using the Secure
Shell (SSH)
protocol
2 The IBM Spectrum Protect Plus virtual appliance contains the base components: IBM Spectrum Protect
Plus server, site, vSnap server, vSnap pool, and VADP proxy.
Hardware
Configuration
Database versions
• Microsoft SQL Server 2008 R2 SP3
• Microsoft SQL Server 2012
• Microsoft SQL Server 2012 SP2
• Microsoft SQL Server 2014
Incremental backups
IBM Spectrum Protect Plus uses update sequence number (USN) change journal technology to perform
incremental backups in a Microsoft SQL Server environment. The USN change journal provides write
range tracking for a volume when the file size meets the minimum file size threshold requirement. The
changed bytes offset and length extent information can be queried against a specific file.
To enable write range tracking, the system environment must meet the following requirements:
• Windows Server 2012 R2 or later
Log backups
IBM Spectrum Protect Plus supports log backups:
With staging area
IBM Spectrum Protect Plus uses the backup folder that is configured for the Microsoft SQL Server
instance to stage the collection of logs, before copying log files to the vSnap repository. Sufficient free
space must be available to store transaction logs in a log backup. The staging area can be modified by
changing the backup folder configuration by using SQL Server Management Studio (SSMS).
Without staging area
This type of log backup requires vSnap Active Directory (AD) integration. To learn how to configure the
vSnap server, see Setting vSnap Active Directory.
The Microsoft SQL service user must be in an Active Directory (AD) domain. The SLA policy must be
configured to use a site that contains a vSnap that is integrated to the same AD domain as the SQL
Server service user.
To ensure that SQL Server Log Backup works properly, a Windows Group Policy change might be required.
The Group Policy Object (GPO) setting for the Network security: LAN Manager authentication level
policy at Computer Configuration > Windows Settings > Security Settings > Local Policies > Security
Options, must be set to one of the following options:
• Not Defined
• Send NTLMv2 response only.
• Send NTLMv2 response only. Refuse LM.
• Send NTLMv2 response only. Refuse LM & NTLM.
The Send NTLM response only option is not compatible with the vSnap Common Internet File System
(CIFS) and SMB version and can cause CIFS authentication problems.
The Group Policy Object (GPO) setting for the Computer Configuration > Policies > Windows Settings >
Security Settings > Local Policies > Security Options > Network security: Restrict NTLM: Incoming
NTLM traffic, must be set to one of the following options:
• Allow all
• Allow all accounts
Kerberos
Kerberos-based authentication can be enabled by specifying a configuration file on the IBM Spectrum
Protect Plus appliance. The settings override the default Windows NT LAN Manager (NTLM) protocol.
For Kerberos-based authentication only, the user identity must be specified in the username@FQDN
format. The user name must be able to authenticate by using the registered password to obtain a ticket-
granting ticket (TGT) from the key distribution center (KDC) on the domain specified by the fully qualified
domain name.
Privileges
To use a Microsoft SQL Server, an IBM Spectrum Protect Plus agent user must have the following
permissions:
• Microsoft SQL Server public and sysadmin permissions
• Windows local administration permission, which are required by the VSS framework, and volume and
disk access
A specified logon session does not exist. It might already have been terminated.
This behavior occurs when a network access Group Policy setting is enabled. For instructions about
disabling the setting, see the Microsoft Support article: A specified logon session does not exist. It may
already have been terminated, error when you try to map to a network drive of a DFS share
Ports
The following ports are used by IBM Spectrum Protect Plus agent users. The ports use secure
connections (HTTPS or SSL).
Table 22. Communication ports when the target is an IBM Spectrum Protect Plus agent
Port Protocol Initiator Target Description
5985 Transmission IBM Spectrum Microsoft SQL Provides access to
Control Protocol Protect Plus virtual Server the Microsoft
(TCP) appliance3 Windows Remote
Management
(WinRm) service
for Windows-based
servers.
5986 TCP IBM Spectrum Microsoft SQL Provides access to
Protect Plus virtual Server the Microsoft
appliance Windows Remote
Management
(WinRm) service
for Windows-based
servers.
3 The IBM Spectrum Protect Plus virtual appliance contains the base components: IBM Spectrum Protect
Plus server, site, vSnap server, vSnap pool, and VADP proxy.
Container versions
Docker containers are supported in Kubernetes Backup Support.
Operating systems
On Linux x86_64:
• Red Hat Enterprise Linux (RHEL) 7.6
• RHEL 7.7
Additional requirements
• Kubernetes 1.13 and later patches and updates
• Kubernetes 1.14 and later patches and updates
• Kubernetes 1.15 and later patches and updates
• Kubernetes 1.16 and later patches and updates
• Ceph Container Storage Interface (CSI) driver 1.1 with Rados Block Device (RBD) storage
To install and configure container backup support, the backup administrator must deploy the Kubernetes
Backup Support software in the Kubernetes environment. For instructions, see “Installing Kubernetes
Backup Support” on page 315.
Software
• Kubernetes Backup Support protects only persistent storage that was allocated by a storage plug-in
that supports the Container Storage Interface (CSI).
• Only formatted volumes can be mounted to the data mover for copy operations.
• Ensure that Kubernetes Metrics Server 0.3.5 or later is installed and running on your cluster. The
metrics server is required for the Kubernetes Backup Support scheduler to determine the resources
that are used for multiple concurrent data mover instances. For more information, see “Verifying
whether the metrics server is running” on page 316.
• Copy backup and snapshot restore operations require the VolumeSnapshotDataSource alpha
feature to be enabled. To enable the VolumeSnapshotDataSource alpha feature, you must patch the
Kubernetes scheduler, controller, and API server. For instructions, see “Enabling the
VolumeSnapshotDataSource feature” on page 315.
• Ensure that the following cluster prerequisites are met:
– You must be running a Kubernetes cluster with CSI support.
Helm prerequisites
The Helm tool must be configured on the target cluster so that a new deployment can be run with the
helm command line. Deploying a package with Helm enables cluster-wide role-based access control
(RBAC) rules and role bindings to be generated.
For the Kubernetes cluster, to install Helm as root user with the Kubernetes administrative user account,
run the following script, which is included in the installation package:
./helm_install_k8s.sh
Connectivity
Ensure that the following connectivity criteria are in place:
• SSH service is running on Kubernetes NodePort services.
• Firewalls must be configured to allow IBM Spectrum Protect Plus to connect data mover containers by
using SSH over the NodePort port range of the Kubernetes cluster. The NodePort service allows the
specific port in the NodePort range to be determined by Kubernetes at run time.
• The server can be registered in IBM Spectrum Protect Plus by using a Domain Name System (DNS)
name or an Internet Protocol (IP0 address. DNS names must be resolvable by IBM Spectrum Protect
Plus.
Ports
The following communications ports are used by IBM Spectrum Protect Plus agents. The ports use secure
connections (HTTPS or SSL).
Table 25. Communication ports when the target is an IBM Spectrum Protect Plus agent
Port Protocol Initiator Target Description
Assigned by the TCP IBM Spectrum Kubernetes Used by IBM
NodePort service in Protect Plus virtual Spectrum Protect
Kubernetes appliance6 Plus to connect to
the data mover
container to deploy
and run agents.
For SSH connections between containers in the Kubernetes environment, port 22 is used. For everywhere
else, whether on the Kubernetes hosts or outside the cluster, the port that the NodePort service assigned
at runtime is used.
Table 26. Communication ports when the initiator is the IBM Spectrum Protect Plus agent
Port Protocol Initiator Target Description
111 TCP Kubernetes vSnap server Allows ONC clients
to discover ports
for
communications
with ONC servers
6 Refers to the IBM Spectrum Protect Plus server, which is a component of the IBM Spectrum Protect Plus
virtual appliance.
Related concepts
“Protecting containers” on page 309
Kubernetes Backup Support is a feature of IBM Spectrum Protect Plus that extends data protection to
containers in Kubernetes clusters. Kubernetes is a system for orchestrating containers across clusters of
hosts.
Procedure
Download the appropriate installation file.
A different installation file is provided for installation on VMware and Microsoft Hyper-V systems. Ensure
that you download the correct file for your environment.
Important: Do not change the names of the installation or update files. The original file names are
required for the installation or update process to complete without errors.
Related concepts
“Updating IBM Spectrum Protect Plus components” on page 103
You can update the IBM Spectrum Protect Plus virtual appliance, vSnap servers, and the VADP proxy
servers to get the latest features and enhancements. Software patches and updates are installed by using
the IBM Spectrum Protect Plus administrative console or command-line interface for these components.
Related tasks
“Installing IBM Spectrum Protect Plus as a VMware virtual appliance” on page 59
Procedure
To install IBM Spectrum Protect Plus as a virtual appliance, complete the following steps:
1. Deploy IBM Spectrum Protect Plus. Using either the vSphere Client (HTML5) or the vSphere Web
Client (FLEX), from the Actions menu, click Deploy OVF Template.
2. Specify the location of the CC1QCML.ova file and select it. Click Next.
What to do next
Once the virtual appliance has been deployed, the IBM Spectrum Protect Plus application as well as a
local vSnap server which is built into it will be registered and installed on it automatically. To start IBM
Spectrum Protect Plus, complete the following actions:
Action How to
Connect to the console of the IBM Spectrum See Assigning a static IP address.
Protect Plus virtual appliance by using VMware
Remote Console or SSH. Set up network
configurations using the NetworkManager Text
User Interface (nmtui).
Upload the product key. See “Uploading the product key” on page 63.
Start IBM Spectrum Protect Plus from a supported See “Start IBM Spectrum Protect Plus” on page
web browser. 91.
Procedure
To install IBM Spectrum Protect Plus as a virtual appliance, complete the following steps:
1. Copy the CC1QDML.exe file to your Hyper-V server.
2. Open the installer and complete the Setup Wizard.
3. Open Hyper-V Manager and select the required server.
4. From the Actions pane in Hyper-V Manager, click Import Virtual Machine. The Import Virtual
Machine wizard opens. Click Next.
5. In the Locate Folder step, click Browse... and navigate to the folder that was designated during the
installation. Select the folder with SPP-{release} in it. Click Next.
6. In the Select Virtual Machine step, ensure the virtual machine SPP-{release} is selected and then
click Next. The Choose Import Type dialog opens.
7. In the Choose Import Type step, select Register the virtual machine in-place (use the existing
unique ID). Click Next.
Important: Do not import multiple IBM Spectrum Protect Plus virtual alliances on a single Hyper-V
server.
8. In the Connect Network step, set Connection to the virtual switch to use. Click Next.
9. In the Summary step, review the Description. Click Finish to close the Import Virtual Machine
wizard.
10. In Hyper-V Manager, locate the new virtual machine named SPP-{release}. Right-click this virtual
machine and click Settings.
11. The Settings dialog for this virtual machine will open. In the navigation pane, click Hardware > IDE
Controller 0 > Hard Drive.
12. In the Media section, ensure that the correct virtual hard disk is selected. Note the file name of the
original virtual disk. Click Edit.
13. The Edit Virtual Hard Disk Wizard will open. Go to the Choose Action step.
14. In the Choose Action step, click Convert and then click Next.
What to do next
After you install the virtual appliance, complete the following actions:
Action How to
Restart the virtual appliance. Refer to the documentation for the virtual
appliance.
Upload the product key. See “Uploading the product key” on page 63.
Start IBM Spectrum Protect Plus from a supported See “Start IBM Spectrum Protect Plus” on page
web browser. 91.
Procedure
To reassign a new static IP address, ensure that the IBM Spectrum Protect Plus virtual machine is
powered on and complete the following steps:
1. Log on to the virtual machine console with the user ID serveradmin.
The initial password is sppDP758-SysXyz. You are prompted to change this password during the first
logon. Certain rules are enforced when creating a new password. For more information, see the
password requirement rules in “Start IBM Spectrum Protect Plus” on page 91.
2. From a CentOS command line, enter nmtui to open the interface.
Procedure
Note: When a catalog backup from an IBM Spectrum Protect Plus server that is using a trial license during
the evaluation period is restored to another IBM Spectrum Protect Plus server also using a trial license in
the evaluation period, the remaining day count of the trial license of the catalog backup source server still
applies. This does not apply to production licenses with valid product keys.
To upload the product key, complete the following steps:
1. From a supported browser, enter the following URL:
https://HOSTNAME:8090/
Where HOSTNAME is the IP address of the virtual machine where the application is deployed.
2. In the login window, select Authentication Type > System. Enter the serveradmin password to
access the Administration Console. The default password is sppDP758-SysXyz.
You are prompted to change this password during the first logon. Certain rules are enforced when
creating a new password. For more information, see the password requirement rules in “Start IBM
Spectrum Protect Plus” on page 91.
3. Click Manage your licenses.
4. Click Choose File, and then browse for the product key on your computer,
5. Click Upload new license.
6. Click Logout.
What to do next
After you upload the product key, complete the following action:
Action How to
Start IBM Spectrum Protect Plus from a supported See “Start IBM Spectrum Protect Plus” on page
web browser. 91.
Red Hat Enterprise Linux 7 and later, and CentOS 7 and later
Use the following commands to open ports on remote VADP proxy servers or application servers.
Use the following command to list the open ports:
firewall-cmd --list-ports
firewall-cmd --get-zones
Use the following command to list the zone that contains the Ethernet port eth0:
firewall-cmd --get-zone-of-interface=eth0
Use the following command to open port 8098 for TCP traffic. This command is not permanent.
Use the following command to open port 8098 for TCP traffic after you restart the firewall rules. Use this
command to make the changes persistent:
Use the following command to reload the firewall rules with the firewall updates:
firewall-cmd --reload
Use the following command to open port 8098 for outbound TCP traffic to internal subnet
<172.31.1.0/24>:
Use the following command to open port 8098 for outbound TCP traffic to external subnet
<10.11.1.0/24> and only for Ethernet port adapter eth1:
Use the following command to open port 8098 for inbound TCP traffic to a range of CES IP addresses
(10.11.1.5 through 10.11.1.11) and only for Ethernet port adapter eth1:
sudo iptables -A INPUT -i eth1 -p tcp -m iprange --dst-range 10.11.1.5-10.11.1.11 --dport 8098 -
j ACCEPT
Use the following command to allow an internal network, Ethernet port adapter eth1 to communicate
with an external network Ethernet port adapter eth0:
. This example is for Red Hat Enterprise Linux 7 and later specifically.
Use the following command to open port 8098 for inbound traffic from subnet 10.18.0.0/24 on Ethernet
port eth1 within the public zone:
Use the following command to save firewall rule changes to persist after a firewall restart process:
sudo iptables-save
Use the following command to stop and start Uncomplicated Firewall (UFW):
Procedure
1. Log on to the appliance or server that is to be directly connected to the iSCSI mounted storage.
• For the IBM Spectrum Protect Plus appliance, use the Secure Shell (SSH) protocol and authenticate
with the appropriate administrative credentials.
• For a vSnap server, use SSH or access the server directly and authenticate with the appropriate
administrative credentials.
Procedure
1. Install a Linux operating system that supports physical vSnap installations. See “vSnap server physical
installation requirements” on page 18 for supported operating systems.
The minimum installation configuration is sufficient, but you can also install additional packages
including a graphical user interface (GUI). The root partition must have at least 8 GB of free space after
installation.
2. Edit the /etc/selinux/config file to change the SELinux mode to Permissive.
3. Run setenforce 0 to apply the setting immediately without requiring a restart.
What to do next
After you install the vSnap server, complete the following action:
Action How to
Add the vSnap server to IBM Spectrum Protect See Chapter 4, “Managing vSnap servers,” on page
Plus and configure the vSnap environment. 73.
Procedure
1. Download the server and proxy template installation file CC1QEML.ova from Passport Advantage
Online. For information about downloading files, see technote 1072392.
2. Deploy the vSnap server. Using the vSphere Client (HTML5) or the vSphere Web Client (FLEX), click
the Actions menu and then click Deploy OVF Template.
3. Specify the location of the CC1QEML.ova file and select it. Click Next.
4. Provide a meaningful name for the template, which becomes the name of your virtual machine.
Identify an appropriate location to deploy the virtual machine. Click Next.
5. Select an appropriate destination compute resource. Click Next.
6. Review the template details. Click Next.
7. Read and accept the End User License Agreement. Check I accept all license agreements for
vSphere Client or click Accept for vSphere Web Client. Click Next.
8. Select the storage to which the virtual appliance is to be installed. The datastore of this storage must
be configured with the destination host. The virtual appliance configuration file and the virtual disk
files will be stored in it. Ensure the storage is large enough to accommodate the virtual appliance
including the virtual disk files associated with it. Select a disk format of the virtual disks. Thick
provisioning allows for better performance of the virtual appliance. Thin provisioning uses less disk
space at the expense of performance. Click Next.
9. Select a disk format to store the virtual disks. To optimize performance, you can select thick
provisioning, which is preselected. Thin provisioning requires less disk space, but might impact
performance. Click Next.
10. Select networks for the deployed template to use. Several available networks on the ESX server may
be available by clicking Destination Networks. Select a destination network that allows you to define
the appropriate IP address allocation for the virtual machine deployment. Click Next.
11. Provide details of the VADP configuration, including the IP address of the IBM Spectrum Protect Plus
appliance.
For ESXi server 5.5, this prompt is shown when the OVF deployment template reaches the Properties
step.
For the ESXi server 6.0 and later, this prompt is shown when the OVF deployment template reaches
the Customize Template step.
What to do next
After you install the vSnap server, complete the following action:
Action How to
Add the vSnap server to IBM Spectrum Protect See Chapter 4, “Managing vSnap servers,” on page
Plus and configure the vSnap environment. 73.
Configure the VADP environment. See “Setting options for VADP proxies” on page
163.
Procedure
1. Download the vSnap installation file CC1QFML.exe from Passport Advantage Online. For information
about downloading files, see technote 1072392.
2. Copy the installation file to your Hyper-V server.
3. Start the installer and complete the installation steps.
4. Open Hyper-V Manager and select the required server. For Hyper-V system requirements, see
System requirements for Hyper-V on Windows Server.
5. From the Actions menu in Hyper-V Manager, click Import Virtual Machine, and then click Next. The
Locate Folder dialog opens.
6. Browse to the location of the Virtual Machines folder within the unzipped vSnap folder. Click Next.
The Select Virtual Machine dialog opens.
7. Select vSnap, and then click Next. The Choose Import Type dialog opens.
8. Choose the following import type: Register the virtual machine in place. Click Next.
What to do next
After you install the vSnap server, complete the following action:
Action How to
Add the vSnap server to IBM Spectrum Protect See Chapter 4, “Managing vSnap servers,” on page
Plus and configure the vSnap environment. 73.
Procedure
1. Log on to the vSnap server console with the user ID serveradmin. The initial password is sppDP758-
SysXyz. You are prompted to change this password during the first logon. Certain rules are enforced
when creating a new password. For more information, see the password requirement rules in “Start
IBM Spectrum Protect Plus” on page 91.
You can also use a user ID that has vSnap administrator privileges that you create by using the vsnap
user create command. For more information about using console commands, see “vSnap server
administration reference ” on page 83.
2. Run the following commands:
rm -rf /etc/vsnap
rm -rf /etc/nginx
rm -rf /etc/uwsgi.d
rm -f /etc/uwsgi.ini
4. Reboot the system to ensure kernel modules are unloaded and detach the data disks containing vSnap
pool data.
Note: To uninstall IBM Spectrum Protect Plus in a Hyper-V environment, delete the IBM Spectrum
Protect Plus appliance from Hyper-V and then delete the installation directory.
Results
After a vSnap server is uninstalled, the configuration is retained in the /etc/vsnap directory. The
configuration is reused if the vSnap server is reinstalled. The configuration is removed if you ran the
optional commands to remove the configuration data.
Procedure
To add a vSnap server as a backup storage device, complete the following steps:
1. Log on to the vSnap server console with the user ID serveradmin. The initial password is sppDP758-
SysXyz.
You are prompted to change this password during the first logon. Certain rules are enforced when
creating a new password. For more information, see the password requirement rules in “Start IBM
Spectrum Protect Plus” on page 91.
2. Run the vsnap user create command to create a user name and password for the vSnap server.
3. Start the IBM Spectrum Protect Plus user interface by entering the host name or IP address of the
virtual machine where IBM Spectrum Protect Plus is deployed in a supported browser.
4. In the navigation pane, click System Configuration > Backup Storage > Disk.
5. Click Add Disk Storage.
6. Complete the fields in the Storage Properties pane:
Hostname/IP
Enter the resolvable IP address or hostname of the backup storage.
Site
Select a site for the backup storage. Available options are Primary, Secondary, or Add a new site.
If more than one primary, secondary, or user-defined site is available to IBM Spectrum Protect
Plus, the site with the largest amount of available storage is used first.
Username
Enter the user name for the vSnap server that you created in step “2” on page 73.
Password
Enter the password for the user.
7. Click Save.
IBM Spectrum Protect Plus confirms a network connection and adds the backup storage device to the
database.
What to do next
After you add a backup storage provider, take the following actions:
Related tasks
“Start IBM Spectrum Protect Plus” on page 91
Start IBM Spectrum Protect Plus to begin using the application and its features.
Procedure
To edit the settings for a vSnap server, complete the following steps:
1. In the navigation pane, click System Configuration > Backup Storage > Disk.
2. Click the edit icon that is associated with a vSnap server.
The Edit Storage pane is displayed.
3. Revise the vSnap server settings, and then click Save.
Before you delete a vSnap server, review the scenarios to determine whether deletion is appropriate or
whether other action must be taken.
Scenario 1: The vSnap server is temporarily down due to storage or network issues.
• Do not delete the vSnap server. If you delete the vSnap server, recovery points that are associated with
the server will be purged and backups will be rebased.
• Complete the necessary storage or network maintenance to bring the vSnap server back online.
Scenario 2: The vSnap server is assigned a new host name or IP address.
• Do not delete the vSnap server. If you delete the vSnap server, recovery points that are associated with
the server will be purged and backups will be rebased.
• Edit the settings for the vSnap server to specify the new host name or IP address. To edit the settings
for a vSnap server, follow the instructions “Editing settings for a vSnap server” on page 74.
Scenario 3: The vSnap server is not in use, and there are no plans to reuse it.
• Delete the vSnap server and run a maintenance job to ensure that recovery points that are associated
with the vSnap server are purged from IBM Spectrum Protect Plus.
– Incremental backups of the data that was present on the vSnap server will no longer be possible.
– Recovering data that was present on the vSnap server will no longer be possible.
Procedure
To delete a vSnap server, complete the following steps:
1. In the navigation pane, click System Configuration > Backup Storage > Disk.
2. Click the delete icon that is associated with a vSnap server.
3. Click Yes to delete the server from IBM Spectrum Protect Plus.
Procedure
To configure backup storage options for your registered disks, complete the following steps:
1. In the navigation pane, click System Configuration , Backup Storage > Disk.
The Disk Storage table lists the hostname of primary and secondary sites with the version and the
capacity usage.
2. In the Disk Storage pane, click the manage icon that is associated with the disk that you want to
update.
3. Select from the storage options as shown.
Procedure
To add new unused disks to a disk storage pool, complete the following steps:
1. In the navigation, click System Configuration , Backup Storage > Disk.
2. In the Disk Storage pane, click the manage icon that is associated with the server that you want to
edit.
3. Select a disk to add to your storage environment from the list of available disks in the Add New Disks
to Backup Storage table.
Procedure
To add partners to your a server in your storage environment, complete the following steps:
1. In the navigation, click System Configuration , Backup Storage > Disk.
Configured partners that are already added are listed in the table.
2. In the Partners pane, select a partner to add to you primary or secondary backup storage host from
the drop-down menu.
3. Click Add Partner to add the partner and close the window.
Procedure
To add an Active Directory for backup and restore operations, complete the following steps:
1. In the navigation pane, click System Configuration , Backup Storage > Disk.
2. On the Active Directory tab, click the manage icon that is associated with the primary or secondary
host that you want to edit.
3. Enter the domain name of the Active Directory, along with the user name and password for the Active
Directory adminsitrraro as shown in the following picture.
4. Click Join.
Procedure
To configure advanced options for your backup storage, complete the following steps:
1. In the navigation pane, click System Configuration , Backup Storage > Disk.
2. In the Manage Backup Storage pane, click the manage icon that is associated with the host that
you are managing.
3. On the Advanced Options tab, configure advanced options as shown in the following example:
• Concurrent stream limit for copy to archive object storage: This value defines the maximum
number of concurrent streams that are used by this backup host when you are copying data to
archive Object Storage.
• Concurrent stream limit for copy to standard object storage: This value defines the maximum
number of concurrent streams that are used by this backup host when you are copying data to
standard Object Storage.
• Concurrent stream limit for replication: This value defines the maximum number of concurrent
streams that are used by this backup host when you are replicating data to other backup hosts.
• Rate limit per stream in bytes/second for copy to standard object storage: This value defines the
maximum transfer rate in bytes per second that the backup host uses for each data stream when you
are copying data to standard Object Storage. The specified value is the maximum in the absence of
any other limiting factors. The actual rate of each data stream can be less than this value and
depends on available system resources, network conditions, and any bandwidth throttling defined in
site options.
• Rate limit per stream in bytes/second for replication: This value defines the maximum transfer
rate in bytes per second that the backup host uses for each data stream when you are replicating.
The specified value is the maximum in the absence of any other limiting factors. The actual rate of
each data stream can be less than this value and depends on available system resources, network
conditions, and any bandwidth throttling defined in site options.
• Retrieval tier for restore from AWS archive object storage (Bulk, Standard, or Expedited): This
value specifies the retrieval tier that is used by this backup host during restore operations from
Amazon Glacier archive Object Storage. This value must be specified as Bulk, Standard, or
Expedited. The retrieval tier can be modified to achieve faster restore operation times at the cost
of higher data charges. For information about the available retrieval tier options and associated
pricing, see the Amazon Web Services documentation.
• Concurrent Backup: This option specifies the maximum number of parallel backup streams to the
host when multiple jobs that run concurrently. For application backup operations, each database is
treated as a single stream. For hypervisor backup operations, each virtual disk is treated as a single
stream. The concurrent backup options can be used to prevent multiple or large SLA policies from
sending too many data streams to a small backup host that cannot accommodate the load. To
reduce processing time for backup operations, set this option to one of the following options:
Procedure
To initialize a vSnap server by using the IBM Spectrum Protect Plus user interface, complete the following
steps:
1. In the navigation pane, click System Configuration > Backup Storage > Disk.
2. From the Actions menu that is associated with the server, select the initialization method:
Initialize with Encryption
Enable encryption of backup data on the vSnap server.
Procedure
To initialize a vSnap server by using the vSnap server console, complete the following steps:
1. Log in to the vSnap server console with the user ID serveradmin. The initial password is sppDP758-
SysXyz. You are prompted to change this password during the first logon. Certain rules are enforced
when creating a new password. For more information, see the password requirement rules in “Start
IBM Spectrum Protect Plus” on page 91.
You can also use a user ID that has vSnap admin privileges that you create by using the vsnap user
create command. For more information about using console commands, see “vSnap server
administration reference ” on page 83.
2. Run the vsnap system init --skip_pool command. The command requires no further
interaction and completes all initialization tasks except for the creation of a storage pool. The process
might take 5 - 10 minutes to complete.
What to do next
After you complete the initialization, complete the following action:
Action How to
Create a storage pool See “Storage management” on page 84.
Procedure
To expand a vSnap storage pool, complete the following steps:
1. In the navigation pane, click System Configuration > Backup Storage > Disk.
2. Select Actions > Rescan for the vSnap server that you want to rescan.
3. Click the manage icon that is associated with the vSnap server, and then expand the Add New
Disks to Backup Storage section.
4. Add and save the selected disks. The vSnap pool expands by the size of the disks that are added.
Procedure
To establish a replication partnership, complete the following steps:
1. In the navigation pane, click System Configuration > Backup Storage > Disk.
2. Click the manage icon that is associated with the vSnap server that you want to add a replication
partnership to, and then expand the Configure Storage Partners section.
3. Click the add icon .
4. From the Select Partner list, select a vSnap server with which to establish a replication partnership.
5. Click Add Partner.
What to do next
After you create a replication partnership, complete the following action to enable replication:
Action How to
Select the Backup Storage Replication option in See “Creating an SLA policy” on page 145
the SLA policy that is associated with the backup
job.
Procedure
1. In the navigation pane, click System Configuration > Site to open the Site Properties pane.
2. Click the edit icon that is associated with the site for which you want to change the throughput.
3. Click Enable Throttle.
The rate of the throughput is displayed in MB/s.
4. Adjust the throughput:
• Change the rate of throughput with the up and down arrows.
• Change the data value. The choices include Bytes/s, KB/s, MB/s, or GB/s.
Managing vSnap by using the IBM Spectrum Protect Plus user interface
Some of the most common operations can also be completed from the IBM Spectrum Protect Plus user
interface. Log in to the user interface and click System Configuration > Backup Storage > Disk in the
navigation pane. Click the manage icon for a vSnap server to edit its settings.
Related tasks
“Managing vSnap servers” on page 73
To enable backup and restore jobs, at least one IBM Spectrum Protect Plus virtual appliance and at least
one vSnap server is required. The vSnap server can be located on the IBM Spectrum Protect Plus
appliance or on its own appliance, or it can be a physical vSnap installation. Each vSnap server location
must be added so that IBM Spectrum Protect Plus recognizes it.
“Configuring advanced storage options” on page 78
You can set advanced storage-related options for the primary or secondary backup storage in your
environment.
Storage management
You can configure and administer storage pools for a vSnap server.
Managing disks
vSnap creates a storage pool using disks provisioned to the vSnap server. In the case of virtual
deployments, the disks can be RDM or virtual disks provisioned from datastores on any backing storage.
In the case of physical deployments, the disks can be local or SAN storage attached to the physical
server. The local disks may already have external redundancy enabled via a hardware RAID controller, but
if not, vSnap can also create RAID-based storage pools for internal redundancy.
Disks that are attached to vSnap servers must be thick provisioned. If disks are thin provisioned, the
vSnap server will not have an accurate view of free space in the storage pool, which might lead to data
corruption if the underlying datastore runs out of space.
Attention: Once a disk has been added to a storage pool, it should not be removed. Removing a
disk will corrupt the storage pool.
If vSnap was deployed as part of a virtual appliance, it already contains a 100 GB starter virtual disk that
can be used to create a pool. You can add more disks before or after creating a pool and accordingly use
them to create a larger pool or expand an existing pool. If job logs report that a vSnap server is reaching
its storage capacity, additional disks can be added to the vSnap pool. Alternatively, creating new SLA
policies will force backups to use an alternate vSnap.
It is essential to protect against corruption caused by a VMware datastore on a vSnap server reaching its
capacity. Create a stable environment for virtual vSnap servers that do not use RAID configurations by
utilizing thick provisioned VMDKs. Replicating to external vSnap servers provides further protection.
A vSnap server will become invalidated if the vSnap pool is deleted or if a vSnap disk is deleted in a non-
redundant RAID configuration. All data on the vSnap server will be lost. If your vSnap server becomes
Managing encryption
To enable encryption of backup data on a vSnap server, select Initialize with encryption enabled when
you initialize the server. Encryption settings cannot be changed after the server is initialized and a pool is
created. All disks of a vSnap pool use the same encryption key file, which is generated upon pool creation.
Data is encrypted when at rest on the vSnap server.
vSnap encryption utilizes the following algorithm:
Cipher name
Advanced Encryption Standard (AES)
Cipher mode
xts-plain64
Key
256 bits
Linux Unified Key Setup (LUKS) header hashing
sha256
Detecting disks
If you add disks to a vSnap server, use the command line or the IBM Spectrum Protect Plus user interface
to detect the newly attached disks.
Command line: Run the vsnap disk rescan command.
User interface: Click System Configuration > Backup Storage > Disk in the navigation pane, and then
click the Actions menu next to the relevant vSnap server and select Rescan.
Showing disks
Run the vsnap disk show command to list all disks that are on the vSnap system,
The USED AS column in the output shows whether each disk is in use. Any disk that is unformatted and
unpartitioned is marked as unused, otherwise they are marked as used by the partition table or file
system that is discovered on them.
Only disks that are marked as unused are eligible for creating or adding to a storage pool. If a disk that
you plan to add to a storage pool is not seen as unused by vSnap, it might be because it was previously in
use and thus contains remnants of an older partition table or file system. You can correct this by using
system commands like parted or dd to wipe the disk partition table.
Network management
Configure and administer network services for a vSnap server.
Procedure
1. Log on to the vSnap server console with the user ID serveradmin. The initial password is sppDP758.
2. Update the operating system credentials that are used for communication management with the
vSnap API by opening a command prompt and issuing the following command.
3. Using the same password from Step 2, update the CIFS credentials that are used for communication
on the vSnap server by issuing the following command:
4. Update the vSnap server registration in the IBM Spectrum Protect Plus appliance. Set the Password
parameter to match the new password. For more information on editing vSnap settings, see “Editing
settings for a vSnap server” on page 74.
Procedure
1. Log on to the vSnap server as the serveradmin user. The initial password is sppDP758-SysXyz. You
are prompted to change this password during the first logon. Certain rules are enforced when creating
a new password. For more information, see the password requirement rules in “Start IBM Spectrum
Protect Plus” on page 91.
2. To determine the Linux kernel version, open a command line and issue the following command:
$ uname -r
The output is displayed, where xxxx represents the revision number of the kernel:
$ 4.19.xxxx
$ cd /opt/vsnap/config/pkgs/kernel-ml/
$ cd /opt/vsnap/config/pkgs/kernel/
4. In the directory, locate the xxxxxxxx.rpm file, which is the package to be installed. To install the
kernel header or tool, issue the following command:
Results
The kernel header or tool is installed.
Create a user account for the Infrastructure administrator User accounts determine the
application administrator resources and functions that are
available to the user.
Procedure
To start IBM Spectrum Protect Plus, complete the following steps:
1. In a supported web browser, enter the following URL:
https://host_name
Where host_name is the IP address of the virtual machine where the application is deployed. This
connects you to IBM Spectrum Protect Plus.
2. Enter your user name and password to log on.
If this is your first time logging on, the default user name is admin and the password is password. You
are prompted to reset the default user name and password. You cannot reset the user name to admin,
root, or test.
3. Click Sign In.
4. If you are logging on to IBM Spectrum Protect Plus for the first time, you are prompted to complete the
following actions:
• Change the serveradmin password. The initial password is sppDP758-SysXyz. The
serveradmin user is used to access the administrative console and the IBM Spectrum Protect Plus
virtual appliance. The the password for serveradmin must be changed before accessing the
administrative console and IBM Spectrum Protect Plus virtual appliance.
The following rules are enforced when creating a new password:
– The minimum acceptable password length is 15 characters.
– There must be eight characters in the new password that are not present in the previous
password.
– The new password must contain at least one character from each of the classes (numbers,
uppercase letters, lowercase letters, and other).
– The maximum number of identical consecutive characters that are allowed in the new password is
three characters.
– The maximum number of identical consecutive class of characters that are allowed in the new
password is four characters.
• Start the initialization process for the onboard vSnap server. Select Initialize or Inititalize with
encryption enabled to encrypt data on the server.
Procedure
To add or edit a site, complete the following steps:
1. In the navigation pane, click System Configuration > Site.
2. To add new sites or edit existing sites, take the appropriate action:
Action How to
Add a new site. a. Click Add Site.
b. Enter a site name.
c. Optional: Select Enable Throttle to manage
the throughput for site replication and copy
operations as described in “Adding a site” on
page 125.
d. Click Save.
Related concepts
“Product components” on page 1
The IBM Spectrum Protect Plus solution is provided as a self-contained virtual appliance that includes
storage and data movement components.
“Managing sites” on page 125
Procedure
To create an SLA policy, complete the following steps:
1. In the navigation pane, click Manage Protection > Policy Overview.
2. Click Add SLA Policy.
The New SLA Policy pane is displayed.
3. In the Name field, enter a name that provides a meaningful description of the SLA policy.
4. In the Operational Protection section under Main Policy, set the following options for backup
operations. These operations occur on the vSnap servers that are defined in the System Configuration
> Backup Storage > Disk window.
Retention
Specify the retention period for the backup snapshots.
Disable Schedule
Select this check box to create the main policy without defining a frequency or start time. Policies
created without a schedule can be run on-demand.
Frequency
Enter the frequency for backup operations.
Start Time
Enter the date and time that you want the backup operation to start.
Target Site
Select the target backup site for backing up data.
A site can contain one or more vSnap servers. If more than one vSnap server is in a site, IBM
Spectrum Protect Plus server manages data placement in the vSnap servers.
Only sites that are associated with a vSnap server are shown in this list. Sites that are added to
IBM Spectrum Protect Plus, but are not associated with a vSnap server, are not shown.
Only use encrypted disk storage
Select this check box to back up data to encrypted vSnap servers if your environment includes a
mixture of encrypted and unencrypted servers.
Restriction: If this option is selected and no encrypted vSnap servers are available, the associated
job will fail.
Procedure
To create an account for an application administrator, complete the following steps:
1. In the navigation pane, click Accounts > User.
2. Click Add User. The Add User pane is displayed.
3. Click Select the type of user or group you want to add > Individual new user.
4. Enter a name and password for the application administrator.
5. In the Assign Role section, select VM Admin.
The permissions are shown in the Permission Groups section.
Procedure
To add a vCenter Server instance, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. Click Manage vCenter, and then click Add vCenter.
3. Populate the fields in the vCenter Properties section:
Procedure
To select an SLA policy, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. Select the resources that you want to back up. You can select all resources in a vCenter or drill down
to select specific resources.
Use the search function to search for available resources and toggle the displayed resources by using
the View filter. Available options are VMs and Templates, VMs, Datastore, Tags and Categories, and
Hosts and Clusters. Tags, which are applied in vSphere, make it possible assign metadata to virtual
machines.
The following example shows a specific hard disk that is selected for backup:
Results
The job runs as defined by the SLA policies that you selected, or you can manually run the job by clicking
Jobs and Operations and then clicking the Policy and Job List tab. For instructions, see “Start a backup
job” on page 99.
Related concepts
“Protecting IBM Spectrum Protect Plus” on page 341
Protect the IBM Spectrum Protect Plus application by backing up the underlying databases for disaster
recovery scenarios. Configuration settings, registered resources, restore points, backup storage settings,
and job information are backed up to a vSnap server that is defined in the associated SLA policy.
Procedure
To start a backup job on demand, complete the following steps:
1. In the navigation, click Jobs and Operations, and open the Schedule tab.
If your job is not a scheduled job but is an on-demand job, click the Job History tab.
2. Choose the job that you want to run and click Actions > Start as shown in the following example:
Run a report
Run reports with predefined default parameters or custom parameters.
Procedure
To run a report, complete the following steps:
1. In the navigation pane, click Reports and Logs > Reports.
2. Expand a report type and select a report to run as shown in the following example:
Procedure
To update the IBM Spectrum Protect Plus virtual appliance, complete the following steps:
1. From a supported web browser, access the administrative console by entering the following address:
https://hostname:8090/
where hostname is the IP address of the virtual machine where the application is deployed.
2. In the login window, select one of the following authentication types in the Authentication Type list:
Authentication Type Login information
IBM Spectrum Protect Plus To log in as an IBM Spectrum Protect Plus user
with SUPERUSER privileges, enter your
administrator user name and password. If you log
in by using the admin user account, you are
prompted to reset the user name and password.
You cannot reset the user name to admin, root,
or test.
System (recommended) To log on as a system user, enter the
serveradmin password. The default password
is sppDP758-SysXyz. You are prompted to
change this password during the first logon.
3. Click Updates and Hotfix Management to open the updates management page.
If you have access to the FTP site, public.dhe.ibm.com, the administrator console checks for available
updates automatically and lists them.
4. Click Run Update to install the available updates.
• When the updates are installed successfully, go to Step 6.
• If you are planning to install an update from an ISO file, click Click Here to run the offline
updates. Go to Step 5.
Note: If you want to run online updates but can see only the offline mode, check your internet
connectivity and reattempt to access the FTP site, public.dhe.ibm.com.
5. Choose the update that you want to run, as follows:
• Online mode: Updates are listed automatically in the repository when they are made available.
Click Run Update.
• Offline mode: Click Choose file to browse for the downloaded file. The file has an iso or rpm
extension like this example, <filename>.iso. Click Upload Update Image (or) Hotfix.
Note: You can select only one update file at a time.
When the update completes, the virtual machine where the application is deployed automatically
restarts.
Important: After the IBM Spectrum Protect Plus update completes, you must update any external
vSnap and VADP proxy servers in your environment.
6. Clear the browser cache.
Ensure that no jobs that use the vSnap server are running during the update procedure. Pause the
schedule for any jobs that have a status of IDLE or COMPLETED.
Procedure
1. Download the ISO file CC1QHML.iso. Move the ISO file to the /tmp directory on the vSnap server and
rename the file to spp_with_os.iso.
Important: It is critical to rename the downloaded ISO file as described in this step and move it to
the /tmp directory on the vSnap server if you wish to update the operating system.
2. Proceed with the instructions found in the “Updating a vSnap server” on page 107 topic. When the
CC1QGML.run file is executed, the installer will optionally update the operating system if /tmp/
spp_with_os.iso is present.
One of the two following scenarios will occur depending on the presence of the ISO file.
• If the file is present, operating system packages are upgraded, then vSnap software is upgraded.
• If the file is not present, a message is displayed:
Procedure
To update a vSnap server, complete the following steps:
1. Log on to the vSnap server as the serveradmin user.
2. From the directory where the CC1QGML.run file is located, make the file executable and run the
installer by issuing the following commands:
$ chmod +x CC1QGML.run
$ sudo ./CC1QGML.run
Procedure
If a VADP proxy update is available for external proxies during a restart of the IBM Spectrum Protect Plus
virtual appliance, the update will be automatically applied to any VADP proxy associated with an identity.
To associate a VADP proxy with an identity, navigate to System Configuration > VADP Proxy. Click the
options icon and select Set Options. Through the User setting, select a previously entered username
and password for the VADP proxy server.
To update a VADP proxy manually, complete the following steps:
1. Navigate to the System Configuration > VADP Proxy page in IBM Spectrum Protect Plus.
2. The VADP Proxy page displays each proxy server. If a newer version of the VADP proxy software is
available, an update icon displays in the Status field.
3. Ensure that there are no active jobs that use the proxy, and then click the update icon
.
The proxy server enters a suspended state and installs the latest update. When the update completes,
the VADP proxy server automatically resumes and enters an enabled state.
If you are attempting to update as a non-root user, special instructions will need to be followed in order to
push-install or push-update a VADP proxy.
1. Create a file in the /etc/sudoers.d/ directory.
sudo cd /etc/sudoers.d/
2. Write the text to the file and save it by pressing CTRL+D on the keyboard when done.
What to do next
After you update the VADP proxies, complete the following action:
Related tasks
“Creating VADP proxies” on page 161
You can create VADP proxies to run VMware backup jobs with IBM Spectrum Protect Plus in Linux
environments.
Related reference
“Editing firewall ports” on page 64
Use the provided examples as a reference for opening firewall ports on remote VADP proxy servers or
application servers. You must restrict port traffic to only the required network or adapters.
Procedure
To add Amazon S3 cloud storage as a backup Object Storage provider, complete the following steps:
1. In the navigation menu, click System Configuration > Backup Storage > Object Storage.
2. Click Add Object Storage.
3. From the Provider list, select Amazon S3.
4. Complete the fields in the Object Storage Registration form:
Name
Enter a meaningful name that helps you to identify the cloud storage.
What to do next
After you add the S3 storage, complete the following action:
Action How to
Associate the cloud storage with the SLA policy To create an SLA policy, see “Creating an SLA
that is used for the backup job. policy” on page 145.
To modify an existing SLA policy, see “Editing an
SLA policy” on page 149.
Procedure
To add IBM Cloud Object Storage as a backup storage provider, complete the following steps:
1. In the navigation menu, click System Configuration > Backup Storage > Object Storage.
2. Click Add Object Storage.
3. From the Provider list, select IBM Cloud Object Storage.
4. Complete the fields in the Object Storage Registration pane:
Name
Enter a meaningful name to help identify the cloud storage.
Endpoint
Select the endpoint of the cloud storage.
Use existing key
Enable to select a previously entered key for the storage, and then select the key from the Select a
key list.
If you do not select this option, complete the following fields to add a key:
Key name
Enter a meaningful name to help to identify the key.
Access key
Enter the access key.
Secret key
Enter the secret key.
Certificate
Select a method of associating a certificate with the resource:
Upload
Select and click Browse to locate the certificate, then click Upload.
Copy and paste
Select to enter the name of the certificate, copy and paste the contents of the certificate, then
click Create.
Use existing
Select to use a previously uploaded certificate.
A certificate is not required if you are adding public IBM Cloud Object Storage.
5. Click Get Buckets, and then select a bucket to serve as the copy target.
After the buckets are generated, the Standard object storage bucket and Archive object storage
bucket fields are displayed.
6. In the Standard object storage bucket field, select a bucket to serve as the copy target.
7. Optional: In the Archive object storage bucket field, select a cloud storage resource to serve as the
archive target.
What to do next
After you add the IBM Cloud Object Storage, complete the following action:
Action How to
Associate the cloud storage with the SLA policy To create an SLA policy, see “Creating an SLA
that is used for the backup job. policy” on page 145.
To modify an existing SLA policy, see “Editing an
SLA policy” on page 149.
Procedure
To add Microsoft Azure cloud storage as backup storage provider, complete the following steps:
1. In the navigation pane, click System Configuration > Backup Storage > Object Storage.
2. Click Add Object Storage.
3. From the Provider list, select Microsoft Azure Blob Storage.
4. Complete the fields in the Object Storage Registration pane:
Name
Enter a meaningful name to help identify the cloud storage.
Endpoint
Select the endpoint of the cloud storage.
Use existing key
Enable to select a previously entered key for the storage, and then select the key from the Select a
key list.
If you do not select this option, complete the following fields to add a key:
Key name
Enter a meaningful name to help identify the key.
Storage Account Name
Enter the Microsoft Azure access storage account name. This is from the Azure Management
Portal.
Storage Account Shared Key
Enter the Microsoft Azure key from any one of the key fields in the Azure Management Portal,
either key1 or key2.
5. Click Get Buckets, and then select a bucket to serve as the copy target.
After the buckets are generated, the Standard object storage bucket and Archive object storage
bucket fields are displayed.
6. In the Standard object storage bucket field, select a bucket to serve as the copy target.
What to do next
After you add the Microsoft Azure storage, complete the following action:
Action How to
Associate the cloud storage with the SLA policy To create an SLA policy, see “Creating an SLA
that is used for the backup job. policy” on page 145.
To modify an existing SLA policy, see “Editing an
SLA policy” on page 149.
Procedure
To add S3 compatible cloud storage as a backup target, complete the following steps:
1. In the navigation menu, click System Configuration > Backup Storage > Object Storage.
2. Click Add Object Storage.
3. From the Provider list, select S3 Compatible Storage.
4. Complete the fields in the Object Storage Registration pane:
Name
Enter a meaningful name to help identify the cloud storage.
Endpoint
Enter the endpoint of the cloud storage.
Use existing access key
Enable this option to select a previously entered key for the storage, and then select the key from
the Select a key list.
If you do not select this option, complete the following fields to add a key:
Key name
Enter a meaningful name to identify the key.
What to do next
After you add the S3 compatible storage, complete the following action:
Action How to
Associate the cloud storage with the SLA policy To create an SLA policy, see “Creating an SLA
that is used for the backup job. policy” on page 145.
To modify an existing SLA policy, see “Editing an
SLA policy” on page 149.
Procedure
To edit a cloud storage provider, complete the following steps:
1. In the navigation menu, click System Configuration > Backup Storage > Object Storage.
2. Click the edit icon that is associated with an object storage provider.
The Update Object Storage pane is displayed.
3. Revise the settings for the cloud provider, and then click Update.
Procedure
To delete a cloud storage provider, complete the following steps:
1. In the navigation menu, click System Configuration > Backup Storage > Object Storage.
2. Click the delete icon that is associated with a provider.
3. Click Yes to delete the provider.
Configuration overview
To copy IBM Spectrum Protect Plus data to an IBM Spectrum Protect server, you must complete
configuration tasks in both environments.
Create a policy domain that points to the storage To create a policy domain by using the Operations
pool or pools. Center, follow the instructions in Creating a policy
The policy domain defines the rules that control domain.
the backup services for IBM Spectrum Protect Tip: Alternatively, issue the DEFINE
Plus. OBJECTDOMAIN command to create a storage pool
as described in Define a policy domain for object
clients.
Action How to
Add the IBM Spectrum Protect server as a backup To add the IBM Spectrum Protect server to IBM
storage provider. Spectrum Protect Plus, follow the instructions in
“Adding a repository server as a backup storage
provider” on page 119.
Select the IBM Spectrum Protect server as a target To create an SLA policy that defines the IBM
for standard object storage or archive object Spectrum Protect server as backup storage target,
storage (tape) in the SLA policy for the resources follow the instructions in “Creating an SLA policy”
that you want to protect. on page 145.
Procedure
To add an IBM Spectrum Protect server as backup storage provider complete the following steps:
What to do next
After you add a repository server, complete the following action:
Action How to
Associate the repository server with the SLA policy To create an SLA policy, see “Creating an SLA
that is used for the backup job. policy” on page 145.
To modify an existing SLA policy, see “Editing an
SLA policy” on page 149.
Related concepts
“Configuration overview” on page 117
Procedure
To edit a repository server provider, complete the following steps:
1. In the navigation menu, click System Configuration > Backup Storage > Repository Server.
2. Click the edit icon that is associated with a repository server provider.
The Update Repository Server pane is displayed.
3. Revise the settings for the repository server provider, and then click Update.
Procedure
To delete a repository server provider, complete the following steps:
1. In the navigation menu, click System Configuration > Backup Storage > Repository Server.
2. Click the delete icon that is associated with a repository server provider.
3. Click Yes to delete the provider.
Procedure
To add a key, complete the following steps:
1. Create your access key and secret key through the interface of the cloud resource or repository server.
Make note of the access key and secret key.
2. In the navigation menu, click System Configuration > Keys and Certificates.
3. From the Access Keys section, click Add Access Key.
4. Complete the fields in the Key Properties pane:
Name
Enter a meaningful name to help identify the access key.
Access Key
Enter the access key of the cloud resource or repository server. For Microsoft Azure, enter the storage
account name.
Secret Key
Procedure
To delete an access key, complete the following steps:
1. In the navigation menu, click System Configuration > Keys and Certificates.
2. Click the delete icon that is associated with an access key.
3. Click Yes to delete the access key.
Adding a certificate
Add a certificate to provide cloud resource or repository server credentials.
Procedure
To add a certificate, complete the following steps:
1. Export a certificate from your cloud resource or repository server.
2. In the navigation menu, click System Configuration > Keys and Certificates.
3. In the Certificates section, click Add Certificate.
4. Complete the fields in the Certificate Properties pane:
Type
Select the cloud resource or repository server type.
Certificate
Select a method to add the certificate:
Upload
Select to browse for the certificate locally.
Copy and paste
Select to enter the name of the certificate and copy and paste the contents of the certificate.
5. Click Save.
The key displays in the Certificates table and can be selected when utilizing a feature that requires
credentials to access a resource through the Use existing certificate option.
Deleting a certificate
Delete a certificate when it becomes obsolete. Ensure that you reassign a new certificate to your cloud
resource or repository server.
Procedure
To delete a certificate, complete the following steps:
1. In the navigation menu, click System Configuration > Keys and Certificates.
2. Click the delete icon that is associated with a certificate.
3. Click Yes to delete the certificate.
Procedure
To add a key, complete the following steps:
1. On the target resource, generate an SSH key by using the ssh-keygen command with the user
account that will be assigned to IBM Spectrum Protect Plus. This account must have sudo privileges.
For example, on an Oracle server, enter the following command in the terminal and follow the
instructions:
ssh-keygen
If you use the default settings, two files are created in the specified directory: id_rsa.pub is the
public key and id_rsa is the private key.
2. When prompted enter the file name in which the key will be saved, enter a directory and file name. If
you do not specify a directory and file name, the default is used:
/home/priveleged_user/.ssh/id_rsa
where priveleged_user is the account assigned to IBM Spectrum Protect Plus, sppagent. If a key
with the default name already exists, this will be indicated with the message displayed below. Be
careful not to overwrite preexisting keys if they are in use. Press N to enter a different file in which to
save the key.
This procedure is based on the assumption that the key is saved in the default location using the
default file name (id_rsa). If the key file is created using a different file name, use that file name in
the steps that follow.
3. Supply a passphrase and press Enter. Otherwise, simply press Enter for no passphrase.
4. If a passphrase was supplied, enter it again. Press Enter.
5. Copy the contents of the id_rsa.pub key into the authorized_keys file. If the file already exists,
append the public key to the authorized_keys file.
6. Assign the required privileges to the authorized_keys file by issuing the chmod 600 command.
7. Edit the /etc/ssh/sshd_config file to set the PubkeyAuthentication setting to yes by using a
text editor. To ensure that the setting is not commented out, remove the number sign (#) if it appears
at the beginning of the line.
...
PubkeyAuthentication yes
...
9. In the IBM Spectrum Protect Plus navigation pane, click System Configuration > Keys and
Certificates.
10. From the SSH Keys section, click Add SSH Key.
11. Complete the fields in the SSH Key Properties pane:
Name
Enter a meaningful name to identify the SSH key.
User
Enter the user account that is associated with the target resource and SSH key. This is the user
account used to generate the public and private keys in the previous steps.
Encrypted
Check this box if a passphrase was supplied when generating the public and private key.
Passphrase
This box is only displayed if the Encrypted check box is selected. If a passphrase was supplied when
generating the public and private key, provide the passphrase in this box.
Private key
Copy and paste the private key into this box. This will be the key contained in the id_rsa file on the
target resource. The file is similar to the following example:
cat ~/.ssh/id_rsa
Procedure
To delete an SSH key, complete the following steps:
1. In the navigation menu, click System Configuration > Keys and Certificates.
2. Click the delete icon that is associated with an SSH key.
3. Click Yes to delete the access key.
Adding a site
After you add a site to IBM Spectrum Protect Plus, you can assign backup storage servers to the site.
Procedure
To add a site, complete the following steps:
1. In the navigation pane, click System Configuration > Site.
2. Click Add Site.
The Site Properties pane is displayed.
3. Enter a site name.
4. Optional: To manage the network activity on a defined schedule, change the throughput for site
replication and copy operations:
a) Select the Enable Throttle check box.
b) In the Rate field, adjust the throughput:
1) Change the numerical rate of throughput by clicking the up or down arrows.
2) Select a unit for the throughput. The choices include bytes/s, KB/s, MB/s, and GB/s.
The default throughput is 100 MB/s (megabytes per second).
Figure 15. Enabling different rates of throttling for different times to improve throughput
Results
The site is displayed in the sites table and can be applied to new and existing backup storage servers.
Editing a site
Revise site information to reflect changes in your IBM Spectrum Protect Plus environment.
Procedure
To edit a site, complete the following steps:
1. In the navigation pane, click System Configuration > Site.
2. Click the edit icon that is associated with a site.
The Site Properties pane is displayed.
3. Revise the site name.
4. Optional: To manage the network activity on a defined schedule, change the throughput for site
replication and copy operations:
a) Select the Enable Throttle check box.
b) In the Rate field, adjust the throughput:
1) Change the numerical rate of throughput by clicking the up or down arrows.
2) Select a unit for the throughput. The choices include bytes/s, KB/s, MB/s, and GB/s.
The default throughput is 100 MB/s (megabytes per second).
Deleting a site
Delete a site when it becomes obsolete. Ensure that you reassign your backup storage to different sites
before deleting the site.
Procedure
To delete a site, complete the following steps:
1. In the navigation pane, click System Configuration > Site.
2. Click the delete icon that is associated with a site.
3. Click Yes to delete the site.
Procedure
To register an LDAP server, complete the following steps:
1. In the navigation pane, click System Configuration > LDAP/SMTP.
2. In the LDAP Servers pane, click Add LDAP Server.
3. Populate the following fields in the LDAP Servers pane:
Host Address
The IP address of the host or logical name of the LDAP server.
Port
The port on which the LDAP server is listening. The typical default port is 389 for non SSL
connections or 636 for SSL connections.
SSL
Enable the SSL option to establish a secure connection to the LDAP server.
Use existing user
Enable to select a previously entered user name and password for the LDAP server.
Bind Name
The bind distinguished name that is used for authenticating the connection to the LDAP server.
IBM Spectrum Protect Plus supports simple bind.
Password
The password that is associated with the Bind Distinguished Name.
Base DN
The location where users and groups can be found.
User Filter
A filter to select only those users in the Base DN that match certain criteria. An example of a valid
default user filter is cn={0}.
Tips:
• To enable authentication by using the sAMAccountName Windows user naming attribute, set the
filter to samaccountname={0}. When this filter is set, users log in to IBM Spectrum Protect Plus
by using only a user name. A domain is not included.
• To enable authentication using the user principal name (UPN) naming attribute, set the filter to
userprincipalname={0}. When this filter is set, users log in to IBM Spectrum Protect Plus by
using the username@domain format.
Results
IBM Spectrum Protect Plus completes the following actions:
1. Confirms that a network connection is made.
2. Adds the LDAP server to the database.
After the SMTP server is added, the Add LDAP Server button is no longer available.
What to do next
If a message is returned indicating that the connection is unsuccessful, review your entries. If your
entries are correct and the connection is unsuccessful, contact a network administrator to review the
connections.
Related tasks
“Creating a user account for an LDAP group” on page 373
With IBM Spectrum Protect Plus, you can use a Lightweight Directory Access Protocol (LDAP) server to
manage users. When you create an LDAP user account, you can add the user account to a user group.
Procedure
To add an SMTP server, complete the following steps:
1. In the navigation pane, click System Configuration > LDAP/SMTP.
2. In the SMTP Servers pane, click Add SMTP Server.
3. Populate the following fields in the SMTP Servers pane:
Host Address
The IP address of the host, or the path and host name of the SMTP server.
Port
The communications port of the server that you are adding. The typical default port is 25 for non-
SSL connections or 443 for SSL connections.
Username
The name that is used to access the SMTP server.
Password
The password that is associated with the user name.
Results
IBM Spectrum Protect Plus completes the following actions:
1. Confirms that a network connection is made.
2. Adds the server to the database.
If a message is returned indicating that the connection is unsuccessful, review your entries. If your
entries are correct and the connection is unsuccessful, contact a network administrator to review the
connections.
To test the SMTP connection, click the Test SMTP Server button, then enter an e-mail address. Click
Send. A test e-mail message is sent to the e-mail address to verify the connection.
After the SMTP server is added, the Add SMTP Server button is no longer available.
What to do next
Related tasks
“Scheduling a report” on page 362
You can schedule reports in IBM Spectrum Protect Plus to run at specific times.
Procedure
To edit the settings for an LDAP or SMTP server, complete the following steps:
1. From the navigation menu, click System Configuration > LDAP/SMTP.
2. Click the edit icon that is associated with the server.
The edit pane is displayed.
3. Revise the settings for the server, and then click Save.
Procedure
To delete an LDAP or SMTP server, complete the following steps:
1. From the navigation menu, click System Configuration > LDAP/SMTP.
2. Click the delete icon that is associated with the server.
3. Click Yes to delete server.
Procedure
To edit the values for any setting and apply them globally, complete the following steps:
1. In the navigation pane, click System Configuration > Global Preferences.
2. To apply global application preferences, edit the settings in the Application category. The default
values for the preferences are shown in the following image:
Procedure
To log on to the administrative console, complete the following steps:
https://HOSTNAME:8090/
Where HOSTNAME is the IP address of the virtual machine where the application is deployed.
2. In the login window, select one of the following authentication types in the Authentication Type list:
Authentication Type Logon information
IBM Spectrum Protect Plus To log on as an IBM Spectrum Protect Plus user
with SUPERUSER privileges, enter your
administrator user name and password. If you log
in by using the admin user account, you are
prompted to reset the user name and password.
You cannot reset the user name to admin, root,
or test.
System To log on as a system user, enter the
serveradmin password. The default password
is sppDP758-SysXyz. You are prompted to
change this password during the first logon.
Certain rules are enforced when creating a new
password. For more information, see the
password requirement rules in “Start IBM
Spectrum Protect Plus” on page 91.
What to do next
Review the configuration of the IBM Spectrum Protect Plus virtual appliance.
Related concepts
“System requirements ” on page 11
Before you install IBM Spectrum Protect Plus, review the hardware and software requirements for the
product and other components that you plan to install in the storage environment.
“Managing roles” on page 369
Roles define the actions that can be completed for the resources that are defined in a resource group.
While a resource group defines the resources that are available to an account, a role sets the permissions
to interact with the resources.
Procedure
To set the time zone, complete the following steps:
1. From a supported browser, enter the following URL:
https://HOSTNAME:8090/
Where HOSTNAME is the IP address of the virtual machine where the application is deployed.
2. In the login window, select one of the following authentication types in the Authentication Type list:
Authentication Type Login information
IBM Spectrum Protect Plus To log in as an IBM Spectrum Protect Plus user
with SUPERUSER privileges, enter your
administrator user name and password.
System To login as a system user, enter the
serveradmin password. The default password
Procedure
To upload an SSL certificate, complete the following steps:
1. Contact your network administrator for the name of the certificate to export.
2. From a supported browser, export the certificate to your computer. Make note of the location of the
certificate on your computer. The process of exporting certificates varies based on your browser.
3. From a supported browser, enter the following URL:
https://HOSTNAME:8090/
Where HOSTNAME is the IP address of the virtual machine where the application is deployed.
4. In the logon window, select one of the following authentication types in the Authentication Type list:
Authentication Type Logon information
IBM Spectrum Protect Plus To log on as an IBM Spectrum Protect Plus user
with SUPERUSER privileges, enter your
administrator user name and password. If you log
in by using the admin user account, you are
prompted to reset the user name and password.
You cannot reset the user name to admin, root,
or test.
Procedure
Complete the following steps to access the virtual appliance command line:
1. In vSphere Client, select the virtual machine where IBM Spectrum Protect Plus is deployed.
2. On the Summary tab, select Open Console and click in the console.
3. Select Login, and enter your user name and password. The default user name is serveradmin and
the default password is sppDP758-SysXyz. You are prompted to change this password during the
first logon. Certain rules are enforced when creating a new password. For more information, see the
password requirement rules in “Start IBM Spectrum Protect Plus” on page 91.
What to do next
Enter commands to administer the virtual appliance. To log off, type exit.
Procedure
Complete the following steps to access the virtual appliance command line:
1. In Hyper-V Manager, select the virtual machine where IBM Spectrum Protect Plus is deployed.
2. Right-click the virtual machine and select Connect.
3. Select Login, and enter your user name and password. The default user name is serveradmin and
the default password is sppDP758-SysXyz. You are prompted to change this password during the
first logon. Certain rules are enforced when creating a new password. For more information, see the
password requirement rules in “Start IBM Spectrum Protect Plus” on page 91.
What to do next
Enter commands to administer the virtual appliance. To log off, type exit.
Procedure
1. Log in to the IBM Spectrum Protect Plus virtual appliance by using the serveradmin user ID and
access the command line. Run the following command:
# sudo bash
# firewall-cmd –-add-port=9000/tcp
http://hostname:9000
where hostname specifies the IP address of the virtual machine where the application is deployed.
5. To specify the node to test, complete the following fields:
Host
The hostname or IP address of the node that you want to test.
Port
The connection port to test.
6. Click Save.
7. To run the tool, hover the cursor over the tool, and then click Run.
If a connection cannot be established, the error condition is displayed, along with possible causes and
actions.
8. Stop the tool by running the following command on the command line:
ctl-c
9. Protect your storage environment by resetting the firewall. Run the following commands:
Procedure
1. In the IBM Spectrum Protect Plus user interface, click the user menu, and then click Download Test
Tool.
A .jar file is downloaded to your workstation.
2. Launch the tool from a command-line interface. Java is only required on the system where the tool will
be launched. Endpoints or target systems that are tested by the tool do not require Java.
The following command launches the tool in a Linux environment:
http://hostname:9000
where hostname specifies the IP address of the virtual machine where the application is deployed.
4. To specify the node to test, populate the following fields:
Host
The host name or IP address of the node that you want to test.
Port
The connection port to test.
5. Click Save.
6. To run the tool, hover the cursor over the tool, and then click the green Run button.
If a connection cannot be established, the error condition is displayed, along with possible causes and
actions.
7. Stop the tool by issuing the following command on the command line:
ctl-c
Procedure
To add a disk to an IBM Spectrum Protect Plus virtual appliance, complete the following steps from the
vCenter client:
1. From the vCenter client, complete the following steps:
a) On the Hardware tab, click Add.
b) Select Create a new virtual disk.
c) Select the required disk size. In the Location section, select one of the following options:
• To use the current datastore, select Store with the virtual machine.
• To specify one or more datastores for the virtual disk, select Specify a datastore or datastore
cluster. Click Browse to select the new datastores.
d) In the Advanced Options tab, leave the default values.
e) Review and save your changes.
f) Click the Edit Settings option for the virtual machine to view the new hard disk.
2. Add the new SCSI device without rebooting the virtual appliance. From the console of the IBM
Spectrum Protect Plus appliance, issue the following commands:
sudo bash
Press Enter.
The fdisk utility starts in interactive mode. Output similar to the following output is displayed:
Device contains neither a valid DOS partition table, nor Sun, SGI or
OSF disklabel
Building a new DOS disklabel with disk identifier 0xb1b293df.
Changes will remain in memory only, until you decide to write them.
After that, of course, the previous content won't be recoverable.
Warning: invalid flag 0x0000 of partition table 4 will be corrected by
w(rite)
WARNING: DOS-compatible mode is deprecated. It's strongly recommended
to
switch off the mode (command 'c') and change display units to
sectors (command 'u').
Command (m for help):
d) Do not type anything at the First cylinder prompt. Press the Enter key.
The following output and prompt is displayed:
e) Do not type anything in the Last cylinder prompt. Press the Enter key.
The following output is displayed:
f) At the fdisk command line, enter the t subcommand to change a partition's system ID.
You are prompted for a hex code that identifies the partition type:
Selected partition 1
Hex code (type L to list codes):
g) At the Hex code prompt, enter the hex code 8e to specify the Linux LVM partition type.
The following output is displayed:
h) At the fdisk command line, enter the w subcommand to write the partition table and to exit the
fdisk utility.
8. To verify that data_vg is extended, and that free space is available for logical volumes (or /data
volume) to use, issue the vgdisplay command.
9. To review the Logical Volume (LV) /data volume, issue the lvdisplay command. The usage of
the /data volume displays.
10. To add the space of the LV /data volume to the total volume capacity, issue the lvextend
command.
In this example, 20 GB of space is being added to a 100 GB volume.
What to do next
After you create an SLA policy, complete the following actions:
Action How to
Assign user permissions to the SLA policy. See “Creating a role” on page 370
Create a backup job definition that uses the SLA See the backup topics in Chapter 9, “Protecting
policy. hypervisors,” on page 151 and Chapter 10,
“Protecting applications,” on page 189.
Related concepts
“Replicate backup-storage data ” on page 5
When you enable replication of backup data, data from one vSnap server is asynchronously replicated to
another vSnap server. For example, you can replicate backup data from a vSnap server on a primary site
to a vSnap server on a secondary site.
“Copy snapshots to secondary backup storage” on page 6
Procedure
To edit an SLA policy, complete the following steps:
1. In the navigation pane, click Manage Protection > Policy Overview.
2. Click the edit icon that is associated with a policy.
The Edit SLA Policy pane is displayed.
3. Edit the policy options, and then click Save.
Procedure
To delete an SLA policy, complete the following steps:
1. In the navigation pane, click Manage Protection > Policy Overview.
2. Click the delete icon that is associated with an SLA policy.
3. Click Yes to delete the policy.
4. If you are deleting the demo SLA policy, go to System Configuration > Site, and delete the site named
Demo.
Note:
When you delete the demo site you must register the local host vSnap with user credentials to another
valid site.
System requirements
Ensure that your VMware environment meets the system requirements in “Hypervisor requirements ” on
page 26.
Procedure
To add a vCenter Server instance, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. Click Manage vCenter.
3. Click Add vCenter.
4. Populate the fields in the vCenter Properties section:
What to do next
After you add a vCenter Server instance, complete the following action:
Action How to
Assign user permissions to the hypervisor. See “Creating a role” on page 370.
Related concepts
“Managing identities” on page 375
Some features in IBM Spectrum Protect Plus require credentials to access your resources. For example,
IBM Spectrum Protect Plus connects to Oracle servers as the local operating system user that is specified
during registration to complete tasks like cataloging, data protection, and data restore.
Related tasks
“Backing up VMware data” on page 155
Use a backup job to back up VMware resources such as virtual machines, datastores, folders, vApps, and
datacenters with snapshots.
“Restoring VMware data” on page 164
VMware restore jobs support Instant VM Restore and Instant Disk Restore scenarios, which are created
automatically based on the selected source.
Procedure
To run an inventory job, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. In the list of vCenters Server instances, select an instance or click the link for the instance to navigate
to the resource that you want. For example, if you want to run an inventory job for an individual virtual
machine in the instance, click the instance link and then select a virtual machine.
3. Click Run Inventory.
Procedure
To test the connection, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. In the list of vCenters Server instances, click the link for a vCenter Server to navigate to the individual
virtual machines.
3. Select a virtual machine, and then click Select Options.
4. Select Use existing user.
5. Select a user in the Select user list.
6. Click Test.
Procedure
To define a VMware backup job, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. Select resources to back up.
Use the search function to search for available resources and toggle the displayed resources by using
the View filter. Available options are VMs and Templates, VMs, Datastore, Tags and Categories, and
Hosts and Clusters. Tags are applied in vSphere, and allow a user to assign metadata to virtual
machines.
3. Click Select SLA Policy to add one or more SLA policies that meet your backup criteria to the job
definition.
4. To create the job definition by using default options, click Save.
The job will run as defined by the SLA policies that you selected. To run the job immediately, click Jobs
and Operations > Schedule. Select the job and click Actions > Start.
/data/log/guestdeployer/latest_date/latest_entry/vm_name
where latest_date is the date that the backup job and log truncation occurred, latest_entry is the
universally unique identifier (UUID) for the job, and vm_name is the host name or IP address of the
VM where the log truncation occurred.
Restriction: File indexing and file restore are not supported from restore points that were copied
to cloud resources or repository servers.
Catalog file metadata
Turn on file indexing for the associated snapshot. When file indexing is completed, individual files
can be restored by using the File Restore pane in IBM Spectrum Protect Plus. Credentials must be
established for the associated virtual machine by using an SSH key, or the Guest OS Username
and Guest OS Password options within the backup job definition. Ensure that the virtual machine
can be accessed from the IBM Spectrum Protect Plus appliance either by using DNS or a host
name.
Restriction: SSH Keys are not a valid authorization mechanism for Windows platforms.
Exclude Files
Enter directories to skip during file indexing. Files within these directories are not added to the IBM
Spectrum Protect Plus catalog and are not available for file recovery. Directories can be excluded
through an exact match or with wildcard asterisks specified before the pattern (*test) or after the
pattern (test*). Multiple asterisk wildcards are also supported in a single pattern. Patterns support
standard alphanumeric characters as well as the following special characters: - _ and *. Separate
multiple filters with a semicolon.
Use existing user
Select a previously entered user name and password for the provider.
Guest OS Username/Password
For some tasks (such as cataloging file metadata, file restore, and IP reconfiguration), credentials
must be established for the associated virtual machine. Enter the user name and password, and
ensure that the virtual machine can be accessed from the IBM Spectrum Protect Plus appliance
either by using DNS or a host name.
6. To troubleshoot a connection to a hypervisor virtual machine, use the Test function.
The Test function verifies communication with the virtual machine and tests DNS settings between the
IBM Spectrum Protect Plus appliance and the virtual machine. To test a connection, select a single
virtual machine, and then click Select Options. Select Use existing user and select a previously
entered user name and password for the resource, and then click Test.
7. Click Save.
8. To configure additional options, click the Policy Options field that is associated with the job in the SLA
Policy Status section. Set the additional policy options:
Pre-scripts and Post-scripts
Run a pre-script or a post-script. Pre-scripts and post-scripts are scripts that can be run before or
after a job runs. Windows-based machines support Batch and PowerShell scripts while Linux-
based machines support shell scripts.
In the Pre-script or Post-script section, select an uploaded script and a script server where the
script will run. Scripts and script servers are configured by using the System Configuration >
Script page.
To continue running the job if the script associated with the job fails, select Continue job/task on
script error.
What to do next
After you define a backup job, you can complete the following actions:
Action How to
If you are using a Linux environment, consider See “Creating VADP proxies” on page 161.
creating VADP proxies to enable load sharing.
Create a VMware restore job definition. See “Restoring VMware data” on page 164.
In some cases, VMware backup jobs fail with “failed to mount” errors. To resolve this issue, increase the
maximum number of NFS mounts to at least 64 by using the NFS.MaxVolumes (vSphere 5.5 and later) and
NFS41.MaxVolumes (vSphere 6.0 and later) values. Follow the instructions in Increasing the default value
that defines the maximum number of NFS mounts on an ESXi/ESX host.
Related concepts
“Configuring scripts for backup and restore operations” on page 352
Prescripts and postscripts are scripts that can be run before or after backup and restore jobs run at the
job level. Supported scripts include shell scripts for Linux-based machines and batch and PowerShell
scripts for Windows-based machines. Scripts are created locally, uploaded to your environment through
the Script page, and then applied to job definitions.
Related tasks
“Starting jobs on demand” on page 347
You can run any job on demand, even if the job is set to run on a schedule.
Procedure
To exclude VMDKs from the SLA policy:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. Select VMs and Templates in the View filter.
3. Click the link for the vCenter, and then click the link for the virtual machine that contains the VMDKs
that you want to exclude.
4. Select one or more VMDKs, and then click Select SLA Policy.
5. Clear the check box for the selected SLA policy, and then click Save.
Procedure
To modify the scripts, complete the following steps:
1. On the virtual machine, navigate to the /usr/sbin directory and replace the content of the pre-
freeze-script script with the following content:
#!/bin/bash
#set log directory
log="/var/log/vpostgres_backup.log"
#set and log start date
today=`date +%Y\/%m\/%d\ %H:%M:%S`
echo "${today}: Start of creation consistent state" >> ${log}
#execute freeze command
cmd="echo \"SELECT pg_start_backup('${today}', true);\" | sudo /opt/vmware/vpostgres/9.4/bin/psql -U postgres >> ${log}
2>&1"
eval ${cmd}
#set and log end date
today=`date +%Y\/%m\/%d\ %H:%M:%S`
echo "${today}: Finished freeze script" >> ${log}
2. Replace the content of the post-thaw-script script with the following content:
#!/bin/bash
#set log directory
log="/var/log/vpostgres_backup.log"
#set and log start date
today=`date +%Y\/%m\/%d\ %H:%M:%S`
echo "${today}: Release of backup" >> ${log}
#execute release command
cmd="echo \"SELECT pg_stop_backup();\" | sudo /opt/vmware/vpostgres/9.4/bin/psql -U postgres >> ${log} 2>&1"
eval ${cmd}
#set and log end date
today=`date +%Y\/%m\/%d\ %H:%M:%S`
echo "${today}: Finished thaw script" >> ${log}
Action How to
Run the VMware backup job. See “Backing up VMware data” on page 155.
The proxies are indicated in the job log by a log
message similar to the following text:
Run remote vmdkbackup of MicroService:
http://<proxy>
nodename, IP:proxy_IP_address
Related tasks
“Setting options for VADP proxies” on page 163
When you create VADP proxies in IBM Spectrum Protect Plus, you can configure various options for each
VADP proxy.
Procedure
To set options for VMware VADP proxies, complete the following steps:
1. In the navigation pane, click System Configuration > VADP Proxy.
2. Click the VADP proxy that you want to configure, which then displays the information in the adjacent
details pane.
3. In the VADP proxy details pane, click the ellipses icon and then choose Set Options.
4. Complete the following fields in the Set VADP Proxy Options pane:
Site
Assign a site to the proxy.
User
Select a previously entered user name for the provider.
Transport Modes
Set the transport modes to be used by the proxy. For more information about VMware transport
modes, see Virtual Disk Transport Methods.
Enable NBDSSL Compression
If you selected the NBDSSL transport mode, enable compression to increase the performance of data
transfers.
To turn off compression, select disabled.
Log retention in days
Set the number of days to retain logs before they are deleted.
Read and write buffer size
What to do next
After setting the VADP proxy options, you can complete the following actions:
Action How to
Run the VMware backup job. See “Backing up VMware data” on page 155.
Uninstall the proxies when you cease running the See “Uninstalling VADP proxies” on page 164.
VMware backup jobs.
Related tasks
“Creating VADP proxies” on page 161
You can create VADP proxies to run VMware backup jobs with IBM Spectrum Protect Plus in Linux
environments.
Procedure
To uninstall VADP proxies from your IBM Spectrum Protect Plus, complete the following steps:
1. From a command prompt, navigate to the directory /opt/IBM/SPP/uninstall on the proxy host
system.
2. Run the following command:
./uninstall_vmdkbackup
Procedure
To define a VMware restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the "Snapshot restore" wizard by clicking Jobs and Operations > Create job >
Snapshot restore > VMware.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
b) Click the plus icon next to the item that you want to add to the restore list next to the list of
sources. You can add more than one item of the same type (VM or virtual disk).
To remove an item from the restore list, click the minus icon next to the item.
c) Click Next.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resource restore or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
5. On the Set destination page, specify the instance that you would like to restore for each chosen
source and click Next:
Original Host or Cluster
Select this option to restore data to the original host or cluster.
Alternate Host or Cluster
Select this option to restore data to a local destination that is different from the original host or
cluster, and then select the alternate location from the available resources. Test and production
networks can be configured on the alternate location to create a fenced network, which keeps
virtual machines used for testing from interfering with virtual machines used for production. From
the vCenters section, select an alternative location. You can filter the alternative locations by
either hosts or clusters.
In the VM Folder Destination field, enter the virtual machine folder path on the destination
datastore. Note that the directory will be created if it does not exist. Use "/" as the root virtual
machine folder of the targeted datastore.
ESX host if vCenter is down
Select this option to bypass vCenter Server and to restore data directly to an ESXi host. In other
restore scenarios, actions are completed through vCenter Server. If vCenter Server is unavailable,
this option restores the virtual machine or virtual machines that contain the components that
vCenter Server is dependent on.
When you select an ESXi host, you must specify the host user. You can select an existing user for
the host or create a new one.
To create a user, enter a user name, the user ID, and the user password.
If the ESXi host is attached to a domain, the user ID follows the default domain\name format. If
the user is a local administrator, use the local_administrator format.
To restore data to an ESXi host, the host must have a standard switch or a distributed switch with
ephemeral binding. Review the information in “Restoring data when vCenter Server or other
management VMs are not accessible” on page 172 to ensure that you have the correct
environment configured to use this option.
6. On the Set datastore page, take the following actions:
• If you are restoring data to an alternate ESXi host or cluster, select the destination datastore and
click Next.
• If you are restoring data to the original ESXi host or cluster, this page is not displayed.
7. On the Set network page, specify the network settings to use for each chosen source and click Next.
• If you are restoring data to the original ESXi host or cluster, specify the following network settings:
Allow system to define IP configuration
Select this option to allow your operating system to define the destination IP address. During
a test mode restore operation, the destination virtual machine receives a new MAC address
along with an associated NIC. Depending on your operating system, a new IP address can be
assigned based on the original NIC of the virtual machine, or assigned through DHCP. During a
production mode restore, the MAC address does not change; therefore, the IP address should
be retained.
What to do next
After the job is completed, select one of the following options from the Actions menu on the Jobs
Sessions or Active Clones sections in the Restore pane:
Cleanup
Destroys the virtual machine and cleans up all associated resources. Because this is a temporary
virtual machine to be used for testing, all data is lost when the virtual machine is destroyed.
Procedure
To create a fenced network, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > VMware.
2. In the Restore pane, review the available restore points of your VMware sources, including virtual
machines, VM templates, datastores, folders, and vApps. Use the search function and filters to fine-
tune your selection across specific recovery site types. Expand an entry in the Restore pane to view
individual restore points by date.
3. Select restore points and click the add to restore list icon to add the restore point to the Restore
List. Click the remove icon to remove items from the Restore List.
4. Click Options to set the job definition options.
5. Select Alternate ESX Host or Cluster, then select an alternate host or cluster from the vCenter list.
6. Expand the Network Settings section. From the Production and Test fields, set virtual networks for
production and test Restore job runs. Destination network settings for production and test
environments should be different locations to create a fenced network, which keeps virtual machines
used for testing from interfering with virtual machines used for production. The networks associated
with Test and Production will be utilized when the restore job is run in the associated mode. The IP
addresses of the target machine can be configured by using the following options:
Use system defined subnets and IP addresses for VM guest OS on destination
Select to allow your operating system to define the destination IP address. During a Test Mode
restore, the destination virtual machine receives a new MAC address along with an associated NIC.
Depending on your operating system, a new IP address can be assigned based on the original NIC
of the virtual machine, or assigned through DHCP. During a Production Mode restore operation the
MAC address does not change; therefore, the IP address should be retained.
Use original subnets and IP addresses for VM guest OS on destination
Select to restore to the original host or cluster using your predefined IP address configuration.
During a restore, the destination virtual machine receives a new MAC address, but the IP address
is retained.
Set the network settings for a restore to an alternate or long distance ESX host or cluster:
From the Production and Test fields, set virtual networks for production and test restore job runs.
Destination network settings for production and test environments should be different locations to
create a fenced network, which keeps virtual machines used for testing from interfering with virtual
Restoring data when vCenter Server or other management VMs are not accessible
IBM Spectrum Protect Plus provides an option to automatically restore data by using an ESXi host if
vCenter Server or one of the components that it uses are not accessible. This option restores the virtual
machines that contain the components that vCenter Server uses.
Procedure
1. Connect to the destination ESXi host user interface and create a standard virtual switch.
The new switch has no port groups or uplinks.
2. Use the Secure Shell (SSH) protocol to connect to the ESXi host.
3. List the distributed switches that are configured on the ESXi host by issuing the following command:
4. Identify the physical network interface card (NIC) and the port group of the distributed switch that
you want to use for the restore operation.
5. Remove the physical NIC and port group from the distributed switch by issuing the following
command:
6. Add the physical NIC and port group to the new standard switch by issuing the following command:
7. In the ESXi host user interface, add a temporary port group and select the standard switch that you
created in step “1” on page 173.
The standard switch has one port group and one uplink.
8. Run a restore operation in IBM Spectrum Protect Plus with the ESX host if vCenter is down option
enabled.
For instructions about running a restore operation, see “Restoring VMware data” on page 164.
9. In the ESXi host user interface for the ESXi host, power on the VMs that are restored.
10. Log in to the vCenter Server user interface and start the migration of the management VMs from the
temporary port group that you created in step “7” on page 173 to an available distributed port group.
11. After all of the VMs are migrated to the original port group, reincorporate the physical NIC and the
port group into the original distributed switch by taking the following actions. For example purposes,
the following commands reference a virtualized Network Interface Card (VNIC) named vmnic0 that is
part of port group 64.
a. Remove the network cards (known as vmnics) from a standard switch by issuing the following
command:
For example:
b. Add network cards to the distributed switch by issuing the following command:
For example:
12. Delete the temporary port group and the standard switch from the ESXi host user interface.
13. After the VMs are migrated and accessible, use the ESXi host user interface to unregister, but not
delete, the old VMs if the original host is reachable.
By using this method, you avoid creating duplicated information such as names, Media Access
Control (MAC) addresses, operating system level IDs, and VM Universal Unique Identifiers (UUIDs).
You must complete this step even if you are using a new datastore.
In some vSphere or ESXi versions, the unregister operation can be completed by using the Remove
from inventory option. This option unregisters a VM from the vCenter Server catalog, but leaves
VMDK files on the datastore where the files consume storage space. After you have fully recovered
the VM and the environment is successfully running, you can regain the space by manually removing
these files from the datastore.
Procedure
To add a Hyper-V server, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > Hyper-V.
2. Click Manage Hyper-V Server.
3. Click Add Hyper-V Server.
4. Populate the fields in the Server Properties pane:
What to do next
After you add the Hyper-V server, complete the following action:
Action How to
Assign user permissions to the hypervisor. See “Creating a role” on page 370.
Related tasks
“Backing up Hyper-V data” on page 176
Use a backup job to back up Hyper-V data with snapshots.
“Restoring Hyper-V data” on page 180
Hyper-V restore jobs support Instant VM Restore and Instant Disk Restore scenarios, which are created
automatically based on the selected source.
Procedure
To configure WinRM for connection to Hyper-V hosts:
1. On the Hyper-V host system, log in with an administrator account.
2. Open a Windows command prompt. If User Account Control (UAC) is enabled, you must open the
command prompt with elevated privileges by running with the Run as administrator option enabled.
3. Enter the following command to configure WinRM to allow unencrypted network traffic:
4. Verify that the AllowUnencrypted option is set to true through the following command:
Procedure
To run an inventory job, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > Hyper-V.
2. In the list of Hyper-V servers, select a server or click the link for the server to navigate to the resource
that you want. For example, if you want to run an inventory job for an individual virtual machine in a
server, click the server link and then select a virtual machine.
3. Click Run Inventory.
Procedure
To test the connection, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > Hyper-V.
2. In the list of Hyper-V Servers, click the link for a Hyper-V Server virtual machine to navigate to the
individual virtual machines.
3. Select a virtual machine, and then click Select Options.
4. Select Use existing user.
5. Select a user in the Select user list.
6. Click Test.
Procedure
To define a Hyper-V backup job, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > Hyper-V.
2. Select resources to back up.
Use the search function to search for available resources and toggle the displayed resources through
the View filter. Available options are VMs and Datastore.
3. Click Select SLA Policy to add one or more SLA policies that meet your backup criteria to the job
definition.
4. To create the job definition by using default options, click Save.
The job runs as defined by the SLA policies that you selected. To run the job manually, click Jobs and
Operations > Schedule. Select the job and click Actions > Start.
Tip: When the job for the selected SLA policy runs, all resources that are associated with that SLA
policy are included in the backup operation. To back up only selected resources, you can run an on-
demand job. An on-demand job runs the backup operation immediately.
• To run an on-demand backup job for a single resource, select the resource and click Run. If the
resource is not associated with an SLA policy, the Run button is not available.
• To run an on-demand backup job for one or more resources, click Create job, select Ad hoc backup,
and follow the instructions in “Running an ad hoc backup job” on page 351.
5. To edit options before you start the job, click the edit icon in the table Select Options.
In the Backup Options section, set the following job definition options:
Skip Read-only datastores
Enable to skip datastores mounted as read-only.
Skip temporary datastores mounted for Instant Access
Enable to exclude temporary Instant Access datastores from the backup job definition.
/data/log/guestdeployer/latest_date/latest_entry/vm_name
Where latest_date is the date that the backup job and log truncation occurred, latest_entry is the
universally unique identifier (UUID) for the job, and vm_name is the hostname or IP address of the VM
where the log truncation occurred.
Restriction: File indexing and file restore are not supported from restore points that were copied to an
IBM Spectrum Protect server.
Catalog file metadata
To turn on file indexing for the associated snapshot, enable the Catalog file metadata option. After file
indexing is complete, individual files can be restored by using the File Restore pane in IBM Spectrum
Protect Plus. Note that credentials must be established for the associated virtual machine by using an
SSH key, or a Guest OS Username and Guest OS Password option in the backup job definition. Ensure
that the virtual machine can be accessed from the IBM Spectrum Protect Plus appliance either by
using DNS or hostname. Note that SSH keys are not a valid authorization mechanism for Windows
platforms.
Exclude Files
Enter directories to skip when file indexing is performed. Files within these directories are not added
to the IBM Spectrum Protect Plus catalog and are not available for file recovery. Directories can be
excluded through an exact match or with wildcard asterisks specified before the pattern (*test) or after
the pattern (test*). Multiple asterisk wildcards are also supported in a single pattern. Patterns support
standard alphanumeric characters as well as the following special characters: - _ and *. Separate
multiple filters with a semicolon.
Use existing user
Enable to select a previously entered username and password for the provider.
Guest OS Username/Password
What to do next
After you define a backup job, complete the following action:
Related concepts
“Configuring scripts for backup and restore operations” on page 352
Prescripts and postscripts are scripts that can be run before or after backup and restore jobs run at the
job level. Supported scripts include shell scripts for Linux-based machines and batch and PowerShell
scripts for Windows-based machines. Scripts are created locally, uploaded to your environment through
the Script page, and then applied to job definitions.
Related tasks
“Starting jobs on demand” on page 347
You can run any job on demand, even if the job is set to run on a schedule.
Procedure
To define a Hyper-V restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Hypervisors > Hyper-V > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
Hyper-V.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Select source page, take the following actions:
a) Review the available sources, including virtual machines (VMs) and virtual disks (VDisks). You can
expand a source by clicking its name.
You can also enter all or part of a name in the Search for box to locate VMs that match the search
criteria. You can use the wildcard character (*) to represent all or part of a name. For example,
vm2* represents all resources that begin with "vm2".
b) Click the plus icon next to the item that you want to add to the restore list next to the list of
sources. You can add more than one item of the same type (VM or virtual disk).
To remove an item from the restore list, click the minus icon next to the item.
c) Click Next.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand, single resource restore
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resource restore or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
5. On the Set destination page, choose the instance to be restored for the selected source and click
Next:
Original Host or Cluster
Select this option to restore data to the original host or cluster.
Alternate Host or Cluster
Select this option to restore data to a local destination that is different from the original host or
cluster, then select the alternative location from the available resources.
In the VM Folder Destination field, enter the virtual machine folder path on the destination
datastore. Note that the directory will be created if it does not exist. Use "/" as the root virtual
machine folder of the targeted datastore.
6. On the Set datastore page, take the following actions:
• If you are restoring data to an alternate Hyper-V host or cluster, select the destination datastore
and click Next.
• If you are restoring data to the original Hyper-V host or cluster, this page is not displayed.
7. On the Set network page, specify the network settings to use for each chosen source and click Next.
Restoring files
Recover files from snapshots that are created by IBM Spectrum Protect Plus backup jobs. Files can be
restored to their original or an alternate location.
use_lvmetad = 0
If data resides on XFS file systems and the version of the xfsprogs package is between 3.2.0 and
4.1.9, the file restore can fail due to a known issue in xfsprogs that causes corruption of a clone or
snapshot file system when its UUID is modified. To resolve this issue, update xfsprogs to version 4.2.0
or later. For more information, see Debian Bug report logs.
Procedure
To restore a file, complete the following steps.
1. In the navigation pane, click Manage Protection > File Restore.
2. Enter a search string to search for a file by name, and then click the search icon .
For more information about using the search function, see Appendix A, “Search guidelines,” on page
391.
3. Optional: You can use filters to fine-tune your search across specific virtual machines, date range in
which the file was protected, and virtual machine operating system types.
Searches can also be limited to a specific folder through the Folder path field. The Folder path field
supports wildcards. Position wildcards at the beginning, middle, or end of a string. For example, enter
*Downloads to search within the Downloads folder without entering the preceding path.
Note: Only file objects for which a snapshot was taken during the date range that is specified will be
visible. For those objects, when the arrow is clicked beside the file object, all previous snapshots for
that file object are displayed.
4. To restore the file by using default options, click Restore. The file is restored to its original location.
Db2
After you successfully add your IBM Db2 instances to IBM Spectrum Protect Plus, you can start to protect
your Db2 data. Create service level agreements (SLA) policies to back up and maintain Db2 data.
Ensure that your Db2 environment meets the system requirements. For more information, see “Db2
requirements” on page 36.
Tip: If your Db2 data is stored in a multi-partitioned environment with multiple hosts, you can protect
your Db2 data across each host. Each host in the multi-partitioned environment must be added to IBM
Spectrum Protect Plus so that all instances and databases are detected for protection. For more
information, see “Adding a Db2 application server” on page 192.
The IP address must be reachable from the IBM Spectrum Protect Plus server and from the vSnap server.
Both must have a Windows Remote Management service that is listening on port 5985.
The fully qualified domain name must be resolvable and routable from the IBM Spectrum Protect Plus
appliance server and from the vSnap server.
Requirements for the IBM Spectrum Protect Plus Db2 application server are available here, Db2
requirements.
Space prerequisites
Ensure that you have enough space on the Db2 database management system, in the volume groups for
the backup operation, and on the target volumes for copying files during the restore operation. For more
information about space requirements, see Space requirements for Db2 protection. When you are
restoring data to an alternative location, allocate extra dedicated volumes for the copy and restore
processes. The data paths for table spaces and logs on the target host are the same as the paths on the
original host. This setup is needed to allow copying of data from the mounted vSnap to the target host.
Ensure that dedicated local database directories are allowed for each database in your volume setup.
LVM snapshots
LVM snapshots are point-in-time copies of LVM logical volumes. They are space-efficient snapshots with
the changed data updates from the source logical volume. LVM snapshots are created in the same volume
group as the source logical volume. The IBM Spectrum Protect Plus Db2 agent uses LVM snapshots to
create a temporary, consistent point-in-time copy of the Db2 database.
The IBM Spectrum Protect Plus Db2 agent creates an LVM snapshot which is then mounted, and is copied
to the vSnap repository. The duration of the file copy operation depends on the size of the Db2 database.
During file copying, the Db2 application remains fully online. After the file copy operation finishes, the
LVM snapshots are removed by the IBM Spectrum Protect Plus Db2 agent in a cleanup operation.
For AIX, no more than 15 snapshots can exist for each JFS2 file system. Internal and external JFS2
snapshots cannot exist at the same time for the same file system. Ensure that no internal snapshots exist
on the JFS2 volumes as these snapshots can cause issues when the IBM Spectrum Protect Plus Db2
agent is creating external snapshots.
For every LVM or JFS2 snapshot logical volume containing data, allow at least 10 percent of its size as
free disk space in the volume group. If the volume group has enough free disk space, the IBM Spectrum
Protect Plus Db2 agent reserves up to 25 percent of the source logical volume size for the snapshot
logical volume.
Procedure
1. Create an application server user by issuing the following command:
useradd -m <agent>
where agent specifies the name of the IBM Spectrum Protect Plus agent user.
2. Set a password for the new user by issuing the following command:
passwd <agent>
3. To enable superuser privileges for the agent user, set the !requiretty setting. At the end of the
sudo configuration file, add the following lines:
Defaults:<agent> !requiretty
If your sudoers file is configured to import configurations from another directory, for example /etc/
sudoers.d, you can add the lines in the appropriate file in that directory.
Tip:
Db2 instances found are listed for each host. If your Db2 instance is partitioned, this information is
listed with the host machine and the numbers of the partitions. For multi-host Database Partitioning
Feature (DPF), the Db2 instance is displayed as a single unit.
5. Save the form, and repeat the steps to add other Db2 application servers to IBM Spectrum Protect
Plus.
If your Db2 data is in a multi-partitioned environment with multiple hosts, you must add each host.
Repeat the procedure for each Db2 host.
What to do next
After you add your Db2 application servers to IBM Spectrum Protect Plus, an inventory is automatically
run on each application server to detect the relevant databases in those instances.
To verify that the databases are added, review the job log. Go to Jobs and Operations. Click the Running
Jobs tab, and look for the latest Application Server Inventory log entry.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Db2.
Tip: To add more Db2 instances to the Instances pane, follow the instructions in Adding a Db2
application server.
2. Click Run Inventory.
When the inventory is running, the button changes to show Inventory In Progress. You can run an
inventory on any available application servers, but you can run only one inventory process at a time.
To view the job log, go to Jobs and Operations. Click the Running Jobs tab, and look for the latest
Application Server Inventory log entry.
What to do next
To start protecting Db2 databases that are cataloged in the selected instance, apply a service level
agreement (SLA) policy to the instance. For instructions about setting an SLA policy, see Defining an SLA
policy.
Procedure
1. In the navigation pane, click Manage Protection > Applications > Db2.
2. In the Db2 window, click Manage Application Servers, and select the Host Address you want to test.
A list of the Db2 application servers that are available are shown.
3. Click Actions and choose Test to start the verification tests for physical, remote and operating system
connections and settings.
The test report shows a list of the tests. It consists of a test for the physical host network
configuration, and tests for the remote server installation on the host, which checks SSH and SFTP on
the host. The third test checks for operating system prerequisites and correct sudo privileges.
4. Click OK to close the test, and choose to rerun the test after you fix any failed tests.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Db2.
2. Select a resource to back up.
• Select an entire instance in the Instances pane by clicking the instance name check-box. Any
databases added to this instance are automatically assigned to the SLA policy that you choose.
• Select a specific database in an instance by clicking the instance name, and choosing a database
from the list of databases in that instance.
3. Click Select Options to enable or disable log backup, and to specify parallel streams to minimize time
taken for large data movement in the backup operation. Click Save to commit the options.
Select Enable Log Backup to back up archive logs, which allows point-in-time restore options and
recovery options. For Db2 log backup settings information, see Log backups.
Figure 23. Backup pane with the Enable Log Backup option
If an on-demand job runs with the Enable Log Backup option enabled, log backup occurs. However,
when the job runs again on a schedule, the option is disabled for that job run to prevent possible
missing segments in the chain of backups.
When you save the options, those options are used for all backup jobs for this database or instance as
selected.
4. Select the database or instance again, and click Select SLA Policy to choose an SLA policy for that
database or instance.
5. Save the SLA options.
To define a new SLA or to edit an existing policy with custom retention and frequency rates, select
Manage Protection > Policy Overview. In the SLA Policies pane, click Add SLA Policy, and define
your policy preferences.
What to do next
When the SLA policy is saved, you choose to run an on-demand backup any time by clicking Actions for
that policy, and selecting Start. The status in the log changes to show that the backup is Running.
Procedure
1. From the navigation menu, expand Manage Protection > Applications > Db2.
2. Select a Db2 instance to back up all the data in that instance, or click the instance name to view the
databases available for backing up. You can then select individual databases in the Db2 instance that
you want to back up.
You can back up an entire instance with all of its associated data, or back up one or more databases.
Tip: When the job for the selected SLA policy runs, all resources that are associated with that SLA
policy are included in the backup operation. To back up only selected resources, you can run an on-
demand job. An on-demand job runs the backup operation immediately.
• To run an on-demand backup job for a single resource, select the resource and click Run. If the
resource is not associated with an SLA policy, the Run button is not available.
• To run an on-demand backup job for one or more resources, click Create job, select Ad hoc backup,
and follow the instructions in “Running an ad hoc backup job” on page 351.
Procedure
1. In the Policy Options column of the SLA Policy Status table for the job you are configuring, click the
Log backups
Archived logs for databases contain committed transaction data. This transaction data can be used to run
a rollforward data recovery when you are running a restore operation. Using archive log backups
enhances the recovery point objective for your data.
Ensure that you select the Enable Log Backups option to allow rollforward recovery when you set up a
backup job or service level agreement (SLA) policy. When selected for the first time, you must run a
backup job for the SLA policy to activate log archiving to IBM Spectrum Protect Plus on the database. This
backup creates a separate volume on the vSnap repository, which is mounted persistently on the Db2
application server. The backup process updates either LOGARCHMETH1 or LOGARCHMETH2 parameters to
point to that volume for log archiving purposes. The volume is kept mounted on the Db2 application
server unless the Enable Log Backup option is cleared and a new backup job is run.
Restriction: In Db2 multi-partitioned environments, the LOGARCHMETH parameters across partitions
must match.
When either LOGARCHMETH1 or LOGARCHMETH2 parameters are set with a value other than OFF, you can
use archived logs for rollforward recovery. You can cancel log backup jobs at any time by clearing the
Enable Log Backups option: go to Manage Protection > Applications > Db2, select the instance and
click Select Options. This change takes effect after the next successful backup job completes, and the
LOGARCHMETH parameter value is changed back to its original setting.
Important: IBM Spectrum Protect Plus can enable log backup jobs only when the LOGARCHMETH1
parameter is set to LOGRETAIN or if one of the LOGARCHMETH parameters is set to OFF.
If the LOGARCHMETH1 parameter is set to LOGRETAIN.
IBM Spectrum Protect Plus changes the LOGARCHMETH1 parameter value to enable log backups.
If either LOGARCHMETH1 or LOGARCHMETH2 parameters are set to OFF and the other is set to DISK,
TSM, or VENDOR.
IBM Spectrum Protect Plus uses the LOGARCHMETH parameter that is set to off to enable log backups.
If both LOGARCHMETH parameters are set to DISK, TSM, or VENDOR.
This setting combination causes an error when IBM Spectrum Protect Plus attempts to enable log
backups. To resolve the error, set one of the parameters to OFF, and run the backup job with the
Enable Log Backups option selected.
For more information about Db2 settings, see IBM Db2 Welcome page.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Db2 and click Create job >
Snapshot restore.
The "Snapshot restore" wizard opens.
2. Optional: If you started the restore wizard from the Jobs and Operations page, click Db2 as the
source type and click Next.
Tips:
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
6. Choose a restore method appropriate for the destination chosen for the restore operation. Click Next
to continue.
• Instant Access: In this mode, no further action is taken after IBM Spectrum Protect Plus mounts
the volume from the vSnap repository. Use the data for custom recovery from the files in the
mounted volume.
• Production: In this mode, the Db2 application server first copies the files from the vSnap
repository volume to the target host, which is either an alternative location or the original
instance. That copied data is then used to start the database.
• Test: In this mode, the agent creates a new database by using the data files directly from the
vSnap repository.
• Add a database name when you are restoring the database to a different location and you want to
rename the database.
Tip:
Production is the only restore method that is available for restore operations to the original location.
Any options not appropriate for the restore operation that you selected are not selectable.
To restore data to the original instance, follow the instructions in Restoring to the original instance.
To restore data to an alternative instance, follow the instructions in Restoring to an alternate
instance.
7. Set the destination for the restore operation by choosing one of the following options. Click Next to
continue.
• Restore to original instance: this option restores data to the original server and original instance.
• Restore to alternate instance: this option restores data to a different specified location, creating
a copy of the data at that location.
If you are restoring data to an alternative location, choose an instance in the Instance table before
you click Next. The alternative instance must be on a different machine; unsuitable instances are not
available for selection. For multi-partition databases, the target instance must have the same set of
partitions on a single machine.
8. In the Job Options page, select the recovery, application, and advanced options for the restore
operation you are defining.
Tip:
Recovery options are not available for instant access restore jobs.
• No Recovery. This option skips any rollforward recovery after the restore operation. The database
remains in a Rollforward pending state until you decide whether you want to run the
rollforward operation manually.
• Recover until end of backup. This option recovers the selected database to its state at the time
the backup was created. The recovery process uses the log files that are included in the Db2
database backup.
• Recover until end of available logs. This option is available only if the logs are backed up in the
Db2 backup job definition. IBM Spectrum Protect Plus uses the latest restore point. A temporary
restore point for log backups is created automatically so that the Db2 database can be rolled
forward to the end of the logs. This recovery option is not available if you selected a specific
Attention: Ensure that no other databases share the local database directory as the
original database or that data is overwritten when this choice is selected.
• Maximum Parallel Streams per Database. You can choose to run the restore operation of data in
parallel streams. This option is useful if you are restoring a large database.
• Specify the size of the Db2 database memory set in KB. Specify the memory, in KB, to be
allocated for the database restore on the target machine. This value is used to modify the shared
memory size of the Db2 database on the target server. To use the same shared memory size at
both the source server and the target server, set the value to zero.
10. Optional: In the Job Options page, select the advanced options for the restore operation you are
defining.
• Run cleanup immediately on job failure. This option is selected by default to automatically clean
up allocated resources as part of a restore operation when the recovery fails.
• Continue with restores of other selected databases even if one fails. This option continues the
restore operation if one database in the instance fails to be restored successfully. The process
continues for all other databases that are being restored. When this option is not selected, the
restore job stops when the recovery of a resource fails.
• Mount point prefix. For instant access restore operations, specify the prefix for the path where
the mount point is to be directed.
11. Choose script options in the Apply Scripts page, and click Next to continue.
• Select Pre-Script to select an uploaded script, and an application or script server where the pre-
script runs. To select an application server where the script runs, clear the Use Script Server
check box. Go to the System Configuration > Script page to configure scripts and script servers.
• Select Post-Script to select an uploaded script and an application or script server where the post-
script runs. To select an application server where the script runs, clear the Use Script Server
check box. Go to the System Configuration > Script page to configure scripts and script servers.
• Select Continue job/task on script error to continue running the job when the script that is
associated with the job fails. When this option is enabled and the prescript completes with a
nonzero return code, the backup or restore job continues to run and the prescript task status
returns COMPLETED. If a postscript completes with a nonzero return code, the postscript task
status returns COMPLETED. When this option is not selected, the backup or restore job does not
run, and the prescript or postscript task status returns with a FAILED status.
Results
A few moments after you click Submit, the onDemandRestore record is added to the Job Sessions pane.
To view progress of the restore operation, expand the job. You can also download the log file by clicking
the download icon . All running jobs are viewable in the Jobs and Operations Running Jobs page.
To restore data to the original instance, follow the instructions in Restoring to the original instance. To
restore data to an alternative instance, follow the instructions in Restoring to an alternate instance.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Db2 and click Create job >
Snapshot restore.
The "Snapshot restore" wizard opens.
2. Optional: If you started the restore wizard from the Jobs and Operations page, click Db2 as the
source type and click Next.
Tips:
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
3. On the Select source page, click a Db2 instance to show the databases in that instance. Choose a
database by clicking the plus icon for that database name. Click Next to continue.
4. In the Source snapshot page, choose the type of restore operation required.
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
6. In the Restore Method page, choose Production for the restore operation.
In Production mode, the Db2 application server first copies the files from the vSnap repository
volume to the target host. That copied data is then used to start the database.
Results
A few moments after you click Submit, the onDemandRestore record is added to the Job Sessions pane.
To view progress of the restore operation, expand the job. You can also download the log file by clicking
the download icon . All running jobs are viewable in the Jobs and Operations Running Jobs page.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Db2 and click Create job >
Snapshot restore.
The "Snapshot restore" wizard opens.
2. Optional: If you started the restore wizard from the Jobs and Operations page, click Db2 as the
source type and click Next.
Tips:
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
3. On the Select source page, click a Db2 instance to show the databases in that instance. Choose a
database by clicking the plus icon for that database name. Click Next to continue.
4. In the Source snapshot page, choose the type of restore operation required.
• On-Demand: Snapshot: creates a once-off restore operation from a database snapshot. The job
is not set to recur.
• On-Demand: Point-in-Time: creates a once-off restore operation from a point-in-time backup of
the database. The job is not set to recur.
• Recurring: creates a recurring job that runs on a schedule and repeats.
Tip:
For an On-Demand: Snapshot you can select no recovery or to recover until the end of the backup.
For an On-Demand: Point in Time restore job you can select to recover until the end of the available
logs, or recover until a specific point-in-time.
5. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
6. Choose a restore method appropriate for the destination chosen for the restore operation. Click Next
to continue.
• Production: In this mode, the Db2 application server first copies the files from the vSnap
repository volume to the target host, which is either an alternative location or the original
instance. That copied data is then used to start the database.
• Test: In this mode, the agent creates a new database by using the data files directly from the
vSnap repository.
• Instant Access: In this mode, no further action is taken after IBM Spectrum Protect Plus mounts
the volume from the vSnap repository. Use the data for custom recovery from the files in the
mounted volume.
• Add a database name when you are restoring the database to a different location and you want to
rename the database.
7. Set the destination for the restore operation to Restore to alternate instance to restore data to a
different location, which you can select from the list of eligible locations. Click Next to continue.
When you are restoring to an alternative location, choose an instance in the Instance table before
you click Next. Unsuitable target instances cannot be selected.
8. Choose options as described in “Restoring Db2 data ” on page 202.
9. In the Schedule page, name the restore job and choose the frequency for the job to run. Schedule
the start time, and click Next to continue.
If the restore job you are specifying is an on-demand job, there is no option to enter a schedule.
Specify a schedule only for recurrent restore jobs.
10. In the Review page, review your selections for the restore job. If all the details are correct for your
restore job, click Submit, or click Back to make amendments.
the download icon . All running jobs are viewable in the Jobs and Operations Running Jobs page.
Exchange Server
After you successfully register an Exchange application server, you can start to protect Microsoft
Exchange data with IBM Spectrum Protect Plus. Define a service level agreement (SLA) policy to create
backup jobs with specific schedules, retention policies, and scripts.
Virtualization support
IBM Spectrum Protect Plus supports Exchange Server running on a physical (bare metal) server, as well
as in a virtualization environment. The following virtualization environments are supported:
• VMware ESX guest operating system
• Microsoft Windows Hyper-V guest operating system
Privileges
To help ensure that an Exchange agent can work in your IBM Spectrum Protect Plus environment, you
must set up the appropriate privileges for the Exchange user account.
Exchange certificates
Exchange digital certificates must be installed and configured for the mailbox browser to function during a
granular restore operation. Ensure that the current Exchange certificates are installed and configured
correctly in your environment.
Note: With Exchange 2016 and Exchange 2019, the Exchange Server is configured to use Transport Layer
Security (TLS) by default. This TLS security encrypts communication between internal Exchange servers,
and between Exchange services on the local server.
What to do next
When you add your Exchange application server to IBM Spectrum Protect Plus, an inventory is
automatically run on each instance. Databases must be detected to ensure that they can be backed up,
and you can run a manual inventory at any time to detect updates. For instructions about running a
manual inventory, see “Detecting Exchange databases by running an inventory” on page 216. For
instructions about setting up Exchange database backup jobs, see “Defining a Service Level Agreement
backup job” on page 217.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Exchange.
2. Click Run Inventory.
When the inventory is running, the button label changes to Inventory In Progress. You can run an
inventory on any available application server, but you can run only one inventory process at a time.
3. To monitor the inventory job, go to Jobs and Operations. Click the Running Jobs tab, and look for the
latest Application Server Inventory log entry.
Completed jobs are shown on the Job History tab. You can use the Sort By list to sort jobs based on
start time, type, status, job name, or duration. Use the Search by name field to search for jobs by
name. You can use asterisks as wildcard characters in the name.
4. When the inventory job is complete, on the Exchange Backup pane, click an Exchange instance to
open a view that shows the databases that are detected for that instance. If any databases are missing
from the Instances list, check your Exchange application server and rerun the inventory.
Tip: To return to the list of instances, click the Instances hypertext in the Exchange Backup pane.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Exchange.
2. On the Exchange page, click Manage Application Servers.
The Microsoft Exchange application servers that are available are shown.
3. Click Actions for the Microsoft Exchange application server that you want to test, and then click Test.
The test report shows you a list of the tests that ran and their status. Each test procedure includes a
test of the physical host network configuration, a remote session test, and a test of Windows
prerequisites such as user administrator privileges.
4. Click OK to close the test. Run the test again after you fix any issues.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Exchange.
2. On the Exchange Backup pane, click the Microsoft Exchange instance, and then select the database to
back up.
Each database is listed by instance or database name, the applied SLA policy, and the eligibility for log
backup.
3. Click Run.
The backup job begins, and you can view the details in Jobs and Operation > Running Jobs.
Tip: The Run button is only enabled for a single database backup, and the database must have an SLA
policy applied.
To run an on-demand backup job for multiple databases that are associated with an SLA policy, click
Create job, select Ad hoc backup, and follow the instructions in “Running an ad hoc backup job” on
page 351.
4. To run backup jobs for multiple databases, select the databases in the Exchange backup pane, and
click Select an SLA Policy.
For more information about defining SLA policy backup jobs, and backup job options, see “Defining a
Service Level Agreement backup job” on page 217.
Procedure
1. In the Policy Options column of the SLA Policy Status table for the job that you are configuring, click
the clipboard icon to specify additional configuration options.
2. To define a pre-script configuration, select Pre-Script and take one of the following actions:
• To use a script server, select Use Script Server and choose an uploaded script from the Script or
Script Server list.
• To run a script on an application server, clear the Use Script Server check box, and choose an
application server from the Application Server list.
3. To define a post-script configuration, select Post-Script and take one of the following actions:
• To use a script server, select Use Script Server and choose an uploaded script from the Script or
Script Server list.
• To run a script on an application server, clear the Use Script Server check box, and choose an
application server from the Application Server list.
Scripts and script servers are configured on the System Configuration > Script page. For more
information about working with scripts, see Configuring scripts.
4. Select Continue job/task on script error to continue running the job when the script that is associated
with the job fails.
If this option is selected, the backup or restore operation is attempted and the script task status is
reported as COMPLETED when the script completes processing with a nonzero return code. If this
option is not selected, the backup or restore is not attempted and the script task status is reported as
FAILED.
5. Specify resources to exclude them from the backup job. Enter an exact resource name in the Exclude
Resources field. If you are unsure of a name, use wildcard asterisks that are specified before the
pattern (*text) or after the pattern (text*). Multiple wildcards can be entered with standard
alphanumeric characters and the following special characters: - _ and *. Separate entries with a
semicolon.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Exchange.
2. Click the Exchange Server instance that you want to protect, and then select the databases whose logs
you want to back up.
Tip: The Eligible for Log Backup column shows the databases for which you can run log backups. If a
database is registered as not eligible for log backup, a hover help explanation is provided.
3. Click Select Options and then select Enable Log Backup.
If an on-demand job runs with the Enable Log Backup option enabled, log backup occurs. However,
when the job runs again on a schedule, the option is disabled for that job run to prevent possible
missing segments in the chain of backups.
4. Enter the frequency of the log backups in days, hours, or minutes.
5. Choose the start date and select the time for the log backups to begin, and then click Save.
Results
The database transaction logs are backed up to the vSnap server according to the selected frequency.
Restriction: The database logs are backed up on the preferred node only. Only one Exchange Server
instance at a time can write log backups to the vSnap server.
Any log backup issues that occur are displayed in the Alert notifications in IBM Spectrum Protect Plus.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Exchange.
2. In the Exchange Backup pane, click the View menu and select Database Availability Groups.
3. Click the Exchange DAG that you want to view, and then select the databases to back up.
Procedure
To restore data in an Exchange database, take one of the following actions:
Procedure
To define an Exchange restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > Exchange > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
Exchange.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Select source page, take the following actions:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the plus icon next to the database that you want to use as the source of the restore
operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Procedure
To define an Exchange restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > Exchange > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
Exchange.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Select source page, take the following actions:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the plus icon next to the database that you want to use as the source of the restore
operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Warning: The destination directories that you enter in the Destination Path field must
already exist on the application host. If not, then create the necessary directories on the
server before you complete the restore operation.
For example, for a database that is named Database_A, enter C:\<new_destination_path>
\Database_A.edb, and for the location of the logs, enter C:\<new_logs_path>.
6. On the Set destination page, select Restore to original instance and click Next.
7. Optional: On the Job options page, configure additional options for the restore job and click Next to
continue.
Recovery Options
Choose from the following recovery options:
b) Click the plus icon next to the database that you want to use as the source of the restore
operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Warning: The destination directories that you enter in the Destination Path field must
already exist on the alternative host. If not, then create the necessary directories on the
alternative host before you complete the restore operation.
For example, for a database that is named Database_A, enter C:\<new_destination_path>
\Database_A.edb, and for the location of the logs , enter c:\<new_logs_path>.
6. On the Set destination page, choose Restore to alternate instance, select the target instance that
you want to restore the database to and then click Next.
7. Optional: On the Job options page, configure additional options for the restore job and click Next to
continue.
Recovery Options
Choose from the following recovery options:
No Recovery
This option skips any rollforward recovery after the restore operation. The database remains
in a Rollforward pending state until you decide whether you want to run the rollforward
recovery manually.
Recover until end of backup
Restore the selected database to the state at the time the backup was created.
Procedure
1. In the navigation pane, click Manage Protection > Applications > Exchange > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
Exchange.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Source select page, complete the following steps:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the plus icon next to the database that you want to use as the source of the restore
operation.
Tip: You must select only one database for a granular restore operation. If you select multiple
databases, the granular restore option will not be available on the Restore method page.
The selected source is added to the restore list next to the database list. To remove an item from
the list, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Tip: Click the icon to display an information message that describes the next steps for completing
the granular restore task.
17. When you have selected the mailbox item to restore, in the Actions pane, click the restore task that
you want to run. Choose from the following options:
• Restore Folder to Original Mailbox
• Restore Messages to Original Mailbox
• Save Mail Message Content
Tip: If you click Save Mail Message Content, a Windows Save File window is displayed. Specify the
location and message name and click Save.
When you choose the restore option, the Restore Progress window opens and shows the progress of
the restore operation, and the mailbox item is restored.
18. To restore a mailbox item to another mailbox or .pst file, complete the following steps.
Note: You can also restore a complete mailbox to another mailbox or .pst file.
Choose from the actions in the following table:
19. In the Actions pane, click Close Exchange Mailbox or Close PST File to close the destination
mailbox or .pst file.
Tip: You can enable the Microsoft Management Console to gather diagnostic information to assist in
problem determination related to restore operations. The process gathers configuration files, trace
files, and overall diagnostics of the MMC GUI. For more information, see the following technote:
Enabling diagnostic information in the IBM Spectrum Protect Plus MMC GUI(http://www.ibm.com/
support/docview.wss?uid=ibm10882270).
20. When the restore operation for the individual items is finished, return to IBM Spectrum Protect Plus.
In the Jobs and Operation > Active Resources pane, click Actions > Cancel Granular Restore to
end the granular restore process.
Procedure
1. In the navigation pane, click Manage Protection > Applications > Exchange > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
Exchange.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Source select page, complete the following steps:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the plus icon next to the database that you want to use as the source of the restore
operation.
Tip: You must select only one database for a granular restore operation. If you select multiple
databases, the granular restore option will not be available on the Restore method page.
The selected source is added to the restore list next to the database list. To remove an item from
the list, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Tip: Click the icon to display an information message that describes the next steps for completing
the granular restore task.
12. Connect to the Exchange application server instance by using Remote Desktop Connection (RDC) or
Virtual Network Computing (VNC) if connecting remotely, or by logging on to the Exchange Server
machine locally.
The granular restore operation automatically installs and starts the IBM Spectrum Protect Plus MMC
GUI on the application server. If the MMC GUI fails to start, start it manually by using the path that is
provided in the Active Resources information message.
13. In the IBM Spectrum Protect Plus MMC GUI, click the Protect and Recover Data node, and select
Exchange Server.
14. On the Recover tab for the Exchange Server instance, select View > Mailbox Restore.
A list of user mailboxes from all databases that are included in the backup is displayed.
15. Optional: Run the IBM Spectrum Protect Plus configuration wizard:
a) In the navigation pane, click Dashboard > Manage > Configuration > Wizards > IBM Spectrum
Protect Plus Configuration.
b) In the Actions pane, click Start.
The configuration wizard runs the requirements check.
c) When the requirements checks have run, click the Warnings link next to User Roles Check.
d) On the message dialog box, to add any missing roles, click Yes.
e) On the configuration wizard, click Next, and then click Finish.
16. Select one or more mailboxes from the recovery database to restore. Mailboxes are listed by Mailbox
Name, Alias, Server, Database, and Mailbox Type.
You can restore only user mailboxes that are located in the recovery database.
Tip: Mailboxes from other databases are shown in this view for informational purposes only. If the
mailbox that you want to restore is not in the recovery database, use this view to determine which
Exchange database the user mailbox was assigned to. You can then run the granular restore task
again for that database.
17. To complete the restore operation, in the Actions pane, click one of the following restore options.
Restore Mail to non-Unicode PST file Restore mail items to a non-Unicode personal folders
(.pst) file.
Restriction:
When you restore mail items to a .pst file with one
• This option is available only for Exchange
selected mailbox, you are prompted for a file name.
Server 2013.
When you restore mail items to a .pst file with more
• Each folder can contain a maximum of than one selected mailbox, you are prompted for a
16,383 mail items. directory location. Each mailbox is restored to a
separate .pst file that reflects the name of the
mailbox at the specified directory.
If the .pst file exists, the file is used. Otherwise, the
file is created.
Restore Mail to Unicode PST file Restore mail items to a Unicode .pst file.
When you restore mail items to a .pst file with one
selected mailbox, you are prompted for a file name.
When you restore mail items to a .pst file with more
than one selected mailbox, you are prompted for a
directory location.
Tip:
You can enter a standard path name (for example,
c:\PST\mailbox.pst) or a UNC path (for example,
\\server\c$\PST\mailbox.pst). When you enter
a standard path, the path is converted to a UNC path.
If the UNC is a non-default UNC path, enter the UNC
path directly.
Each mailbox is restored to a separate .pst file that
reflects the name of the mailbox at the specified
directory. If the .pst file exists, the file is used.
Otherwise, the file is created.
Restore Mail to Archive Mailbox This action applies to a primary mailbox or an archive
mailbox. Select this action to restore all or part of
either type of mailbox to the original archive mailbox
or to an alternative archive mailbox.
You can filter the archive mailbox and restore a
specific mailbox folder. In the Folder to be restored
field, enter the name of the folder in the archive
mailbox that you want to restore.
• To restore a subfolder in a parent folder, specify the
full folder path in this format:
parent_folder_name/sub_folder_name.
• To restore all subfolders in a parent folder, use
parent_folder_name/*.
• If the full folder path includes spaces, enclose the
folder path in double quotation marks, and do not
append a backslash character (\).
In the Target archive mailbox field, specify the
archive mailbox destination.
Exclude recoverable mail items while Apply this action if you are restoring an online, public
restoring the mailbox folder, or archive mailbox to an original mailbox,
alternative mailbox, or to a Unicode .pst file.
Specify a value of Yes to exclude the mail items in the
Recoverable Items folder in mailbox restore
operations. No is the default value.
Tip: You can enable the Microsoft Management Console to gather diagnostic information to assist in
problem determination related to restore operations. The process gathers configuration files, trace
files, and overall diagnostics of the MMC GUI. For more information, see the following technote:
Enabling diagnostic information in the IBM Spectrum Protect Plus MMC GUI(http://www.ibm.com/
support/docview.wss?uid=ibm10882270).
Procedure
To define an Exchange restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > Exchange > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
Exchange.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. In the Source select page, complete the following steps:
a) Click the View menu and select Database Availability Groups.
b) In the Availability Groups list, click an Exchange instance to see the list of restore points for that
instance and select the backup versions that you want to restore. You can also use the search
function to search for available instances and toggle the displayed instances through the View
filter.
c) Click the add to restore list icon next to the database that you want to use as the source of the
restore operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list source, click the icon next to the item.
d) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Attention: When you choose the destination, you must select an active node as the
destination; otherwise, the restore operation fails.
b) Click the plus icon next to the database that you want to use as the source of the restore
operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
5. On the Set destination page, specify where you want to mount the database files and click Next.
Option Description
Restore to original Select this option to mount the database files to the original server.
location
Restore to alternate Select this option to mount the database files to a local destination that is
location different from the original server, and then select the alternative location
from the list of available servers.
6. On the Restore Method page, choose Instant Access, and then click Next.
7. Optional: On the Job options page, configure additional options if necessary and click Next to
continue.
8. Optional: On the Apply scripts page, select the Pre-Script or Post-Script to apply, or choose
Continue job/task on script error. For more information about working with scripts, see Configuring
scripts. Click Next to continue.
9. Take one of the following actions on the Schedule page:
• If you are running an on-demand job, click Next.
• If you are setting up a recurring job, enter a name for the job schedule, and specify how often and
when to start the restore job. Click Next.
10. On the Review page, review your restore job settings and click Submit to create the job.
The restore job is created, and you can check on its status in Jobs and Operations > Running Jobs.
11. You can now access the Exchange database files on the application server mount point, and carry out
any Exchange related or custom actions you want to do.
Note: The Exchange database files on the mount point are read/write. However, updating them does
not modify the original backup.
12. When you are finished with the instant access restore operation, go to the Active Resources pane,
click Actions > Cancel Restore to remove the mounted database and end the restore process.
Restrictions
The following restrictions apply to the MongoDB application server:
• MongoDB sharded cluster configurations are detected when you run an inventory, but these resources
are not eligible for backup or restore operations.
• Unicode characters in MongoDB file path names cannot be handled by IBM Spectrum Protect Plus. All
names must be in ASCII.
Virtualization
Protect your MongoDB environment with IBM Spectrum Protect Plus when it is running on one of the
following guest operating systems:
• Red Hat Enterprise Linux
• SUSE Linux Enterprise Server Kernel-based Virtual Machine (KVM)
use admin
db.grantRolesToUser("<username>",
[ { role: "hostManager", db: "admin" },
{ role: "clusterManager", db: "admin" } ] )
Linux LVM2
When you run a MongoDB backup operation, MongoDB requests a snapshot. This snapshot is created on a
Logical Volume Management (LVM) system for each logical volume with data or logs for the selected
database. On Linux systems, logical volumes are managed by LVM2.
A software-based LVM2 snapshot is taken as a new logical volume on the same volume group. The
snapshot volumes are temporarily mounted on the same machine that runs the MongoDB instance so that
they can be transferred to the vSnap repository.
On Linux, the LVM2 volume manager stores the snapshot of a logical volume within the same volume
group. There must be enough space available to store the logical volume. The logical volume grows in size
as the data changes on the source volume for the lifetime of the snapshot.
Procedure
1. Create an agent user by issuing the following command:
useradd -m agent
where agent specifies the name of the IBM Spectrum Protect Plus agent user.
2. Set a password for the new user by issuing the following command:
passwd mongodb_agent
3. To enable superuser privileges for the agent user, set the !requiretty setting. At the end of the
sudo configuration file, add the following lines:
Defaults:agent !requiretty
Alternatively, if your sudoers file is configured to import configurations from another directory, for
example /etc/sudoers.d, you can add the lines in the appropriate file in that directory.
Attention: If you register more than one application server for one replica set, the instance
name that is displayed might change after each inventory, backup, or restore operation. The
host name of the most recently added application server that belongs to the replica set is used
as part of the instance name. An inventory operation is run as part of backup and restore
operations.
6. If you are using access control, configure an instance by setting credentials. Click Set Credential, and
set the user ID, and password. Alternatively, you can select to use an existing user profile.
For more information about access control, see Chapter 15, “Managing user access,” on page 365.
When you set credentials, you assign MongoDB user roles for the backup and restore operations with
access to role-protected MongoDB servers by using Salted Challenge Response Authentication
Mechanism (SCRAM), or Challenge and response authentication. The MongoDB user that is assigned
for the role-protected MongoDB server requires one of the following access levels to protect
resources:
• Host Manager: manages the database as the administrator. This role is required for taking and
managing snapshots.
• Cluster Administrator: retrieves configuration information and runs test mode restore operations of
MongoDB replica sets. This role is required to reconfigure test mode restore operations of MongoDB
replica sets for data queries.
What to do next
After you add MongoDB application servers to IBM Spectrum Protect Plus, an inventory is automatically
run on each application server to detect the relevant databases in those instances.
To verify that the databases are added, review the job log. Go to Jobs and Operations. Click the Running
Jobs tab, and look for the latest Application Server Inventory log entry.
Completed jobs are shown on the Job History tab. You can use the Sort By list to sort jobs based on start
time, type, status, job name, or duration. Use the Search by name field to search for jobs by name. You
can use asterisks as a wildcard in the name.
Databases must be detected to ensure that they can be protected. For instructions about running a
manual inventory, see Detecting MongoDB resources.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > MongoDB.
2. In the MongoDB window, click Manage Application Servers, and click Add Application Server.
3. In the Application Properties form, enter the host address for the Ops Manager Application Database.
Get instances and set credentials by following the steps outlined in “Adding a MongoDB application
server” on page 254.
The Ops Manager Application Database is listed in the Instances table as shown in the following
example:
What to do next
The MongoDB Ops Manager Application Database is available for backing up. You can define backup and
restore jobs to protect your data. To regularly back up your data, define a backup job that includes a
service level agreement (SLA) policy. For more information, see “Backing up MongoDB data” on page 259
and “Defining a regular service level agreement job” on page 260.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > MongoDB.
When the inventory is running, the button changes to Inventory In Progress. You can run an inventory
on any available application servers, but you can run only one inventory process at a time.
To monitor the inventory job, go to Jobs and Operations. Click the Running Jobs tab, and look for the
latest Application Server Inventory log entry.
Completed jobs are shown on the Job History tab. You can use the Sort By list to sort jobs based on
start time, type, status, job name, or duration. Use the Search by name field to search for jobs by
name. You can use asterisks as wildcard characters in the name.
3. Click an instance to open a view that shows the databases that are detected for that instance. If any
databases are missing from the Instances list, check your MongoDB application server and rerun the
inventory. In some cases, certain databases are marked as ineligible for backup; hover over the
database to reveal the reason why.
Tip: To return to the list of instances, click the Instances link in the Backup MongoDB pane.
Attention: If you register more than one application server for one replica set, the instance
name that is displayed might change after each inventory, backup, or restore operation. The
host name of the most recently inventoried application server that belongs to the replica set is
used as part of the instance name. An inventory operation is run as part of backup and restore
operations.
What to do next
To start protecting MongoDB databases that are cataloged in the selected instance, apply a service level
agreement (SLA) policy to the instance. For instructions about setting an SLA policy, see Defining an SLA
policy.
Procedure
1. In the navigation pane, click Manage Protection > Applications > MongoDB.
2. In the MongoDB window, click Manage Application Servers, and select the host address that you
want to test.
A list of the MongoDB application servers that are available is shown.
3. Click Actions and choose Test to start the verification tests for physical and remote system
connections and settings.
The test report displays a list that includes tests for the physical host network configuration, and tests
for the remote server installation on the host.
4. Click OK to close the test report. If issues are reported, fix the issues and rerun the test to verify the
fixes.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > MongoDB.
2. Select the check box for the instance that you want to back up.
Under each MongoDB instance, data to be backed up is listed as ALL. Each instance in the Instances
pane is listed by instance name, version, and the applied SLA policy.
3. Click Select Options to specify the number of parallel streams for the backup operation, and then click
Save. By selecting an appropriate number of parallel streams, you can minimize the time that is
required for the backup job.
The saved options are used for all backup jobs for this instance as selected.
4. To run the backup job with these options, click the instance name, select the ALL database
representation, and click Run.
The backup job begins, and you can view the details in Jobs and Operation > Running Jobs.
Tip: The Run button is only enabled if an SLA policy is applied to the ALL representation of the
databases.
To run an on-demand backup job for multiple databases that are associated with an SLA policy, click
Create job, select Ad hoc backup, and follow the instructions in “Running an ad hoc backup job” on
page 351.
5. Select the instance again, and click Select an SLA Policy to choose an SLA policy.
6. Save the SLA selection.
To define a new SLA or to edit an existing policy with custom retention and frequency rates, select
Manage Protection > Policy Overview. In the SLA Policies pane, click Add SLA Policy, and define
policy preferences.
What to do next
After the SLA policy is saved, you can run the policy at any time by clicking Actions for that policy name,
and selecting Start. The status in the log changes to show that the backup job is in the Running state.
To cancel a job that is running, click Actions for that policy name and select Cancel. A message asks
whether you want to keep the data that is already backed up. Choose Yes to keep the backed up data, or
No to discard the backup.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > MongoDB.
2. Select the MongoDB instance to back up all the data in that instance.
What to do next
After the SLA policy is saved, you can run the policy at any time by clicking Actions for that policy name,
and selecting Start. The status in the log changes to show that the backup job is in the Running state.
To cancel a job that is running, click Actions for that policy name and select Cancel. A message asks
whether you want to keep the data that is already backed up. Choose Yes to keep the backed up data, or
No to discard the backup.
Procedure
1. In the Policy Options column of the SLA Policy Status table for the job that you are configuring, click
Procedure
To define a MongoDB restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > MongoDB > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
MongoDB.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Select source page, take the following actions:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the add to restore list icon next to the database that you want to use as the source of the
restore operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list source, click the remove from restore list icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
5. On the Restore method page, choose the type of restore operation, and click Next to continue.
• Test: In this mode, the agent creates a database by using the data files directly from the vSnap
repository. This option is available only when you are restoring data to an alternative instance.
Members of replica sets will not be reconfigured after the MongoDB server is started. The server is
started as a single-node replica set.
Attention: Ensure that no other data shares the same local database directory as the
original data or the data will be overwritten.
Maximum Parallel Streams per Database
Set the maximum number of parallel data streams from the backup storage per database.
This setting applies to each database in the job definition. Multiple databases can still be
restored in parallel if the value of the option is set to 1. Multiple parallel streams might speed
up restore operations, but high bandwidth consumption might affect overall system
performance.
This option is applicable only when you are restoring a MongoDB database to its original
location by using its original database name.
Advanced Options
Set the advanced job definition options:
Run cleanup immediately on job failure
This option is selected by default to automatically clean up allocated resources as part of a
restore operation if recovery fails.
Allow session overwrite
Select this option to replace existing databases with the same name during a restore
operation. During an instant disk restore operation, the existing database is shut down and
overwritten, and then the recovered database is restarted. If this option is not selected and a
database with the same name is encountered, the restore operation fails with an error.
Continue with restores of other selected databases even if one fails
If one database in the instance is not successfully restored, the restore operation continues
for all other data that is being restored. When this option is not selected, the restore job stops
when the recovery of a resource fails.
Attention: Review the selected options before you proceed to Submit because data will be
overwritten when the Overwrite existing data application option is selected. You can cancel a
restore job when it is in progress, but if the Overwrite existing data option is selected, data is
overwritten even if you cancel the job.
11. To proceed with the job, click Submit. To cancel the job, navigate to Jobs and Operations and click
the Schedule tab. Find the restore job you want to cancel. Click Actions, and select Cancel.
Results
A few moments after you select Restore, the onDemandRestore job is added to the Jobs and
Operations > Running Jobs pane. Click the record to show the step-by-step details of the operation. You
can also download the zipped log file by clicking Download.zip. For any other jobs, click the Running
Jobs or Job History tabs and click the job to display its details.
The IP address and port for the restored server can be found in the log file for the restore operation.
Navigate to Jobs and Operations > Running Jobs to find the logs for your restore operation.
For information about restoring data to the original instance, see Restoring to the original instance. For
information about restoring your data to an alternative instance, see Restoring to an alternate instance.
Procedure
1. In the navigation pane, click Manage Protection > Applications > MongoDB > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
MongoDB.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Select source page, take the following actions:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the add to restore list icon next to the database that you want to use as the source of the
restore operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list source, click the remove from restore list icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
5. On the Restore method page, choose the type of restore operation, and click Next to continue.
• Production
To recover an entire instance to the original instance, the preferred method is to choose this
option with the overwrite application option. MongoDB instances that are members of a replica set
are not started during a production restore operation. This action prevents data from being
overwritten when connecting to the replica set.
• Test
Choose this option to restore data to the same server but using a different port.
• Instant Access
Choose this option to mount the backup to the application server without restoring the data or
overwriting the data.
Click Next to continue.
For test mode or production mode, you can optionally enter a new name for the restored database.
Attention: Ensure that no other data shares the same local database directory as the
original data or the data will be overwritten.
Maximum Parallel Streams per Database
Set the maximum number of parallel data streams from the backup storage per database.
This setting applies to each database in the job definition. Multiple databases can still be
restored in parallel if the value of the option is set to 1. Multiple parallel streams might speed
up restore operations, but high bandwidth consumption might affect overall system
performance.
This option is applicable only when you are restoring a MongoDB database to its original
location by using its original database name.
Advanced Options
Set the advanced job definition options:
Run cleanup immediately on job failure
This option is selected by default to automatically clean up allocated resources as part of a
restore operation if recovery fails.
Allow session overwrite
Select this option to replace existing databases with the same name during a restore
operation. During an instant disk restore operation, the existing database is shut down and
overwritten, and then the recovered database is restarted. If this option is not selected and a
database with the same name is encountered, the restore operation fails with an error.
Continue with restores of other selected databases even if one fails
If one database in the instance is not successfully restored, the restore operation continues
for all other data that is being restored. When this option is not selected, the restore job stops
when the recovery of a resource fails.
Mount Point Prefix
For Instant Access restore operations, specify a mount point prefix for the path where the
mount is to be directed.
8. Optional: On the Apply scripts page, specify scripts that can be run before or after a job runs. Batch
and PowerShell scripts are supported on Windows operating systems while shell scripts are
supported on Linux operating systems.
Pre-Script
Select this check box to choose an uploaded script and an application or script server where the
pre-script will run. To select an application server, clear the Use Script Server check box. To
configure scripts and script servers, click System Configuration > Script.
Attention: Review the selected options before you proceed to Submit because data will be
overwritten when the Overwrite existing data application option is selected. You can cancel a
restore job when it is in progress, but if the Overwrite existing data option is selected, data is
overwritten even if you cancel the job.
11. To proceed with the job, click Submit. To cancel the job, navigate to Jobs and Operations and click
the Schedule tab. Find the restore job you want to cancel. Click Actions, and select Cancel.
Procedure
1. In the navigation pane, click Manage Protection > Applications > MongoDB > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
b) Click the add to restore list icon next to the database that you want to use as the source of the
restore operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list source, click the remove from restore list icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
5. On the Restore method page, choose the type of restore operation, and click Next to continue.
• Test: In this mode, the agent creates a database by using the data files directly from the vSnap
repository. This option is available only when you are restoring data to an alternative instance.
Members of replica sets will not be reconfigured after the MongoDB server is started. The server is
started as a single-node replica set.
• Production: In this mode, the MongoDB application server first copies the files from the vSnap
repository to the target host. The copied data is then used to start the database. MongoDB
instances that are members of a replica set are not started during a production restore operation.
This action prevents data from being overwritten when connecting to the replica set.
• Instant Access: In this mode, no further action is taken after IBM Spectrum Protect Plus mounts
the share. Use the data for custom recovery from the files in the vSnap repository.
For test mode or production mode, you can optionally enter a new name for the restored database.
For production mode, you can also specify a new folder for the restored database by expanding the
database and entering a new folder name.
6. In the Set destination page, choose Restore to alternate instance and select the target instance
that you want to restore the data to.
The original instance is not selectable because you cannot overwrite the original data when you
select Restore to alternate instance. You also cannot select instances on different versions levels or
instances on the same host as the original instance.
Click Next to continue.
7. Optional: On the Job options page, configure additional options for the restore job and click Next to
continue.
In the Recovery Options section, the Recover until end of backup for MongoDB is selected by
default. This option recovers the selected data to the state it was in at the time the backup was
created. The recovery operation makes use of the log files that are included in the MongoDB backup.
Application Options
Set the application options:
Overwrite existing database
Enable this option to allow the restore job to overwrite the selected database. If this option is
not selected, the restore job fails when data with the same name is found during the restore
process.
Attention: Ensure that no other data shares the same local database directory as the
original data or the data will be overwritten.
Attention: Review the selected options before you proceed to Submit because data will be
overwritten when the Overwrite existing data application option is selected. You can cancel a
restore job when it is in progress, but if the Overwrite existing data option is selected, data is
overwritten even if you cancel the job.
Procedure
1. In the navigation pane, click Manage Protection > Applications > MongoDB > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
2. On the Select source page, take the following actions:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the add to restore list icon next to the database that you want to use as the source of the
restore operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list source, click the remove from restore list icon next to the item.
c) Click Next to continue.
3. On the Restore method page, select Test, and click Next to continue with the test restore process.
4. On the Set destination page, choose Restore to alternate instance, and select the target instance
that you want to restore the data to.
You cannot select the original instance is not selectable as you cannot overwrite the original data
when you select Restore to alternate instance. Instances on different versions levels cannot be
selected. Other instances on the same host as the original instance, cannot be selected either.
Click Next to continue.
5. Proceed through the restore wizard pages and select the required options.
6. On the Review page, review your restore job settings.
Attention: Review the selected options before you proceed to Submit because data will be
overwritten when the Overwrite existing data application option is selected. You can cancel a
restore job when it is in progress, but if the Overwrite existing data option is selected, data is
overwritten even if you cancel the job.
7. Log on to the MongoDB server to which the test restore job is directed.
Or,
10. Run the mongorestore command to restore the dump file into any MongoDB instance. Choose
either the original MongoDB instance that the backup was created for, or any alternative instance.
Use the appropriate command. The first command is for a database and the second command is for a
collection:
Or,
11. When the database or collection restore operation finishes, go to Jobs and Operations > Active
Resources.
12. Click Actions > Cancel Restore to end the granular restore procedure.
Procedure
1. Go to the Office 365 welcome page and sign in to your Microsoft account by using your Office 365
administrative user ID and password.
2. To open the Azure Active Directory admin center, in the left pane, click the ellipsis to expand the
Show all menu, and then click Admin centers > Azure Active Directory.
What to do next
Follow the instructions in “Registering the Office 365 tenant with IBM Spectrum Protect Plus ” on page
280.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Office 365.
2. On the Office 365 page, click Manage application servers, and then click Add application server.
3. On the Organization Properties page, complete the following fields:
a. In the Organization Name field, enter the name of the organization that you set up in the Azure
Active Directory admin center. If the organization name contains dots or spaces, remove them. For
example, change tenantname.onmicrosoft.com to tenantnameonmicrosoftcom. If the organization
name contains dots or spaces, issues occur during the restore operation.
Note: This is the Organization/Tenant name. This is NOT the user facing name that you set up
(which appears under Display name) when doing Azure app registration.
b. In the Tenant ID field, enter the string from the Directory (tenant) ID field in the Azure Active
Directory application registration.
c. In the Application ID field, enter the string from the Application (client) ID field in the Azure
Active Directory application registration.
d. In the Application Secret field, enter the password string that was generated during the Azure
Active Directory application registration.
4. On the Proxy Properties page, complete the following fields:
a. In the Host Address field, enter the host name or IP address of the Linux server that is being used
as the proxy host.
b. For host server authentication, select one of the following options:
• User: Select an existing user, or enter a user ID and the associated password.
• SSH Key: Select a Secure Shell (SSH) key from the drop-down list.
Results
When a proxy host is registered in IBM Spectrum Protect Plus, an inventory is run automatically on the
Office 365 organization, which returns the Office 365 users in that resource.
For example,
Procedure
1. In the IBM Spectrum Protect Plus navigation pane, expand Manage Protection > Applications >
Office 365.
2. Select the checkbox for the organization.
3. Click Select an SLA policy and choose an SLA policy.
For more information about SLA policies, see “Create backup policies” on page 93.
4. Save your choice. To define a new SLA or to edit an existing policy with custom retention periods or
backup frequency rates, click Manage Protection > Policy Overview. In the "SLA policies" pane, click
Add SLA Policy, and define policy preferences.
5. To run the policy outside the scheduled job, take the following actions.
a. To back up all organization data, select the checkbox for the organization.
b. To back up data from an account, click Organization and select the checkbox for the user name that
is associated with the account.
c. To back up email, calendars, contacts, or OneDrive data for an account, click Organization, and then
click the user name and select the checkbox for the email, calendar, contacts, or OneDrive to back
up.
6. Click Run. The status changes to running for your chosen SLA and you can follow the progress of the
job in the log.
Procedure
1. In the navigation pane, expand Manage Protection > Applications > Office 365.
2. Click Create job.
3. Select Snapshot restore.
4. In the Select source pane, complete the following steps:
a) Click a source in the list to display the data that can be restored for the selected organization. You
can also use the search function to search for available data and toggle the displayed data by using
the View filter.
b) To select data to restore, click the Add to restore list icon next to the data. You can select more
than one item from the list. The selected items are added to the restore list. To remove an item
from the source list, click the Remove from restore list icon next to the data.
c) Click Next to continue.
5. On the "Source snapshot" page, select the restore type and the time when the data to be restored was
backed up. Then, click Next to continue.
6. On the "Select destination" page, complete the following fields, and click Next to continue.
Option Description
Select a destination Select the location to which data must be restored:
Restore to original account
Restores data to the original Office 365 account
Restore to another account
Restores data to another Office 365 account
Restore Path Restores data to selected directory path in the Office 365 account
7. On the Job options page, if you want to run restore operations in parallel streams, specify a value in
the Max Parallel Streams field. Then, click Next to continue.
8. On the Review page, review your restore job settings.
9. To start the restore job, click Submit.
Results
A few moments after you click Submit, the on-demand restore job is added to the Running Jobs tab on
the Jobs and Operations page. You can click the job record to display the details of the operation. You can
also download the zipped log file by clicking Download.zip.
The account name for the restored data can be found in the log file for the restore operation. To locate the
logs for a restore operation, in the navigation pane, click Jobs and Operations and then click the Running
Jobs tab.
Procedure
To register an Oracle application server, complete the following steps.
1. In the navigation pane, click Manage Protection > Applications > Oracle > Backup.
2. Click Manage Application Servers.
3. Click Add Application Server to add the host machine.
4. In the Application Properties pane, enter the host address.
The host address is a resolvable IP address, or a resolvable path and machine name.
5. Select User or SSH key.
Option Description
User Click this option to specify an existing user or enter a user ID and password. The user
must have sudo privileges set up. Populate the fields as follows:
Use existing user
Select this check box to use a previously entered user name and password for the
application server. Select a user name from the Select user list.
UserID
Enter your user name for the application server. If the virtual machine is attached
to a domain, the user identity follows the default domain\name format. If the
user is a local administrator, use the local_administrator format.
For Kerberos-based authentication only, the user identity must be specified in the
username@FQDN format. The user name must be able to authenticate using the
registered password to obtain a ticket-granting ticket (TGT) from the key
distribution center (KDC) on the domain that is specified by the fully qualified
domain name.
Password
Enter your password for the application server.
SSH Key Click this option to use an SSH key. Select a key from the Select a SSH key list.
6. To protect multithreaded databases in Oracle 12c and later versions, provide credentials for the
databases:
a) Click Get databases to detect and list the Oracle databases on the host server that you are adding.
Each Oracle database is listed with its name, status, and an indication of whether credentials were
previously specified for the database.
b) For each multithreaded database that you want to protect, click Set Credential and specify the
user ID and password. Alternatively, you can select an existing user from the Select user list.
You must specify the credentials of an Oracle database user who has SYSDBA privileges.
7. In Maximum concurrent databases, set the maximum number of databases to back up concurrently
on the server.
Server performance is impacted when many databases are backed up concurrently, as each database
utilizes multiple threads and consumes bandwidth when copying data. Use this option to control the
impact on server resources and minimize the impact on production operations.
8. Click Save. IBM Spectrum Protect Plus confirms a network connection, adds the application server to
the IBM Spectrum Protect Plus database, and then catalogs the instance.
If a message appears indicating that the connection is unsuccessful, review your entries. If your
entries are correct and the connection is unsuccessful, contact a system administrator to review the
connections.
Action How to
Assign user permissions to the application server. See “Creating a role” on page 370.
Related concepts
“Managing user access” on page 365
By using role-based access control, you can set the resources and permissions available to IBM Spectrum
Protect Plus user accounts.
Related tasks
“Backing up Oracle data” on page 285
Use a backup job to back up Oracle environments with snapshots.
“Restoring Oracle data” on page 288
Use a restore job to restore an Oracle environment from snapshots. IBM Spectrum Protect Plus creates a
vSnap clone from the version that is selected during the job definition creation and creates a Network
Files System (NFS) share. The IBM Spectrum Protect Plus agent then mounts the share on the Oracle
server where the restore job is to be run. For Oracle Real Application Clusters (RAC), the restore job is run
on all nodes in the cluster.
Procedure
To run an inventory job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > Oracle > Backup.
2. In the list of Oracle instances, select an instance or click the link for the instance to navigate to the
resource that you want. For example, if you want to run an inventory job for an individual database in
the instance, click the instance link and then select a virtual machine.
3. Click Run Inventory.
Procedure
To test the connection, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > Oracle > Backup.
2. Click Manage Application Servers.
3. In the list of hosts, click Test in the Actions menu for the host.
Procedure
To define an Oracle backup job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > Oracle.
2. Select Oracle homes, databases, and ASM diskgroups to back up. Use the search function to search for
available instances.
3. Click Select an SLA Policy to add one or more SLA policies that meet your backup data criteria to the
job definition.
4. To create the job definition by using default options, click Save.
The job runs as defined by the SLA policies that you selected. To run the job manually, click Jobs and
Operations > Schedule. Select the job and click Actions > Start.
Tip: When the job for the selected SLA policy runs, all resources that are associated with that SLA
policy are included in the backup operation. To back up only selected resources, you can run an on-
demand job. An on-demand job runs the backup operation immediately.
• To run an on-demand backup job for a single resource, select the resource and click Run. If the
resource is not associated with an SLA policy, the Run button is not available.
• To run an on-demand backup job for one or more resources, click Create job, select Ad hoc backup,
and follow the instructions in “Running an ad hoc backup job” on page 351.
What to do next
After you create the backup job definition, complete the following action:
Action How to
Create an Oracle Restore job definition. See “Restoring Oracle data” on page 288.
Related concepts
“Configuring scripts for backup and restore operations” on page 352
Prescripts and postscripts are scripts that can be run before or after backup and restore jobs run at the
job level. Supported scripts include shell scripts for Linux-based machines and batch and PowerShell
scripts for Windows-based machines. Scripts are created locally, uploaded to your environment through
the Script page, and then applied to job definitions.
Procedure
To define an Oracle restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > Oracle > Create job, and then
select Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
Oracle.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
2. On the Select source page, take the following actions:
a) Click a source in the list to show the databases that are available for restore operations. You can
also use the search function to search for available instances and toggle the displayed instances
through the View filter.
b) Click the plus icon next to the database that you want to use as the source of the restore
operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud resource
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
Use alternate If you are restoring data from a cloud service or a repository server, select this
vSnap server for box to specify an alternative vSnap server, and then select a server from the
the restore job Select alternate vSnap menu.
When you restore data from a restore point that was copied to a cloud service
or repository server, a vSnap server is used as a gateway to complete the
operation. By default, the vSnap server that is used to complete the restore
operation is the same vSnap server that is used to complete the backup and
copy operations. To reduce the load on the vSnap server, you can select an
alternative vSnap server to serve as the gateway.
5. On the Restore method page, set the restore job to run in test, production, or instant access mode by
default.
For test or production mode, you can optionally enter a new name for the restored database.
For production mode, you can also specify a new folder for the restored database by expanding the
database and entering a new folder name.
Click Next to continue.
After the job is created, it can be run in test, production, or instant access mode in the Job Sessions
pane.
6. On the Set destination page, specify where you want to restore the database and click Next.
Restore to original location
Select this option to restore the database to the original server.
Restore to alternate location
Select this option to restore the database to a local destination that is different from the original
server, and then select the alternative location from the list of available servers.
7. On the Job options page, configure additional options for the restore job and click Next to continue.
name = value
Results
An on-demand job begins after you click Submit, and the onDemandRestore record is added to the Job
Sessions pane shortly. To view the progress of the restore operation, expand the job. You can also
What to do next
Oracle databases are always restored in non-multithreaded mode. If the databases that you restored
were originally in multithreaded mode, after the restore operation is completed, you must manually
configure credentials and switch the databases to the multithreaded mode.
Related concepts
“Configuring scripts for backup and restore operations” on page 352
Prescripts and postscripts are scripts that can be run before or after backup and restore jobs run at the
job level. Supported scripts include shell scripts for Linux-based machines and batch and PowerShell
scripts for Windows-based machines. Scripts are created locally, uploaded to your environment through
the Script page, and then applied to job definitions.
Related tasks
“Adding an Oracle application server” on page 284
System requirements
Ensure that your SQL Server environment meets the system requirements in “Microsoft SQL Server
database backup and restore requirements” on page 49.
Kerberos requirements
Kerberos-based authentication can be enabled through a configuration file on the IBM Spectrum Protect
Plus appliance. This will override the default Windows NTLM protocol.
For Kerberos-based authentication only, the user identity must be specified in the username@FQDN
format. The username must be able to authenticate using the registered password to obtain a ticket-
granting ticket (TGT) from the key distribution center (KDC) on the domain specified by the fully qualified
domain name.
Kerberos authentication also requires that the clock skew between the Domain Controller and the IBM
Spectrum Protect Plus appliance is less than five minutes.
The default Windows NTLM protocol is not time dependent.
Privileges
On the SQL Server server, the system login credential must have public and sysadmin permissions
enabled, plus permission to access cluster resources in a SQL Server AlwaysOn environment. If one user
account is used for all SQL Server functions, a Windows login must be enabled for the SQL Server server,
with public and sysadmin permissions enabled.
Every Microsoft SQL Server host can use a specific user account to access the resources of that particular
SQL Server instance.
Procedure
To add an SQL Server host, complete the following steps.
1. In the navigation pane, click Manage Protection > Applications > SQL > Backup.
2. Click Manage Application Servers.
3. Click Add Application Server.
4. Populate the fields in the Application Properties pane:
Host Address
Enter the resolvable IP address or a resolvable path and machine name.
Use existing user
Enable to select a previously entered user name and password for the provider.
UserID
Enter your user name for the provider. The user identity follows the default domain\name format if
the virtual machine is attached to a domain. The format local _administrator is used if the user
is a local administrator.
For Kerberos-based authentication only, the user identity must be specified in the username@FQDN
format. The user name must be able to authenticate using the registered password to obtain a ticket-
granting ticket (TGT) from the key distribution center (KDC) on the domain that is specified by the fully
qualified domain name.
Password
Enter your password for the provider.
Maximum concurrent databases
Set the maximum number of databases to back up concurrently on the server. Server performance is
impacted when backing up a large number of databases concurrently, as each database utilizes
multiple threads and consumes bandwidth when copying data. Use this option to control the impact on
server resources and minimize the impact on production operations.
5. Click Save. IBM Spectrum Protect Plus confirms a network connection, adds the application server to
the IBM Spectrum Protect Plus database, and then catalogs the instance.
If a message appears indicating that the connection is unsuccessful, review your entries. If your
entries are correct and the connection is unsuccessful, contact a system administrator to review the
connections.
What to do next
After you add the SQL Server application server, complete the following action:
Related concepts
“Managing user access” on page 365
By using role-based access control, you can set the resources and permissions available to IBM Spectrum
Protect Plus user accounts.
Related tasks
“Backing up SQL Server data” on page 297
Use a backup job to back up SQL Server environments with snapshots.
“Restoring SQL Server data” on page 301
Use a restore job to restore a Microsoft SQL Server environment from snapshots. After you run IBM
Spectrum Protect Plus Instant Disk Restore jobs, your SQL Server clones can be used immediately. IBM
Spectrum Protect Plus catalogs and tracks all cloned instances.
Procedure
To run an inventory job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > SQL > Backup.
2. In the list of SQL Server instances, select an instance or click the link for the instance to navigate to the
resource that you want. For example, if you want to run an inventory job for an individual database in
the instance, click the instance link and then select a virtual machine.
3. Click Run Inventory.
Procedure
To test the connection, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > SQL > Backup.
2. Click Manage Application Servers.
3. In the list of hosts, click Test in the Actions menu for the host.
Procedure
To define an SQL backup job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > SQL.
2. Select an SQL Server instance to back up.
Use the search function to search for available instances and toggle the displayed instances through
the View filter. The available options are Standalone/Failover Cluster and Always On.
3. Click Select an SLA Policy to add one or more SLA policies that meet your backup data criteria to the
job definition.
4. To create the job definition by using default options, click Save.
What to do next
After you create the backup job definition, complete the following action:
Action How to
Create an SQL Restore job definition. See “Restoring SQL Server data” on page 301.
Related concepts
“Configuring scripts for backup and restore operations” on page 352
Prescripts and postscripts are scripts that can be run before or after backup and restore jobs run at the
job level. Supported scripts include shell scripts for Linux-based machines and batch and PowerShell
scripts for Windows-based machines. Scripts are created locally, uploaded to your environment through
the Script page, and then applied to job definitions.
Related tasks
“Starting jobs on demand” on page 347
You can run any job on demand, even if the job is set to run on a schedule.
Log backups
Archived log files for databases contain committed transaction data. This transaction data can be used to
run a rollforward recovery process as part of a restore operation. Using archive log backups enhances the
recovery point objective for your data. Ensure that log backups are enabled in your backup jobs to allow
rollforward recovery when you restore Microsoft SQL Server data.
When you enable log backups for the first time, you must run a backup job for the SLA policy to activate
log archiving to IBM Spectrum Protect Plus on the database. This backup creates a separate volume on
the vSnap repository, and the volume is mounted persistently on the SQL application server. The volume
remains mounted on the SQL application server unless the Enable Log Backup option is cleared and a
new backup job is run. To enable log backups, follow the instructions in “Backing up SQL Server data” on
page 297.
Review the following criteria before you set up log backup operations:
• To run log backups, the SQL Server agent user must be a local Windows administrator. This user must
have sysadmin permission to manage SQL Server agent jobs. The agent uses that administrator account
to enable and access log backup jobs. For each SQL Server instance, the SQL Server agent user also
must be the user of the SQL Server service and the SQL Server agent service account. This rule is true
for every SQL Server instance to be protected.
• IBM Spectrum Protect Plus does not support log backup operations for Simple recovery models.
• Avoid configuring log backups for a single SQL database by using multiple backup jobs. Logs are
truncated during log backup operations. If a single SQL database is added to multiple job definitions
If this error occurs, change the backup preference of the availability group to Primary. Logs are then
backed up from the primary replica. After a successful log backup of the primary replica is successfully
completed, the backup preference can be changed.
• If a source database is overwritten, all previous transaction logs up to that point are placed in a
condense directory after the original database is restored. When the next run of the SQL Server backup
job is completed, the contents of the condense folder are removed.
Procedure
To define an SQL restore job, complete the following steps:
1. In the navigation pane, click Manage Protection > Applications > SQL > Create job, and then select
Snapshot restore to open the "Snapshot restore" wizard.
Tips:
• You can also open the wizard by clicking Jobs and Operations > Create job > Snapshot restore >
SQL.
• For a running summary of your selections in the wizard, click Preview Restore in the navigation
pane in the wizard.
• The wizard is opened in the default setup mode. To run the wizard in advanced setup mode, select
Advanced Setup. With advanced setup mode, you can set more options for your restore job.
b) Click the plus icon next to the database that you want to use as the source of the restore
operation. You can select more than one database from the list.
The selected sources are added to the restore list next to the database list. To remove an item
from the list source, click the minus icon next to the item.
c) Click Next to continue.
3. On the Source snapshot page, select the type of restore job that you want to create:
On-demand: Snapshot
Runs a one-time restore operation. The restore job starts immediately upon the completion of the
wizard.
On-demand: Point in Time
Runs a one-time restore job from a point-in-time backup of a database. The restore job starts
immediately upon the completion of the wizard.
Recurring
Creates a repeating point-in-time restore job that runs on a schedule.
4. Complete the fields on the Source snapshot page and click Next to continue.
The fields that are shown depend on the number of items that were selected on the Select source
page and on the restore type. Some fields are also not shown until you select a related field.
Fields that are shown for an on-demand snapshot, single resource restore
Option Description
Date range Specify a range of dates to show the available snapshots within that range.
Backup storage All backups in the selected date range are listed in rows that show the time that
type the backup operation occurred and the service level agreement (SLA) policy for
the backup. Select the row that contains the backup time and SLA policy that
you want, and then take one of the following actions:
• Click the backup storage type that you want to restore from. The storage
types that are shown depend on the types that are available in your
environment and are shown in the following order:
Backup
Restores data that is backed up to a vSnap server.
Replication
Restores data that is replicated to a vSnap server.
Object Storage
Restores data that is copied to a cloud service or to a repository server.
Archive
Restores data that is copied to a cloud service archive or to a repository
server archive (tape).
• Click anywhere on the row. The first backup type that is shown sequentially
from the left of the row is selected by default. For example, if the storage
types Backup, Replication, and Archive are shown, Backup is selected by
default.
Fields that are shown for an on-demand snapshot, multiple resources restore; point-in-time
restore; or recurring restore
Option Description
Restore Location Select a type of location from which to restore data:
Type Site
The site to which snapshots were backed up. The site is defined in the
System Configuration > Site pane.
Cloud service
The cloud service to which snapshots were copied. The cloud service is
defined in the System Configuration > Backup Storage > Object Storage
pane.
Repository server
The repository server to which snapshots were copied. The repository
server is defined in the System Configuration > Backup Storage >
Repository Server pane.
Cloud service archive
The cloud archive service to which snapshots were copied. The cloud
service is defined in the System Configuration > Backup Storage > Object
Storage pane.
Repository server archive
The repository server to which snapshots were copied to tape. The
repository server is defined in the System Configuration > Backup Storage
> Repository Server pane.
Select a location If you are restoring data from a site, select one of the following restore
locations:
Demo
The demonstration site from which to restore snapshots.
Primary
The primary site from which to restore snapshots.
Secondary
The secondary site from which to restore snapshots.
If you are restoring data from a cloud or repository server, select a server from
the Select a location menu.
Date selector For on-demand restore operations, specify a range of dates to show the
available snapshots within that range.
Restore Point For on-demand restore operations, select a snapshot from the list of available
snapshots in the selected date range.
5. On the Restore method page, set the restore job to run in test, production, or instant access mode by
default.
For test or production mode, you can optionally enter a new name for the restored database.
For production mode, you can also specify a new folder for the restored database by expanding the
database and entering a new folder name.
Click Next to continue.
After the job is created, you can run it in test, production, or instant access mode in the Job Sessions
pane.
6. On the Set destination page, specify where you want to restore the database and click Next.
Restore to original instance
Select this option to restore the database to the original instance.
Restore to primary instance
For restore operations in an SQL Always On environment, select this option to restore the
database to the primary instance of the Always On Availability Group. The database is added back
to the group.
Restore to alternate instance
Select this option to restore the database to a local destination that is different from the original
instance, and then select the alternative location from the list of available servers.
For restore operations in an SQL Always On environment in test mode, the source availability
database is restored to the selected target instance.
For restore operations in an SQL Always On environment in production mode, the restored
database is added to the target availability group if the destination instance is a primary replica. If
the destination instance is a secondary replica of the target availability group, the database is
restored to the secondary replica and left in restoring state.
If the automatic seeding option is enabled for the destination availability group, the secondary
database file paths are synchronized with the primary database. If the primary database log is not
truncated, the secondary database can be added to the availability group by SQL.
7. On the Job options page, configure additional options for the restore job and click Next to continue.
Recovery Options
Set the following point-in-time recovery options:
No Recovery
Set the selected database to a RESTORING state. If you are managing transaction log
backups without using IBM Spectrum Protect Plus, you can manually restore log files, and
add the database to an availability group, assuming that the LSN of the secondary and
primary database copies meets the criteria.
Restriction: The No Recovery option does not support production mode restore operations
to SQL Always On groups.
Results
An on-demand job begins after you click Submit, and the onDemandRestore record is added to the Job
Sessions pane shortly. To view progress of the restore operation, expand the job. You can also download
Multitenancy is supported
Kubernetes Backup Support manages backup and restore operations by using Kubernetes custom
resources. All backup and restore objects belong to a Kubernetes namespace. The Kubernetes
administrator can restrict access to these objects. With controlled access, multiple users can run backup
and restore requests in the same Kubernetes cluster. The backup and restore objects inherit a
namespace from the PVC that identifies the persistent volume for backup and restore operations. For
more information about multitenancy, see “Security features in Kubernetes Backup Support” on page
313.
Backup types
The following types of backup operations are available:
Snapshot backup
Creates a backup of the persistent volume by using Container Storage Interface (CSI) storage plug-in
snapshot capabilities. The snapshot is stored in a location that is assigned by a Kubernetes snapshot
class as defined by the backup administrator. Typically, this location is the same storage site as the
persistent volume that is being backed up. The snapshot class must be compatible with the storage
class of the persistent volume. In other words, the snapshot class and storage class are defined and
provided by the same CSI storage plug-in.
Snapshot backups are created by scheduled backup requests and on-demand backup requests. On-
demand backup requests are available only on volumes that are already protected by scheduled
backups.
During scheduled backups, snapshot and copy backups are created at intervals that are defined by a
service level agreement (SLA) policy. During an on-demand backup request, a snapshot is taken
immediately but no copy backup is created.
Copy backup
Copies the full persistent volume to an IBM Spectrum Protect Plus vSnap server. Based on predefined
SLA policies, IBM Spectrum Protect Plus offers longer retention of copy backups compared to
snapshot backups.
During scheduled backups, snapshot and copy backups are created at intervals that are defined by
the SLA policy.
Restriction: You cannot create copy backups of raw volumes because unformatted volumes cannot
be mounted to the data mover container for copy backup operations.
Restore types
The following types of restore operations are available:
Snapshot restore
Restores a snapshot to a new persistent volume. This type of operation is suitable for rapidly restoring
recent snapshot backups.
Copy backup restore
Restores a copy backup to the original persistent volume or to a new persistent volume. If you want to
restore a copy backup to the original persistent volume, the container to which the persistent volume
is attached must not be running.
SLA policies
Service level agreement (SLA) policies define how often snapshot backup and copy backup operations are
run, and how long snapshots and copy backups are retained.
The following predefined service level agreement (SLA) policies are available to help you protect your
persistent volumes:
SLA policies are predefined and cannot be modified. You can associate only one SLA with a volume. The
SLA is assigned to a volume in the scheduled backup definition.
When snapshots expire, they are deleted automatically in the Kubernetes environment. When copy
backups expire, they are marked for expiration on IBM Spectrum Protect Plus and are deleted by IBM
Spectrum Protect Plus maintenance jobs.
The SLA policies are available in the ConfigMap object that is named baas-sla in the baas namespace.
To view this baas-sla ConfigMap, issue the following command:
Restriction: In a production environment, do not schedule backups with the test SLA policy. Backups
with the test SLA in a production environment are not supported. The test SLA is provided as a means
for you to test your setup for Kubernetes Backup Support. Use the test SLA only to schedule backup jobs
of small sample volumes for testing purposes. Entries are added to the log to indicate that the backups
were created for testing. After you validate that the scheduled backup jobs ran correctly and you can
successfully create snapshot and copy backups in IBM Spectrum Protect Plus, discontinue using the
test SLA.
User roles
Depending on their role, enterprise developers and backup administrators interact with different user
interfaces to protect persistent data in containers.
Enterprise developer
The enterprise developer uses the Kubernetes command-line tool (kubectl) to complete the following
tasks independent of the backup administrator:
• Initiates self-service backup and restore requests
• Selects a service level agreement (SLA) policy to use in backup requests to protect their volumes
• Views the status of backup and restore requests
• Queries information about snapshot and copy backups
• Pauses and resumes scheduled backups operations
• Removes obsolete scheduled backup requests and on-demand snapshot requests
Running a request
To initiate a request, create a YAML configuration file that specifies the request type and provide the
required parameters. Then, submit the request by running the kubectl create command.
The following sample file (baas-req.yaml) shows the general format of a YAML file:
#------------------------
# Filename: baas-req.yaml
#------------------------
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: request_name
namespace: namespace
spec:
where:
request_name
The name of the request. For scheduled backup, pause, and resume requests, the name of the
request must match the PVC name.
namespace
The namespace in which the persistent volume exists. If you do not specify a namespace, the default
namespace is used.
request_type
The type of request. For the list of available request types, see “Types of requests in Kubernetes
Backup Support” on page 312.
test | daily | weekly | monthly
A predefined service level agreement (SLA) policy that you can assign to the request. For pause and
resume requests, this key is ignored. For more information, see “SLA policies” on page 311.
To start the request that is specified in the baas-req.yaml sample file, enter the following command on
the command line:
• To display the status of all Kubernetes Backup Support requests in the specified namespace, enter the
following command:
where request_name is the name of the request, and namespace is the namespace in which the
persistent volume exists.
Multitenancy
Multitenancy is supported in Kubernetes Backup Support, which relies extensively on the authentication
and authorization that is provided by the Kubernetes cluster for namespaces. Because the authorization
is related to a namespace, any user who is authorized to create a BaaSReq object in that namespace can
request a backup or restore for any PVC that is associated with that namespace. A BaaSReq object is a
custom Kubernetes resource that is used in Kubernetes Backup Support requests.
Snapshots are protected by the Container Storage Interface (CSI) to restrict access to the namespace of
the original PVC. Kubernetes Backup Support associates the namespace with the backup copies that are
stored in IBM Spectrum Protect Plus, and the backup copies must be restored to volumes in the same
namespace.
Code signing
The cluster administrator can verify that the Kubernetes Backup Support installation package has not
been modified since it was generated by IBM. This process is accomplished by verifying the signature file
that is included with the installation package against the appropriate signature and certificates. The
verification process is described in the installation documentation.
For more information, see “Installing and deploying Kubernetes Backup Support images” on page 317.
- --feature-gates=VolumeSnapshotDataSource=true
Important: Ensure that you edit the YAML files directly and do not create backup copies of these files
in the same directory. The presence of the backup copies in the /etc/kubernetes/manifests
directory might negate the changes that you made to enable the VolumeSnapshotDataSource
feature gate.
You might have to wait a minute or two for the changes to be detected by Kubernetes.
3. Verify whether the feature is enabled by issuing the following commands:
The output for one of these commands is similar to the following example:
root 13121 7.4 2.5 518276 305424 ? Ssl Sep06 120:37 kube-apiserver --
authorization-mode=Node,RBAC --advertise-address=192.0.2.0
--allow-privileged=true --client-ca-file=/etc/kubernetes/pki/ca.crt --enable-admission-
plugins=NodeRestriction --enable-bootstrap-token-auth=true
--etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt --etcd-certfile=/etc/kubernetes/pki/apiserver-
etcd-client.crt --etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key
--etcd-servers=https://127.0.0.1:2379 --insecure-port=0 --kubelet-client-certificate=/etc/
kubernetes/pki/apiserver-kubelet-client.crt
--kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key --kubelet-preferred-
address-types=InternalIP,ExternalIP,Hostname
2. Verify that the metrics server is returning data for all nodes by issuing the following command:
{"kind":"NodeMetricsList","apiVersion":"metrics.k8s.io/v1beta1","metadata":{"selfLink":"/
apis/metrics.k8s.io/v1beta1/nodes"},"items":[{"metadata":
{"name":"cirrus12","selfLink":"/apis/metrics.k8s.io/v1beta1/nodes/cirrus12",
"creationTimestamp":"2019-08-08T23:59:49Z"},"timestamp":"2019-08-08T23:59:08Z",
"window":"30s","usage":{"cpu":"1738876098n","memory":"8406880Ki"}}]}
Tip: The command might fail with empty output for the "items" key. This error is likely caused by
installing the metrics server with a self-signed certificate. To resolve this issue, install the metrics
server with a correctly signed certificate that is recognized by the cluster.
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
Procedure
Complete the following steps on the command line in the Kubernetes environment:
1. Log in to the operating system on the master node of the Kubernetes cluster that is used as the
installation node.
2. Unpack the installation package (installer-10.1.5.tar.gz) by entering the following command:
cd installer
4. Run the following two commands to obtain the Classless Inter-Domain Routing (CIDR) method for the
cluster and the IP address and port for the cluster API server. The values are used in Step “5” on page
318.
--cluster-cidr=xxx.yyy.0.0/zz
198.51.0.0/24
b) Obtain the IP address and server port for the cluster API server by issuing the following command:
The result is a URL that is composed of an IP address and port number, as shown in the following
example:
https://192.0.2.0:6443
where 192.0.2.0 is the cluster API server IP address and 6443 is the port address.
5. Edit the baas_config.cfg file with a text editor and modify the configuration parameters by
providing the appropriate values for your environment. Enclose the values in quotation marks, as
shown in the following example.
BAAS_ADMIN="sppadmin"
For parameters that contain a list of values, provide the list of values in a comma-separated format
that is enclosed in quotation marks, as shown in the following example:
SPP_VSNAP_IP_ADDRESSES="192.0.2.0,192.0.2.1"
The following table contains the parameters that you must modify:
CLUSTER_CIDR The CIDR for the cluster. Enter the CDIR that was
obtained in Step “4.a” on page 318.
CLUSTER_API_SERVER_IP_ADDRESS The IP address for the cluster API server. Enter
the IP address that was obtained in Step “4.b” on
page 318.
CLUSTER_API_SERVER_PORT The port address for the cluster API server. Enter
the port address that was obtained in Step “4.b”
on page 318.
SPP_IP_ADDRESSES The IBM Spectrum Protect Plus server IP
address.
SPP_VSNAP_IP_ADDRESSES The IP address for the IBM Spectrum Protect
Plus vSnap server.
You can obtain this address from the IBM
Spectrum Protect Plus user interface by clicking
System Configuration > Backup Storage > Disk
> Disk Storage. This parameter can contain more
than one IP address. Provide the list of values in a
comma-separated format that is enclosed in
quotation marks, as shown in the following
example:
SPP_VSNAP_IP_ADDRESSES="192.0.2.0,192.0.2.1
"
Restrictions:
• The following parameters and values are reserved for Kubernetes Backup Support. Keep them as is.
PRODUCT_NAMESPACE="baas"
PRODUCT_TARGET_PLATFORM="K8S"
• The SPP_PORT value specifies the port for the Kubernetes Backup Support user interface. Do not
change the default value of 443.
• Kubernetes Backup Support is available only in English in IBM Spectrum Protect Plus Version 10.1.5.
For this reason, do not change the PRODUCT_LOCALIZATION="en_US" setting.
Your specifications are automatically inserted into the ConfigMap (baas-configmap) during the
deployment.
6. Start the installation and deployment by issuing the following command.
./baas_install.sh -i
All container images are in the image registry and are running.
When prompted, enter yes to continue.
A project namespace for the Kubernetes Backup Support deployment called "baas" is created. This
project is created before the images are pushed into the image registry, which is identified by the
namespace.
Depending on your environment, it might take several minutes to load and deploy the package.
7. To verify that the Kubernetes Backup Support components are properly installed, issue the following
command:
./baas_install.sh -s
If the installation fails, the missing components are listed in the MISSING section of the output.
Tip: You can also check the status of the installation with the ./helm status baas command.
Results
When all pods are running, the deployment is completed. To verify that all pods are in the Running state
and no components are missing, issue the following command:
or
If the data mover container is not listed in the output, the data mover container is deployed at run time.
You can show the Kubernetes Backup Support services that are set up by issuing the following command:
The baas-datamover service is deployed at runtime with type NodePort instead of the ClusterIP
range with the TCP protocol.
You can show the Kubernetes Backup Support network policies that are deployed by issuing the following
command:
The network policy for the data mover is deployed at runtime with the pod-selector
app=baas,component=datamover,release=baas.
What to do next
After the deployment is completed, ensure that backup operations run correctly by using the test
service level agreement (SLA) policy to run scheduled backups. For instructions, see “Scheduling backups
of persistent volumes” on page 324.
If you want to update the existing configuration or to upgrade an existing installation of Kubernetes
Backup Support, modify the parameters in the baas_config.cfg file as required for your environment,
and issue the following command:
./baas_install.sh -u
Related concepts
“Troubleshooting Kubernetes Backup Support” on page 377
Procedure
To uninstall Kubernetes Backup Support from the Kubernetes cluster that you are logged in to, complete
the following steps on the command line:
1. Go to the installer directory by issuing the following command:
cd installer
./baas_install.sh -d
5. Optional: To remove all Kubernetes Backup Support images from your Kubernetes environment, issue
the following command:
docker images -a | grep "baas" | awk '{print $3}' | xargs docker rmi -f
Results
The baas_install.sh installation script does not automatically delete the Kubernetes Backup Support
product namespace ("baas") that is specified in the baas_config.cfg file. The customizations that
were applied to the namespace are preserved, so that you can reuse the namespace for the reinstallation
of Kubernetes Backup Support. If you want to delete the namespace, you must do it manually.
What to do next
If you want to fully uninstall Kubernetes Backup Support, see “Completely uninstalling Kubernetes
Backup Support” on page 323.
Procedure
To completely uninstall Kubernetes Backup Support from the cluster that you are logged in to, complete
the following steps on the command line:
1. Destroy all snapshot and copy backups with a destroy request. For instructions, see “Deleting
container backups” on page 336.
2. Delete any persistent volume claims (PVCs) that were used for copy backups.
Tip: You can look for the names of the PVCs that were backed up.
3. Delete the baas custom resource definition (CRD) by issuing the following command:
./baas_install.sh -d
8. Optional: Review the installation and configuration information and revert any prerequisite steps.
9. To remove all Kubernetes Backup Support images from your Kubernetes environment, issue the
following command:
docker images -a | grep "baas" | awk '{print $3}' | xargs docker rmi -f
Procedure
1. Optional: Display a list of PVCs in your namespace by issuing the following command:
From the list of PVCs, identify the PVC that you want to back up.
2. Create a YAML file that defines the request for a scheduled backup. The YAML file must contain the
following properties:
#------------------------
# Filename: filename.yaml
#------------------------
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: request_name
namespace: namespace
spec:
requesttype: Backup
sla: test | daily | weekly | monthly
encryption: no | yes
volumesnapshotclass: snapshot_class_name
where:
filename
The name of the YAML configuration file. The file type is .yaml.
request_name
The name of the backup request, which must match the name of the PVC for the volume that you
want to back up. For example, if you want to set up the backup request for the PVC named
dbvol-01, the name of the request must also be dbvol-01.
Restriction: In a production environment, do not schedule backups with the test SLA policy.
Backups with the test SLA in a production environment are not supported. The test SLA is
provided as a means for you to test your setup for Kubernetes Backup Support. Use the test SLA
only to schedule backup jobs of small sample volumes for testing purposes. Entries are added to
the log to indicate that the backups were created for testing. After you validate that the scheduled
backup jobs ran correctly and you can successfully create snapshot and copy backups in IBM
Spectrum Protect Plus, discontinue using the test SLA.
If you want to change the values for the sla or other parameters in the YAML file and apply it to
the same PVC, see Modifying parameters in a YAML file.
encryption: no | yes
Specify whether to encrypt the copy backup data that is stored on IBM Spectrum Protect Plus. For
encryption to occur, the IBM Spectrum Protect Plus vSnap server must be enabled for encryption.
For more information, see “Encryption of data at rest” on page 314.
Specify one of the following values:
no
Do not encrypt the copy backup data on IBM Spectrum Protect Plus. This value is the default.
yes
Encrypt the copy backup data on IBM Spectrum Protect Plus. If you specified yes but the
vSnap server is not set up for encryption, the data is not encrypted and no error is indicated.
snapshot_class_name
The snapshot class for the snapshot backups. If you do not specify the snapshot class, the default
snapshot class is used if the snapshotter in the default snapshot class matches the provisioner of
the volume. Otherwise, the backup request is invalid.
3. Start the backup schedule by applying the backup request. Enter the following command on the
command line:
Results
After you submit the backup request, the first scheduled backup operation will start within the window
that is defined by the SLA policy. The time of the backup is recorded in the backup status.
Kubernetes Backup Support takes ownership of all snapshots, regardless of how they were created.
where request_name is the name of the backup request, which must match the name of the PVC that
was backed up.
In the command output, ensure that the Backupstatus field is shown as follows:
Backupstatus: Destroyed
3. Delete the original scheduled backup request with the following command:
where request_name is the name of the backup request, which must match the name of the PVC that
was backed up.
4. Update the parameters in the YAML file.
5. Create a new scheduled backup with the updated YAML file:
Related concepts
“Backup and restore types” on page 310
Kubernetes Backup Support provides multiple types of backup and restore functions. Backup and restore
operations are initiated by Kubernetes requests for services.
“SLA policies” on page 311
Service level agreement (SLA) policies define how often snapshot backup and copy backup operations are
run, and how long snapshots and copy backups are retained.
“Kubernetes Backup Support requests” on page 312
To protect your container data, you submit Kubernetes Backup Support requests in the Kubernetes
environment.
“Troubleshooting Kubernetes Backup Support” on page 377
Procedure
1. Optional: Display a list of PVCs in your namespace by issuing the following command:
From the list of PVCs, identify the PVC that you want to back up.
2. Create a YAML file that defines the request for an on-demand backup operation. The YAML file must
contain the following properties:
#------------------------
# Filename: filename.yaml
#------------------------
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: name_of_request
namespace: namespace
spec:
requesttype: OnDemandBackup
pvcname: pvc_name
where:
filename
The name of the YAML configuration file. The file type is .yaml.
name_of_request
The name of the on-demand backup request. The name must be unique, and must not match the
name of the PVC.
A new on-demand backup request must be created for each subsequent on-demand backup of the
same PVC. In other words, if you want to create a second on-demand backup of a PVC, create a
new request and specify a different request name (name_of_request) in the YAML file.
namespace
The namespace in which the PVC exists.
Results
Kubernetes Backup Support takes ownership of all snapshots, regardless of how they were created.
Snapshots are retained according to the retention period that is specified by the service level agreement
(SLA) policy that is associated with the volume. When a snapshot is expired based on the SLA policy of the
PVC, the snapshot is deleted. The request for the on-demand backup job is updated to show that the
snapshot has expired, as shown by the Backupstatus field.
To view information about the backup, issue the kubectl describe command by using the request
name or the PVC name. For more information, see “Viewing the status of backup and restore jobs” on
page 331.
Related concepts
“Backup and restore types” on page 310
Kubernetes Backup Support provides multiple types of backup and restore functions. Backup and restore
operations are initiated by Kubernetes requests for services.
“Kubernetes Backup Support requests” on page 312
To protect your container data, you submit Kubernetes Backup Support requests in the Kubernetes
environment.
“Troubleshooting Kubernetes Backup Support” on page 377
To help troubleshoot issues with Kubernetes Backup Support, you can collect debug log files and view
trace logs. You can also follow procedures to diagnose problems.
Procedure
1. To show the restore points that are available for a PVC, query all the backups for the PVC by running
the following command:
2. In the status output that is displayed, identify the time stamp of the source snapshot or copy backup
that you want to restore. The time stamps are shown in the Status section of the output before the
type of backup.
For example, the following output shows the time stamps for different types of backups:
Status:
Timestamp: 2019-05-30 13:27:21
Type: FAST
Timestamp: 2019-05-30 13:32:21
Type: COPY
Timestamp: 2019-06-11 18:59:46
Type: FAST-ONDEMAND
where:
FAST
Denotes the backup type for a snapshot backup that is taken during a scheduled backup operation.
COPY
Denotes the backup type for a copy backup that is stored on an IBM Spectrum Protect Plus vSnap
server.
FAST-ONDEMAND
Denotes the backup type for an on-demand snapshot backup.
3. Create a YAML file for the restore request that contains the following properties. Insert the time stamp
for the source snapshot in the restorepoint parameter.
#------------------------
# Filename: filename.yaml
#------------------------
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: name_of_restore_request
namespace: namespace
spec:
requesttype: restore
pvcname: pvc_name
targetvolume: target_volume_for_restore
storageclass: storage_class_of_target_volume
restorepoint: timestamp_of_backup
restoretype: fast | copy | fast-ondemand
where:
Related concepts
“Backup and restore types” on page 310
Kubernetes Backup Support provides multiple types of backup and restore functions. Backup and restore
operations are initiated by Kubernetes requests for services.
“Kubernetes Backup Support requests” on page 312
To protect your container data, you submit Kubernetes Backup Support requests in the Kubernetes
environment.
“Troubleshooting Kubernetes Backup Support” on page 377
To help troubleshoot issues with Kubernetes Backup Support, you can collect debug log files and view
trace logs. You can also follow procedures to diagnose problems.
Related tasks
“Viewing the status of backup and restore jobs” on page 331
After you submit a backup or restore request, you can use the kubectl get and the kubectl
describe commands to show information about your request.
Procedure
1. To show a listing of all Kubernetes Backup Support requests in a namespace, issue the kubectl get
command as follows:
For example, to show all requests in the production-01 namespace, issue the following command:
2. Using the results from Step “1” on page 331, issue the kubectl describe command as follows:
• To show the list of all backups for any request, including backups from scheduled and on-demand
backup requests, specify the name of the request and the namespace in the following command:
Name: db-vol08
Namespace: production-01
Labels: <none>
Annotations: kubectl.kubernetes.io/last-applied-configuration:
{"apiVersion":"baas.io/v1alpha1","kind":"BaaSReq","metadata":{"annotations":{},"name":"db-
vol08","namespace":"production-01"},"spec":{"requesttyp...
API Version: baas.io/v1alpha1
Backupstatus: Ready
Kind: BaaSReq
Metadata:
Creation Timestamp: 2019-05-23T20:17:21Z
Generation: 3286
Resource Version: 5105242
Self Link: /apis/baas.io/v1alpha1/namespaces/baas/baasreqs/db-vol08
UID: c55be870-7d97-11e9-8d52-005056bd89a3
Spec:
Inprogress: None
Instanceid: bmjqe7tec8ma43hm9cv0
Origreqtype: backup
Requesttype: Backup
Spppvcname: production-01:db-vol08
Sla: test
Status:
Timestamp: 2019-05-30 13:27:21
Type: FAST
Timestamp: 2019-05-30 13:32:21
Type: COPY
Timestamp: 2019-06-11 18:59:46
Type: FAST-ONDEMAND
Volumename: db-vol08
Events: <none>
• To show the status of an on-demand backup job, specify the following command:
{"apiVersion":"baas.io/v1alpha1","kind":"BaaSReq","metadata":{"annotations":
{},"name":"vol08-
adhoc","namespace":"production-01"},"spec":{"pvcname"...
API Version: baas.io/v1alpha1
Backupstatus: Ready
Kind: BaaSReq
Metadata:
Creation Timestamp: 2019-06-11T18:59:46Z
Generation: 5
Resource Version: 5105243
Self Link: /apis/baas.io/v1alpha1/namespaces/baas/baasreqs/vol08-adhoc
UID: 144a1390-8c7b-11e9-8d52-005056bd89a3
Spec:
Inprogress: None
Instanceid: bmjqe7tec8ma43hm9cv0
Origreqtype: ondemandbackup
Pvcname: db-vol08
Requesttype: OnDemandBackup
Spppvcname: production-01:db-vol08
Status:
Timestamp: 2019-06-11 18:59:46
Type: FAST-ONDEMAND
Volumename: db-vol08
Events: <none>
where request_name is the request name of the restore job and namespace is the namespace.
Results
In the command output, the Backupstatus field shows the status of a backup job. For restore jobs, the
Restorestatus field shows the status of the job. For more information, see “Status of backup and
restore jobs” on page 333.
The instanceid field contains a randomly generated string that uniquely identifies a volume in IBM
Spectrum Protect Plus.
The Spppvcname field shows the name of the PVC that is reported in the IBM Spectrum Protect Plus Jobs
and Operations window. The namespace:pvc_name format is used to identify the PVC. The values for the
instanceid and Spppvcname fields uniquely identify a backup in IBM Spectrum Protect Plus.
In backup requests, the Status section shows the list of backups that were completed. For each backup,
the time stamp of the backup is listed, followed by the type of backup that was run. The types of backups
are defined as follows:
FAST
Denotes the backup type for a snapshot backup that is taken during a scheduled backup operation.
COPY
Denotes the backup type for a copy backup that is stored on an IBM Spectrum Protect Plus vSnap
server.
FAST-ONDEMAND
Denotes the backup type for an on-demand snapshot backup.
Procedure
1. Create a YAML file that contains the following properties:
#------------------------
# Filename: filename.yaml
#------------------------
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: request_name
namespace: namespace
spec:
requesttype: Pause
where:
request_name
The name of the backup request, which must match the name of the PVC for the volume that is
being backed up.
namespace
The namespace in which the PVC exists.
2. Submit the pause request by issuing the following command:
After you submit the pause request, no further backup jobs are run for the PVC until you resume the
schedule. Any existing snapshots and copy backups will expire according to the SLA that is associated
with the PVC.
Related tasks
“Pausing scheduled backups” on page 335
You can pause a backup schedule for a container when you do not want scheduled backup jobs to run. For
example, you might want to pause a backup schedule to perform maintenance tasks on a container or to
restart the container.
Related information
“Types of requests in Kubernetes Backup Support” on page 312
Procedure
1. Create a YAML file that contains the following properties.
#------------------------
# Filename: filename.yaml
#------------------------
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: request_name
namespace: namespace
spec:
requesttype: Resume
where:
request_name
The name of the backup request, which must match the name of the PVC for the volume that is
being backed up.
namespace
The namespace in which the PVC exists.
2. Submit the resume request by issuing the following command:
After you submit the request, the scheduled backup operations will resume within the window that is
defined by the SLA policy.
Related tasks
“Pausing scheduled backups” on page 335
You can pause a backup schedule for a container when you do not want scheduled backup jobs to run. For
example, you might want to pause a backup schedule to perform maintenance tasks on a container or to
restart the container.
Related information
“Types of requests in Kubernetes Backup Support” on page 312
Procedure
1. Create a YAML file for the destroy request that contains the following properties:
#------------------------
# Filename: filename.yaml
#------------------------
apiVersion: "baas.io/v1alpha1"
kind: BaaSReq
metadata:
name: request_name
namespace: namespace
spec:
requesttype: Destroy
where:
filename
The name of the YAML configuration file.
request_name
The name of the request, which must match the name of the PVC that was backed up. For
example, if you want to delete all snapshots and copy backups for the PVC named db-vol01, the
name of the request must also be db-vol01.
namespace
The namespace in which the PVC exists.
2. Submit the destroy request by entering the following command on the command line:
where request_name is the name of the PVC that was backed up.
In the command output, the following status shows that the backups were deleted:
Backupstatus: Destroyed
What to do next
As a best practice, delete the completed request by issuing the following command:
where request_name is the name of the PVC that was backed up.
Deleting completed requests has the following benefits:
• It reduces the size of the etcd database and allows you to reuse the name of a request for another
operation.
• It makes troubleshooting easier.
• It makes it easier for you to track backup and restore requests that are running in your Kubernetes
cluster.
• At any point in time, you have a clear picture of requests that are running in on your cluster when you
issue the following command:
If you delete the backup request without first destroying the backup, the backup request will continue to
run and backups will be made according to specified SLA policy until Kubernetes Backup Support is
restarted or the baas-etcd-client pod is restarted.
If you accidentally deleted the backup request without destroying the backup first, you must complete
the following actions:
1. Manually restart the baas-etcd-client pod.
2. Manually delete the volume snapshots for the volume.
Related information
“Types of requests in Kubernetes Backup Support” on page 312
kubernetesvol_internalID_namespace:pvcname
where:
internalID
A random string generated by Kubernetes Backup Support that uniquely identifies a volume.
namespace
The namespace in which a PVC exists.
pvcname
The name of PVC that is being protected.
Procedure
1. In the IBM Spectrum Protect Plus navigation pane, click Jobs and Operations.
2. Click the appropriate tab:
• To show the backup and restore jobs that are running, click Running Jobs.
• To show the jobs that ran successfully, completed processing with warnings, or jobs that failed,
click Job History. You can download a job log from the page by selecting the job and clicking
Download.zip.
• To view the status of scheduled jobs, click Schedule.
Related concepts
“Managing jobs and operations” on page 345
Procedure
1. In the IBM Spectrum Protect Plus navigation pane, click Reports and Logs.
2. Expand the Protection list and take one of the following actions:
• To create a new report, click Container Persistent Volume Backup History.
• To run a report that you saved previously, expand the Container Persistent Volume Backup
History list and click the name of a saved report.
3. In the Options section, take one of the following actions:
• To run the report immediately with the default parameters or the parameters of a saved report,
click Run.
• To customize a new report, update the parameters in the Options section and click Run. You can
also provide a name and description and save the definitions for future use.
• To change the definitions of a saved report, update the parameters in the Options section and click
Save. Then, click Run.
The backup history report is displayed in the Container Persistent Volume Backup History section of
the window. To download the report, click Download.
4. Optional: To schedule the report and send it to a recipient, select Define Schedule.
a) In the Frequency field, specify how often to run the report.
b) In the Start Time field, specify the date and time for when to start running the report.
c) In the email recipient field, enter at least one email address and click Add a recipient. The email
address must be a valid address.
d) Click Save.
Results
The backup history report is shown in the Container Persistent Volume Backup History section of the
window. The descriptions of the reported data are shown in the following table:
instancename_internalID_namespace:pvcname
Protection Time The date and time when each backup job was
completed.
Status The status of each backup. If a backup job failed, a
possible reason is provided.
Snapshot Backup? An indication of whether the backup instance is a
snapshot backup. A check mark is displayed in the
column to indicate that the instance is a snapshot
backup. When a check mark is displayed, no data is
shown in the Backup Size and Bacukp Speed
columns.
Backup Size For copy backups, the amount of data that was
backed up to the vSnap server. For snapshot
backups that were created in the Kubernetes
environment or for backups that failed, no size is
shown.
Backup Speed The rate at which a copy backup was completed.
For snapshot backups or backups that failed, no
data is shown.
Related concepts
“Managing reports and logs” on page 355
IBM Spectrum Protect Plus provides a number of predefined reports that you can customize to meet your
reporting requirements. A log of actions that users complete in IBM Spectrum Protect Plus is also
provided.
Procedure
To back up IBM Spectrum Protect Plus data:
1. In the navigation pane, click Manage Protection > IBM Spectrum Protect Plus > Backup.
2. Select an SLA policy to associate with the IBM Spectrum Protect Plus catalog backup operation.
3. Click Save to create the job definition.
Results
The job runs as defined by the SLA policies that you selected, or you can manually run the job by clicking
Jobs and Operations > Schedule. Then, select the job in the Schedule tab and click Actions > Start. For
instructions, see “Start a backup job” on page 99.
Procedure
To restore IBM Spectrum Protect Plus data:
1. In the navigation pane, click Manage Protection > IBM Spectrum Protect Plus > Restore.
2. Select a vSnap server, cloud resource, or repository server.
Data can be restored to the same location, or an alternate location in disaster recovery scenarios.
Available snapshots for the server are displayed.
3. Click Restore for the catalog snapshot that you want to restore.
4. Select one of the following restore modes:
Restore the catalog and suspend all scheduled jobs
The catalog is restored and all scheduled jobs are left in a suspended state. No scheduled jobs are
started, which allows for the validation and testing of catalog entries and the creation of new jobs.
Typically, this option is used in DevOps use cases.
Restore the catalog
The catalog is restored and all scheduled jobs continue to run as captured in the catalog backup.
Typically, this option is used in disaster recovery.
5. Click Restore.
6. To run the restore job, in the dialog box, click Yes.
Procedure
To set a job session to expire:
1. In the navigation pane, click Manage Protection > IBM Spectrum Protect Plus > Restore Point
Retention.
2. On the Backup Sessions tab, search for the job session or restore point. Alternatively, on the Virtual
Machines / Databases tab, select either Applications or Hypervisors to search for the desired catalog
Deleting resource metadata from the IBM Spectrum Protect Plus catalog
When you run an inventory job, resources are added to the IBM Spectrum Protect Plus catalog. To release
space in the catalog, you can expire the metadata from the restore points that are associated with the
resources.
Procedure
To expire a resource from the catalog:
1. In the navigation pane, click Manage Protection > IBM Spectrum Protect Plus > Restore Point
Retention.
2. Click the Virtual Machines/Databases tab.
3. Use the filter to search by resource type, and then enter a search string to search for a resource by
name.
For more information about using the search function, see Appendix A, “Search guidelines,” on page
391.
4. Click the search icon .
5. Click the delete icon that is associated with a resource.
6. To confirm the expiration, in the dialog box, click Yes.
Results
The catalog metadata that is associated with the resource is removed from the catalog.
Related concepts
“Job types” on page 345
Jobs are used to run backup, restore, maintenance, inventory, and report operations in IBM Spectrum
Protect Plus.
Job types
Jobs are used to run backup, restore, maintenance, inventory, and report operations in IBM Spectrum
Protect Plus.
Backup and restore jobs are user defined. After you create these jobs, you can modify the jobs at any
time. Maintenance, inventory, and report jobs are predefined and not modifiable. However, you can
modify the schedules of maintenance, inventory, and report jobs.
You can run all jobs on demand, even if they are set to run on a schedule. You can also hold and release
jobs that are set to run on a schedule.
The following job types are available:
Backup
A backup job defines the resources that you want to back up and the service level agreement (SLA)
policy or policies that you want to apply to those resources. Each SLA policy defines when the job
runs. You can run the job by using the schedule that is defined by the SLA policy or you can run the job
on demand.
You can also run backup jobs for a single resource or multiple selected resources that are associated
with an SLA policy rather than backing up all resources that are associated with the policy.
The job name is auto generated and is constructed of the resource type followed by the SLA policy
that is used for the job. For example, a backup job for SQL Server resources that are associated with
the SLA policy Gold is sql_Gold.
Restore
A restore job defines the restore point that you want to restore data from. For example, if you are
restoring hypervisor data, the restore point might be a virtual machine. If you are restoring application
data, the restore point might be a database.
Restore jobs are ran on a schedule or on demand.
For scheduled jobs, the job name is defined by the user who creates the job.
For on-demand jobs, the job name onDemandRestore is auto generated when the job is run.
Maintenance
The maintenance job runs once a day to remove resources and associated objects that are created by
IBM Spectrum Protect Plus when a job that is in a pending state is deleted.
The cleanup procedure reclaims space on storage devices, cleans up the IBM Spectrum Protect Plus
catalog, and removes related snapshots. The maintenance job also removes cataloged data that is
associated with deleted jobs.
The job name is Maintenance
Inventory
An inventory job is run automatically when you add a resource to IBM Spectrum Protect Plus.
However, you can run an inventory job at any time to detect any changes that occurred since the
resource was added.
The inventory job names are Default Application Server Inventory, Default
Hypervisor Inventory, and Default Storage Server Inventory.
Report
A report job runs a scheduled report. The job name is the report name preceded by Report_.
Report names are similar to the following example:
Related concepts
“Protecting hypervisors” on page 151
You must register the hypervisors that you want to protect in IBM Spectrum Protect Plus and then create
jobs to back up and restore the virtual machines and resources that are associated with the hypervisors.
“Protecting applications” on page 189
You must register the database applications that you want to protect in IBM Spectrum Protect Plus and
then create jobs to back up and restore the databases and resources that are associated with the
applications.
Related tasks
“Creating an SLA policy” on page 145
You can create custom SLA policies to define backup frequency, retention, replication, and copy policies
that are specific for your environment.
“Running an ad hoc backup job” on page 351
With an ad hoc backup job, you can select one or more resources that are associated with an SLA policy
and run an on-demand backup operation for those resources.
Concurrent jobs
Jobs that overlap other jobs are referred to as concurrent jobs
To determine whether a job is running or ran concurrently with another job, click Jobs and Operations >
Job History, select a job, and click Concurrent Jobs.
Restriction: Multiple backup jobs cannot back up the same resource at the same time. If multiple jobs
share a resource or resources, the job that processes the resource first will run and any other jobs that
start during the same time period will fail.
Related concepts
“Job types” on page 345
Jobs are used to run backup, restore, maintenance, inventory, and report operations in IBM Spectrum
Protect Plus.
Related tasks
“Creating an SLA policy” on page 145
You can create custom SLA policies to define backup frequency, retention, replication, and copy policies
that are specific for your environment.
Procedure
Complete the following steps to start a job:
1. In the navigation pane, click Jobs and Operations, and click the Schedule tab.
2. Choose the job that you want to run and click Actions > Start.
The job is started and added to the Running Jobs tab.
What to do next
To view the job log for the job, select the job on the Running Jobs tab and click Job Log. To download the
log for the job, click Download.zip.
To view all jobs that are running or ran concurrently with the job, click Concurrent Jobs.
Procedure
To pause and release job schedules, complete the following steps:
1. In the navigation pane, click Jobs and Operations, and click the Schedule tab.
2. Choose the job that you want to pause, and click Actions > Pause Schedule.
3. To resume the job schedule, click Actions > Release Schedule.
Procedure
To edit a job or a job schedule, complete the following steps:
1. In the navigation pane, click Jobs and Operations and then click the Schedule tab.
2. Click the edit or schedule icon.
Option Description
Canceling jobs
You can cancel a job that is running.
Procedure
To cancel a job, complete the following steps:
1. In the navigation pane, click Jobs and Operations and then click the Running Jobs tab.
2. Click the Actions menu that is associated with the job, and then click Cancel.
Deleting jobs
You can delete a restore or report job that has a status of IDLE.
Procedure
To delete a restore or report job, complete the following steps:
1. In the navigation pane, click Jobs and Operations and then click the Schedule tab.
2. Click the delete icon that is associated with the job.
Procedure
Complete the following steps to rerun a partially completed backup operation:
1. In the navigation pane, click Jobs and Operations and then click the Job History tab.
2. Use the search function and filters to find the last instance of the backup job that was partially
completed.
3. Select the job instance and then click Rerun.
If the backup job cannot be rerun, the Rerun option is not available.
Results
All SLA options and any exclusions that are associated with the original job are included in the rerun
operation. Any option or exclusion changes that you applied after the last partial backup operation are
ignored. If the rerun job is completed successfully, the job summary is updated to show success.
Procedure
To run an ad hoc backup job, complete the following steps:
1. In the navigation pane, click Jobs and Operations > Create Job.
2. Select Ad hoc backup to open the backup wizard.
Tips:
• You can also open the wizard from the individual hypervisor or application management pages by
clicking Manage Protection > Hypervisors or Manage Protection > Applications.
b) Click the plus icon next to the resource that you want to add to the job.
To remove a resource from the list, click the minus icon next to the resource.
c) Click Next.
6. On the Review page, review the job settings and then click Submit to create and run the job.
What to do next
To view the status and other information about the job, click Jobs and Operations in the navigation pane
and click the job on the Running Jobs tab.
Uploading a script
Supported scripts include shell scripts for Linux-based machines and batch and PowerShell scripts for
Windows-based machines. Scripts must be created using the associated file format for the operating
system.
Procedure
Complete the following steps to upload a script:
1. In the navigation pane, click System Configuration > Script.
2. In the Scripts section, click Upload Script.
The Upload Script pane is displayed.
3. Click Browse to select a local script to upload.
4. Click Save.
The script is displayed in the Scripts table and can be applied to supported jobs.
What to do next
After you upload the script, complete the following action:
Procedure
Complete the following steps to add a script to a server:
1. In the navigation pane, click System Configuration > Script.
2. In the Script Servers section, click Add Script Server.
The Script Server Properties pane displays.
3. Set the server options.
Host Address
Enter the resolvable IP address or a resolvable path and machine name.
Use existing user
Enable to select a previously entered user name and password for the provider.
Username
Enter your username for the provider. If entering a SQL server, the user identity follows the default
domain\name format if the virtual machine is attached to a domain. The format
local_administrator is used if the user is a local administrator.
Password
Enter your password for the provider.
OS Type
Select the operating system of the application server.
4. Click Save.
Types of reports
You can customize predefined reports to monitor the utilization of backup storage and other aspects of
your system environment.
Reports are based on the data that is collected by the most recent inventory job. You can generate reports
after all cataloging jobs and subsequent database condense jobs are completed. You can run the
following types of reports:
• Backup storage utilization reports
• Protection reports
• System reports
• Virtual machine environment reports
Reports include interactive elements, such as searching for individual values within a report, vertical
scrolling, and column sorting.
Protection reports
IBM Spectrum Protect Plus provides reports that display the protection status of your resources. By
viewing the reports and taking any necessary action, you can help to ensure that your data is protected
through user-defined recovery point objective parameters.
To view protection reports, complete the following steps:
1. In the navigation pane, click Reports and Logs > Reports.
2. Expand Protection in the Reports pane.
The following reports are available:
Protected and Unprotected VMs report
Run the Protected and Unprotected VMs report to view the protection status of your virtual machines.
The report displays the total number of virtual machines added to the IBM Spectrum Protect Plus
inventory before backup jobs are started.
Use the report options to filter by hypervisor type and to select specific hypervisors to display.
To exclude unprotected virtual machines in the report, select Hide Unprotected VMs.
To exclude virtual machines that are not backed up to secondary backup storage, select Show only
the VMs with Object Storage Copy Backups.
The Summary View displays an overview of your virtual machine protection status, including the
number of unprotected and protected virtual machines and the managed capacity of the protected
virtual machines. The managed capacity is the used capacity of a virtual machine. The Detail View
provides further information about the protected and unprotected virtual machines, including names
and location.
Protected and Unprotected Databases report
Run the Protected and Unprotected Databases report to view the protection status of your databases.
The report displays the total number of databases added to the IBM Spectrum Protect Plus inventory
before backup jobs are started.
Use the report options to filter by application type, application server, and application server type to
display.
To exclude databases that are protected through hypervisor-based backup jobs, select Hide
Databases Protected as part of Hypervisor Backup.
To exclude unprotected databases in the report, select Hide Unprotected Databases.
The Summary View displays an overview of your application server protection status, including the
number of unprotected and protected databases, as well as the front end capacity of the protected
databases. The front end capacity is the used capacity of a database. The Detail View provides
further information about the protected and unprotected databases, included their names and
location
System reports
IBM Spectrum Protect Plus provides system reports that display an in-depth view of the status of your
configuration, including storage system information, jobs, and job status.
To view system reports, complete the following steps:
1. In the navigation pane, click Reports and Logs > Reports.
2. Expand System in the Reports pane.
The following reports are available:
Configuration report
Review the configuration of the application servers, hypervisors, and backup storage that is available.
Use the report options to filter the configuration types to display. The report displays the name of the
resource, resource type, associated site, and the SSL connection status.
Job report
Review the available jobs in your configuration. Run this report to view jobs by type, their average
duration, and their successful run percentage. Use the report options to filter the job types to display
and to display jobs that ran successfully over a period of time. The Summary View lists jobs by type
along with the number of times a job session is run, completed, or failed. Job sessions listed as Other
are jobs that are aborted, partially run, are currently running, skipped, or stopped. In the Detail View,
click the plus icon next to an associated job to view further job details such as virtual machines
that are protected by a backup job, the average run time, and the next scheduled run time if the job is
scheduled.
License report
Review the configuration of your IBM Spectrum Protect Plus environment in relation to licensed
features. The following sections and fields display in this report:
Virtual Machine Protection
The Total Number of VMs field displays the total number of virtual machines protected through
hypervisor backup jobs, plus the number of virtual machines hosting application databases
protected through application backup jobs (not hypervisor backup jobs). The Front End Capacity
field displays the used size of these virtual machines.
Physical Machine Protection
The Total Number of Physical Servers field displays the total number of physical application
servers hosting databases that are protected through application backup jobs. The Front End
Capacity field displays the used size of these physical application servers.
Office 365 Protection
The Office 365 Protection field displays the users protected through the Office 365 application
backup job. The Front End Capacity field displays the total used size of the protected users.
Container Persistent Volume Protection
The Container Persistent Volume Protection field displays the protected container persistent
volumes. The Front End Capacity field displays the used size of these protected container
persistent volumes.
Backup Storage Utilization (vSnap)
The Total Number of vSnap Servers field displays the number of vSnap servers that are
configured in IBM Spectrum Protect Plus as a backup destination. The Target Capacity field
displays the total used capacity of the vSnap servers, excluding replica destination volumes.
Related concepts
“Types of reports” on page 355
Procedure
1. In the navigation pane, click Reports and Logs > Reports.
2. Expand VM Environment in the Reports pane.
3. Choose the VM report you want to run from the following list.
VM report type Options
VM Datastores Choose this report to review the VM and storage
usage of datastores in your VM environment. This
report shows the datastore count, capacity, and
free space for each hypervisor. To run this report,
take the following actions:
a. In the Hypervisor Type section, select the
type of hypervisors to include in the report.
The default value is All.
b. In the Hypervisor section, select the
hypervisors to include in the report. The
default value is All.
c. In the Detail View Filter section, select the
threshold of percentage usage to include in
the report. The default value is >80% space
used. If you keep the default value, the report
will include only the hypervisors in which at
least 80% of space is used.
d. Click Show only Orphaned Datastoresto view
datastores that do not have any VMs assigned
to them, or to view VMs that are inaccessible.
e. Proceed to Step 4.
4. Optional: To save the report, enter a Name and a Description, and click Save before you run the
report.
5. Optional: To run the report regularly, click Define Schedule in the Schedule Report section of the
window.
Specify the Frequency of the report, the Start Time, and enter email addresses for recipients of this
report.
6. Click Run to generate the report, which is displayed in the lower part of the window.
Tip: You might have to scroll down to see the report.
7. Optional: Download the report to your computer.
Related concepts
“Types of reports” on page 355
You can customize predefined reports to monitor the utilization of backup storage and other aspects of
your system environment.
Report actions
You can run, save, or schedule reports in IBM Spectrum Protect Plus.
Running a report
You can run IBM Spectrum Protect Plus reports with default parameters or run customized reports with
custom parameters.
Procedure
To run a report, complete the following steps:
1. In the navigation pane, click Reports and Logs > Reports.
2. Expand a report type and select a report to run.
3. Run the report either with custom parameters or default parameters:
• To run the report with custom parameters, set the parameters in the Options section, and click Run.
Parameters are unique to each report.
• To run the report with default parameters, click Run.
What to do next
Review the report in the Reports pane.
Related concepts
“Managing reports and logs” on page 355
Procedure
To create a report, complete the following steps:
1. In the navigation pane, click Reports and Logs > Reports.
2. Select a predefined report.
3. Set your customized parameters.
4. Define the report to run in one of the following circumstances:
• Run on demand.
• Create a schedule to run the report as defined by the parameters of the schedule.
5. Save the report with a customized name.
What to do next
Run the report and review the report in the Reports pane.
Related concepts
“Managing reports and logs” on page 355
IBM Spectrum Protect Plus provides a number of predefined reports that you can customize to meet your
reporting requirements. A log of actions that users complete in IBM Spectrum Protect Plus is also
provided.
Scheduling a report
You can schedule reports in IBM Spectrum Protect Plus to run at specific times.
Procedure
To schedule a report, complete the following steps:
1. In the navigation pane, click Reports and Logs > Reports.
2. Expand a report type and select a report.
3. In the Schedule Report section, click Define Schedule.
4. Define the frequency and start time for the schedule.
5. Enter an address to receive the scheduled report in the email field, and then click Add a recipient.
6. Click Save.
What to do next
After the report runs, the recipient can review the report, which is delivered by email.
Related concepts
“Managing reports and logs” on page 355
Procedure
To collect audit logs:
1. In the navigation pane, click Reports and Logs > Audit Logs.
2. Review a log of actions that were completed in IBM Spectrum Protect Plus. Information includes the
users who completed the actions and descriptions of the actions.
3. To search for the actions of a specific user in IBM Spectrum Protect Plus, enter the user name in the
user search field.
4. Optional: Expand the Filters section to further filter the displayed logs. Enter specific action
descriptions and a date range in which the action was completed.
5. Click the search icon .
6. To download the audit log as a .csv file, click Download, and then select a location to save the file.
Related concepts
“Managing user accounts” on page 373
Before a user can log on to IBM Spectrum Protect Plus and use the available functions, a user account
must be created in IBM Spectrum Protect Plus.
Procedure
To create a resource group, complete the following steps:
1. In the navigation pane, click Accounts > Resource Group.
2. Click Create Resource Group. The Create Resource Group pane displays.
3. Enter a name for the resource group.
4. From the I would like to create a resource group menu, select one of the following options:
Option Actions
New a. Select a resource type from the Choose a resource type
menu.
b. Select resource subtypes, and then click Add Resources.
Resources are added to the Selected Resources view.
From template a. Select a resource group from the Which resource group
would you like to use as a template? list. Resources from
the selected template are added to the Selected
Resources view.
b. You can add resources by using the Choose a resource
type list and its associated lists.
To view available resource types and their usage, see
“Resource types ” on page 367.
If you want to delete resources from the group, click the delete icon that is associated with a
resource or click Delete All to delete all resources.
5. When you are finished adding resources, click Create resource group.
Results
The resource group displays in the resource group table and can be associated with new and existing user
accounts.
What to do next
After you add the resource group, complete the following action:
Resource types
Resource types are selected when resource groups are created and determine the resources that are
available to a user assigned to a group.
The following resource types and subtypes are available:
Procedure
To edit a resource group, complete the following steps:
1. In the navigation pane, click Accounts > Resource Group.
2. Select a resource group and click the options icon for the resource group. Click Modify resources.
3. Revise the resource group name, resources, or both.
Procedure
To delete a resource group, complete the following steps:
1. In the navigation pane, click Accounts > Resource Group.
2. Select a resource group and click the options icon for the resource group. Click Delete resource
group.
3. Click Yes.
Managing roles
Roles define the actions that can be completed for the resources that are defined in a resource group.
While a resource group defines the resources that are available to an account, a role sets the permissions
to interact with the resources.
For example, if a resource group is created that includes backup and restore jobs, the role determines
how a user can interact with the jobs. Permissions can be set to allow a user to create, view, and run the
backup and restore jobs that are defined in a resource group, but not delete them.
Similarly, permissions can be set to create administrator accounts, allowing a user to create and edit
other accounts, set up sites and resources, and interact with all of the available IBM Spectrum Protect
Plus features.
The functionality of a role is dependent on a properly configured resource group. When selecting a
predefined role or configuring a custom role, you must ensure that access to necessary IBM Spectrum
Protect Plus operations, screens, and resources align with the proposed usage of the role.
The following user account roles are available:
Application Admin
The Application Admin role allows users to complete the following actions:
• Register and modify application database resources that are delegated by an administrator.
• Associate application databases to assigned SLA policies.
• Complete backup and restore operations.
• Run and schedule reports to which the user has access.
Access to resources must be granted by an administrator through the Accounts > Resource Groups
pane.
Backup Only
The Backup Only role allows users to complete the following actions:
• Create, view, and run backup operations
• View, create, and edit SLA policies to which the user has access
Access to resources, including specific backup jobs, must be granted by an administrator by clicking
Accounts > Resource Groups.
Restore Only
The Restore Only role allows users to complete the following actions:
• Run, edit, and monitor restore operations.
• View, create, and edit SLA Policies to which the user has access.
Access to resources, including specific restore jobs, must be granted by an administrator through the
Accounts > Resource Groups pane.
Creating a role
Create roles to define the actions that can be completed by the user of an account that is associated with
a resource group. Roles are used to define permissions to interact with the resources that are defined in
the resource group.
Procedure
To create a user role, complete the following steps:
1. In the navigation pane, click Accounts > Role.
2. Click Create Role. The Create Role pane displays.
3. From the I would like to create a role list, select one of the following options:
Option Actions
New Select permissions to apply to the role. By default, none of the
permissions are pre-selected.
From template a. Select a role from the Which role would you like to use as
a template? menu. Permissions that are associated with
the template role are selected by default.
b. Select additional permissions to apply to the role, and
delete permissions that are not required.
To view available permissions and their usage, see
“Permission types ” on page 371.
4. Enter a name for the role, and then click Create Role.
Results
The new role is displayed in the roles table and can be applied to new and existing user accounts.
Editing a role
You can edit a role to change the resources and permissions that are assigned to the role. Updated role
settings take effect when user accounts that are associated with the role log in to IBM Spectrum Protect
Plus.
Procedure
To edit a user role, complete the following steps
1. In the navigation pane, click Accounts > Role.
2. Select a role and click the options icon for the role. Click Modify Role.
3. Revise the role name, permissions, or both.
4. Click Update role.
Procedure
To delete a role, complete the following steps:
1. In the navigation pane, click Accounts > Role.
2. Select a role and click the options icon for the role. Click Delete role.
3. Click Yes.
Procedure
To create an account for an individual user, complete the following steps:
1. In the navigation pane, click Accounts > User.
2. Click Add User. The Add User pane is displayed.
3. Click Select the type of user or group you want to add > Individual new user.
4. Enter a name and password for the user.
5. In the Assign Role section, select one or more roles for the user.
6. In the Permission Groups section, review the permissions and resources that are available to the
user, and then click Continue.
7. In the Add Users - Assign Resources section, assign one or more resource groups to the user, and
then click Add resources.
The resource groups are added to the Selected Resources section.
8. Click Create user.
Results
The user account is displayed in the users table. Select a user from the table to view available roles,
permissions, and resource groups.
Procedure
To create a user account for an LDAP group, complete the following steps:
1. In the navigation pane, click Accounts > User.
2. Click Add User. The Add User pane is displayed.
3. Click Select the type of user or group you want to add > LDAP Group.
4. In the Group Name field of the Select LDAP Group section, specify the LDAP group by taking one of
the following actions:
• Enter the LDAP group name.
• Search for the LDAP group name by entering partial text, an asterisk (*) as a single wildcard
character, or a question mark (?) for pattern matching. To view all LDAP groups, click the View All
button.
• Optionally, a relative distinguished name (RDN) can be provided by filling out the Group RDN field.
5. LDAP Groups are displayed in LDAP Groups table. Select an LDAP Group.
6. In the Assign Role section, select one or more roles for the user.
7. In the Permission Groups section, review the permissions and resources that are available to the
user, and then click Continue.
8. In the Add Users - Assign Resources section, assign one or more resource groups to the user, and
then click Add resources.
The resource groups are added to the Selected Resources section.
9. Click Create user.
Results
The user account is displayed in the users table. Optionally, to view available roles, permissions, and
resource groups, select a user in the users table.
Procedure
Complete the following steps to edit the credentials of a user account:
1. In the navigation pane, click Accounts > User.
2. Select one or more users. If you select multiple users with different roles, you can modify only their
resources and not their roles.
3. Click the options icon to view available options. The options that are shown depend on the
selected user or users.
Modify settings
Edit the user name and password, associated roles, and resource groups.
Modify resources
Edit the associated resource groups.
Procedure
To delete a user account, complete the following steps:
1. In the navigation pane, click Accounts > User.
2. Select a user.
3. Click the options icon , and then click Delete user.
Managing identities
Some features in IBM Spectrum Protect Plus require credentials to access your resources. For example,
IBM Spectrum Protect Plus connects to Oracle servers as the local operating system user that is specified
during registration to complete tasks like cataloging, data protection, and data restore.
User names and passwords for your resources can be added and edited through the Identity pane. Then
when utilizing a feature in IBM Spectrum Protect Plus that requires credentials to access a resource,
select Use existing user, and select an identity from the drop-down menu.
Adding an identity
Add an identity to provide user credentials.
Procedure
To add an identity, complete the following steps:
1. In the navigation pane, click Accounts > Identity.
2. Click Add Identity.
3. Complete the fields in the Identity Properties pane:
Name
Enter a meaningful name to help identify the identity.
Username
Enter the user name that is associated with a resource, such as an SQL or Oracle server.
Password
Enter the password that is associated with a resource.
4. Click Save.
The identity displays in the identities table and can be selected when you are using a feature that
requires credentials to access a resource through the Use existing user option.
Editing an identity
You can revise an identity to change the user name and password used to access an associated resource.
Procedure
To edit an identity, complete the following steps:
1. In the navigation pane, click Accounts > Identity.
2. Click the edit icon that is associated with an identity.
The Identify Properties pane displays.
3. Revise the identity name, user name, and password.
Deleting an identity
You can delete an identity when it becomes obsolete. If an identity is associated with a registered
application server, it must be removed from the application server before it can be deleted. To remove the
association, navigate to the Backup > Manage Application Servers page associated with the application
server type, then edit the settings of the application server.
Procedure
To delete an identity, complete the following steps:
1. In the navigation pane, click Accounts > Identity.
2. Click the delete icon that is associated with an identity.
3. Click Yes to delete the identity.
Procedure
To collect log files for troubleshooting, complete the following steps:
1. Click the user menu, and then click Download System Logs.
The download process may take some time to complete.
2. Open or save the file log zip file, which contains individual log files for different IBM Spectrum Protect
Plus components.
For information about log files, see the protecting applications or protecting hypervisors backup
sections.
What to do next
To troubleshoot issues, complete the following steps:
1. Analyze the log files and take appropriate actions to resolve the issue.
2. If you cannot resolve the issue, submit the log files to IBM Software Support for assistance.
The snapshots are failing. Take one or more of the following actions:
• Verify the Ceph-CSI configuration to ensure that
your containers are running correctly. The CSI
software is required for snapshot backups.
• Ensure that a volume snapshot class is defined
for the PVCs that are being backed up.
• Ensure that the secret is in the correct
namespace (the namespace for the PVC).
• Ensure that the configurations are correct in the
ConfigMap (baas-configmap).
For more information, see “Troubleshooting issues
with snapshot backup jobs” on page 380.
The data mover fails to start. Take one or more of the following actions:
• Ensure that the Ceph RBD volume is mounted.
You can verify whether the Ceph RBD volume is
failing to mount by issuing the kubectl
describe command on the data mover pod.
• In the output of the kubectl describe
command, check the events to ensure that the
volume has been initialized by running the PVC
as part of another pod in read/write mode.
• In the output of the kubectl describe
command, check for authentication failure
events. To resolve authentication errors, ensure
that you are running a secure Docker registry.
Ensure that the pull secret is in the namespace of
the PVC. For instructions, see Pull an Image from
a Private Registry.
The scheduler, transaction manager, and controller Verify that the values for the
pods have started but each pod continues to CLUSTER_API_SERVER_IP_ADDRESS and
restart. In the output of the kubectl describe CLUSTER_API_SERVER_PORT parameters are
command for the transaction manager pod, the correctly specified in the baas_config.cfg
events indicate that the liveness probe failed. configuration file.
If you update the values in the baas_config.cfg
file, issue the following command to update the
configuration:
./baas_install.sh -u
Related tasks
“Collecting Kubernetes Backup Support log files for troubleshooting” on page 385
You can generate debugging log files in the Kubernetes environment to troubleshoot the deployment of
Kubernetes Backup Support and Kubernetes Backup Support operations on the IBM Spectrum Protect
Plus server.
To view the log file for the transaction manager worker, issue the following command:
kubectl logs -f $(kubectl get pods -n baas | awk '/baas-transaction-manager/ {print $1;exit}') -
n baas -c baas-transaction-manager-worker -f
To view the log file for the controller component, issue the following command:
kubectl logs -f $(kubectl get pods -n baas | awk '/baas-controller/ {print $1;exit}') -n baas -f
To view the log file for the scheduler component, issue the following command:
kubectl logs -f $(kubectl get pods -n baas | awk '/baas-scheduler/ {print $1;exit}') -n baas -f
Tip: To help speed up the display of log files, you can add the --since=duration flag to the kubectl
logs command to return only logs that are newer than a relative duration. You can specify the duration in
seconds (Ns), minutes (Nm), or hours (Nh).
For example, to view the log files for the scheduler component that are newer than 3 hours, issue the
following command:
kubectl logs -f $(kubectl get pods -n baas | awk '/baas-scheduler/ {print $1;exit}') -n baas -f
--since=3h
If the scheduler is not sending snapshot requests, investigate and resolve any scheduler issues.
3. If the scheduler is sending the snapshot request, check the baas-transaction-manager container
log in the baas-transaction-manager pod. In the log file, look for the text createsnapshot and
checksnapshot, and see whether the createsnapshot or checksnapshot URL contains the
volume name as well. Search for text that is similar to the following example:
/checksnapshot?requestname=test:test-pvc-415&volumename=test:test-
pvc-415&snapshotname=test:test-pvc-415-1569883237
4. Look for the outputs from the /checksnapshot API call. If you find an exception, review the
exception log to help resolve the issue.
5. If no exceptions are found in Step 3, check the baas-transaction-manager-worker container
logs in the baas-transaction-manager pod. Look for the createSnapshot job that is processing
with the persistent volume claim (PVC) name of the volume that is being backed up. These logs show
multiple running processes. Identify the name of the worker in the log files and follow the logs for the
worker to determine whether there is an exception.
In the following example of the transaction manager worker createsnapshot log,
ForkPoolWorker-28 is the worker:
The deployment does not exist. For more information about the issue, run the
following command:
The data mover might not be created properly.
kubectl describe deploy baas-datamover -n
baas
The data mover registration might be failing in To determine whether the data mover
IBM Spectrum Protect Plus. registration failed, look for the text
Registering DM with port in the logs.
Verify whether an error occurred that is related to
the data mover registration.
If an error exists with the registration, try deleting
the data mover deployment, network policy, and
service to help resolve the issue.
Look for a job the job with the following naming
convention in IBM Spectrum Protect Plus:
kubernetesvol_internalID_namespace:volumena
me
6. Troubleshoot IBM Spectrum Protect Plus issues by taking the following actions:
a. In the IBM Spectrum Protect Plus user interface, verify whether any inventory jobs are hung that
are preventing all other jobs from being recorded in IBM Spectrum Protect Plus.
b. Look for the hung job in the list of running jobs or in the job history. Look for job names with the
following naming convention:
kubernetesvol_internalID_namespace:volumename
where the internalID value is the same as the instanceid value that is generated by Kubernetes
Backup Support. The value of the instanceid is returned in the output of the kubectl describe
command that shows the status of a backup or restore job. For more information, see “Viewing the
status of backup and restore jobs” on page 331.
c. Check the job logs and resolve any reported issues.
If the scheduler is not sending copy backup requests, investigate and resolve the scheduler issues.
3. If the scheduler is sending the snapshot request, check the baas-transaction-manager container
log in the baas-transaction-manager pod. In the log file, look for the text createcopybackup
and checkcopybackup, and see whether the createcopybackup or checkcopybackup URL
contains the volume name as well. Search for text that is similar to the following example:
/checkcopybackup?requestname=test:test-pvc-415&volumename=test:test-
pvc-415©backupname=test:test-pvc-415-1569883237
4. Look for the outputs from the /checkcopybackup API call. If you find an exception, review the
exception log to help resolve the issue.
5. If no exceptions are found in Step 3, check the baas-transaction-manager-worker container
logs in the baas-transaction-manager pod. Look for the createCopyBackup job that is
processing with the PVC name of the volume that is being backed up. These logs show multiple
running processes. Identify the name of the worker in the log files and follow the logs for the worker to
determine whether there is an exception.
In the following example of the transaction manager worker createcopybackup log,
ForkPoolWorker-28 is the worker:
The deployment does not exist. For more information about the issue, get the
data mover name from the error message and run
The data mover might not be created properly.
the following command:
kubernetesvol_internalID_namespace:volumena
me
6. Troubleshoot IBM Spectrum Protect Plus issues by taking the following actions:
a. In the IBM Spectrum Protect Plus user interface, verify whether any inventory jobs are hung that
are preventing all other jobs from being recorded in IBM Spectrum Protect Plus.
b. Look for the hung job in the list of running jobs or in the job history. Look for job names with the
following naming convention:
kubernetesvol_internalID_namespace:volumename
where the internalID value is the same as the instanceid value that is generated by Kubernetes
Backup Support. The value of the instanceid is returned in the output of the kubectl describe
command that shows the status of a backup or restore job. For more information, see “Viewing the
status of backup and restore jobs” on page 331.
c. Check the job logs and resolve any reported issues.
The data mover registration might be failing in To determine whether the data mover
IBM Spectrum Protect Plus. registration failed, look for the text
Registering DM with port in the logs.
Verify whether an error occurred that is related to
the data mover registration.
If an error exists with the registration, try deleting
the data mover deployment, network policy, and
service to help resolve the issue.
Look for a job the job with the following naming
convention in IBM Spectrum Protect Plus:
kubernetesvol_internalID_namespace:volumena
me
5. Troubleshoot IBM Spectrum Protect Plus issues by taking the following actions. Skip this step for fast
restores.
a. In the IBM Spectrum Protect Plus user interface, verify whether any inventory jobs that are hung
are preventing all other jobs from being recorded in IBM Spectrum Protect Plus.
b. Look for the IBM Spectrum Protect Plus job in the list of running jobs or in the job history. Look for
job names that have the following naming convention:
onDemandRestore_timestamp
To verify that the job applies to this specific volume, view the IBM Spectrum Protect Plus job logs
and verify the internalID and dbname values that are associated with the volume’s data.
c. Resolve any issues that are reported in the relevant job logs.
Procedure
Use one of the following methods to collect logs for troubleshooting:
• To collect only Kubernetes logs for debugging purposes, issue the following command:
./baas_install.sh -l
This command collects debugging logs for the Kubernetes Backup Support deployment that is
specified by the parameters in the baas_config.cfg. The current state information and logs of the
Kubernetes Backup Support components in the Kubernetes cluster are collected. The logs are
structured based on the Kubernetes basic logging architecture. For more information, see Basic
logging in Kubernetes.
• To collect the log package that includes the debugging logs for the Kubernetes Backup Support
deployment and IBM Spectrum Protect Plus server, issue the following command:
./baas_install.sh -l -x
What to do next
To troubleshoot issues, complete the following steps:
1. Analyze the log files and take appropriate actions to resolve the issue.
2. If you cannot resolve the issue, submit the log files to IBM Software Support for assistance.
Related tasks
“Setting the trace level of log files” on page 386
You can set the trace level of local log files to help troubleshoot issues that you might encounter in
Kubernetes Backup Support.
Related reference
“Troubleshooting quick reference” on page 377
Solutions to basic Kubernetes Backup Support problems are provided.
“Troubleshooting Kubernetes Backup Support operations” on page 379
Procedure
To set the trace level for the Kubernetes Backup Support transaction manager, controller, and scheduler
log files, complete the following steps in the Kubernetes environment:
1. Log in to the operating system on the master node of the Kubernetes cluster that is used as the
installation node.
2. Go to the directory where the installer-10.1.5.tar.gz installation package was unpacked.
3. Go to the installer directory by issuing the following command:
cd installer
4. Edit the baas_config.cfg file with a text editor and modify the value for the PRODUCT_LOGLEVEL
parameter.
The following trace options are available:
INFO
Display all user messages in the transaction manager, controller, and scheduler log files, including
information, warning, and error messages. This value is the default.
WARNING
Display warning and error messages in the transaction manager, controller, and scheduler log files.
ERROR
Display only error messages in the transaction manager, controller, and scheduler log files.
DEBUG
Display debugging-level messages in the transaction manager, controller, and scheduler log files.
For example, to set the trace level to debugging mode, set the PRODUCT_LOGLEVEL parameter as
follows:
PRODUCT_LOGLEVEL="DEBUG"
5. Update the Kubernetes Backup Support deployment by issuing the following command:
./baas_install.sh -u
./baas_install.sh -s
Tip: Alternatively, verify the status of the update by using the ./helm status baas command.
https://localhost:5601
or
http://your_domain.com:5601
Procedure
To view transaction logs for Kubernetes Backup Support, complete the following steps:
Table 41. Filters for viewing Kubernetes Backup Support trace logs
Type of data to show Filter 1 Filter 2
Transaction manager logs kubernetes.container_image is None
baas-transaction-manager
Controller logs kubernetes.container_image is None
baas-controller
Scheduler logs kubernetes.container_image is None
baas-scheduler
Error messages kubernetes.container_image is log is ERROR
baas-
Debugging messages kubernetes.container_image is log is DEBUG
baas-
Warning
Apr 16, 2019
9:14:37 AM
GTGGH0098
[myserver1.myplace.irl.ibm.com]
Database AC7 will not be backed up as it is ineligible for the backup operation. More
+ - & | ! ( ) { } [ ] ^ " ~ * ? : \
For example, to search for the file string[2].txt, enter the string\[2\].txt.
Overview
The IBM Spectrum Protect family of products includes the following major accessibility features:
• Keyboard-only operation
• Operations that use a screen reader
The IBM Spectrum Protect family of products uses the latest W3C Standard, WAI-ARIA 1.0
(www.w3.org/TR/wai-aria/), to ensure compliance with US Section 508 (www.access-board.gov/
guidelines-and-standards/communications-and-it/about-the-section-508-standards/section-508-
standards) and Web Content Accessibility Guidelines (WCAG) 2.0 (www.w3.org/TR/WCAG20/). To take
advantage of accessibility features, use the latest release of your screen reader and the latest web
browser that is supported by the product.
The product documentation in IBM Knowledge Center is enabled for accessibility. The accessibility
features of IBM Knowledge Center are described in the Accessibility section of the IBM Knowledge Center
help (www.ibm.com/support/knowledgecenter/about/releasenotes.html?view=kc#accessibility).
Keyboard navigation
This product uses standard navigation keys.
Interface information
User interfaces do not have content that flashes 2 - 55 times per second.
Web user interfaces rely on cascading style sheets to render content properly and to provide a usable
experience. The application provides an equivalent way for low-vision users to use system display
settings, including high-contrast mode. You can control font size by using the device or web browser
settings.
Web user interfaces include WAI-ARIA navigational landmarks that you can use to quickly navigate to
functional areas in the application.
Vendor software
The IBM Spectrum Protect product family includes certain vendor software that is not covered under the
IBM license agreement. IBM makes no representation about the accessibility features of these products.
Contact the vendor for accessibility information about its products.
TTY service
800-IBM-3383 (800-426-3383)
(within North America)
For more information about the commitment that IBM has to accessibility, see IBM Accessibility
(www.ibm.com/able).
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual
Property Department in your country or send inquiries, in writing, to:
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs
in any form without payment to IBM, for the purposes of developing, using, marketing or distributing
application programs conforming to the application programming interface for the operating platform for
which the sample programs are written. These examples have not been thoroughly tested under all
conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these
programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be
liable for any damages arising out of your use of the sample programs.
Each copy or any portion of these sample programs or any derivative work must include a copyright notice
as follows: © (your company name) (year). Portions of this code are derived from IBM Corp. Sample
Programs. © Copyright IBM Corp. _enter the year or years_.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe is a registered trademark of Adobe Systems Incorporated in the United States, and/or other
countries.
Linear Tape-Open, LTO, and Ultrium are trademarks of HP, IBM Corp. and Quantum in the U.S. and other
countries.
Intel and Itanium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the
United States and other countries.
Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both.
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in the United States, other
countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or
its affiliates.
UNIX is a registered trademark of The Open Group in the United States and other countries.
VMware, VMware vCenter Server, and VMware vSphere are registered trademarks or trademarks of
VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.
396 Notices
Terms and conditions for product documentation
Permissions for the use of these publications are granted subject to the following terms and conditions.
Applicability
These terms and conditions are in addition to any terms of use for the IBM website.
Personal use
You may reproduce these publications for your personal, noncommercial use provided that all
proprietary notices are preserved. You may not distribute, display or make derivative work of these
publications, or any portion thereof, without the express consent of IBM.
Commercial use
You may reproduce, distribute and display these publications solely within your enterprise provided
that all proprietary notices are preserved. You may not make derivative works of these publications,
or reproduce, distribute or display these publications or any portion thereof outside your enterprise,
without the express consent of IBM.
Rights
Except as expressly granted in this permission, no other permissions, licenses or rights are granted,
either express or implied, to the publications or any information, data, software or other intellectual
property contained therein.
IBM reserves the right to withdraw the permissions granted herein whenever, in its discretion, the use
of the publications is detrimental to its interest or, as determined by IBM, the above instructions are
not being properly followed.
You may not download, export or re-export this information except in full compliance with all
applicable laws and regulations, including all United States export laws and regulations.
IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESE PUBLICATIONS. THE PUBLICATIONS
ARE PROVIDED "AS-IS" AND WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, NON-
INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE.
Notices 397
398 IBM Spectrum Protect Plus: Installation and User's Guide
Glossary
A glossary is available with terms and definitions for the IBM Spectrum Protect family of products.
See the IBM Spectrum Protect glossary.
A backup types
Kubernetes Backup Support 310
Access control Beta program
MongoDB 253 advantages xiii
accessibility features 393 overview xiii
ad hoc jobs
creating 351
Add Db2 partitions 192
C
adding certificate
Hyper-V servers 174 adding 122
identities 375 deleting 122
LDAP server 128 cloud provider
Oracle application servers 284 deleting 117
sites 125 editing 116
SMTP server 129 cloud server
SQL Server application servers 296 adding a Microsoft azure cloud resource 114
vCenter Server instances 151 adding an Amazon S3 111
virtual disks to a vCenter virtual machine 139 adding an IBM Cloud Object Storage resource 112
vSnap servers 73 adding an s3 compatible cloud resource 115
Adding Db2 192 collecting debugging log filesKubernetes Backup Support
Adding MongoDB 254 385
Administrative Console, logging on to 134 completely uninstalling
Advanced backup options 78 Kubernetes Backup Support 323
application server configuring
Db2 189 Kubernetes Backup Support 317
Configuring backup storage
B storage options, adding disks 76
copy backup
backing up Kubernetes Backup Support 324
container data 324 copy restore
Backing up container data 328
Db2 196 creating
backing up container data reports 362
on demand 327 resource groups 366
scheduling 324 roles 370
backup encryption SLA policies 145
Kubernetes Backup Support 324 users
backup jobs individual 373
creating LDAP group 373
Hyper-V 176 VADP proxies 161
IBM Spectrum Protect Plus 341
Oracle 285
SQL Server 297
D
VMware 155 Db2
excluding VMDKs from 159 system requirements 36
rerunning Db2 log backup 201
on demand 351 deleting
starting identities 376
on demand 347 jobs 350
on schedule 145 LDAP server 130
backup policies, See SLA policies resource groups 369
backup storage roles 373
advanced options, managing 78 sites 127
storage options, managing disks 75 SLA demo 149
storage options, managing partners 77 SLA policies 149
backup storage server SMTP server 130
storage options, managing 77 users 375
Index 401
deleting backups I
Kubernetes Backup Support 336
deploying IBM Knowledge Center ix
Kubernetes Backup Support 317 IBM spectrum protect server
deployment log filesKubernetes Backup Support 385 adding a repository server 119
destroying backupsKubernetes Backup Support 336 identities
Detailed process logs adding 375
O365 281 deleting 376
Detecting editing 375
Db2 194 installing
disability 393 download packages, obtaining 58
Kubernetes Backup Support 315, 317
virtual appliance
E on Hyper-V 60
early availability updates, obtaining and applying 109 on VMware 59
editing vSnap servers
identities 375 Hyper-V environment 69
jobs and job schedules 349 physical environment 67
LDAP server 130 VMware environment 68
resource groups 368 iSCSI utilities
roles 372 installing 65
settings 130
sites 126 J
SLA policies 149
SMTP server 130 jobs
users 374 canceling 350
efix 109 concurrent 346
enable tracing creating 346
Kubernetes Backup Support 386 deleting 350
Exchange Server editing 349
system requirements 32 logs, downloading 347
expire job session 342 names of 345
pausing 349
releasing 349
F rerunning 351
fast restore schedules, editing 349
container data 328 starting
fenced network, creating 171 on demand 347
files on schedule 145
restoring 186 types of 345
searching for 391 viewing 347
Finding Db2 194 Jobs and Operations 345
firewalls 64
K
G key
global preferences adding 121, 123
configuring 131 deleting 122, 124
keyboard 393
keys 121
H Knowledge Center ix
Kubernetes Backup Support
Hyper-V
baas requests 312
adding 174
backing up container data 324
backup job, creating 176
backup and restore types 310
installing on virtual appliance 60
backup status 333
restore job, creating 180
cascading actions 315
servers
collecting debugging log files 385
detecting resources for 176
complete uninstall 323
enabling WinRM 175
configuration file 317
testing connection to 176
copy backup 324
virtual appliance
copy restore 328
accessing 137
deleting backups 336
LDAP
group, creating a user account for 373 P
server
pausing scheduled backups
adding 128
Kubernetes Backup Support 335
deleting 130
preferences
settings, editing 130
global
Linux-based vCenter virtual appliance, backing up 160
configuring 131
Log archiving
prerequisites
Db2 201
Db2 189
logs
Kubernetes Backup Support 315
audit
MongoDB 252
downloading 363
Prerequisites
viewing 363
MongoDB 253
system
publications ix
downloading 377
viewing 377
Q
M quick start 89
managing jobs
container backups and restores 331 R
message
RBAC
Index 403
RBAC (continued) scheduling backups
MongoDB 253 Kubernetes Backup Support 324
repair vSnap 83 scripts for backup and restore operations
Replication partners 77 uploading 352, 353
reports security features
custom, creating 362 Kubernetes Backup Support 313
running service level agreement, See SLA policies
on demand 361 service level agreements
on schedule 362 Kubernetes Backup Support 311
running VM 359 Setting Db2
types of SLA options 200
backup storage utilization 355 setting trace levels
protection 356 Kubernetes Backup Support 386
system 358 sites
repository server provider adding 125
deleting 121 deleting 127
editing 121 editing 126
request types throttling 125, 126
Kubernetes Backup Support 312 SLA 198, 217, 260
rerunning SLA options
jobs Db2 200
on demand 351 SLA policies
resource groups adding 145
creating 366 deleting 149
deleting 369 editing 149
editing 368 Kubernetes Backup Support 311, 324
types of 367 SMTP
restore jobs server
creating adding 129
Hyper-V 180 deleting 130
IBM Spectrum Protect Plus 341 settings, editing 130
Oracle 288 snapshot backup
SQL Server 301 containers 327
VMware 164 Kubernetes Backup Support 324
running snapshot retention 342
Hyper-V 180 sponsor user program
Oracle 288 advantages xiii
SQL Server 301 overview xiii
VMware 164 SQL Server
restore points, deleting 343 application servers
restore points, managing 342 adding 296
restore types detecting resources for 297
Kubernetes Backup Support 310 testing connection to 297
Restoring backup job, creating 297
Db2 202, 207, 210 requirements for data protection 295
restoring container data restore job, creating 301
Kubernetes Backup Support 328 system requirements 49
Restoring Db2 SSL certificate, uploading
Alternate instance 210 from administrative console 136
Original instance 207 starting
resuming scheduled backups IBM Spectrum Protect Plus 91
Kubernetes Backup Support 336 jobs
roles on demand 347
creating 370 on schedule 145
deleting 373 system requirements
editing 372 components 11
permission types 371 Db2 36
running reports Exchange Server 32
container backup jobs 338 file index and restore 27
hypervisors 26
Kubernetes Backup Support 55
S MongoDB 39
Schedule jobs Oracle 45
Backup 198, 217, 260 SQL Server 49
Index 405
406 IBM Spectrum Protect Plus: Installation and User's Guide
IBM®
Printed in USA