Information contained in this documentation is provided for informational purposes only. No warranty of any kind, express or implied, is implied. The Impact of Growth is being felt in information infrastructure.
Information contained in this documentation is provided for informational purposes only. No warranty of any kind, express or implied, is implied. The Impact of Growth is being felt in information infrastructure.
Information contained in this documentation is provided for informational purposes only. No warranty of any kind, express or implied, is implied. The Impact of Growth is being felt in information infrastructure.
Compliance and Noncompliance Harley Puckett Storage Consultant Session ID: SAC01 2 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Disclaimers IBM customers are responsible for ensuring their own compliance with legal requirements. It is the customer's sole responsibility to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer's business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. The information contained in this documentation is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information provided, it is provided as is without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this documentation or any other documentation. Nothing contained in this documentation is intended to, nor shall have the effect of, creating any warranties or representations from IBM (or its suppliers or licensors), or altering the terms and conditions of the applicable license agreement governing the use of IBM software. 3 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 The Impact of Growth is Being Felt Replicated data Unstructured data Traditional Structured data Structured data growing at 32% (databases for transactional workloads) Unstructured data growing at 63% (such as user files, medical images, web and rich media content) Replicated data growing at 49% (including backup, archive, business analysis, discovery and business continuance) Sources: IDC worldwide enterprise disk in Exabytes from Changing Enterprise Data Profile, December 2007 25.0 20.0 15.0 10.0 5.0 E x a b y t e s Information Infrastructure is doubling every 18 months 4 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Common Challenges with File System Growth Contributors to Growth New types of digital content (ie. Blogs, video, Images) Richer content results in larger files Ease of creating and sharing digital content Exponential growth in number of files Regulatory requirements Keeping information longer Effects of Growth Out of space conditions Increased management cost and complexity Larger backup and restore windows Longer searches and scans Resizing LUNs impacts file systems Increased power and cooling requirements 5 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Deconstructing the Symptoms of Growth When trying to identify growth factors, it is important to understand that often there is a multiplying effect Data containers can be files, folders, databases, volumes, disk arrays, tape libraries, drives, cartridges Average per container can be bytes, watts, cost, floor space, or hours Number of Containers (35% growth) A v e r a g e
p e r
c o n t a i n e r
( 2 5 %
g r o w t h ) 6 3 %
G r o w t h 6 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 The Two Faces of File Systems Archiving Space Management move old, inactive files to less expensive storage, resulting in reduced backup windows and reduced storage costs File Systems Tivoli Storage Manager (TSM) HSM for Windows and Space Management for Unix and Linux, TSM Archive Client, SSAM Client Data Retention Protect your data for the long term with non- erasable, non-rewriteable storage solutions and demonstrate compliance to regulations 7 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Definition of Backup and Archiving Backup is for recovery from hardware failure and/or recent data corruption Archive is for space management and long term retention Archiving is an intelligent process for managing inactive or infrequently accessed data, that still has value, while providing the ability to preserve, search and retrieve the information during a specified retention period. 8 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Compliant vs. Non-compliant Archive Both Can improve infrastructure performance Database archiving E-mail archiving File archiving Place data on appropriate tier of storage based on business value Non Compliance Archive Performance and space management Non Regulated records retention Long term retention of Data on lower cost storage Compliance Archive with Auditability Data Retention Demonstrate compliance with Regulatory Requirements Data Permanence Implement and enforce retention policies Non-erasable Non-rewriteable storage Data Security Privacy Access controls 9 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 IBM System Storage Archive Manager Overview System Storage Archive Manager (SSAM) Is a special TSM server Is an archive/retrieve only solution Archive: copy data or file from client to preserve for later use Facilitates compliance with regulatory requirements Has special data retention protections Accepts data from TSM client API or the SSAM client SSAM client = Archive only version of TSM B/A client SSAM performs storage management Manages data placement based on policies Manages migration of data within storage hierarchy 10 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 IBM System Storage Archive Manager Overview SSAM is licensed by data capacity rather than number of processors Primary storage pools only System Storage Archive Manager provides archive management for IBMs Data Retention 550 (DR550) TSM support for WORM media, including Network Appliance SnapLock EMC Centera 3592 WORM tape LTO WORM tape 11 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 System Storage Archive Manager (SSAM) client nodes and client software A Client node is a Application server, Workstation, or File server registered with the SSAM server TSM client software is installed on the client node Client software: TSM API client: Archive function calls usable with SSAM Open API that allows business applications to use the server functions Content Manager and FileNet are example API applications TSM Backup/Archive client: Users can archive files for long-term storage, optionally delete, and retrieve them when necessary Supported platforms: http://www-306.ibm.com/software/tivoli/products/storage-mgr/platforms.html 12 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 TSM Policy Management Concepts Domain 2 TSM Server Policy Domain 1 Backup Copy Group Archive Copy Group HSM Policy Policy Domain 2 Backup Copy Group Archive Copy Group HSM Policy Domain 1 Centrally defined polices Centrally defined polices What data? What data? Where to store it? Where to store it? How long to keep it? How long to keep it? File File- -Level granularity Level granularity SSAM only uses the Archive Policy SSAM only uses the Archive Policy DB Disk pools Tape pools Optical pools 13 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Policy Domain A set of policies and a group of nodes managed by those policies as defined by the policy sets. A node (TSM client) may only be defined to one policy domain (per TSM server). Policy Set A collection of Management Class (MC) definitions. A Policy Domain may contain a number of Policy Sets. Only one Policy Set in a domain can be active at any time. Management Class (MC) A collection of management attributes describing backup, archive, and HSM characteristics. A set of attributes is called a copy group, and there is a backup copy group and an archive copy group. They are always named Standard TSM Policies Management Concepts (continued) With SSAM, only archive copy groups are used 14 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 SSAM Storage Management Concept Data is managed as objects by policies Or simply a block of data from an appl. such as Content Manager Files or directories Each object is bound to management class (policy) that defines retention period, initial storage pool, etc. These objects exist in the TSM storage hierarchy on disk or tape in storage pools Objects can be migrated (moved) to another storage pool within the storage hierarchy freeing up storage space on higher performance devices such as disks yielding attractive Total Cost of Ownership (TCO) Objects can (and should) also be copied to copy pools 15 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 SSAM Data Retention Protection SSAM includes the following capabilities Archive object protection Archive object cannot be deleted until retention period is expired Event Based retention policies Allows starting retention period of objects based on an event Deletion Hold / Release Hold overrides retention time countdown Hold & release controlled by API or SSAM/BA client Following operations do not delete objects: Client request to explicitly delete a object API or SSAM/BA client SSAM administrator commands: DELETE FILESPACE DELETE VOLUME DISCARDDATA=YES AUDIT VOLUME FIX=YES Additional Data Retention Protection: Decreasing retention time of archived objects is not possible Deleting retention policies (management classes) is not possible 16 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Data Retention Protection Disallows explicit data deletion, prior to the retention criteria, through TSM interfaces TSM API e.g. dsmDeleteObj TSM Administration e.g. DELETE FILESPACE Leverages Archive Copy Group retention policy No changes to automated expiration process Day 0 Data stored in TSM Automated Expiration Data deleted in TSM X API Delete issued DELETE FILESPACE Date Retention Criteria Archive Copy Group Retention Policy Deletion Hold/Release 17 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 X Chronological Based Event Based with Fixed Protection Periods Fixed Period Minimum Fixed Period X Event Dispose after fixed period from creation date Dispose after fixed period from event date Day 0 Day 0 Chronological and Event Based Retention Minimum Fixed Period Event Based with no Fixed Protection Period X Event Dispose after event Day 0 18 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Event-Based Archive Retention Policy Not Applicable RETMIN=days Clock starts when data is stored in TSM RETMIN Minimum #days to retain RETVER Greater of (#days to Event)+RETVER or RETMIN Automated Expiration Eligibility RETVER=days or NOLIMIT RETVER=days or NOLIMIT RETVER #days to retain after the clock starts RETINIT=CREATION Clock starts when data is stored in TSM RETINIT=EVENT Clock starts when API application invokes dsmRetentionEvent RETINIT When to start RETVER clock Chronological Retention Event-Based Retention Archive Copy Group Day 0 Data stored in TSM RETMIN API Event issued Automated Expiration Data deleted in TSM RETVER X 19 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Deletion Hold / Release is a client API function Issued by clients against individual objects Once issued, server will not delete a object until hold is released Deletion hold can be released by client Deletion hold has to be issued by client who owns object Works with both Chronological and Event based retention Some Rules: If hold exists and event based retention period expires, object is deleted when hold is released. If hold is released during a retention period it will be deleted after retention period expires hold status is not preserved with export Deletion Hold/Release 20 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Deletion Hold and Release API Function Day 0 Data stored in TSM RETMIN API Event issued Automated Expiration Data deleted in TSM RETVER X Day 0 Data stored in TSM Automated Expiration Data deleted in TSM RETVER X API Hold issued API Release issued API Release issued API Hold issued Event-Based Retention Policy Chronological Retention Policy New! Archive API function 21 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Expiration of Objects for SSAM Automated Expiration: Inventory expiration removes the SSAM database entries for objects marked for expiration Server does not immediately overwrite the data in storage pools Immediate overwrite performed by Data Shredding for Random Access Storage Pools only Storage space reallocation or SSAM reuse of media: Random access storage pool space reused Occurs when storage is reallocated for new data Sequential access storage pool overwrite Occurs when entire VOLUME is reclaimed and recycled for new data Sequential WORM space (tape) not reclaimed 22 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Overwrite of Deleted Data Data Shredding Allows disk storage pools to be designated as shreddable Random-access (not sequential access disk (devtype=file), not tape or other media types) Primary pools When a data object is moved or deleted from a shreddable pool, TSM server overwrites the object (number of overwrites can be set up to 10) Sensitive data objects are destroyed when deleted/moved, preventing undesirable data discovery a b a b a c b Shreddable Storage Pool b b a c Database Database references to object a a b a b a c b Shreddable Storage Pool b b a c Database Database references deleted and object a overwritten Object a deleted/moved 23 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 TSM Transparent encryption TSM provides simple key management Available for TSM API applications; e.g. Content Manager, CommonStore, FileNet TSM API Client generates a random encryption key password Per data object selected by include. encrypt and exclude. encrypt criteria TSM API Client passes encrypted data object encryption key password to TSM Server across the wire TSM Client-Server Session Key used to encrypt/decrypt AES128 encryption used if BOTH Client and Server support it HW Tape Drive Encryption ( IBM TS1120, TS1130 + LTO4 ) Device Class specification One encryption key for each tape volume/cartridge TSM Server generates, encrypts, and stores the encryption key in the TSM database along with other tape volume metadata TSM supports HW provided encryption modes, Application, System and Library TSM manages key in Application mode, other modes transparent to TSM Backup-Archive client simple key management support (TSM 5.5) 24 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 DR550 DR2 Ranges from 8 to 244 TB of raw disk storage capacity Single or dual server options Choice of Ethernet connections Synchronous or asynchronous replication options Tape ready Optional TS1120, LTO-3 or LTO-4 WORM IBM DR550 DR2 IBM DR550 DR1 DR550 DR1 Ranges from .88 to 48.88 TB raw disk storage capacity Choice of Ethernet connections Optional 25U rack with lockable doors Tape ready Optional TS1120, LTO-3 or LTO-4 WORM IBM System Storage DR550 Family 25 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 DR550 Compliance Solution Architecture Example Three critical components are required to build a solution: 1. Business application 2. Content management application 3. Retention system - based on non-erasable / non-rewriteable technology Business Application content Reports, Documents, Records, Customer Correspondence IBM Content Manager IBM CM OnDemand IBM FileNet Image Services Policy-based non-erasable, non- rewriteable storage system Content Management or Archiving application SQL Server DB2 IBM CommonStore IBM FileNet (Email Manager IS) S S A M
A P I
a n d
G a t e w a y 26 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 File level Archive Support in Standard TSM Supported with TSM Basic Edition and TSM Enterprise Edition TSM B/A client and Api client Event and Chronological based retention policies Deletion Hold TSM support for WORM media Network Appliance SnapLock EMC Centera 3592 WORM tape LTO WORM tape No Data Retention Protection Data can be deleted by user or TSM Administrator Policies can be modified and deleted 27 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Archiving Can Increase Efficiency Inactive or infrequently accessed data can be migrated to different types/ tiers of storage in order to increase efficiencies Source: SNIA/Source Consulting Savings can result from less costly infrastructure and improved efficiency According to Forrester Research 85% of production data is inactive 68%not accessed in last 90 days According to IDC Active Archiving Survey, 40% of fixed content is active or frequently accessed Inactive data Active data Data Statistics Source: Forrester Research, IDC Archive Disk Online Tape Inactive Data High Duty Low Duty Cycle Cycle $
/
G B Production Disk Active Data 5
Y e a r s 2 0
Y e a r s 3
Y e a r s 1
Y e a r Retention Systems 28 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Definition of Hierarchical Storage Management (HSM) A policy based management system for automatically moving inactive files to less expensive storage, resulting in reduced backup windows and reduced storage costs A policy based management system for automatically moving inactive files to less expensive storage, resulting in reduced backup windows and reduced storage costs The Space Management Face of File System Archiving 29 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 250TB of storage, 25% growth over 10 years Tape $946,405 $7 $3.5 $0 M i l l i o n s SATA Disk $6,365,950 Blended Disk and Tape $2,255,346 Hardware Prod + DR Carts Maintenance Power & Cooling Floor space 10 year TCO Blended Tape and Disk Best Practices Source: IBM TCO study for System Storage DR550, 2007 IBM Blended Disk and Tape Solutions Lower TCO Consider the long-term costs of ownership High capacity SATA disk can offer lower cost access to online data Tape is less expensive and consumes less energy, but is not often the best choice for online access to data A blended solution provides online access to the most recent data, with longer term storage on energy-efficient tape 30 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 TSM Space Management Centralized point of control for Hierarchical Storage Management (HSM) File system selection Effectiveness reporting Automated management Policy-based file selection On-demand scheduling Transparent recall Platforms Supported AIX, HP-UX, Linux-x86, Solaris Windows 2003 NTFS v5 31 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 TSM HSM the Basics File Systems on Disk TSM Server TSM HSM Client (File-/Appl.-Server) Local or SAN- attached Local or SAN- attached LAN or LAN-free migrate recall Near line Storage send with or w/o compression 32 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 TSM Storage Pool Hierarchy Migration Migration Reclamation Asynchronous Copy Storage Pool Hierarchy Copy Pool Synchronous (simultaneous) Copy Store Client TSM supports hundreds of storage devices (disk, tape, optical, DVD) Server storage is organized into storage pools, each consisting of like devices Hierarchical organization of storage pools exploits attributes of each device type (cost, performance, ability to remove media) Storage pool hierarchy supports automatic, policy-based management of stored objects Initial storage of objects in specified pool Automatic migration to lower pools in hierarchy Automatic space reclamation Copying of data for disaster protection (synchronously with initial store or asynchronously) Migration of data to new storage technologies DB TSM database tracks location of files as they are copied or moved in the hierarchy 33 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 SAN Sun Solaris HP/UX Linux (Intel) IBM AIX LAN FCP TCP/IP Others Any disk including low cost S-ATA storage Any tape Windows 2003 IBM TSM HSM for Windows IBM TSM for Space Management TSM: HSM - Managed Environments 34 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Overview of Client HSM The Tivoli Storage Manager product family provides two HSM products IBM Tivoli Storage Manager for Space Management AIX (JFS2, GPFS), Linux (GPFS), Solaris (VxFS), HP-UX (VxFS) IBM Tivoli Storage Manager HSM for Windows Windows 2003 Server, Windows 2003 Enterprise Server (32 Bit), NTFS V5 HSM client automatically migrates files from on-line to near-line storage (typically from disk to tape), based on policy settings Small stub files are retained on disk, appearing as the original files, thus ensuring transparency of HSM for user applications Stub files contain information pointing to corresponding entry in TSM server DB Migrated files are recalled automatically back to disk as required 35 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Migration policy on UNIX Primary selection criteria Age and/or size Weight factors allow for setting priorities Exclude small files from becoming eligible at all (minmigfilesize) Include/exclude statements allow directory and file selection High Threshold defines when to start automigration The maximum allocated file system capacity Low Threshold defines when to stop automigration Pre-migration percentage (optional) Additional data migrated after Low Threshold No stub created Frees up online storage space faster during automigration 36 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 UNIX 37 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Migration policy on Windows An ILM type approach based on value of file Does not avoid out of space conditions Configure one or more migration jobs A migration job consists of a Path or Directory name Include/exclude filters can be added for Known file groups or specify file name extensions File size and age Jobs can be executed periodically by starting them from the scheduler Supports Recall Quota Controls amount of recalls per user/group in a specific time period All configured through the GUI 38 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Windows 39 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Windows Migration Changing of File Properties Resident File Offline Bit Size on disk is one Cluster Time stamp unchanged Overlay Icon Migrated File 40 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Interfaces to the TSM server TSM Server File System File U TSM HSM Client UNIX File Server File System File W TSM HSM Client Windows File Server TSM API library HSM Verbs TSM Server Storage Pool (SPACEMGMT) Storage Pool (Archive) Unique Object ID Stub U File U different interfaces used internally Pathname Qualifier (FS/HL/LL) Stub W File W Recommended to set archive retention forever to keep data integrity! 41 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Backup integration: UNIX and Windows UNIX File Server Restore of stubs and complete files through the same interface Number of retained versions controlled by VEREXISTS option Inline copy can avoid network traffic Windows file Server Restore of stubs and complete files through the same interface Number of retained versions controlled by VEREXISTS option Both ways of backup integration allow restoring stubs for faster restore of a file system Older versions of file contents are kept on the TSM server Best practice is to require file be backed up prior to migration New in V5.5 42 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Backup integration (backup) TSM Server File System TSM HSM Client UNIX File Server File System Windows File Server Storage Pool (SPACEMGMT) Storage Pool (Archive) TSM Backup Client* TSM HSM Client TSM Backup Client Storage Pool (Backup) Stub U File U File U File W File W File W Inline copy know the link! (no network traffic) TSM Server Stub W Stub W 43 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Backup integration (restore) TSM Server File System TSM HSM Client UNIX File Server File System Windows File Server Storage Pool (SPACEMGMT) Storage Pool (Archive) TSM Backup Client* TSM HSM Client TSM Backup Client Storage Pool (Backup) File W TSM Server restore File U File U Stub U restore (migstate=yes) Recreating unique object ID Stub W Stub W File W File W 44 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Backup integration (versions) TSM Server File System TSM HSM Client UNIX File Server File System Windows File Server Storage Pool (SPACEMGMT) Storage Pool (Archive) TSM Backup Client* TSM HSM Client TSM Backup Client Storage Pool (Backup) File W Stub U File U File U File W File W TSM Server Stub U* File U* File U* copygroup (verexists=2) U*/W* file U/W contains now modified contents and gets migrated again Stub W* Stub W* copygroup (verexists=2) 45 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 Value of IBM TSM HSM Archive Solutions IBM offers complete end-to-end HSM solutions for Windows and Unix file systems Policy based automation reduces manual effort Identify and move low-activity or inactive files to a hierarchy of lower-cost storage Eliminate manual file system clean-up activities Speed file-server recovery times by restoring files to migrated state, deferring data restore until needed Support for transparent media migration for longevity and cost-effectiveness Tiered information infrastructure reduces cost Blend disk and tape solutions for optimum efficiency and performance Ensure information integrity with flexible and scalable non-erasable, non-rewriteable storage Secure and protect information with encryption and automated retention policies 46 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 For More Information Tivoli User Community An active and lively community for Clients, Business Partners, and IT professionals. Free membership provides you with valuable resources, tools and networking capability. Log on to www.tivoli-ug.org or visit the ped in the IBM Pulse Expo Tivoli Training IBM offers technical training and education services to help you acquire, maintain and optimize your IT skills. For a complete Tivoli Course Catalog and Certification Exams visit www.ibm.com/software/tivoli/education Tivoli Services With IBM Software Services for Tivoli, you get the most knowledgeable experts on Tivoli technology to accelerate your implementation. For a complete list of Services Offerings visit www.ibm.com/software/tivoli/services Tivoli Support IBM Software Premium Support provides an extra layer of proactive support, skills sharing and problem management, personalized to your environment. Visit www.ibm.com/software/support/premium/ps_enterprise.html 47 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 48 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 References Tivoli Storage Manager for Space Managment TSM for Space Management on the Web (also Demo available): http://www-306.ibm.com/software/tivoli/products/storage-mgr-space/ http://www-306.ibm.com/software/tivoli/library/demos/dem-stg-mgmt-hsm.html?S_CMP=rnav TSM for Space Management Client Manual (Order Number: SC32-0148-01): http://www.elink.ibmlink.ibm.com/publications/servlet/pbi.wss?SSN=08DBJ0038813141909&FNC= PBL&PBL=SC32-0148-01PBCEEBO200040677&TRL=TXTSRH TSM for Space Management platform support information: http://www-306.ibm.com/software/tivoli/products/storage-mgr/platforms.html TSM for Space Management IBM Tivoli Enterprise Space Management Console: http://www-306.ibm.com/software/tivoli/resource-center/storage/code-ent-con-stor-mgr-space.jsp TSM for Space Management white paper (will be updated 08/08): http://www-1.ibm.com/support/docview.wss?uid=swg27002498 RSCT download http://ftp.software.ibm.com/storage/tivoli-storage- management/maintenance/client/v5r5/Linux/LinuxX86/HSM_RSCT/ http://www14.software.ibm.com/webapp/set2/sas/f/csm/download/home.html 49 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 References Tivoli Storage Manager HSM for Windows TSM HSM for Windows on the Web: http://www-306.ibm.com/software/tivoli/products/storage-mgr-hsm/ TSM HSM for Windows Manuals: http://publib.boulder.ibm.com/infocenter/tivihelp/v1r1/index.jsp?topic=/com.ibm.itsmhsmw.doc/hs m_win.html TSM HSM for Windows platform support information: http://www-306.ibm.com/software/tivoli/products/storage-mgr-hsm/platforms.html Redbook on HSM for Windows: http://www.redbooks.ibm.com/redpapers/pdfs/redp4126.pdf 50 2008 IBM Corporation Archive with TSM for Compliance and Noncompliance 2008 IBM Corporation 2008 IBM Corporation New Enterprise Forum: Information Infrastructure - IBM System Storage and Storage Networking Technical Symposium 15/08/2008 8 IBM Corporation 1994-2008. All rights reserved. References in this document to IBM products or services do not imply that IBM intends to make them available in every country. Trademarks of International Business Machines Corporation in the United States, other countries, or both can be found on the World Wide Web at http://www.ibm.com/legal/copytrade.shtml. Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. Information is provided "AS IS" without warranty of any kind. The customer examples described are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual environmental costs and performance characteristics may vary by customer. Information concerning non-IBM products was obtained from a supplier of these products, published announcement material, or other publicly available sources and does not constitute an endorsement of such products by IBM. Sources for non-IBM list prices and performance numbers are taken from publicly available information, including vendor announcements and vendor worldwide homepages. IBM has not tested these products and cannot confirm the accuracy of performance, capability, or any other claims related to non-IBM products. Questions on the capability of non-IBM products should be addressed to the supplier of those products. All statements regarding IBM future direction and intent are subject to change or withdrawal without notice, and represent goals and objectives only. Some information addresses anticipated future capabilities. Such information is not intended as a definitive statement of a commitment to specific levels of performance, function or delivery schedules with respect to any future products. Such commitments are only made in IBM product announcements. The information is presented here to communicate IBM's current investment and development activities as a good faith effort to help with our customers' future planning. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon considerations such as the amount of multiprogramming in the user's job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve throughput or performance improvements equivalent to the ratios stated here. Photographs shown may be engineering prototypes. Changes may be incorporated in production models. Trademarks and Disclaimers