How to install and configure Data Protection for VMware V8.1 - Video Tutorial

Data Protection for VMware includes several components which you can install to protect your virtual environment. Before installing Tivoli Storage Manager for VE to protect your VMware infrastructure, you need to plan and decide how many Data Protection for VMware vSphere GUI's are required based upon your size of your environment. Depending on the operating system environment, the following Data Protection for VMware features are available for installation.


1) IBM Spectrum Protect recovery agent
This component provides virtual mount and instant restore capabilities.

2) Recovery agent command-line interface
The command-line interface used for mount operations.

3) Data Protection for VMware enablement file
This component enables IBM Spectrum Protect to run the following backup types:
  • Incremental-forever incremental backup
  • Incremental-forever full backup
This component is required for application protection. If you offload backup workloads, this file must be installed on the vStorage Backup Server.

See Screenshots: How to install TSM for Virtual Environment ?

4) Data Protection for VMware vSphere GUI
This component is a graphical user interface (GUI) that accesses VM data on the VMware vCenter Server. 

5) File restore GUI
This component is a web-based GUI that enables you to restore files from a VMware virtual machine backup without administrator assistance. The GUI is installed automatically when the Data Protection for VMware GUI is installed. It is enabled through the configuration wizard.

6) Data mover
The IBM Spectrum Protect data mover moves data for Data Protection for VMware. This functionality is referred to as the data mover. The data mover moves data from the virtual environment to the IBM Spectrum Protect server. When you install the data mover on a server, the server can be used as a vStorage backup server. You can install the data mover
on the same system as Data Protection for VMware or on another server.

Also Read: Different types of VM backups through BA Client command line

Watch the below 3 videos to understand the components of Data Protection for VMware V8.1 and the steps to be followed for installing and configuring the Data Protection for VMware V8.1 software.


New features in IBM Spectrum Protect for Virtual environment V8.1.0 for easy administration by VMware users.

The IBM Spectrum Protect for Virtual environment V8.1.0 comes with an advanced features which optimize the backup, restore administrative tasks performance. Data Protection for VMware works with the Tivoli Storage Manager backup-archive client which is installed on the vStorage Backup server  to complete full and incremental backups of VMs. The new version of IBM Spectrum Protect for Virtual environment comes with an extension in the VMware vSphere Web Client API which offers new and enhanced features which are explained below.


1) It provides new options for restoring VMs
The Restore a Virtual Machine wizard provides many expanded features that enable you to
  • Select the backup that you want to use for the restore operation using a calendar interface.
  • Choose the restore type: restore, instant restore, or instant restore with instant access.
  • Restore all virtual disks in a VM or just selected disks.
  • Select the datastore for the restored VM.
  • Select the data mover or mount proxy that you want to use for the restore operation.
Also Read: Taking Virtual Machines backup through CMD & GUI

2) Setting at-risk policies for VMs
VMs can be at risk of being unprotected because of failed or missed backup operations. You can set a policy for a VM that specifies if or when the VM is shown as at-risk if a backup operation does not occur in a specified time interval.

3) Easy viewing of backup information for VMs at the object level
You can view the most recent backup information for all VMs that are in the following vSphere objects. For each VM, you can view information such as the risk status, completion date, duration, and size of the backup.
  • Datacenter
  • Folder (host, cluster, and VM)
  • Host
  • Host Cluster
  • Resource Pool
 

4)  Data protection tags for tagging support
New data protection tags are added to help you manage virtual machine backup operations with the IBM Spectrum Protect extension in the VMware vSphere Web Client. In addition to using tags to exclude virtual machines from scheduled backup operations and assign retention or management classes, introduced in V7.1.6, you can assign the new tags to vSphere inventory objects to do the following tasks:
  • Include virtual machines in scheduled backup operations
  • Assign a data mover to a virtual machine
  • Specify a list of virtual disks to back up
  • Assign a backup schedule to virtual machines in a container
  • Specify the data consistency to achieve for snapshot attempts during virtual machine backup operations
  • Provide application protection to virtual machines that run Microsoft SQL Server or Microsoft Exchange Server software
5) Set a default data mover for tagging
You can set a default data mover for protecting virtual machines in vSphere inventory objects that are tagged with data protection tags. New virtual machines that are added to the tagged container and are protected by a schedule but do not have a data mover tag are backed up by the default data mover.

6) VMs can be added to a backup schedule by using the IBM Spectrum Protect extension
You can select a backup schedule for VMs from the IBM Spectrum Protect extension in the VMware vSphere Web Client. The backup schedule specifies how often and when to automatically back up the VMs in a vSphere inventory object.

7) Enhancements for backup and restore performance for VMs
The following enhancements were made for backup and restore operations:
  • Optimized backup operations for multiple virtual disks by using parallel sessions, one session for each virtual disk.
  • Optimized backup operations for a single virtual disk by using parallel sessions, multiple sessions for each virtual disk.
  • Optimized recovery operations for single virtual disk by using multiple sessions, multiple sessions for each virtual disk.
  • Updated the common data format to reduce the number of objects that are stored on the IBM Spectrum Protect server for larger virtual disk sizes.
The following options were added:

Vmmaxbackupsessions
The vmmaxbackupsessions option specifies the maximum number IBM Spectrum Protect server sessions that move VM data to the server that can be included in an optimized (parallel) backup operation.

Vmmaxrestoresessions
The Vmmaxrestoresessions option specifies the maximum number IBM Spectrum Protect server sessions that can be included in a restore operation for a virtual disk.

The following video will introduce you the new features in V8.1.0 which will ease the backup and restore tasks for VMware administrators.

Follow these 10 tips to secure your IT backup infrastructure (Spectrum Protect)

Today, most of the IT data centres are affected by the modern and intelligent malware and viruses in some or the other form. This can be due to the negligence of the employees or inappropriate security systems that are implemented. Currently we have a new type of data theft strategies such as  RasomWare implemented by cyber attackers to steal the business critical information. This RasomWare cyber attack, have plagued many of the todays organizations inspite of the stringent security policies.

These attacks have prompted 90% of the organizations to review the way that their data protection infrastructure is managed, and to look at how they can secure their backup environments even further. And also as a backup specialist, we should also take extra care to make sure the data which is backed-up to tape or to the cloud is secure enough from the modern day cyber attacks. 

Also Read: Use these 3 methods to fix the slow and long running incremental or full backups 

To address these kind of cyber attacks, IBM recommends the below 10 security tips to implement in your backup infrastructure to prevent data theft in any form. The below video from IBM Spectrum Protect storage specialist describes the current exposure many organizations backup solutions have, and discusses methods to reduce their security exposure. It proposes solutions to further protect the data protection core components so they, themselves, are not destroyed along with the primary data.

The below video will cover how to:
  • Harden the Spectrum Protect server hosts

  • Protect Spectrum Protect servers against RansomWare and other Malware
  • Secure the communication pathways
  • Secure Spectrum Protect administration 
  • Secure Spectrum Protect client nodes
  • Use all support and alerting tools available to you and apply Flashes
  • Follow strong testing and currency policies
  • Validate Data Protection and DR Services
  • Make the Protect Server infrastructure easier to manage reliably
  • Make the Protect Clients easier to manage reliably
The below video also covers how the security settings are configured in many TSM servers today and the different types of Security models offered by IBM Spectrum Protect which can be implemented in your backup setup.

Also Read: IBM Spectrum Protect V8 new features

5 Types of disaster recovery strategies offered by IBM Spectrum Protect (TSM)

IBM Spectrum Protect offers different disaster recovery strategies to help planning for any disaster situation. When you implement Spectrum Protect (TSM) server to backup your organization data, it is also highly recommended to plan and implement the secondary TSM server at DR site to make sure that you are ready to face any unexpected data loss or disaster situations. The below video from IBM employee will explain you the different types of disaster recovery strategies which you can choose to implement in your organisation based upon your requirements and resources.

You can protect the IBM Spectrum Protect server and all the backed-up data by using one or more of the following strategies. Remember that proper planning, implementation and regular DR drills will help you to learn from the mistakes and also it will put you in a good position to recover the data loss ASAP. You can implement any of the following disaster recovery strategies by using TSM server.
  • You can take TSM Data base backup and copy storage pools daily in and send them via a carrier to an offsite location. 
  • You can Utilise the existing SAN technical features (like storage replication) for the storage pool copies 
  • You can Implement HADR with off site copies
  • You can also do hardware replication of the TSM DB and storage pools 
  • You can configure Spectrum Protect Node Replication techniques which comes with TSM server.
Disaster recovery strategies by using TSM

The video also explains the common and frequently seen disaster situations, causes of disaster, what needs to be protected in terms of spectrum protect server, and the seven tiers of disaster recovery scenarios by using spectrum protect. The video also covers the Recovery Point Objectives (RPO), Recovery Time Objectives (RTO) and costs for each solution as shown in the above figure.

Also Read: Installation & Configuration of IBM Spectrum Protect (TSM) Server

IBM Spectrum Protect V8.1 high level introduction video guide

IBM Spectrum Protect was formerly known as Tivoli Storage Manager, TSM, ADSM. The below  latest video from IBM covers basic functions, components and related products of TSM. This high level overview is an introduction to IBM Spectrum Protect as of version 8.1. IBM has introduced many new features in Spectrum Protect version v8.1 where you can take backup to 4 of the widely used cloud storage services and you can fastly transfer data to DR servers by integrating Aspera FASP technologies.

The below video covers why any organization needs a data protection solution to protect its IT infrastructure, applications and its business critical data and why IBM Spectrum Protect is one of the best choice to implement. The video covers
  • Basic concepts of TSM Backup and Archive and benefits of using it.
  • Different types of Backup methods supported by TSM
  • How to protect various applications, databases and virtual environment using TSM (hot and cold backups).
  • Various data reduction techniques which helps in saving storage space.
  • Different kinds of Disaster Recovery Strategies that can be implemented by using TSM.
  • Different types of snapshots and Bare metal recovery techniques supported by TSM.
  • Finally, how to use TSM operations center to configure backup schedule and administer the daily house keeping activities with ease.
Also Read: IBM Spectrum Protect (TSM) Basic Free Tutorials

How to improve performance when taking backup to cloud storage pools (hybrid cloud backup) - Video tutorial

Since IBM now supports various cloud storage services to take the backups, you can use cloud container storagepools to store both the deduplicated data and non-deduplicated data and restore the data as required.  Starting from IBM Spectrum Protect  (TSM) V 7.1.7, you can configure cloud-container storage pools on 4 of the popular and widely used cloud based object storage systems to backup the data. However, the backup performance of a cloud-container storage pool largely depends on the network connections between the server and the cloud. Sending data to cloud storage requires good network bandwidth along with the advanced security features. But most of the small and medium sized organisations cannot afford to buy the high network bandwidths if they want to use cloud as the storagepool destinations. 

To address this situation, IBM has introduced a new hybrid and optimised data transfer techniques. You can now define local storagepool directory by using the new DEFine STGPOOLDIRectory command where the data is stored temporarily before it is transferred to the cloud. This technique is generally referred as hybrid cloud backup. This hybrid cloud backup feature will help you to set up local storage for data that is later moved to the cloud. By assigning one or more local storage directories to a cloud-container storage pool, you can enhance the performance of backup operations to the cloud. When you back up the data to local storage, the data is buffered efficiently into disk containers and moved to the cloud as larger objects. With larger objects, you can achieve better performance results. Use this command to define one or more directories in a directory-container or cloud-container storage pool.
How to improve backup performance when taking backup to cloud storage pools

For Example: define stgpooldirectory pool1 /storage/dir1,/storage/dir2

When you define a local storage directory, data is temporarily stored in the directory during data ingestion, and is then moved to the cloud. you can set up local storage for data that is later moved to the cloud. By assigning a local storage directory to a cloud-container storage pool, you can enhance the backup performance of small objects, for example, client-transaction data.


After you define a cloud-container storage pool, create one or more directories that are used for local storage. You can temporarily store data in local storage during the data ingestion, before the data is moved to the cloud. In this way, you can improve system performance. 

Watch the below video on how to configure cloud services to configure hybrid cloud backups in 3 simple steps by using IBM Spectrum Protect and Amazon S3.

How to configure storage pool on a Cloud Storage services - Video tutorial

Starting from IBM Spectrum Protect  (TSM) V 7.1.7, you can configure cloud-container storage pools on 4 of the popular and widely used cloud based object storage systems to backup the data. IBM supports the following cloud based object storage systems to configure storagepools and to take backup of the clients and to improve server performance, simplify storage management, and secure data by using encryption.
  • Amazon S3
  • Cleversafe
  • IBM SoftLayer
  • OpenStack Swift
You can use cloud container storagepools to store both the deduplicated data and non-deduplicated data and restore the data as required. However, before configuring the cloud container storage pool, you need to get the required account information details of the cloud environment which you want to use as the destination.

Also Read: What is Cloud Container Storagepool ?

Cleversafe
If you want to configure cloud-container storage pools on Cleversafe, you must first set up a Cleversafe vault template and a Cleversafe user account, and then obtain the below configuration information.
  • CLOUDTYPE: S3
  • IDENTITY: access_key_ID
  • PASSWORD: secret_access_key
  • CLOUDURL: http://cleversafe_accesser_IP_address
Cleversafe vaults are used in the same manner as containers in a cloud-container storage pool. Set up a Cleversafe vault template to quickly create vaults with your preferred settings. After you create a vault template, use the credentials from your Cleversafe user account to configure the storage pools in the Operations Center or with the DEFINE STGPOOL command. Tivoli Storage Manager uses the Simple Storage Service (S3) protocol to communicate with Cleversafe.

Amazon S3
If you want to use Amazon Simple Storage Service for cloud container storage pool, you must obtain information from Amazon that is required for the configuration process. Amazon S3 uses buckets to store data. Amazon S3 buckets are used in the same manner as containers in a cloud-container storage pool. Tivoli Storage Manager automatically creates a bucket in Amazon for an instance of Tivoli Storage Manager, and that bucket is shared by all pools for that instance.
  • CLOUDTYPE: S3
  • IDENTITY: access_key_id
  • PASSWORD: secret_access_key
  • CLOUDURL: Specify the region endpoint URL that best fits your location, based on the Amazon AWS Regions and Endpoints page.
OpenStack Swift
Similarly if you want to use OpenStack Swift, you must obtain configuration information from the OpenStack Swift computer. Use the credentials from your OpenStack Swift account when you configure the storage pools by using the Operations Center or the DEFINE STGPOOL command.
  • CLOUDTYPE: SWIFT or V1SWIFT
  • IDENTITY: OS_TENANT_NAME:OS_USERNAME
  • PASSWORD: OS_PASSWORD
  • CLOUDURL: OS_AUTH_URL
IBM SoftLayer
Similarly, if you use IBM SoftLayer, you must obtain configuration information from the SoftLayer Object Storage page. Use the credentials from your SoftLayer account when you configure the storage pool.
  • CLOUDTYPE: SOFTLAYER
  • IDENTITY: username
  • PASSWORD: API_key
  • CLOUDURL: public_authentication_endpoint

How to configure cloud container storage pool

Once you have the above required information, you can configure the cloud container storage pool by using both Operations Center and the command-line interface. However, the preferred way to define and configure a cloud-container storage pool is to use the Operations Center as it will be easier to configure and manage. Please watch the below video to understand how to do this. 

Also Read: How to restore damaged files in a primary storagepools from replication server automatically

If you want to do it in a command line, use DEFINE STGPOOL command to configure cloud container storagepool in a cloud services platform.
How to configure cloud container storage pool

CLOUDType parameter specifies the type of cloud environment where you are configuring the storage pool. You can specify any one of the following values explained above. If you define a storage pool as using S3 with this parameter, you cannot later change the storage pool type by using the UPDATE STGPOOL command. If you do not specify the parameter, the default value SWIFT will be used.
CLOUDUrl specifies the URL of the cloud environment where you are configuring the storage pool. 
IDentity specifies the user ID for the cloud that is specified in the STGTYPE=CLOUD parameter. Based on your cloud provider, you can use an Access Key ID, a user name, a tenant name and user name, or a similar value for this parameter. 
PAssword specifies the password for the cloud that is specified in the STGType=CLoud parameter. Based on your cloud provider, you can use a Secret Access Key, an API Key, a password, or a similar value for this parameter.
CLOUDLocation specifies the physical location of the cloud that is specified in the CLoud parameter. You can specify OFFPREMISE or ONPREMISE if you have your own cloud setup. The default value is OFFPREMISE.
BUCKETName pecifies the name for an S3 bucket or a Cleversafe vault to use with this storage pool, instead of using the default bucket name or vault name. This parameter is optional, and is valid only if you specify CLOUDTYPE=S3

For example
define stgpool cloud_stg stgtype=cloud cloudtype=softlayer cloudurl=http://123.456.789:5000/ identity=admin:admin password=password 

Please watch the below video to configure cloud container storagepool on Amazon S3 platform by using operations center. You can use the same steps for other cloud platforms as well.

How to repair damaged data on the directory-container storage pool on a target server

IBM has introduced new set of commands to easily repair the damaged data on the directory-container storage pool on both source and target TSM servers when you enable replication techniques. By using these commands you can save lots of time and money which we spend on recovering the damaged storage pools earlier. You can use PROTECT STGPOOL, AUDIT CONTAINER and REPAIR STGPOOL commands to repair the damaged data on the directory-container storage pool on the target TSM servers. 

The repairing process of the directory-container storage pool  on the target server is done automatically by using the above commands. If the damaged data extent was backed up on a directory-container storage pool on the target server, you can repair the data extent manually by using the REPAIR STGPOOL command. Information about what is repaired is recorded in the activity log for the target server. However, the automatic repair process has the following limitations:
  • Both the source server and the target server must be at V7.1.5 or later.
  • To be repaired, extents must already be marked as damaged on the target server. The repair process does not run an audit process to identify damage.
  • Only target extents that match source extents are repaired. Target extents that are damaged but have no match on the source server are not repaired.
  • Extents that belong to objects that were encrypted are not repaired.
  • The timing of the occurrence of damage on the target storage pool and the sequence of REPLICATE NODE and PROTECT STGPOOL commands can affect whether the repair process is successful. Some extents that were stored in the target storage pool by a REPLICATE NODE command might not be repaired.

So to repair the damaged data, you need to first find out what is the damaged data in the target storage pool. To identify the damaged data, we use AUDIT CONTAINER command and QUERY DAMAGED commands. The AUDIT CONTAINER command is used to scan for inconsistencies between database information and a container in a directory-container storage pool. Whereas QUERY DAMAGED command is used to display information about damaged data extents in a directory-container or cloud-container storage pool. Use this command together with the AUDIT CONTAINER command to determine a recovery method for the damaged data.

Steps to follow to repair damaged data on the directory-container storage pool on the Target server

Step 1: Verify the consistency of database information for a directory-container on the target TSM server

Use AUDIT CONTAINER  command to scan for inconsistencies between database information and a container in a directory-container storage pool. You can use this command to complete the following actions for a container in a directory-container storage pool
  • Scan the contents of a container to validate the integrity of the data extents
  • Remove damaged data from a container
  • Mark an entire container as damaged


You can Specify the name of the container or the the name of the directory-container storage pool or the  name of the container storage pool directory that you want to audit.  For example, to mark as damaged all of the data in a directory-container storage pool
audit container stgpool=prdpool maxprocess=5 action=markdamaged

Also you can specify the type of action to be performed when using this command by using Action parameter. It specifies what action the server takes when a container in a directory-container storage pool is audited. It has the following options
SCANAll - Specifies that the server identifies database records that refer to data extents with inconsistencies. This value is the default. The server marks the data extent as damaged in the database.
REMOVEDamaged - Specifies that the server removes any files from the database that reference the damaged data extent.
MARKDamaged - Specifies that the server explicitly marks all data extents in the container as damaged.
SCANDamaged - Specifies that the server checks only the existing damaged extents in the container.


If the audit does not detect an error with a data extent that is marked as damaged, the state of the data extent is reset. The data extent can then be used. This condition provides a means for resetting the state of damaged data extents if errors are caused by a correctable problem. The SCANALL and SCANDAMAGED options are the only options that reset a damaged extent if it is found not to be damaged.

Step 2: Query damaged data in a directory-container or cloud-container storage pool - optional

Use QUERY DAMAGED command to display information about damaged data extents in a directory-container or cloud-container storage pool. Using this command together with the AUDIT CONTAINER command will help you to determine a recovery method for the damaged data.
For example, to display status information about damaged or orphaned data extents
query damaged prdpool type=status

Storage Pool     Non-Deduplicated          Deduplicated   Cloud Orphaned   Name             Extent Count                     Extent Count      Extent Count  ---------------         -------------                           ----------             -------------POOL1                  65                                       238                     18

Use the Type parameter to specify the type of information to display. You can use the following options
Status - Specifies that information is displayed about damaged data extents. For cloud storage pools, orphaned extents are also displayed. This is the default.
Node Specifies that information about the number of damaged files per node is displayed.
INVentory - Specifies that inventory information for each damaged file is displayed.
CONTAiner - Specifies that the containers that contain damaged data extents or cloud orphaned extents are displayed. For directory-container storage pools, storage pool directories are also displayed.
Nodename - Specifies that damaged file information for a single node is displayed.

Step 3: Automatic Repair of damaged extents 

Starting from Tivoli Storage Manager Version 7.1.5, when a storage pool protection process runs for a directory-container storage pool on a source server, damaged extents in the target server's storage pool are repaired automatically. 

You can check the information about what is repaired is recorded in the activity log for the target server once the storage pool protection process gets completed. Ideally it is recommended to schedule the step 2 and step 3 in regular intervals so that the damaged data extents are automatically repaired during daily storagepool protection process.

SAN basic interview questions

This is the next part of the 50 questions shared earlier. Below are some of the frequently asked Storage (SAN) basic interview question and answers. Check the Storage Area Networks (SAN) basic & advanced concepts page in this site to learn more SAN basics. 

Storage Area Networks (SAN) Basic concepts Interview Questions and Answers


51. what are FC protocols?
Ans :- i)FCP
ii)FCIP
iii)IFCP
iv)FCOE

52. FC tolpologies?
i)Point –Point
ii)FC-AL
iii)Switched Fabric

53. Types of Logis?
Ans :- i)FLOgi
ii)PLOGI
iii)PRLOGI

54. What is ISL?
Ans:- Inter switch Link physical connection between two switches.
With E-Port .It Aggregates the bandwidth

55. How to turn on trunk port?
Ans :- >portcfgtrunk portID 1

56. How to check zone status?
Ans :- >zoneshow zonename

57. What is domain id / port ID?
Domain ID name/ID of the switch and port id means port number.

58. What is dark fiber?
Ans :- lease line cable which is established but not in use called Dark Fiber.

59. SAN topologies?
Ans :- i)Point –Point
ii)FC_AL
iii)Switched Fabric

60. Diff b/w brocade 3850 & latest Model ?
Ans : Brocade 3850 supports 16, 32 ports & 5100 supports 8 gbps -40 ports

61. How to add license in switch?
Ans :- >licenceshow
>licenceadd “key”

62. Diff b/w DAS & NAS?
DAS -> Direct Attached Storage
NAS -> Network Attached storage

63. RAID LEVELS?
RAID 0:-Concatination /Stripping min 2 disks max 8 disks
RAID 1:- Mirroring min 2 disks max 8 disks
RAID2:-Bit level striping min 2 disks max 8 disks
RAID 3 :-Byte level striping with fixed parity to perform this we need to have m in 3 disks max 15 disks
RAID 4:-Block level striping with fixed parity to perform this we need to have m in 3 disks max 15 disks
RAID 5 :- striping with Distributed parity to perform this we need to have min 3 disks max 15 disks
RAID 6:- Block level striping with Distributed parity to perform this we need to have min 4 disks max 16 disks
RAID 10: Stripped mirror to perform this we need to have min 4 disks max 16 disks
RAID 01 :-mirror stripped to perform this we need to have min 4 disks max 16 disks

64. How to take switch backup?
Ans: -by doing of >configupload
After that Through FTP we need to give server name
IPaddress
UserID:
Password:
Of target server here we can save the configuration of the switch.

65. What is port address?
FCID , it is 24 bit address contains Domain Id, Port Number & Loop Number

66. HBA ?
A: Host Bus Adaptor , it resides in the Host. It is Network interface card.

67. Port swapping ?
A: it is a process of when one port is failure , the other port is changed as a communication port

68. What is meant by up streaming and down streaming?
(upstream) The ISL is an upstream path toward the principal switch of the fabric.
(downstream) The ISL is a downstream path away from the principal switch of the fabric.
(Trunk Primary) The port is the master port in a group of trunking ports.
Up If the ISL is connected and the link is up
Down No ISL is connected

69. How to start Automated config upload?
A: automate configuration

How to repair damaged data on the directory-container storage pool on a source server

IBM has introduced new set of commands to easily repair the damaged data on the directory-container storage pool on both source and target TSM servers when you enable replication techniques. By using these commands you can save lots of time and money which we spend on recovering the damaged storage pools earlier. You can use PROTECT STGPOOL, AUDIT CONTAINER and REPAIR STGPOOL commands to repair the damaged data on the directory-container storage pool on both source and target TSM servers. 

Infact, the repairing process of the directory-container storage pool  on the target server is done automatically by using the above commands. In this post we will see the steps to repair damaged data on the directory-container storage pool on a source server.

Steps to follow to repair damaged data on the directory-container storage pool on a source server

Step1: Enable protection manually or automatically

You can protect the storagepools by configuring automatic protection or manual protection. 
To enable storagepool protection automatically, specify the PROTECTSTGPOOL parameter on the DEFINE STGPOOL or UPDATE STGPOOL command to back up the data. For example
update stgpool prodpool protectstgpool=proddrpool

To enable storagepool protection manually, use PROTECT STGPOOL command to protect data in directory-container storage pools by storing the data in another directory-container storage pool on the target server. When you issue this command, data that is stored in the directory-container storage pool on the source server is backed up to a directory-container storage pool on the target server. You should issue this command on the server that is the source server for data.
How to repair damaged data on the directory-container storage pool on a source server

For example to protect a storage pool to a target replication server
protect stgpool devpool maxsessions=5

Use the FORCEREConcile parameter to specify whether to reconcile the differences between data extents in the directory-container storage pool on the source server and target server. If you specify NO to this option, the data backup does not compare all data extents in the directory-container storage pool on the source server with data extents on the target server. Instead, data backup tracks changes to the data extents on the source server since the last backup and synchronizes these changes on the target server. If you specify YES, the data backup compares all data extents on the source server with data extents on the target server and synchronizes the data extents on the target server with the source server.

Step 2: Repair the storagepool by using REPAIR STGPOOL command

If you notice any damage of data on the source storagepool, you can repair the storagepool by using REPAIR STGPOOL command


By protecting the directory-container storage pool, you can repair damaged storage pools by using the REPAIR STGPOOL command. It is used to repair deduplicated extents in a directory-container storage pool. Damaged deduplicated extents are repaired with extents that are backed up to the target server. 
repair stgpool command

For example, to repair a storage pool 
repair stgpool devpool maxsessions=5

You must issue the PROTECT STGPOOL command to back up data extents to the directory-container storage pool on the target server before you issue the REPAIR STGPOOL command. The REPAIR STGPOOL command fails when any of the following conditions occur:
  • The target server is unavailable.
  • The target storage pool is damaged.
  • A network outage occurs.