Configuring and administering servers

To complete administration tasks for an IBM® Storage Protect storage solution, review the available documentation.

About this task

Tip: Beginning with IBM Tivoli® Storage Manager 7.1.3, the Administrator's Guide is no longer available as a PDF file. Instead, the documentation set is revised to help you deploy and administer specific types of storage solutions. For a list of available PDF files, which include instructions for deploying new storage environments, see Server documentation in PDF files.

For instructions about administering an existing storage solution, see the following table:

Action Details Documentation
Configure the server.
  • Secure the IBM Storage Protect server and data by controlling access to servers and client nodes, encrypting data, and maintaining secure access levels and passwords.
  • You can replicate client data from a source server to another server to help ensure that backed-up client data is available for recovery if the source server is damaged.
  • You can configure the IBM Storage Protect server for clustering on IBM AIX®, Linux®, or Windows systems.
Protect clients. The server protects data for clients, which can include applications, virtual machines, systems, and object clients. For example, when you register IBM Storage Protect Plus as an object client, you can copy data from IBM Storage Protect Plus to IBM Storage Protect.
Select and configure storage. Select storage based on your business needs and then complete the tasks for configuration.
Eliminate duplicate data. Use data deduplication to eliminate redundant data in storage pools. Data deduplication reduces the storage that is required to retain the data. Only one instance of the data is retained in a deduplicated storage pool. To learn about the differences between inline and post-process data deduplication and to configure a solution for data deduplication, see Data deduplication options.
Monitor a storage solution. Monitor the storage solution to identify issues, troubleshoot problems, and optimize system performance. The Operations Center Overviews page provides an overview of system status and issues alerts about potential issues, including ransomware.
Manage operations.
  • You can start and stop the server, manage inventory capacity, and manage memory and processor usage.
  • You can modify the scope of a client backup, evaluate errors, and decommission a client node when it is no longer necessary.
  • You can use the Operations Center to monitor multiple servers and to complete some administrative tasks.
Manage the database and recovery log. The database and recovery log, or server inventory, store information about client data and are critical to the operation of the server.
Configure virtual tape libraries. A virtual tape library (VTL) does not use physical tape media. When you implement VTL storage, you can exceed the capacity of a physical tape library. The ability to define many volumes and drives can provide greater flexibility for the storage environment.
Protect NAS file servers. You can plan, configure, and manage a backup environment that protects your network-attached storage (NAS) file server.
Protect data with the NetApp SnapLock licensed feature. You can use the NetApp SnapLock licensed feature to meet strict regulatory requirements for archived data.
Protect the server and data, and recover in a disaster. Protect your system infrastructure and data so that you can recover from a disaster. Use the tools and procedures that IBM Storage Protect provides to help you create a disaster plan. For information about protecting and recovering the server and data, see: