Mac OS X operating systemsOracle Solaris operating systemsLinux operating systemsAIX operating systems

Archiving data with client node proxy

Archives of multiple nodes that share storage can be consolidated to a common target node name on the IBM Spectrum Protect server.

Before you begin

All agent nodes in the multiple node environment should be of the same platform type. Do not use target nodes as traditional nodes. Use them only for multiple node processing.

Consider the following features of a proxied session:
  • A proxy operation uses the settings for the target node (such as maxnummp and deduplication) and schedules that are defined on the IBM Spectrum Protect server. The IBM Spectrum Protect server node settings and schedules for the agent node are ignored.
  • You cannot perform a system state or system services backup or restore.
  • You cannot access another node (either from the GUI drop down or use of the fromnode option).
  • You cannot perform a NAS backup or restore.

About this task

Consolidating archived files to a common target node name on the server is useful when the workstation responsible for performing the archive can change over time, such as with a Xsan or cluster. The asnodename option also allows data to be restored from a different system than the one which performed the backup. Use the asnodename option with the appropriate command to back up, archive, restore, and retrieve data under the target node name on the IBM Spectrum Protect server. This support is only available with IBM Spectrum Protect V5.3 and higher.

Linux operating systemsTivoli® Storage Manager FastBack clients are also backed up using client node proxy.

Configuring your environment for proxied operations is a multiple step procedure that involves setting options and commands on the backup-archive client and on the server.

Procedure

Perform steps 1 through 5 to install the client and grant proxy authority to the nodes that can perform archive procedures on behalf of another node.

  1. Install the backup-archive client on all nodes in a shared data environment.
  2. Register each node with the IBM Spectrum Protect server, if it does not exist. Register the common target node name to be shared by each of the agent nodes used in your shared data environment.
  3. Register each of the nodes in the shared data environment with the IBM Spectrum Protect server. This is the agent node name that is used for authentication purposes. Data is not stored using the node name when the asnodename option is used.
  4. Grant proxy authority to all nodes in the shared environment to access the target node name on the IBM Spectrum Protect server, using the GRANT PROXYNODE command (IBM Spectrum Protect administrator).
  5. Use the QUERY PROXYNODE administrative client command to display the client nodes of the authorized user, granted by the GRANT PROXYNODE command.

Step 6 sets ensures that archived files are encrypted on the server.

  1. Set the encryptkey option in the options file.

    Specify encryptkey=save in the options file to save the encryption key in the IBM Spectrum Protect password file. Back up at least one file with asnode=ProxyNodeName to create a local encryption key on each agent node in the multiple node environment.

    Specify encryptkey=prompt in the options file if you want the node users to manage the encryption key. Ensure that users of the agent nodes in the multiple node environment are using the same encryption key.

    Repeat this step if you change the encryption key. Use the same encryption key for all files that are backed up, in the shared environment.

Perform steps 7 to step 10 to enable multinode operation, from the GUI.

  1. Verify that the client node has proxy authority to a target node (or authorized to act as the target node) using the QUERY PROXYNODE administrative client command.
  2. Select Edit > Preferences to open the preferences window.
  3. Select the General tab and fill in the As Node Name field with the name of the proxy authorized target node.
  4. Click Apply and then OK to close the preferences window.

Perform step 11 to verify that your client node is now accessing the server as the target node.

  1. Open the tree window and verify that the target node name specified by the As Node Name field is displayed.
    Alternatively, you can verify that the target node name shows in the Accessing As Node field in the Connection Information window.
  2. Optional: To return to single node operation, delete the As Node Name from the Accessing As Node field in the General > Preferences tab.