Hi,
- How long will it take for TSM journal service to update its database after
some files are added or changed in a filesystem?
- let say journal is active for drive D:\ and journal database is located in
this partition as well. It could cause an infinite loop because journal
database files are
I think JBB is able to maintain own database files correctly. Do not afraid
this.
Grigori G. Solonovitch
Senior Technical Architect
Information Technology Bank of Kuwait and Middle East http://www.bkme.com
Phone: (+965) 2231-2274 Mobile: (+965) 99798073 E-Mail: g.solonovi...@bkme.com
Hello Grigori,
I did not realize the storage group was still active.
In this case, you are correct, you cannot use the inactivate command.
I suggest that you call IBM support, they may have to guide
you through a TSM Server command to delete or inactivate this object.
Thanks,
Del
We are planning to upgrade from V6.1 Server Clients.
However, we still have some AIX 5.2 boxes that are stuck on V5.4 client.
Can you tell me if V5.4 client will backup restore from a V6.1 Server?
Can't see it's that obviously put in the docs I've got but maybe I'm not
looking in the right
Hi Stefan,
TSM API applications like DP/Exchange and DP/SQL
use TSM transparent encryption. There is no key to input.
It is a generated key that gets managed by TSM.
What makes you think it is not working?
Thanks,
Del
ADSM: Dist Stor
Unfortunately, I have no experience in encryption TDP for Exchange backups.
For Oracle database we are using:
1) in dsm.sys:
Encryptiontype AES128
Encryptkey generate
InclExcl/backup/tsm/ba/InclExcl.list
2) in Include/Exclude list:
I have restored and backed up using clients as far back as 5.2 with a 6.1
server.
Gary Lee
Senior System Programmer
Ball State University
phone: 765-285-1310
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of Baker,
Jane
Sent: Tuesday,
Hello everyone,
I am beginning the process of deciding upon a method of encryption. I was just
wondering if anyone utilizes TSM to encrypt data? It seems to be quite a
cumbersome method of encryption...
I was also wondering if anyone was using hardware encryption in their
environments? And
Is anyone considering migrating of TSM for z/OS for The FDR/UPSTREAM product?
Thank you, Bob Molerio
IBM System z™ - Used by 90% of Fortune 1000 Companies / Handling 70% of the
World’s Corporate Data
99.999% Availability / No Virus in 42 Years / Application Compatibility from
1964 to Today
We currently encrypt all our offsite tapes. Mgmt wants to me create a single
unencrypted archive tape to be stored offsite long term for litigation reasons.
My question is: If I turn off encryption long enough to get some data written
to this one tape, then turn encryption back on, could I
Can you use TSM how encryption manager (Application Encryption Manager) or
you can use TKLM (Tivoli Key Lifecycle Manager) how encryption manager, in
this case the method is Library Encryption Manager.
Review the following redbook: IBM System Storage Tape Encryption Solution
(SG247320)
Regards
Del, Grigori,
Thank you, this is very useful, especially as the subject was brought up in a
meeting yesterday afternoon. What I couldn't answer then is whether it is
possible to decrypt an ORACLE backup on a different machine, two possible
instances being if the machine dies can the files be
Can you give us rough idea of the numbers (TSM sever count, number of
clients, data volume, etc) you provided to IBM about your TSM
environment?
I just got our bill for support and I curious about your setup.
-Original Message-
From: ADSM: Dist Stor Manager
Howard,
I have a pair of DDR410s and pair of DDR510's that are configured for
NFS. The 510's are being used to store vRanger backups of a VM
environment. Compression/deduplication is incredible for this
application. 47TB(terabytes) are stored on 811GB (Gigabytes). Now
realize that there is a
Fred -
There's a good redbook on the general subject area: IBM Tivoli Storage
Manager: Building a Secure Environment
http://www.redbooks.ibm.com/abstracts/sg247505.html
Richard Sims
Thanks. I don't want to do the NFS stuff with TSM for a few reasons,
but this helps.
See Ya'
Howard Coles Jr.
John 3:16!
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of
Strand, Neil B.
Sent: Tuesday, January 12, 2010 8:55 AM
To:
Encryption with the client is very CPU intensive, both on backup and on
restore.
If you have LTO4 or 3592 tape, or STK tape drives that encrypt, it is far,
far better to do it in the hardware.
W
On Tue, Jan 12, 2010 at 8:50 AM, Moyer, Joni M joni.mo...@highmark.comwrote:
Hello everyone,
I
In theory, the 5.4 client -- 6.1 server should work... however, this is
not an officially supported combination (just so you know).
If you go to the link in my sig and search on
client server compatibility
You'll find a hit near the top that documents the supported client and
server version
In thoery this should work if you are using the same nodename.
I recommend you try this in practice to make sure it works in
your environment before relying on it.
Thanks,
Del
ADSM: Dist Stor Manager ADSM-L@VM.MARIST.EDU wrote on 01/12/2010
Is your encryption application-managed (controlled by TSM) or
library-managed (controlled by EKM/TKLM)?
If application managed, IBM is correct, you just need a different devclass
that specifies drive encryption OFF, pointing to the same library, and a new
storage pool that specifies the
I have a 6.1 system with clients ranging all the way back from 5.2 to 6.1.
5.4 and 5.5 clients are still supported with a 6.1 server.
Older clients aren't officially supported by Tivoli, but still work.
W
On Tue, Jan 12, 2010 at 6:59 AM, Baker, Jane jane.ba...@clarks.com wrote:
We are
Could you share those reasons? I would be interested because we tested one,
and the NFS seemed to work great. Thanks.
On Tue, Jan 12, 2010 at 9:04 AM, Howard Coles howard.co...@ardenthealth.com
wrote:
Thanks. I don't want to do the NFS stuff with TSM for a few reasons,
but this helps.
Thanks Del. As usual, the questions were asked after the fact. So in theory,
restoring to a virtualnodename or a modified optfile should work, but an export
should not.
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of Del
Hoobler
Sent:
What does it mean when Pct. Idle Wait and Pct. Comm Wait are large
numbers greater than 100 as in the node below? The TSM server is at
version 5.5.2.1, running on RHEL.
Thank you,
Keith Arbogast
tsm: TSMIN01q node bl-sdd-internal f=d
Node Name: BL-SDD-INTERNAL
Platform:
On Jan 12, 2010, at 10:44 AM, Keith Arbogast wrote:
What does it mean when Pct. Idle Wait and Pct. Comm Wait are large
numbers greater than 100 as in the node below?
It means: server software defect.
I have seen these as well, with a Duration value as ridiculously tiny as yours.
Look for the
Using hardware encryption, managed by TSM.
Are you saying I can have two device classes sharing the same devices? For
some reason, I was always under the impression that you couldn't. But after
scanning the help, I don't know where I came up with that notion. That would
definitely make
We have a customer that insisted on buying one of these for his TSM
environment. Promised 20:1 dedup. He saw about five to one. He was in our
Level 2 class telling the story. At the end he said he wouldn't buy it again.
I made him repeat that part of the story...
Kelly Lipp
Chief
Yes.
Storage pool = Device class= Library = drives
Anything you create in the storage pool, is encrypted or not based on the
devclass settings.
If you need a sample of definitions, will be happy to send them.
On Tue, Jan 12, 2010 at 12:06 PM, Druckenmiller, David druc...@mail.amc.edu
wrote:
Performance mainly, having to turn off DirectIO to do NFS to volumes,
and Security.
See Ya'
Howard Coles Jr.
John 3:16!
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of
Andrew Carlson
Sent: Tuesday, January 12, 2010 9:36 AM
To:
Would he be willing to email or talk to me about it, if you can recall
his contact info? I really need to get some firsthand accounts. :-D
See Ya'
Howard Coles Jr.
John 3:16!
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of
Kelly Lipp
Sent:
Richard,
Thanks for the insight. You must be right on the first point, but
neither this node nor others whose Pct. Idle Wait or Pct. Comm. Wait
were greater than 100 had ANE4964I greater than 24 hours. The longest
was 10 1/2 hours,
I found these bogus percentages as I was trying to identify
Grigori,
The ORACLE guys want to know how you test to see that files are really
encrypted?
-Original Message-
From: ADSM: Dist Stor Manager [mailto:ads...@vm.marist.edu] On Behalf Of
Grigori Solonovitch
Sent: Tuesday, January 12, 2010 6:16 AM
To: ADSM-L@VM.MARIST.EDU
Subject: Re:
On Jan 12, 2010, at 5:08 PM, Fred Johanson wrote:
Grigori,
The ORACLE guys want to know how you test to see that files are
really encrypted?
One way is as described in IBM Technote 1303197.
Richard Sims
On Jan 12, 2010, at 11:27 AM, Kelly Lipp wrote:
We have a customer that insisted on buying one of these for his TSM
environment. Promised 20:1 dedup. He saw about five to one. He was in our
Level 2 class telling the story. At the end he said he wouldn't buy it
again. I made him repeat
1) In TDP for Oracle version 5.5.2 it is coming in TSM Server activity log:
q act or=client node=LPAR05_ORA begint=01/12/2010
ANE4991I (Session: 2536, Node: LPAR05_ORA) TDP Oracle AIX
ANU0599 TDP for Oracle: (4997220): =(LPAR05_ORA)
ANU2526I Backup details for backup piece
In the given example for Oracle all encryption keys are kept in TSM database.
So you will be able to decrypt data only if you have restored TSM database. It
is logical, because after loosing TSM database you are loosing everything. I
heard there are some tools to read TSM backups from tapes
36 matches
Mail list logo