IBM Spectrum Protect Cloud Blueprint For Microsoft Azure V2.0
IBM Spectrum Protect Cloud Blueprint For Microsoft Azure V2.0
James Damgar
IBM Spectrum Protect Performance Evaluation
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule
Contract with IBM Corp.
© Copyright International Business Machines Corporation 2018, 2022
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule
Contract with IBM Corp.
CONTENTS
Contents .......................................................................................................................... 3
List of Figures ................................................................................................................... 5
List of Tables..................................................................................................................... 6
Introduction ..................................................................................................................... 6
1.1 Purpose of this Paper ........................................................................................... 6
1.2 Considerations for Disk-to-Cloud Tiering Versus Direct-to-Cloud Data Movement ......... 7
1.2.1 Cloud Accelerator Cache Considerations .......................................................... 8
1.2.2 Workload Limitations and Considerations with Tiering ....................................... 9
1.3 Cloud Deployment Patterns ................................................................................ 12
1.4 Cloud Environment Considerations ...................................................................... 13
1.4.1 Importance of Adequate Sizing ..................................................................... 13
1.4.2 Linux Logical Volume Manager (LVM) ............................................................ 14
1.5 References to Physical IBM Spectrum Protect Blueprints ......................................... 15
1.6 Database Backup to Object Storage...................................................................... 15
1.6.1 Tuning Database Backup Operations to Object Storage .................................... 16
1.7 Server Maintenance Scheduling Considerations ..................................................... 18
1.8 Session Scalability by Blueprint Size...................................................................... 19
1.9 IBM Spectrum Protect Security Concepts and Guidelines......................................... 21
1.9.1 Identity Security in the IBM Spectrum Protect Environment.............................. 22
1.9.2 IBM Spectrum Protect Administrative Security................................................ 24
1.9.3 IBM Spectrum Protect Data Security and Policy Based Management .................. 24
1.9.4 IBM Spectrum Protect Bit-Level Security ........................................................ 25
1.10 Optimizing Restore Performance from Cloud-Container Storage Pools ...................... 26
1.10.1 Enabling the Cloud-container Storage Pool Cloud Read Cache ........................... 26
1.10.2 Increasing the Minimum Extent Size for Client Nodes ...................................... 28
Microsoft Azure Configurations ......................................................................................... 28
2.1 Compute, Disk, and File System Setup Instructions for Linux-based Systems .............. 34
2.1.1 Linux Operating System Packages and General Guidance.................................. 34
2.1.2 Microsoft Azure Specific Volume Group Adjustments ...................................... 35
2.1.3 Large Blueprint Instructions ......................................................................... 36
2.1.3.1 Disk Setup Instructions ................................................................................ 36
2.1.4 Medium Blueprint Instructions ..................................................................... 38
2.1.4.1 Disk Setup Instructions ................................................................................ 38
2.1.5 Small Blueprint Instructions ......................................................................... 41
2.1.5.1 Disk Setup Instructions ................................................................................ 41
2.1.6 Extra-Small Blueprint Instructions ................................................................. 43
2.1.6.1 Disk Setup Instructions ................................................................................ 43
2.1.7 IBM Spectrum Protect Format and Server Options........................................... 44
2.2 Design Considerations for Microsoft Azure Instances .............................................. 46
2.2.1 Considerations for Direct-to-Cloud Architectures ............................................ 47
2.2.2 Sizing the Cloud Accelerator Cache................................................................ 48
2.2.3 Microsoft Azure: Large Instance Considerations .............................................. 49
2.2.4 Microsoft Azure: Medium and Small Instance Considerations ........................... 50
Appendix ....................................................................................................................... 50
Disk Benchmarking .......................................................................................................... 50
Object Storage Benchmarking ........................................................................................... 53
Benchmarking Performance Goals ..................................................................................... 57
Instance and Object Storage: Navigating the Microsoft Azure Portal ....................................... 57
References ..................................................................................................................... 68
Notices .......................................................................................................................... 69
Trademarks .......................................................................................................... 70
LIST OF FIGURES
Table 1: IBM Spectrum Protect physical Blueprint targets (, Linux x86) ....................................15
Table 2: Pref erred ranges of maximum values for client session counts ...................................20
7
greater, with the caveat that a slower-performing disk might be sufficient for this case. In all
cases, you must understand the ingestion targets (after data deduplication and
compression) to determine a daily disk capacity for a transient disk case. Meanwhile,
operational recovery requirements in terms of the number of days’ worth of recovery data
(af ter data deduplication and compression) should be determined to further size a
directory-container storage pool with tiering to cloud if necessary.
With the direct-to-cloud model, you can minimize local block storage capacity. This is an
advantage because local block storage can be cost prohibitive in cloud-hosted
environments.
Note that pursuing a tiering model with Microsoft Azure virtual instances may be
cost prohibitive in terms of the amount of EBS block storage disk required for a
directory-container storage pool “disk tier”. As such, only direct-to-cloud model
options are presented within this paper.
9
though an object can be tiered by a storage tiering rule, because the object shares many
extents with other objects (which might still be active), a large proportion of the object’s
data will not be removed from the disk tier (although it will be copied to the object storage
tier).
The f ollowing figures illustrate how data movement with disk-to-cloud tiering can occur.
Figure 1 depicts a scenario in which multiple versions of three backup objects (A, B, and C)
have been ingested and are stored in a directory-container storage pool on disk. Dotted
lines represent references to deduplicated extents (colored, numbered boxes). With the
tier-by-state option, the inactive object copies (shown in the gray rectangle) would be tiered
to a cloud-container storage pool.
Figure 2 depicts the situation after tiering is completed and the REUSEDELAY parameter
value of the source directory-container storage pool is exceeded (so that deduplicated
extent removal for extents with zero reference count can occur).
Figure 2: Disk-to-cloud tiering, after tiering
Notice that deduplicated extents 1 and 2 remain on disk even after tiering and extent
cleanup have occurred. This is due to the fact that those extents are shared between the
active and inactive backup copies. If many deduplicated extents are shared by objects (a
high duplicate data rate with high data deduplication ratios), it is more likely that data will
remain on disk, even after backup objects have been tiered at an IBM Spectrum Protect
inventory level. Keep this factor in mind when you consider a disk-to-cloud tiering model
and when you size an environment.
For workloads that deduplicate well from day to day, there will be many shared extent s
across backup and archive generations and a smaller capacity footprint on tiered object
storage as a result because these backup and archive generations will also share many
extents in the cloud-container storage pool. For workloads that deduplicate poorly day to
day (highly unique data change each day), there will be few shared extents across backup
and archive generations and potentially a larger capacity footprint on tiered object storage
because these backup and archive generations will each point to (more) unique data in the
cloud-container storage pool.
If the primary motivation for using disk-to-cloud tiering is rapid recovery of operational data,
a tiering model might provide the best approach. You must understand the nature of the
client workload to accurately size the directory-container storage pool on disk.
11
1.3 Cloud Deployment Patterns
The described configurations can be used as starting points in situations where the IBM
Spectrum Protect cloud instance will be a primary server and in situations where it is
used as a replication target. In scenarios where the cloud-based instance is a replication
target, adequate “public” network capability might be necessary to satisfy replication
throughput requirements. Microsoft Azure ExpressRoute can be used to establish a
dedicated link ranging from 50 Mbps to 10 Gbps from an on-premises data center to
Microsoft Azure private and public resources to facilitate efficient IBM Spectrum Protect
replication or backup processing from peer servers or clients outside of the Microsoft Azure
inf rastructure.
Generally, IBM Spectrum Protect deployments making use of cloud-based object storage
will align with one of the following three patterns:
13
Certain Microsoft instances might or might not have access to dedicated bandwidth to
attached disks (Microsoft managed disks). A lack of access can create a bottleneck in the
database operations of the IBM Spectrum Protect server. Certain instances might have
limited throughput over Ethernet, and this limitation could hamper ingestion and restore
throughput with object storage. During the planning phase, consider how the ingested data
will be reduced via data deduplication and compression in the back-end storage
location. These factors will help you estimate how much back-end data must be moved
within a certain time window (measured in hours) and can help predict the throughput
(megabytes per second or terabytes per hour) that the Ethernet network and object storage
endpoint require to satisfy ingestion requirements. Generally, 10 Gbps Ethernet capability
to private Microsoft Azure Blob storage endpoints is required for large, medium, or small
Blueprint ingestion targets, while 1 Gbps is sufficient for extra-small targets.
Beginning with IBM Spectrum Protect V8.1.3, the server automatically throttles client
backup operations if the cloud accelerator cache portion of a cloud-container storage pool
is nearing f ull capacity. As a result, it is not mandatory to configure cloud accelerator disk
cache space that would be large enough to hold a f ull day’s worth of backups (after data
deduplication and compression). However, disk benchmarks should be run to ensure that
the anticipated back-end workload that an IBM Spectrum Protect server is expected to
support will not result in this disk location being the primary bottleneck of the system (see
Disk Benchmarking). In practice, any planned deployment should be validated to ensure
that it will meet performance requirements.
1.4.2 Linux Logical Volume Manager (LVM)
The described reference architectures use the Red Hat Enterprise Linux (RHEL) operating
system. For a lower-cost alternative, a supported version of the Ubuntu Linux operating
system may be used. To deploy IBM Spectrum Protect on a Linux based operating system,
the pref erred method is to use the Linux Logical Volume Manager (LVM) for the cloud
accelerator cache disk and, optionally, the IBM Spectrum Protect database archive log disk
(when more than one physical disk is utilized). The remaining IBM Spectrum Protect disk
components can be satisfied with file systems formatted on directly mounted Microsoft
Azure block disks. The overlapped I/O pattern experienced with concurrent backup
ingestion activity and transfer of data to object storage can lead to “hot spots” on disk when
more than one storage pool directory is defined for a cloud-container storage pool as
accelerator cache. To help avoid a throughput bottleneck, you can configure a single
logical volume to span all physical volumes assigned for use as cloud accelerator cache.
Furthermore, the preferred method is to use a stripe size of 256 KiBytes for the single
logical volume and ensure that the number of stripes matches the number of physical
disks. For guidance about specific commands to use when setting up Linux based
instances, see the Compute, Disk, and File System Setup Instructions for Linux-
based Systems section of this document. The use of Linux LVM to logically stripe across
several Microsoft Azure block disks should not be depended upon to increase the durability
of the underlying storage, as Microsoft Azure block disks are already redundant within one
or more datacenters and so do not benefit from the recovery characteristics of LVM striping
or RAID.
1.5 References to Physical IBM Spectrum Protect Blueprints
Throughout this paper, the server specifications in the IBM Spectrum Protect Blueprint and
Server Automated Configuration for Linux x86 document (also known as an IBM Spectrum
Protect Blueprint) are ref erenced as targets for CPU and memory configurations matching
small, medium, and large server builds. For more information about the Blueprints, see
Ref erences [1]. The intention with the server builds outlined here is to provide systems
capable enough from a CPU, memory, disk, and Ethernet point of view to approach
Blueprint-level ingest capability. Although different instance types can be used to satisfy
the same requirements, the disk specifications in particular should be noted in this
document as guidance for those deploying environments of their own.
As a ref erence, the following table indicates the throughput, capacity, CPU, and memory
targets for each of the referenced Blueprints. The values for total managed data and daily
ingested data are for the block storage Blueprints. These ingestion targets assume an 8-
hour backup window.
Table 1: IBM Spectrum Protect physical Blueprint targets (, Linux x86)
Although not defined explicitly in the physical Blueprints, the extra-small cloud Blueprint
systems target up to 10 TB or more of total managed (front-end) data with a daily ingestion
rate of up to 1 TB, or more, per day.
15
Hot access tier, LRS Blob (object) storage for database backup purposes compared to
statically provisioning 16 TB of Standard class block disk storage.
Another advantage of using Blob object storage for IBM Spectrum Protect database
backups is that Blob object storage pricing with Microsoft Azure is based on the amount of
used storage, while disk storage pricing is based on the amount of storage space
provisioned, even if a portion is unused. Not only is unused provisioned disk space a
deterrent to cost savings, the actual rate charged for this space is much more than object
storage considering that the data involved (database backups) is archive-like in nature.
Static provisioning of disk storage is no longer required and the amount of storage
consumed for database backup can better match the requirements of the environment. By
taking advantage of this pricing model, you can enjoy greater freedom in choosing and
changing retention policies for database backups to achieve the required recovery window.
For example, you can transition from 2 days’ worth of full database backups to 7 days
without having to re-provision and configure disk storage.
A f urther benefit of database backup operations to Blob object storage is that increased
data redundancy, availability, and durability can be achieved by using a Blob object
storage account with different data redundancy settings. Locally redundant storage (LRS)
is the most cost-efficient option, where data is copied synchronously three times within a
single physical location in the primary Microsoft Azure region. Zone-redundant storage
(ZRS) copies data across three availability zones (data centers) in the primary region
synchronously with each write operation and can be used to protect against the outage of a
single availability zone. Greater availability and durability can be achieved by using Geo-
redundant storage (GRS) or Geo-zone-redundant storage (GZRS) to replicate data from
the primary Microsoft Azure region to a secondary region. Both of these options copy data
to a single physical location in the secondary region (as with LRS), but differ in how they
copy data in the primary region. As with LRS, GRS makes three copies in a single physical
location at the primary region while GZRS, as with ZRS, copies data to three availability
zones in the primary region. In the case of GRS and GZRS, data is copied to the additional
Microsoft Azure region asynchronously with a recovery point objective (RPO) of
approximately 15 minutes or less (although with no guaranteed service level agreement,
SLA).
You can use the same Microsoft Azure Blog object storage account for database backups
and the cloud-container storage pool of the IBM Spectrum Protect server to ensure
matching redundancy, availability, and durability attributes for database metadata and
storage pool data. In the case of an outage of an availability zone within a Microsoft Azure
region, an IBM Spectrum Protect server instance can be recovered via a database restore
operation and by using the cloud-container storage pool resident data that is accessed by
a dif ferent Microsoft Azure server instance located within the same region. For more
inf ormation about Microsoft Azure redundancy options, see References [8]. For detailed
guidance about setting up database backup operations to object storage, see References
[4].
17
database restore performance. For smaller IBM Spectrum Protect servers with smaller
databases (such as the extra-small and small configurations shown here) use compression
when the f ollowing conditions are met:
• The retention policy that affects client node data on the target replication
server should match the value of the TIERDELAY parameter of the storage
rule that is responsible for tiering the same client node data on the source
server.
In general, the server that is used for disk-to-cloud tiering (whether it be the source
replication server or the target replication server) should be the server with the longer
retention policy for the client nodes that are affected by the tiering storage rule.
19
Objects that feature smaller, deduplicated extent sizes (for example, 60 - 100 KiBytes or
similar) and that deduplicate and compress well (for example, 50% data deduplication with
50% compressibility) will result in less network, disk, and object storage bandwidth used,
but will lead to more database and computation overhead to facilitate these data reduction
operations. As session counts increase, CPU and database-related memory are likely to
f irst become limiting factors for these data types. In general, the more successfully data
can be deduplicated and compressed (and therefore the greater the data reduction from
f ront-end to back-end data), the greater the number of feasible client sessions. The
f ollowing table indicates a reasonable range of client session counts based on system size
and data type, as well as the likely limiting factor for the system as the high end of the
range is approached.
Table 2: Preferred ranges of maximum values for client session counts
Extra 10 – 50 25 – 50 10 – 50 10 – 50
small
1
This model uses 128 MiByte objects, 250 - 350 KiByte extents, and <10% data deduplication and
compressibility. Full backup operations are used with pseudo random data or data that cannot be easily
deduplicated or compressed. For example, this model can be applied to encrypted data.
2
This model uses 128 MiByte objects, 150 - 200 KiByte extents, and 50% data deduplication and compressibility.
For example, this model can be applied to virtual machine backups.
3
This model uses 1 GiByte objects, 60 - 100 KiByte extents, and 50% data deduplication and compressibility. For
example, this model can be applied to database image backups.
4
This model uses 128 KiByte objects and <10% data deduplication and compressibility. For example, this model
can be applied to file server data and other small files or objects.
• The set of people with physical and virtual access to administrative functions with
the data protection environment should be limited and evaluated regularly.
21
• Recovery procedures should be validated through regular audits and by testing
restore operations and disaster recovery (DR) procedures. The goal is to ensure
that recovery time objective (RTO) and recovery point objective (RPO) targets can
be achieved.
The pref erred method of identity security is to maintain at least one local administrator
account that does not depend on LDAP or Active Directory in case the system that hosts
LDAP or Active Directory is compromised by ransomware or other malware or is otherwise
unavailable.
IBM Spectrum Protect TLS certificates can be self-signed or certificate authority (CA)
signed. By default, the server generates a unique self-signed certificate during server
f ormatting (initialization). Alternatively, a trusted CA-signed certificate provided by an
organization can be installed for use by the server. For instructions about installing a
trusted CA-signed certificate on the server, see References [38].
23
1.9.2 IBM Spectrum Protect Administrative Security
IBM Spectrum Protect offers different authority classes for administrators. The classes
restrict or enable capability within the product. Administrative network traf fic can also be
directed over a server TCP/IP port that is separate from data traffic. In this way, a
networking team can monitor different types of traffic with different tools or with different
levels of granularity. IBM Spectrum Protect offers an “audit trail" in terms of activity log
entries stored in the server's database for each operation that an administrator performs.
The IBM Spectrum Protect Operations Center can be used to specify certain audit-able
messages as triggering "alerts" that can be configured to notify specific users via email.
"Command approval" is a mechanism that can be enabled within the server to ensure that
an additional, second administrator must approve any potentially destructive server
command, including data policy changes which might affect data retention. This helps to
ensure a "f our eyes" approach so that a single malicious, careless, or uninformed
administrator cannot cause damage within an environment. For information setting up
administrator command approval, see References [39].
1.9.3 IBM Spectrum Protect Data Security and Policy Based Management
Client data versioning and retention represent a critical aspect to a data security posture.
IBM Spectrum Protect tracks every version of a backed-up file separately in its inventory.
The f iles are not altered after they are stored. Rather, each version is treated as a separate
object in the server's metadata catalog. IBM Spectrum Protect uses policies to control how
the server stores and manages data objects through the hierarchy of policy domains, policy
sets, management classes, and copy groups. You can specify IBM Spectrum Protect policy
settings so that many versions of your client data are protected for a longer period. In this
way, you grant yourself more "freedom of action" in terms of having more backup versions,
originating from a longer period of time, to provide a wider selection of backup versions for
recovery. Even if a security event or malware infiltration is not caught promptly, having
several versions of data stored within IBM Spectrum Protect (for example, 30, 45, or 60
days of data versions) helps to ensure recovery flexibility. Policy settings of interest include
the VEREXISTS (versions existing), VERDELETED (versions deleted), RETEXTRA (retained
extra), and RETONLY (retained only) settings.
To learn more about IBM Spectrum Protect policy-based data management, see
Ref erences [40].
To f urther enhance data security, consider configuring single or multi-target IBM Spectrum
Protect replication, where the operating systems of each IBM Spectrum Protect server
dif fer. For example, the Microsoft Windows operating system is often an attack vector for
malware. By using a different operating system platform for each of two IBM Spectrum
Protect servers in a replication pair relationship, you might help to protect the system
against malware that is designed to target one platform. Increasing the number of "attack
vectors" in this way can build another barrier against malicious actors.
IBM Spectrum Protect can be configured with different retention policy settings at different
ends of a replication relationship. For example, the source replication server can store data
to local disk storage with a directory-container storage pool while the target replication
server can store data to a cloud-container storage pool in the cloud. With more cost-
ef f ective object storage on the target, a longer retention period can be configured to protect
more versions of client data for a longer time. Alternatively, IBM Spectrum Protect tiering
storage rules can be used with a directory-container storage pool at the target site to tier
older or inactive versions of data from disk to object storage for cost-effectiveness. In this
case, a longer policy data retention period should be configured at the site from which data
is tiered. In both cases, having more versions of data available helps to increase the
"f reedom of action" within the data protection system.
IBM Spectrum Protect clients can restore data from either end of a replication pair. For
more inf ormation about setting up replication, see References [41].
25
Figure 6: Container pool security
IBM Spectrum Protect offers explicit audit capabilities that can be enabled by using the
AUDIT CONTAINER command for directory and cloud-container storage pools. This
command can be run ad hoc or be scheduled to run regularly by using storage rules. The
audit can help to detect tampering or bit rot, which is the slow deterioration of data. For
cloud-container storage pools, the audit can be configured to validate object metadata
entity tags, known as ETags. You can issue the AUDIT CONTAINER command with the
VALIDATECLOUDEXTENTS=NO parameter setting to audit only ETags. Or you can issue
the AUDIT CONTAINER command with the VALIDATECLOUDEXTENTS=YES parameter
setting to enable a more thorough audit that inspects data content. This latter form should
be used only when a problem with the data content is suspected because this type of audit
can lead to a large amount of data egress and HTTP GET operations from the o bject
storage system. For more information, see AUDIT CONTAINER.
• The IBM Spectrum Protect server is connected to the object storage system on a
network with high bandwidth. For example, the network bandwidth is 5 Gbps, 10
Gbps, or 40 Gbps.
• The IBM Spectrum Protect server is connected to the object storage system on a
network with high latency. For example, the object storage system might be an off -
premises public cloud with 10 milliseconds of round-trip latency.
• You must restore only a small amount of data (less than 10 GB).
• You have a large deduplicated extent workload and the IBM Spectrum Protect
server is connected to the object storage system on a network with low latency.
For example, the object storage system might be on the same local area network
(LAN) as the cloud-container storage pool, and the round-trip latency might be less
than 10 milliseconds.
In cases where the total network bandwidth to the object storage device is limited (that is, 1
Gbps or 100 Mbps), you might get better performance by leaving the CLOUDREADCACHE
parameter disabled. In these circumstances, the default IBM Spectrum Protect restore
27
procedure from object storage might result in better performance by using small read
requests for each deduplicated extent. However, if you repeatedly restore data over many
hours or days, it might still be advantageous to enable the CLOUDREADCACHE parameter
so that data is staged on higher-performing, local disk storage for subsequent restore
activity.
See the latest guidance in the IBM Spectrum Protect documentation for recommendations
on implementing and tuning this feature [48].
29
Cloud Microsoft Azure Detailed Quantity
component component description
10 Gbit or more
Ethernet
connectivity to
Blob Storage
64 GB S6 IBM Spectrum 1
“standard” HDD Protect instance
(managed disk) disk
10 Gbit or more
Ethernet
connectivity to Blob
Storage
31
Table 6: Microsoft Azure, small configuration
10 Gbit or more
Ethernet
connectivity to Blob
Storage
10 Gbit or more
Ethernet
connectivity to Blob
Storage
33
2.1 Compute, Disk, and File System Setup Instructions for
Linux-based Systems
The f ollowing guidance assumes that IBM Cloud compute, block disk, and object storage
resources specified in the previous tables were deployed for a chosen Blueprint size
conf iguration. The following instructions apply for an IBM Cloud Virtual Server for
VPC configuration only.
For IBM Spectrum Protect deployments on IBM Cloud computing systems, the preferred
operating system is Linux, either the latest IBM Spectrum Protect supported Red Hat
Enterprise Linux (RHEL) or Ubuntu Linux. With Ubuntu Linux, care should be taken to
ensure that all required Linux packages are installed to enable the Linux Logical Volume
Manager (LVM) f unctionality. For more information about the operating systems, see the
IBM Spectrum Protect technote (References [3]).
• perl
• libnsl
• nss
• ncurses-compat-libs
• device-mapper-multipath
• ksh (x86_64)
• lvm2
Ensure that the f ollowing Linux kernel parameters are set to the preferred value:
Disable SELinux prior to IBM Spectrum Protect server installation by editing the
/etc/sysconfig/selinux file and setting SELINUX to “permissive” or “disabled” and
restarting the operating system.
For Small, Medium, or Large Blueprint systems, also create the following directory paths:
mkdir /sp/sp_db5
mkdir /sp/sp_db6
mkdir /sp/sp_db7
mkdir /sp/sp_db8
35
Then grow the XFS file system using:
xfs_growfs /dev/mapper/rootvg-rootlv
mkfs.ext4 /dev/mapper/sp_db-sp_db_db1
mkfs.ext4 /dev/mapper/sp_db-sp_db_db2
mkfs.ext4 /dev/mapper/sp_db-sp_db_db3
mkfs.ext4 /dev/mapper/sp_db-sp_db_db4
mkfs.ext4 /dev/mapper/sp_db-sp_db_db5
mkfs.ext4 /dev/mapper/sp_db-sp_db_db6
mkfs.ext4 /dev/mapper/sp_db-sp_db_db7
mkfs.ext4 /dev/mapper/sp_db-sp_db_db8
mkfs.ext4 /dev/mapper/sp_db-sp_alog
37
mount /dev/mapper/sp_db-sp_alog /sp/sp_alog
mkfs.xfs /dev/mapper/sp_cc-sp_cc1
mount /dev/mapper/sp_cc-sp_cc1 /sp/sp_cc
39
lvcreate --stripes 8 --stripesize 16 --extents 100%FREE --name
sp_alog sp_db
mkfs.ext4 /dev/mapper/sp_db-sp_db_db1
mkfs.ext4 /dev/mapper/sp_db-sp_db_db2
mkfs.ext4 /dev/mapper/sp_db-sp_db_db3
mkfs.ext4 /dev/mapper/sp_db-sp_db_db4
mkfs.ext4 /dev/mapper/sp_db-sp_db_db5
mkfs.ext4 /dev/mapper/sp_db-sp_db_db6
mkfs.ext4 /dev/mapper/sp_db-sp_db_db7
mkfs.ext4 /dev/mapper/sp_db-sp_db_db8
mkfs.ext4 /dev/mapper/sp_db-sp_alog
mkfs.xfs /dev/mapper/sp_cc-sp_cc1
mount /dev/mapper/sp_cc-sp_cc1 /sp/sp_cc
41
lvcreate --stripes 6 --stripesize 16 --extents 376830 --name
sp_db_db2 sp_db
lvcreate --stripes 6 --stripesize 16 --extents 376830 --name
sp_db_db3 sp_db
lvcreate --stripes 6 --stripesize 16 --extents 376830 --name
sp_db_db4 sp_db
lvcreate --stripes 6 --stripesize 16 --extents 100%FREE --name
sp_alog sp_db
mkfs.ext4 /dev/mapper/sp_db-sp_db_db1
mkfs.ext4 /dev/mapper/sp_db-sp_db_db2
mkfs.ext4 /dev/mapper/sp_db-sp_db_db3
mkfs.ext4 /dev/mapper/sp_db-sp_db_db4
mkfs.ext4 /dev/mapper/sp_db-sp_alog
mkfs.xfs /dev/mapper/sp_cc-sp_cc1
mount /dev/mapper/sp_cc-sp_cc1 /sp/sp_cc
mkfs.ext4 /dev/mapper/sp_db-sp_db_db1
mkfs.ext4 /dev/mapper/sp_db-sp_db_db2
43
mkfs.ext4 /dev/mapper/sp_db-sp_db_db3
mkfs.ext4 /dev/mapper/sp_db-sp_db_db4
mkfs.ext4 /dev/mapper/sp_db-sp_alog
mkfs.xfs /dev/mapper/sp_cc-sp_cc1
mount /dev/mapper/sp_cc-sp_cc1 /sp/sp_cc
As the root user, create the Db2 instance for IBM Spectrum Protect:
/opt/tivoli/tsm/db2/instance/db2icrt -u tsminst1 tsminst1
As the tsminst1 user, format the IBM Spectrum Protect server instance using the
appropriate command for the Blueprint size:
Large Blueprint:
dsmserv -i /sp/tsminst1 format
dbdir=/sp/sp_db1,/sp/sp_db2,/sp/sp_db3,/sp/sp_db4,/sp/sp_db5,
/sp/sp_db6,/sp/sp_db7,/sp/sp_db8 activelogsize=450000
activelogdir=/sp/sp_alog archlogdir=/sp/sp_archlog
Medium Blueprint:
dsmserv -i /sp/tsminst1 format
dbdir=/sp/sp_db1,/sp/sp_db2,/sp/sp_db3,/sp/sp_db4,/sp/sp_db5,
/sp/sp_db6,/sp/sp_db7,/sp/sp_db8 activelogsize=450000
activelogdir=/sp/sp_alog archlogdir=/sp/sp_archlog
Small Blueprint:
dsmserv -i /sp/tsminst1 format
dbdir=/sp/sp_db1,/sp/sp_db2,/sp/sp_db3,/sp/sp_db4
activelogsize=200000 activelogdir=/sp/sp_alog
archlogdir=/sp/sp_archlog
Extra-Small Blueprint:
dsmserv -i /sp/tsminst1 format
dbdir=/sp/sp_db1,/sp/sp_db2,/sp/sp_db3,/sp/sp_db4
activelogsize=90000 activelogdir=/sp/sp_alog
archlogdir=/sp/sp_archlog
45
Ensure that the dsmserv.opt IBM Spectrum Protect server options file contains the
f ollowing pieces of information:
ACTIVELOGSize {Active Log Size}
ACTIVELOGDirectory /sp/sp_alog
ARCHLOGDirectory /sp/sp_archlog
Where {Active Log Size} matches the following, depending on Blueprint size:
Large Blueprint: 450000
Medium Blueprint: 450000
Small Blueprint: 200000
Extra-Small Blueprint: 90000
47
If an object storage link is capable of 10 Gbps, this data transfer speed equals about 1000
MiB/s after packet overhead and other efficiency loss. In order to saturate this link for long
periods, the cloud accelerator cache disk location must be capable of taking in client
ingestion data (writes) at 1000 MiB/s and transmitting staged data to object storage (reads)
at a similar speed, 1000 MiB/s (~128-256 KiB I/O size). This capacity ensures that the
cloud accelerator cache disk can remain as small as possible while sustaining maximum
throughput. Alternatively, a larger capacity, slower disk technology (such as Microsoft
Azure standard HDD magnetic disks) can be used such that the client ingestion data that
has been staged to accelerator disk cache can be transmitted to object storage over a
longer period of the day (extending past the backup window). However, be aware that data
residing only in the cloud accelerator cache is unprotected in the sense that only a single
copy of the data exists. The redundancy protection inherent in cloud object storage is
available only if the data is transmitted to object storage. Generally, Microsoft Azure block
disks provide acceptable durability.
2.2.2 Sizing the Cloud Accelerator Cache
Figure 4 can be used as a rough guide for the appropriate disk technology to use based on
object storage and object storage network capability. At the top left, Microsoft Azure Blob
object storage is reachable over the same LAN (for example, within the same Microsoft
Azure region). As we move from top to bottom in the figure, the network capability
becomes slower (10 Gbps to 1 Gbps), while the storage capacity requirements increase to
store data that is queued up in the accelerator disk cache awaiting transfer to object
storage. In the case of slower network-to-object storage, it is more likely that
(asynchronous) data ingestion from local client systems can run at a f aster rate than cloud
transf er. In such a scenario, client ingestion data begins to fill the cache disk location faster
than the data can be transferred to object storage and cleared from the cache. As of IBM
Spectrum Protect V8.1.2, an internal throttling mechanism is in place to slow client
ingestion speeds if the cloud accelerator cache disk area begins nearing capacity.
However, to avoid slowing client ingestion in cases where ingestion exceeds the cloud
transf er rate (which might not be desired), the accelerator cache should be sized with a
larger capacity, perhaps up to a single day’s worth of back-end client ingestion (after data
deduplication and compression).
Figure 4 : Sizing the cloud accelerator cache for Microsoft Azure
49
2.2.4 Microsoft Azure: Medium and Small Instance Considerations
The medium, small, and extra-small Microsoft Azure instances as defined in this document
were never built nor tested. However, the specifications in the table above provide
guidance for the relative instance types and disk configurations that would be necessary to
meet the requirements for ingestion throughput on medium and small systems. Instances
must possess the necessary throughput capability to the managed Azure disk layer,
including premium SSD disks. Additionally, the instances must have the needed Ethernet
network capability to transmit data at an acceptable rate to meet ingestion needs.
Premium SSD managed disks proved to be necessary for the IBM Spectrum Protect
database, active log, and cloud accelerator cache disk as the only realistic Azure disk
type capable of satisfying IOPS and throughput needs for those roles. Managed disks as
opposed to unmanaged disks should be chosen in all cases to preserve and persist the
state of the IBM Spectrum Protect server data independent of the instance state.
APPENDIX
Disk Benchmarking
As a part of vetting a Microsoft Azure test configuration, disk benchmark tests were
perf ormed to validate the capability of the disk volumes underlying the IBM Spectrum
Protect database and cloud accelerator cache. From a database point of view, this vetting
was done to ensure that the volumes were sufficiently capable from an IOPS perspective
to support the 8 KiByte random mixed write and read workload that a busy Blueprint-level
system would demand. From a cloud cache standpoint, the vetting was performed to
ensure that overlapped 128-256 KiByte write and read throughput could achieve a rate
high enough such that the server’s bottleneck for IO would be at the instance-to-object
storage network level and not the disk level. The goal was to ensure that the disk could
perf orm at a rate such that the IBM Spectrum Protect server could utilize it during
overlapped ingest and be able to stress the network link layer simultaneously.
Disk benchmarking was performed by using the tsmdiskperf.pl Perl script, provided as a
part of the Blueprint configuration scripts package found on the IBM Spectrum Protect
Blueprints page (References [1]). Execution of the script was performed as follows:
perl tsmdiskperf.pl workload=stgpool fslist=directory_list
perl tsmdiskperf.pl workload=db fslist=directory_list
With a stgpool workload specification, the script drives a 256 KiByte IO pattern, whereas
with a db workload specification, the script drives 8 KiByte operations. For each directory
location provided as a value to the comma-separate fslist, a pair of IO processes is
created to perform writes and reads to test files that are generated in that directory.
Typical script output for a stgpool workload run resembles the following example:
======================================================================
: Number of filesystems: 1
: Mode: readwrite
: File size: 2 GB
======================================================================
: The test can take upwards of ten minutes, please be patient ...
===================================================================
: RESULTS:
: dm-2
===================================================================
The value that was extracted for the purposes of comparison and validation for stgpool
workloads was Avg Combined Throughput (MB/sec). The goal was to determine the
largest aggregate average throughput for writes and reads to the accelerator cache disk
51
such that overlapped backup ingest and transfer to object storage will not be constrained
by disk capability.
When running the tool in db workload mode, output should appear similar to the following
example:
======================================================================
: Workload type: db
: Number of filesystems: 1
: Mode: readwrite
: File size: 10 GB
======================================================================
: The test can take upwards of ten minutes, please be patient ...
===================================================================
: RESULTS:
: dm-6
For the db workload tests, the Avg Combined Throughput (MB/sec) and Average
IOPS metrics are significant for evaluating database disk capability. Here, the small
random IOPS capability of the underlying disk that is used for the IBM Spectrum Protect
Db2 database is of interest.
To conduct measurements of your own, increase the number of write/read threads pairs
(and directories) by 1 for each test until the average throughput, the average IOPS, or both
stabilize (level off). Benchmark test results are provided here as a ref erence for those who
want to build systems resembling those laid out in this document and who want to validate
that their system is capable of supporting the described level of ingestion. For each graph,
the horizontal axis represents the quantity of write/read thread pairs (and the number of
directory locations used with fslist). For each successive bar to the right, the thread
count affecting the disk is increased by 2 (1 write thread, 1 read thread, and adding a
directory location). The vertical axis represents total average throughput in MiBytes/s.
53
1. Populate a set of 10 1 GB files in a memory-mapped file system location to use as
source data for ingestion. The use of memory-mapped locations (such as tmpfs on
Linux) is pref erred to eliminate source disk bottlenecks. For a Linux system with at
least 11 GB of free RAM, run the following commands:
mkdir /mnt/ramdisk
mount –t tmpfs –o size=11g tmpfs /mnt/ramdisk
for I in `seq 10`; do dd if=/dev/urandom
of=/mnt/ramdisk/file.$I bs=1048576 count=1024; done
2. To run a set of automated tests scaling from 1 to 100 threads, run the
tsmobjperf.pl tool by using the recently created RAM disk files as source files to
upload. If more threads are specified than files are present in the source list, the tool
completes a round-robin action over these source files. Because all activity is read-
only, using separate file handles from memory-mapped sources, multiple threads
sharing the same file is not a concern. To test with 1, 10, 20, 30, 40, 50, 60, 70, 80, 90,
and 100 threads, run the tool as follows, specifying the arguments as needed:
perl tsmobjperf.pl type=type endpoints=endpoint user="user"
pass="pass" bucket=bucket min=1 max=100 step=10 flist=
comma_delimited_source_files_list
where:
• For Microsoft Azure, the user should be the Azure Account Name.
• For Microsoft Azure, the pass should be a SAS token that was configured for
the Azure Storage Account in that specific Azure region. This user must have
valid Azure credentials to create containers (buckets) and PUT and GET Blob
objects in the region indicated by the endpoint URL. These values align with
those that are used to define an IBM Spectrum Protect cloud-container storage
pool, either via the Operations Center or the command line.
• The bucket value should be a Microsoft Azure container name that the
credentialed user has create/PUT/GET access to and that exists in the object
storage system.
• The min and max values should indicate the minimum and maximum thread
counts to test.
• The step value should indicate the increase in thread count from test to test.
• The flist parameter should include a comma-delimited list of source files to
be used for multipart upload. These f iles should be the same as those created
earlier in the memory-mapped file system.
The f ollowing example is for execution of a Microsoft Azure based endpoint in the
West US 2 (Oregon) Region, using 100 upload threads with an existing test container:
perl tsmobjperf.pl type=azure endpoints=
https://spobjpvthot.blob.core.windows.net/ user=”spobjpvthot”
pass=”SASTOKENSTRING” bucket=testcontainer min=1 max=100 step=10
flist=
/mnt/ramdisk/file.1,/mnt/ramdisk/file.2,/mnt/ramdisk/file.3,/mnt
/ramdisk/file.4,/mnt/ramdisk/file.5,/mnt/ramdisk/file.6,/mnt/ram
disk/file.7,/mnt/ramdisk/file.8,/mnt/ramdisk/file.9
,/mnt/ramdisk/file.10
Each thread count test (for 1, 10, 20, or more threads) uploads 10 x 1 GB objects per
thread. The previous example would result in a total of 5510 GB of data being stored to
the test container after all thread tests are completed. The tool does not remove
objects that are created. You must remove the objects manually after test completion.
Upon completion, the tool generates aggregate throughput metrics that can be used to
estimate practical instance-to-object storage performance rates for IBM Spectrum
Protect. Data is provided in comma-separated-value format (CSV) and the output of
the SPObjBench.jar tool can be inspected upon completion as well:
===================================================================
: Type: azure
: Endpoints: https://spobjpvthot.blob.core.windows.net/
: User: spobjpvthot
: Pass: SASTOKENSTRING
: Min Threads: 1
: Thread Step: 10
: File List:
/mnt/ramdisk/file.1,/mnt/ramdisk/file.2,/mnt/ramdisk/file.3,/mnt/ramdisk/file.4,
/mnt/ramdisk/file.5,/mnt/ramdisk/file.6,/mnt/ramdisk/file.7,/mnt/ramdisk/file.8,
/mnt/ramdisk/file.9 ,/mnt/ramdisk/file.10
===================================================================
55
===================================================================
: Test Results
1, XXX, YYY
===================================================================
It can be benef icial to monitor network transmission rates externally from the tool, as
well, to validate the absolute throughput rate that is experienced to object storage over
the (Ethernet) network. The tool reports an aggregate rate that can include build-up
and tear-down overhead associated with the tool. Calculating an actual transmission
rate f rom the instance-to-object storage while the test is running can give an indication
of the throughput limits of the environment. On Linux, for example, the dstat utility
can be used to monitor several system metrics at once, including network interface
send and receive statistics, by using the basic command:
% dstat
usr sys idl wai hiq siq| read writ| recv send| in out | int csw
The dstat tool outputs a new line of metrics at a configured interval, much like the
standard iostat and netstat utilities. For the execution above, the net/total
send column is of greatest interest, here reported in MiBytes, as an indication of how
quickly data could be sent to the object storage endpoint from the server.
57
Microsoft Azure Instances
1. In the navigation pane on the left side of the window, either click Create a resource
and search f or Virtual machines in the search bar or click Virtual machines if it
appears in the list.
2. In the Virtual machines pane, click Add.
3. On the Basics tab, in the Subscription and Resource group sections, specify
appropriate settings.
4. In the Virtual machine name field, enter a name for the virtual machine.
5. In the Region and Availability options sections, specify appropriate settings. In the
Image section, specify an image, for example, Red Hat Enterprise Linux 7.6. Then,
click Select size.
6. In the Select a VM size pane, search for an appropriate virtual machine instance type,
f or example, e32s for a large Blueprint. Click on the instance type and then click the
Select button at the bottom.
59
7. In the Username and SSH public key sections, specify settings for initial instance
authentication.
8. Optionally, specify settings in the Inbound port rules section. Click the Next: Disks
button.
9. On the Disks tab, add IBM Spectrum Protect premium SSD and standard HDD block
disks that are appropriate for the planned cloud Blueprint size. For each disk added,
click the Change size link to set the appropriate size for the disk.
Warning: Microsoft Azure bills for disk usage based on the value in the Disk Tier field.
For each disk tier, the maximum size of a disk is listed. If a custom disk size is used
that is larger than the size specified, the next disk tier up is used, and usage is billed
f or this next size. For example, if a 200 GiB disk is chosen, you are billed for a 256 GiB
P15 tier disk. Guidance in this paper is to use disks only of the appropriate disk tier
size f or optimal capacity and billing.
10. When all disks are added for the appropriate cloud Blueprint size, click Next:
Networking.
11. On the Networking tab, in the Virtual network section, create a virtual network or
place the virtual machine into an existing network. Select appropriate subnet and
public IP values for the virtual machine.
12. Optionally, set public inbound ports and other options. Click Next: Management.
Tip: Place the IBM Spectrum Protect server virtual machine in the same virtual network
as the client systems that are being protected. In this way, you can help to ensure
optimal performance and minimize ingress and egress charges.
61
13. On the Management tab, add or customize the settings in the Azure Security Center
and Azure Active Directory sections for the virtual machine. Click Next: Advanced.
14. On the Advanced tab, add any extensions or customizations that you require. Click
Next: Tags.
15. On the Tags tab, add any tags that you require for this virtual machine. Click Next:
Review + create.
16. On the Review + create tab, ensure that the virtual machine passes the validation test.
To create the virtual machine, click Create.
Microsoft Azure Blob Object Storage
1. In the navigation pane on the left side of the window, either click Create a resource
and search f or Storage accounts in the search bar or click Storage accounts if it
appears in the list.
63
2. In the Storage accounts pane, click Add.
3. On the Basics tab, in the Subscription and Resource group sections, select
appropriate settings. Specify settings in the Storage account name and Location
f ields. For the performance level, select Standard. For the account kind, select Blob
Storage. For the replication setting, select the appropriate redundancy setting for your
Blob storage. The Locally-redundant storage (LRS) selection provides the lowest
cost option. For the access tier, select Hot. Click Next: Advanced.
4. On the Advanced tab, specify whether to require secure data transfer (HTTPS with
TLS) and other options. Click Next: Tags.
5. On the Tags tab, add any tags that you require for this storage account. Click Next:
Review + create.
6. On the Review + create tab, ensure that the storage account passes the validation
test. To create the storage account, click Create.
Af ter a Blob storage account is created, a shared access signature (SAS) can be
created along with a SAS token to use with IBM Spectrum Protect cloud-container
storage pools.
7. To create the SAS and SAS token, click the relevant storage account on the Storage
accounts pane. Click the Shared access signature link in the navigation pane for
the Blob storage account.
65
8. In the Shared access signature view, select an appropriate start and end range for
the SAS token based on your security needs. After a SAS token expires, another one
must be created, and the cloud-container storage pool must be updated with this new
token value. Read, Write, Delete, List, Add, and Create permissions are required for
cloud container storage pool access. Optionally, restrict access to certain IP addresses
and f or the HTTPS protocol only. In the Signing key section, select an appropriate
signing key. Click Generate SAS and connection string.
9. Copy the SAS token entry that appears below the Generate SAS and connection
string button and use this for IBM Spectrum Protect cloud-container storage pools.
67
REFERENCES
Notices
This information was developed for products and services offered in the US. This material might be available from IBM in
other languages. However, you may be required to own a copy of the product or product version in that language in order to
access it.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM
representative for information on the products and services curre ntly available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used.
Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be
used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program,
or service.
IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of
this document does not grant you any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual Property
Department in your country or send inquiries, in writing, to:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT
WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some
jurisdictions do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may
not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made to the
information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.
Any references in this information to non-IBM websites are provided for convenience only and do not in any manner serve
as an endorsement of those websites. The materials at those websites are not part of the materials for this IBM product and
use of those websites is at your own risk.
IBM may use or distribute any of the information you provide in any way it believes appropriate without incurring any
obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information
between independently created programs and other programs (including this one) and (ii) the mutual use of the information
which has been exchanged, should contact:
Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.
The licensed program described in this document and all licensed material available for it are provided by IBM under terms
of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent agreement between us.
69
The performance data discussed herein is presented as derived under specific operating conditions. Actual results may
vary.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non -IBM products. Questions on the capabilities of non-IBM
products should be addressed to the suppliers of those products.
This information is for planning purposes only. The information herein is subject to change before the products described
become available.
This information contains examples of data and reports used in daily business operations. To illustrate them as c ompletely
as possible, the examples include the names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to actual people or business enterprises is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrate programming techniques on
various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to
IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application
programming interface for the operating platform for which the sample programs are written. These examples have not been
thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of
these programs. The sample programs are provided "AS IS", without warranty of any kind. IBM shall not be liable for any
damages arising out of your use of the sample programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp.,
registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other
companies. A current list of IBM trademarks is available on the web at "Copyright and trademark information" at
www.ibm.com/legal/copytrade.shtml.
Intel and Itanium are trademarks or registered trademarks of Intel Corporation o r its subsidiaries in the United States and
other countries.
The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of
Linus Torvalds, owner of the mark on a worldwide basis.
Microsoft is a trademark of Microsoft Corporation in the United States, other countries, or both.
Java™ and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
VMware is a registered trademark of VMware, Inc. or its subsidiaries in the United States and/or other jurisdictions.