IBM DS8000 SafeGuarded Copy

Transcription

Front coverIBM DS8000 Safeguarded Copy(Updated for DS8000 Release 9.1)Michael FrankenbergNick ClaytonRick PekoshMark WellsRedpaper

IBM RedbooksIBM DS8000 SafeGuarded Copy (Updated for DS8000Release 9.1)March 2021REDP-5506-01

Note: Before using this information and the product it supports, read the information in “Notices” on page v.Second Edition (March 2021)This edition applies to IBM DS8900F storage systems with IBM DS8000 Licensed Machine Code (LMC)7.9.10 (bundle version 89.10.xx.x), referred to as Release 9.1.This document was created or updated on March 2, 2021. Copyright International Business Machines Corporation 2021. All rights reserved.Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP ScheduleContract with IBM Corp.

ContentsNotices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .vTrademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viPreface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viiAuthors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viiiNow you can become a published author, too . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ixComments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ixStay connected to IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ixChapter 1. Safeguarded Copy introduction and concepts . . . . . . . . . . . . . . . . . . . . . . . 11.1 The need to protect data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.1.1 What is logical corruption? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.1.2 Regulatory requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31.1.3 Use cases for data protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.1.4 Requirements for logical corruption protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51.2 IBM DS8000 Safeguarded Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51.2.1 Previous IBM DS8000 logical corruption protection capabilities . . . . . . . . . . . . . . . 51.2.2 Objectives for Safeguarded Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71.2.3 Safeguarded Copy basic operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81.2.4 Managing Safeguarded Copy backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.2.5 Safeguarded Copy backup capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.2.6 Safeguarded Copy recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111.2.7 Other considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Chapter 2. Safeguarded Copy planning and considerations . . . . . . . . . . . . . . . . . . . .2.1 Information required to plan a Safeguarded Copy implementation . . . . . . . . . . . . . . . .2.2 HA, DR, and HA/DR with Safeguarded Copy topologies . . . . . . . . . . . . . . . . . . . . . . .2.2.1 2-Site HA and DR and Safeguarded Copy topologies . . . . . . . . . . . . . . . . . . . . .2.2.2 3-site HA/DR and Safeguarded Copy topologies . . . . . . . . . . . . . . . . . . . . . . . . .2.2.3 4-site HA/DR and Safeguarded Copy topologies . . . . . . . . . . . . . . . . . . . . . . . . .2.3 Hardware and software prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.4 Safeguarded Copy Management software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.4.1 IBM Copy Services Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.4.2 IBM GDPS LCP Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.5 Safeguarded Copy sizing considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.5.1 Safeguarded Copy Backup capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.5.2 Recovery and Safeguarded Copy source volumes. . . . . . . . . . . . . . . . . . . . . . . .2.5.3 Safeguarded Copy capacity sizing methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.5.4 General Safeguarded Copy sizing considerations . . . . . . . . . . . . . . . . . . . . . . . .2.6 Safeguarded Copy performance considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.7 Monitoring Safeguarded Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.7.1 Using IBM CSM for Safeguarded Copy session monitoring . . . . . . . . . . . . . . . . .2.7.2 Safeguarded Copy capacity warning messages for z/OS. . . . . . . . . . . . . . . . . . .2.7.3 DS8000 DS CLI and Storage Management GUI messages . . . . . . . . . . . . . . . . .2.8 Security considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.8.1 More DS8000 security considerations and CSM “dual control” . . . . . . . . . . . . . .2.9 Safeguarded Copy Backup data validation and restore considerations . . . . . . . . . . . .2.9.1 Data validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.9.2 Restore Safeguarded Copy backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Copyright IBM Corp. 2021. All rights 555575758iii

2.10 Configuration changes considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.10.1 Adding copy sets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.10.2 Removing copy sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.10.3 Dynamic Safeguarded Copy Backup capacity expansion. . . . . . . . . . . . . . . . . .2.11 Safeguarded Copy considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6060616262Chapter 3. Safeguarded Copy capacity sizing by using the CSM ESESizer functions 653.1 Introducing the ESESizer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663.2 IBM Copy Service Manager ESESizer session overview and prerequisites . . . . . . . . . 673.3 Preparing and configuring an ESESizer session for querying DS8000 WM bitmap . . . 673.3.1 Preparing CSM for query DS8000 WM bitmap with the ESESizer session . . . . . 673.3.2 Creating an ESESizer session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 703.3.3 Configure the ESESizer session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733.3.4 Managing the ESESizer session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753.3.5 ESESizer session considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783.4 Capacity sizing based on the ESESizer output files . . . . . . . . . . . . . . . . . . . . . . . . . . . 783.4.1 ESEsizer output files content overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783.4.2 ESESizer session properties settings for using the provided excel spreadsheets 813.4.3 Provided Excel spreadsheets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 813.4.4 Excel spreadsheet calculations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 863.4.5 Excel spreadsheet volume-level Safeguarded Copy Solution Summary calculations883.4.6 Excel spreadsheet box-level Safeguarded Copy calculations . . . . . . . . . . . . . . . 903.5 Safeguarded Copy capacity sizing overview and example . . . . . . . . . . . . . . . . . . . . . . 923.5.1 Safeguarded Copy capacity sizing overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923.5.2 Capacity sizing example for Safeguarded Copy . . . . . . . . . . . . . . . . . . . . . . . . . . 94Chapter 4. Safeguarded Copy implementation and management . . . . . . . . . . . . . . . . 994.1 Implementing a Safeguarded Copy environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004.1.1 Configuring the Safeguarded Copy Backup capacity . . . . . . . . . . . . . . . . . . . . . 1014.1.2 Creating a Safeguarded Copy session with IBM Copy Services Manager . . . . . 1054.2 Managing a Safeguarded Copy environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1094.2.1 Verifying and modifying the Safeguarded Copy session properties . . . . . . . . . . 1094.2.2 Creating a Safeguarded Copy Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1124.2.3 Expiring a Safeguarded Copy Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204.2.4 Recovering a Safeguarded Copy Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1234.2.5 Expanding Safeguarded Virtual Capacity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1254.2.6 Other Safeguarded Copy-related Copy Services Manager operations. . . . . . . . 1284.2.7 Other Safeguarded Copy-related DS CLI and Storage Management GUI operations132Appendix A. Other Safeguard Copy topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Safeguarded Copy topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ivIBM DS8000 SafeGuarded Copy (Updated for DS8000 Release 9.1)139139139139139

NoticesThis information was developed for products and services offered in the US. This material might be availablefrom IBM in other languages. However, you may be required to own a copy of the product or product version inthat language in order to access it.IBM may not offer the products, services, or features discussed in this document in other countries. Consultyour local IBM representative for information on the products and services currently available in your area. Anyreference to an IBM product, program, or service is not intended to state or imply that only that IBM product,program, or service may be used. Any functionally equivalent product, program, or service that does notinfringe any IBM intellectual property right may be used instead. However, it is the user’s responsibility toevaluate and verify the operation of any non-IBM product, program, or service.IBM may have patents or pending patent applications covering subject matter described in this document. Thefurnishing of this document does not grant you any license to these patents. You can send license inquiries, inwriting, to:IBM Director of Licensing, IBM Corporation, North Castle Drive, MD-NC119, Armonk, NY 10504-1785, USINTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION “AS IS”WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITEDTO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR APARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of express or implied warranties incertain transactions, therefore, this statement may not apply to you.This information could include technical inaccuracies or typographical errors. Changes are periodically madeto the information herein; these changes will be incorporated in new editions of the publication. IBM may makeimprovements and/or changes in the product(s) and/or the program(s) described in this publication at any timewithout notice.Any references in this information to non-IBM websites are provided for convenience only and do not in anymanner serve as an endorsement of those websites. The materials at those websites are not part of thematerials for this IBM product and use of those websites is at your own risk.IBM may use or distribute any of the information you provide in any way it believes appropriate withoutincurring any obligation to you.The performance data and client examples cited are presented for illustrative purposes only. Actualperformance results may vary depending on specific configurations and operating conditions.Information concerning non-IBM products was obtained from the suppliers of those products, their publishedannouncements or other publicly available sources. IBM has not tested those products and cannot confirm theaccuracy of performance, compatibility or any other claims related to non-IBM products. Questions on thecapabilities of non-IBM products should be addressed to the suppliers of those products.Statements regarding IBM’s future direction or intent are subject to change or withdrawal without notice, andrepresent goals and objectives only.This information contains examples of data and reports used in daily business operations. To illustrate themas completely as possible, the examples include

The Safeguarded Copy function is integrated in the IBM DS8000 microcode and supported on DS8880 storage system models with micro code release 8.5 or above and on all DS8900F storage