You are on page 1of 131

VERITAS NetBackup™ 5.

0
Shared Storage Option

System Administrator’s Guide


for UNIX and Windows

N10259C
Disclaimer
The information contained in this publication is subject to change without notice. VERITAS Software
Corporation makes no warranty of any kind with regard to this manual, including, but not limited to,
the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software
Corporation shall not be liable for errors contained herein or for incidental or consequential damages
in connection with the furnishing, performance, or use of this manual.

VERITAS Legal Notice


Copyright © 2000-2003 VERITAS Software Corporation. All rights reserved. VERITAS, VERITAS
Software, the VERITAS logo, VERITAS NetBackup, VERITAS Backup Exec, and all other VERITAS
product names and slogans are trademarks or registered trademarks of VERITAS Software
Corporation.VERITAS, the VERITAS Logo, VERITAS NetBackup Reg. U.S. Pat. & Tm. Off. Other
product names and/or slogans mentioned herein may be trademarks or registered trademarks of their
respective companies.
Portions of this software are derived from the RSA Data Security, Inc. MD5 Message-Digest
Algorithm. Copyright 1991-92, RSA Data Security, Inc. Created 1991. All rights reserved.
VERITAS Software Corporation
350 Ellis Street
Mountain View, CA 94043
USA
Phone 650–527–8000 Fax 650–527–2901
www.veritas.com

Third-Party Copyrights
ACE 5.2A: ACE(TM) is copyrighted by Douglas C.Schmidt and his research group at Washington University and University of California, Irvine,
Copyright (c) 1993-2002, all rights reserved.
IBM XML for C++ (XML4C) 3.5.1: Copyright (c) 1999,2000,2001 Compaq Computer Corporation; Copyright (c) 1999,2000,2001 Hewlett-Packard
Company; Copyright (c) 1999,2000,2001 IBM Corporation; Copyright (c) 1999,2000,2001 Hummingbird Communications Ltd.; Copyright (c)
1999,2000,2001 Silicon Graphics, Inc.; Copyright (c) 1999,2000,2001 Sun Microsystems, Inc.; Copyright (c) 1999,2000,2001 The Open Group; All
rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to
deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies
of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission
notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting
documentation.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
JacORB 1.4.1: The licensed software is covered by the GNU Library General Public License, Version 2, June 1991.
Open SSL 0.9.6: This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit. (http://www.openssl.org/)
TAO (ACE ORB) 1.2a: TAO(TM) is copyrighted by Douglas C. Schmidt and his research group at Washington University and University of
California, Irvine, Copyright (c) 1993-2002, all rights reserved.
Revision History for NetBackup 5.0
The following table summarizes the revisions made to this document for NetBackup
release 5.0. See the release notes for more detailed information.

Release Date Description

NetBackup 5.0 December 2003 Original version for this release.

Revision History for NetBackup 5.0 iii


iv NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Contents
Revision History for NetBackup 5.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
What Is In This Guide? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
How To Use This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Getting Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xv
NetBackup Manuals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvi
Related Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Accessibility Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix

Chapter 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
What is SSO? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
SSO is An Extension of Media Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
A SAN is Not Required for SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
SSO Related Terms and Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Shared Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Backup Exec Shared Storage Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Library Sharing or Robot Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Media Servers and SAN Media Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Sharing Drives Between NetBackup and Other Applications . . . . . . . . . . . . . . . . . . . 3
Benefits of SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Sharing of Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

v
Takes Advantage of Fibre Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Reduces Storage Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Requires Fewer Drives for Restore Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Provides Fault Tolerance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Provides Drive Resiliency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Ability to Back Up to Locally-Attached Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Getting SSO Installed and Running . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
What Are SAN and Fibre Channel? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Storage Area Networks (SAN) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Fibre Channel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Fibre Channel Topologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Fibre Channel Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Fibre Channel Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
SAN Component Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Chapter 2. Configuring Your SSO Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11


General Configuration Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Configuration Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Configuring Windows Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Using the Media Manager Device Configuration Guide . . . . . . . . . . . . . . . . . . . . . . 14
Device Drivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Logical to Physical Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Multiple Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Configuring UNIX Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Using the Media Manager Device Configuration Guide . . . . . . . . . . . . . . . . . . . . . . 15
Solaris Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
SSO Configurations With More Than 16 Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . 16
Solaris Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
IRIX Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
TRU64 Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

vi NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
HP-UX Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Linux Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
AIX Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Example SSO Configuration Matrix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Fibre Channel Mapping Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Fibre Channel Configuration Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Hardware Components in This Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Files Changed in This Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
NetBackup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
HBA-Specific . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Chapter 3. Verifying Your SSO Hardware Is Connected and Working . . . . . . . . . . . 29


Verifying Your Configuration On UNIX Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Verifying Your Configuration On Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . 30

Chapter 4. Installing the Shared Storage Option . . . . . . . . . . . . . . . . . . . . . . . . . . . .31


System Requirements for SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
General System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
NetBackup (Media Manager) Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
VERITAS Maintenance Patch Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Volume Database Host (Device Allocation Host) Requirements . . . . . . . . . . . . . . . 32
UNIX and Microsoft Windows System Requirements . . . . . . . . . . . . . . . . . . . . . . . . 33
SSO Restrictions and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
SSO Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Enable SSO on All Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Using the STK SN6000 With NetBackup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Shared Drives License Key Required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Chapter 5. Configuring SSO Devices and Media In Media Manager . . . . . . . . . . . . . 37


Why You Should Use the NetBackup Wizards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Contents vii
Using One of the NetBackup Device Configuration Wizards . . . . . . . . . . . . . . . . . . . . 38
Using the Device Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Using the Shared Drive Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Device Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Wizard Uses Device Serialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Device Configuration Wizard Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
What To Expect In The Device Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . 42
Running the Device Configuration Wizard for the First Time . . . . . . . . . . . . . . . . . 44
Running the Wizard to Update Your Configuration after a Device Change . . . . . 45
Running the Device Configuration Wizard More Than Once . . . . . . . . . . . . . . . . . 46
Adding Shared Drives in ACS Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Adding Shared Drives in TL8, TLD, or TLH Robots . . . . . . . . . . . . . . . . . . . . . . . . . 46
Adding Shared Drives in TLM Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Adding Shared Standalone Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Configuration Issues With Devices That Do Not Support Serialization . . . . . . . . . 47
Robot or Drive Does Not Return a Serial Number . . . . . . . . . . . . . . . . . . . . . . . . 47
Robot Does Not Return Serial Numbers For Each of Its Drives . . . . . . . . . . . . . 47
Robot Returns Only The Number of Drives In The Robot . . . . . . . . . . . . . . . . . 48
Determining If You have Devices That Do Not Support Serialization . . . . . . . 48
If You Do Have Devices That Do Not Support Serialization . . . . . . . . . . . . . . . 48
Completing Your Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Troubleshooting Network Configuration Problems . . . . . . . . . . . . . . . . . . . . . . . . . 49
Starting the Device Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Shared Drive Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
What To Expect In the Shared Drive Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Configuration Information Required For the Shared Drive Wizard . . . . . . . . . 51
Shared Drive Wizard Does Not Configure Robots . . . . . . . . . . . . . . . . . . . . . . . . 52
Shared Drive Wizard Does Not Use Device Serialization . . . . . . . . . . . . . . . . . . 52
The Last Screen of the Shared Drive Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Configuring Shared Drives in Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

viii NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Changing an Existing Shared Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Configuring the DAS Server for TLM Robot Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Using the Volume Configuration Wizard to Configure Media . . . . . . . . . . . . . . . . . . . 55
Volume Configuration Wizard Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
What To Expect In The Volume Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . 55
Before You Start the Volume Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . 56
Starting the Volume Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Using Alternate Interfaces for SSO Device Configuration . . . . . . . . . . . . . . . . . . . . . . . . 57
tpconfig menus (UNIX) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
tpconfig Command Line Interface (UNIX or Windows) . . . . . . . . . . . . . . . . . . . . . . 57

Chapter 6. Verifying Your SSO Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59


Verifying Your Configuration On Windows Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Verifying Your Configuration On UNIX Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Chapter 7. Configuring SSO in NetBackup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67


Configuring Storage Units and Backup Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Configuring Storage Units for Each Media Server (or SAN Media server) . . . . . . . 67
Reserving a Drive for NetBackup Restore Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuring a Backup Policy for Each Media Server (or SAN Media Server) . . . . 68
Directing a Media Server (or SAN Media Server) To Use Its Own Drives . . . . . . . 68
MUST_USE_LOCAL_DRIVE Parameter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Drive Allocation Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Duplication Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Chapter 8. Using SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71


Using the Device Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Drive Status List of the Device Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Media and Device Management Summary Reports . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Media and Device Management Configuration Analyzer . . . . . . . . . . . . . . . . . . . . . 74
Managing Shared Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Contents ix
Changing the Operating Mode for a Shared Drive . . . . . . . . . . . . . . . . . . . . . . . 75
Adding or Changing a Comment for a Shared Drive . . . . . . . . . . . . . . . . . . . . . 76
Performing Drive Cleaning Functions for a Shared drive . . . . . . . . . . . . . . . . . . 76
SSO Configuration Options for the vm.conf File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
AVRD Pending Status Delay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Device Host for Configuration Analyzer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
SSO DA Re-register Interval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
SSO DA Retry Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
SSO Host Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Scan Ability Factor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Throughput Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

Chapter 9. SCSI Reserve/Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81


Background Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
NetBackup Releases Prior to NetBackup 4.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
NetBackup 4.5 and Later Releases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
SCSI Reserve/Release Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
How NetBackup Uses SCSI Reserve/Release Commands . . . . . . . . . . . . . . . . . . . . . . . 83
Issuing the Reserve . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Checking for Data Loss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Possible Causes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Disabling the Position Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Checking for Tape/Driver Configuration Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Possible Causes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Disabling the Position Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Issuing the Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Error Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
SCSI Reserve/Release Logging and Conflict Notification . . . . . . . . . . . . . . . . . . . . 86
Reservation Conflict . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Server Operating System Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

x NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Server Operating System Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Issuing Reset Commands to Break a Reservation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Controlling SCSI Reserve/Release . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
SCSI Reserve/Release Requirements and Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Chapter 10. Troubleshooting Tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91


SSO Hardware Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Device Boot Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
SSO Software Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Media Manager Configuration Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Operating System Guidelines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Common Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Frequently Asked Questions (FAQ) About SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Chapter 11. SSO Reference Topics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97


Supported SSO Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Supported Robot Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Supported Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
SSO Components in Media Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
vmd/DA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Example of a SSO Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Scan Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
How the Scan Host is Determined . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
The Scan Host Can Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Device Allocation Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
How the Device Allocation Host is Determined . . . . . . . . . . . . . . . . . . . . . . . . . 101
Example Process Flow of SSO Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Where to Go for More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Background Information on Device Discovery and Serialization . . . . . . . . . . . 104

Contents xi
Configuring Tape Drives and Robotic Libraries . . . . . . . . . . . . . . . . . . . . . . . . . 104
Configuring Shared Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Configuring Fibre Channel on Solaris Platforms . . . . . . . . . . . . . . . . . . . . . . . . 104
ACS Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
TLH Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
TLM Robots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Support Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

xii NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Preface
The Shared Storage OptionTM (SSO) is available as a separately licensed and priced
software option available only with VERITAS NetBackupTM Enterprise Server. SSO runs on
Windows and UNIX servers (see “Supported Servers” on page 97) where NetBackup is
installed and requires appropriate hardware connectivity.
SSO is an extension to tape drive allocation and configuration for NetBackup Media
Manager. Media Manager is the component of NetBackup and VERITAS Storage
MigratorTM that manages devices and media.
The main audience for this guide is the system administrator responsible for installing
SAN hardware, and installing and configuring SSO software.
This guide assumes a thorough knowledge of UNIX and Windows operating systems and
hardware device configuration.

What Is In This Guide?


This guide contains the following chapters and an index, and is organized as follows:

Introduction to SSO
◆ “Introduction” on page 1 provides an overview of SSO and SAN. This chapter also
includes a table of the steps you need to follow to install and use SSO, and their
chapter locations in this guide.

Installation, Configuration, and Usage


◆ “Configuring Your SSO Hardware” on page 11 provides a general procedure to follow
when configuring or changing your hardware configuration for use with SSO.
◆ “Verifying Your SSO Hardware Is Connected and Working” on page 29 provides
information on verifying your hardware configuration.
◆ “Installing the Shared Storage Option” on page 31 contains information about
installing SSO software.

xiii
How To Use This Guide

◆ “Configuring SSO Devices and Media In Media Manager” on page 37 explains how to
define your SSO configuration in Media Manager.
◆ “Verifying Your SSO Configuration” on page 59 provides information on verifying
your Media Manager SSO configuration.
◆ “Configuring SSO in NetBackup” on page 67 explains using the NetBackup storage
unit and backup policy management interfaces to use SSO.
◆ “Using SSO” on page 71 explains how to obtain Media Manager SSO configuration
information and fine tune SSO.

Advanced Topics
◆ “SCSI Reserve/Release” on page 81 provides information on the use of SCSI
reserve/release commands by SSO to improve data integrity in an SSO configuration.
◆ “Troubleshooting Tips” on page 91 provides some ideas for troubleshooting SSO
problems.
◆ “SSO Reference Topics” on page 97 contains important SSO reference topics.

How To Use This Guide


This version of this SSO guide
◆ Is intended for use only with NetBackup Enterprise Server installed on UNIX servers
or Windows servers.
◆ Is based on the capabilities and features of the NetBackup 5.0 release.
◆ Contains many topics that refer to software and hardware configuration in general
terms. In these topics, both Windows and UNIX servers are implied.
Some topics in this guide are specific to Windows servers or to specific Windows
servers only. Also, some topics are specific to UNIX servers or to specific UNIX
servers only. The intended servers for these topics are noted in the text.
◆ Covers installation, configuration, and verification of SSO-related hardware in
general terms. SSO runs with a multitude of hardware configurations; however, this
guide provides only minimal configuration information for specific combinations of
vendor hardware products, such as bridges and switches.

xiv NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Getting Help

Getting Help
Use the VERITAS Technical support web site to get help for NetBackup if you have
questions.

Accessing the VERITAS Technical Support Web Site


The VERITAS Technical Support Web site allows you to do any of the following:
◆ obtain updated information about NetBackup, including system requirements,
supported platforms, and supported peripherals
◆ contact the VERITAS Technical Support staff and post questions to them
◆ get the latest patches, upgrades, and utilities
◆ view the NetBackup Frequently Asked Questions (FAQ) page
◆ search the knowledge base for answers to technical support questions
◆ receive automatic notice of product updates
◆ find out about NetBackup training
◆ read current white papers related to NetBackup
The address for the VERITAS Technical Support Web site follows:
http://support.veritas.com

Using VERITAS Telephone and E-mail Support


Telephone support for NetBackup is only available with a valid support contract. To
contact VERITAS for technical support, dial the appropriate phone number listed on the
Technical Support Guide included in the product box and have your product license
information ready for quick navigation to the proper support group.

▼ To locate the telephone support directory on the VERITAS web site

1. Open http://support.veritas.com in your web browser.

2. Click the Phone Support icon. A page that contains VERITAS support numbers from
around the world appears.

▼ To contact support using E-mail on the VERITAS web site

1. Open http://support.veritas.com in your web browser.

2. Click the E-mail Support icon. A brief electronic form will appear and prompt you to:

Preface xv
NetBackup Manuals

◆ Select a language of your preference


◆ Select a product and a platform
◆ Associate your message to an existing technical support case
◆ Provide additional contact and product information, and your message

3. Click Send Message.

NetBackup Manuals
The following manuals, along with the online help, comprise the NetBackup
documentation set. For a complete list of related documents, see the NetBackup release
notes. Depending on your configuration, other documents may also be required.
◆ VERITAS NetBackup Commands for UNIX
NetBackup_Commands_UNIX.pdf
Describes NetBackup commands and processes that can be executed from a UNIX
command line.
◆ VERITAS NetBackup Commands for Windows
NetBackup_Commands_Windows.pdf
Describes NetBackup commands and processes that can be executed from a Windows
command prompt.
◆ VERITAS NetBackup Installation Guide for UNIX
NetBackup_Install_UNIX.pdf
Explains how to install NetBackup software on UNIX-based platforms.
◆ VERITAS NetBackup Installation Guide for Windows
NetBackup_Install_Windows.pdf
Explains how to install NetBackup software on Windows-based platforms.
◆ VERITAS NetBackup Media Manager Device Configuration Guide for UNIX and Windows
MediaMgr_DeviceConfig_Guide.pdf
Explains how to add device drivers and perform other system-level configurations for
storage devices and media servers (or SAN media servers) that are supported by
NetBackup Media Manager.
◆ VERITAS NetBackup Media Manager System Administrator’s Guide for UNIX
MediaMgr_AdminGuide_Unix.pdf

xvi NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
NetBackup Manuals

Explains how to configure and manage the storage devices and media on UNIX
servers running NetBackup.
◆ VERITAS NetBackup Media Manager System Administrator’s Guide for Windows
MediaMgr_AdminGuide_Win.pdf
Explains how to configure and manage the storage devices and media on Windows
servers running NetBackup.
◆ VERITAS NetBackup Release Notes for UNIX and Windows
NetBackup_Release_Notes.pdf
Provides important information about NetBackup on UNIX- and Windows-based
servers, such as the platforms and operating systems that are supported and
operating notes that may not be in the NetBackup manuals or the online help.
◆ VERITAS NetBackup System Administrator's Guide for UNIX, Volume I
NetBackup_AdminGuideI_UNIXServer.pdf
Explains how to configure and manage NetBackup on a UNIX server, including
managing storage units, backup policies, catalogs and host properties.
◆ VERITAS NetBackup System Administrator's Guide for UNIX, Volume II
NetBackup_AdminGuideII_UNIXServer.pdf
Explains additional NetBackup features such as access control and enhanced
authorization and authentication. The guide also discusses using NetBackup with
AFS and Intelligent Disaster Recovery (IDR).
◆ VERITAS NetBackup System Administrator’s Guide for Windows, Volume I
NetBackup_AdminGuideI_WinServer.pdf
Explains how to configure and manage NetBackup on a Windows server, including
managing storage units, backup policies, catalogs and host properties.
◆ VERITAS NetBackup System Administrator’s Guide for Windows, Volume II
NetBackup_AdminGuideII_WinServer.pdf
Explains additional NetBackup features such as access control and enhanced
authorization and authentication. The guide also discusses using NetBackup with
AFS and Intelligent Disaster Recovery (IDR).
◆ VERITAS NetBackup Troubleshooting Guide for UNIX and Windows
NetBackup_Troubleshoot_Guide.pdf
Provides troubleshooting information for UNIX- and Windows-based NetBackup
products, including Media Manager.
◆ VERITAS Storage Migrator Release Notes for UNIX

Preface xvii
Related Resources

StoMigrator_ReleaseNotes_UNIX.pdf
Provides information such as the platforms and operating systems that are supported
and operating notes that may not be in the Storage Migrator manuals.
◆ VERITAS Storage Migrator System Administrator’s Guide for UNIX
StoMigrator_AdminGuide_UNIX.pdf
Explains how to configure and manage Storage Migrator on a UNIX system.

Related Resources

Glossary
If you encounter unfamiliar terminology, consult the NetBackup online glossary. The
glossary contains terms and definitions for NetBackup and all additional NetBackup
options and agents.
The NetBackup online glossary is included in the NetBackup help file.

▼ To access the NetBackup online glossary

1. In the NetBackup Administration Console (or from the Backup, Archive, and Restore
client interface), click Help > Help Topics.

2. Click the Contents tab.

3. Double-click Glossary.

4. Click NetBackup Glossary of Terms.


The glossary displays in a help window. Use the scroll function to navigate through the
glossary.

Accessibility Features
NetBackup contains features that make the user interface easier to use by people who are
visually impaired and by people who have limited dexterity. Accessibility features
include:
◆ Support for assistive technologies such as screen readers and voice input (Windows
servers only)

xviii NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Conventions

◆ Support for keyboard (mouseless) navigation using accelerator keys and mnemonic
keys
For more information, see the NetBackup System Administrator’s Guide, Volume I.

Conventions
The following section explains typographical and other conventions used in this guide.

Product-Specific Conventions
The following term is used in the NetBackup documentation to increase readability while
maintaining technical accuracy.
◆ Microsoft Windows, Windows
Terms used to describe a specific product or operating system developed by
Microsoft, Inc. Some examples you may encounter in NetBackup documentation are,
Windows servers, Windows 2000, Windows Server 2003, Windows clients, Windows
platforms, or Windows GUI.
When Windows or Windows servers is used in the documentation, it refers to all of
the currently supported Windows operating systems. When a specific Windows
product is identified in the documentation, only that particular product is valid in that
instance.
For a complete list of Windows operating systems and platforms that NetBackup
supports, refer to the NetBackup Release Notes for UNIX and Windows or go to the
VERITAS support web site at http://www.support.veritas.com.

Typographical Conventions
Here are the typographical conventions used throughout the manuals:

Conventions

Convention Description

GUI Font Used to depict graphical user interface (GUI) objects, such as fields,
listboxes, menu commands, and so on. For example: Enter your
password in the Password field.

Preface xix
Conventions

Conventions (continued)

Convention Description

Italics Used for placeholder text, book titles, new terms, or emphasis. Replace
placeholder text with your specific text. For example: Replace filename
with the name of your file. Do not use file names that contain spaces.
This font is also used to highlight NetBackup server-specific or operating
system-specific differences. For example: This step is only applicable for
NetBackup Enterprise Server.

Code Used to show what commands you need to type, to identify pathnames
where files are located, and to distinguish system or application text that
is displayed to you or that is part of a code example.

Key+Key Used to show that you must hold down the first key while pressing the
second key. For example: Ctrl+S means hold down the Ctrl key while
you press S.

You should use the appropriate conventions for your platform. For example, when
specifying a path, use backslashes on Microsoft Windows and slashes on UNIX.
Significant differences between the platforms are noted in the text.
Tips, notes, and cautions are used to emphasize information. The following samples
describe when each is used.

Tip Used for nice-to-know information, like a shortcut.

Note Used for important information that you should know, but that shouldn’t cause any
damage to your data or your system if you choose to ignore it.

Caution Used for information that will prevent a problem. Ignore a caution at your own
risk.

Command Usage
The following conventions are frequently used in the synopsis of command usage.
brackets [ ]
The enclosed command line component is optional.
Vertical bar or pipe (|)
Separates optional arguments from which the user can choose. For example, when a
command has the following format:

xx NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Conventions

command arg1|arg2
In this example, the user can use either the arg1 or arg2 variable.

Navigating Multiple Menu Levels


When navigating multiple menu levels, a greater-than sign (>) is used to indicate a
continued action.
The following example shows how the > is used to condense a series of menu selections
into one step:

❖ Select Start > Programs > VERITAS NetBackup > NetBackup Administration
Console.
The corresponding actions could be described in more steps as follows:

1. Click Start in the task bar.

2. Move your cursor to Programs.

3. Move your cursor to the right and highlight VERITAS NetBackup.

4. Move your cursor to the right. First highlight and then click NetBackup
Administration Console.

Preface xxi
Conventions

xxii NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Introduction 1
The Shared Storage Option (SSO) is a separately licensed and priced VERITAS NetBackup
software option, and is available only with NetBackup Enterprise Server. SSO runs on
Windows and UNIX media servers (see “Supported Servers” on page 97) where
NetBackup is installed.
This software option is the Shared Drives option and the license key used to enable it is the
Shared Drives key.
SSO requires appropriate hardware connectivity, such as, fibre channel hubs or switches,
SCSI multiplexors, or SCSI-to-fibre bridges (see “Frequently Asked Questions (FAQ)
About SSO” on page 94).
This chapter contains the following topics:
◆ “What is SSO?”
◆ “Getting SSO Installed and Running”
◆ “What Are SAN and Fibre Channel?”

What is SSO?
SSO allows individual tape drives (stand-alone or in a robotic library) to be dynamically
shared between multiple NetBackup media servers or SAN media servers. Each media
server can access any of the shared drives as needed and each server ”owns” the drives it
has active. The shared drives are automatically allocated and deallocated as backup and
restore operations dictate. This allows data to be backed up directly to tape drives in a
SAN (Storage Area Network) configuration instead of moving data over the LAN—an
important advantage of a SAN.

SSO is An Extension of Media Manager


SSO is an important extension to tape drive allocation and configuration for NetBackup
Media Manager (see “SSO Components in Media Manager” on page 98). NetBackup and
Storage Migrator use Media Manager for configuration, allocation, and control of tape
drives and robotic libraries.

1
What is SSO?

SSO is a software solution (in NetBackup and Media Manager). SSO does not load firmware
in SAN devices or communicate with hub or switch APIs. SSO can communicate with hub
or switch APIs if the shared_drive_notify script is used.

A SAN is Not Required for SSO


SSO provides the management and coordination tools necessary to effectively share tape
resources in a SAN. SSO was designed to work with fibre channel networks, but it can
also be applied to environments that use SCSI switches or multi-initiator configurations.
SAN fibre is not required to use SSO.

SSO Related Terms and Concepts

Shared Drive
When the Shared Storage Option is installed, a tape drive that is shared among hosts is
termed a shared drive.

Backup Exec Shared Storage Option


The VERITAS NetBackup Shared Storage Option is not the same as the VERITAS Backup
Exec Shared Storage Option. The Backup Exec implementation of drive sharing does not
include support for UNIX servers and uses a different method for drive arbitration.

Library Sharing or Robot Sharing


Media Manager also manages distributed access from multiple servers to robotic tape
libraries (library sharing or robot sharing). However, this capability is not related to SSO
and should not be confused with SSO.

Media Servers and SAN Media Servers


VERITAS licenses media servers that can back up their own data or data from other
network clients as well. VERITAS also licenses SAN media servers that can only back up
their own data to shared drives—no backing up of data residing on other clients is
allowed.

2 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
What is SSO?

Sharing Drives Between NetBackup and Other Applications


There is no interoperability between NetBackup and Backup Exec SSO, and they cannot
share the same drives or robotics because of the different methods of drive arbitration that
are used.
NetBackup also does not share devices with other applications running on a system.
System commands that access drives that are configured in Media Manager (and are not
in the down state) can interfere with device control and may lead to data loss.

Benefits of SSO

Sharing of Tape Drives


SSO dynamically shares tape drives across multiple heterogeneous media servers (or SAN
media servers) running NetBackup, increasing the utilization of tape drives and
decreasing the total requirement for tape drives. Shared drives are managed across
multiple servers as backup and restore operations dictate. In essence, SSO provides the
ability to “move” tape drives to the backup or migration of data.
In a traditional environment where tape drives are directly SCSI-attached to a server
platform, the resource-allocation environment is static. Tape drives may be up or down,
but they can only be used by processes that are native to the media server.
In an SSO environment, every media server (or SAN media server) on the SAN can access
the tape drives. SSO coordinates and assures sequential access to shared drives. Tape
drives can be utilized more efficiently, because they don’t have to be idle just because a
single host is not using the drive (as in a traditional environment).

Takes Advantage of Fibre Channel


Allows fibre channel benefits, such as
◆ High data transfer rates.
Faster backup speeds provide choices. Instead of providing more central servers to
handle a pool of network clients, you can use SSO to get better performance on
systems by having a pool of drives to be shared by your existing servers without
dedicating tape drives to each system.
◆ Ability to route cables longer distances than with SCSI.
◆ Dynamic re-configuration without disconnecting and reconnecting cables.

Chapter 1, Introduction 3
What is SSO?

Reduces Storage Costs


Assume you have multiple large media servers, with each server requiring n drives to
meet its backup window. If you can schedule these backup windows at different times,
you can invest in only n drives, not n times the number of servers that are needed. Sharing
hardware through SSO reduces storage costs.

Requires Fewer Drives for Restore Jobs


You may wish to reserve drives for restores, but reserving one drive per server in a
traditional environment might be more overhead than you want. With SSO, you can
reserve one drive for all of your servers to share (see “Reserving a Drive for NetBackup
Restore Jobs” on page 68).

Provides Fault Tolerance


Assume you have a configuration with two servers sharing a library with two
drives—one drive is SCSI-attached to each server. This is a typical Media Manager library
sharing configuration. Now suppose one drive goes down. Without SSO, one of the
servers can no longer backup and restore data. With SSO, both servers share the
remaining drive, and backups and restores may just take longer than usual.

Provides Drive Resiliency


If a drive failure is detected from one server, NetBackup will initially down the drive only
on that media server. Other media servers (or SAN media servers) may still be able to
access the drive. The drive is marked up or down on a media-server basis.

Ability to Back Up to Locally-Attached Drives


SSO increases the number of situations where a platform that was formerly backed up as a
NetBackup client can be configured as a NetBackup media server or SAN media server
(see “Media Servers and SAN Media Servers” on page 2). This allows you to gain the
benefit of backing up to locally-attached tape drives.
For Storage Migrator, SSO increases the number of situations where a platform that was
using this products can be configured as a self-contained Storage Migrator.
The hardware cost of increasing or restoring LAN capacity is the cost of adding SAN
connectivity, not the cost of adding local tape drives.

4 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Getting SSO Installed and Running

Getting SSO Installed and Running


Follow the basic steps outlined in the table below. The chapter references are to chapters in
this guide.

Step Task Chapter Reference

1 Install and configure your SSO hardware. See “Configuring Your SSO
This includes SAN hardware and standalone equipment, as Hardware” on page 11.
well as robots.

2 Verify your SSO hardware. See “Verifying Your SSO


Use operating system tools to test and verify your Hardware Is Connected and
configuration. Make sure you can "see" your devices on the Working” on page 29.
SAN network.

3 Install all software that is necessary for SSO operation. See “Installing the Shared
This includes installing SSO and NetBackup patches, and Storage Option” on page 31.
may include installing NetBackup (this includes Media
Manager). A license key for SSO is also required.

4 Configure SSO See “Configuring SSO Devices


Where possible, use the Media Manager configuration and Media In Media
wizards to configure robots and shared drives, and to add Manager” on page 37.
media to the Media Manager volume database.

5 Verify your SSO configuration. See “Verifying Your SSO


Use Media Manager utilities to resolve any problems or Configuration” on page 59.
conflicts before putting your test SSO configuration into
production.

6 Configure NetBackup to use SSO. See “Configuring SSO in


Define NetBackup storage units and backup policies. NetBackup” on page 67.

7 Monitor your configuration. See “Using SSO” on page 71.


Use the SSO capabilities in Media Manager to check for
problems, fine tune SSO, and to monitor your SSO devices.

Chapter 1, Introduction 5
What Are SAN and Fibre Channel?

What Are SAN and Fibre Channel?


The following background topics provide an overview of Storage Area Networks and
fibre channel technology.

Storage Area Networks (SAN)


The building of networks between hosts and storage devices is called storage networking. A
network used to connect hosts and storage devices is called a storage area network (SAN).
SAN is a term that has been adopted by the storage industry and refers to a network of
multiple servers and storage devices connected together using fibre channel equipment.
The commodity-like qualities of fibre channel components have caused a widespread
adoption of this technology.
Disks, tape drives, and robots are commonly available with fibre channel interfaces.
Devices with SCSI interfaces can also be used in a SAN with the addition of SCSI-to-fibre
channel bridges (see “Fibre Channel Hardware” on page 9).
Tape devices have different usage characteristics from disk devices. Hosts generally
maintain a continuous dialog with disk devices. Since this dialog for tape devices tends to
be infrequent, SCSI-attached tape resources usually suffer poor utilization. Shared
connectivity for tape devices on a SAN boosts utilization by treating these devices as
shared resources.
Storage area network technology is gaining acceptance because it provides advantages
over traditional SCSI-based connections. The chief advantage is ease of configuration. All
hosts in a SAN can have equal visibility of all storage devices. From an operational
standpoint, a variety of procedures can be completed without re-cabling the environment,
as would be necessary using dedicated SCSI-attached devices.

Fibre Channel
Storage networking has been enabled by the performance and connectivity properties of
fibre channel. Fibre channel is the name given to the assembly of physical interconnect
hardware and the fibre channel protocol.
The basic connection to a fibre channel device is made by two serial cables, one carrying
in-bound data and the other carrying out-bound data. Despite the name, fibre channel can
run over fiber optic or twin-axial copper.
Fibre channel includes a communications protocol that was designed to accommodate
both network-related messaging (such as IP traffic) and device-channel messaging (such
as SCSI). True fibre-channel storage devices on a SAN are compatible with fibre channel
protocol. Other devices on a SAN use SCSI protocol when communicating with a
SCSI-to-fibre bridge.

6 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
What Are SAN and Fibre Channel?

Fibre Channel Topologies


Fibre channel protocol is designed to be low in overhead so it can function over a device
channel, yet flexible so messages have addresses and can be efficiently switched. Devices
that participate in fibre channel networking have names and identities. Fibre channel was
designed to be as adept for carrying storage protocols (SCSI, HIPPI, and IPI) as carrying
network protocols (IP and ATM).
At the lowest layers of the 5-layer protocol, fibre channel defines the following types of
device connections.

Point-to-Point

This topology is the closest to a SCSI connection. It consists of two fibre channel devices connected
directly together. The transmit fibre of one device goes to the receive fibre of the other device, and
vice versa. There is no sharing of the media, so the devices enjoy the total bandwidth of the link. A
link initialization is required of the two devices before communication can begin.

Arbitrated Loop (FC-AL)

This topology allows up to 126 devices to reside on a physical loop. Any device on the loop must
negotiate access to the loop in order to transfer data. The media is shared among the devices,
limiting each device's access.
Arbitrated loops are private in that devices on the loop are only visible to the host where the loop
is connected and only a minimal self-identification procedure is conducted at system startup.

Switched Fibre Channel (Fibre Channel Fabric or Fabric)

This topology is used to connect many (up to 224) devices in a cross-point switched configuration.
The benefit of this topology is that many devices can communicate at the same time and the media
can be shared. It also requires fibre channel switches.

Chapter 1, Introduction 7
What Are SAN and Fibre Channel?

Fibre Channel Addresses


There are a number of different types of addresses that may be used within a fibre channel
network.

World Wide Name (WWN)

A unique identifier that is assigned by the vendor to each node and port in a fibre channel
network.

Port Address Identifier

A 24 bit number. The upper 16 bits are assigned by the fabric, and usually indicate the physical
fabric controller and port that is being used by the device or host. The lower 8 bits are the
arbitrated loop physical address if using loop topology. The lower 8 bits are zero if using
point-to-point topology.

Fibre Channel Logical Unit Number (FC LUN)

A number assigned to devices which share a common port address identifier.

8 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
What Are SAN and Fibre Channel?

Fibre Channel Hardware


Common fibre channel hardware includes the following.

Fibre Channel Hub

A hub is an appliance with many fibre channel ports. Internally, the hub connects all the ports
together into a loop topology. Hubs are tools for connecting fibre channel devices together into an
arbitrated loop.

Fibre Channel Switch

At startup time, every device or host on a fabric network must log on providing an identity and an
address. Fibre channel switches catalog the names of all visible devices and hosts, and are able to
direct messages between any two points in the network. Switches can be interconnected in ring or
cascaded tree configurations to increase the number of device connections or to increase the
bandwidth between designated points in the network. Redundant fabric for high-availability
environments is constructed by connecting multiple switches to multiple hosts.

Host Bus Adapters (HBA)

These components link servers to fibre channel. HBAs are usually separate cards in the server.
Initially, fibre channel HBAs emulated SCSI-2 parallel interfaces to work with existing system
drivers (in most cases). Native fibre channel HBAs using SCSI-3 protocol are now available and
these HBAs may not be compatible with these older drivers.

SCSI to Fibre Bridges

Devices with SCSI interfaces can be connected to a fibre channel network using a SCSI-to-fibre
bridge. A bridge converts SCSI protocol to fibre channel protocol. Several manufacturers offer
bridges that can be used to connect SCSI tape drives and robots to a fibre channel network.

Chapter 1, Introduction 9
What Are SAN and Fibre Channel?

SAN Component Example


The following figure shows typical SAN components in a shared drive configuration.

Example SAN Configuration

SCSI Robot
and Fibre
SSO Master Server SCSI Channel drives
(UNIX or
Windows Server)
Fibre Channel
Host Bus Adapter

Hub (Arbitrated Loop)


Fibre Channel
Fibre Channel or
Switch (Fabric)
SCSI Bridge
Host Bus Adapter Fibre Channel

SSO Media Server SCSI


Native Fibre
(UNIX or Channel
SCSI Robot
Windows Server) Robot
and Drives
and Drives *

* Some robots have integrated bridges, but native fibre channel devices do not.

10 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Configuring Your SSO Hardware 2
This chapter contains the following topics:
◆ “General Configuration Procedure”
◆ “Configuring Windows Hosts”
◆ “Configuring UNIX Hosts”
◆ “Example SSO Configuration Matrix”
◆ “Fibre Channel Mapping Examples”
Also see the Reference Topics appendix of the NetBackup Media Manager System
Administrator’s Guide for information on replacing devices in an existing SSO
configuration.

General Configuration Procedure


Configuring your hardware for use with SSO includes the following general steps. See the
figure “Example SAN Configuration” on page 10 for a SAN terminology and
configuration overview.

1. Configure your SAN environment.

2. Attach robots and drives.

3. Get all of the servers to recognize these shared devices.


On Windows servers, attaching devices and getting the system to recognize these devices
is usually done by the operating system (in some instances you may have to install device
drivers).
For UNIX servers, such as on Sun Solaris, hardware configuration may be more
complicated, including modifying the sg driver configuration and other configuration
files.

11
General Configuration Procedure

Configuration Tasks
Some of the following tasks listed may be optional depending on your particular
hardware configuration. See the “Fibre Channel Configuration Example” on page 25 for a
more detailed example of configuring hardware for SSO on a Solaris host.
◆ Determine the physical location of each drive within the robot.
This is usually shown on the connectors to the drives or in the vendor documentation.

Note This task may not be needed if you are able to use Media Manager device discovery
(a part of the device configuration wizard). See “Device Configuration Wizard” on
page 40.

◆ Make all drive and robot hardware connections.


◆ Install SAN connecting hardware (for example, bridges, switches, or hubs).
◆ If fibre is part of your configuration and you are using a SCSI-to-fibre bridge,
determine the SCSI-to-fibre channel mapping for your tape devices.
Hard-wired SCSI IDs are converted to fibre channel LUNs that are presented to hosts
involved in the configuration. Understanding which LUNs map to which physical
SCSI IDs will ensure correct drive assignments. See “Fibre Channel Mapping
Examples” on page 19.
Familiarity with the hardware and various vendor configuration tools will help you
accomplish this task. See the vendor documentation for your bridge.
◆ Record the physical configuration.
When setting up an SSO configuration, it is helpful to record your hardware
information. Record the adapter, SCSI addresses, WWNs, and fibre channel LUNs to
which you connected each drive. It is also useful to record the version levels of
firmware and drivers.
For examples, see “Example SSO Configuration Matrix” on page 18 and the tables in
“Fibre Channel Mapping Examples” on page 19.
◆ Install and configure the appropriate drivers.
See your vendor documentation for instructions.
◆ On UNIX servers create any device files that are needed. Depending on the operating
system, these files may be created automatically by using a reconfiguration boot
(boot -r).
Create the device files for each drive based on the fibre channel LUNs of the drives
and adapters. Add the name of the device file to your notes to complete the
correlation between device files and physical drive location.

12 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
General Configuration Procedure

Use the device configuration guide (see “Using the Media Manager Device
Configuration Guide” on page 15) and the man pages that are available with the
operating system.
◆ On UNIX servers customize the operating system by modifying the appropriate
system configuration files. This task requires knowledge of the system files that use
the SSO environment and their formats.
For example on Sun Solaris systems, you may need to modify the sg, st, and HBA
driver files. See the Sun chapter of the NetBackup Media Manager device
configuration guide.
Modify the HBA driver files to bind fibre channel devices (WWN) to a specific target
ID. See your vendor documentation for specific syntax and more information.
◆ On Windows servers refer to the HBA documentation from the vendor for
instructions on configuring the HBA.
◆ Use any available hardware configuration interface to configure and ensure that the
configuration is what you expect. For example on Windows servers, you can use the
HyperTerminal interface to configure SCSI-to-fibre bridges (click Start - Programs -
Accessories - HyperTerminal).
Use the following general order when you configure and verify the hardware (start
with the robot and shared drives and work back to the host):

a. Robot and shared drives

b. Bridges

c. Hub or switches

d. Hosts
◆ If you experience errors during the installation and configuration of your SSO devices
and you suspect the operating system, refer to the operating system logs as described
in your operating system documentation.

Chapter 2, Configuring Your SSO Hardware 13


Configuring Windows Hosts

Configuring Windows Hosts

Using the Media Manager Device Configuration Guide


See the NetBackup Media Manager Device Configuration Guide for information on
configuration tasks. The tasks explained in the device configuration guide are similar to
the tasks required when configuring an SSO environment and in some cases, specific fibre
channel changes required may be explained.

Device Drivers
If you need to install tape device drivers, VERITAS recommends using the Windows tape
drivers and installer found on the support web site. Device drivers are also available on
the NetBackup installation CD.
You can download the latest tape drivers and tape installer from
http://support.veritas.com.
Search on the keywords tape device installer. These drivers support the tape devices listed
in the compatibility lists on this web site.
NetBackupTapeDeviceDriverInstall.exe will run only if NetBackup has been
installed.
Also see the Windows chapter of the NetBackup Media Manager device configuration
guide for more information on tape drivers.

Logical to Physical Mapping


Record the Windows tape device entries (logical to physical mapping). Also see “Example
SSO Configuration Matrix” on page 18 and the tables in “Fibre Channel Mapping
Examples” on page 19.

Note The following steps may not be needed if you are able to use Media Manager device
discovery (used by the device configuration wizard).
Device discovery is the recommended method of device configuration when the
configuration has serialized devices.
See “Device Configuration Wizard” on page 40.

14 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Configuring UNIX Hosts

▼ To record tape device entries

1. Note the fibre channel LUN assigned to the drive, and check the Windows Tape
Devices display from the Control Panel to determine which device name (for
example, Tape0) was assigned to the drive.

2. Correlate the SCSI target to the robot drive number by using the robot’s interface
panel or checking the indicators on the rear panel of the tape drive.

3. Determine the physical drive number by checking labels on the robot or by using the
vendor documentation for the robot.

Multiple Devices
If you have multiple devices connected to a fibre bridge, Windows may only see one LUN.
This will normally be the device with the lowest-ordered LUN.
This limitation occurs because of the default install settings for the device driver for some
fibre channel HBAs. See your vendor documentation to verify the settings.

Configuring UNIX Hosts

Using the Media Manager Device Configuration Guide


See the NetBackup Media Manager Device Configuration Guide for information on installing
and configuring drivers, and modifying the appropriate system configuration files.
The configuration tasks explained in the device configuration guide are similar to the
tasks required when configuring an SSO environment and in some cases specific fibre
channel changes may be explained.

Solaris Configurations
See the Sun4/SPARC chapter of the NetBackup Media Manager device configuration
guide. This chapter also contains information about the modifications needed in the sg
driver configuration to detect SCSI LUNs greater than 1 and SCSI targets greater than 7.
This change is often needed for fibre-attached devices.
Minimize the number of entries in the sg.conf file to minimize the time needed for
system boot, device discovery, and sgscan.

Chapter 2, Configuring Your SSO Hardware 15


Configuring UNIX Hosts

SSO Configurations With More Than 16 Tape Drives


When the number of tape devices that are configured approaches 16 or more (32 or more
drives for Linux hosts), the performance of device scanning and other inter process
communication within NetBackup may be diminished. This is because the default
maximum size of IPC message queues may not be large enough.
In these cases, communication between the rdevmi process on the scan hosts and the
oprd processes on the media servers can be interrupted when the number of messages
sent exceeds the maximum size of the queue.
VERITAS recommends increasing the maximum number of messages that can be created,
and the number of bytes per queue. Make the following changes to your operating system
depending upon your platform type. A reboot is necessary for the changes to take effect
Be aware that increasing the maximum size of the IPC message queue may increase the
amount of memory allocated to other IPC message queues on the system. The impact of
these changes should be fully assessed before they are implemented.

Solaris Hosts
Add the following statements to the /etc/system file.
# Increase the maximum number of messages that can be created
set msgsys:msginfo_msgtql=512

# Increase message queue maximum number of bytes


set msgsys:msginfo_msgmnb=65536

IRIX Hosts
Add the following statements to the var/sysgen/stune file.
# Increase the maximum number of messages that can be created
msgtql = 512

# Increase message queue maximum number of bytes


msgmnb = 65536

TRU64 Hosts
Modify the Tru64 kernel parameters using the /usr/bin/X11/dxkerneltuner utility.
See the appropriate Tru64 documentation for information on command-line utilities.

16 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Configuring UNIX Hosts

1. Select IPC from the list and click Select Subsystem.

2. In the Boot Time Value column, change the following parameter values:
msg_mnb 65536
msg_tql 512

3. Save the changes and exit the utility.

HP-UX Hosts
Modify the HP-UX kernel parameters using the /usr/sbin/sam utility.

1. Select SAM Kernel Configuration from the list.

2. Select SAM Configurable Parameters from the list.

3. Select msg_mnb from the list.

4. Select Actions from the menu bar.

5. Select Modify Configurable Parameter from the menu.

6. Tab to Formula/Value and enter 65536

7. Tab to OK to save the value and return.

8. Repeat step 3 thru step 7 and change the value of msg_tql to 512.

9. Select Actions from the menu bar.

10. Select Process New Kernel from the menu to process the kernel modifications and
exit the utility.

Linux Hosts
Linux has no intrinsic limit for the maximum number of messages that can be created
(MSGTQL). However, the maximum number of bytes for the message queue (MSGMNB)
can be tuned.
Add the following statements to the /etc/sysctl.conf file.
# Increase message queue max number of bytes
kernel.msgmnb = 65536

Chapter 2, Configuring Your SSO Hardware 17


Example SSO Configuration Matrix

AIX Hosts
On AIX hosts the IPC kernel variables are fixed and can not be configured by the user.

Example SSO Configuration Matrix


It may be helpful to record your physical configuration. You can complete a configuration
matrix similar to the following example:

1 2 3 4 5 6 7 8 9

Physical Physical Physical Logical Fibre Device Device Pass-thru Logical


Definition SCSI ID Bus ID Fibre Chan Channel Name On Name Path On NetBackup
At At To LUN WWN Windows On UNIX Solaris Storage
Library Bridge Mapping Host Host Unit Name

In column Identify and record the

1 Equipment type.

2 Physical SCSI ID of each piece of equipment.

3 Physical bus number where the equipment is attached.

4 SCSI to LUN mapping assignments. Log into the bridge to obtain these mappings.

5 World Wide Name of fibre channel port or node (on Solaris hosts only).

6 Device name used by the Windows host.

7 Device path used by the UNIX host.

8 Pass-thru path used by sg driver (on Solaris hosts only).

9 Logical storage unit name used by NetBackup.

18 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Fibre Channel Mapping Examples

Fibre Channel Mapping Examples


The following examples contain SCSI-to-fibre bridges and show the SCSI-to-fibre channel
mappings in various configurations.
In these examples
◆ HBA is a host bus adapter.
◆ FC LUN is a fibre-channel logical unit number.
◆ UNIX (Sun Solaris) and Windows are the platforms.
◆ The pass-thru paths for Solaris (shown in column 6 in the tables) do not need to start
at c0. The paths shown are only examples and can be any adapter number. These
paths are used when configuring the NetBackup sg driver on Solaris hosts.
◆ Examples 4, 5, and 6 have two HBAs in the configurations. Since the operating system
recognizes two paths to each drive, this results in two hardware paths for each tape
device. You must choose one of the two paths available for each tape device, since
only one path for each device can be configured in Media Manager.

Example 1
This example consists of four tape drives, a SCSI-to-fibre bridge, a hub or switch, and a
host bus adapter.

Drives Bridge Hub or Switch Host

1 0
2 1 HBA
3 2
4 3

The following table shows the device names and the device paths that you would use
when configuring the drives in this configuration.

One Bridge - One HBA

SCSI Coordinates Device Name


Drive FC (Port Bus Target (Windows) Device Path Pass-thru Path
(SCSI ID) LUN LUN) (UNIX) (Solaris)

1 0 0000 Tape0 /dev/rmt/0cbn /dev/sg/c0t0l0

2 1 0001 Tape1 /dev/rmt/1cbn /dev/sg/c0t0l1

Chapter 2, Configuring Your SSO Hardware 19


Fibre Channel Mapping Examples

One Bridge - One HBA

SCSI Coordinates Device Name


Drive FC (Port Bus Target (Windows) Device Path Pass-thru Path
(SCSI ID) LUN LUN) (UNIX) (Solaris)

3 2 0002 Tape2 /dev/rmt/2cbn /dev/sg/c0t0l2

4 3 0003 Tape3 /dev/rmt/3cbn /dev/sg/c0t0l3

Example 2
This example consists of four tape drives, two SCSI-to-fibre bridges, a hub or switch, and
a host bus adapter. SCSI IDs 1 and 2 are on bridge 1. SCSI IDs 3 and 4 are on bridge 2.
Bridge 1 was discovered first by the operating system.

Drives Bridges Host


(1 and 2) Hub or Switch
1 0
2 1
HBA
3 0
4 1

The following table shows the device names and the device paths that you would use
when configuring the drives in this configuration.

Two Bridges - One HBA - Bridge 1 Discovered First

SCSI Coordinates Device Name


Drive FC (Port Bus Target (Windows) Device Path Pass-thru Path
(SCSI ID) LUN LUN) (UNIX) (Solaris)

1 0 0000 Tape0 /dev/rmt/0cbn /dev/sg/c0t0l0

2 1 0001 Tape1 /dev/rmt/1cbn /dev/sg/c0t0l1

3 0 0010 Tape2 /dev/rmt/2cbn /dev/sg/c0t1l0

4 1 0011 Tape3 /dev/rmt/3cbn /dev/sg/c0t1l1

Because bridge 1 was discovered first, the drive with the SCSI ID of 1 is assigned the first
available device name and device path (see the first row in the table).

20 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Fibre Channel Mapping Examples

Example 3
This example uses the same configuration as shown in “Example 2” on page 20. However
in this example, bridge 2 was discovered first by the operating system.
The following table shows the device names and the device paths that you would use
when configuring the drives in this configuration.

Two Bridges - One HBA - Bridge 2 Discovered First

SCSI Coordinates Device Name


Drive FC (Port Bus Target (Windows) Device Path Pass-thru Path
(SCSI ID) LUN LUN) (UNIX) (Solaris)

1 0 0010 Tape2 /dev/rmt/2cbn /dev/sg/c0t1l0

2 1 0011 Tape3 /dev/rmt/3cbn /dev/sg/c0t1l1

3 0 0000 Tape0 /dev/rmt/0cbn /dev/sg/c0t0l0

4 1 0001 Tape1 /dev/rmt/1cbn /dev/sg/c0t0l1

Since bridge 2 was discovered first, the drive with the SCSI ID of 3 is assigned the first
available device name and device path (see the third row in the table).

Example 4
This example consists of four tape drives, a SCSI-to-fibre bridge, a hub or switch, and two
host bus adapters.

Drives Bridge Hub or Switch Host

1 0
2 1 HBA 1
3 2 HBA 2
4 3

Chapter 2, Configuring Your SSO Hardware 21


Fibre Channel Mapping Examples

The following table shows the device names and the device paths that you could use
when configuring the drives in this configuration.

One Bridge - Two HBAs

SCSI Coordinates Device Name


Drive FC (Port Bus Target (Windows) Device Path Pass-thru Path
(SCSI ID) LUN LUN) (UNIX) (Solaris)

1 0 0000 Tape0 /dev/rmt/0cbn /dev/sg/c0t0l0

2 1 0001 Tape1 /dev/rmt/1cbn /dev/sg/c0t0l1

3 2 0002 Tape2 /dev/rmt/2cbn /dev/sg/c0t0l2

4 3 0003 Tape3 /dev/rmt/3cbn /dev/sg/c0t0l3

1 0 1000 Tape4 /dev/rmt/4cbn /dev/sg/c1t0l0

2 1 1001 Tape5 /dev/rmt/5cbn /dev/sg/c1t0l1

3 2 1002 Tape6 /dev/rmt/6cbn /dev/sg/c1t0l2

4 3 1003 Tape7 /dev/rmt/7cbn /dev/sg/c1t0l3

Because of the second HBA, the operating system recognizes two paths to each drive
resulting in two hardware paths for each tape device. You must choose one of the two
paths available for each tape drive when configuring the drives in Media Manager.

Example 5
This example consists of four tape drives, two SCSI-to-fibre bridges, a hub or switch, and
two host bus adapters. SCSI IDs 1 and 2 are on bridge 1. SCSI IDs 3 and 4 are on bridge 2.
Bridge 1 was discovered first by the operating system.

Drives Bridges Hub or Switch Host


(1 and 2)
1 0
2 1 HBA 1
3 0 HBA 2
4 1

22 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Fibre Channel Mapping Examples

The following table shows the device names and the device paths that you could use
when configuring the drives in this configuration.

Two Bridges - Two HBAs - Bridge 1 Discovered First

SCSI Coordinates Device Name


Drive FC (Port Bus Target (Windows) Device Path Pass-thru Path
(SCSI ID) LUN LUN) (UNIX) (Solaris)

1 0 0000 Tape0 /dev/rmt/0cbn /dev/sg/c0t0l0

2 1 0001 Tape1 /dev/rmt/1cbn /dev/sg/c0t0l1

3 0 0010 Tape2 /dev/rmt/2cbn /dev/sg/c0t1l0

4 1 0011 Tape3 /dev/rmt/3cbn /dev/sg/c0t1l1

1 0 1000 Tape4 /dev/rmt/4cbn /dev/sg/c1t0l0

2 1 1001 Tape5 /dev/rmt/5cbn /dev/sg/c1t0l1

3 0 1010 Tape6 /dev/rmt/6cbn /dev/sg/c1t1l0

4 1 1011 Tape7 /dev/rmt/7cbn /dev/sg/c1t1l1

Because of the second HBA, the operating system recognizes two paths to each drive
resulting in two hardware paths for each tape device. Since bridge 1 was discovered
before bridge 2, the device names and device paths are the same as in “Example 4” on
page 21; however, adding a second bridge causes the FC LUN and SCSI coordinates to
change.
You must choose one of the two paths available for each tape drive when configuring the
drives in Media Manager.

Example 6
This example uses the same configuration as shown in “Example 5” on page 22. However
in this example, bridge 2 was discovered first by the operating system.

Chapter 2, Configuring Your SSO Hardware 23


Fibre Channel Mapping Examples

The following table shows the device names and the device paths that you could use
when configuring the drives in this configuration.

Two Bridges - Two HBAs - Bridge 2 Discovered First

SCSI Coordinates Device Name


Drive FC (Port Bus Target (Windows) Device Path Pass-thru Path
(SCSI ID) LUN LUN) (UNIX) (Solaris)

1 0 0010 Tape2 /dev/rmt/2cbn /dev/sg/c0t1l0

2 1 0011 Tape3 /dev/rmt/3cbn /dev/sg/c0t1l1

3 0 0000 Tape0 /dev/rmt/0cbn /dev/sg/c0t0l0

4 1 0001 Tape1 /dev/rmt/1cbn /dev/sg/c0t0l1

1 0 1010 Tape6 /dev/rmt/6cbn /dev/sg/c1t1l0

2 1 1011 Tape7 /dev/rmt/7cbn /dev/sg/c1t1l1

3 0 1000 Tape4 /dev/rmt/4cbn /dev/sg/c1t0l0

4 1 1001 Tape5 /dev/rmt/5cbn /dev/sg/c1t0l1

Because of the second HBA, the operating system recognizes two paths to each drive
resulting in two hardware paths for each tape device. Since bridge 2 was discovered
before bridge 1, the device names, device paths, and the SCSI coordinates have changed
from those shown in “Example 5” on page 22.
You must choose one of the two paths available for each tape drive when configuring the
drives in Media Manager.

24 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Fibre Channel Configuration Example

Fibre Channel Configuration Example


This example is taken from NetBackup configuration lab testing at VERITAS.

Hardware Components in This Example


◆ Solaris 7, 8 or 9 host
◆ JNI HBA
◆ Brocade 2400 switch
◆ Compaq Fibre Channel Tape Controller II
◆ Compaq TL895 tape library

Files Changed in This Example


The following files were modified:

NetBackup
◆ /usr/openv/volmgr/bin/driver/sg.conf
◆ /usr/openv/volmgr/bin/driver/sg.links

Operating System
◆ /kernel/drv/st.conf

HBA-Specific
The actual file changed depends on which HBA driver is used.
◆ /kernel/drv/fca(w).conf

Chapter 2, Configuring Your SSO Hardware 25


Fibre Channel Configuration Example

▼ To configure the hardware

1. Use the serial connection to the bridge to confirm that the bridges can see the robot
controller and all the drives. For this Compaq fibre-channel tape controller
configuration, use menu item 1) Display Currently Attached SCSI Devices. Output
from the two bridges in this configuration follows. In this example, bridge 1 can see
the robot controller (DESCRIPTION TL810) and three drives. Bridge 2 can see two
drives.
Currently Attached Devices
Build Level: c9909p

BUS TGT LUN DEVICE DESCRIPTION View of the


0 1 0 DEC TL810 (C) DEC2.31 devices for
0 2 0 DEC TZ89 (C) DEC2150 Bridge 1.
0 3 0 DEC TZ89 (C) DEC2150
1 2 0 DEC TZ89 (C) DEC2150

BUS TGT LUN DEVICE DESCRIPTION View of the


0 3 0 DEC TZ89 (C) DEC2150 devices for
0 4 0 DEC TZ89 (C) DEC2150 Bridge 2.

2. Display the SCSI-to-fibre channel mapping on the bridges. In this configuration, go to


the maintenance menu (enter maint at the first menu) on either of the bridges. Use
option 3) Display FC to SCSI Mapping. The output is the same for each of the
bridges.
Fibre Channel to SCSI Display
Build Level: c9909p

FC_LUN BUS TGT LUN


0x00 -> 0 0 0
0x01 -> 0 1 0 In this example, these
0x02 -> 0 2 0 are the five relevant
0x03 -> 0 3 0 entries that match the
0x04 -> 1 1 0 BUS, TGT, and LUN
0x05 -> 1 2 0 of the devices that are
0x06 -> 1 3 0 connected.
0x07 -> 1 0 0 See the device output
0x08 -> 0 4 0 displayed in step 1.
0x09 -> 0 5 0
0x0A -> 0 6 0
0x0B -> 1 4 0
0x0C -> 1 5 0
0x0D -> 1 6 0
0x0E -> 0 8 0
0x0F -> 1 8 0

26 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Fibre Channel Configuration Example

3. Bind the WWN for the device to an arbitrary target number. The world wide name of
the bridges can be found on the bridge or in the boot-time messages that are written to
the /var/adm/messages log on the Solaris server.
The binding procedure is HBA-vendor specific. JNI adapters can be configured using
ezfibre (a JNI product). Other HBAs can be configured by adding entries in their
respective .conf files.
For this example, assume bridge 1 is bound to target 0 and bridge 2 to target 1. The
/kernel/drv/fcaw.conf file would have the following entries created by ezfibre:
name="fcaw" parent="/sbus@1f,0"
reg=1, 0x0, 8000, 1, 0x8000, 8000, 1, 0x10000, 2, 1, 0x20000,
4, 1, 0x30000, 200
target0_wwnn="500508b3000000b9"
target0_hba="fcaw0"
target1_wwnn="500508b3000000d6"
target1_hba="fcaw0"
def_hba_binding="null";

4. For each of the FC_LUNs with the BUS, TGT, and LUN values matching the devices
that the bridges display, add entries in the
/usr/openv/volmgr/bin/driver/sg.links file, so that the necessary
/dev/sg/* nodes are created. These are the five FC_LUNs noted in step 2.
The entries that follow are for bridge 1. For the four devices on this bridge, FC_LUNs
1, 2, 3, and 5 are needed.
type=ddi_pseudo;name=sg;addr=0,1; sg/c\N0t0l1
type=ddi_pseudo;name=sg;addr=0,2; sg/c\N0t0l2
type=ddi_pseudo;name=sg;addr=0,3; sg/c\N0t0l3
type=ddi_pseudo;name=sg;addr=0,5; sg/c\N0t0l5
The entries that follow are for bridge 2. For the two drives on this bridge, FC_LUNs 3
and 8 are needed.
type=ddi_pseudo;name=sg;addr=1,3; sg/c\N0t1l3
type=ddi_pseudo;name=sg;addr=1,8; sg/c\N0t1l8

Note The target and luns in the address part of the devlink.tab entries are
hexadecimal, but they are decimal in the sg/c\N0tmln part of the entries. Also,
make sure that there are tabs between the columns, not spaces.

5. Add additional target and lun entries for each device to the
/usr/openv/volmgr/bin/driver/sg.conf file.
The entries that follow are for bridge 1:
name="sg" class="scsi" target=0 lun=1;

Chapter 2, Configuring Your SSO Hardware 27


Fibre Channel Configuration Example

name="sg" class="scsi" target=0 lun=2;


name="sg" class="scsi" target=0 lun=3;
name="sg" class="scsi" target=0 lun=5;
The entries that follow are for bridge 2:
name="sg" class="scsi" target=1 lun=3;
name="sg" class="scsi" target=1 lun=8;

6. Add (or un-comment) the appropriate drive entries in the tape-config-list and
add (or un-comment) the matching data-property-name entry in the
/kernel/drv/st.conf file.
tape-config-list =

"DEC TZ89", "DEC DLT", "DLT7k-data";

DLT7k-data = 1,0x38,0,0x19639,4,0x82,0x83,0x84,0x85,2;

7. Add name entries to the /kernel/drv/st.conf file.


name="st" class="scsi" target=0 lun=1;
name="st" class="scsi" target=0 lun=2;
name="st" class="scsi" target=0 lun=3;
name="st" class="scsi" target=0 lun=5;
name="st" class="scsi" target=1 lun=3;
name="st" class="scsi" target=1 lun=8;

8. Remove the old sg.conf file.


rm -r /kernel/drv/sg.conf

9. Run the /usr/openv/volmgr/bin/driver/sg.install script to copy the files


into the correct locations.

10. Use boot –r to reboot the operating system and


/usr/openv/volmgr/bin/sgscan to display the devices.

28 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Verifying Your SSO Hardware Is Connected
and Working 3
Test your hardware configuration before proceeding with other configuration steps—this
task is very important and is often overlooked. Note the following points:
◆ Verify that all of your servers (master and media) are able to communicate with one
another. Perform a ping from each server to every other server. Be sure to ping by
host name to verify that the name resolution methods are functioning properly.
◆ Use the NetBackup bpclntcmd utility to resolve IP addresses into host names. See
the NetBackup troubleshooting guide and the NetBackup system administrator’s
guide for more information.
◆ Make sure that robots and shared drives are visible to your operating system (for
example on Solaris, use mt -f /dev/rmt/0 status). If it doesn't work for the
operating system, it won't work for SSO.
◆ Make sure any dip switches on drives are set correctly (see “SSO Restrictions and
Limitations” on page 33).
◆ See the appropriate chapter in the NetBackup Media Manager device configuration
guide for more information and examples of usage (the chapters are organized by
media server operating system type).

Verifying Your Configuration On UNIX Servers


Use the following operating system, and Media Manager commands and tools where
available to verify the devices are configured correctly. Make sure you can "see" your
devices on the SAN before you install and configure the SSO option.

Server Type OS Command Media Manager Command

Solaris mt /usr/openv/volmgr/bin/sgscan

IRIX /usr/sbin/hinv /usr/openv/volmgr/bin/mmscan

AIX smit
/usr/sbin/lsdev

29
Server Type OS Command Media Manager Command

Tru64 /sbin/hwmgr /usr/openv/volmgr/bin/lsdev

HP-UX sam
ioscan -f

Verifying Your Configuration On Windows Servers


From the Windows Control Panel, use the Tape Devices and SCSI Adapters interfaces or
use regedit.
The path for registry entries for SCSI devices follows:
HKEY_LOCAL_MACHINE > HARDWARE > DEVICEMAP > SCSI

30 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Installing the Shared Storage Option 4
This chapter contains the following topics:
◆ “System Requirements for SSO”
◆ “SSO Restrictions and Limitations”
◆ “SSO Installation”

System Requirements for SSO

General System Requirements


Because control messages used by the device allocator and many types of robot control are
passed by a socket connection, all NetBackup and Storage Migrator servers must be
LAN-connected.

NetBackup (Media Manager) Versions


Starting with the NetBackup 5.0 release, mixed levels of NetBackup servers are supported.
This enables NetBackup servers to run a mixture of NetBackup major releases and patches
in the same environment.
The basic rules for a mixed server environment are as follows:
◆ The master server must be running the highest level of NetBackup that is installed in
the environment.
◆ A master server can inter-operate with a media server that is running a level of
NetBackup that is one major release lower.
For example, a master server running a 5.0 level of NetBackup can inter-operate with
a media server running any 4.5 level of NetBackup.

31
System Requirements for SSO

◆ Within a major NetBackup release level, a master server can inter-operate with other
media servers. The media servers must be running equal or lower levels of
NetBackup.
For example, a master server running NetBackup 4.5 FP6 in an environment can
inter-operate with media servers running 4.5, 4.5 MP2, and 4.5 MP5.
Also see “Volume Database Host (Device Allocation Host) Requirements” on page 32.

VERITAS Maintenance Patch Levels


Ensure that all of your media servers (or SAN media servers) have the appropriate and
latest NetBackup patches installed. See “Where to Go for More Information” on page 104
for the VERITAS support web site.

Volume Database Host (Device Allocation Host) Requirements


The host that is defined as the volume database host (usually the NetBackup master
server) is also the device allocation host for the SSO feature. If this system fails, not only
will the SSO feature become non-operational, but all NetBackup backup and restore
activity will fail. The following are requirements and recommendations for this host.

Host Requirements

It must be network-accessible from all hosts that are sharing drives managed by the device
allocation host.

The volume database host, the global device database host, the vmd/DA host, and the master
server must all be running the same level of NetBackup. The volume database host and the global
device database host must be at the same or greater level of NetBackup as the media servers that
they service.

VERITAS Host Recommendations

Use a common volume database host (the NetBackup master server is recommended) for your
configuration.

Configure the common volume database host as a Highly Available host.

Use a relatively high-powered server for your volume database host.

32 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SSO Restrictions and Limitations

UNIX and Microsoft Windows System Requirements

On the System Where You Install SSO

VERITAS NetBackup Release 4.5 or later must be installed.

The UNIX or Windows system must be running an operating system level that is one of the
system levels supported as a VERITAS NetBackup server.

SSO Restrictions and Limitations


◆ SSO cannot be used to share drives with the following:
◆ An NDMP server. For example, a Network Appliance or an Auspex file server
cannot share a tape drive with a NetBackup media server (or SAN media server).
◆ VERITAS Backup Exec.
◆ Other applications running on a system, including system commands that access
shared drives. This can interfere with device control and may lead to data loss.
◆ SSO cannot be used with certain types of tape robots. See “Supported Robot Types”
on page 97 for more information on the robot types that are supported.
◆ SSO is configured with Media Manager interfaces that are provided with NetBackup.
If you intend to utilize SSO with VERITAS Storage Migrator you also must have
NetBackup installed.
◆ Frequency-based drive cleaning is not supported for SSO drives because of issues
tracking drive usage among multiple hosts. TapeAlert should be used (see the
reference topics appendix of the NetBackup Media Manager system administrator’s
guide for more information). Also see “Frequently Asked Questions (FAQ) About
SSO” on page 94.
◆ In some configurations, individual host power failure or reboots can affect data
transfers on other hosts that share connectivity on a SAN.
◆ NetBackup does not share media between media servers for shared (or non-shared)
drives. When media is first used in a backup, NetBackup notes the media server (or
SAN media server) where the media is written and does not allow the media to be
used by other servers.
◆ Older Sony AIT tape drives may require specific dip switch settings for proper SSO
configuration and these settings can be different on various hosts. This is a limitation
in their use in a SSO configuration. A Sony AIT drive that requires dip switch settings

Chapter 4, Installing the Shared Storage Option 33


SSO Installation

cannot be connected to multiple hosts that require different switch settings. In


homogeneous configurations these drives work correctly; for example, in a
configuration with multiple Windows hosts or multiple Solaris hosts.
◆ For Windows hosts, the settings for dip switches 1-4 should be left at the default
setting (all Off).
◆ For UNIX hosts, see the appropriate chapter in the NetBackup Media Manager
device configuration guide for your host to see if you need to change the switch
settings.

SSO Installation
When you install NetBackup on a server you enter a key for NetBackup Enterprise Server.
When NetBackup software is installed, Media Manager and the Shared Storage Option
software are also installed.
SSO is a separately licensed feature and although the SSO software is installed, you need a
key to enable it. Check the license keys that were included with your software order to
ensure that you have the Shared Drives key.
On the server you are prompted to enter license keys for any other software options that
you purchased and want to enable. For more information on administering licenses, see
the NetBackup system administrator’s guide.

Enable SSO on All Servers


SSO must be enabled (by entering the shared drives key) on every server where shared
drives will be configured and used.

▼ To enable SSO on all servers

1. Enable SSO on your master server.

2. Enable SSO on all of your media servers (or SAN media servers).

Using the STK SN6000 With NetBackup


StorageTek (STK) introduced the SN6000 (Storagenet 6000 Storage Domain Manager) as a
method for providing tape drive virtualization. Logical tape drives are presented to host
operating system interfaces (tape drivers), while robotic control is accomplished through
the Automated Cartridge System (ACS) API.

34 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SSO Installation

Shared Drives License Key Required


To use the SN6000 with NetBackup, you need to enter the Shared Drives license key on
each media server where ACS drives in the SN6000 are configured.
For more information on configuring the SN6000, see the Automated Cartridge System
(ACS) appendix in either of the following guides:
◆ NetBackup Media Manager System Administrator’s Guide for UNIX.
◆ NetBackup Media Manager System Administrator’s Guide for Windows.

Chapter 4, Installing the Shared Storage Option 35


SSO Installation

36 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Configuring SSO Devices and Media In
Media Manager 5
This chapter explains what you need to do from the NetBackup and Media Manager
interfaces to configure SSO, and contains the following topics:
◆ “Why You Should Use the NetBackup Wizards”
◆ “Using One of the NetBackup Device Configuration Wizards”
◆ “Device Configuration Wizard”
◆ “Shared Drive Wizard”
◆ “Configuring the DAS Server for TLM Robot Types”
◆ “Using the Volume Configuration Wizard to Configure Media”
◆ “Using Alternate Interfaces for SSO Device Configuration”

Why You Should Use the NetBackup Wizards


NetBackup provides two wizards for configuring devices, a wizard for configuring
media, and also a device configuration analyzer.

▼ To use the configuration wizards

1. From your master server (not from a media server), use one of the two device
configuration wizards to configure robots and shared drives.
See “Using One of the NetBackup Device Configuration Wizards” on page 38.
The recommended and easiest method for configuring shared drives is to use the
NetBackup device configuration wizards, but there are also alternate ways that are
available (see “Using Alternate Interfaces for SSO Device Configuration” on page 57).
In addition to configuring SSO faster, these wizards eliminate many common
mistakes made when SSO configuration is done using alternate methods.

2. After configuring a subset of shared devices, use the configuration analyzer to point
out any errors before continuing configuring other devices.
See “Media and Device Management Configuration Analyzer” on page 74.

37
Using One of the NetBackup Device Configuration Wizards

3. Run the Volume Configuration wizard to configure media for robots and standalone
drives.
See “Using the Volume Configuration Wizard to Configure Media” on page 55.

Using One of the NetBackup Device Configuration Wizards


NetBackup has two wizards that can be used for device configuration: the Device
Configuration wizard and the Shared Drive wizard.

Caution Use these wizards with care in a production environment, since these wizards
stop the Media Manager daemons/services. You should not be running
production backups when using these wizards.

These wizards are available from the Media and Device Management interface of the
NetBackup Administration GUI. This interface is available with NetBackup Enterprise
Server on supported Windows servers and NetBackup Enterprise Server on supported
UNIX servers. Some of the wizard screens differ slightly on the Windows and UNIX
versions of NetBackup.

Using the Device Configuration Wizard


Depending on the type of robot that you want to configure, VERITAS recommends using
the Device Configuration wizard as follows:

To Configure See these Device Configuration Wizard Topics

Drives in ACS robots. The “Device Configuration Wizard” on page 40 and


“Adding Shared Drives in ACS Robots” on page 46.

TL8, TLD, or TLH robots. The “Device Configuration Wizard” on page 40 and
Drives in TL8, TLD, or TLH robots. “Adding Shared Drives in TL8, TLD, or TLH Robots” on
page 46.

Drives in TLM robots. The “Device Configuration Wizard” on page 40 and


“Adding Shared Drives in TLM Robots” on page 46.

Standalone drives. The “Device Configuration Wizard” on page 40 and


“Adding Shared Standalone Drives” on page 47.

38 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Using One of the NetBackup Device Configuration Wizards

Using the Shared Drive Wizard


You can also use the Shared Drive wizard as an alternative, but VERITAS recommends
using the Device Configuration wizard. Be sure to review the limitations of the Shared
Drive wizard before starting (see “What To Expect In the Shared Drive Wizard” on page 51).

To Configure See these Shared Drive Wizard Topics

Drives in ACS, TL8, TLD, TLH, or The “Shared Drive Wizard” on page 51 and “Configuring
TLM robots. Shared Drives in Robots” on page 53.
Standalone drives.

Chapter 5, Configuring SSO Devices and Media In Media Manager 39


Device Configuration Wizard

Device Configuration Wizard


VERITAS recommends using the Device Configuration wizard when possible rather than
the Shared Drive wizard.
This wizard performs device discovery, and adds robotic libraries and shared drives to
your Media Manager configuration. To perform these tasks, this wizard uses device
serialization (also see “Device Configuration Wizard Limitations” on page 40).
This wizard should be run on a master server (a master server can also be a media server).

Wizard Uses Device Serialization


Many robots and drives support device serialization. Device serialization is a firmware
feature that allows device identification and configuration. If the device supports
serialization, the following actions happen when the wizard queries the devices in your
configuration:
◆ Each robot and drive found in the configuration returns a unique serial number.
◆ For any robots in the configuration, an additional command is issued to the robot. The
robot returns the number of drives and the serial number for each of the drives
contained in the robot. This information is used by the wizard to determine the correct
drive number for each drive in the robot.
Since device serialization is a relatively new capability for some devices, you may need to
ask your hardware vendor for newer firmware that returns serial numbers. Even with the
proper firmware, some devices require the vendor to perform another action to enable
serialization for the device.
If a vendor releases firmware to support serialization after a NetBackup release, VERITAS
may need to make changes to take advantage of any new serialization capability.

Device Configuration Wizard Limitations


Note When using the Device Configuration wizard in an SSO environment, the
limitations are different than in a configuration without shared drives.

◆ You can use this wizard to configure devices only on the media servers listed in
“Supported Servers” on page 97.
◆ To scan and auto-configure a device, all of the device hosts (media servers or SAN
media servers) that you select must be running NetBackup 4.5 or later releases. The
scan for devices will fail on hosts that are running older release levels.

40 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Device Configuration Wizard

◆ In an SSO environment, this wizard does not support the complete configuring of
ACS or TLM robots. See “Adding Shared Drives in ACS Robots” on page 46 and
“Adding Shared Drives in TLM Robots” on page 46 for more information.
This wizard also does not support LMF or RSM robots, but these two robot types are
not supported for SSO. The wizard will configure any drives found in these robots as
standalone drives.
◆ This wizard can discover robots and drives attached to NDMP hosts, but using shared
drives with NDMP is not supported for SSO.
To configure NDMP-attached devices for NetBackup, all of the device hosts (media
servers or SAN media servers) that you select in the wizard must be running
NetBackup release 5.0 or later. For other NetBackup hosts, NDMP-attached devices
must be configured manually as described in the NetBackup for NDMP
administrator's guide.
◆ To recognize the connected devices, device discovery needs to issue SCSI pass-thru
commands to the devices. The supported server platforms may require special
operating system configuration.
These configuration requirements are described in Chapter 2 of the Media Manager
system administrator’s guide. Also see the NetBackup Media Manager device
configuration guide.
◆ Auto-configuration depends on device serialization (see “Wizard Uses Device
Serialization” on page 40). For devices to be fully configured by this wizard, the
following must be true for your configuration:
◆ Each robot and drive reports a unique serial number.
◆ Each robot reports the serial number of each of the drives contained within the
robot.
◆ All information required for full auto-configuration may not be available on some
systems. In this case, the wizard will do as much as possible with the limited device
information. Later you need to manually configure the remaining devices (see
“Completing Your Configuration” on page 49).
◆ If tape drives are in use or offline, they cannot be discovered and will not be
configured.
◆ After adding or removing devices from a SCSI bus, the operating system must be
made aware of the new configuration before auto-discovery can be used. Often this
requires a reboot of the operating system.

Chapter 5, Configuring SSO Devices and Media In Media Manager 41


Device Configuration Wizard

What To Expect In The Device Configuration Wizard

Wizard Screen What to Expect

Welcome You should have all required hardware and operating system
configuration completed before starting the wizard (see “Getting SSO
Installed and Running” on page 5). The wizard does not do any of these
tasks.

Device Hosts You build a device host list (by adding or changing hosts) that the
wizard will use to scan for attached devices. Be sure to include the host
where the robotics are attached. You can change the order and contents
of the list by adding or deleting hosts.
If a device host controls an NDMP device, also check NDMP filer to
specify to the wizard that administrator-assisted discovery of the device
is needed.
Media Manager will record the shared device configuration on each host
that you select (check) in the device host list. The first host on the list that
you select is scanned. This host becomes the robot control host if a robot
is found on the SAN.

NDMP Servers If a device host controls an NDMP device, you must provide
(Appears only if NDMP authentication information needed to access and configure the NDMP
filer was selected) devices for each host that you specified earlier in the Device Hosts
screen.

42 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Device Configuration Wizard

Wizard Screen What to Expect

Scanning Hosts All hosts that you selected in the previous screens are scanned.
Note You may see a conflict error if the hosts that you selected to scan
do not agree which host stores global device information. For
device discovery and auto-configuration to work properly,
particularly where peripherals are connected to many servers, a
single host must serve as the repository for global device
configuration information. When you install NetBackup, this host
is set by default to be the master server.
However if you have multiple master servers, or did not install or
upgrade your master servers before the media servers, then more
than one host has been designated as the global device database
host.
Before continuing in the wizard, you need to specify a single host
that will contain global device configuration information.
VERITAS suggests that you specify your master server or one of
the master servers, if you have several. You can select one of the
hosts detected by the wizard (use the browse button in the dialog)
or you can enter another host name.
Devices discovered by the scan are saved. If you cancel the wizard after
this step, the wizard will roll back your configuration to the original
settings.

Backup Devices A list of the devices discovered by the wizard is presented for you to
verify.

Drag and Drop A device tree is presented that allows you to fine tune your
Configuration configuration if needed, by dragging and dropping drives. See
“Completing Your Configuration” on page 49.
From this screen you can also launch VERITAS SANPoint ControlTM to
diagnose possible network problems that are preventing device
discovery.

Updating Device Any drag and drop configuration changes are saved (DEVICE_HOST
Configuration entries are placed in vm.conf), the Media Manager daemons/services
are restarted, and a progress report is presented.

Configure Storage At least one storage unit is created for each media server (or SAN media
Units server) you select and this storage unit information is saved. If you select
Properties, you can change the default values of the storage unit.
If you are running the wizard from a media server rather than a master
server, the storage units that are created may not be usable.
This screen is skipped if all storage units are already configured.

Chapter 5, Configuring SSO Devices and Media In Media Manager 43


Device Configuration Wizard

Wizard Screen What to Expect

Completion A reminder appears that you can use the Media and Device
Management interface to view and modify your configuration.

Running the Device Configuration Wizard for the First Time


The list of device hosts to be scanned that is initially displayed in the Device Hosts screen
includes only the current server, unless you have configured devices using NetBackup
Media and Device Management (using the Add Robot and Add Drive dialogs).

▼ To add a device host to the list


From the Device Hosts screen of the wizard:

1. Click Add.

2. In the dialog that appears, enter the name of the device host.

3. If this device host controls an NDMP device, select (check) NDMP filer to specify that
administrator-assisted discovery of the device is needed.

4. Click OK.

5. In the Device Hosts screen of the wizard, check the box next to each device host that
you want scanned for devices.

▼ To change a device host


From the Device Hosts screen of the wizard:

1. Select a device host from the list.

2. Click Change.

3. A dialog appears.
If this device host controls an NDMP device, select (check) NDMP filer to specify that
administer-assisted discovery of the device is needed.

4. Click OK.

5. In the Device Hosts screen of the wizard, check the box next to each device host that
you want scanned for devices.

44 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Device Configuration Wizard

Running the Wizard to Update Your Configuration after a


Device Change
If you have added or moved devices on some device hosts in your configuration, you
need only select (check) those hosts in the device host list (see the wizard screen “Device
Hosts” on page 42).

Note You can select all device hosts in your configuration, but to have the wizard execute
faster, select only the hosts affected by your changes.

▼ To update your configuration after adding a drive to a robotic library

1. Select the device hosts where that drive is attached.

2. Select the device host that has the robot control.

▼ To update your configuration after moving a drive


For example, you move a drive from device host A to host B. Because of this move, each of
these host’s configurations has changed and they must be scanned again by the wizard to
accurately reflect this change and complete your configuration.

1. Select device host A.

2. Select the device host that has the robot control (if applicable).

3. Select device host B.

▼ To update your configuration after moving the robot control


There is only one robot control host for each robot (except for ACS or TLM robot types).
For example, you move the robot control from device host A to device host B. Because of
this move, each host configuration has changed and they must be scanned again by the
wizard to accurately reflect this change and complete your configuration.

1. Select device host A.

2. Select device host B.

Chapter 5, Configuring SSO Devices and Media In Media Manager 45


Device Configuration Wizard

Running the Device Configuration Wizard More Than Once


If you are running the wizard to update your configuration, the list of device hosts shown
in the Device Hosts screen of the wizard (see “Device Hosts” on page 42) should match
the list that appears under the Hosts node of the NetBackup Media and Device
Management window.
The list of device hosts displayed is the combination of device hosts that were added in
either of the following ways:
◆ In previous executions of the wizard.
◆ The Media and Device Management node of the NetBackup Administration
Console.

Adding Shared Drives in ACS Robots


For ACS robots you can use the Device Configuration wizard to configure shared drives,
but some manual configuration is required. Refer to the information on using the Device
Configuration wizard to add shared drives in the Automated Cartridge System (ACS)
appendix of the NetBackup Media Manager system administrator’s guide.

Adding Shared Drives in TL8, TLD, or TLH Robots


The wizard will configure shared drives on all of the media servers (or SAN media
servers) in your configuration that you select (see the wizard screen “Device Hosts” on
page 42). Be sure to include the media server where the robotics are attached, so device
serialization can be utilized.
The wizard adds DEVICE_HOST entries in the Media Manager vm.conf configuration file
(see the wizard screen “Updating Device Configuration” on page 43).
Drives that are discovered by the wizard as attached to the hosts that you selected are
configured as shared drives. Robotic control is assigned to the first media server (or SAN
media server) that scans for devices and discovers the robot.

Adding Shared Drives in TLM Robots


For TLM robots you can use the Device Configuration wizard to configure shared drives,
but some manual configuration is required. Refer to the information on using the Device
Configuration wizard to add shared drives in the ADIC Distributed AML Server (DAS)
appendix of the NetBackup Media Manager system administrator’s guide.
Also see “Configuring the DAS Server for TLM Robot Types” on page 54.

46 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Device Configuration Wizard

Adding Shared Standalone Drives


Any standalone drives that are seen by the wizard as attached to multiple hosts are
configured as shared standalone drives.
All hosts that share the drive must use the same name for the drive. The wizard assigns
these drive names.
The wizard also defines a common volume database host for the drives (by default, this is
the master server).

Configuration Issues With Devices That Do Not Support


Serialization
If a robot or drive does not fully support device serialization, it is usually not possible for
the wizard to completely configure the device. The greater the number of drives and
robots in your configuration that do not support serialization, the greater the chance of
having configuration problems using this wizard.

Robot or Drive Does Not Return a Serial Number


Suppose you have a robot that can contain two drives, but you initially install only one
drive. Although the drive does not return a serial number the wizard is able to complete
your configuration, because of the simplicity of the configuration.
Later, you install a second drive in the robot and run the wizard again. The wizard now
discovers two drives in your configuration. Because these drives do not return serial
numbers, the wizard cannot correctly configure the devices. The wizard is unable to
determine which of the following is true:
◆ You added a new drive and kept the drive you originally configured.
◆ You added two new drives and removed the drive you originally configured.

Robot Does Not Return Serial Numbers For Each of Its Drives
If the robot does not return serial numbers for its drives, the wizard cannot determine
which robot drive number should be assigned to the drives in the robot. This means that
the wizard is unable to determine the order of the drives (their location) within the robot.
If a request for drive serial numbers fails, the wizard cannot determine whether the drive
is in a robot or is a standalone drive.

Chapter 5, Configuring SSO Devices and Media In Media Manager 47


Device Configuration Wizard

For example, suppose you have a robot containing one drive and you have one
standalone drive of the exact same drive type. If the robot does not support serialization,
the wizard is unable to determine which drive is in the robot and which is the standalone
drive.

Robot Returns Only The Number of Drives In The Robot


You may have a simple configuration (for example, one robot and one drive) and the robot
returns one as the number of drives in the robot, but no serial number for the drive.
In this example
◆ The wizard is able to configure the devices. Because of the simplicity of this
configuration, the serial number for the drive is not needed.
◆ You will see No in the Serialized column of the Backup Devices screen, indicating that
the device does not support serialization.

Determining If You have Devices That Do Not Support Serialization

▼ To determine serialization support

1. Go to the Backup Devices screen of the wizard.

2. Select each robot or drive shown in the list.


If the device does not support serialization, No appears in the Serialized column.

If You Do Have Devices That Do Not Support Serialization


You may be able to use one of the following methods to configure these devices:
◆ Use the Drag and Drop screen of the wizard.
See “Completing Your Configuration” on page 49.
◆ Use the Device Configuration wizard for some of the steps.
See “Adding Shared Drives in ACS Robots” on page 46 and “Adding Shared Drives in
TLM Robots” on page 46.
◆ Use the Shared Drive wizard. This wizard does not require device serialization.
See “Shared Drive Wizard” on page 51.

48 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Device Configuration Wizard

Completing Your Configuration


The Drag and Drop Configuration screen (see “Drag and Drop Configuration” on
page 43) depicts where robotic drives are located in robots as determined by the wizard.
If you have storage devices that do not fully support serialization or other problems occur
that cause the wizard to not recognize your devices, you can use this screen to complete
your configuration. Also see “Troubleshooting Network Configuration Problems” on
page 49.
From this screen, you can also enable or disable the use of robots or non-shared drives by
clicking the check boxes.

Note You cannot enable or disable shared drives from this screen.

If you have devices that do not fully support serialization and this is the first time you
have run the wizard, or you did not make any configuration changes when you ran the
wizard previously, you will see the following results on this wizard screen:
◆ Any drives that have not been configured for a robot appear under the Standalone
Drives node.
◆ The robot node will have empty nodes under it for each available drive address in the
robot.

▼ To complete a configuration

1. If you know the correct drive numbers in the robot, drag the drives to the empty drive
node having the corresponding drive number in this robot.
Refer to your robot-vendor documentation for help in determining the drive
numbers.

2. If you want the robot and drives enabled, select each check box.

Troubleshooting Network Configuration Problems


If the device tree of the Drag and Drop Configuration screen fails to show devices in your
configuration, you can launch VERITAS SANPoint Control to check for network errors
that may be causing the wizard to not recognize your devices on the network. For more
information on SANPoint Control, see the NetBackup Media Manager system
administrator’s guide.

▼ To launch SANPoint Control

❖ Click View SANPoint Control.

Chapter 5, Configuring SSO Devices and Media In Media Manager 49


Device Configuration Wizard

Starting the Device Configuration Wizard


The Device Configuration wizard is available from the list of wizards displayed in the
right pane of the Media and Device Management window of the NetBackup
Administration Console.

▼ To start the Device Configuration wizard

❖ Click Media and Device Management > Configure Storage Devices.

50 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Shared Drive Wizard

Shared Drive Wizard


You can use this wizard to configure shared drives and shared standalone drives in ACS,
TL8, TLD, TLH, or TLM robot types, but using the Device Configuration wizard (see
“Device Configuration Wizard” on page 40) is recommended.
The Shared Drive wizard has limited usage and does not configure robots. Since this
wizard does not use device serialization, it requires prior configuration details from you
about your configuration before starting. For example: the names of the hosts that will
share a drive, drive paths, and the robotic drive parameters and number of the robot that
will control the drive.
When using this wizard you can configure only one drive at a time. This may be beneficial
if you want to add an individual shared drive without disrupting the other configured
drives.
VERITAS recommends the following usage:
◆ Use the Device Configuration wizard when possible rather than the Shared Drive
wizard.
◆ Use the Shared Drive wizard with caution after initial device configuration.

What To Expect In the Shared Drive Wizard


Review the following topics before using this wizard.

Configuration Information Required For the Shared Drive Wizard


Since this wizard does not use device serialization, it requires more configuration details
from you. Before you start the Shared Drive Wizard, obtain and note the following
information for your configuration, so that you can accurately respond to the wizard
prompts:
◆ The name for the drive. This name must be the same across all hosts that will share the
drive and should be descriptive. If the logical names of the drives are not consistent
across all hosts, you will receive the following:
◆ Error messages when you run the configuration analyzer to display configuration
conflicts (see “Media and Device Management Configuration Analyzer” on
page 74).
◆ Drive reservation conflicts which may cause downed drives.
The drive name must also remain the same if you later change the attributes of the
drive (see “Changing an Existing Shared Drive” on page 53).
◆ The type of the drive.

Chapter 5, Configuring SSO Devices and Media In Media Manager 51


Shared Drive Wizard

◆ The robotic drive parameters and the number of the robot that will control the drive, if
the drive is in a robotic library. For TLM robots, you specify the DAS drive name.
Except for ACS or TLM robot types, there is only one robot control host for each robot
and you specify the host where the robot control is configured.
◆ The name of the volume database host for the drive, if the drive is a standalone drive.
This host should be the same volume database host as for all other standalone drives.

Caution If the volume database host for the standalone drive is not the same volume
database host as for all other standalone drives, serious configuration problems
can occur (see “Volume Database Host (Device Allocation Host) Requirements”
on page 32).

◆ The names of the hosts that will share this drive. Remember that each host that shares
the drive must have a license for SSO.
◆ If you add additional hosts that will share the drive, you need to know the drive path
for each host. On Windows hosts, the drive path is the name of the drive as it is
recognized by the operating system. On UNIX hosts, the drive path is the name of the
no rewind on close device file.
Check your notes to ensure that you are assigning the correct robot drive address to
each drive path.
◆ When adding drives in a mixed environment (UNIX and Windows hosts), confirm the
device names on each of the hosts before defining the drives on the master server.

Shared Drive Wizard Does Not Configure Robots


This wizard does not support the configuring of robots.

▼ To configure robots for SSO

1. Use the Media Manager Media and Device Management interface.

2. TLM robot types require an extra step. See “Configuring the DAS Server for TLM
Robot Types” on page 54 for information.
Now use the Shared Drive wizard to add shared drives to the configuration.

Shared Drive Wizard Does Not Use Device Serialization


Since this wizard does not use device serialization, it requires more configuration details
from you (see “Configuration Information Required For the Shared Drive Wizard” on
page 51). The configuration information that is required by the wizard varies depending
on whether you are:

52 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Shared Drive Wizard

◆ Adding a new shared drive.


See “Configuring Shared Drives in Robots” on page 53.
◆ Adding a shared drive by changing the configuration of an existing drive. In this case,
you specify a host that is currently sharing this drive.
See “Configuring Shared Drives in Robots” on page 53.
◆ Changing the configuration for an existing shared drive.
See “Changing an Existing Shared Drive” on page 53.

The Last Screen of the Shared Drive Wizard


Your configuration changes are saved at the last screen of the wizard. From this screen,
you can also do either of the following:
◆ Run the configuration analyzer (see “Media and Device Management Configuration
Analyzer” on page 74).
◆ Restart the Media Manager daemons/services on all device hosts that share the drive.

Configuring Shared Drives in Robots


You can do either of the following to configure a shared drive with this wizard:
◆ Add a new shared drive.
◆ Reconfigure an existing non-shared drive to be a shared drive.
You can change the attributes of the existing drive or leave the attributes unchanged.

▼ To start the Shared Drive wizard to configure a shared drive

1. In NetBackup Administration Console, click Media and Device Management >


Devices.

2. Click Actions > New > Shared Drive.


The wizard is started and guides you through the steps involved in configuring
shared drives.

Changing an Existing Shared Drive


You can make either of the following types of changes:
◆ Share the drive with additional hosts or change the drive path for a host.

Chapter 5, Configuring SSO Devices and Media In Media Manager 53


Configuring the DAS Server for TLM Robot Types

◆ Change the current attributes of the shared drive.

▼ To start the Shared Drive wizard to change a shared drive

1. In NetBackup Administration Console, click Media and Device Management >


Devices.

2. Select the Drives tab in the Devices pane.

3. Select the shared drive you want to change.

4. Right-click and select Configure Shared Drive on the shortcut menu.


The wizard is started and guides you through the steps involved in changing the
configuration for the shared drive.

Configuring the DAS Server for TLM Robot Types


To use TLM robots with SSO, the ADIC DAS server must be configured to allow drives to
be allocated in DAS simultaneously to all hosts sharing the drives. For more information
see the ADIC Distributed AML Server (DAS) appendix of the NetBackup Media Manager
system administrator’s guide.

54 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Using the Volume Configuration Wizard to Configure Media

Using the Volume Configuration Wizard to Configure Media


Use the Volume Configuration wizard for the following tasks:
◆ Inventory the volumes in your robots.
◆ Add volumes for standalone drives.
◆ Update the Media Manager volume database.
After running this wizard to configure media, each media will have a unique media ID in
the volume database that is used in Media Manager and NetBackup to track the media.

Volume Configuration Wizard Limitations


This wizard configures volumes for standalone drives and robots, but does not support the
configuring of volumes for the following devices:
◆ Robots that have more than one type of drive.
A robot is considered to have more than one type of drive if the media written in any
one drive cannot be read and written in every other drive. This includes drives that
are different versions of the same family of drives. For example, a robot with a
Quantum DLT7000 drive and a Quantum DLT8000 drive is considered to have
different drive types.
◆ API robots.
API robots that are applicable to SSO are ACS, TLH, and TLM Media Manager robot
types.
◆ Optical robots and optical standalone drives.
To configure volumes for these devices, you must use the robot inventory of the Media
and Device Management administrative interface.

What To Expect In The Volume Configuration Wizard

Wizard Screen What to Expect

Welcome With this wizard you can


◆ Inventory the volumes in a robot.
◆ Create new volumes for use in standalone drives.

Chapter 5, Configuring SSO Devices and Media In Media Manager 55


Using the Volume Configuration Wizard to Configure Media

Wizard Screen What to Expect

Select Device You select one of the following:


◆ The robot that you want to inventory.
◆ The type of standalone drive where you want to configure
volumes.
Robots that have more than one type of drive are not supported
(see “Volume Configuration Wizard Limitations” on page 55). In
some cases the wizard is unable to determine if more than one
type of drive exists in the robot. In this case, you must specify
whether or not the robot has multiple drive types.

Robot Inventory You start the inventory which updates the Media Manager
(Appears only if a robot was volume database.
selected)

Robot Inventory You can view the results of the inventory.


(Appears only if a robot was
selected)

Identify Cleaning Media To avoid any potential problems in the Media Manager volume
(Appears only if a robot was database, you select the slots in the robot that are known to
selected) contain cleaning media.

Volumes for Standalone Drives You specify the number of volumes to configure for the selected
(Appears only if a standalone drive drive type. The Media Manager volume database is updated
was selected) when you click Next.

Completion You can choose to go back and configure more volumes if


necessary, or exit the wizard.

Before You Start the Volume Configuration Wizard


Make sure that you have all media that you want to use for SSO testing in the robot before
starting.

Starting the Volume Configuration Wizard


This wizard is available from the list of wizards displayed in the right pane of the Media
and Device Management window of the NetBackup Administration Console.

56 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Using Alternate Interfaces for SSO Device Configuration

▼ To start the Volume Configuration wizard

❖ Click Media and Device Management > Configure Volumes.

Using Alternate Interfaces for SSO Device Configuration


There are alternatives available for configuring shared drives, but they do not include
important diagnostic tools such as the following:
◆ Device management reports (see “Media and Device Management Summary
Reports” on page 74).
◆ Configuration analysis (see “Media and Device Management Configuration
Analyzer” on page 74).
These configuration alternatives also require manual configuration instead of using
automated methods like device serialization and have an increased chance for
configuration errors. Using one of the Media Manager device configuration wizards is
recommended.

tpconfig menus (UNIX)


If you use tpconfig, make sure that
◆ All hosts that are sharing the drive use the same case-sensitive name for the drive
(descriptive names are recommended).
◆ You define a common volume database host.
For more information about using this utility, see the tpconfig appendix of the UNIX
NetBackup Media Manager system administrator’s guide.

tpconfig Command Line Interface (UNIX or Windows)


If you use the tpconfig command interface, also use the -shared yes option with the
-add -drive or -update -drive commands when you are defining shared drives.
For more information, see tpconfig in the appendix of the NetBackup Media Manager
system administrator’s guide.

Chapter 5, Configuring SSO Devices and Media In Media Manager 57


Using Alternate Interfaces for SSO Device Configuration

58 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Verifying Your SSO Configuration 6
In some SSO configurations, such as those involving fibre channel-attached tape drives, it
is difficult to determine the logical device name for a physical tape drive without
performing I/O through the tape device.
Use the following resources when multiple hosts are sharing drives in a robotic tape
library:
◆ Use the SSO information and tools that are available from Media Manager to check
your configuration. See “Using the Device Monitor” on page 71.
◆ Use the robtest test utility and the Device Monitor administrator interface to verify
that each server can access all shared drives and the robots.
◆ After attempting to correlate the physical drive addressing (SCSI targets) with
information from device scans or as a configuration check, use one of the following
verification procedures (depending on the type of your device host platform) to verify
your device configuration.

Caution The vmdareq command shown in these procedures should be used for
diagnostic purposes only. The options and the output of this command may
change in future releases of NetBackup.

This chapter contains the following topics:


◆ “Verifying Your Configuration On Windows Hosts”
◆ “Verifying Your Configuration On UNIX Hosts”

59
Verifying Your Configuration On Windows Hosts

Verifying Your Configuration On Windows Hosts


▼ To verify your configuration

1. From the NetBackup Administration Console, click Devices > Actions > Stop/Restart
Device Manager Service to start the device manager service (ltid) on the host with
the robotic control. For TL8, TLD, and TLH robot types, there is only one robot control
host for each robot. In configurations with only ACS or TLM robots, start ltid on one
of the hosts that shares the drives.
In this procedure, this host is identified as host1. Ensure that the NetBackup Volume
Manager service is running on all hosts, since it is needed for remote configuration.
This service is normally started when you start the NetBackup Device Manager
service. You can control the NetBackup Device Manager service using Actions >
Stop/Restart Device Manager Service.

2. Identify the device allocation host where vmd/DA is running (see “vmd/DA” on
page 98). This is the host that is serving as the volume database host for the robot with
shared drives (see “Device Allocation Host” on page 101).
(When multiple robots or standalone drives are involved, there may be more than one
DA host, but each physical drive must be allocated from only one DA host.)

3. Obtain the current device allocation state by sending the following command to the
DA host(s):
install_path\volmgr\bin\vmdareq -h DA-Host -display
For example,
install_path\volmgr\bin\vmdareq -h host1 -display
Results in the following:
drive1 - AVAILABLE
host1 SCAN_HOST
drive2 - AVAILABLE
host1 SCAN_HOST
This display indicates that drive1 and drive2 have registered with the DA host.
There is only one host (host1) registered with the DA host and it has been assigned
the role of scanning the drives (as indicated by the SCAN_HOST identifier). host1
lines appear twice because this host is scanning drive1 and drive2.

Note If applicable, you can also use the Shared Drive Summary report available in the
UNIX Device Monitor (see “Media and Device Management Summary Reports” on
page 74).

60 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Verifying Your Configuration On Windows Hosts

4. If there are no hosts listed, start the NetBackup Device Manager service on host1, so
that the host registers with vmd/DA. If there is more than one host registered for a
shared drive, stop the service on all hosts that are not host1. Stop all services and
reissue the vmdareq command until only one host is registered.
If host1 has the robotic control but no drives attached, start the NetBackup Device
Manager service on another host that is sharing the drive. Consider this host to be
host1 in the following steps.

5. Start the Device Monitor (see “Drive Status List of the Device Monitor” on page 71)
and select host1 as the device host. Verify that the shared drives are up, and that the
control column for robotic drives shows the robot type (for example, TLD).
If it does not show this state, there is a hardware problem or configuration error. Stop
using this procedure and investigate the device configuration and the system
application log to help resolve the problem. If the control column shows the robot
type for the robotic shared drives, proceed to the next step.

6. Use the robotic test utility (install_path\volmgr\bin\robtest) to mount a tape on


one of the drives to verify that each host can “see“ the drive.

Caution The automated robotic processes controlling the robot may be disabled while
robtest is active. Make sure you exit the robtest to avoid problems.

7. Use the Device Monitor to verify that the tape was mounted on the correct drive, for
example, the drive that was specified in robtest. Since host1 is the scan host (see
“Scan Host” on page 100), when a drive becomes ready after a tape is loaded, you can
determine which device name is associated with the targeted drive. If the correct
drive did not become ready, reconfigure the drives on host1 and stop and restart the
NetBackup Device Manager service so that the device name is associated with the
correct drive.

Note If you restart the NetBackup Device Manager service on the host that is currently
the scan host, another host will become the new scan host (if its NetBackup Device
Manager service is running).

8. Unload the drive using the SCSI unload command found in the robotic test utility, if
host1 has robotic control. Otherwise, use the drive’s manual unload button or a
toolkit.
Use robtest to move the tape volume into the next drive, and repeat the verification
step of observing the results in the Device Monitor display.

Chapter 6, Verifying Your SSO Configuration 61


Verifying Your Configuration On Windows Hosts

9. When all drive paths on host1 have been verified, start the NetBackup Device
Manager service on a second host, host2. Verify that host2 correctly registers its shared
drives with vmd/DA using the following command:
install_path\volmgr\bin\vmdareq -h host1 -display
This results in the following:
drive1 - AVAILABLE
host1 SCAN_HOST
host2
drive2 - AVAILABLE
host1 SCAN_HOST
host2
This display indicates that drive1 and drive2 have registered with the DA host.
There are two hosts (host1 and host2) now registered with the DA host. host1 is
still assigned the role of scanning the drives (as indicated by the SCAN_HOST
identifier). host1 and host2 lines appear below each drive, because both hosts are
scanning both drives.

10. Send the following command to vmd/DA to allow host2 to take over the drive
scanning. host1 will become available after a short amount of time, but this command
forces host2 to become the new scan host.
install_path\volmgr\bin\vmdareq -h DA-Host -unavailable -H host1

11. Reissue the command to see that the scanning responsibility has shifted to host2:
vmdareq -h host1 -display
This results in the following:
drive1 - AVAILABLE
host1 UNAVAILABLE
host2 SCAN_HOST
drive2 - AVAILABLE
host1 UNAVAILABLE
host2 SCAN_HOST
This display indicates that host2 is assigned the role of scanning the drives
(indicated by the SCAN_HOST identifier). The UNAVAILABLE identifier for host1 is
temporary.

12. Change the Device Monitor device host to host2. On host1 which has the robotic
control, use robtest to mount a volume in a drive. Verify the correct drive address
using the Device Monitor.
Unload the drive on host2. You may need to use the manual unload button, or stop the
NetBackup Device Manager service on host2 and unload using robtest on host1.

62 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Verifying Your Configuration On UNIX Hosts

This will verify all device names on host2.

13. Start the NetBackup Device Manager service on the third host, if more than two hosts
are sharing drives. Stop the service on host2. Use vmdareq to verify that host3 is now
the scan host for its shared drives.
host1 may become available again after a period of time. If host1 is the scan host,
perform step 10 to allow host3 to become the scan host.

14. Repeat step 12 to verify the host3 device names.


Repeat this complete procedure until device names have been verified on all hosts.
Stop and restart the NetBackup Device Manager service on host1 and start it on all
other hosts.

15. Verify the following with vmdareq:


◆ All hosts are registered with vmd/DA.
◆ There are no unavailable hosts.
◆ Each shared drive has a designated scan host.

Verifying Your Configuration On UNIX Hosts


▼ To verify your configuration

1. From the NetBackup Administration Console, click Devices > Actions > Stop/Restart
Device Manager Service to start the Media Manager device daemon (ltid) on the
host with the robotic control. For TL8, TLD, and TLH robot types, there is only one
robot control host for each robot. In configurations with only ACS or TLM robots,
start ltid on one of the hosts that shares the drives.
In this procedure, this host is identified as host1. Ensure that the Media Manager
volume daemon (vmd) is running on all hosts, since it is needed for remote
configuration. The volume daemon is normally started when you start the device
daemon. You can control the Media Manager device daemon using Actions >
Stop/Restart Media Manager Device Daemon.

2. Identify the device allocation host where vmd/DA is running (see “vmd/DA” on
page 98). This is the host that is serving as the volume database host for the robot with
shared drives (see “Device Allocation Host” on page 101).
(When multiple robots or standalone drives are involved, there may be more than one
DA host, but each physical drive must be allocated from only one DA host.)

Chapter 6, Verifying Your SSO Configuration 63


Verifying Your Configuration On UNIX Hosts

3. Obtain the current device allocation state by sending the following command to the
DA host(s):
/usr/openv/volmgr/bin/vmdareq -h DA-Host -display
For example,
/usr/openv/volmgr/bin/vmdareq -h host1 -display
Results in the following:
drive1 - AVAILABLE
host1 SCAN_HOST
drive2 - AVAILABLE
host1 SCAN_HOST
This display indicates that drive1 and drive2 have registered with the DA host.
There is only one host (host1) registered with the DA host and it has been assigned
the role of scanning the drives (as indicated by the SCAN_HOST identifier). host1
lines appear twice because this host is scanning drive1 and drive2.

Note You can also use the Shared Drive Summary report available in the UNIX Device
Monitor (see “Media and Device Management Summary Reports” on page 74).

4. If there are no hosts listed, start the device daemon on host1, so that the host registers
with vmd/DA. If there is more than one host registered for a shared drive, stop the
daemon on all hosts that are not host1. Stop the device daemons and reissue the
vmdareq command until only one host is registered.

5. Start the Device Monitor (see “Drive Status List of the Device Monitor” on page 71)
and select host1 as the device host. Verify that the shared drives are up and that the
control column for robotic drives shows the robot type (for example, TLD).
If it does not show this state, there is a hardware problem or configuration error. Stop
using this procedure and investigate the device configuration and the system
application log to help resolve the problem. If the control column shows the robot
type for the robotic shared drives, proceed to the next step.

6. Use the robotic test utility (/usr/openv/volmgr/robtest) to mount a tape on one


of the drives.

Caution The automated robotic processes controlling the robot may be disabled while
robtest is active. Make sure you exit the robtest to avoid problems.

7. Use the Device Monitor to verify that the tape was mounted on the correct drive, for
example, the drive that was specified in robtest. Since host1 is the scan host (see
“Scan Host” on page 100), when a drive becomes ready after a tape is loaded, you can

64 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Verifying Your Configuration On UNIX Hosts

determine which drive path is associated with the targeted drive. If the correct drive
did not become ready, reconfigure the drives on host1 and stop and restart the device
daemon so that the drive path is associated with the correct drive.

Note If you restart the device daemon on the host that is currently the scan host, another
host will become the new scan host (if its device daemon is running).

8. Unload the drive using the SCSI unload command found in the robotic test utility, if
host1 has robotic control. Otherwise, use the drive’s manual unload button or a
toolkit.
Use robtest to move the tape volume into the next drive, and repeat the verification
step of observing the results in the Device Monitor display.

9. When all drive paths on host1 have been verified, start the device daemon on a second
host, host2. Verify that host2 correctly registers its shared drives with vmd/DA using
the following command:
/usr/openv/volmgr/bin/vmdareq -h host1 -display
This results in the following:
drive1 - AVAILABLE
host1 SCAN_HOST
host2
drive2 - AVAILABLE
host1 SCAN_HOST
host2
This display indicates that drive1 and drive2 have registered with the DA host.
There are two hosts (host1 and host2) now registered with the DA host. host1 is
still assigned the role of scanning the drives (as indicated by the SCAN_HOST
identifier). host1 and host2 lines appear below each drive, because both hosts are
scanning both drives.

10. Send the following command to vmd/DA to allow host2 to take over the drive
scanning. host1 will become available after a short amount of time, but this command
forces host2 to become the new scan host.
/usr/openv/volmgr/bin/vmdareq -h DA-Host -unavailable -H host1

11. Reissue the command to see that the scanning responsibility has shifted to host2:
vmdareq -h host1 -display
This results in the following:
drive1 - AVAILABLE
host1 UNAVAILABLE

Chapter 6, Verifying Your SSO Configuration 65


Verifying Your Configuration On UNIX Hosts

host2 SCAN_HOST
drive2 - AVAILABLE
host1 UNAVAILABLE
host2 SCAN_HOST
This display indicates that host2 is assigned the role of scanning the drives (as
indicated by the SCAN_HOST identifier). The UNAVAILABLE identifier for host1 is
temporary.

12. Change the Device Monitor device host to host2. On host1 which has the robotic
control, use robtest to mount a volume in a drive. Verify the correct drive address
using the Device Monitor.
Unload the drive on host2. You may need to use the manual unload button, or stop the
NetBackup Device Manager service on host2 and unload using robtest on host1.
This will verify all device names on host2.

13. Start the device daemon on the third host, if more than two hosts are sharing drives.
Stop the device daemon on host2. Use vmdareq to verify that host3 is now the scan
host for its shared drives.
host1 may become available again after a period of time. If host1 is the scan host,
perform step 10 to allow host3 to become the scan host.

14. Repeat step 12 to verify the host3 drive paths.


Repeat this complete procedure until the drive paths have been verified on all hosts.
Stop and restart the device daemon on host1 and start it on all other hosts.

15. Verify the following with vmdareq:


◆ All hosts are registered with vmd/DA.
◆ There are no unavailable hosts.
◆ Each shared drive has a designated scan host.

66 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Configuring SSO in NetBackup 7
This chapter explains what you need to do in the Storage Units and Policies nodes of the
NetBackup Administration Console to use SSO.
See the NetBackup system administrator’s guide for more detailed information.

Configuring Storage Units and Backup Policies


On the master server, configure storage units and policies for your shared drives. If the
device configuration wizard was used, storage units may have already been configured
by the wizard (see “What To Expect In The Device Configuration Wizard” on page 42).

Configuring Storage Units for Each Media Server (or SAN


Media server)
In each storage unit definition, you logically define the robot and the shared drives for
that media server. For the number of drives used for backup (Maximum concurrent
drives used for backup), you should specify the total number of all shared drives in the
robot.
For example, suppose you have a configuration with four servers (dog1, pony2, frog3, and
fish4) sharing six drives in one robot. The server dog1 is the master server and is the robot
control host for the robot that contains the six drives that are being shared.
You would configure a storage unit on master server dog1 for the robot and specify six as
the maximum concurrent drives used for backup. Also on the master server dog1, you
would configure a storage unit for the robot and specify six for the number of concurrent
drives, for the following servers:
◆ Server pony2
◆ Server frog3
◆ Server fish4

67
Configuring Storage Units and Backup Policies

Reserving a Drive for NetBackup Restore Jobs


If you want to reserve a drive for all servers to share for restores, you would specify one
less than the total number of shared drives available for the number of drives.

Configuring a Backup Policy for Each Media Server (or SAN


Media Server)
Defining a policy for a media server depends on your VERITAS media server license, as
follows. A license for a regular media server provides the greatest flexibility in
configuring policies. A license for a SAN media server is more restrictive.
◆ If you are defining a policy for a media server that is using SSO, then the policy can
contain the media server (itself) as a client and any other network clients that you
want to back up across the SAN to this media server.
◆ If you are defining a policy for a SAN media server, then the policy will have just one
client—the SAN media server—and will use the specific storage unit.
If you are defining a policy for network clients that you want to back up anywhere in your
configuration, you can list all of the clients and choose Any_available (on NetBackup
UNIX servers) or Any available (on NetBackup Windows servers) as the policy storage
unit or use the storage unit groups (prioritized storage units).

Directing a Media Server (or SAN Media Server) To Use Its


Own Drives
Backups are normally run on any server that has drive capacity available. This can be an
issue in SSO SAN environments where backup jobs that could be done locally, are sent
across the LAN to another available drive, thus reducing backup performance.
If you want to configure a media server to back up its own data over the SAN to its own
shared drives (local), rather than across the LAN to another media server with an
available drive, see the following topics in this section. These configurations will probably
provide quicker access to the shared drive, even when considering any possible wait time
for the drive to become available.

MUST_USE_LOCAL_DRIVE Parameter
The MUST_USE_LOCAL_DRIVE parameter directs a server (that is also a client) to use its
own drives. If a client is not also a server, this parameter has no effect.
By adding this option, a backup on a SAN media server (see “Configuring a Backup
Policy for Each Media Server (or SAN Media Server)” on page 68) will send the data over
the SAN to a local drive.

68 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Duplication Jobs

Depending on the type of your server, specify this parameter in the NetBackup bp.conf
configuration file on UNIX servers or in the Windows registry by using the configuration
utility. MUST_USE_LOCAL_DRIVE can also be found in the host properties for the server
in NetBackup Administration Console.
This parameter allows the use of any available drive in the policy storage unit and
removes the need to define a policy for each media server that calls for the specific storage
unit for that media server. You still need to configure a storage unit for each media server
(or SAN media server).
You can mix clients in a policy, use any available, and when the backup starts for the client
that is a SAN media server, the backups will be directed to the SAN connected drives on
that server.
If you use this parameter and the local drives are all down or busy, any subsequent jobs
will be queued. If all of the drives become unavailable, you will have to remove the
storage unit or remove the parameter.

Drive Allocation Problems


If a media server (or SAN media server) has both shared and non-shared drives, do not do
either of the following actions. These actions can result in drive allocation problems.
◆ Specify MUST_USE_LOCAL_DRIVE in the bp.conf file on that media server.
◆ Configure any policy to use only a specific storage unit that is on that media server.

Duplication Jobs
The NetBackup scheduler is aware of duplication jobs and will not overcommit jobs if
drives are being used for duplication and no drives are available. Drives are only allocated
to a particular media server (or SAN media server) while a job is active. As soon as the job
finishes, the drive is released and made available to any other media server that is sharing
the drives.

Chapter 7, Configuring SSO in NetBackup 69


Duplication Jobs

70 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Using SSO 8
This chapter explains how to
◆ Use the Device Monitor to obtain information about your SSO configuration and
manage your shared drives.
◆ Fine tune your configuration by adding SSO options in the Media Manager
configuration file.
◆ Improve performance when using SSO.

Using the Device Monitor


The Device Monitor window of the NetBackup Administration Console provides the
following SSO configuration information and functionality for shared drives.

Drive Status List of the Device Monitor


The following columns in the Drive Status list are of note for shared drives. The Drive
Status list is displayed in the upper pane of the Device Monitor window. See the Media
Manager system administrator’s guide for complete information on the Drive Status list.

Drives Status Pane

Column Description Note

Control Control mode for the drive can be any of the following:

robot_designation. For example, TLD. For robotic


The robotic daemon managing the drive has connected to ltid (the drives.
device daemon and Device Manager service) and is running. The
drive is in the usable state. AVR is assumed to be active for the
drive, as all robotic drives must be in AVR mode (not OPR mode).

71
Using the Device Monitor

Drives Status Pane

Column Description Note

DOWN-robot_designation. For example, DOWN-TLD. For robotic


The drive is in an usable state because it was downed by an drives.
operator or by NetBackup; or when the drive was configured, it
was added as a down drive.

DOWN. For
In this mode, the drive is not available to Media Manager. standalone
drives.

A drive can be in a DOWN mode because of problems or because it


was set to that mode using Actions > Down Drive.

PEND-robot_designation. For example, PEND-TLD. For robotic


drives.

PEND. For
standalone
drives.

If the drive reports a SCSI RESERVATION CONFLICT status, this


column will show PEND. This status means that the drive is
reserved when it should not be reserved.
Some server operating systems (Windows, Tru64, and HP-UX) may
report PEND if the drive reports Busy when opened. You can use
the AVRD_PEND_DELAY entry in the Media Manager
configuration file to filter out these reports.

AVR. For robotic


The drive is in a usable state with automatic volume recognition drives.
enabled, but the robotic daemon managing the drive is not
connected or is not working. Automated media mounts do not
occur with a drive in this state (unless the media is in a drive on the
system), but the operator can physically mount a tape in the drive
or use robtest to cause a tape mount as needed.

AVR. For
The drive is running with automatic volume recognition enabled. standalone
drives.

72 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Using the Device Monitor

Drives Status Pane

Column Description Note

OPR. For
The drive is running in a secure mode where operators must standalone
manually assign mount requests to the drive. avrd is not scanning drives.
this drive when in this mode. This mode gives operators control
over which mount requests can be satisfied.

NO-SCAN. Applies only


A drive is configured for SSO, but has no available scan host (to be to NetBackup
considered available, a host must register with a Enterprise
SSO_SCAN_ABILITY factor of non-zero and have the drive in the Server.
UP state).
NO-SCAN may be caused if all available scan hosts have the drive
in the DOWN state. Other hosts (that are not scan hosts) may want
to use the drive, but they registered with a scan factor of zero. The
drive is unusable by NetBackup until a scan host can be assigned.
Use Actions > Drive Details to view the drive control mode for
each host that is sharing this drive.

<Mixed> Applies only


The control mode for a shared drive may not be the same on all to NetBackup
hosts sharing the drive. For shared drives each host can have a Enterprise
different status for the drive. If the control modes are all the same, Server on
that mode is displayed. Windows
servers.
Use Actions > Drive Details to view the drive control mode for
each host that is sharing this drive.

Shared Yes, means this drive is configured as a shared drive. Applies only
No, means the drive is not a shared drive. to NetBackup
Enterprise
Server.

Assigned Host This column shows the device host that currently has the drive
assigned. If the selected drive is not assigned, this column is blank.

Chapter 8, Using SSO 73


Using the Device Monitor

Media and Device Management Summary Reports


These reports are available from the Device Monitor in the NetBackup Administration
Console only on UNIX servers.
The reports contain Media Manager information about your SSO configuration (see “SSO
Components in Media Manager” on page 98).

Report SSO Information

Shared Drive Drive name, device allocation host, the number of registered hosts, drive
Summary reservation status, reserved hosts, and the scan host.

Device Allocation The device allocation host, host name of the registered host, the number of
Host Summary registered and reserved drives, availability status, the scan ability factor, and
scanning status.

▼ To view the summary reports

1. In the NetBackup Administration Console, click Media and Device Management >
Device Monitor.

2. Click Actions > View Status of Shared Drives to display a dialog that allows you to
display these reports.

3. Select a device allocation host (or hosts) from the list and use Add >> to move it to the
list of hosts that will be scanned.

4. Click OK. The reports appear in the two lower panes.

Media and Device Management Configuration Analyzer


SSO naming and configuration conflicts can be checked with the configuration analyzer.
The analyzer verifies that the settings in your SSO configuration are consistent and checks
for potential configuration problems.
The analyzer may produce informational (INFO), warning (WARN), and error (ERR)
categories of messages.
The analyzer checks
◆ Communication links with vmd and ltid on all known hosts.
The analyzer will report if vmd and ltid are inactive. On some hosts, ltid can be
inactive. ltid needs to be running if a drive is configured on the host.

74 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Using the Device Monitor

◆ Robotic parameters (including robot number, robot type, and robot drive number).
◆ If robot numbers are being reused.
All robots in your SSO configuration should have unique numbers. This makes
identification easier and may avoid a loss of data.
◆ For duplicate robotic definitions (robot control should be on only one host).
◆ For inconsistent robotic paths.
◆ If a drive is configured as both shared and non-shared.
◆ For drive conflicts, such as, hosts having drive information containing different
attributes for the same shared drive.
For example, one host may see a shared drive’s type as DLT cartridge and another
host may see the type configured as 1/2 inch cartridge.
◆ If a shared drive has different robot drive numbers.

▼ To view the configuration analyzer report


This report is available from the Device Monitor in the NetBackup Administration
Console on UNIX servers and from the Shared Drive wizard (see “Shared Drive Wizard”
on page 51).
You can start the analyzer in either of the following ways:
◆ From the Device Monitor (UNIX servers only), click Actions > Analyze Device
Configuration.
◆ From the final screen of the Shared Drive Wizard, you can start the analyzer after your
configuration changes are saved.
In the configuration analyzer, select a drive and the hosts that share this drive that you
want to check.

Managing Shared Drives


See the Media Manager system administrator’s guide for more information about using
these functions in the Device Monitor.

Changing the Operating Mode for a Shared Drive


The change mode dialog contains a list of the hosts that are sharing the selected drive. You
can choose any number of hosts where the mode change will apply.

Chapter 8, Using SSO 75


SSO Configuration Options for the vm.conf File

Adding or Changing a Comment for a Shared Drive


The dialog contains a list of the hosts that are sharing the selected drive. You can choose
any number of hosts where the mode change will apply.

Performing Drive Cleaning Functions for a Shared drive


See the following table for the available drive cleaning functions and their use with shared
drives.

Drive Cleaning Function Shared Drive Usage

Clean Now In the list of hosts sharing the drive, you can choose only one
host where the function will apply.

Reset Mount Time In the list of hosts sharing the drive, you can choose any
number of hosts where the function will apply.

Set Cleaning Frequency This function is not available for shared drives.

SSO Configuration Options for the vm.conf File


The following optional entries for shared drives can be added to the Media Manager
vm.conf configuration file on any media server (or SAN media server).
See “SSO Components in Media Manager” on page 98 for information on the SSO terms
used in the following descriptions.
See the Media Manager reference topics appendix in the Media Manager system
administrator’s guide for descriptions of all of the available vm.conf entries.

AVRD Pending Status Delay


AVRD_PEND_DELAY = number_of_seconds
If this entry is specified in vm.conf, avrd will wait number_of_seconds before displaying a
pending status (PEND) in the Device Monitor. This entry is read and interpreted on the
host where avrd is running.
Some server operating systems (Windows, Tru64, and HP-UX) report PEND if the drive
reports Busy when a volume is unmounted. You can use this entry to minimize the
display of this misleading status.

76 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SSO Configuration Options for the vm.conf File

The minimum for number_of_seconds is zero. The maximum is 255. The default value is 180
seconds.

Device Host for Configuration Analyzer


DEVICE_HOST = host_name
If this entry is specified in vm.conf, it specifies the hosts that are included in the
configuration analyzer interface. This entry is read and interpreted on the host where the
configuration analyzer is running.
These entries may be manually added. Entries are automatically added when vmd (the
volume daemon or NetBackup Volume Manager service) restarts, based on robot host
names appearing in volume groups. These entries have no effect on the Media and Device
Management interface’s host lists.

SSO DA Re-register Interval


SSO_DA_REREGISTER_INTERVAL = minutes
This vm.conf entry is used only with the shared storage option (SSO) feature and is read
and interpreted on the host where ltid is running.
ltid on a scan host periodically re-registers its shared drives with vmd/DA to ensure that
it is still providing the drive scanning function on behalf of other hosts sharing the drives.
This re-registration allows conditions such as a device allocator restart to have minimal
impact on use of shared drives.
The default for the re-registration interval is 5 minutes. You can use this entry to tune this
interval. After adding this entry, ltid must be stopped and restarted for the change to
take effect.

SSO DA Retry Time


SSO_DA_RETRY_TIMEOUT = minutes
This vm.conf entry is used only with the shared storage option (SSO) feature and is read
and interpreted on the host where ltid is running.
If ltid encounters problems during communications with vmd/DA, or a failure while
attempting to reserve a shared drive, ltid delays before trying again.
The default value for the delay is 3 minutes. You can use this entry to tune this delay
period. After adding this entry, ltid must be stopped and restarted for the change to take
effect.

Chapter 8, Using SSO 77


SSO Configuration Options for the vm.conf File

SSO Host Name


SSO_HOST_NAME = host_name
This vm.conf entry is used only with the shared storage option (SSO) feature and is read
and interpreted on the host where ltid is running.
This entry specifies the name used by the current host to register, reserve, and release
shared drives with vmd/DA. The default is the local host name.

Scan Ability Factor


SSO_SCAN_ABILITY = scan_factor
This vm.conf entry is used only with the shared storage option (SSO) feature and is read
and interpreted on the host where ltid is running.
A scan ability factor can range from zero to 9, with a default value of 5. This factor allows
the assignment of scan hosts to be prioritized, if a drive's scan host changes. Scan hosts
that have a higher scan ability factor are chosen first.
In some SSO configurations, you may have servers that are undesirable for use as the scan
host for a drive. This may be because they have limited resources, are behind firewalls, or
are being administered by people other than NetBackup administrators. These servers can
be configured to never become the scan host for any drive. A scan_factor of zero means
that a server will not become the scan host.

Caution A drive is unavailable for use until a scan host can be assigned for it. If all hosts
that register for a particular drive use scan_factor = 0, the drive will enter an
unusable state until a host with a scan_factor of non-zero registers for the drive.
If all hosts with a scan_factor of non-zero have the drive DOWN, then again the
drive becomes unavailable due to the lack of a scan host.

The decision to use a scan_factor of zero for a server, reduces the level of resiliency in your
SSO configuration. Careful attention to those servers that can be a scan host is required, as
the loss of a scan host for a drive makes it unavailable to any server.

Release Level Considerations


Media Manager servers prior to NetBackup 4.5 FP3 cannot be configured with a
scan_factor of zero. If zero is specified, the default value of 5 is used.
NetBackup release 4.5 (or any 4.5 MP release) device allocation (DA) hosts will accept
registrations from NetBackup 4.5 FP3 media servers (or SAN media servers) with a
scan_factor of zero. A 4.5 release device allocation host handles the zero scan factor the
same as any other legal value. A value of zero is just a scan factor less than one.

78 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Throughput Optimization

Device allocation hosts running NetBackup releases 4.5 FP3 thru 5.0 will not select as a
scan host servers that have a scan factor of zero. The case where all servers are registered
with a value of zero, causing the drive to have no scan host, will not occur if any
registered host is at the 4.5 release level (since this host will not send a zero scan factor).
So, a device allocation host running NetBackup releases 4.5 FP3 thru 5.0 can have some
hosts with a zero scan factor and work correctly in a mixed server environment.

Throughput Optimization
This is a NetBackup (data path) specific issue and deals with client disk read and write
speeds, network speeds, and tape writing and reading speeds. Most of the "tuning knobs"
are NetBackup specific, not Media Manager or SSO specific.
See the NetBackup system administrator’s guide for more information on this topic.

Chapter 8, Using SSO 79


Throughput Optimization

80 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SCSI Reserve/Release 9
This chapter includes the following topics to help you understand SCSI reserve/release in
an SSO environment:
◆ “Background Topics”
◆ “How NetBackup Uses SCSI Reserve/Release Commands”
◆ “Issuing Reset Commands to Break a Reservation”
◆ “Controlling SCSI Reserve/Release”
◆ “SCSI Reserve/Release Requirements and Limitations”

Background Topics
The following topics explain a major change in the implementation of NetBackup SSO
and an overview of the SCSI reserve/release functionality.

NetBackup Releases Prior to NetBackup 4.5


In previous releases of NetBackup, Media Manager used a network protocol for drive
reservations. In some situations, this allowed any program outside the local NetBackup
realm to access drives without NetBackup being aware of the fact (this was true for drives
in SSO and SAN configurations, and also for non-SSO locally attached drives).
In SAN configurations, NetBackup could have a drive open for read or write operations
on one host and the device could be accessed by another host. This situation could occur
since there was no single tape driver controlling access to the device. If an external
program moved the tape for any reason during a NetBackup operation, data corruption
could be the result, since NetBackup assumed the tape position was unchanged from the
last command NetBackup had issued to the drive.

81
Background Topics

NetBackup 4.5 and Later Releases


In multiple-initiator (multiple HBA) environments (such as SSO configurations), some
form of device-level protection is required to avoid unintended sharing of tape devices
and possible data loss problems. The only widely available technique for this purpose is
to use SCSI reserve/release functionality.
Starting with release 4.5, NetBackup uses SCSI reserve/release commands to improve
data integrity. SCSI reserve/release operates at the SCSI target level and depends on the
fibre-to-SCSI bridge or the native fibre device hardware working correctly.

SCSI Reserve/Release Commands


When a device receives a SCSI reserve command, it will no longer process commands
from any other HBA until the reserving HBA issues the SCSI release command. If an
application sends a command to a reserved device, the device will fail the command by
returning a status of RESERVATION CONFLICT. The only exceptions to this action are the
Inquiry, Log Sense, Report LUNs, and Request Sense commands, which will return the
requested information.
A device stays reserved until one of the following actions occurs. The device is
◆ Released by the HBA that reserved it.
◆ Released by some sort of TARGET or LOGICAL UNIT RESET. These resets are
protocol dependent, and differ between parallel SCSI and FCP (SCSI on fibre
channel). These resets may be issued from any HBA.
◆ Power cycled.
◆ Released by fibre channel LOGO/PLOGO/PRLI/PRLO/TPRLO or failed discovery
(link actions).
A negative effect of SCSI reserve can occur if the reserving HBA stops working (for
example, due to a system crash or hardware failure). All devices reserved by the HBA stay
reserved until the reservation is removed or broken. The reservation can only be removed
by the original HBA, which means the system must be available. In the case of a hardware
failure, this is not possible.
To break a reservation the device must be reset. This can be done by any of the following:
◆ SCSI reset
◆ Bus device reset
◆ LUN device reset
◆ Power cycle
◆ Fibre channel link actions may break reservations.

82 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
How NetBackup Uses SCSI Reserve/Release Commands

SCSI reserve and SCSI release commands are mandatory for all SCSI-2 and SCSI-3 devices.
See the SCSI 2 standard for a detailed description of SCSI reserve command operation and
behavior.

How NetBackup Uses SCSI Reserve/Release Commands


The following topics explain how NetBackup uses SCSI reserve/release commands in an
SSO environment (or any other multiple-initiator environment). The same basic
operations are performed by other VERITAS applications (for example, VERITAS Storage
Migrator components).

Issuing the Reserve


This topic applies to HP-UX, IRIX, Solaris, AIX, TRU64, Linux, and Windows servers.
The NetBackup processes (bptm, bprecover, and bpbackupdb) that read or write tape
media issue a SCSI reserve command to the tape device that contains the media in use
(during the open process). Once the reservation is established, all other HBAs are locked
out of this tape device. This reservation prevents other HBAs from issuing commands that
can cause data loss.
This reservation does not prevent other applications from using the same device on the
server with the reservation and causing data loss (for example, someone issuing a UNIX
mt command).

Checking for Data Loss


This topic applies to HP-UX, Solaris, AIX, TRU64, Linux, and Windows servers.
The bptm process detects data loss by reading the tape position and then checking the
actual position against the expected position. If the actual position is less than the
expected position (at the end of the backup process), the following will occur:
◆ The tape is frozen.
◆ The backup fails.
◆ The following error message entry is placed in the error log:
FREEZING media id xxxxxx, External event caused rewind during
write, all data on media is lost

Chapter 9, SCSI Reserve/Release 83


How NetBackup Uses SCSI Reserve/Release Commands

Possible Causes
If the SCSI reserve/release feature is not enabled on your servers, data loss can be caused
by configuration errors, incorrect paths, multiple master servers, incorrect SSO
configurations and third-party or operating system utilities. If the SCSI reserve/release
feature is enabled on all servers, then the cause could be third-party or operating system
utilities running on the server that is also running the backup operation.
Unfortunately data loss cannot be prevented, just recognized after the fact. The
NetBackup catalog is not cleaned up to remove information on prior backup sessions that
were lost. The bpexpdate command must be run on the media id to clean up the catalog.

Disabling the Position Check


VERITAS recommends that the check for data loss not be disabled.

▼ To disable the position check on UNIX servers

❖ Create the following file:


/usr/openv/netbackup/db/config/NO_POSITION_CHECK

▼ To disable the position check on Windows servers

❖ Create the following file:


install_path\netbackup\db\config\NO_POSITION_CHECK

Checking for Tape/Driver Configuration Errors


This topic applies to HP-UX, Solaris, AIX, TRU64, Linux, and Windows servers.
The bptm process detects data loss by reading the tape position and then checking the
actual position against the expected position. Any configuration problem that causes the
actual position to be greater than the expected position (at the end of the backup process),
causes the following to occur:
◆ The tape is frozen.
◆ The backup fails.
◆ The following error message entry is placed in the error log:
FREEZING media id xxxxxx, too many data blocks written, check
tape/driver block size configuration
The backup data may be usable, in which case the image will need to be imported before
restores can be done (using the bpimport command).

84 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
How NetBackup Uses SCSI Reserve/Release Commands

Possible Causes
The source of the configuration problem needs to be identified and corrected. The most
common configuration error is the failure to configure the driver for variable length
blocks.
A second source of the error could be in the tape driver's configuration data. On Solaris,
this could be in /kernel/drv/st.conf. Review the NetBackup Media Manager device
configuration guide for the operating system you are using.

Disabling the Position Check


VERITAS recommends that the check for data loss not be disabled.

▼ To disable the position check on UNIX servers

❖ Create the following file:


/usr/openv/netbackup/db/config/NO_POSITION_CHECK

▼ To disable the position check on Windows servers

❖ Create the following file:


install_path\netbackup\db\config\NO_POSITION_CHECK

Issuing the Release


After a NetBackup process has finished with the media, a SCSI release is issued as part of
the unmount operation. This release frees the device for access by another HBA.
Also, at the beginning of the startup process avrd issues a SCSI release to all configured
tape devices that are currently in the Up state. This is done to release devices that were
reserved at the time of a system re-boot or crash. The SCSI release command will return
tape devices to general availability after a system crash.

Error Recovery
To recover a device that is reserved by an HBA that crashes or otherwise was unable to
issue the SCSI release command, you can use the following option for the Media Manager
vmoprcmd command:
vmoprcmd -crawlreleasebyname drive_name
This option requests all hosts that are registered to use the drive to release the drive (using
the SCSI release command).

Chapter 9, SCSI Reserve/Release 85


How NetBackup Uses SCSI Reserve/Release Commands

Issue the vmoprcmd command on the host that is the device allocator (DA host) or use the
-h option on the command to specify the DA host.

Caution You can use this command after a PEND status has been displayed in Device
Monitor in the NetBackup Administration Console, but do not issue this
command during backups. See “Drive Status List of the Device Monitor” on
page 71.

See the NetBackup commands for UNIX or Windows for the complete syntax and more
information on using the vmoprcmd command.

SCSI Reserve/Release Logging and Conflict Notification


The bptm process logs all SCSI reserve/release commands. The bptm log should be
checked on all hosts to ensure the SCSI reserve operation is being logged (look for SCSI
RESERVE in the log).
The avrd process monitors all tape devices. NetBackup manages access to tape devices,
such that a properly configured system will not receive the RESERVATION CONFLICT
status from a tape device.

Reservation Conflict
If avrd gets a RESERVATION CONFLICT status, avrd changes the status of the device to
PEND and writes the following message in the system log:
Reservation Conflict status from DRIVENAME (device NUMBER)
When the conflict is resolved, the following message will be written to the log:
Reservation Conflict status cleared from DRIVENAME (device NUMBER)
If this conflict occurs, some sort of mis-configuration is present (for example, the tape
drive is reserved, but should not be) and the configuration problem should be corrected.
A possible cause of this conflict is if an operating system crashes or a hardware failure has
left a device reserved (see “Issuing the Release” on page 85).
Also in the Device Monitor or the output from the vmoprcmd command, PEND in the
Control column means that a reservation conflict has occurred. See “Drive Status List of
the Device Monitor” on page 71.

Server Operating System Limitations


This topic applies to HP-UX, TRU64, and Windows servers.

86 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Issuing Reset Commands to Break a Reservation

These operating systems cannot distinguish between a reserved device and a busy device.
For these systems PEND will be reported in the Device Monitor, if another application is
using the device. This indicates a mis-configuration, as NetBackup cannot share tape
devices with other applications. If you are using other applications, you should use the
tpreq command or Down the drive before using the drive.
These operating systems also may report PEND if the drive reports Busy when a volume
is unmounted. You can use the AVRD_PEND_DELAY entry in the Media Manager
configuration file to filter out these extraneous reports.

Server Operating System Limitations


This topic applies to IRIX servers.
This operating system cannot detect that a device is reserved. If the SSO scan host is
running on an IRIX system, no indication of this configuration problem will occur.

Issuing Reset Commands to Break a Reservation


On the following operating systems, you can try to reset a reservation conflict by using the
associated reset commands.

Caution The reset operation may reset other devices in your configuration. Loss of data
is also possible. Alternate methods of breaking the reservation on a device
(using switch and bridge hardware) should be tried first.

▼ To reset a reservation on Sun Solaris

1. Issue mt -f drive_path_name forcereserve.

2. Issue mt -f drive_path_name release.


See the mt(1) man page for more information.

▼ To reset a reservation on HP-UX

❖ Issue st -f drive_path_name -r.


See the st(1m) man page for more information.

▼ To reset a reservation on IBM AIX

❖ Issue tctl -f drive_path_name reset.


See the tctl man page (in the IBM AIX Commands Reference) for more information.

Chapter 9, SCSI Reserve/Release 87


Controlling SCSI Reserve/Release

▼ To reset a reservation on SGI IRIX


Issue either of the following commands:

❖ scsiha -r bus_number

❖ scsiha -L target_number bus_number


See the scsiha(1m) man page for more information.

Controlling SCSI Reserve/Release


In NetBackup 4.5 and later releases, using SCSI reserve for data integrity is on by default.
SCSI reserve can be disabled by using an entry in the UNIX bp.conf file or in the registry
on Windows servers.
The bp.conf file can be modified to contain a DISABLE_SCSI_RESERVE entry, which
will turn off the use of SCSI reserve to all tape devices from this host.
The NetBackup UNIX and Windows GUIs have a checkbox to add or remove this entry in
the bp.conf file or the registry. Select NetBackup Management > Host Properties. Select
a master or media server (or SAN media server) in the right pane and then Properties >
Media > Disable SCSI Reserve.

SCSI Reserve/Release Requirements and Limitations


The following topics cover important requirements and limitations when using SCSI
reserve/release.

Requirements
The requirements are as follows:
◆ There must be passthru driver access to all shared drives. The passthru driver must be
installed and all required paths must be created.
See the NetBackup Media Manager device configuration guide for information on
configuring and using the passthru driver for various UNIX operating systems.
◆ Host operating systems must be properly coordinated with the requirements of the
NetBackup use of SCSI reserve/release.
◆ Users of Solaris 7 must install a ST driver patch to avoid a problem that keeps the
device reserved when it should not be. For Solaris 7, the minimum patch level
required is 107460-06.

88 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SCSI Reserve/Release Requirements and Limitations

◆ Users of HP-UX must disable the operating system's use of SCSI reserve/release.
See the topic, Enabling SCSI Reserve/Release in the HP 9000 chapter of the
NetBackup Media Manager device configuration guide for instructions.

Limitations
This VERITAS implementation using SCSI reserve/release has the following limitations:
◆ SCSI reserve/release is not applicable for NDMP drives (no reserve command is
available).
◆ Third-party copy configurations must be configured correctly. To retain reservation of
a tape device when doing a third-party copy backup, refer to the description of the
mover.conf file in the NetBackup ServerFree Agent System Administrator's Guide for
UNIX.
◆ Cluster environments or multi-path environments with fail-over capability may leave
devices reserved when fail-over occurs. If the fail-over does not break the device
reservations, then the NetBackup use of SCSI reserve/release must be disabled.
◆ Cluster environments or multi-path environments with dynamic path sharing (TRU64
systems, for example) will cause backup and restore failures if the path changes. If
path sharing cannot be eliminated, then the NetBackup use of SCSI reserve/release
must be disabled.

Chapter 9, SCSI Reserve/Release 89


SCSI Reserve/Release Requirements and Limitations

90 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Troubleshooting Tips 10
This chapter includes the following topics that may help you resolve SSO issues:
◆ “SSO Hardware Guidelines”
◆ “SSO Software Guidelines”
◆ “Common Problems”
◆ “Frequently Asked Questions (FAQ) About SSO”

SSO Hardware Guidelines


◆ Mixing SAN components can introduce problems. Always use a SAN configuration
and firmware levels that are supported by the hardware vendors.
◆ Consult SAN device, HBA, and operating system documentation to determine how to
configure operating system tape drivers and passthru drivers to detect your SAN
devices.
◆ Check your hub timer settings.
◆ Using hard arbitrated loop physical addresses, rather than soft addresses, usually
works best. It is important to check with hardware suppliers to verify the
recommended usage of their products.
◆ Check the firmware levels of all your fibre-channel hardware (for example, bridges)
and make sure you are using the most recent level that is known to inter-operate with
other SAN hardware devices. Firmware levels change very rapidly.
◆ Try to duplicate SAN issues and problems using commands and utilities on the host
operating system.
◆ Test backup and restore capabilities with dedicated tape drives before configuring
them as shared drives.
◆ Test both backup and restore capabilities. It is possible to complete backups, but have
unrecoverable images (for example, caused by incorrect switch settings).
◆ Ensure your hardware and SAN configuration is working and stable before adding
SSO software.

91
SSO Software Guidelines

◆ When building a large configuration, start drive sharing with a small number of tape
drives and a small number (two or three) of media servers (or SAN media servers).
◆ Configuration and troubleshooting of SSO is much easier when done on a smaller
scale. If possible, create multiple and independent SSO configurations with subsets of
servers sharing subsets of SAN-attached drives.

Device Boot Order


Use the correct boot order for your fibre-channel hardware, as follows. Some devices take
a while to completely boot. Watch for any indicator lights to become green.

1. Robots or drives

2. Bridges

3. Hubs or switches (wait 3 or 4 minutes)

4. Hosts

SSO Software Guidelines

Media Manager Configuration Guidelines


Because of the great potential for creating incorrectly identified devices within an SSO
configuration, it is recommended that you follow these practices:
◆ Use the Media Manager wizards to configure SSO. In particular, use the Device
Configuration wizard rather than the Shared Drive wizard where possible.
See “Why You Should Use the NetBackup Wizards” on page 37.
◆ If you are using the Device Configuration wizard, you should configure all shared
drives from one host (this is usually the master server). Launch the wizard only once
with the current host set to the master server. You then indicate a list of media servers
or SAN media servers (in the Device Hosts screen). The wizard will configure devices
on all of the media servers you selected and these hosts will receive the shared
configuration information.
See “What To Expect In The Device Configuration Wizard” on page 42.
◆ Whether you have single or multiple master servers, define only one server to contain
the volume database.

92 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Common Problems

If you are using the Device Configuration wizard on a new installation, the volume
database host is set by default to be the master server (unless you did not accept the
default settings during NetBackup installation).
◆ After configuring a subset of shared devices, use the configuration analyzer to check
and point out any errors before continuing with other devices.
See “Media and Device Management Configuration Analyzer” on page 74.

Operating System Guidelines


If errors occur during the installation and configuration of your SSO devices and you
suspect the operating system, reference the following:
◆ Operating system logs, as described in the operating system documents.
◆ NetBackup logs.
◆ Operating system man pages (UNIX servers only).
◆ The NetBackup Media Manager device configuration guide.

Common Problems
◆ Using incompatible or outdated firmware or drivers in a hub, switch, HBA, or bridge.
◆ Did not set the JNI HBA fail over value to zero seconds to avoid I/O hangs
(bridge/HBA vendor fix).
◆ Using cluster configurations when they were not supported.
◆ Using vendor peripherals that only work on a fibre-channel arbitrated loop.
◆ Did not verify that SSO has been enabled on each server. You enable SSO using the
Shared Drive license key. See “SSO Installation” on page 34.
You can check keys by using the license key GUI available from the NetBackup help
menu on Windows and UNIX servers (Help > License Keys). You can also use the
get_license_key command on UNIX servers.
◆ Did not configure all of SSO from the master server. All configuration should be done
from the master server, not from a media server (or SAN media server).
◆ Did not configure the robotic path on every host. Remember that except for ACS or
TLM robot types, only one host controls the robot.
◆ Did not select the appropriate device hosts when using the Device Configuration
wizard, including the host with robotic control. See “What To Expect In The Device
Configuration Wizard” on page 42.

Chapter 10, Troubleshooting Tips 93


Frequently Asked Questions (FAQ) About SSO

◆ Created inconsistent configurations by using tpconfig to configure SSO rather than


using the configuration wizards. These wizards have the added benefit of
coordinating configurations across all hosts that are sharing the drives.
◆ Rebooted the host. Drives and robots that are connected by fibre channel cause
increased complexity in a Media Manager device configuration. On some operating
systems, the use of SCSI-to-fibre bridges may result in inconsistencies in the device
paths when rebooting the host. After a reboot, the device configuration should be
verified. Use HBA-to-driver binding when available.
◆ Using a drive name that is not consistent across all systems sharing drives.
◆ Did not test the drive paths on every media server (or SAN media server).
◆ Did not define NetBackup storage units for each media server (or SAN media server).
◆ (UNIX servers only)
Did not use Berkeley-style close on the tape path.
◆ (Sun Solaris servers only)
Forgot to add tape configuration list entries in /kernel/drv/st.conf (if needed).
Did not define configuration entries for expanded targets and LUNs in sg.links
and sg.conf files.
Seeing problems with the entries in the /etc/devlink.tab file (created from
sg.links). Check the following:
◆ The first entry uses hexadecimal notation for the target and LUN. The second
entry uses decimal notation for the target and LUN.
◆ Use a single tab character between the entries, not a space or a space and a tab.
Did not configure the operating system to forceload the sg/st/fcaw drivers.
See the Sun chapter of the NetBackup Media Manager device configuration guide for
more information.
◆ (On Tru64 or HP-UX servers only)
Forgot to manually add device files.

Frequently Asked Questions (FAQ) About SSO


What combinations of SAN hardware components are supported for SSO?
SSO works with many hardware combinations. VERITAS has an open policy on hardware
support for SSO. It is important to check with hardware suppliers to verify the
interoperability of their products.

94 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Frequently Asked Questions (FAQ) About SSO

A list of SAN components that have been tested with NetBackup is available on the
support web site (http://support.veritas.com).

I assume that once a server picks a tape drive and writes media, that media can only be
written to again by that server. With existing NetBackup media servers today, a tape
“belongs” to a media server until it expires or is deleted. Is this right?
Yes. Assigned media is still dedicated to a single server (see “SSO Restrictions and
Limitations” on page 33). Be sure to define only one volume database host.

If I allocate four drives to a server and after an hour the server is finished with two of
the drives and another server is requesting drives, will the two available drives be
reallocated? Or does NetBackup wait until the backup schedule using the four drives is
completely finished before reallocating the drives?
The two available drives will be reallocated and used. The NetBackup tape manager
component is aware of drive status and notifies the NetBackup scheduler of drive
availability.

Does the NetBackup SSO use IP protocol or SCSI protocol?


SSO uses IP protocol to pass control messages among peers.

Is it possible to set up drive cleaning for shared drives? I realize you can't use
frequency-based cleaning, but can TapeAlert be used?
Yes. Using TapeAlert without frequency-based cleaning means that the tape will be
cleaned only when the drive firmware (TapeAlert) requests a cleaning.
TapeAlert is not available for some types of drives, and some host platforms and adaptor
connections. Since TapeAlert provides the same type of cleaning as library-based cleaning
(robotic cleaning or auto cleaning), it is recommended that you disable library-based
cleaning if using TapeAlert (for most vendor’s robots).

Chapter 10, Troubleshooting Tips 95


Frequently Asked Questions (FAQ) About SSO

96 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SSO Reference Topics 11
This chapter includes the following topics:
◆ “Supported SSO Components”
◆ “SSO Components in Media Manager”
◆ “Where to Go for More Information”

Supported SSO Components

Supported Robot Types


There is a difference between Media Manager supported robot types and Media Manager
supported robot types for use with SSO.
SSO is supported only with the following Media Manager robot types:
◆ ACS, TLH, and TLM (these are known as API robot types)
◆ TL8 and TLD
(The remaining Media Manager robot types are not supported for SSO. These are the
following types: LMF, ODL, RSM, TL4, TS8, TSD, and TSH.)

Supported Servers
The following list shows the master server platforms that are supported for use with SSO.
See the NetBackup Media Manager device configuration guide for information on the
supported operating system levels for these server platforms.
◆ Microsoft Windows
◆ Sun Solaris
◆ HP Alpha Tru64 UNIX
◆ HP HP9000 HP-UX

97
SSO Components in Media Manager

◆ IBM RS6000 AIX


◆ SGI IRIX
◆ RedHat Linux

SSO Components in Media Manager


SSO utilizes the basic NetBackup and Media Manager processes and daemons to perform
its tasks. vmd is the Media Manager volume daemon on UNIX hosts and the NetBackup
Volume Manager service on Windows hosts. A major function of vmd is to manage media
information. An additional function that vmd can provide is to be the device allocator (DA)
for shared drives. In this case, vmd is known as vmd/DA.

vmd/DA
To coordinate network-wide allocation of tape drives, vmd/DA acts as a central clearing
agent for all NetBackup and Storage Migrator shared tape requests in a storage area
network. vmd/DA responds to requests from multiple instances of NetBackup master
servers, media servers, SAN media servers, or Storage Migrator (the versions of Media
Manager that are installed must be compatible).
For shared drive configurations, the host that is configured as the volume database host
for a drive in a robot or a standalone drive is also known as the device allocation host (see
“Device Allocation Host” on page 101). This is the host where vmd/DA resides. Other
hosts in the configuration have vmd without device allocator functionality being utilized.
vmd/DA maintains shared drive and host information, such as a list of hosts that are
registered to share a drive and which host currently has the drive reserved. Shared drive
information is
◆ Modified by requests from ltid (the Media Manager device daemon on UNIX and
the NetBackup Device Manager service on Windows).
◆ Dynamic, since it is built and maintained at runtime, rather than being stored on the
device allocation host.
When ltid initializes on a device host, it calls vmd/DA with a list of shared drives.
vmd/DA adds these drives and the host name to its configuration if necessary. Since ltid
passes a complete list of drives each time, vmd/DA deletes references to drives for that
host when a change in configuration removes them from that host’s shared drive list. This
deletion occurs when ltid is shut down gracefully or after it is restarted.

98 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SSO Components in Media Manager

Example of a SSO Configuration


The following figure shows an example of a shared drive configuration with Media
Manager components.

Host A Host B
Scan Host Device Allocation Host
Robot TLD (0)
(avrd) (avrd)

(ltid) Hardware (ltid)

Control (vmd / DA)


(vmd) Robot Control
Path
Host Adapter Host Adapter

DRV1 DRV2

Data Path Data Path

Data Path Data Path

Hardware
Connection

In this figure, Host A is


◆ Connected to drives DRV1 and DRV2 through enabling hardware.
◆ The host where ltid was started first and called vmd/DA on the device allocation
host (Host B) to register a shared drive. This action identifies Host A as the initial scan
host (see “Scan Host” on page 100) for the drives.
In this figure, Host B
◆ Is connected to drives DRV1 and DRV2 through enabling hardware.
◆ Is configured to be the volume database host for the robot TLD (0) and therefore is
also the device allocation host (see “Device Allocation Host” on page 101). vmd/DA is
active on this host.
◆ Controls the robotics (except for ACS or TLM robot types, there is only one robot
control host for each robot).
◆ Could be optionally configured as a Highly Available (HA) server.

Chapter 11, SSO Reference Topics 99


SSO Components in Media Manager

Scan Host
Each shared drive has a host that is identified as the scan host. A scan host is the host
where avrd (the automatic volume recognition daemon/process) is scanning the drive
when there is no other activity on that drive. A scan host must have data-path access to
the drive.
Instances of ltid on hosts that are not scan hosts create rdevmi (remote device
management interface) processes on the scan hosts. These processes communicate with
the other hosts sharing the drive, and run on the scan hosts as slave processes of the
non-scan hosts ltid. These processes receive drive status information held in shared
memory on the scan host. This status information is used to maintain the shared drive
information on all of the hosts sharing the drive.
Each time an rdevmi process starts up, it is logged in the daemon log. Also, each host that
is identified as a scan host in the output of the vmdareq command will show rdevmi
processes running for each host it is sharing a drive with. For example if there are 12 hosts
sharing a drive, the host that is the scan host will have 11 rdevmi processes running on it.

How the Scan Host is Determined


Scan hosts are determined by vmd/DA and may be different for each shared drive. The
first device host (with a scan ability factor of non-zero, see “Scan Ability Factor” on
page 78) that registers each shared drive with vmd/DA becomes the initial scan host for
that drive. This host does not change as other hosts register.
All device hosts that register with vmd/DA pass a list of shared drives. The name of the
currently assigned scan host for each drive is then returned to each registering host.

The Scan Host Can Change


A scan host is assigned for a shared drive until some interruption occurs. For example,
one of the following occurs:
◆ The socket connection, the host, the drive, or the network goes down.
◆ The drive is logically placed in the Down mode.
A new scan host is then chosen. If a scan host is declared unavailable, vmd/DA assigns a
new scan host so that the requesting host can resume as soon as the previous scan host
relinquishes its use of the drive.
The scan host temporarily changes to hosts that are requesting tape mounts while the
mount is in progress. This happens so only one host at a time has access to the drive path.

100 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SSO Components in Media Manager

A scan host for a drive needs to periodically re-register with vmd/DA to ensure that it
remains the scan host. A host that is not identified as a scan host does not need to
re-register until some disruptive event occurs (for example, a restart of ltid or a failure to
get drive status data from the scan host for one or more drives).
Re-registering with vmd/DA keeps vmd/DA and the host that is registering in coordination
within a dynamic shared drive configuration.

Device Allocation Host


The device allocation host is another name for the volume database host, when the volume
database host performs tasks in support of SSO. This host is also the host where vmd/DA
runs and manages the following:
◆ Reservations for shared drives on a host-by-host basis.
◆ A list of shared drives.
◆ A list of hosts that have registered to share a drive and where the drive is currently
assigned.

How the Device Allocation Host is Determined


For SSO, the current volume database host for the drive is always the device allocation
host for that drive.
If you follow the recommendations (see “Volume Database Host (Device Allocation Host)
Requirements” on page 32) and configure one volume database host for a site, one device
allocation host can manage multiple robotics connected to many media or master servers.

Example Process Flow of SSO Components


Refer to the following figure for a process flow diagram. The diagram includes the case
where the robot also has a robotic control daemon, and the example focuses on writes (or
backup operations) to media in a robot.

1. NetBackup, Storage Migrator, or other users can initiate backups by sending a request
for the required media ID to ltid. ltid determines the location of the requested
media ID by sending a query to vmd (vmd/DA). vmd returns the information it has
about the media.

2. For media in robots, ltid sends a mount request to the robotic daemon that manages
the drives in the robot.

Chapter 11, SSO Reference Topics 101


SSO Components in Media Manager

3. The robotic daemon, tracking drives for the local host, sends a request to ltid. This
request attempts to reserve a targeted shared drive.

4. ltid checks its internal tables. If the drive appears to be available, ltid sends a
reservation request to vmd/DA.

5. vmd/DA maintains shared drive reservations among all hosts sharing the drive.
vmd/DA processes the request based on its internal tables.

6. An acknowledgement or an error (as is appropriate) is sent back to the robotic


daemon.

7. The mount media operation is initiated.

8. bptm performs the following tasks to help protect the integrity of the write operation.
bptm also does the actual write to the tape.
◆ SCSI reserve/release is used.
◆ Position checks are done on the drive to ensure that the drive has not been
rewound by another application.
Storage Migrator also uses SCSI reserve/release to help protect the integrity of write
operations.

102 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
SSO Components in Media Manager

Media and Device Management Process Flow Showing SSO Components

Storage NetBackup
Migrator (bptm)
User
Device
Management

Req
Utility

ues
8

tn
Device - SCSI

ew
Monitor 1 Media Mount Request Reserve/Release

Me
- Position checks

dia
- Write to tape

ID
ltid 5 Acknowledge vmd/DA
Device
Database 4 Reserve - SCSI
8
2
Reserve/Release
Mo

6 3 Volume - Write to tape


un
Ac

Re

Database
tR
k

se
no

eq
rve
wl

ue
ed

st
ge

Robotic
Daemon

7 Mo
Op unt
era me Robotic
tio dia
n Control
Daemon

Robotic Tape
Library

Chapter 11, SSO Reference Topics 103


Where to Go for More Information

Where to Go for More Information

Background Information on Device Discovery and Serialization


See the reference topics appendix in either of the following guides:
◆ NetBackup Media Manager System Administrator’s Guide for UNIX
◆ NetBackup Media Manager System Administrator’s Guide for Windows

Configuring Tape Drives and Robotic Libraries


Information on how to configure devices can be found in the NetBackup Media Manager
device configuration guide.

Configuring Shared Drives


For information on configuring shared drives using the Media Manager wizards, refer to
the online help in the wizards.

Configuring Fibre Channel on Solaris Platforms


Configuration information can be found in the Sun man pages on driver configuration or
in the vendor’s documentation.
Information on how to reconfigure the passthru driver can be found in the NetBackup
Media Manager device configuration guide.

ACS Robots
See the Automated Cartridge System (ACS) appendix in either of the following guides:
◆ NetBackup Media Manager System Administrator’s Guide for UNIX
◆ NetBackup Media Manager System Administrator’s Guide for Windows

TLH Robots
See the IBM Automated Tape Library (ATL) appendix in either of the following guides:
◆ NetBackup Media Manager System Administrator’s Guide for UNIX
◆ NetBackup Media Manager System Administrator’s Guide for Windows

104 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Where to Go for More Information

TLM Robots
See the ADIC Distributed AML Server (DAS) appendix in either of the following guides:
◆ NetBackup Media Manager System Administrator’s Guide for UNIX
◆ NetBackup Media Manager System Administrator’s Guide for Windows

Support Information
For information on the following, visit the VERITAS Support web site:
http://support.veritas.com.
◆ Operating systems
◆ Devices and firmware
◆ NetBackup releases
◆ NetBackup software patches
◆ Tested SAN hardware components
◆ Tape drivers for Windows servers

Chapter 11, SSO Reference Topics 105


Where to Go for More Information

106 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
Index
Symbols D
/etc/system file 16 data loss 3, 75, 81
device
A
configuration wizard 12, 14, 40, 51, 92
accessibility features xviii
drivers 11, 12, 14
ACS or TLM robot types 41, 45, 52, 60, 63, 93,
files 12, 41, 94
99
serialization 40, 47
ACS robot types 34, 46
device allocation host 32, 99, 101
ACS, TL8, TLD, TLH, or TLM robot
Device Allocation Host Summary 74
types 38, 97
DEVICE_HOST, vm.conf entry 43, 46, 77
ACS, TLH, or TLM robot types 55, 97
DISABLE_SCSI_RESERVE bp.conf entry 88
arbitrated loop (FC-AL) 7
drive
Arbitrated Loop Physical Address
cleaning 33, 56, 95
(ALPA) 8, 91
dip switches 29
auto cleaning 95
resiliency 4
auto-configuration 41
Sony dip switches 33
auto-discovery 41
virtualization 34
AVRD_PEND_DELAY entry 87
Drive Status list
AVRD_PEND_DELAY, vm.conf entry 76
Assigned Host 71
B Control 71
bp.conf parameter 69, 88 Shared 71
bpclntcmd utility 29
E
C examples
changing the configuration of a shared fibre channel configuration 25
drive 53, 54 SAN components 10
cleaning media 56 SCSI-to-fibre mappings 19
cluster configurations 93 SSO components configuration 99
cluster environments 89 SSO configuration matrix 18
configuration analyzer 53, 57, 74, 93 verifying SSO configuration 60, 63
configurations with more than 16 drives 16
F
configuring
fibre channel
devices 11
addresses 8
media 38, 55
advantages 3
STK SN6000 35
arbitrated loop 7, 10, 93
TLM robots 52
configuration example 25
crawlreleasebyname, vmoprcmd option 85
definition 6
fabric 7

107
hub 9, 10 O
point-to-point 7 operating system changes 13, 15, 19, 25, 28,
protocol 7 42, 94
switch 7, 9, 10 overview
switched fabric 7, 10 shared drives 1
Fibre Channel Logical Unit Number (FC SSO configuration 5
LUN) 8
P
fibre-attached devices 15
Port Address Identifier 8
firmware levels 12, 40, 91, 93, 105
protocols 9
frequency-based drive cleaning 33, 95
R
G
rdevmi 100
get_license_key command 93
reconfiguring
getting started xiii, 5
non-shared drive 53
global device database host 43
shared drive 53
global device information 43
registry entries 30
Glossary. See NetBackup Help.
related manuals 104
H Removable Storage Manager (RSM) 97
HBA (see Host Bus Adaptor) RESERVATION CONFLICT status 86
Host Bus Adapter 9 robot
how to use this guide xiv cleaning 95
hub 9 inventory 55
HyperTerminal 13 sharing 2
robots with more than one type of drive 55,
L
56
launch SANPoint Control 43, 49
robtest 59, 61, 64
library sharing 2, 4
library-based cleaning 95 S
license keys 1, 34, 35, 93 SAN media server 2, 41, 43
SAN Shared Storage Option (see SSO)
M
SANPoint Control 43, 49
maximum concurrent drives for backup 67
scan host 61, 64, 74, 78, 99, 100
Media Manager vm.conf configuration
scope of this guide xiv
file 43, 46, 76
SCSI reserve/release
media server 2
break a reservation 82
Microsoft RSM 97
controlling use of 88
multiple
crawlreleasebyname option 85
drive types 56
error recovery 85
HBAs 19
in NetBackup 82, 83
MUST_USE_LOCAL_DRIVE bp.conf
limitations 86, 87, 89
entry 68
overview 81
N PEND status 86
NDMP configurations 33, 41, 89 requirements 88
NetBackup RESERVATION CONFLICT 82, 86
patches 32, 105 SCSI-2 protocol 9
scheduler 69 SCSI-3 protocol 9
tuning 67 SCSI-to-fibre
NetBackup Administration Console 69 bridges 9, 13, 19, 94
NetBackup Enterprise Server xiii, xiv, 1 mapping 12, 15, 26, 59

108 NetBackup Shared Storage Option System Administrator’s Guide for UNIX and Windows
sg.install script 28 tested SAN components 95
Shared Drive Summary 60, 64, 74 TLH robot types 46
shared drives TLM robot types 46, 52, 54
configuration wizard 75 tpconfig
definition 2 command 57
key 1, 34, 35 menus 57
shared drives (see SSO) using 94
shared media 33 tuning NetBackup 67
shared_drive_notify script 2
U
Sony AIT tape drives 33
unsupported
SSO
commands 59
configuration quick overview 5
robot types 33, 97
definition 1
using this guide xiv, 5
device allocation host 32, 60, 63, 74, 98,
101 V
drive sharing restrictions 3 VERITAS Backup Exec 2, 33
hardware requirements 1 VERITAS Storage Migrator xiii, 4, 31, 33, 98
scan host 74, 77, 78, 99, 100 VERITAS support web site 14, 105
supported robot types 97 vm.conf file
supported SAN hardware 94 AVRD_PEND_DELAY entries 76
supported server platforms 97 DEVICE_HOST entries 43, 46, 77
terminology 2 SSO_DA_REREGISTER_INTERVAL
unsupported robot types 97 entries 77
vm.conf entries 78 SSO_DA_RETRY_TIMEOUT entries 77
SSO_DA_REREGISTER_INTERVAL, SSO_HOST_NAME entries 78
vm.conf entry 77 SSO_SCAN_ABILITY entries 78
SSO_DA_RETRY_TIMEOUT, vm.conf vmd 63, 98
entry 77 vmd/DA
SSO_HOST_NAME, vm.conf entry 78 definition 98
SSO_SCAN_ABILITY, vm.conf entry 73, 78 testing 61, 63, 64, 66
standalone drives 47, 49, 51, 52, 55, 56, 98 vmdareq command 59
STK SN6000 34 Volume Configuration wizard 38, 55
Storage Area Network (SAN) 1, 6, 11, 33, 68, volume database host
91 recommendations 32, 92
Storage Area Network (SAN) media server 2 requirements 32
storage protocols 7 with tpconfig 57
supported with wizards 47, 52
robot types 97 W
SAN hardware 94 Windows server
server platforms 97 tape drivers 14, 105
T wizards
tape device configuration 12, 40, 92
device installer 14 shared drive 75
drivers 14, 105 volume configuration 55
installer 14 World Wide Name (WWN) 8, 27
TapeAlert 33, 95

Index 109

You might also like